Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)
1# Contributing to Nixpkgs packages 2 3This document is for people wanting to contribute specifically to the package collection in Nixpkgs. 4See the [CONTRIBUTING.md](../CONTRIBUTING.md) document for more general information. 5 6## Overview 7 8- [`top-level`](./top-level): Entrypoints, package set aggregations 9 - [`impure.nix`](./top-level/impure.nix), [`default.nix`](./top-level/default.nix), [`config.nix`](./top-level/config.nix): Definitions for the evaluation entry point of `import <nixpkgs>` 10 - [`stage.nix`](./top-level/stage.nix), [`all-packages.nix`](./top-level/all-packages.nix), [`by-name-overlay.nix`](./top-level/by-name-overlay.nix), [`splice.nix`](./top-level/splice.nix): Definitions for the top-level attribute set made available through `import <nixpkgs> {…}` 11 - `*-packages.nix`, [`linux-kernels.nix`](./top-level/linux-kernels.nix), [`unixtools.nix`](./top-level/unixtools.nix): Aggregations of nested package sets defined in `development` 12 - [`aliases.nix`](./top-level/aliases.nix), [`python-aliases.nix`](./top-level/python-aliases.nix): Aliases for package definitions that have been renamed or removed 13 - `release*.nix`, [`make-tarball.nix`](./top-level/make-tarball.nix), [`packages-config.nix`](./top-level/packages-config.nix), [`metrics.nix`](./top-level/metrics.nix), [`nixpkgs-basic-release-checks.nix`](./top-level/nixpkgs-basic-release-checks.nix): Entry-points and utilities used by Hydra for continuous integration 14- [`development`](./development) 15 - `*-modules`, `*-packages`, `*-pkgs`: Package definitions for nested package sets 16 - All other directories loosely categorise top-level package definitions, see [category hierarchy][categories] 17- [`build-support`](./build-support): [Builders](https://nixos.org/manual/nixpkgs/stable/#part-builders) 18 - `fetch*`: [Fetchers](https://nixos.org/manual/nixpkgs/stable/#chap-pkgs-fetchers) 19- [`stdenv`](./stdenv): [Standard environment](https://nixos.org/manual/nixpkgs/stable/#part-stdenv) 20- [`pkgs-lib`](./pkgs-lib): Definitions for utilities that need packages but are not needed for packages 21- [`test`](./test): Tests not directly associated with any specific packages 22- [`by-name`](./by-name): Top-level packages organised by name ([docs](./by-name/README.md)) 23- All other directories loosely categorise top-level packages definitions, see [category hierarchy][categories] 24 25## Quick Start to Adding a Package 26 27We welcome new contributors of new packages to Nixpkgs, arguably the greatest software database known. 28However, each new package comes with a cost for the maintainers, Continuous Integration, caching servers and users downloading Nixpkgs. 29 30Before adding a new package, please consider the following questions: 31 32* Is the package ready for general use? 33 We don't want to include projects that are too immature or are going to be abandoned immediately. 34 In case of doubt, check with upstream. 35* Does the project have a clear license statement? 36 Remember that software is unfree by default (all rights reserved), and merely providing access to the source code does not imply its redistribution. 37 In case of doubt, ask upstream. 38* How realistic is it that it will be used by other people? 39 It's good that nixpkgs caters to various niches, but if it's a niche of 5 people it's probably too small. 40 A good estimate is checking upstream issues and pull requests, or other software repositories. 41 Library packages should have at least one dependent. 42* Is the software actively maintained upstream? 43 Especially packages that are security-critical, rely on fast-moving dependencies, or affect data integrity should see regular maintenance. 44* Are you willing to maintain the package? 45 You should care enough about the package to be willing to keep it up and running for at least one complete Nixpkgs' release life-cycle. 46 * In case you are not able to maintain the package you wrote, you can seek someone to fill that role, effectively adopting the package. 47 48If any of these questions' answer is no, then you should probably not add the package. 49 50Special care has to be taken with security-critical software components. 51Because entries in the Nix store are inert and do nothing by themselves, packages should be considered by their intended use, e.g. when used together with a NixOS module. 52 53* Any package that immediately would need to be tagged with `meta.knownVulnerabilities` is unlikely to be fit for nixpkgs. 54* Any package depending on a known-vulnerable library should be considered carefully. 55* Packages typically used with untrusted data should have a maintained and responsible upstream. 56 For example: 57 * Any package which does not follow upstream security policies should be considered vulnerable. 58 In particular, packages that vendor or fork web engines like Blink, Gecko or Webkit need to keep up with the frequent updates of those projects. 59 * Any security-critical fast-moving package such as Chrome or Firefox (or their forks) must have at least one active committer among the maintainers. 60 This ensures no critical fixes are delayed unnecessarily, endangering unsuspecting users. 61 * Services which typically work on web traffic are working on untrusted input. 62 * Data (such as archives or rich documents) commonly shared over untrusted channels (e.g. email) is untrusted. 63* Applications in the Unix authentication stack such as PAM/D-Bus modules or SUID binaries should be considered carefully, and should have a maintained and responsible upstream. 64* Encryption libraries should have a maintained and responsible upstream. 65* Security-critical components that are part of larger packages should be unvendored (=use the nixpkgs package as dependency, instead of vendored and pinned sources). 66* A "responsible upstream" includes various aspects, such as: 67 * channels to disclose security concerns 68 * being responsive to security concerns, providing fixes or workarounds 69 * transparent public disclosure of security issues when they are found or fixed 70 * These aspects are sometimes hard to verify, in which case an upstream that is not known to be irresponsible should be considered as responsible. 71* Source-available software should be built from source where possible. 72 Binary blobs risk supply chain attacks and vendored outdated libraries. 73 74This section describes a general framework of understanding and exceptions might apply. 75 76Luckily it's pretty easy to maintain your own package set with Nix, which can then be added to the [Nix User Repository](https://github.com/nix-community/nur) project. 77 78--- 79 80Now that this is out of the way. 81To add a package to Nixpkgs: 82 831. Checkout the Nixpkgs source tree: 84 85 ```ShellSession 86 $ git clone https://github.com/NixOS/nixpkgs 87 $ cd nixpkgs 88 ``` 89 902. Create a package directory `pkgs/by-name/so/some-package` where `some-package` is the package name and `so` is the lowercased 2-letter prefix of the package name: 91 92 ```ShellSession 93 $ mkdir -p pkgs/by-name/so/some-package 94 ``` 95 96 For more detailed information, see [here](./by-name/README.md). 97 983. Create a `package.nix` file in the package directory, containing a Nix expression — a piece of code that describes how to build the package. 99 In this case, it should be a _function_ that is called with the package dependencies as arguments, and returns a build of the package in the Nix store. 100 101 ```ShellSession 102 $ emacs pkgs/by-name/so/some-package/package.nix 103 $ git add pkgs/by-name/so/some-package/package.nix 104 ``` 105 106 If the package is written in a language other than C, you should use [the corresponding language framework](https://nixos.org/manual/nixpkgs/stable/#chap-language-support). 107 108 You can have a look at the existing Nix expressions under `pkgs/` to see how it’s done, some of which are also using the [category hierarchy](#category-hierarchy). 109 Here are some good ones: 110 111 - GNU Hello: [`pkgs/by-name/he/hello/package.nix`](./by-name/he/hello/package.nix). 112 Trivial package, which specifies some `meta` attributes which is good practice. 113 114 - GNU cpio: [`pkgs/by-name/cp/cpio/package.nix`](./by-name/cp/cpio/package.nix). 115 Also a simple package. 116 The generic builder in `stdenv` does everything for you. 117 It has no dependencies beyond `stdenv`. 118 119 - GNU Multiple Precision arithmetic library (GMP): [`pkgs/development/libraries/gmp`](development/libraries/gmp). 120 Also done by the generic builder, but has a dependency on `m4`. 121 122 - Pan, a GTK-based newsreader: [`pkgs/by-name/pa/pan/package.nix`](./by-name/pa/pan/package.nix). 123 Has an optional dependency on `gspell`, which is only built if `spellCheck` is `true`. 124 125 - Apache HTTPD: [`pkgs/servers/http/apache-httpd/2.4.nix`](servers/http/apache-httpd/2.4.nix). 126 A bunch of optional features, variable substitutions in the configure flags, a post-install hook, and miscellaneous hackery. 127 128 - buildMozillaMach: [`pkgs/applications/networking/browser/firefox/common.nix`](applications/networking/browsers/firefox/common.nix). 129 A reusable build function for Firefox, Thunderbird and Librewolf. 130 131 - JDiskReport, a Java utility: [`pkgs/by-name/jd/jdiskreport/package.nix`](./by-name/jd/jdiskreport/package.nix). 132 Nixpkgs doesn’t have a decent `stdenv` for Java yet so this is pretty ad-hoc. 133 134 - XML::Simple, a Perl module: [`pkgs/top-level/perl-packages.nix`](top-level/perl-packages.nix) (search for the `XMLSimple` attribute). 135 Most Perl modules are so simple to build that they are defined directly in `perl-packages.nix`; no need to make a separate file for them. 136 137 - Discord Game SDK: [`pkgs/by-name/di/discord-gamesdk/package.nix`](./by-name/di/discord-gamesdk/package.nix). 138 Shows how binary-only packages can be supported. 139 In particular, the `autoPatchelfHook` is used to set the RUNPATH and ELF interpreter of the executables so that the right libraries are found at runtime. 140 141 Some notes: 142 143 - Add yourself as the maintainer of the package. 144 145 - If this is your first time contributing (welcome!), [add yourself to the maintainers list](../maintainers/README.md#how-to-become-a-maintainer) in a separate commit. 146 147 - All other [`meta`](https://nixos.org/manual/nixpkgs/stable/#chap-meta) attributes are optional, but it’s still a good idea to provide at least the `description`, `homepage` and [`license`](https://nixos.org/manual/nixpkgs/stable/#sec-meta-license). 148 149 - The exact syntax and semantics of the Nix expression language, including the built-in functions, are [Nix language reference](https://nixos.org/manual/nix/stable/language/). 150 1515. To test whether the package builds, run the following command from the root of the nixpkgs source tree: 152 153 ```ShellSession 154 $ nix-build -A some-package 155 ``` 156 157 where `some-package` should be the package name. 158 You may want to add the flag `-K` to keep the temporary build directory in case something fails. 159 If the build succeeds, a symlink `./result` to the package in the Nix store is created. 160 1616. If you want to install the package into your profile (optional), do 162 163 ```ShellSession 164 $ nix-env -f . -iA libfoo 165 ``` 166 1677. Optionally commit the new package and open a pull request [to nixpkgs](https://github.com/NixOS/nixpkgs/pulls), or use [the Patches category](https://discourse.nixos.org/t/about-the-patches-category/477) on Discourse for sending a patch without a GitHub account. 168 169## Commit conventions 170 171- Make sure you read about the [commit conventions](../CONTRIBUTING.md#commit-conventions) common to Nixpkgs as a whole. 172 173- Format the commit messages in the following way: 174 175 ``` 176 (pkg-name): (from -> to | init at version | refactor | etc) 177 178 (Motivation for change. Link to release notes. Additional information.) 179 ``` 180 181 Examples: 182 183 * nginx: init at 2.0.1 184 * firefox: 54.0.1 -> 55.0 185 186 https://www.mozilla.org/en-US/firefox/55.0/releasenotes/ 187 188(using "→" instead of "->" is also accepted) 189 190## Category Hierarchy 191[categories]: #category-hierarchy 192 193Most top-level packages are organised in a loosely-categorised directory hierarchy in this directory. 194See the [overview](#overview) for which directories are part of this. 195 196This category hierarchy is partially deprecated and will be migrated away over time. 197The new `pkgs/by-name` directory ([docs](./by-name/README.md)) should be preferred instead. 198The category hierarchy may still be used for packages that should be imported using an alternate `callPackage`, such as `python3Packages.callPackage` or `libsForQt5.callPackage`. 199 200If that is the case for a new package, here are some rules for picking the right category. 201Many packages fall under several categories; what matters is the _primary_ purpose of a package. 202For example, the `libxml2` package builds both a library and some tools; but it’s a library foremost, so it goes under `pkgs/development/libraries`. 203 204<details> 205<summary>Categories</summary> 206 207**If it’s used to support _software development_:** 208 209- **If it’s a _library_ used by other packages:** 210 211 - `development/libraries` (e.g. `libxml2`) 212 213- **If it’s a _compiler_:** 214 215 - `development/compilers` (e.g. `gcc`) 216 217- **If it’s an _interpreter_:** 218 219 - `development/interpreters` (e.g. `guile`) 220 221- **If it’s a (set of) development _tool(s)_:** 222 223 - **If it’s a _parser generator_ (including lexers):** 224 225 - `development/tools/parsing` (e.g. `bison`, `flex`) 226 227 - **If it’s a _build manager_:** 228 229 - `development/tools/build-managers` (e.g. `gnumake`) 230 231 - **If it’s a _language server_:** 232 233 - `development/tools/language-servers` (e.g. `ccls` or `nil`) 234 235 - **Else:** 236 237 - `development/tools/misc` (e.g. `binutils`) 238 239- **Else:** 240 241 - `development/misc` 242 243**If it’s a (set of) _tool(s)_:** 244 245(A tool is a relatively small program, especially one intended to be used non-interactively.) 246 247- **If it’s for _networking_:** 248 249 - `tools/networking` (e.g. `wget`) 250 251- **If it’s for _text processing_:** 252 253 - `tools/text` (e.g. `diffutils`) 254 255- **If it’s a _system utility_, i.e., something related or essential to the operation of a system:** 256 257 - `tools/system` (e.g. `cron`) 258 259- **If it’s an _archiver_ (which may include a compression function):** 260 261 - `tools/archivers` (e.g. `zip`, `tar`) 262 263- **If it’s a _compression_ program:** 264 265 - `tools/compression` (e.g. `gzip`, `bzip2`) 266 267- **If it’s a _security_-related program:** 268 269 - `tools/security` (e.g. `nmap`, `gnupg`) 270 271- **Else:** 272 273 - `tools/misc` 274 275**If it’s a _shell_:** 276 277- `shells` (e.g. `bash`) 278 279**If it’s a _server_:** 280 281- **If it’s a web server:** 282 283 - `servers/http` (e.g. `apache-httpd`) 284 285- **If it’s an implementation of the X Windowing System:** 286 287 - `servers/x11` (e.g. `xorg` — this includes the client libraries and programs) 288 289- **Else:** 290 291 - `servers/misc` 292 293**If it’s a _desktop environment_:** 294 295- `desktops` (e.g. `kde`, `gnome`, `enlightenment`) 296 297**If it’s a _window manager_:** 298 299- `applications/window-managers` (e.g. `awesome`, `stumpwm`) 300 301**If it’s an _application_:** 302 303A (typically large) program with a distinct user interface, primarily used interactively. 304 305- **If it’s a _version management system_:** 306 307 - `applications/version-management` (e.g. `subversion`) 308 309- **If it’s a _terminal emulator_:** 310 311 - `applications/terminal-emulators` (e.g. `alacritty` or `rxvt` or `termite`) 312 313- **If it’s a _file manager_:** 314 315 - `applications/file-managers` (e.g. `mc` or `ranger` or `pcmanfm`) 316 317- **If it’s for _video playback / editing_:** 318 319 - `applications/video` (e.g. `vlc`) 320 321- **If it’s for _graphics viewing / editing_:** 322 323 - `applications/graphics` (e.g. `gimp`) 324 325- **If it’s for _networking_:** 326 327 - **If it’s a _mailreader_:** 328 329 - `applications/networking/mailreaders` (e.g. `thunderbird`) 330 331 - **If it’s a _newsreader_:** 332 333 - `applications/networking/newsreaders` (e.g. `pan`) 334 335 - **If it’s a _web browser_:** 336 337 - `applications/networking/browsers` (e.g. `firefox`) 338 339 - **Else:** 340 341 - `applications/networking/misc` 342 343- **Else:** 344 345 - `applications/misc` 346 347**If it’s _data_ (i.e., does not have a straight-forward executable semantics):** 348 349- **If it’s a _font_:** 350 351 - `data/fonts` 352 353- **If it’s an _icon theme_:** 354 355 - `data/icons` 356 357- **If it’s related to _SGML/XML processing_:** 358 359 - **If it’s an _XML DTD_:** 360 361 - `data/sgml+xml/schemas/xml-dtd` (e.g. `docbook`) 362 363 - **If it’s an _XSLT stylesheet_:** 364 365 (Okay, these are executable...) 366 367 - `data/sgml+xml/stylesheets/xslt` (e.g. `docbook-xsl`) 368 369- **If it’s a _theme_ for a _desktop environment_, a _window manager_ or a _display manager_:** 370 371 - `data/themes` 372 373**If it’s a _game_:** 374 375- `games` 376 377**Else:** 378 379- `misc` 380 381</details> 382 383# Conventions 384 385The key words _must_, _must not_, _required_, _shall_, _shall not_, _should_, _should not_, _recommended_, _may_, and _optional_ in this section are to be interpreted as described in [RFC 2119](https://tools.ietf.org/html/rfc2119). 386Only _emphasized_ words are to be interpreted in this way. 387 388## Package naming 389 390In Nixpkgs, there are generally three different names associated with a package: 391 392- The `pname` attribute of the derivation. 393 This is what most users see, in particular when using `nix-env`. 394 395- The attribute name used for the package in the [`pkgs/by-name` structure](./by-name/README.md) or in [`all-packages.nix`](./top-level/all-packages.nix), and when passing it as a dependency in recipes. 396 397- The filename for (the directory containing) the Nix expression. 398 399Most of the time, these are the same. 400For instance, the package `e2fsprogs` has a `pname` attribute `"e2fsprogs"`, is bound to the attribute name `e2fsprogs` in `all-packages.nix`, and the Nix expression is in `pkgs/os-specific/linux/e2fsprogs/default.nix`. 401 402Follow these guidelines: 403 404- For the `pname` attribute: 405 406 - It _should_ be identical to the upstream package name. 407 408 - It _must not_ contain uppercase letters. 409 410 Example: Use `"mplayer"` instead of `"MPlayer"` 411 412- For the package attribute name: 413 414 - It _must_ be a valid identifier in Nix. 415 416 - If the `pname` starts with a digit, the attribute name _should_ be prefixed with an underscore. 417 Otherwise the attribute name _should not_ be prefixed with an underline. 418 419 Example: The corresponding attribute name for `0ad` should be `_0ad`. 420 421 - New attribute names _should_ be the same as the value in `pname`. 422 423 Hyphenated names _should not_ be converted to [snake case](https://en.wikipedia.org/wiki/Snake_case) or [camel case](https://en.wikipedia.org/wiki/Camel_case). 424 This was done historically, but is not necessary any more. 425 [The Nix language allows dashes in identifiers since 2012](https://github.com/NixOS/nix/commit/95c74eae269b2b9e4bc514581b5caa1d80b54acc). 426 427 - If there are multiple versions of a package, this _should_ be reflected in the attribute names in `all-packages.nix`. 428 429 Example: `json-c_0_9` and `json-c_0_11` 430 431 If there is an obvious “default” version, make an extra attribute. 432 433 Example: `json-c = json-c_0_9;` 434 435 See also [versioning][versioning]. 436 437## Versioning 438[versioning]: #versioning 439 440These are the guidelines the `version` attribute of a package: 441 442- It _must_ start with a digit. 443 This is required for backwards-compatibility with [how `nix-env` parses derivation names](https://nix.dev/manual/nix/latest/command-ref/nix-env#selectors). 444 445 Example: `"0.3.1rc2"` or `"0-unstable-1970-01-01"` 446 447- If a package is a commit from a repository without a version assigned, then the `version` attribute _should_ be the latest upstream version preceding that commit, followed by `-unstable-` and the date of the (fetched) commit. 448 The date _must_ be in `"YYYY-MM-DD"` format. 449 450 Example: Given a project had its latest releases `2.2` in November 2021 and `3.0` in January 2022, a commit authored on March 15, 2022 for an upcoming bugfix release `2.2.1` would have `version = "2.2-unstable-2022-03-15"`. 451 452- If a project has no suitable preceding releases - e.g., no versions at all, or an incompatible versioning or tagging scheme - then the latest upstream version in the above schema should be `0`. 453 454 Example: Given a project that has no tags or released versions at all, or applies versionless tags like `latest` or `YYYY-MM-DD-Build`, a commit authored on March 15, 2022 would have `version = "0-unstable-2022-03-15"`. 455 456Because every version of a package in Nixpkgs creates a potential maintenance burden, old versions of a package should not be kept unless there is a good reason to do so. 457For instance, Nixpkgs contains several versions of GCC because other packages don’t build with the latest version of GCC. 458Other examples are having both the latest stable and latest pre-release version of a package, or to keep several major releases of an application that differ significantly in functionality. 459 460If there is only one version of a package, its Nix expression should be named (e.g) `pkgs/by-name/xy/xyz/package.nix`. 461If there are multiple versions, this should be reflected in the attribute name. 462If you wish to share code between the Nix expressions of each version, you cannot rely upon `pkgs/by-name`'s automatic attribute creation, and must create the attributes yourself in `all-packages.nix`. 463See also [`pkgs/by-name/README.md`'s section on this topic](https://github.com/NixOS/nixpkgs/blob/master/pkgs/by-name/README.md#recommendation-for-new-packages-with-multiple-versions). 464 465## Meta attributes 466 467The `meta` attribute set should always be placed last in the derivativion and any other "meta"-like attribute sets like `passthru` should be written before it. 468 469* `meta.description` must: 470 * Be short, just one sentence. 471 * Be capitalized. 472 * Not start with the definite or an indefinite article. 473 * Not start with the package name. 474 * More generally, it should not refer to the package name. 475 * Not end with a period (or any punctuation for that matter). 476 * Provide factual information. 477 * Avoid subjective language. 478* `meta.license` must be set and match the upstream license. 479 * If there is no upstream license, `meta.license` should default to `lib.licenses.unfree`. 480 * If in doubt, try to contact the upstream developers for clarification. 481* `meta.mainProgram` must be set to the name of the executable which facilitates the primary function or purpose of the package, if there is such an executable in `$bin/bin/` (or `$out/bin/`, if there is no `"bin"` output). 482 * Packages that only have a single executable in the applicable directory above should set `meta.mainProgram`. 483 For example, the package `ripgrep` only has a single executable `rg` under `$out/bin/`, so `ripgrep.meta.mainProgram` is set to `"rg"`. 484 * Packages like `polkit_gnome` that have no executables in the applicable directory should not set `meta.mainProgram`. 485 * Packages like `e2fsprogs` that have multiple executables, none of which can be considered the main program, should not set `meta.mainProgram`. 486 * Packages which are not primarily used for a single executable do not need to set `meta.mainProgram`. 487 * Always prefer using a hardcoded string (don't use `pname`, for example). 488 * When in doubt, ask for reviewer input. 489* `meta.maintainers` must be set for new packages. 490 491See the Nixpkgs manual for more details on [standard meta-attributes](https://nixos.org/nixpkgs/manual/#sec-standard-meta-attributes). 492 493## Import From Derivation 494 495[Import From Derivation](https://nixos.org/manual/nix/unstable/language/import-from-derivation) (IFD) is disallowed in Nixpkgs for performance reasons: 496[Hydra](https://github.com/NixOS/hydra) evaluates the entire package set, and sequential builds during evaluation would increase evaluation times to become impractical. 497 498Import From Derivation can be worked around in some cases by committing generated intermediate files to version control and reading those instead. 499 500## Sources 501 502Always fetch source files using [Nixpkgs fetchers](https://nixos.org/manual/nixpkgs/unstable/#chap-pkgs-fetchers). 503Use reproducible sources with a high degree of availability. 504Prefer protocols that support proxies. 505 506A list of schemes for `mirror://` URLs can be found in [`pkgs/build-support/fetchurl/mirrors.nix`](build-support/fetchurl/mirrors.nix), and is supported by [`fetchurl`](https://nixos.org/manual/nixpkgs/unstable/#fetchurl). 507Other fetchers which end up relying on `fetchurl` may also support mirroring. 508 509The preferred source hash type is `sha256`. 510 511Examples going from bad to best practices: 512 513- Bad: Uses `git://` which won't be proxied. 514 515 ```nix 516 { 517 src = fetchgit { 518 url = "git://github.com/NixOS/nix.git"; 519 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 520 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 521 }; 522 } 523 ``` 524 525- Better: This is ok, but an archive fetch will still be faster. 526 527 ```nix 528 { 529 src = fetchgit { 530 url = "https://github.com/NixOS/nix.git"; 531 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 532 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 533 }; 534 } 535 ``` 536 537- Best: Fetches a snapshot archive for the given revision. 538 539 ```nix 540 { 541 src = fetchFromGitHub { 542 owner = "NixOS"; 543 repo = "nix"; 544 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 545 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 546 }; 547 } 548 ``` 549 550> [!Note] 551> When fetching from GitHub, always reference revisions by their full commit hash. 552> GitHub shares commit hashes among all forks and returns `404 Not Found` when a short commit hash is ambiguous. 553> It already happened in Nixpkgs for short, 6-character commit hashes. 554> 555> Pushing large amounts of auto generated commits into forks is a practical vector for a denial-of-service attack, and was already [demonstrated against GitHub Actions Beta](https://blog.teddykatz.com/2019/11/12/github-actions-dos.html). 556 557## Patches 558 559Sometimes, changes are needed to the source to allow building a derivation in nixpkgs, or to get earlier access to an upstream fix or improvement. 560When using the `patches` parameter to `mkDerivation`, make sure the patch name clearly describes the reason for the patch, or add a comment. 561 562> [!Note] 563> The version of the package does not need to be changed just because a patch is applied. 564> Declarative package installations don't depend on the version, while imperative `nix-env` installations can use [`upgrade --eq/leq/--always`](https://nix.dev/manual/nix/2.25/command-ref/nix-env/upgrade#flags). 565> 566> See [Versioning](#versioning) for details on package versioning. 567 568The following describes two ways to include the patch. 569Regardless of how the patch is included, you _must_ ensure its purpose is clear and obvious. 570This enables other maintainers to more easily determine when old patches are no longer required. 571Typically, you can improve clarity with carefully considered filenames, attribute names, and/or comments; these should explain the patch's _intention_. 572Additionally, it may sometimes be helpful to clarify _how_ it resolves the issue. 573For example: _"fix gcc14 build by adding missing include"_. 574 575### Fetching patches 576 577In the interest of keeping our maintenance burden and the size of Nixpkgs to a minimum, patches already merged upstream or published elsewhere _should_ be retrieved using `fetchpatch2`: 578 579```nix 580{ 581 patches = [ 582 (fetchpatch2 { 583 name = "make-no-atomics-a-soft-failure.patch"; 584 url = "https://github.com/boostorg/math/commit/7d482f6ebc356e6ec455ccb5f51a23971bf6ce5b.patch?full_index=1"; 585 hash = "sha256-9Goa0NTUdSOs1Vm+FnkoSFhw0o8ZLNOw6cLUqCVnF5Y="; 586 }) 587 ]; 588} 589``` 590 591> [!Warning] 592> If the patch file contains short commit hashes, use `fetchpatch` instead of `fetchpatch2` ([tracking issue](https://github.com/NixOS/nixpkgs/issues/257446)). 593> This is the case if the patch contains a line similar to `index 0c97fcc35..f533e464a 100644`. 594> Depending on the patch source it is possible to expand the commit hash, in which case using `fetchpatch2` is acceptable (e.g. GitHub supports appending `?full_index=1` to the URL, as seen above). 595 596If a patch is available online but does not cleanly apply, it can be modified in some fixed ways by using additional optional arguments for `fetchpatch2`. 597Check [the `fetchpatch` reference](https://nixos.org/manual/nixpkgs/unstable/#fetchpatch) for details. 598 599When adding patches in this manner you should be reasonably sure that the used URL is stable. 600Patches referencing open pull requests will change when the PR is updated and code forges (such as GitHub) usually garbage collect commits that are no longer reachable due to rebases/amends. 601 602### Vendoring patches 603 604In the following cases, a `.patch` file _should_ be added to Nixpkgs repository, instead of retrieved: 605 606- solves problems unique to packaging in Nixpkgs 607- cannot be fetched easily 608- has a high chance to disappear in the future due to unstable or unreliable URLs 609 610The latter avoids link rot when the upstream abandons, squashes or rebases their change, in which case the commit may get garbage-collected. 611 612```nix 613{ patches = [ ./0001-add-missing-include.patch ]; } 614``` 615 616If you do need to do create this sort of patch file, one way to do so is with git: 617 6181. Move to the root directory of the source code you're patching. 619 620 ```ShellSession 621 $ cd the/program/source 622 ``` 623 6242. If a git repository is not already present, create one and stage all of the source files. 625 626 ```ShellSession 627 $ git init 628 $ git add -A 629 ``` 630 6313. Edit some files to make whatever changes need to be included in the patch. 632 6334. Use git to create a diff, and pipe the output to a patch file: 634 635 ```ShellSession 636 $ git diff -a > nixpkgs/pkgs/the/package/0001-changes.patch 637 ``` 638 639## Deprecating/removing packages 640 641There is currently no policy when to remove a package. 642 643Before removing a package, one should try to find a new maintainer or fix smaller issues first. 644 645### Steps to remove a package from Nixpkgs 646 647We use jbidwatcher as an example for a discontinued project here. 648 6491. Have Nixpkgs checked out locally and up to date. 6501. Create a new branch for your change, e.g. `git checkout -b jbidwatcher` 6511. Remove the actual package including its directory, e.g. `git rm -rf pkgs/applications/misc/jbidwatcher` 6521. Remove the package from the list of all packages (`pkgs/top-level/all-packages.nix`). 6531. Add an alias for the package name in `pkgs/top-level/aliases.nix` (There is also `pkgs/applications/editors/vim/plugins/aliases.nix`. 654 Package sets typically do not have aliases, so we can't add them there.) 655 656 For example in this case: 657 658 ```nix 659 { 660 jbidwatcher = throw "jbidwatcher was discontinued in march 2021"; # added 2021-03-15 661 } 662 ``` 663 664 The throw message should explain in short why the package was removed for users that still have it installed. 665 6661. Test if the changes introduced any issues by running `nix-env -qaP -f . --show-trace`. 667 It should show the list of packages without errors. 6681. Commit the changes. 669 Explain again why the package was removed. 670 If it was declared discontinued upstream, add a link to the source. 671 672 ```ShellSession 673 $ git add pkgs/applications/misc/jbidwatcher/default.nix pkgs/top-level/all-packages.nix pkgs/top-level/aliases.nix 674 $ git commit 675 ``` 676 677 Example commit message: 678 679 ``` 680 jbidwatcher: remove 681 682 project was discontinued in march 2021. the program does not work anymore because ebay changed the login. 683 684 https://web.archive.org/web/20210315205723/http://www.jbidwatcher.com/ 685 ``` 686 6871. Push changes to your GitHub fork with `git push` 6881. Create a pull request against Nixpkgs. 689 Mention the package maintainer. 690 691This is how the pull request looks like in this case: [https://github.com/NixOS/nixpkgs/pull/116470](https://github.com/NixOS/nixpkgs/pull/116470) 692 693## Package tests 694 695To run the main types of tests locally: 696 697- Run package-internal tests with `nix-build --attr pkgs.PACKAGE.passthru.tests` 698- Run [NixOS tests](https://nixos.org/manual/nixos/unstable/#sec-nixos-tests) with `nix-build --attr nixosTests.NAME`, where `NAME` is the name of the test listed in `nixos/tests/all-tests.nix` 699- Run [global package tests](https://nixos.org/manual/nixpkgs/unstable/#sec-package-tests) with `nix-build --attr tests.PACKAGE`, where `PACKAGE` is the name of the test listed in `pkgs/test/default.nix` 700- See `lib/tests/NAME.nix` for instructions on running specific library tests 701 702Tests are important to ensure quality and make reviews and automatic updates easy. 703 704The following types of tests exists: 705 706* [NixOS **module tests**](https://nixos.org/manual/nixos/stable/#sec-nixos-tests), which spawn one or more NixOS VMs. 707 They exercise both NixOS modules and the packaged programs used within them. 708 For example, a NixOS module test can start a web server VM running the `nginx` module, and a client VM running `curl` or a graphical `firefox`, and test that they can talk to each other and display the correct content. 709* Nix **package tests** are a lightweight alternative to NixOS module tests. 710 They should be used to create simple integration tests for packages, but cannot test NixOS services, and some programs with graphical user interfaces may also be difficult to test with them. 711* The **`checkPhase` of a package**, which should execute the unit tests that are included in the source code of a package. 712 713Here in the nixpkgs manual we describe mostly _package tests_; for _module tests_ head over to the corresponding [section in the NixOS manual](https://nixos.org/manual/nixos/stable/#sec-nixos-tests). 714 715### Writing inline package tests 716 717For very simple tests, they can be written inline: 718 719```nix 720# ... , 721{ yq-go }: 722 723buildGoModule rec { 724 # … 725 726 passthru.tests = { 727 simple = runCommand "${pname}-test" { } '' 728 echo "test: 1" | ${yq-go}/bin/yq eval -j > $out 729 [ "$(cat $out | tr -d $'\n ')" = '{"test":1}' ] 730 ''; 731 }; 732} 733``` 734 735Any derivation can be specified as a test, even if it's in a different file. 736Such a derivation that implements a test can depend on the package under test, even in the presence of `overrideAttrs`. 737 738In the following example, `(my-package.overrideAttrs f).passthru.tests` will work as expected, as long as the definition of `tests` does not rely on the original `my-package` or overrides all occurrences of `my-package`: 739 740```nix 741# my-package/default.nix 742{ stdenv, callPackage }: 743stdenv.mkDerivation (finalAttrs: { 744 # ... 745 passthru.tests.example = callPackage ./example.nix { my-package = finalAttrs.finalPackage; }; 746}) 747``` 748 749```nix 750# my-package/example.nix 751{ 752 runCommand, 753 lib, 754 my-package, 755 ... 756}: 757runCommand "my-package-test" 758 { 759 nativeBuildInputs = [ my-package ]; 760 src = lib.sources.sourcesByRegex ./. [ 761 ".*.in" 762 ".*.expected" 763 ]; 764 } 765 '' 766 my-package --help 767 my-package <example.in >example.actual 768 diff -U3 --color=auto example.expected example.actual 769 mkdir $out 770 '' 771``` 772 773### Writing larger package tests 774[larger-package-tests]: #writing-larger-package-tests 775 776This is an example using the `phoronix-test-suite` package with the current best practices. 777 778Add the tests in `passthru.tests` to the package definition like this: 779 780```nix 781{ 782 stdenv, 783 lib, 784 fetchurl, 785 callPackage, 786}: 787 788stdenv.mkDerivation { 789 # … 790 791 passthru.tests = { 792 simple-execution = callPackage ./tests.nix { }; 793 }; 794 795 meta = { 796 # … 797 }; 798} 799``` 800 801Create `tests.nix` in the package directory: 802 803```nix 804{ runCommand, phoronix-test-suite }: 805 806let 807 inherit (phoronix-test-suite) pname version; 808 809in 810runCommand "${pname}-tests" { meta.timeout = 60; } '' 811 # automatic initial setup to prevent interactive questions 812 ${phoronix-test-suite}/bin/phoronix-test-suite enterprise-setup >/dev/null 813 # get version of installed program and compare with package version 814 if [[ `${phoronix-test-suite}/bin/phoronix-test-suite version` != *"${version}"* ]]; then 815 echo "Error: program version does not match package version" 816 exit 1 817 fi 818 # run dummy command 819 ${phoronix-test-suite}/bin/phoronix-test-suite dummy_module.dummy-command >/dev/null 820 # needed for Nix to register the command as successful 821 touch $out 822'' 823``` 824 825### Running package tests 826 827You can run these tests with: 828 829```ShellSession 830$ cd path/to/nixpkgs 831$ nix-build -A phoronix-test-suite.tests 832``` 833 834### Examples of package tests 835 836Here are examples of package tests: 837 838- [Jasmin compile test](by-name/ja/jasmin/test-assemble-hello-world/default.nix) 839- [Lobster compile test](development/compilers/lobster/test-can-run-hello-world.nix) 840- [Spacy annotation test](development/python-modules/spacy/annotation-test/default.nix) 841- [Libtorch test](development/libraries/science/math/libtorch/test/default.nix) 842- [Multiple tests for nanopb](./by-name/na/nanopb/package.nix) 843 844### Linking NixOS module tests to a package 845 846Like [package tests][larger-package-tests] as shown above, [NixOS module tests](https://nixos.org/manual/nixos/stable/#sec-nixos-tests) can also be linked to a package, so that the tests can be easily run when changing the related package. 847 848For example, assuming we're packaging `nginx`, we can link its module test via `passthru.tests`: 849 850```nix 851{ 852 stdenv, 853 lib, 854 nixosTests, 855}: 856 857stdenv.mkDerivation { 858 # ... 859 860 passthru.tests = { 861 nginx = nixosTests.nginx; 862 }; 863 864 # ... 865} 866``` 867 868## Automatic package updates 869[automatic-package-updates]: #automatic-package-updates 870 871Nixpkgs periodically tries to update all packages that have a `passthru.updateScript` attribute. 872 873> [!Note] 874> A common pattern is to use the [`nix-update-script`](../pkgs/by-name/ni/nix-update/nix-update-script.nix) attribute provided in Nixpkgs, which runs [`nix-update`](https://github.com/Mic92/nix-update): 875> 876> ```nix 877> { stdenv, nix-update-script }: 878> stdenv.mkDerivation { 879> # ... 880> passthru.updateScript = nix-update-script { }; 881> } 882> ``` 883> 884> For simple packages, this is often enough, and will ensure that the package is updated automatically by [`nixpkgs-update`](https://github.com/nix-community/nixpkgs-update) when a new version is released. 885> The [update bot](https://nix-community.org/update-bot) runs periodically to attempt to automatically update packages, and will run `passthru.updateScript` if set. 886> While not strictly necessary if the project is listed on [Repology](https://repology.org), using `nix-update-script` allows the package to update via many more sources (e.g. GitHub releases). 887 888The `passthru.updateScript` attribute can contain one of the following: 889 890- an executable file, either on the file system: 891 892 ```nix 893 { stdenv }: 894 stdenv.mkDerivation { 895 # ... 896 passthru.updateScript = ./update.sh; 897 } 898 ``` 899 900 or inside the expression itself: 901 902 ```nix 903 { stdenv, writeScript }: 904 stdenv.mkDerivation { 905 # ... 906 passthru.updateScript = writeScript "update-zoom-us" '' 907 #!/usr/bin/env nix-shell 908 #!nix-shell -i bash -p curl pcre2 common-updater-scripts 909 910 set -eu -o pipefail 911 912 version="$(curl -sI https://zoom.us/client/latest/zoom_x86_64.tar.xz | grep -Fi 'Location:' | pcre2grep -o1 '/(([0-9]\.?)+)/')" 913 update-source-version zoom-us "$version" 914 ''; 915 } 916 ``` 917 918- a list, a script file followed by arguments to be passed to it: 919 920 ```nix 921 { stdenv }: 922 stdenv.mkDerivation { 923 # ... 924 passthru.updateScript = [ 925 ../../update.sh 926 pname 927 "--requested-release=unstable" 928 ]; 929 } 930 ``` 931 932- an attribute set containing: 933 - `command` 934 935 A string or list in the [format expected by `passthru.updateScript`][automatic-package-updates] 936 937 - `attrPath` (optional) 938 939 A string containing the canonical attribute path for the package. 940 941 If present, it will be passed to the update script instead of the attribute path on which the package was discovered during Nixpkgs traversal. 942 943 - `supportedFeatures` (optional) 944 945 A list of the [extra features the script supports][supported-features]. 946 947 ```nix 948 { stdenv }: 949 stdenv.mkDerivation rec { 950 pname = "my-package"; 951 # ... 952 passthru.updateScript = { 953 command = [ 954 ../../update.sh 955 pname 956 ]; 957 attrPath = pname; 958 supportedFeatures = [ 959 # ... 960 ]; 961 }; 962 } 963 ``` 964 965### How are update scripts executed? 966 967Update scripts are to be invoked by the [automatic package update script](../maintainers/scripts/update.nix). 968You can run `nix-shell maintainers/scripts/update.nix` in the root of Nixpkgs repository for information on how to use it. 969`update.nix` offers several modes for selecting packages to update, and it will execute update scripts for all matched packages that have an `updateScript` attribute. 970 971Update scripts will be run inside the [Nixpkgs development shell](../shell.nix), providing access to some useful tools for CI. 972Furthermore each update script will be passed the following environment variables: 973 974- [`UPDATE_NIX_NAME`] – content of the `name` attribute of the updated package 975- [`UPDATE_NIX_PNAME`] – content of the `pname` attribute of the updated package 976- [`UPDATE_NIX_OLD_VERSION`] – content of the `version` attribute of the updated package 977- [`UPDATE_NIX_ATTR_PATH`] – attribute path the `update.nix` discovered the package on (or the package's specified `attrPath` when available). 978 Example: `pantheon.elementary-terminal` 979 980> [!Note] 981> An update script will be usually run from the root of the Nixpkgs repository, but you should not rely on that. 982> Also note that `update.nix` executes update scripts in parallel by default, so you should avoid running `git commit` or any other commands that cannot handle that. 983 984While update scripts should not create commits themselves, `update.nix` supports automatically creating commits when running it with `--argstr commit true`. 985If you need to customize commit message, you can have the update script implement the `commit` feature. 986 987### Supported features 988[update-script-supported-features]: #supported-features 989 990- `commit` 991 992 This feature allows update scripts to *ask* `update.nix` to create Git commits. 993 994 When support of this feature is declared, whenever the update script exits with `0` return status, it is expected to print a JSON list containing an object described below for each updated attribute to standard output. 995 Example: 996 997 ```json 998 [ 999 { 1000 "attrPath": "volume_key", 1001 "oldVersion": "0.3.11", 1002 "newVersion": "0.3.12", 1003 "files": [ 1004 "/path/to/nixpkgs/pkgs/development/libraries/volume-key/default.nix" 1005 ] 1006 } 1007 ] 1008 ``` 1009 ::: 1010 1011 When `update.nix` is run with `--argstr commit true`, it will create a separate commit for each of the objects. 1012 An empty list can be returned when the script did not update any files; for example, when the package is already at the latest version. 1013 1014 The commit object contains the following values: 1015 1016 - `attrPath` – a string containing the attribute path 1017 - `oldVersion` – a string containing the old version 1018 - `newVersion` – a string containing the new version 1019 - `files` – a non-empty list of file paths (as strings) to add to the commit 1020 - `commitBody` (optional) – a string with extra content to be appended to the default commit message (useful for adding changelog links) 1021 - `commitMessage` (optional) – a string to use instead of the default commit message 1022 1023 If the returned list contains exactly one object (e.g. `[{}]`), all values are optional and will be determined automatically. 1024 1025## Reviewing contributions 1026 1027### Package updates 1028 1029A package update is the most trivial and common type of pull request. 1030These pull requests mainly consist of updating the version part of the package name and the source hash. 1031 1032It can happen that non-trivial updates include patches or more complex changes. 1033 1034Reviewing process: 1035 1036- Ensure that the package versioning [fits the guidelines](#versioning). 1037- Ensure that the commit text [fits the guidelines](../CONTRIBUTING.md#commit-conventions). 1038- Ensure that the package maintainers are notified. 1039 - The continuous integration system will make GitHub notify users based on the submitted changes, but it can happen that it misses some of the package maintainers. 1040- Ensure that the meta field information [fits the guidelines](#meta-attributes) and is correct: 1041 - License can change with version updates, so it should be checked to match the upstream license. 1042 - If the package has no maintainer, a maintainer must be set. 1043 This can be the update submitter or a community member that accepts to take maintainership of the package. 1044- Verify any change of upstream. 1045 - If switching from e.g. PyPi to GitHub, verify that the repo is the official one. 1046 - If switching to a fork, check with external sources like other package repositories for community consensus. 1047- Ensure any special packaging choices and required context are documented in i.e. the name of a patch or in a comment. 1048 - If a special version of a package is pinned, document why, so others know if/when it can be unpinned. 1049 - If any (especially opinionated) patch or `substituteInPlace` is applied, document why. 1050 - If any non-default build flags are set, document why. 1051 - If checks are partially or fully disabled, document why. 1052- Ensure that the code contains no typos. 1053- Build the package locally. 1054 - Pull requests are often targeted to the master or staging branch, and building the pull request locally when it is submitted can trigger many source builds. 1055 - It is possible to rebase the changes on nixos-unstable or nixpkgs-unstable for easier review by running the following commands from a nixpkgs clone. 1056 1057 ```ShellSession 1058 $ git fetch origin nixos-unstable 1059 $ git fetch origin pull/PRNUMBER/head 1060 $ git rebase --onto nixos-unstable BASEBRANCH FETCH_HEAD 1061 ``` 1062 1063 - The first command fetches the nixos-unstable branch. 1064 - The second command fetches the pull request changes, `PRNUMBER` is the number at the end of the pull request title and `BASEBRANCH` the base branch of the pull request. 1065 - The third command rebases the pull request changes to the nixos-unstable branch. 1066 - The [nixpkgs-review](https://github.com/Mic92/nixpkgs-review) tool can be used to review a pull request content in a single command. 1067 `PRNUMBER` should be replaced by the number at the end of the pull request title. 1068 You can also provide the full github pull request url. 1069 1070 ```ShellSession 1071 $ nix-shell -p nixpkgs-review --run "nixpkgs-review pr PRNUMBER" 1072 ``` 1073- Run every binary. 1074 1075Sample template for a package update review is provided below. 1076 1077```markdown 1078##### Reviewed points 1079 1080- [ ] package name fits guidelines 1081- [ ] package version fits guidelines 1082- [ ] package builds on ARCHITECTURE 1083- [ ] executables tested on ARCHITECTURE 1084- [ ] any change of upstream are verified 1085- [ ] the motives for any special packaging choices are documented 1086- [ ] all depending packages build 1087- [ ] patches have a comment describing either the upstream URL or a reason why the patch wasn't upstreamed 1088- [ ] patches that are remotely available are fetched rather than vendored 1089 1090##### Possible improvements 1091 1092##### Comments 1093``` 1094 1095### New packages 1096 1097New packages are a common type of pull requests. 1098These pull requests consists in adding a new nix-expression for a package. 1099 1100Review process: 1101 1102- Ensure that all file paths [fit the guidelines](../CONTRIBUTING.md#file-naming-and-organisation). 1103- Ensure that the package name and version [fits the guidelines](#package-naming). 1104- Ensure that the package versioning [fits the guidelines](#versioning). 1105- Ensure that the commit text [fits the guidelines](../CONTRIBUTING.md#commit-conventions). 1106- Ensure that the source is fetched from an official location, one of our [trusted mirrors](./build-support/fetchurl/mirrors.nix), or a mirror trusted by the authors. 1107- Ensure that the meta fields [fits the guidelines](#meta-attributes) and contain the correct information: 1108 - License must match the upstream license. 1109 - Platforms should be set (or the package will not get binary substitutes). 1110 - Maintainers must be set. 1111 This can be the package submitter or a community member that accepts taking up maintainership of the package. 1112 - The `meta.mainProgram` must be set if a main executable exists. 1113- Ensure any special packaging choices and required context are documented in i.e. the name of a patch or in a comment. 1114 - If a special version of a package is pinned, document why, so others know if/when it can be unpinned. 1115 - If any (especially opinionated) patch or `substituteInPlace` is applied, document why. 1116 - If any non-default build flags are set, document why. 1117 - If checks are partially or fully disabled, document why. 1118- Report detected typos. 1119- Ensure the package source: 1120 - Uses `mirror://` URLs when available. 1121 - Uses the most appropriate functions (e.g. packages from GitHub should use `fetchFromGitHub`). 1122- Build the package locally. 1123- Run every binary. 1124 1125Sample template for a new package review is provided below. 1126 1127```markdown 1128##### Reviewed points 1129 1130- [ ] package path fits guidelines 1131- [ ] package name fits guidelines 1132- [ ] package version fits guidelines 1133- [ ] package builds on ARCHITECTURE 1134- [ ] executables tested on ARCHITECTURE 1135- [ ] `meta.description` is set and fits guidelines 1136- [ ] `meta.license` fits upstream license 1137- [ ] `meta.platforms` is set 1138- [ ] `meta.maintainers` is set 1139- [ ] `meta.mainProgram` is set, if applicable. 1140- [ ] build time only dependencies are declared in `nativeBuildInputs` 1141- [ ] source is fetched from an official or trusted location 1142- [ ] source is fetched using the appropriate function 1143- [ ] the motives for any special packaging choices are documented 1144- [ ] the list of `phases` is not overridden 1145- [ ] when a phase (like `installPhase`) is overridden it starts with `runHook preInstall` and ends with `runHook postInstall`. 1146- [ ] patches have a comment describing either the upstream URL or a reason why the patch wasn't upstreamed 1147- [ ] patches that are remotely available are fetched rather than vendored 1148 1149##### Possible improvements 1150 1151##### Comments 1152``` 1153 1154## Security 1155 1156### Submitting security fixes 1157[security-fixes]: #submitting-security-fixes 1158 1159Security fixes are submitted in the same way as other changes and thus the same guidelines apply. 1160 1161- If a new version fixing the vulnerability has been released, update the package; 1162- If the security fix comes in the form of a patch and a CVE is available, then add the patch to the Nixpkgs tree, and apply it to the package. 1163 The name of the patch should be the CVE identifier, so e.g. `CVE-2019-13636.patch`; If a patch is fetched the name needs to be set as well, e.g.: 1164 1165 ```nix 1166 (fetchpatch { 1167 name = "CVE-2019-11068.patch"; 1168 url = "https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6.patch"; 1169 hash = "sha256-SEKe/8HcW0UBHCfPTTOnpRlzmV2nQPPeL6HOMxBZd14="; 1170 }) 1171 ``` 1172 1173If a security fix applies to both master and a stable release then, similar to regular changes, they are preferably delivered via master first and cherry-picked to the release branch. 1174 1175Critical security fixes may by-pass the staging branches and be delivered directly to release branches such as `master` and `release-*`. 1176 1177### Vulnerability Roundup 1178 1179#### Issues 1180 1181Vulnerable packages in Nixpkgs are managed using issues. 1182Currently opened ones can be found using the following: 1183 1184[github.com/NixOS/nixpkgs/issues?q=is:issue+is:open+"Vulnerability+roundup"](https://github.com/NixOS/nixpkgs/issues?q=is%3Aissue+is%3Aopen+%22Vulnerability+roundup%22) 1185 1186Each issue correspond to a vulnerable version of a package; As a consequence: 1187 1188- One issue can contain several CVEs; 1189- One CVE can be shared across several issues; 1190- A single package can be concerned by several issues. 1191 1192 1193A "Vulnerability roundup" issue usually respects the following format: 1194 1195```txt 1196<link to relevant package search on search.nix.gsc.io>, <link to relevant files in Nixpkgs on GitHub> 1197 1198<list of related CVEs, their CVSS score, and the impacted NixOS version> 1199 1200<list of the scanned Nixpkgs versions> 1201 1202<list of relevant contributors> 1203``` 1204 1205Note that there can be an extra comment containing links to previously reported (and still open) issues for the same package. 1206 1207 1208#### Triaging and Fixing 1209 1210**Note**: An issue can be a "false positive" (i.e. automatically opened, but without the package it refers to being actually vulnerable). 1211If you find such a "false positive", comment on the issue an explanation of why it falls into this category, linking as much information as the necessary to help maintainers double check. 1212 1213If you are investigating a "true positive": 1214 1215- Find the earliest patched version or a code patch in the CVE details; 1216- Is the issue already patched (version up-to-date or patch applied manually) in Nixpkgs's `master` branch? 1217 - **No**: 1218 - [Submit a security fix][security-fixes]; 1219 - Once the fix is merged into `master`, [submit the change to the vulnerable release branch(es)](../CONTRIBUTING.md#how-to-backport-pull-requests); 1220 - **Yes**: [Backport the change to the vulnerable release branch(es)](../CONTRIBUTING.md#how-to-backport-pull-requests). 1221- When the patch has made it into all the relevant branches (`master`, and the vulnerable releases), close the relevant issue(s).