Code Monkey home page Code Monkey logo

sharing-creates-value's Introduction

Open Source Tooling for Open Source Compliance

tooling-group-logo

What we do

We are building an end-to-end automated open source compliance toolchain ecosystem with open source tools as an open source project. To accomplish this we:

  • use existing independent tooling projects, the tools itself remain independent projects with their own set up
  • provide reference workflows to allow their adoption
  • develop the concepts to ensure easy interoperability and integration in existing environments
  • define together with the tooling projects the required API specifications and data model which are required to orchestrate the tools to form an end to end toolchain
  • develop glue code and test cases to combine the tools to end-to-end toolchains

Although the current focus is on license compliance we are also considering:

  • Security
  • ECC (Export Control and Customs)
  • Quality metrics

at a later stage

How we build the open source compliance toolchain

We are developing this via an open source project because there is no "one fits all solution". The only way to satisfy the different needs and requirements is to involve all different stakeholders of, in the ideal case, all organzistions which exist, no matter whether it is an individual, a NGO, a part of the public administration, a university or a company. Everybody is welcome to contribute to this project no matter whether it is a concept, a workflow or any other documentation, code, API or test case. Please check our project charter to learn more about how we operate, our code of conduct and how to contribute to the project

Why we are doing it

It is our belief that Open Source license compliance toolchains has to be Open Source itself. Because this is the only way to provide the required transparency and flexibility to integrate the toolchains in an existing environment as well as being able to adopt to new technologies or new needs. We are convinced that such toolchains need to be fully and seamlessly integrated in the CI/CD workflows, since technology is changing faster than ever - the only way to cope with this is the open source approach. We want that everybody has full transparency about the software products (products in an abstract sense) this can only be achieved with a 100% open source approach. Last but not least open source is the only way to provide a sustainable solution.

How to get involved

The most easiest way is to join one or more of our communication channels:

  • Mailing list: [email protected]
  • Mailing list subscription page
  • Slack channel
  • Online meetings : Bi-weekly - Invitations are sent to the mailing list
  • In person meetings : 3-4 times a year - Announcements are sent to the mailing list - due to the current COVID situation in person meeting will not take place

Projects we align with

sharing-creates-value's People

Contributors

alpianon avatar fpaulisch avatar hanna-modica avatar hstreidl avatar jlovejoy avatar jthdev avatar mcjaeger avatar mgruhler avatar mibo avatar misappi avatar mkurzman avatar mxmehl avatar nicolastoussaint avatar oliverfendt avatar pkn4645 avatar pombredanne avatar scanossjs avatar sgustafsson avatar shanecoughlan avatar sschuberth avatar theopenchainproject avatar zvr avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

sharing-creates-value's Issues

Provide trail from user story to concrete tools

To make onboarding easier there should be documentation which describes the trail coming from user stories (what do I want/need to do) to capabilities of the different functional building blocks of the big picture (e.g. License & copyright scanner) and to a concrete instances of tools which implement the capabilities (this will also be a good base to identify needed glue code and/or APIs to be implemented in the concrete tools)

Restructure the Repo to focus on the compliance tool chain

The existing repo shall be restructed in a way that it focuses on the tooling aspect. This means that the directories "Good-Practices", "OSS-Package-Analysis-Files", "OSS-license-compliance-resources" and the file FAQ shall be removed from the repo andshall be placed in another Repo of the Open-Source-Compliance group (this repo has to be set up with a nice name.
@mcjaeger ; @sgustafsson ; @shanecoughlan ; @misappi ; @blaumeiser-at-bosch ; @heliocastro ; @HansMKern ; @zvr

please comment

Menu of Existing OSS Tools too long

Even on a screen 1080p high, the list of tools in the menu of this page is too long. On my screen, "OSS Discovery by OpenLogic" is the last item I can fully see.

I am not sure how this can be achieved, but ideally the menu should be scrollable as well or be organised in two columns.

rework the Objective statement

Process contributions
we want to provide a platform
we do not provide support tools
Clear hint that everybody is invited to contribute

Create a nice webpage for sharing-creates-value

A nice webpage shall be created, so that internet surfers can find the page and learn what aim this project has and perhapy motivate the visitors to contribute to the project.
In order to do that the content at least of the Readme.md has to be changed in the first step. Others will follow

Add REUSE to big picture

As recently discussed in Brussels, I would like to suggest to add REUSE to the (by the way great!) tooling landscape graphic.

I think the project is a solution for some of the described areas. For example:

  • Inbound: REUSE compliant software greatly improves the reuasbility of its code.
  • Compliance checker
  • Component Analysis Service
  • CI/CD
  • FOSS Compliance Artefact Generator (reuse spdx for a BoM)
  • License & Copyright Scanner (searching for license identifiers and copyright statements)
  • Outbound: if the resulting shared/published code is REUSE compliant, the inbound for another party is also much easier to understand with regard to licensing and copyright

Tooling Landscape: Alignment with OpenChain terminology

Hi,
I did a comparison between the glossary of the tooling landscape (TL) and the terminology around tooling of the OpenChain project (OC). I propose the following changes in the glossary (I can to the changes, but first I would like to discuss that in the community):

  • "Component Analysis Service" -> "Component Scanner".
    This tool scan software (source code or binaries) to identify the contained (open source) components. OC distinguishes between binary scanners and source code scanners. IMO, we do not need to make this distinction in the TL. In the TL we should IMO distinguish between the identification of contained components and the identification of the corresponding licenses (OC does this, TL didn't do it so far).

For documentation purposes I list additional differences between the TL and OC terminology below. I do not think that we should keep the TL terminology in these cases but want to document this decision:

OpenChain Tooling Landscape Remark
License Scanner License & Copyright Scanner TL term seems more appropriate
Notices File FOSS Compliance Bundle Though the TL term is more complex it explains the object better
Component Catalogue Product Metadata Repository, Component Metadata Repository, License Metadata Repository The OC terminology is quite coarse grained. The TL terminology is more explicit and more detailed. Therefore, I prefer the TL terms.

Thanks,
Michael

Collection of existing examples for Dependency Analyzer Source

| Comments | Analysis and dependency resolution is highly language specific. Thus a language specific implementation might be required<br>Discussion: Would it make sense to declare a task or responsibility to stop CI/CD in sit of violation? |

[Meta Level]
This issue is used as example for potential collaboration in our regular meeting.
Steps:

  • go to the file
  • go to the code
  • go to the line
  • click on the 3 dots and
  • click "Reference in new issue"
  • add your issue comment

[Content Level]
I would appreciate to have a collection of examples in the description. That would help to get familiar with the capabilities.
In this special case I would list at least

  • the OSS Review Toolkit Analyzer (https://github.com/oss-review-toolkit/ort#analyzer)
    Hint: also with other tools, the naming of the overall tool would potentially be too vague so that the detailed sub-feature/component would need to be referred to, to have the correct capability mapping. A naming convention like [Overall Tool Name]/[Sub Component/Function] may be helpful

Security Tooling: Is OSTG the right place for security tool and security process guidance?

Dear Tooling Community,

at SAP we are working on an Open Source strategy, incorporating enhancements to the established Open Source Vulnerability Management. We aim to achieve qualities assurance (security and maintenance) and proactive prevention of vulnerabilities by supporting tools:

  • Automated risk rating for developers indicating the “well-being” of a community and its artifacts
  • Hardening of a component based on the usage in the application
  • Monitoring external threat landscape for an increasing risk of public CVE advisories
  • Regular update notifications to the developers

We would like to share and exchange with the security community. I see that Tooling Group primarily focus on license but picks up some security-related tool guidance. ClearlySecure community may be an alternative but a) their focus seems to be on particular projects and b) the project seems to be in a very early state.
Would Tooling Group be the right place to bring up the discussion?

Michael

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.