-
Notifications
You must be signed in to change notification settings - Fork 238
Expand file tree
/
Copy pathdeny.toml
More file actions
96 lines (89 loc) · 2.51 KB
/
deny.toml
File metadata and controls
96 lines (89 loc) · 2.51 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
[graph]
targets = [
{ triple = "x86_64-pc-windows-gnu" },
{ triple = "x86_64-unknown-linux-musl" },
{ triple = "x86_64-apple-darwin" },
{ triple = "aarch64-apple-darwin" },
]
[advisories]
db-path = "~/.cargo/advisory-db"
db-urls = ["https://github.com/rustsec/advisory-db"]
yanked = "deny"
ignore = [
# TODO: Update dependencies that use rsa crate
"RUSTSEC-2023-0071",
# TODO: Wait for dependencies to upgrade off of proc-macro-error
"RUSTSEC-2024-0370",
# TODO: Wait for dependencies to upgrade off of paste
"RUSTSEC-2024-0436",
# rustls-pemfile is unmaintained, but we only use it for parsing system
# certificates. This is not a serious attack vector for our use case.
# TODO: Upgrade rustls-native-certs to 0.8.x to get rid of this.
"RUSTSEC-2025-0134",
# bincode (depended on by deno) is unmaintained
"RUSTSEC-2025-0141",
# rustls-webpki incorrectly handles CRLs for certificates with multiple distributionPoints;
# the old versions are used in smithy and we can't upgrade them right now. this will be fixed
# when smithy drops hyper 0.x support
"RUSTSEC-2026-0049",
# can't upgrade rand until some dependencies support 0.10
"RUSTSEC-2026-0097",
]
[licenses]
allow = [
"Apache-2.0",
"Apache-2.0 WITH LLVM-exception",
"BSD-2-Clause",
"BSD-3-Clause",
"CDLA-Permissive-2.0",
"ISC",
"MIT",
"MIT-0", # MIT No Attribution
"MPL-2.0",
"OpenSSL",
"Unicode-3.0",
"Unicode-DFS-2016",
"CC0-1.0",
"Zlib",
]
confidence-threshold = 0.8
exceptions = [
#{ allow = ["Zlib"], name = "adler32", version = "*" },
{ allow = ["EPL-2.0"], name = "colored_json", version = "*" }
]
[[licenses.clarify]]
name = "ring"
version = "*"
expression = "MIT AND ISC AND OpenSSL"
license-files = [
{ path = "LICENSE", hash = 0xbd0eed23 }
]
[[licenses.clarify]]
name = "encoding_rs"
version = "0.8.30"
expression = "MIT OR Apache-2.0"
license-files = [
{ path = "COPYRIGHT", hash = 0x39f8ad31 }
]
# TODO: Include internal crates
[licenses.private]
ignore = false
registries = []
[bans]
multiple-versions = "warn"
wildcards = "allow"
highlight = "all"
allow = []
deny = [
# Versions containing the binary blob
# See: https://github.com/serde-rs/serde/issues/2538
{ name = "serde_derive", version = ">1.0.171, <1.0.184"},
{ name = "axum", version = "<0.7" },
]
skip = []
skip-tree = []
[sources]
unknown-registry = "warn"
unknown-git = "warn"
allow-registry = ["https://github.com/rust-lang/crates.io-index"]
allow-git = []