|
|
|
# Documentation for this configuration file can be found here
|
|
|
|
# https://embarkstudios.github.io/cargo-deny/checks/cfg.html
|
|
|
|
|
|
|
|
targets = [
|
|
|
|
{ triple = "x86_64-unknown-linux-gnu" },
|
|
|
|
{ triple = "x86_64-apple-darwin" },
|
|
|
|
{ triple = "x86_64-pc-windows-msvc" },
|
|
|
|
{ triple = "aarch64-linux-android" },
|
|
|
|
]
|
|
|
|
|
|
|
|
# https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
|
|
|
|
[licenses]
|
|
|
|
allow = [
|
|
|
|
"Apache-2.0 WITH LLVM-exception",
|
|
|
|
"Apache-2.0",
|
|
|
|
"BSD-2-Clause",
|
|
|
|
"BSD-3-Clause",
|
|
|
|
"ISC",
|
|
|
|
"MIT",
|
|
|
|
"MPL-2.0",
|
|
|
|
"OpenSSL",
|
|
|
|
"Zlib",
|
|
|
|
]
|
|
|
|
|
|
|
|
[[licenses.clarify]]
|
|
|
|
name = "ring"
|
|
|
|
expression = "MIT AND ISC AND OpenSSL"
|
|
|
|
license-files = [
|
|
|
|
{ path = "LICENSE", hash = 0xbd0eed23 }
|
|
|
|
]
|
|
|
|
|
|
|
|
# https://embarkstudios.github.io/cargo-deny/checks/bans/cfg.html
|
|
|
|
[bans]
|
|
|
|
multiple-versions = "deny"
|
|
|
|
wildcards = "allow"
|
|
|
|
deny = []
|
|
|
|
|
|
|
|
skip-tree = [
|
|
|
|
# Criterion 0.3 is pretty old at this point and has had an upcoming 0.4 for
|
|
|
|
# a long time. This is a dev-dependency so we don't really mind its
|
|
|
|
# dependency tree, so skip it entirely.
|
|
|
|
{ name = "criterion", depth = 20 },
|
|
|
|
|
|
|
|
# This is maintained externally and we allow it to have duplicate
|
|
|
|
# dependencies relative to Wasmtime's main dependency tree.
|
|
|
|
{ name = "witx", depth = 20 },
|
|
|
|
|
|
|
|
# This is somewhat unmaintained at this point and seems to pull in an old
|
|
|
|
# version of `env_logger`, so ignore it.
|
|
|
|
{ name = "pretty_env_logger", depth = 20 },
|
|
|
|
|
|
|
|
# They want to publish version 2.0 to upgrade `hashbrown` so in the meantime
|
|
|
|
# it is duplicated for us.
|
|
|
|
{ name = "indexmap", depth = 2 },
|
|
|
|
|
|
|
|
# This is on and older version of `wasm-encoder` and is one we can't
|
|
|
|
# necessarily easily update, so let `wasm-encoder` get duplicated for now.
|
|
|
|
{ name = "wasm-coredump-builder", depth = 2 },
|
wasi-http supply chain audit (#6121)
* add cargo-deny exception for duplicate versions of windows-sys
* cargo vetting for all new deps introduced by https://github.com/bytecodealliance/wasmtime/pull/5929
The audits are straightforward. The exemptions, as always, need to be justified:
* core-foundation, core-foundation-sys, security-framework, security-framework-sys: these are large crates which are FFI bindings to Mac OS frameworks. As such they contain tons of unsafe code to make these FFI calls and manage memory. These crates are too big to audit.
* schannel: same as the above, except this is a windows component, which I'm also unfamiliar with.
* openssl, openssl-sys: also large FFI bindings which are impractical to audit.
* futures-macro, futures-task: while not as complex as futures-util, these are beyond my personal understanding of futures to vet practically. I've asked Alex to look at auditing these, and he will after he returns from vacation next week.
* futures-util: 25kloc of code, over 149 instances of the substring "unsafe" (case insensitive), this is impractical to audit in the extreme.
* h2, http, httparse, hyper, mio, tokio: this so-called tokio/hyper family are very large and challenging to audit. Bobby Holley has indicated that he is working to get the AWS engineers who maintain these crates to publish their own audits, which we can then import. We expect to exempt these until those imports are available.
2 years ago
|
|
|
|
|
|
|
# The native-tls crate hasn't kept up with updates to the underlying
|
|
|
|
# windows-sys, while the rest of the ecosystem has. This duplicated
|
|
|
|
# dependency appears to be benign.
|
|
|
|
{ name = "windows-sys", depth = 2 },
|
|
|
|
]
|