-
Notifications
You must be signed in to change notification settings - Fork 193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add dependency license scanning linting #801
Comments
This might be a good option: https://github.com/google/go-licenses |
This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions. |
Bump |
The CNCF application process says we need to follow CNCF IP rules, which in turn say:
I guess that means we need to be confident that all of our dependencies use OSI-approved licenses. |
A quick check through our |
This is still relevant. |
I’m looking into Snyk for this (see also https://twitter.com/snyksec/status/1387089315465998343). |
So Snyk isn’t great; it looks at all transitive dependencies, including those which we don’t use (basically, it uses However, I think it would be good to make this part of our PR checks, so that variations in dependencies and their licenses are flagged at PR merge time and not in a periodic report. We should only care about adding dependencies on PRs, so I’m not suggesting we run security scans in PRs, but storing the known list of calculated dependencies and the licenses used by artifacts which end up in our binaries (see https://github.com/mitchellh/golicense) would be good — that way, if developers don’t realise they’re changing the dependency tree, the PR will fail, but they can fix it by updating the catalog (and tooling will be provided to do this). We did this successfully in OpenDaylight for the |
https://app.snyk.io/org/skitt/project/88cc8844-35fa-4fdc-8e74-61bfa8231dd7 is a report on Submariner’s |
I’m also filing issues or submitting PRs for our dependencies as appropriate, e.g. onsi/gomega#441 and kubernetes-sigs/mcs-api#6. |
FOSSA sign-up is failing for me currently. |
We talked about this on the automation sync today and will focus on https://github.com/mitchellh/golicense |
This uses https://github.com/uw-labs/lichen, which is closer to our requirements for CNCF validation than https://github.com/mitchellh/golicense and performs validation using local information. The references for the Allowlist and the approved exceptions are described in the lichen configuration file. Fixes: submariner-io#801 Signed-off-by: Stephen Kitt <skitt@redhat.com>
This uses https://github.com/uw-labs/lichen, which is closer to our requirements for CNCF validation than https://github.com/mitchellh/golicense and performs validation using local information. The references for the Allowlist and the approved exceptions are described in the lichen configuration file. Fixes: submariner-io#801 Signed-off-by: Stephen Kitt <skitt@redhat.com>
This uses https://github.com/uw-labs/lichen, which is closer to our requirements for CNCF validation than https://github.com/mitchellh/golicense and performs validation using local information. The references for the Allowlist and the approved exceptions are described in the lichen configuration file. Fixes: submariner-io#801 Signed-off-by: Stephen Kitt <skitt@redhat.com>
This uses https://github.com/uw-labs/lichen, which is closer to our requirements for CNCF validation than https://github.com/mitchellh/golicense and performs validation using local information. The references for the Allowlist and the approved exceptions are described in the lichen configuration file. Fixes: submariner-io#801 Signed-off-by: Stephen Kitt <skitt@redhat.com>
This uses https://github.com/uw-labs/lichen, which is closer to our requirements for CNCF validation than https://github.com/mitchellh/golicense and performs validation using local information. The references for the Allowlist and the approved exceptions are described in the lichen configuration file. Fixes: #801 Signed-off-by: Stephen Kitt <skitt@redhat.com>
What would you like to be added:
License scanning paralleling the CNCF periodic license scanning, to make sure that all of our code and dependencies use a CNCF-approved license.
Some CNCF scanning details are here, but need to dig for more details about our tooling options:
kubernetes/steering#57
Why is this needed:
To ease integration with other CNCF projects.
The text was updated successfully, but these errors were encountered: