-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review hashicorp license change impact #9181
Comments
This list reflects the current state of the master branches. These can change in future versions. It could be good idea to add license scanning on PRs so that if a version updates to a non-compatible license we can catch it. Not sure what k/k is doing in this area right now. |
Looks like trivvy has this functionality - will take a look at how it works and whether it's useful. |
Thx for looking into this! /triage accepted |
Thanks @killianmuldoon ! We might want to broadcast the news at this week community meeting, there is usage in other Cluster API repositories as well. |
Looks like they are blocking dependencies because of MPL (because "MPL license not in CNCF allowlist") Would be interesting to know how they enforce this config (and eg if they check only go.mod or also go.sum) Also would be good to know why we have those dependencies |
Their tool only checks go.mod AFAIU, and they have those dependencies in the go.sum. I'm still doing some research on how the CNCF sees go.sum dependencies, but I haven't found anything concrete yet. |
Thanks @killianmuldoon looking into this! |
I recently implemented a feature in CR for authorized metrics. I ended up implementing it in a way that you only actually get dependencies like k8s.io/apiserver in your go.mod file when you are using it (i.e. importing a certain package). If you don't use it, it will only end up in go.sum. So my rough guess is that dependencies which are only in go.sum are not actually getting compiled into your binary because you don't need any of their packages. They are probably just part of "what if you include all dependencies of all dependencies without looking at specific packages". But really just a guess. Probably we should just ask in some Kubernetes Slack channel about the background of only checking go.mod and they can tell us (it seems k/k is aligning to CNCF recommendations) |
In terms of tooling to help mitigate these issues on an ongoing basis, https://compliance.linuxfoundation.org/references/tools/ mentions some tools for licensing compliance. It appears the LF-sponsored project was spun down in 2020, but Fossology is active. The downside to Fossology from what I see is that it appears to be designed as a live database system, which would require extra hosting. |
I would definitely like to align to upstream k/k if somehow possible |
The #k8s-code-organization group is a good group to talk to about go dependency management, it's usually mostly focused on kubernetes/kubernetes under sig architecture but more general dependency management comes up.
In go1.17+ modules (NOTE: that's NOT the go compiler version, it's As for tooling, see https://kubernetes.slack.com/archives/CHGFYJVAN/p1692213758848149
|
Looks like our last exposure here is the indirect dependency (through viper) on Line 94 in 932cdc4
This dependency doesn't have an approved license by the CNCF rules. It is on an exemption list from 2022 . I need to figure out whether or not that exemption carries forward to today. |
It seems like the exceptions in those files are cumulative - as evidenced by this PR: cncf/foundation#621 and some other information on that CNCF repo. Because of this I'm inclined to close this issue after merging #9184. At that point we will have the automation in place to prevent this from happening in future. |
Maybe I missed something, but my quick skim suggests that PR only covers container images, while this repo also releases binaries and may develop dependencies in other places (test code? clusterctl? etc.) |
The trivy scan is looking at files in the repo - so it catches the go.mod + scripts etc. I think that should be sufficient for what's in the binaries. What's definitely missing is our container images which have binaries + tools etc. from the base images. I think you're right that we should also setup something for image scanning - maybe snyk like the sig-security scan for k/k. |
I might be wrong but I thought for CVEs Trivy can scan based on source code and image (we definitely scan for CVE's based on images). Can't it do the same for licenses? Also wondering what we actually have in our base images, I think we only use gcr.io/distroless (so no alpine or something like that). But never looked into what distroless contains, I assumed almost nothing |
It can - we could do a periodic license scan, but that's not covered in #9184 which is for blocking forbidden licenses incoming in PRs. I'll open a separate issue for image scanninng, I think there's probably a number of choices to be made there. |
I've opened #9436 to track periodic license scanning. IMO we should ignore "Remove the indirect dependency on hashicorp HCL." for now as this dependency is accepted at the CNCF level. Using current tooling we will be able to catch a change in its license. If we really want to remove that dependency we could track it in a follow up. Removing the dependency from our code involves removing /close |
@killianmuldoon: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Let's just wait and see. Maybe viper just drops the dependency sooner or later. |
Pretty sure viper itself can't accept a change to a more problematic license |
IIRC we previously removed viper from k/k for reasons like this .... |
Recently hashicorp announced changes to some of its licenses. This issue is a place to assess the impact on Cluster API.
CNCF issue: cncf/foundation#617
None of the dependencies CAPI imports have been updated to the Business source license.
Note: The original finding in this issue are irrelevant at this point. See below for the current state and plan-of-action.
Initial findings
Generate list of all modules which are importing a hashicorp module. This must be done for each of the three go modules in the CAPI repo.
go mod graph | grep "\s.*hashicorp" > hashicorp_modules
cd test ; go mod graph | grep "\s.*hashicorp" >> ../hashicorp_modules
cd ../hack/tools ; go mod graph | grep "\s.*hashicorp" >> ../../hashicorp_modules
cd ../..
Get a unique sorted list of hashicorp modules that are being imported
cat hashicorp_modules | cut -d ' ' -f 2 | sort -u -o hashicorp_modules
The end result of the above is a list of 27 modules. Some are the same module with a different version.
MPL: https://github.com/hashicorp/consul/blob/main/api/LICENSE
github.com/hashicorp/consul/api@v1.1.0
github.com/hashicorp/consul/api@v1.20.0
MPL: https://github.com/hashicorp/consul/blob/main/sdk/LICENSE
github.com/hashicorp/consul/sdk@v0.1.1
MPL: https://github.com/hashicorp/errwrap/blob/master/LICENSE
github.com/hashicorp/errwrap@v1.0.0
MPL: https://github.com/hashicorp/go-cleanhttp/blob/master/LICENSE
github.com/hashicorp/go-cleanhttp@v0.5.1
github.com/hashicorp/go-cleanhttp@v0.5.2
MIT: https://github.com/hashicorp/go-hclog/blob/main/LICENSE
github.com/hashicorp/go-hclog@v1.2.0
MPL: https://github.com/hashicorp/go-immutable-radix/blob/master/LICENSE
github.com/hashicorp/go-immutable-radix@v1.0.0
github.com/hashicorp/go-immutable-radix@v1.3.1
MPL: https://github.com/hashicorp/golang-lru/blob/master/LICENSE
github.com/hashicorp/golang-lru@v0.5.0
github.com/hashicorp/golang-lru@v0.5.1
github.com/hashicorp/golang-lru@v0.5.4
MIT: https://github.com/hashicorp/go-msgpack/blob/main/LICENSE
github.com/hashicorp/go-msgpack@v0.5.3
MPL: https://github.com/hashicorp/go-multierror/blob/main/LICENSE
github.com/hashicorp/go-multierror@v1.0.0
BSD: (forked from go) https://github.com/hashicorp/go.net/blob/master/LICENSE
github.com/hashicorp/go.net@v0.0.1
MPL https://github.com/hashicorp/go-rootcerts/blob/master/LICENSE
github.com/hashicorp/go-rootcerts@v1.0.0
github.com/hashicorp/go-rootcerts@v1.0.2
MPL https://github.com/hashicorp/go-sockaddr/blob/master/LICENSE
github.com/hashicorp/go-sockaddr@v1.0.0
MIT https://github.com/hashicorp/go-syslog/blob/master/LICENSE
github.com/hashicorp/go-syslog@v1.0.0
MPL https://github.com/hashicorp/go-uuid/blob/master/LICENSE
github.com/hashicorp/go-uuid@v1.0.0
github.com/hashicorp/go-uuid@v1.0.1
MPL https://github.com/hashicorp/hcl/blob/master/LICENSE
github.com/hashicorp/hcl@v1.0.0
MPL https://github.com/hashicorp/logutils/blob/master/LICENSE
github.com/hashicorp/logutils@v1.0.0
MIT https://github.com/hashicorp/mdns/blob/main/LICENSE
github.com/hashicorp/mdns@v1.0.0
MPL https://github.com/hashicorp/memberlist/blob/master/LICENSE
github.com/hashicorp/memberlist@v0.1.3
MPL https://github.com/hashicorp/serf/blob/master/LICENSE
github.com/hashicorp/serf@v0.10.1
github.com/hashicorp/serf@v0.8.2
Outstanding tasks:
The text was updated successfully, but these errors were encountered: