Skip to content

chore(license): set SPDX license metadata to match Apache-2.0 LICENSE#21

Merged
KooshaPari merged 1 commit intomainfrom
chore/license-bootstrap
Apr 24, 2026
Merged

chore(license): set SPDX license metadata to match Apache-2.0 LICENSE#21
KooshaPari merged 1 commit intomainfrom
chore/license-bootstrap

Conversation

@KooshaPari
Copy link
Copy Markdown
Owner

@KooshaPari KooshaPari commented Apr 24, 2026

User description

Summary

Per worklogs/GOVERNANCE.md LICENSE coverage audit (task #106).

BytePort already carries a canonical Apache-2.0 LICENSE at the repo root, so no LICENSE file changes are needed here. This PR is a metadata-only fix: align Cargo.toml and package.json files to declare the SPDX license identifier so crates.io / npm / GitHub licensee detection all agree with the on-disk LICENSE.

Changes

  • frontend/web/src-tauri/Cargo.toml: license = """Apache-2.0"
  • frontend/web/package.json: add "license": "Apache-2.0"
  • .github/frontend/package.json: add "license": "Apache-2.0"

Why

  • Unblocks crates.io / npm publishing (SPDX-compliant identifier)
  • Declared license now matches the repo's on-disk LICENSE text

Sister PRs: PhenoKits#14, PhenoPlugins#3, PhenoMCP#5, DataKit#4, Tracera#341.

Test plan

  • cargo metadata in frontend/web/src-tauri reports license: "Apache-2.0"
  • npm view / package managers see the new license field

Note

Low Risk
Low risk metadata-only change that only affects package manifest fields for publishing/license detection.

Overview
Sets SPDX license metadata to Apache-2.0 in .github/frontend/package.json and frontend/web/package.json, and replaces the empty license field in frontend/web/src-tauri/Cargo.toml with Apache-2.0 so npm/crates tooling and GitHub license detection align with the repo LICENSE.

Reviewed by Cursor Bugbot for commit 8aff456. Bugbot is set up for automated code reviews on this repo. Configure here.


CodeAnt-AI Description

Add Apache-2.0 license metadata to frontend packages

What Changed

  • The Rust app manifest now declares Apache-2.0 as its license instead of leaving it blank
  • The frontend package files now also declare Apache-2.0, so license information matches the repo’s LICENSE file
  • This makes the project’s license easier for package registries and code hosting sites to recognize

Impact

✅ Clearer license display on package pages
✅ Fewer publishing issues for frontend and Rust packages
✅ Consistent license detection across registries and GitHub

🔄 Retrigger CodeAnt AI Review

Details

💡 Usage Guide

Checking Your Pull Request

Every time you make a pull request, our system automatically looks through it. We check for security issues, mistakes in how you're setting up your infrastructure, and common code problems. We do this to make sure your changes are solid and won't cause any trouble later.

Talking to CodeAnt AI

Got a question or need a hand with something in your pull request? You can easily get in touch with CodeAnt AI right here. Just type the following in a comment on your pull request, and replace "Your question here" with whatever you want to ask:

@codeant-ai ask: Your question here

This lets you have a chat with CodeAnt AI about your pull request, making it easier to understand and improve your code.

Example

@codeant-ai ask: Can you suggest a safer alternative to storing this secret?

Preserve Org Learnings with CodeAnt

You can record team preferences so CodeAnt AI applies them in future reviews. Reply directly to the specific CodeAnt AI suggestion (in the same thread) and replace "Your feedback here" with your input:

@codeant-ai: Your feedback here

This helps CodeAnt AI learn and adapt to your team's coding style and standards.

Example

@codeant-ai: Do not flag unused imports.

Retrigger review

Ask CodeAnt AI to review the PR again, by typing:

@codeant-ai: review

Check Your Repository Health

To analyze the health of your code repository, visit our dashboard at https://app.codeant.ai. This tool helps you identify potential issues and areas for improvement in your codebase, ensuring your repository maintains high standards of code health.

… (audit #106)

Per worklogs/GOVERNANCE.md LICENSE coverage audit (task #106).

BytePort already carries a canonical Apache-2.0 LICENSE at the repo root.
This PR is a metadata-only fix: align Cargo.toml and package.json files
to declare the SPDX license identifier so crates.io / npm / GitHub
licensee detection all agree with the on-disk LICENSE.

Changes:
- frontend/web/src-tauri/Cargo.toml: license = "" -> "Apache-2.0"
- frontend/web/package.json: add "license": "Apache-2.0"
- .github/frontend/package.json: add "license": "Apache-2.0"

No LICENSE file changes; repo already has canonical Apache-2.0 text.

Sister PRs: PhenoKits#14, PhenoPlugins#3, PhenoMCP#5, DataKit#4

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented Apr 24, 2026

CodeAnt AI is reviewing your PR.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@codeant-ai codeant-ai Bot added the size:XS This PR changes 0-9 lines, ignoring generated files label Apr 24, 2026
@kilo-code-bot
Copy link
Copy Markdown

kilo-code-bot Bot commented Apr 24, 2026

Code Review Summary

Status: No Issues Found | Recommendation: Merge

Files Reviewed (3 files)
  • .github/frontend/package.json — added "license": "Apache-2.0"
  • frontend/web/package.json — added "license": "Apache-2.0"
  • frontend/web/src-tauri/Cargo.toml — changed license = """Apache-2.0"

Reviewed by step-3.5-flash · 86,751 tokens

@codeant-ai
Copy link
Copy Markdown

codeant-ai Bot commented Apr 24, 2026

CodeAnt AI finished reviewing your PR.

Copy link
Copy Markdown

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request adds the Apache-2.0 license to configuration files across the frontend and Tauri components. A review comment highlights a potential conflict in .github/frontend/package.json, where the private property remains set to true, which may prevent the package from being published as intended.

"name": "frontend",
"version": "0.0.1",
"private": true,
"license": "Apache-2.0",
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

This package is marked as "private": true (on line 4), which prevents it from being published to npm. While adding a license is good for metadata, it appears to conflict with the private setting and the PR's stated goal of unblocking publishing. If this package is intended for publication, consider removing "private": true. If it is intended to be private, this change is fine for consistency, but please be aware that it will not enable publishing.

KooshaPari pushed a commit that referenced this pull request Apr 24, 2026
Supersedes 0.31.0 bump. 0.35.0 is the first patched version covering
both the critical GHSA-v778-237x-gjrc and the high-severity
GHSA-hcg3-q754-cr77 advisories across all 4 go.mod manifests:

- backend/byteport/go.mod
- backend/nvms/go.mod
- backend/nvms/Demonstrator/go.mod
- backend/nvms/Provisioner/go.mod

Resolves Dependabot alerts:
  CRIT: #16, #20, #22, #24 (GHSA-v778-237x-gjrc)
  HIGH: #18, #21, #23, #25 (GHSA-hcg3-q754-cr77)

Verified via go build ./... in each module.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@KooshaPari KooshaPari merged commit b71a543 into main Apr 24, 2026
6 of 10 checks passed
KooshaPari added a commit that referenced this pull request Apr 24, 2026
…fixes) (#19)

* chore(deps): bump golang.org/x/crypto to 0.31.0 (4 CRIT CVE fixes)

Fixes 4 CRITICAL Dependabot alerts (< 0.31.0) across the 4 backend
Go modules. Transitively upgrades golang.org/x/sys to 0.28.0 and
golang.org/x/text to 0.21.0 via go mod tidy.

Modules updated:
- backend/byteport: v0.29.0 -> v0.31.0 (direct)
- backend/nvms: v0.28.0 -> v0.31.0 (indirect)
- backend/nvms/Demonstrator: v0.28.0 -> v0.31.0 (indirect)
- backend/nvms/Provisioner: v0.28.0 -> v0.31.0 (indirect)

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

* chore(deps): bump golang.org/x/crypto to 0.35.0 (4 CRIT + 4 HIGH CVEs)

Supersedes 0.31.0 bump. 0.35.0 is the first patched version covering
both the critical GHSA-v778-237x-gjrc and the high-severity
GHSA-hcg3-q754-cr77 advisories across all 4 go.mod manifests:

- backend/byteport/go.mod
- backend/nvms/go.mod
- backend/nvms/Demonstrator/go.mod
- backend/nvms/Provisioner/go.mod

Resolves Dependabot alerts:
  CRIT: #16, #20, #22, #24 (GHSA-v778-237x-gjrc)
  HIGH: #18, #21, #23, #25 (GHSA-hcg3-q754-cr77)

Verified via go build ./... in each module.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Forge <forge@phenotype.dev>
Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@KooshaPari KooshaPari deleted the chore/license-bootstrap branch April 25, 2026 17:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size:XS This PR changes 0-9 lines, ignoring generated files

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant