Skip to main content

Check python packages from requirement.txt and report issues

Project description

https://badge.fury.io/py/liccheck.svg https://github.com/dhatim/python-license-check/workflows/build/badge.svg https://codecov.io/gh/dhatim/python-license-check/branch/master/graph/badge.svg

Python License Checker

Check python packages listed in a requirements.txt file and report license issues.

About

You can define a list of authorized licenses, unauthorized licenses and authorized packages.

The tool will check the requirements.txt file, check packages and their dependencies and return an error if some packages are not compliant against the given strategy.

The tool has 3 levels of checks to select from:

Standard (default):

A package is considered as compliant when at least one of its licenses is in the authorized license list, or if the package is in the list of authorized packages.

Cautious:

Same as Standard, but a package is not considered compliant when one or more of its licenses is in the unauthorized license list, even if it also has a license in the authorized license list. A package is still compliant if present in the authorized packages list.

Paranoid:

All licenses listed for a package must be in the authorised license list for the package to be considered compliant. A package is still compliant if present in the authorized packages list.

Assumption

The tool requires to be installed in the same python (virtual) environment as the packages. This, because it uses pkg_resources to access the packages resources and thus, their licenses information.

How to install

$ pip install liccheck

How to use

liccheck will read the requirements.txt and verify compliance of packages against a strategy defined in the ini file. If the requirements file is not specified on the command line, it will search for requirements.txt in the current folder. You have to setup an ini file with an authorized license list, unauthorized license list and authorized package list. The packages from your requirements.txt need to all be installed in the same python environment/virtualenv as liccheck. If the ini file is not specified on the command line, it will search for liccheck.ini in the current folder.

Here is an example of a liccheck.ini file:

# Authorized and unauthorized licenses in LOWER CASE
[Licenses]
authorized_licenses:
        bsd
        new bsd
        bsd license
        new bsd license
        simplified bsd
        apache
        apache 2.0
        apache software license
        gnu lgpl
        lgpl with exceptions or zpl
        isc license
        isc license (iscl)
        mit
        mit license
        python software foundation license
        zpl 2.1

unauthorized_licenses:
        gpl v3

[Authorized Packages]
# Python software license (see http://zesty.ca/python/uuid.README.txt)
uuid: 1.30

Note: versions of authorized packages can be defined using PEP-0440 version specifiers, such as >=1.3,<1.4. The implementation uses the nice package semantic_version.

For demo purpose, let’s say your requirements.txt file contains this:

Flask>=0.12.1
flask_restful
jsonify
psycopg2>=2.7.1
nose
scipy
scikit-learn
pandas
numpy
argparse
uuid
sqlbuilder
proboscis
pyyaml>=3.12

The execution will output this:

$ liccheck -s my_strategy.ini -r my_project/required.txt
gathering licenses...23 packages and dependencies.
check forbidden packages based on licenses...none
check authorized packages based on licenses...19 packages.
check authorized packages...4 packages.
check unknown licenses...none

If some dependencies are unknown or are not matching the strategy, the output will be something like:

$ liccheck -s my_strategy.ini -r my_project/requirements.txt
    gathering licenses...32 packages and dependencies.
    check forbidden packages based on licenses...1 forbidden packages :
        Unidecode (0.4.21) : GPL ['GNU General Public License v2 or later (GPLv2+)']
          dependency:
              Unidecode << python-slugify << yoyo-migrations

    check authorized packages based on licenses...24 packages.
    check authorized packages...6 packages.
    check unknown licenses...1 unknown packages :
        feedparser (5.2.1) : UNKNOWN []
          dependency:
              feedparser

Also supports pyproject.toml like:

[project]
dependencies = [
    "Flask>=0.12.1",
    "flask_restful",
    "jsonify",
    "psycopg2>=2.7.1",
    "nose",
    "scipy",
    "scikit-learn",
    "pandas",
    "numpy",
    "argparse",
    "uuid",
    "sqlbuilder",
    "proboscis",
    "pyyaml>=3.12",
]

[project.optional-dependencies]
test = [
    "pytest>=3.6.3",
]

[tool.liccheck]
authorized_licenses = [
    "bsd",
    "new bsd",
    "bsd license",
    "new bsd license",
    "simplified bsd",
    "apache",
    "apache 2.0",
    "apache software license",
    "gnu lgpl",
    "lgpl with exceptions or zpl",
    "isc license",
    "isc license (iscl)",
    "mit",
    "mit license",
    "python software foundation license",
    "zpl 2.1",
]
unauthorized_licenses = [
    "gpl v3",
]
# strategy_ini_file = "./liccheck.ini"
# level = "STANDARD"
# requirement_txt_file = "./requirements.txt" # ignored if dependencies or optional_dependencies are defined
# reporting_txt_file = "path/to/reporting.txt file" # by default is None
# no_deps = false
dependencies = true # to load [project.dependencies]
optional_dependencies = ["test"] # to load extras from [project.optional-dependencies]

[tool.liccheck.authorized_packages]
uuid = "1.30"

By default, exact matching is required between each package’s license and one of the license of the authorized or unauthorized list. You can also provide regular expressions to match licenses by using the as_regex boolean flag. For instance, to exclude GPL licenses, one could define the following configuration in pyproject.toml:

...

unauthorized_licenses = [
    '\bgpl'
]
as_regex = true

Using liccheck with pre-commit

Add this to your .pre-commit-config.yaml:

- repo: https://github.com/dhatim/python-license-check
  rev: master
  hooks:
  - id: liccheck
    language: system

Contributing

To run the tests:

$ tox -p all

Licensing

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

liccheck-0.8.1.tar.gz (16.0 kB view details)

Uploaded Source

Built Distribution

liccheck-0.8.1-py2.py3-none-any.whl (13.5 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file liccheck-0.8.1.tar.gz.

File metadata

  • Download URL: liccheck-0.8.1.tar.gz
  • Upload date:
  • Size: 16.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.9.16

File hashes

Hashes for liccheck-0.8.1.tar.gz
Algorithm Hash digest
SHA256 ea5fa05550c6d31b12ff5200f746c415b5f74e1d7c8666003e7252e303a1817f
MD5 ec8f4f16be860e55629dbeaf95beb164
BLAKE2b-256 b5e0f0760984925aaf044e78314aa1391e432d2aab92073fffac082a4bfd6367

See more details on using hashes here.

File details

Details for the file liccheck-0.8.1-py2.py3-none-any.whl.

File metadata

  • Download URL: liccheck-0.8.1-py2.py3-none-any.whl
  • Upload date:
  • Size: 13.5 kB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.9.16

File hashes

Hashes for liccheck-0.8.1-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 f83891ab4b603f6532faf29747101b2af51eaff04158ac4a2127c56bfb5aadce
MD5 846df9eecb798ca9866523f8b7f5ebd9
BLAKE2b-256 cbe0d78e85ac88839b64b2234f25a83783ccc650470fc7b8d7b5c85361d05cd9

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page