[graph] targets = [] all-features = false no-default-features = false [output] feature-depth = 1 [advisories] db-path = "~/.cargo/advisory-db" db-urls = ["https://github.com/rustsec/advisory-db"] yanked = "warn" ignore = [ # Sidechannel attack to get the private key https://rustsec.org/advisories/RUSTSEC-2023-0071 # currently no rsa private key is used in the codebase, # except for signing SGX enclaves, which is only triggered with enough admin signatures "RUSTSEC-2023-0071", # ed25519-dalek 2.0.0-rc.3 already contains the fix for RUSTSEC-2022-0093 "RUSTSEC-2022-0093", ] [licenses] allow = [ "MIT", "Apache-2.0", "ISC", "Unlicense", "MPL-2.0", "Unicode-DFS-2016", "Unicode-3.0", "BSD-2-Clause", "BSD-3-Clause", "OpenSSL", "CC0-1.0", "Zlib", ] confidence-threshold = 0.8 exceptions = [] [[licenses.clarify]] name = "ring" version = "*" expression = "MIT AND ISC AND OpenSSL" license-files = [{ path = "LICENSE", hash = 0xbd0eed23 }] [[licenses.clarify]] name = "tdx-attest-sys" version = "*" expression = "BSD-3-Clause" license-files = [] [[licenses.clarify]] name = "tdx-attest-rs" version = "*" expression = "BSD-3-Clause" license-files = [] [licenses.private] ignore = false registries = [] [bans] multiple-versions = "warn" wildcards = "allow" highlight = "all" workspace-default-features = "allow" external-default-features = "allow" allow = [] deny = [] skip = [] skip-tree = [] [sources] unknown-registry = "warn" unknown-git = "warn" allow-registry = ["https://github.com/rust-lang/crates.io-index"] # allow-git = [] [sources.allow-org] #github = [""] #gitlab = [""] #bitbucket = [""]