Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)
at flake-libs 1101 lines 50 kB view raw view rendered
1# Contributing to Nixpkgs packages 2 3This document is for people wanting to contribute specifically to the package collection in Nixpkgs. 4See the [CONTRIBUTING.md](../CONTRIBUTING.md) document for more general information. 5 6## Overview 7 8- [`top-level`](./top-level): Entrypoints, package set aggregations 9 - [`impure.nix`](./top-level/impure.nix), [`default.nix`](./top-level/default.nix), [`config.nix`](./top-level/config.nix): Definitions for the evaluation entry point of `import <nixpkgs>` 10 - [`stage.nix`](./top-level/stage.nix), [`all-packages.nix`](./top-level/all-packages.nix), [`by-name-overlay.nix`](./top-level/by-name-overlay.nix), [`splice.nix`](./top-level/splice.nix): Definitions for the top-level attribute set made available through `import <nixpkgs> {…}` 11 - `*-packages.nix`, [`linux-kernels.nix`](./top-level/linux-kernels.nix), [`unixtools.nix`](./top-level/unixtools.nix): Aggregations of nested package sets defined in `development` 12 - [`aliases.nix`](./top-level/aliases.nix), [`python-aliases.nix`](./top-level/python-aliases.nix): Aliases for package definitions that have been renamed or removed 13 - `release*.nix`, [`make-tarball.nix`](./top-level/make-tarball.nix), [`packages-config.nix`](./top-level/packages-config.nix), [`metrics.nix`](./top-level/metrics.nix), [`nixpkgs-basic-release-checks.nix`](./top-level/nixpkgs-basic-release-checks.nix): Entry-points and utilities used by Hydra for continuous integration 14- [`development`](./development) 15 - `*-modules`, `*-packages`, `*-pkgs`: Package definitions for nested package sets 16 - All other directories loosely categorise top-level package definitions, see [category hierarchy][categories] 17- [`build-support`](./build-support): [Builders](https://nixos.org/manual/nixpkgs/stable/#part-builders) 18 - `fetch*`: [Fetchers](https://nixos.org/manual/nixpkgs/stable/#chap-pkgs-fetchers) 19- [`stdenv`](./stdenv): [Standard environment](https://nixos.org/manual/nixpkgs/stable/#part-stdenv) 20- [`pkgs-lib`](./pkgs-lib): Definitions for utilities that need packages but are not needed for packages 21- [`test`](./test): Tests not directly associated with any specific packages 22- [`by-name`](./by-name): Top-level packages organised by name ([docs](./by-name/README.md)) 23- All other directories loosely categorise top-level packages definitions, see [category hierarchy][categories] 24 25## Quick Start to Adding a Package 26 27We welcome new contributors of new packages to Nixpkgs, arguably the greatest software database known. However, each new package comes with a cost for the maintainers, Continuous Integration, caching servers and users downloading Nixpkgs. 28 29Before adding a new package, please consider the following questions: 30 31* Is the package ready for general use? We don't want to include projects that are too immature or are going to be abandoned immediately. In case of doubt, check with upstream. 32* Does the project have a clear license statement? Remember that software is unfree by default (all rights reserved), and merely providing access to the source code does not imply its redistribution. In case of doubt, ask upstream. 33* How realistic is it that it will be used by other people? It's good that nixpkgs caters to various niches, but if it's a niche of 5 people it's probably too small. A good estimate is checking upstream issues and pull requests, or other software repositories. Library packages should have at least one dependent. 34* Is the software actively maintained upstream? Especially packages that are security-critical, rely on fast-moving dependencies, or affect data integrity should see regular maintenance. 35* Are you willing to maintain the package? You should care enough about the package to be willing to keep it up and running for at least one complete Nixpkgs' release life-cycle. 36 * In case you are not able to maintain the package you wrote, you can seek someone to fill that role, effectively adopting the package. 37 38If any of these questions' answer is no, then you should probably not add the package. 39 40Special care has to be taken with security-critical software components. Because entries in the Nix store are inert and do nothing by themselves, packages should be considered by their intended use, e.g. when used together with a NixOS module. 41 42* Any package that immediately would need to be tagged with `meta.knownVulnerabilities` is unlikely to be fit for nixpkgs. 43* Any package depending on a known-vulnerable library should be considered carefully. 44* Packages typically used with untrusted data should have a maintained and responsible upstream. For example: 45 * Any package which does not follow upstream security policies should be considered vulnerable. In particular, packages that vendor or fork web engines like Blink, Gecko or Webkit need to keep up with the frequent updates of those projects. 46 * Any security-critical fast-moving package such as Chrome or Firefox (or their forks) must have at least one active committer among the maintainers. This ensures no critical fixes are delayed unnecessarily, endangering unsuspecting users. 47 * Services which typically work on web traffic are working on untrusted input. 48 * Data (such as archives or rich documents) commonly shared over untrusted channels (e.g. email) is untrusted. 49* Applications in the Unix authentication stack such as PAM/D-Bus modules or SUID binaries should be considered carefully, and should have a maintained and responsible upstream. 50* Encryption libraries should have a maintained and responsible upstream. 51* Security-critical components that are part of larger packages should be unvendored (=use the nixpkgs package as dependency, instead of vendored and pinned sources). 52* A "responsible upstream" includes various aspects, such as: 53 * channels to disclose security concerns 54 * being responsive to security concerns, providing fixes or workarounds 55 * transparent public disclosure of security issues when they are found or fixed 56 * These aspects are sometimes hard to verify, in which case an upstream that is not known to be irresponsible should be considered as responsible. 57* Source-available software should be built from source where possible. Binary blobs risk supply chain attacks and vendored outdated libraries. 58 59This section describes a general framework of understanding and exceptions might apply. 60 61Luckily it's pretty easy to maintain your own package set with Nix, which can then be added to the [Nix User Repository](https://github.com/nix-community/nur) project. 62 63--- 64 65Now that this is out of the way. To add a package to Nixpkgs: 66 671. Checkout the Nixpkgs source tree: 68 69 ```ShellSession 70 $ git clone https://github.com/NixOS/nixpkgs 71 $ cd nixpkgs 72 ``` 73 742. Create a package directory `pkgs/by-name/so/some-package` where `some-package` is the package name and `so` is the lowercased 2-letter prefix of the package name: 75 76 ```ShellSession 77 $ mkdir -p pkgs/by-name/so/some-package 78 ``` 79 80 For more detailed information, see [here](./by-name/README.md). 81 823. Create a `package.nix` file in the package directory, containing a Nix expression — a piece of code that describes how to build the package. In this case, it should be a _function_ that is called with the package dependencies as arguments, and returns a build of the package in the Nix store. 83 84 ```ShellSession 85 $ emacs pkgs/by-name/so/some-package/package.nix 86 $ git add pkgs/by-name/so/some-package/package.nix 87 ``` 88 89 If the package is written in a language other than C, you should use [the corresponding language framework](https://nixos.org/manual/nixpkgs/stable/#chap-language-support). 90 91 You can have a look at the existing Nix expressions under `pkgs/` to see how it’s done, some of which are also using the [category hierarchy](#category-hierarchy). 92 Here are some good ones: 93 94 - GNU Hello: [`pkgs/by-name/he/hello/package.nix`](./by-name/he/hello/package.nix). Trivial package, which specifies some `meta` attributes which is good practice. 95 96 - GNU cpio: [`pkgs/by-name/cp/cpio/package.nix`](./by-name/cp/cpio/package.nix). Also a simple package. The generic builder in `stdenv` does everything for you. It has no dependencies beyond `stdenv`. 97 98 - GNU Multiple Precision arithmetic library (GMP): [`pkgs/development/libraries/gmp`](development/libraries/gmp). Also done by the generic builder, but has a dependency on `m4`. 99 100 - Pan, a GTK-based newsreader: [`pkgs/by-name/pa/pan/package.nix`](./by-name/pa/pan/package.nix). Has an optional dependency on `gtkspell`, which is only built if `spellCheck` is `true`. 101 102 - Apache HTTPD: [`pkgs/servers/http/apache-httpd/2.4.nix`](servers/http/apache-httpd/2.4.nix). A bunch of optional features, variable substitutions in the configure flags, a post-install hook, and miscellaneous hackery. 103 104 - buildMozillaMach: [`pkgs/applications/networking/browser/firefox/common.nix`](applications/networking/browsers/firefox/common.nix). A reusable build function for Firefox, Thunderbird and Librewolf. 105 106 - JDiskReport, a Java utility: [`pkgs/by-name/jd/jdiskreport/package.nix`](./by-name/jd/jdiskreport/package.nix). Nixpkgs doesn’t have a decent `stdenv` for Java yet so this is pretty ad-hoc. 107 108 - XML::Simple, a Perl module: [`pkgs/top-level/perl-packages.nix`](top-level/perl-packages.nix) (search for the `XMLSimple` attribute). Most Perl modules are so simple to build that they are defined directly in `perl-packages.nix`; no need to make a separate file for them. 109 110 - Discord Game SDK: [`pkgs/by-name/di/discord-gamesdk/package.nix`](./by-name/di/discord-gamesdk/package.nix). Shows how binary-only packages can be supported. In particular, the `autoPatchelfHook` is used to set the RUNPATH and ELF interpreter of the executables so that the right libraries are found at runtime. 111 112 Some notes: 113 114 - Add yourself as the maintainer of the package. 115 116 - If this is your first time contributing (welcome!), [add yourself to the maintainers list](../maintainers/README.md#how-to-become-a-maintainer) in a separate commit. 117 118 - All other [`meta`](https://nixos.org/manual/nixpkgs/stable/#chap-meta) attributes are optional, but it’s still a good idea to provide at least the `description`, `homepage` and [`license`](https://nixos.org/manual/nixpkgs/stable/#sec-meta-license). 119 120 - The exact syntax and semantics of the Nix expression language, including the built-in functions, are [Nix language reference](https://nixos.org/manual/nix/stable/language/). 121 1225. To test whether the package builds, run the following command from the root of the nixpkgs source tree: 123 124 ```ShellSession 125 $ nix-build -A some-package 126 ``` 127 128 where `some-package` should be the package name. You may want to add the flag `-K` to keep the temporary build directory in case something fails. If the build succeeds, a symlink `./result` to the package in the Nix store is created. 129 1306. If you want to install the package into your profile (optional), do 131 132 ```ShellSession 133 $ nix-env -f . -iA libfoo 134 ``` 135 1367. Optionally commit the new package and open a pull request [to nixpkgs](https://github.com/NixOS/nixpkgs/pulls), or use [the Patches category](https://discourse.nixos.org/t/about-the-patches-category/477) on Discourse for sending a patch without a GitHub account. 137 138## Commit conventions 139 140- Make sure you read about the [commit conventions](../CONTRIBUTING.md#commit-conventions) common to Nixpkgs as a whole. 141 142- Format the commit messages in the following way: 143 144 ``` 145 (pkg-name): (from -> to | init at version | refactor | etc) 146 147 (Motivation for change. Link to release notes. Additional information.) 148 ``` 149 150 Examples: 151 152 * nginx: init at 2.0.1 153 * firefox: 54.0.1 -> 55.0 154 155 https://www.mozilla.org/en-US/firefox/55.0/releasenotes/ 156 157(using "→" instead of "->" is also accepted) 158 159## Category Hierarchy 160[categories]: #category-hierarchy 161 162Most top-level packages are organised in a loosely-categorised directory hierarchy in this directory. 163See the [overview](#overview) for which directories are part of this. 164 165This category hierarchy is partially deprecated and will be migrated away over time. 166The new `pkgs/by-name` directory ([docs](./by-name/README.md)) should be preferred instead. 167The category hierarchy may still be used for packages that should be imported using an alternate `callPackage`, such as `python3Packages.callPackage` or `libsForQt5.callPackage`. 168 169If that is the case for a new package, here are some rules for picking the right category. 170Many packages fall under several categories; what matters is the _primary_ purpose of a package. 171For example, the `libxml2` package builds both a library and some tools; but it’s a library foremost, so it goes under `pkgs/development/libraries`. 172 173<details> 174<summary>Categories</summary> 175 176**If it’s used to support _software development_:** 177 178- **If it’s a _library_ used by other packages:** 179 180 - `development/libraries` (e.g. `libxml2`) 181 182- **If it’s a _compiler_:** 183 184 - `development/compilers` (e.g. `gcc`) 185 186- **If it’s an _interpreter_:** 187 188 - `development/interpreters` (e.g. `guile`) 189 190- **If it’s a (set of) development _tool(s)_:** 191 192 - **If it’s a _parser generator_ (including lexers):** 193 194 - `development/tools/parsing` (e.g. `bison`, `flex`) 195 196 - **If it’s a _build manager_:** 197 198 - `development/tools/build-managers` (e.g. `gnumake`) 199 200 - **If it’s a _language server_:** 201 202 - `development/tools/language-servers` (e.g. `ccls` or `nil`) 203 204 - **Else:** 205 206 - `development/tools/misc` (e.g. `binutils`) 207 208- **Else:** 209 210 - `development/misc` 211 212**If it’s a (set of) _tool(s)_:** 213 214(A tool is a relatively small program, especially one intended to be used non-interactively.) 215 216- **If it’s for _networking_:** 217 218 - `tools/networking` (e.g. `wget`) 219 220- **If it’s for _text processing_:** 221 222 - `tools/text` (e.g. `diffutils`) 223 224- **If it’s a _system utility_, i.e., something related or essential to the operation of a system:** 225 226 - `tools/system` (e.g. `cron`) 227 228- **If it’s an _archiver_ (which may include a compression function):** 229 230 - `tools/archivers` (e.g. `zip`, `tar`) 231 232- **If it’s a _compression_ program:** 233 234 - `tools/compression` (e.g. `gzip`, `bzip2`) 235 236- **If it’s a _security_-related program:** 237 238 - `tools/security` (e.g. `nmap`, `gnupg`) 239 240- **Else:** 241 242 - `tools/misc` 243 244**If it’s a _shell_:** 245 246- `shells` (e.g. `bash`) 247 248**If it’s a _server_:** 249 250- **If it’s a web server:** 251 252 - `servers/http` (e.g. `apache-httpd`) 253 254- **If it’s an implementation of the X Windowing System:** 255 256 - `servers/x11` (e.g. `xorg` — this includes the client libraries and programs) 257 258- **Else:** 259 260 - `servers/misc` 261 262**If it’s a _desktop environment_:** 263 264- `desktops` (e.g. `kde`, `gnome`, `enlightenment`) 265 266**If it’s a _window manager_:** 267 268- `applications/window-managers` (e.g. `awesome`, `stumpwm`) 269 270**If it’s an _application_:** 271 272A (typically large) program with a distinct user interface, primarily used interactively. 273 274- **If it’s a _version management system_:** 275 276 - `applications/version-management` (e.g. `subversion`) 277 278- **If it’s a _terminal emulator_:** 279 280 - `applications/terminal-emulators` (e.g. `alacritty` or `rxvt` or `termite`) 281 282- **If it’s a _file manager_:** 283 284 - `applications/file-managers` (e.g. `mc` or `ranger` or `pcmanfm`) 285 286- **If it’s for _video playback / editing_:** 287 288 - `applications/video` (e.g. `vlc`) 289 290- **If it’s for _graphics viewing / editing_:** 291 292 - `applications/graphics` (e.g. `gimp`) 293 294- **If it’s for _networking_:** 295 296 - **If it’s a _mailreader_:** 297 298 - `applications/networking/mailreaders` (e.g. `thunderbird`) 299 300 - **If it’s a _newsreader_:** 301 302 - `applications/networking/newsreaders` (e.g. `pan`) 303 304 - **If it’s a _web browser_:** 305 306 - `applications/networking/browsers` (e.g. `firefox`) 307 308 - **Else:** 309 310 - `applications/networking/misc` 311 312- **Else:** 313 314 - `applications/misc` 315 316**If it’s _data_ (i.e., does not have a straight-forward executable semantics):** 317 318- **If it’s a _font_:** 319 320 - `data/fonts` 321 322- **If it’s an _icon theme_:** 323 324 - `data/icons` 325 326- **If it’s related to _SGML/XML processing_:** 327 328 - **If it’s an _XML DTD_:** 329 330 - `data/sgml+xml/schemas/xml-dtd` (e.g. `docbook`) 331 332 - **If it’s an _XSLT stylesheet_:** 333 334 (Okay, these are executable...) 335 336 - `data/sgml+xml/stylesheets/xslt` (e.g. `docbook-xsl`) 337 338- **If it’s a _theme_ for a _desktop environment_, a _window manager_ or a _display manager_:** 339 340 - `data/themes` 341 342**If it’s a _game_:** 343 344- `games` 345 346**Else:** 347 348- `misc` 349 350</details> 351 352# Conventions 353 354The key words _must_, _must not_, _required_, _shall_, _shall not_, _should_, _should not_, _recommended_, _may_, and _optional_ in this section are to be interpreted as described in [RFC 2119](https://tools.ietf.org/html/rfc2119). Only _emphasized_ words are to be interpreted in this way. 355 356## Package naming 357 358In Nixpkgs, there are generally three different names associated with a package: 359 360- The `pname` attribute of the derivation. This is what most users see, in particular when using `nix-env`. 361 362- The attribute name used for the package in the [`pkgs/by-name` structure](./by-name/README.md) or in [`all-packages.nix`](./top-level/all-packages.nix), and when passing it as a dependency in recipes. 363 364- The filename for (the directory containing) the Nix expression. 365 366Most of the time, these are the same. For instance, the package `e2fsprogs` has a `pname` attribute `"e2fsprogs"`, is bound to the attribute name `e2fsprogs` in `all-packages.nix`, and the Nix expression is in `pkgs/os-specific/linux/e2fsprogs/default.nix`. 367 368Follow these guidelines: 369 370- For the `pname` attribute: 371 372 - It _should_ be identical to the upstream package name. 373 374 - It _must not_ contain uppercase letters. 375 376 Example: Use `"mplayer"` instead of `"MPlayer"` 377 378- For the package attribute name: 379 380 - It _must_ be a valid identifier in Nix. 381 382 - If the `pname` starts with a digit, the attribute name _should_ be prefixed with an underscore. Otherwise the attribute name _should not_ be prefixed with an underline. 383 384 Example: The corresponding attribute name for `0ad` should be `_0ad`. 385 386 - New attribute names _should_ be the same as the value in `pname`. 387 388 Hyphenated names _should not_ be converted to [snake case](https://en.wikipedia.org/wiki/Snake_case) or [camel case](https://en.wikipedia.org/wiki/Camel_case). 389 This was done historically, but is not necessary any more. 390 [The Nix language allows dashes in identifiers since 2012](https://github.com/NixOS/nix/commit/95c74eae269b2b9e4bc514581b5caa1d80b54acc). 391 392 - If there are multiple versions of a package, this _should_ be reflected in the attribute names in `all-packages.nix`. 393 394 Example: `json-c_0_9` and `json-c_0_11` 395 396 If there is an obvious “default” version, make an extra attribute. 397 398 Example: `json-c = json-c_0_9;` 399 400 See also [versioning][versioning]. 401 402## Versioning 403[versioning]: #versioning 404 405These are the guidelines the `version` attribute of a package: 406 407- It _must_ start with a digit. This is required for backwards-compatibility with [how `nix-env` parses derivation names](https://nix.dev/manual/nix/latest/command-ref/nix-env#selectors). 408 409 Example: `"0.3.1rc2"` or `"0-unstable-1970-01-01"` 410 411- If a package is a commit from a repository without a version assigned, then the `version` attribute _should_ be the latest upstream version preceding that commit, followed by `-unstable-` and the date of the (fetched) commit. The date _must_ be in `"YYYY-MM-DD"` format. 412 413 Example: Given a project had its latest releases `2.2` in November 2021 and `3.0` in January 2022, a commit authored on March 15, 2022 for an upcoming bugfix release `2.2.1` would have `version = "2.2-unstable-2022-03-15"`. 414 415- If a project has no suitable preceding releases - e.g., no versions at all, or an incompatible versioning or tagging scheme - then the latest upstream version in the above schema should be `0`. 416 417 Example: Given a project that has no tags or released versions at all, or applies versionless tags like `latest` or `YYYY-MM-DD-Build`, a commit authored on March 15, 2022 would have `version = "0-unstable-2022-03-15"`. 418 419Because every version of a package in Nixpkgs creates a potential maintenance burden, old versions of a package should not be kept unless there is a good reason to do so. For instance, Nixpkgs contains several versions of GCC because other packages don’t build with the latest version of GCC. Other examples are having both the latest stable and latest pre-release version of a package, or to keep several major releases of an application that differ significantly in functionality. 420 421If there is only one version of a package, its Nix expression should be named (e.g) `pkgs/by-name/xy/xyz/package.nix`. If there are multiple versions, this should be reflected in the attribute name. If you wish to share code between the Nix expressions of each version, you cannot rely upon `pkgs/by-name`'s automatic attribute creation, and must create the attributes yourself in `all-packages.nix`. See also [`pkgs/by-name/README.md`'s section on this topic](https://github.com/NixOS/nixpkgs/blob/master/pkgs/by-name/README.md#recommendation-for-new-packages-with-multiple-versions). 422 423## Meta attributes 424 425The `meta` attribute set should always be placed last in the derivativion and any other "meta"-like attribute sets like `passthru` should be written before it. 426 427* `meta.description` must: 428 * Be short, just one sentence. 429 * Be capitalized. 430 * Not start with the definite or an indefinite article. 431 * Not start with the package name. 432 * More generally, it should not refer to the package name. 433 * Not end with a period (or any punctuation for that matter). 434 * Provide factual information. 435 * Avoid subjective language. 436* `meta.license` must be set and match the upstream license. 437 * If there is no upstream license, `meta.license` should default to `lib.licenses.unfree`. 438 * If in doubt, try to contact the upstream developers for clarification. 439* `meta.mainProgram` must be set to the name of the executable which facilitates the primary function or purpose of the package, if there is such an executable in `$bin/bin/` (or `$out/bin/`, if there is no `"bin"` output). 440 * Packages that only have a single executable in the applicable directory above should set `meta.mainProgram`. For example, the package `ripgrep` only has a single executable `rg` under `$out/bin/`, so `ripgrep.meta.mainProgram` is set to `"rg"`. 441 * Packages like `polkit_gnome` that have no executables in the applicable directory should not set `meta.mainProgram`. 442 * Packages like `e2fsprogs` that have multiple executables, none of which can be considered the main program, should not set `meta.mainProgram`. 443 * Packages which are not primarily used for a single executable do not need to set `meta.mainProgram`. 444 * Always prefer using a hardcoded string (don't use `pname`, for example). 445 * When in doubt, ask for reviewer input. 446* `meta.maintainers` must be set for new packages. 447 448See the Nixpkgs manual for more details on [standard meta-attributes](https://nixos.org/nixpkgs/manual/#sec-standard-meta-attributes). 449 450## Import From Derivation 451 452[Import From Derivation](https://nixos.org/manual/nix/unstable/language/import-from-derivation) (IFD) is disallowed in Nixpkgs for performance reasons: 453[Hydra](https://github.com/NixOS/hydra) evaluates the entire package set, and sequential builds during evaluation would increase evaluation times to become impractical. 454 455Import From Derivation can be worked around in some cases by committing generated intermediate files to version control and reading those instead. 456 457## Sources 458 459Always fetch source files using [Nixpkgs fetchers](https://nixos.org/manual/nixpkgs/unstable/#chap-pkgs-fetchers). 460Use reproducible sources with a high degree of availability. 461Prefer protocols that support proxies. 462 463A list of schemes for `mirror://` URLs can be found in [`pkgs/build-support/fetchurl/mirrors.nix`](build-support/fetchurl/mirrors.nix), and is supported by [`fetchurl`](https://nixos.org/manual/nixpkgs/unstable/#fetchurl). 464Other fetchers which end up relying on `fetchurl` may also support mirroring. 465 466The preferred source hash type is `sha256`. 467 468Examples going from bad to best practices: 469 470- Bad: Uses `git://` which won't be proxied. 471 472 ```nix 473 { 474 src = fetchgit { 475 url = "git://github.com/NixOS/nix.git"; 476 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 477 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 478 }; 479 } 480 ``` 481 482- Better: This is ok, but an archive fetch will still be faster. 483 484 ```nix 485 { 486 src = fetchgit { 487 url = "https://github.com/NixOS/nix.git"; 488 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 489 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 490 }; 491 } 492 ``` 493 494- Best: Fetches a snapshot archive for the given revision. 495 496 ```nix 497 { 498 src = fetchFromGitHub { 499 owner = "NixOS"; 500 repo = "nix"; 501 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 502 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 503 }; 504 } 505 ``` 506 507> [!Note] 508> When fetching from GitHub, always reference revisions by their full commit hash. 509> GitHub shares commit hashes among all forks and returns `404 Not Found` when a short commit hash is ambiguous. 510> It already happened in Nixpkgs for short, 6-character commit hashes. 511> 512> Pushing large amounts of auto generated commits into forks is a practical vector for a denial-of-service attack, and was already [demonstrated against GitHub Actions Beta](https://blog.teddykatz.com/2019/11/12/github-actions-dos.html). 513 514## Patches 515 516Sometimes, changes are needed to the source to allow building a derivation in nixpkgs, or to get earlier access to an upstream fix or improvement. 517When using the `patches` parameter to `mkDerivation`, make sure the patch name clearly describes the reason for the patch, or add a comment. 518 519> [!Note] 520> The version of the package does not need to be changed just because a patch is applied. Declarative package installations don't depend on the version, while imperative `nix-env` installations can use [`upgrade --eq/leq/--always`](https://nix.dev/manual/nix/2.25/command-ref/nix-env/upgrade#flags). 521> 522> See [Versioning](#versioning) for details on package versioning. 523 524### Fetching patches 525 526In the interest of keeping our maintenance burden and the size of Nixpkgs to a minimum, patches already merged upstream or published elsewhere _should_ be retrieved using `fetchpatch2`: 527 528```nix 529{ 530 patches = [ 531 (fetchpatch2 { 532 name = "fix-check-for-using-shared-freetype-lib.patch"; 533 url = "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/patch/?id=8f5d28536e4518716fdfe974e580194c8f57871d"; 534 hash = "sha256-uRcxaCjd+WAuGrXOmGfFeu79cUILwkRdBu48mwcBE7g="; 535 }) 536 ]; 537} 538``` 539 540If a patch is available online but does not cleanly apply, it can be modified in some fixed ways by using additional optional arguments for `fetchpatch2`. Check [the `fetchpatch` reference](https://nixos.org/manual/nixpkgs/unstable/#fetchpatch) for details. 541 542When adding patches in this manner you should be reasonably sure that the used URL is stable. Patches referencing open pull requests will change when the PR is updated and code forges (such as GitHub) usually garbage collect commits that are no longer reachable due to rebases/amends. 543 544### Vendoring patches 545 546In the following cases, a `.patch` file _should_ be added to Nixpkgs repository, instead of retrieved: 547 548- solves problems unique to packaging in Nixpkgs 549- cannot be fetched easily 550- has a high chance to disappear in the future due to unstable or unreliable URLs 551 552The latter avoids link rot when the upstream abandons, squashes or rebases their change, in which case the commit may get garbage-collected. 553 554```nix 555{ 556 patches = [ ./0001-add-missing-include.patch ]; 557} 558``` 559 560If you do need to do create this sort of patch file, one way to do so is with git: 561 5621. Move to the root directory of the source code you're patching. 563 564 ```ShellSession 565 $ cd the/program/source 566 ``` 567 5682. If a git repository is not already present, create one and stage all of the source files. 569 570 ```ShellSession 571 $ git init 572 $ git add . 573 ``` 574 5753. Edit some files to make whatever changes need to be included in the patch. 576 5774. Use git to create a diff, and pipe the output to a patch file: 578 579 ```ShellSession 580 $ git diff -a > nixpkgs/pkgs/the/package/0001-changes.patch 581 ``` 582 583## Deprecating/removing packages 584 585There is currently no policy when to remove a package. 586 587Before removing a package, one should try to find a new maintainer or fix smaller issues first. 588 589### Steps to remove a package from Nixpkgs 590 591We use jbidwatcher as an example for a discontinued project here. 592 5931. Have Nixpkgs checked out locally and up to date. 5941. Create a new branch for your change, e.g. `git checkout -b jbidwatcher` 5951. Remove the actual package including its directory, e.g. `git rm -rf pkgs/applications/misc/jbidwatcher` 5961. Remove the package from the list of all packages (`pkgs/top-level/all-packages.nix`). 5971. Add an alias for the package name in `pkgs/top-level/aliases.nix` (There is also `pkgs/applications/editors/vim/plugins/aliases.nix`. Package sets typically do not have aliases, so we can't add them there.) 598 599 For example in this case: 600 601 ```nix 602 { 603 jbidwatcher = throw "jbidwatcher was discontinued in march 2021"; # added 2021-03-15 604 } 605 ``` 606 607 The throw message should explain in short why the package was removed for users that still have it installed. 608 6091. Test if the changes introduced any issues by running `nix-env -qaP -f . --show-trace`. It should show the list of packages without errors. 6101. Commit the changes. Explain again why the package was removed. If it was declared discontinued upstream, add a link to the source. 611 612 ```ShellSession 613 $ git add pkgs/applications/misc/jbidwatcher/default.nix pkgs/top-level/all-packages.nix pkgs/top-level/aliases.nix 614 $ git commit 615 ``` 616 617 Example commit message: 618 619 ``` 620 jbidwatcher: remove 621 622 project was discontinued in march 2021. the program does not work anymore because ebay changed the login. 623 624 https://web.archive.org/web/20210315205723/http://www.jbidwatcher.com/ 625 ``` 626 6271. Push changes to your GitHub fork with `git push` 6281. Create a pull request against Nixpkgs. Mention the package maintainer. 629 630This is how the pull request looks like in this case: [https://github.com/NixOS/nixpkgs/pull/116470](https://github.com/NixOS/nixpkgs/pull/116470) 631 632## Package tests 633 634To run the main types of tests locally: 635 636- Run package-internal tests with `nix-build --attr pkgs.PACKAGE.passthru.tests` 637- Run [NixOS tests](https://nixos.org/manual/nixos/unstable/#sec-nixos-tests) with `nix-build --attr nixosTests.NAME`, where `NAME` is the name of the test listed in `nixos/tests/all-tests.nix` 638- Run [global package tests](https://nixos.org/manual/nixpkgs/unstable/#sec-package-tests) with `nix-build --attr tests.PACKAGE`, where `PACKAGE` is the name of the test listed in `pkgs/test/default.nix` 639- See `lib/tests/NAME.nix` for instructions on running specific library tests 640 641Tests are important to ensure quality and make reviews and automatic updates easy. 642 643The following types of tests exists: 644 645* [NixOS **module tests**](https://nixos.org/manual/nixos/stable/#sec-nixos-tests), which spawn one or more NixOS VMs. They exercise both NixOS modules and the packaged programs used within them. For example, a NixOS module test can start a web server VM running the `nginx` module, and a client VM running `curl` or a graphical `firefox`, and test that they can talk to each other and display the correct content. 646* Nix **package tests** are a lightweight alternative to NixOS module tests. They should be used to create simple integration tests for packages, but cannot test NixOS services, and some programs with graphical user interfaces may also be difficult to test with them. 647* The **`checkPhase` of a package**, which should execute the unit tests that are included in the source code of a package. 648 649Here in the nixpkgs manual we describe mostly _package tests_; for _module tests_ head over to the corresponding [section in the NixOS manual](https://nixos.org/manual/nixos/stable/#sec-nixos-tests). 650 651### Writing inline package tests 652 653For very simple tests, they can be written inline: 654 655```nix 656{ /* ... , */ yq-go }: 657 658buildGoModule rec { 659 # … 660 661 passthru.tests = { 662 simple = runCommand "${pname}-test" {} '' 663 echo "test: 1" | ${yq-go}/bin/yq eval -j > $out 664 [ "$(cat $out | tr -d $'\n ')" = '{"test":1}' ] 665 ''; 666 }; 667} 668``` 669 670Any derivation can be specified as a test, even if it's in a different file. 671Such a derivation that implements a test can depend on the package under test, even in the presence of `overrideAttrs`. 672 673In the following example, `(my-package.overrideAttrs f).passthru.tests` will work as expected, as long as the definition of `tests` does not rely on the original `my-package` or overrides all occurrences of `my-package`: 674 675```nix 676# my-package/default.nix 677{ stdenv, callPackage }: 678stdenv.mkDerivation (finalAttrs: { 679 # ... 680 passthru.tests.example = callPackage ./example.nix { my-package = finalAttrs.finalPackage; }; 681}) 682``` 683 684```nix 685# my-package/example.nix 686{ runCommand, lib, my-package, ... }: 687runCommand "my-package-test" { 688 nativeBuildInputs = [ my-package ]; 689 src = lib.sources.sourcesByRegex ./. [ ".*.in" ".*.expected" ]; 690} '' 691 my-package --help 692 my-package <example.in >example.actual 693 diff -U3 --color=auto example.expected example.actual 694 mkdir $out 695'' 696``` 697 698### Writing larger package tests 699[larger-package-tests]: #writing-larger-package-tests 700 701This is an example using the `phoronix-test-suite` package with the current best practices. 702 703Add the tests in `passthru.tests` to the package definition like this: 704 705```nix 706{ stdenv, lib, fetchurl, callPackage }: 707 708stdenv.mkDerivation { 709 # … 710 711 passthru.tests = { 712 simple-execution = callPackage ./tests.nix { }; 713 }; 714 715 meta = { /* … */ }; 716} 717``` 718 719Create `tests.nix` in the package directory: 720 721```nix 722{ runCommand, phoronix-test-suite }: 723 724let 725 inherit (phoronix-test-suite) pname version; 726in 727 728runCommand "${pname}-tests" { meta.timeout = 60; } 729 '' 730 # automatic initial setup to prevent interactive questions 731 ${phoronix-test-suite}/bin/phoronix-test-suite enterprise-setup >/dev/null 732 # get version of installed program and compare with package version 733 if [[ `${phoronix-test-suite}/bin/phoronix-test-suite version` != *"${version}"* ]]; then 734 echo "Error: program version does not match package version" 735 exit 1 736 fi 737 # run dummy command 738 ${phoronix-test-suite}/bin/phoronix-test-suite dummy_module.dummy-command >/dev/null 739 # needed for Nix to register the command as successful 740 touch $out 741 '' 742``` 743 744### Running package tests 745 746You can run these tests with: 747 748```ShellSession 749$ cd path/to/nixpkgs 750$ nix-build -A phoronix-test-suite.tests 751``` 752 753### Examples of package tests 754 755Here are examples of package tests: 756 757- [Jasmin compile test](by-name/ja/jasmin/test-assemble-hello-world/default.nix) 758- [Lobster compile test](development/compilers/lobster/test-can-run-hello-world.nix) 759- [Spacy annotation test](development/python-modules/spacy/annotation-test/default.nix) 760- [Libtorch test](development/libraries/science/math/libtorch/test/default.nix) 761- [Multiple tests for nanopb](./by-name/na/nanopb/package.nix) 762 763### Linking NixOS module tests to a package 764 765Like [package tests][larger-package-tests] as shown above, [NixOS module tests](https://nixos.org/manual/nixos/stable/#sec-nixos-tests) can also be linked to a package, so that the tests can be easily run when changing the related package. 766 767For example, assuming we're packaging `nginx`, we can link its module test via `passthru.tests`: 768 769```nix 770{ stdenv, lib, nixosTests }: 771 772stdenv.mkDerivation { 773 # ... 774 775 passthru.tests = { 776 nginx = nixosTests.nginx; 777 }; 778 779 # ... 780} 781``` 782 783## Automatic package updates 784[automatic-package-updates]: #automatic-package-updates 785 786Nixpkgs periodically tries to update all packages that have a `passthru.updateScript` attribute. 787 788> [!Note] 789> A common pattern is to use the [`nix-update-script`](../pkgs/by-name/ni/nix-update/nix-update-script.nix) attribute provided in Nixpkgs, which runs [`nix-update`](https://github.com/Mic92/nix-update): 790> 791> ```nix 792> { stdenv, nix-update-script }: 793> stdenv.mkDerivation { 794> # ... 795> passthru.updateScript = nix-update-script { }; 796> } 797> ``` 798> 799> For simple packages, this is often enough, and will ensure that the package is updated automatically by [`nixpkgs-update`](https://github.com/nix-community/nixpkgs-update) when a new version is released. 800> The [update bot](https://nix-community.org/update-bot) runs periodically to attempt to automatically update packages, and will run `passthru.updateScript` if set. 801> While not strictly necessary if the project is listed on [Repology](https://repology.org), using `nix-update-script` allows the package to update via many more sources (e.g. GitHub releases). 802 803The `passthru.updateScript` attribute can contain one of the following: 804 805- an executable file, either on the file system: 806 807 ```nix 808 { stdenv }: 809 stdenv.mkDerivation { 810 # ... 811 passthru.updateScript = ./update.sh; 812 } 813 ``` 814 815 or inside the expression itself: 816 817 ```nix 818 { stdenv, writeScript }: 819 stdenv.mkDerivation { 820 # ... 821 passthru.updateScript = writeScript "update-zoom-us" '' 822 #!/usr/bin/env nix-shell 823 #!nix-shell -i bash -p curl pcre2 common-updater-scripts 824 825 set -eu -o pipefail 826 827 version="$(curl -sI https://zoom.us/client/latest/zoom_x86_64.tar.xz | grep -Fi 'Location:' | pcre2grep -o1 '/(([0-9]\.?)+)/')" 828 update-source-version zoom-us "$version" 829 ''; 830 } 831 ``` 832 833- a list, a script file followed by arguments to be passed to it: 834 835 ```nix 836 { stdenv }: 837 stdenv.mkDerivation { 838 # ... 839 passthru.updateScript = [ ../../update.sh pname "--requested-release=unstable" ]; 840 } 841 ``` 842 843- an attribute set containing: 844 - `command` 845 846 A string or list in the [format expected by `passthru.updateScript`][automatic-package-updates] 847 848 - `attrPath` (optional) 849 850 A string containing the canonical attribute path for the package. 851 852 If present, it will be passed to the update script instead of the attribute path on which the package was discovered during Nixpkgs traversal. 853 854 - `supportedFeatures` (optional) 855 856 A list of the [extra features the script supports][supported-features]. 857 858 ```nix 859 { stdenv }: 860 stdenv.mkDerivation rec { 861 pname = "my-package"; 862 # ... 863 passthru.updateScript = { 864 command = [ ../../update.sh pname ]; 865 attrPath = pname; 866 supportedFeatures = [ /* ... */ ]; 867 }; 868 } 869 ``` 870 871### How are update scripts executed? 872 873Update scripts are to be invoked by the [automatic package update script](../maintainers/scripts/update.nix). 874You can run `nix-shell maintainers/scripts/update.nix` in the root of Nixpkgs repository for information on how to use it. 875`update.nix` offers several modes for selecting packages to update, and it will execute update scripts for all matched packages that have an `updateScript` attribute. 876 877Each update script will be passed the following environment variables: 878 879- [`UPDATE_NIX_NAME`] – content of the `name` attribute of the updated package 880- [`UPDATE_NIX_PNAME`] – content of the `pname` attribute of the updated package 881- [`UPDATE_NIX_OLD_VERSION`] – content of the `version` attribute of the updated package 882- [`UPDATE_NIX_ATTR_PATH`] – attribute path the `update.nix` discovered the package on (or the package's specified `attrPath` when available). Example: `pantheon.elementary-terminal` 883 884> [!Note] 885> An update script will be usually run from the root of the Nixpkgs repository, but you should not rely on that. 886> Also note that `update.nix` executes update scripts in parallel by default, so you should avoid running `git commit` or any other commands that cannot handle that. 887 888While update scripts should not create commits themselves, `update.nix` supports automatically creating commits when running it with `--argstr commit true`. 889If you need to customize commit message, you can have the update script implement the `commit` feature. 890 891### Supported features 892[update-script-supported-features]: #supported-features 893 894- `commit` 895 896 This feature allows update scripts to *ask* `update.nix` to create Git commits. 897 898 When support of this feature is declared, whenever the update script exits with `0` return status, it is expected to print a JSON list containing an object described below for each updated attribute to standard output. 899 Example: 900 901 ```json 902 [ 903 { 904 "attrPath": "volume_key", 905 "oldVersion": "0.3.11", 906 "newVersion": "0.3.12", 907 "files": [ 908 "/path/to/nixpkgs/pkgs/development/libraries/volume-key/default.nix" 909 ] 910 } 911 ] 912 ``` 913 ::: 914 915 When `update.nix` is run with `--argstr commit true`, it will create a separate commit for each of the objects. 916 An empty list can be returned when the script did not update any files; for example, when the package is already at the latest version. 917 918 The commit object contains the following values: 919 920 - `attrPath` – a string containing the attribute path 921 - `oldVersion` – a string containing the old version 922 - `newVersion` – a string containing the new version 923 - `files` – a non-empty list of file paths (as strings) to add to the commit 924 - `commitBody` (optional) – a string with extra content to be appended to the default commit message (useful for adding changelog links) 925 - `commitMessage` (optional) – a string to use instead of the default commit message 926 927 If the returned list contains exactly one object (e.g. `[{}]`), all values are optional and will be determined automatically. 928 929## Reviewing contributions 930 931### Package updates 932 933A package update is the most trivial and common type of pull request. These pull requests mainly consist of updating the version part of the package name and the source hash. 934 935It can happen that non-trivial updates include patches or more complex changes. 936 937Reviewing process: 938 939- Ensure that the package versioning [fits the guidelines](#versioning). 940- Ensure that the commit text [fits the guidelines](../CONTRIBUTING.md#commit-conventions). 941- Ensure that the package maintainers are notified. 942 - The continuous integration system will make GitHub notify users based on the submitted changes, but it can happen that it misses some of the package maintainers. 943- Ensure that the meta field information [fits the guidelines](#meta-attributes) and is correct: 944 - License can change with version updates, so it should be checked to match the upstream license. 945 - If the package has no maintainer, a maintainer must be set. This can be the update submitter or a community member that accepts to take maintainership of the package. 946- Ensure that the code contains no typos. 947- Build the package locally. 948 - Pull requests are often targeted to the master or staging branch, and building the pull request locally when it is submitted can trigger many source builds. 949 - It is possible to rebase the changes on nixos-unstable or nixpkgs-unstable for easier review by running the following commands from a nixpkgs clone. 950 951 ```ShellSession 952 $ git fetch origin nixos-unstable 953 $ git fetch origin pull/PRNUMBER/head 954 $ git rebase --onto nixos-unstable BASEBRANCH FETCH_HEAD 955 ``` 956 957 - The first command fetches the nixos-unstable branch. 958 - The second command fetches the pull request changes, `PRNUMBER` is the number at the end of the pull request title and `BASEBRANCH` the base branch of the pull request. 959 - The third command rebases the pull request changes to the nixos-unstable branch. 960 - The [nixpkgs-review](https://github.com/Mic92/nixpkgs-review) tool can be used to review a pull request content in a single command. `PRNUMBER` should be replaced by the number at the end of the pull request title. You can also provide the full github pull request url. 961 962 ```ShellSession 963 $ nix-shell -p nixpkgs-review --run "nixpkgs-review pr PRNUMBER" 964 ``` 965- Run every binary. 966 967Sample template for a package update review is provided below. 968 969```markdown 970##### Reviewed points 971 972- [ ] package name fits guidelines 973- [ ] package version fits guidelines 974- [ ] package builds on ARCHITECTURE 975- [ ] executables tested on ARCHITECTURE 976- [ ] all depending packages build 977- [ ] patches have a comment describing either the upstream URL or a reason why the patch wasn't upstreamed 978- [ ] patches that are remotely available are fetched rather than vendored 979 980##### Possible improvements 981 982##### Comments 983``` 984 985### New packages 986 987New packages are a common type of pull requests. These pull requests consists in adding a new nix-expression for a package. 988 989Review process: 990 991- Ensure that all file paths [fit the guidelines](../CONTRIBUTING.md#file-naming-and-organisation). 992- Ensure that the package name and version [fits the guidelines](#package-naming). 993- Ensure that the package versioning [fits the guidelines](#versioning). 994- Ensure that the commit text [fits the guidelines](../CONTRIBUTING.md#commit-conventions). 995- Ensure that the meta fields [fits the guidelines](#meta-attributes) and contain the correct information: 996 - License must match the upstream license. 997 - Platforms should be set (or the package will not get binary substitutes). 998 - Maintainers must be set. This can be the package submitter or a community member that accepts taking up maintainership of the package. 999 - The `meta.mainProgram` must be set if a main executable exists. 1000- Report detected typos. 1001- Ensure the package source: 1002 - Uses `mirror://` URLs when available. 1003 - Uses the most appropriate functions (e.g. packages from GitHub should use `fetchFromGitHub`). 1004- Build the package locally. 1005- Run every binary. 1006 1007Sample template for a new package review is provided below. 1008 1009```markdown 1010##### Reviewed points 1011 1012- [ ] package path fits guidelines 1013- [ ] package name fits guidelines 1014- [ ] package version fits guidelines 1015- [ ] package builds on ARCHITECTURE 1016- [ ] executables tested on ARCHITECTURE 1017- [ ] `meta.description` is set and fits guidelines 1018- [ ] `meta.license` fits upstream license 1019- [ ] `meta.platforms` is set 1020- [ ] `meta.maintainers` is set 1021- [ ] `meta.mainProgram` is set, if applicable. 1022- [ ] build time only dependencies are declared in `nativeBuildInputs` 1023- [ ] source is fetched using the appropriate function 1024- [ ] the list of `phases` is not overridden 1025- [ ] when a phase (like `installPhase`) is overridden it starts with `runHook preInstall` and ends with `runHook postInstall`. 1026- [ ] patches have a comment describing either the upstream URL or a reason why the patch wasn't upstreamed 1027- [ ] patches that are remotely available are fetched rather than vendored 1028 1029##### Possible improvements 1030 1031##### Comments 1032``` 1033 1034## Security 1035 1036### Submitting security fixes 1037[security-fixes]: #submitting-security-fixes 1038 1039Security fixes are submitted in the same way as other changes and thus the same guidelines apply. 1040 1041- If a new version fixing the vulnerability has been released, update the package; 1042- If the security fix comes in the form of a patch and a CVE is available, then add the patch to the Nixpkgs tree, and apply it to the package. 1043 The name of the patch should be the CVE identifier, so e.g. `CVE-2019-13636.patch`; If a patch is fetched the name needs to be set as well, e.g.: 1044 1045 ```nix 1046 (fetchpatch { 1047 name = "CVE-2019-11068.patch"; 1048 url = "https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6.patch"; 1049 hash = "sha256-SEKe/8HcW0UBHCfPTTOnpRlzmV2nQPPeL6HOMxBZd14="; 1050 }) 1051 ``` 1052 1053If a security fix applies to both master and a stable release then, similar to regular changes, they are preferably delivered via master first and cherry-picked to the release branch. 1054 1055Critical security fixes may by-pass the staging branches and be delivered directly to release branches such as `master` and `release-*`. 1056 1057### Vulnerability Roundup 1058 1059#### Issues 1060 1061Vulnerable packages in Nixpkgs are managed using issues. 1062Currently opened ones can be found using the following: 1063 1064[github.com/NixOS/nixpkgs/issues?q=is:issue+is:open+"Vulnerability+roundup"](https://github.com/NixOS/nixpkgs/issues?q=is%3Aissue+is%3Aopen+%22Vulnerability+roundup%22) 1065 1066Each issue correspond to a vulnerable version of a package; As a consequence: 1067 1068- One issue can contain several CVEs; 1069- One CVE can be shared across several issues; 1070- A single package can be concerned by several issues. 1071 1072 1073A "Vulnerability roundup" issue usually respects the following format: 1074 1075```txt 1076<link to relevant package search on search.nix.gsc.io>, <link to relevant files in Nixpkgs on GitHub> 1077 1078<list of related CVEs, their CVSS score, and the impacted NixOS version> 1079 1080<list of the scanned Nixpkgs versions> 1081 1082<list of relevant contributors> 1083``` 1084 1085Note that there can be an extra comment containing links to previously reported (and still open) issues for the same package. 1086 1087 1088#### Triaging and Fixing 1089 1090**Note**: An issue can be a "false positive" (i.e. automatically opened, but without the package it refers to being actually vulnerable). 1091If you find such a "false positive", comment on the issue an explanation of why it falls into this category, linking as much information as the necessary to help maintainers double check. 1092 1093If you are investigating a "true positive": 1094 1095- Find the earliest patched version or a code patch in the CVE details; 1096- Is the issue already patched (version up-to-date or patch applied manually) in Nixpkgs's `master` branch? 1097 - **No**: 1098 - [Submit a security fix][security-fixes]; 1099 - Once the fix is merged into `master`, [submit the change to the vulnerable release branch(es)](../CONTRIBUTING.md#how-to-backport-pull-requests); 1100 - **Yes**: [Backport the change to the vulnerable release branch(es)](../CONTRIBUTING.md#how-to-backport-pull-requests). 1101- When the patch has made it into all the relevant branches (`master`, and the vulnerable releases), close the relevant issue(s).