2020# dependencies not shared by any other crates, would be ignored, as the target
2121# list here is effectively saying which targets you are building for.
2222targets = [
23- { triple = " aarch64-apple-darwin" },
24- { triple = " x86_64-apple-darwin" },
25- { triple = " i686-pc-windows-gnu" },
26- { triple = " i686-pc-windows-msvc" },
27- { triple = " x86_64-pc-windows-gnu" },
28- { triple = " x86_64-pc-windows-msvc" },
29- { triple = " i686-unknown-linux-gnu" },
30- { triple = " x86_64-unknown-linux-gnu" },
31- { triple = " x86_64-unknown-linux-musl" },
32- # { triple = "wasm32-unknown-unknown" },
33- # { triple = "x86_64-unknown-redox" },
23+ { triple = " aarch64-apple-darwin" },
24+ { triple = " x86_64-apple-darwin" },
25+ { triple = " i686-pc-windows-gnu" },
26+ { triple = " i686-pc-windows-msvc" },
27+ { triple = " x86_64-pc-windows-gnu" },
28+ { triple = " x86_64-pc-windows-msvc" },
29+ { triple = " i686-unknown-linux-gnu" },
30+ { triple = " x86_64-unknown-linux-gnu" },
31+ { triple = " x86_64-unknown-linux-musl" },
32+ # { triple = "wasm32-unknown-unknown" },
33+ # { triple = "x86_64-unknown-redox" },
3434]
3535# When creating the dependency graph used as the source of truth when checks are
3636# executed, this field can be used to prune crates from the graph, removing them
@@ -73,8 +73,8 @@ yanked = "warn"
7373# A list of advisory IDs to ignore. Note that ignored advisories will still
7474# output a note when they are encountered.
7575ignore = [
76- # "RUSTSEC-0000-0000",
77- " RUSTSEC-2021-0145 " , # atty... potential unaligner when using custom allocators .
76+ # "RUSTSEC-0000-0000",
77+ " RUSTSEC-2023-0086 " , # Lexical-core -> arrow issue, updated in main in Sept-2024, unreleased .
7878]
7979# Threshold for security vulnerabilities, any vulnerability with a CVSS score
8080# lower than the range specified will be ignored. Note that ignored advisories
@@ -101,13 +101,13 @@ version = 2
101101# See https://spdx.org/licenses/ for list of possible licenses
102102# [possible values: any SPDX 3.11 short identifier (+ optional exception)].
103103allow = [
104- " MIT" ,
105- " Apache-2.0" ,
106- " Apache-2.0 WITH LLVM-exception" ,
107- " BSD-3-Clause" ,
108- " Unicode-DFS-2016" ,
109- " Zlib" ,
110- # Thank Jesus for rerun that compiled the following for me...
104+ " MIT" ,
105+ " Apache-2.0" ,
106+ " Apache-2.0 WITH LLVM-exception" ,
107+ " BSD-3-Clause" ,
108+ " Unicode-DFS-2016" ,
109+ " Zlib" ,
110+ # Thank Jesus for rerun that compiled the following for me...
111111]
112112
113113# The confidence threshold for detecting a license from license text.
@@ -146,8 +146,8 @@ license-files = [{ path = "LICENSE", hash = 0xbd0eed23 }]
146146# and the crate will be checked normally, which may produce warnings or errors
147147# depending on the rest of your configuration
148148# license-files = [
149- # Each entry is a crate relative path, and the (opaque) hash of its contents
150- # { path = "LICENSE", hash = 0xbd0eed23 }
149+ # Each entry is a crate relative path, and the (opaque) hash of its contents
150+ # { path = "LICENSE", hash = 0xbd0eed23 }
151151# ]
152152
153153[licenses .private ]
@@ -160,7 +160,7 @@ ignore = false
160160# is only published to private registries, and ignore is true, the crate will
161161# not have its license(s) checked
162162registries = [
163- # "https://sekretz.com/registry
163+ # "https://sekretz.com/registry
164164]
165165
166166# This section is considered when running `cargo deny check bans`.
@@ -187,17 +187,17 @@ workspace-default-features = "allow"
187187external-default-features = " allow"
188188# List of crates that are allowed. Use with care!
189189allow = [
190- # { name = "ansi_term", version = "=0.11.0" },
190+ # { name = "ansi_term", version = "=0.11.0" },
191191]
192192# List of crates to deny
193193deny = [
194- # Each entry the name of a crate and a version range. If version is
195- # not specified, all versions will be matched.
196- # { name = "ansi_term", version = "=0.11.0" },
197- #
198- # Wrapper crates can optionally be specified to allow the crate when it
199- # is a direct dependency of the otherwise banned crate
200- # { name = "ansi_term", version = "=0.11.0", wrappers = [] },
194+ # Each entry the name of a crate and a version range. If version is
195+ # not specified, all versions will be matched.
196+ # { name = "ansi_term", version = "=0.11.0" },
197+ #
198+ # Wrapper crates can optionally be specified to allow the crate when it
199+ # is a direct dependency of the otherwise banned crate
200+ # { name = "ansi_term", version = "=0.11.0", wrappers = [] },
201201]
202202
203203# List of features to allow/deny
0 commit comments