# cargo-deny is really only ever intended to run on the "normal" tier-1 targets targets = [ { triple = "x86_64-unknown-linux-gnu" }, { triple = "x86_64-unknown-linux-musl" }, ] [advisories] vulnerability = "deny" unmaintained = "deny" notice = "deny" unsound = "deny" ignore = [ # Potential unaligned pointer read on windows. Doesn't happen in practice. "RUSTSEC-2021-0145", ] [bans] multiple-versions = "allow" deny = [] skip = [] [sources] unknown-registry = "deny" unknown-git = "deny" allow-git = [] [sources.allow-org] github = [ "apollodao", ] [licenses] unlicensed = "deny" copyleft = "deny" # We want really high confidence when inferring licenses from text confidence-threshold = 0.93 allow = ["Apache-2.0", "MIT", "BSD-3-Clause", "MPL-2.0", "ISC"] exceptions = [{ allow = ["Unicode-DFS-2016"], name = "unicode-ident" }] [[licenses.clarify]] name = "webpki" expression = "ISC" license-files = [ { path = "LICENSE", hash = 0x001c7e6c }, ] [[licenses.clarify]] name = "ring" expression = "ISC" license-files = [ { path = "LICENSE", hash = 0xbd0eed23 }, ]