-
Notifications
You must be signed in to change notification settings - Fork 3
chore: Update BSL license to 6-year conversion (Jan 2032) #21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
9d00ed2
74b6496
96c473e
4fa97ac
ff4d1c2
2f2b21b
ed18d9b
a3c4fbc
3d59f26
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -2,7 +2,7 @@ | |
|
|
||
| **Debian-based Distribution Engineering for Cortex Linux** | ||
|
|
||
| [](LICENSE) | ||
| [](LICENSE) | ||
| [](https://debian.org) | ||
| [](https://github.com/cortexlinux/cortex-distro/actions) | ||
|
|
||
|
|
@@ -231,7 +231,7 @@ See [CONTRIBUTING.md](CONTRIBUTING.md) for guidelines. | |
|
|
||
| ## License | ||
|
|
||
| Apache 2.0 - See [LICENSE](LICENSE) | ||
| BSL 1.1 - See [LICENSE](LICENSE) | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🧩 Analysis chain🏁 Script executed: # First, let's verify the README.md license section
git ls-files | grep -i readme
# Get line 234 of README.md if it exists
if [ -f README.md ]; then
echo "=== README.md line 234 ==="
sed -n '234p' README.md
fiRepository: cortexlinux/cortex-distro Length of output: 138 🏁 Script executed: #!/bin/bash
# Verify repository-wide license consistency
echo "=== Checking for any remaining Apache-2.0 SPDX headers ==="
rg -c "SPDX-License-Identifier:\s*Apache-2\.0" 2>/dev/null || echo "No matches found"
echo -e "\n=== Checking for any remaining Apache references in documentation ==="
rg -c -i "apache\s*2\.0" -t md 2>/dev/null || echo "No markdown files with Apache 2.0 references"
echo -e "\n=== Checking for BUSL-1.1 headers ==="
rg -c "SPDX-License-Identifier:\s*BUSL-1\.1" 2>/dev/null || echo "No BUSL-1.1 headers found"
echo -e "\n=== Checking LICENSE file content ==="
if [ -f LICENSE ]; then
head -20 LICENSE
else
echo "No LICENSE file found"
fi
echo -e "\n=== Repository files count by type ==="
find . -type f -name "*.md" | wc -l
find . -type f \( -name "*.js" -o -name "*.ts" -o -name "*.go" -o -name "*.py" -o -name "*.java" \) | wc -lRepository: cortexlinux/cortex-distro Length of output: 1856 License migration incomplete across codebase. While README.md correctly reflects BSL 1.1 and the LICENSE file is properly configured with BUSL-1.1 terms, 18 source files still retain Apache-2.0 SPDX headers and must be updated to maintain consistency:
Update all SPDX headers to: 🤖 Prompt for AI Agents |
||
|
|
||
| ## Support | ||
|
|
||
|
|
||
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -7,18 +7,19 @@ | |||||
| set -e | ||||||
|
|
||||||
| # Cortex Linux build configuration | ||||||
| CODENAME="trixie" | ||||||
| # Using bookworm (stable) for reliable package availability and GPG support | ||||||
| CODENAME="bookworm" | ||||||
| ARCH="amd64" | ||||||
| VERSION="0.1.0" | ||||||
|
|
||||||
| # Ubuntu 24.04 compatible live-build options | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Fix stale Ubuntu reference in comment. The comment says “Ubuntu 24.04” but the script is configured for Debian bookworm, which can mislead maintainers. 📝 Suggested update-# Ubuntu 24.04 compatible live-build options
+# Debian bookworm live-build options📝 Committable suggestion
Suggested change
🤖 Prompt for AI Agents |
||||||
| lb config noauto \ | ||||||
| --distribution "${CODENAME}" \ | ||||||
| --parent-distribution "${CODENAME}" \ | ||||||
| --parent-debian-installer-distribution "${CODENAME}" \ | ||||||
| --archive-areas "main contrib non-free non-free-firmware" \ | ||||||
| --architectures "${ARCH}" \ | ||||||
| --binary-images iso-hybrid \ | ||||||
| --bootloaders "grub-efi,syslinux" \ | ||||||
| --debian-installer-distribution "${CODENAME}" \ | ||||||
| --debian-installer live \ | ||||||
| --debian-installer-gui false \ | ||||||
|
|
@@ -28,38 +29,34 @@ lb config noauto \ | |||||
| --iso-volume "Cortex Linux ${VERSION}" \ | ||||||
| --memtest none \ | ||||||
| --security true \ | ||||||
| --updates true \ | ||||||
| --backports true \ | ||||||
| --apt-indices true \ | ||||||
| --apt-recommends true \ | ||||||
| --apt-source-archives false \ | ||||||
| --cache true \ | ||||||
| --cache-indices true \ | ||||||
| --cache-packages true \ | ||||||
| --cache-stages true \ | ||||||
| --checksums sha256 \ | ||||||
| --chroot-filesystem squashfs \ | ||||||
| --clean \ | ||||||
| --color \ | ||||||
| --compression xz \ | ||||||
| --debconf-frontend noninteractive \ | ||||||
| --debconf-priority critical \ | ||||||
| --debootstrap-options "--variant=minbase --include=apt-transport-https,ca-certificates,gnupg" \ | ||||||
| --firmware-binary true \ | ||||||
| --firmware-chroot true \ | ||||||
| --hdd-size auto \ | ||||||
| --image-name "cortex-linux" \ | ||||||
| --initramfs live-boot \ | ||||||
| --initramfs-compression xz \ | ||||||
| --initsystem systemd \ | ||||||
| --interactive false \ | ||||||
| --linux-flavours "${ARCH}" \ | ||||||
| --linux-packages "linux-image linux-headers" \ | ||||||
| --mode debian \ | ||||||
| --quiet \ | ||||||
| --system live \ | ||||||
| --verbose \ | ||||||
| --bootappend-live "boot=live components quiet splash locales=en_US.UTF-8 keyboard-layouts=us" \ | ||||||
| "${@}" | ||||||
|
|
||||||
| # Create package lists directory | ||||||
| mkdir -p config/package-lists | ||||||
| echo "apt-transport-https ca-certificates gnupg" > config/package-lists/base.list.chroot | ||||||
|
|
||||||
| echo "Cortex Linux live-build configured successfully" | ||||||
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
This file was deleted.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
🏁 Script executed:
Repository: cortexlinux/cortex-distro
Length of output: 697
🌐 Web query:
GitHub Actions version pinning commit SHA best practices supply chain security💡 Result:
Short best-practices for pinning GitHub Actions to commit SHAs (supply‑chain security):
Pin to a full-length commit SHA (not
@main/@tag) so the action code is immutable for your workflow. Verify the SHA originates from the action’s official repo (not a fork). [1][4]Prefer SHAs that correspond to official tagged releases (and comment the tag/version in the workflow) so Dependabot can recommend updates while retaining immutability. [1]
Audit the action’s source for mutable dependencies (unpinned container images, scripts that download code at runtime, composite actions that pull external code) — pinning SHA does not help if the action itself fetches mutable artifacts. Reject “unpinnable” actions. [1][2][4]
Enforce SHA pinning and blocklists at org/enterprise level (Allowed actions & reusable workflows policy) so non-pinned or known-malicious actions fail policy checks. Use explicit block entries for compromised actions. [1][3][4]
Use Dependabot (or similar) to surface outdated/vulnerable actions, but note Dependabot alerts behave differently for SHA-pinned dependencies — prefer SHAs tied to tags to keep update signals. [1]
Minimize risk via least-privilege: narrow GITHUB_TOKEN permissions, require environment approvals for prod workflows, and rotate/separate secrets accessible to Actions. Monitor for exfiltration patterns. [1][4]
Add operational controls: workflow review/PR gating, automated checks (e.g., “ensure SHA pinned” linter/action), CI audits of used actions, and alerting for new external references. [3]
When available, prefer vendor-provided “immutable releases” (GitHub immutable releases / verified creators) so you can safely pin to semantic versions instead of raw SHAs. Still verify provenance. [1][5]
Trade-offs / notes:
Sources: GitHub Well‑Architected / Actions security guidance; GitHub Docs (secure use & allowed actions); GitHub changelog on SHA enforcement; industry analysis of “unpinnable” actions; marketplace/tools for enforcing SHA pinning. [1][4][3][2][3]
Pin
jlumbroso/free-disk-spaceto a commit SHA.Using
@mainis mutable and weakens supply-chain security. Pin to a trusted commit SHA tied to an official release tag (comment the tag in the workflow) so the action code is immutable and Dependabot can track updates.🛠️ Proposed fix
🤖 Prompt for AI Agents