Terraform-AWS-modules/Terraform-AWS-eks transitions to non-free license

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
Nutrient - The #1 PDF SDK Library
Bad PDFs = bad UX. Slow load times, broken annotations, clunky UX frustrates users. Nutrient’s PDF SDKs gives seamless document experiences, fast rendering, annotations, real-time collaboration, 100+ features. Used by 10K+ devs, serving ~half a billion users worldwide. Explore the SDK for free.
nutrient.io
featured
  1. terraform-aws-eks

    Terraform module to create Amazon Elastic Kubernetes (EKS) resources 🇺🇦

    While I completely abhor the invasion, I can't help but feeling that the licence (and equally important) accompanying code change - https://github.com/terraform-aws-modules/terraform-aws-eks/b... - feels like a weaponisation of open source, and I think this is a dangerous thing to do. I do think that with change of "additional terms & conditions" to "additional information", it still feels an ethically dangerous place to be.

    I would not be happy if a library codifies political statements. What could be next? Conditions that state you agree to vote for/against Trump, that you disagree with homosexuality or are against transphobia. Note, I'm not accusing anyone of having those views neither am I commenting on them, they merely serve as an example of the dangers of discriminating.

    Dependencies and supply chain attacks are the big thing - and while dependency scanning and pinning are an important component, but I don't think it is possible to use open source libs at scale without a certain amount of trust. I work on a platform where there are hundreds of teams and thousands of microservices. I'm now trying to think how we can assess the risk of thousands of dependencies and millions of lines of code. Without trust, the only way that's possible is to fork all libs, prevent open source and generally kill off any agility and velocity. My problem is that this weaponisation is killing off trust. It's not about sitting on the fence or taking sides in a war. It's about what open source has achieved over the last 30 years and I think that's now more at risk than before…

  2. CodeRabbit

    CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.

    CodeRabbit logo
  3. terraform-aws-vpc

    Terraform module to create AWS VPC resources 🇺🇦

    This license change appears to affect not just the EKS module, but all the modules in the terraform-aws-modules organization.

    For example, here is the same change in their VPC module: https://github.com/terraform-aws-modules/terraform-aws-vpc/c...

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Terragrunt for Multi-Region/Multi-Account Deployments

    3 projects | dev.to | 7 May 2024
  • Despliega una Infraestructura de Red AWS Robusta con Terraform

    2 projects | dev.to | 22 Apr 2024
  • Un cóctel perfecto 🍹 ECS Fargate, Service Connect,Terraform y Github Actions.

    6 projects | dev.to | 12 Feb 2024
  • Private github monorepo to store official AWS terraform modules as github submodules

    3 projects | /r/Terraform | 8 Dec 2023
  • Cost optimisation on AWS: Navigating NAT Charges with Private ECS Tasks on Fargate

    2 projects | dev.to | 15 Nov 2023

Did you know that HCL is
the 21st most popular programming language
based on number of references?