1# Contributing to Nixpkgs packages 2 3This document is for people wanting to contribute specifically to the package collection in Nixpkgs. 4See the [CONTRIBUTING.md](../CONTRIBUTING.md) document for more general information. 5 6## Overview 7 8- [`top-level`](./top-level): Entrypoints, package set aggregations 9 - [`impure.nix`](./top-level/impure.nix), [`default.nix`](./top-level/default.nix), [`config.nix`](./top-level/config.nix): Definitions for the evaluation entry point of `import <nixpkgs>` 10 - [`stage.nix`](./top-level/stage.nix), [`all-packages.nix`](./top-level/all-packages.nix), [`by-name-overlay.nix`](./top-level/by-name-overlay.nix), [`splice.nix`](./top-level/splice.nix): Definitions for the top-level attribute set made available through `import <nixpkgs> {…}` 11 - `*-packages.nix`, [`linux-kernels.nix`](./top-level/linux-kernels.nix), [`unixtools.nix`](./top-level/unixtools.nix): Aggregations of nested package sets defined in `development` 12 - [`aliases.nix`](./top-level/aliases.nix), [`python-aliases.nix`](./top-level/python-aliases.nix): Aliases for package definitions that have been renamed or removed 13 - `release*.nix`, [`make-tarball.nix`](./top-level/make-tarball.nix), [`packages-config.nix`](./top-level/packages-config.nix), [`metrics.nix`](./top-level/metrics.nix), [`nixpkgs-basic-release-checks.nix`](./top-level/nixpkgs-basic-release-checks.nix): Entry-points and utilities used by Hydra for continuous integration 14- [`development`](./development) 15 - `*-modules`, `*-packages`, `*-pkgs`: Package definitions for nested package sets 16 - All other directories loosely categorise top-level package definitions, see [category hierarchy][categories] 17- [`build-support`](./build-support): [Builders](https://nixos.org/manual/nixpkgs/stable/#part-builders) 18 - `fetch*`: [Fetchers](https://nixos.org/manual/nixpkgs/stable/#chap-pkgs-fetchers) 19- [`stdenv`](./stdenv): [Standard environment](https://nixos.org/manual/nixpkgs/stable/#part-stdenv) 20- [`pkgs-lib`](./pkgs-lib): Definitions for utilities that need packages but are not needed for packages 21- [`test`](./test): Tests not directly associated with any specific packages 22- [`by-name`](./by-name): Top-level packages organised by name ([docs](./by-name/README.md)) 23- All other directories loosely categorise top-level packages definitions, see [category hierarchy][categories] 24 25## Quick Start to Adding a Package 26 27We welcome new contributors of new packages to Nixpkgs, arguably the greatest software database known. 28However, each new package comes with a cost for the maintainers, Continuous Integration, caching servers and users downloading Nixpkgs. 29 30Before adding a new package, please consider the following questions: 31 32* Is the package ready for general use? 33 We don't want to include projects that are too immature or are going to be abandoned immediately. 34 In case of doubt, check with upstream. 35* Does the project have a clear license statement? 36 Remember that software is unfree by default (all rights reserved), and merely providing access to the source code does not imply its redistribution. 37 In case of doubt, ask upstream. 38* How realistic is it that it will be used by other people? 39 It's good that nixpkgs caters to various niches, but if it's a niche of 5 people it's probably too small. 40 A good estimate is checking upstream issues and pull requests, or other software repositories. 41 * Library packages should have at least one dependent. 42 If possible, that dependent should be packaged in the same PR the library is added in, as a sanity check. 43 If it is not possible to package the dependent, a minimal test program should be added to `passthru.tests`. 44* Is the software actively maintained upstream? 45 Especially packages that are security-critical, rely on fast-moving dependencies, or affect data integrity should see regular maintenance. 46* Are you willing to maintain the package? 47 You should care enough about the package to be willing to keep it up and running for at least one complete Nixpkgs' release life-cycle. 48 * In case you are not able to maintain the package you wrote, you can seek someone to fill that role, effectively adopting the package. 49 50If any of these questions' answer is no, then you should probably not add the package. 51 52Special care has to be taken with security-critical software components. 53Because entries in the Nix store are inert and do nothing by themselves, packages should be considered by their intended use, e.g. when used together with a NixOS module. 54 55* Any package that immediately would need to be tagged with `meta.knownVulnerabilities` is unlikely to be fit for nixpkgs. 56* Any package depending on a known-vulnerable library should be considered carefully. 57* Packages typically used with untrusted data should have a maintained and responsible upstream. 58 For example: 59 * Any package which does not follow upstream security policies should be considered vulnerable. 60 In particular, packages that vendor or fork web engines like Blink, Gecko or Webkit need to keep up with the frequent updates of those projects. 61 * Any security-critical fast-moving package such as Chrome or Firefox (or their forks) must have at least one active committer among the maintainers. 62 This ensures no critical fixes are delayed unnecessarily, endangering unsuspecting users. 63 * Services which typically work on web traffic are working on untrusted input. 64 * Data (such as archives or rich documents) commonly shared over untrusted channels (e.g. email) is untrusted. 65* Applications in the Unix authentication stack such as PAM/D-Bus modules or SUID binaries should be considered carefully, and should have a maintained and responsible upstream. 66* Encryption libraries should have a maintained and responsible upstream. 67* Security-critical components that are part of larger packages should be unvendored (=use the nixpkgs package as dependency, instead of vendored and pinned sources). 68* A "responsible upstream" includes various aspects, such as: 69 * channels to disclose security concerns 70 * being responsive to security concerns, providing fixes or workarounds 71 * transparent public disclosure of security issues when they are found or fixed 72 * These aspects are sometimes hard to verify, in which case an upstream that is not known to be irresponsible should be considered as responsible. 73* Source-available software should be built from source where possible. 74 Binary blobs risk supply chain attacks and vendored outdated libraries. 75 76This section describes a general framework of understanding and exceptions might apply. 77 78Luckily it's pretty easy to maintain your own package set with Nix, which can then be added to the [Nix User Repository](https://github.com/nix-community/nur) project. 79 80--- 81 82Now that this is out of the way. 83To add a package to Nixpkgs: 84 851. Checkout the Nixpkgs source tree: 86 87 ```ShellSession 88 $ git clone https://github.com/NixOS/nixpkgs 89 $ cd nixpkgs 90 ``` 91 922. Create a package directory `pkgs/by-name/so/some-package` where `some-package` is the package name and `so` is the lowercased 2-letter prefix of the package name: 93 94 ```ShellSession 95 $ mkdir -p pkgs/by-name/so/some-package 96 ``` 97 98 For more detailed information, see [here](./by-name/README.md). 99 1003. Create a `package.nix` file in the package directory, containing a Nix expression — a piece of code that describes how to build the package. 101 In this case, it should be a _function_ that is called with the package dependencies as arguments, and returns a build of the package in the Nix store. 102 103 ```ShellSession 104 $ emacs pkgs/by-name/so/some-package/package.nix 105 $ git add pkgs/by-name/so/some-package/package.nix 106 ``` 107 108 If the package is written in a language other than C, you should use [the corresponding language framework](https://nixos.org/manual/nixpkgs/stable/#chap-language-support). 109 110 You can have a look at the existing Nix expressions under `pkgs/` to see how it’s done, some of which are also using the [category hierarchy](#category-hierarchy). 111 Here are some good ones: 112 113 - GNU Hello: [`pkgs/by-name/he/hello/package.nix`](./by-name/he/hello/package.nix). 114 Trivial package, which specifies some `meta` attributes which is good practice. 115 116 - GNU cpio: [`pkgs/by-name/cp/cpio/package.nix`](./by-name/cp/cpio/package.nix). 117 Also a simple package. 118 The generic builder in `stdenv` does everything for you. 119 It has no dependencies beyond `stdenv`. 120 121 - GNU Multiple Precision arithmetic library (GMP): [`pkgs/development/libraries/gmp`](development/libraries/gmp). 122 Also done by the generic builder, but has a dependency on `m4`. 123 124 - Pan, a GTK-based newsreader: [`pkgs/by-name/pa/pan/package.nix`](./by-name/pa/pan/package.nix). 125 Has an optional dependency on `gspell`, which is only built if `spellCheck` is `true`. 126 127 - Apache HTTPD: [`pkgs/servers/http/apache-httpd/2.4.nix`](servers/http/apache-httpd/2.4.nix). 128 A bunch of optional features, variable substitutions in the configure flags, a post-install hook, and miscellaneous hackery. 129 130 - buildMozillaMach: [`pkgs/build-support/build-mozilla-mach/default.nix`](./build-support/build-mozilla-mach/default.nix). 131 A reusable build function for Firefox, Thunderbird and Librewolf. 132 133 - JDiskReport, a Java utility: [`pkgs/by-name/jd/jdiskreport/package.nix`](./by-name/jd/jdiskreport/package.nix). 134 Nixpkgs doesn’t have a decent `stdenv` for Java yet so this is pretty ad-hoc. 135 136 - XML::Simple, a Perl module: [`pkgs/top-level/perl-packages.nix`](top-level/perl-packages.nix) (search for the `XMLSimple` attribute). 137 Most Perl modules are so simple to build that they are defined directly in `perl-packages.nix`; no need to make a separate file for them. 138 139 - Discord Game SDK: [`pkgs/by-name/di/discord-gamesdk/package.nix`](./by-name/di/discord-gamesdk/package.nix). 140 Shows how binary-only packages can be supported. 141 In particular, the `autoPatchelfHook` is used to set the RUNPATH and ELF interpreter of the executables so that the right libraries are found at runtime. 142 143 Some notes: 144 145 - Add yourself as the maintainer of the package. 146 147 - If this is your first time contributing (welcome!), [add yourself to the maintainers list](../maintainers/README.md#how-to-become-a-maintainer) in a separate commit. 148 149 - All other [`meta`](https://nixos.org/manual/nixpkgs/stable/#chap-meta) attributes are optional, but it’s still a good idea to provide at least the `description`, `homepage` and [`license`](https://nixos.org/manual/nixpkgs/stable/#sec-meta-license). 150 151 - The exact syntax and semantics of the Nix expression language, including the built-in functions, are [Nix language reference](https://nixos.org/manual/nix/stable/language/). 152 1535. To test whether the package builds, run the following command from the root of the nixpkgs source tree: 154 155 ```ShellSession 156 $ nix-build -A some-package 157 ``` 158 159 where `some-package` should be the package name. 160 You may want to add the flag `-K` to keep the temporary build directory in case something fails. 161 If the build succeeds, a symlink `./result` to the package in the Nix store is created. 162 1636. If you want to install the package into your profile (optional), do 164 165 ```ShellSession 166 $ nix-env -f . -iA libfoo 167 ``` 168 1697. Optionally commit the new package and open a pull request [to nixpkgs](https://github.com/NixOS/nixpkgs/pulls), or use [the Patches category](https://discourse.nixos.org/t/about-the-patches-category/477) on Discourse for sending a patch without a GitHub account. 170 171## Commit conventions 172 173- Make sure you read about the [commit conventions](../CONTRIBUTING.md#commit-conventions) common to Nixpkgs as a whole. 174 175- Format the commit messages in the following way: 176 177 ``` 178 (pkg-name): (from -> to | init at version | refactor | etc) 179 180 (Motivation for change. Link to release notes. Additional information.) 181 ``` 182 183 Examples: 184 185 * nginx: init at 2.0.1 186 * firefox: 54.0.1 -> 55.0 187 188 https://www.mozilla.org/en-US/firefox/55.0/releasenotes/ 189 190(using "→" instead of "->" is also accepted) 191 192Using the `(pkg-name):` prefix is important beyond just being a convention: it queues automatic builds by CI. 193More sophisticated prefixes are also possible: 194 195| Message | Automatic Builds | 196|--------------------------------------------------------------------------|------------------------------------------------------------| 197| `vim: 1.0.0 -> 2.0.0` | `vim` | 198| `vagrant: fix dependencies for version 2.0.2` | `vagrant` | 199| `python3{9,10}Packages.requests: 1.0.0 -> 2.0.0` | `python39Packages.requests`, `python310Packages.requests` | 200| `python312.pkgs.numpy,python313.pkgs.scipy: fix build` | `python312.pkgs.numpy` , `python313.pkgs.scipy` | 201 202When opening a PR with multiple commits, CI creates a single build job for all detected packages. 203If `passthru.tests` attributes are available, these will be built as well. 204 205If the title of the _PR_ begins with `WIP:` or contains `[WIP]` anywhere, its packages are not built automatically. 206Other than that, PR titles have meaning only for humans. 207It is recommended to keep the PR title in sync with the commit title, to make it easier to find. 208For PRs with multiple commits, the PR title should be a general summary of these commits. 209 210> [!NOTE] 211> Marking a PR as a draft does not prevent automatic builds. 212 213## Category Hierarchy 214[categories]: #category-hierarchy 215 216Most top-level packages are organised in a loosely-categorised directory hierarchy in this directory. 217See the [overview](#overview) for which directories are part of this. 218 219This category hierarchy is partially deprecated and will be migrated away over time. 220The new `pkgs/by-name` directory ([docs](./by-name/README.md)) should be preferred instead. 221The category hierarchy may still be used for packages that should be imported using an alternate `callPackage`, such as `python3Packages.callPackage` or `libsForQt5.callPackage`. 222 223If that is the case for a new package, here are some rules for picking the right category. 224Many packages fall under several categories; what matters is the _primary_ purpose of a package. 225For example, the `libxml2` package builds both a library and some tools; but it’s a library foremost, so it goes under `pkgs/development/libraries`. 226 227<details> 228<summary>Categories</summary> 229 230**If it’s used to support _software development_:** 231 232- **If it’s a _library_ used by other packages:** 233 234 - `development/libraries` (e.g. `libxml2`) 235 236- **If it’s a _compiler_:** 237 238 - `development/compilers` (e.g. `gcc`) 239 240- **If it’s an _interpreter_:** 241 242 - `development/interpreters` (e.g. `guile`) 243 244- **If it’s a (set of) development _tool(s)_:** 245 246 - **If it’s a _parser generator_ (including lexers):** 247 248 - `development/tools/parsing` (e.g. `bison`, `flex`) 249 250 - **If it’s a _build manager_:** 251 252 - `development/tools/build-managers` (e.g. `gnumake`) 253 254 - **If it’s a _language server_:** 255 256 - `development/tools/language-servers` (e.g. `ccls` or `nil`) 257 258 - **Else:** 259 260 - `development/tools/misc` (e.g. `binutils`) 261 262- **Else:** 263 264 - `development/misc` 265 266**If it’s a (set of) _tool(s)_:** 267 268(A tool is a relatively small program, especially one intended to be used non-interactively.) 269 270- **If it’s for _networking_:** 271 272 - `tools/networking` (e.g. `wget`) 273 274- **If it’s for _text processing_:** 275 276 - `tools/text` (e.g. `diffutils`) 277 278- **If it’s a _system utility_, i.e., something related or essential to the operation of a system:** 279 280 - `tools/system` (e.g. `cron`) 281 282- **If it’s an _archiver_ (which may include a compression function):** 283 284 - `tools/archivers` (e.g. `zip`, `tar`) 285 286- **If it’s a _compression_ program:** 287 288 - `tools/compression` (e.g. `gzip`, `bzip2`) 289 290- **If it’s a _security_-related program:** 291 292 - `tools/security` (e.g. `nmap`, `gnupg`) 293 294- **Else:** 295 296 - `tools/misc` 297 298**If it’s a _shell_:** 299 300- `shells` (e.g. `bash`) 301 302**If it’s a _server_:** 303 304- **If it’s a web server:** 305 306 - `servers/http` (e.g. `apache-httpd`) 307 308- **If it’s an implementation of the X Windowing System:** 309 310 - `servers/x11` (e.g. `xorg` — this includes the client libraries and programs) 311 312- **Else:** 313 314 - `servers/misc` 315 316**If it’s a _desktop environment_:** 317 318- `desktops` (e.g. `kde`, `gnome`, `enlightenment`) 319 320**If it’s a _window manager_:** 321 322- `applications/window-managers` (e.g. `awesome`, `stumpwm`) 323 324**If it’s an _application_:** 325 326A (typically large) program with a distinct user interface, primarily used interactively. 327 328- **If it’s a _version management system_:** 329 330 - `applications/version-management` (e.g. `subversion`) 331 332- **If it’s a _terminal emulator_:** 333 334 - `applications/terminal-emulators` (e.g. `alacritty` or `rxvt` or `termite`) 335 336- **If it’s a _file manager_:** 337 338 - `applications/file-managers` (e.g. `mc` or `ranger` or `pcmanfm`) 339 340- **If it’s for _video playback / editing_:** 341 342 - `applications/video` (e.g. `vlc`) 343 344- **If it’s for _graphics viewing / editing_:** 345 346 - `applications/graphics` (e.g. `gimp`) 347 348- **If it’s for _networking_:** 349 350 - **If it’s a _mailreader_:** 351 352 - `applications/networking/mailreaders` (e.g. `thunderbird`) 353 354 - **If it’s a _newsreader_:** 355 356 - `applications/networking/newsreaders` (e.g. `pan`) 357 358 - **If it’s a _web browser_:** 359 360 - `applications/networking/browsers` (e.g. `firefox`) 361 362 - **Else:** 363 364 - `applications/networking/misc` 365 366- **Else:** 367 368 - `applications/misc` 369 370**If it’s _data_ (i.e., does not have a straight-forward executable semantics):** 371 372- **If it’s a _font_:** 373 374 - `data/fonts` 375 376- **If it’s an _icon theme_:** 377 378 - `data/icons` 379 380- **If it’s related to _SGML/XML processing_:** 381 382 - **If it’s an _XML DTD_:** 383 384 - `data/sgml+xml/schemas/xml-dtd` (e.g. `docbook`) 385 386 - **If it’s an _XSLT stylesheet_:** 387 388 (Okay, these are executable...) 389 390 - `data/sgml+xml/stylesheets/xslt` (e.g. `docbook-xsl`) 391 392- **If it’s a _theme_ for a _desktop environment_, a _window manager_ or a _display manager_:** 393 394 - `data/themes` 395 396**If it’s a _game_:** 397 398- `games` 399 400**Else:** 401 402- `misc` 403 404</details> 405 406# Conventions 407 408The key words _must_, _must not_, _required_, _shall_, _shall not_, _should_, _should not_, _recommended_, _may_, and _optional_ in this section are to be interpreted as described in [RFC 2119](https://tools.ietf.org/html/rfc2119). 409Only _emphasized_ words are to be interpreted in this way. 410 411## Package naming 412 413In Nixpkgs, there are generally three different names associated with a package: 414 415- The `pname` attribute of the derivation. 416 This is what most users see, in particular when using `nix-env`. 417 418- The attribute name used for the package in the [`pkgs/by-name` structure](./by-name/README.md) or in [`all-packages.nix`](./top-level/all-packages.nix), and when passing it as a dependency in recipes. 419 420- The filename for (the directory containing) the Nix expression. 421 422Most of the time, these are the same. 423For instance, the package `e2fsprogs` has a `pname` attribute `"e2fsprogs"`, is bound to the attribute name `e2fsprogs` in `all-packages.nix`, and the Nix expression is in `pkgs/os-specific/linux/e2fsprogs/default.nix`. 424 425Follow these guidelines: 426 427- For the `pname` attribute: 428 429 - It _should_ be identical to the upstream package name. 430 431 - It _must not_ contain uppercase letters. 432 433 Example: Use `"mplayer"` instead of `"MPlayer"` 434 435- For the package attribute name: 436 437 - It _must_ be a valid identifier in Nix. 438 439 - If the `pname` starts with a digit, the attribute name _should_ be prefixed with an underscore. 440 Otherwise the attribute name _should not_ be prefixed with an underline. 441 442 Example: The corresponding attribute name for `0ad` should be `_0ad`. 443 444 - New attribute names _should_ be the same as the value in `pname`. 445 446 Hyphenated names _should not_ be converted to [snake case](https://en.wikipedia.org/wiki/Snake_case) or [camel case](https://en.wikipedia.org/wiki/Camel_case). 447 This was done historically, but is not necessary any more. 448 [The Nix language allows dashes in identifiers since 2012](https://github.com/NixOS/nix/commit/95c74eae269b2b9e4bc514581b5caa1d80b54acc). 449 450 - If there are multiple versions of a package, this _should_ be reflected in the attribute names in `all-packages.nix`. 451 452 Example: `json-c_0_9` and `json-c_0_11` 453 454 If there is an obvious “default” version, make an extra attribute. 455 456 Example: `json-c = json-c_0_9;` 457 458 See also [versioning][versioning]. 459 460## Versioning 461[versioning]: #versioning 462 463These are the guidelines the `version` attribute of a package: 464 465- It _must_ start with a digit. 466 This is required for backwards-compatibility with [how `nix-env` parses derivation names](https://nix.dev/manual/nix/latest/command-ref/nix-env#selectors). 467 468 Example: `"0.3.1rc2"` or `"0-unstable-1970-01-01"` 469 470- If a package is a commit from a repository without a version assigned, then the `version` attribute _should_ be the latest upstream version preceding that commit, followed by `-unstable-` and the date of the (fetched) commit. 471 The date _must_ be in `"YYYY-MM-DD"` format. 472 473 Example: Given a project had its latest releases `2.2` in November 2021 and `3.0` in January 2022, a commit authored on March 15, 2022 for an upcoming bugfix release `2.2.1` would have `version = "2.2-unstable-2022-03-15"`. 474 475- If a project has no suitable preceding releases - e.g., no versions at all, or an incompatible versioning or tagging scheme - then the latest upstream version in the above schema should be `0`. 476 477 Example: Given a project that has no tags or released versions at all, or applies versionless tags like `latest` or `YYYY-MM-DD-Build`, a commit authored on March 15, 2022 would have `version = "0-unstable-2022-03-15"`. 478 479Because every version of a package in Nixpkgs creates a potential maintenance burden, old versions of a package should not be kept unless there is a good reason to do so. 480For instance, Nixpkgs contains several versions of GCC because other packages don’t build with the latest version of GCC. 481Other examples are having both the latest stable and latest pre-release version of a package, or to keep several major releases of an application that differ significantly in functionality. 482 483If there is only one version of a package, its Nix expression should be named (e.g) `pkgs/by-name/xy/xyz/package.nix`. 484If there are multiple versions, this should be reflected in the attribute name. 485If you wish to share code between the Nix expressions of each version, you cannot rely upon `pkgs/by-name`'s automatic attribute creation, and must create the attributes yourself in `all-packages.nix`. 486See also [`pkgs/by-name/README.md`'s section on this topic](https://github.com/NixOS/nixpkgs/blob/master/pkgs/by-name/README.md#recommendation-for-new-packages-with-multiple-versions). 487 488## Meta attributes 489 490The `meta` attribute set should always be placed last in the derivativion and any other "meta"-like attribute sets like `passthru` should be written before it. 491 492* `meta.description` must: 493 * Be short, just one sentence. 494 * Be capitalized. 495 * Not start with the definite or an indefinite article. 496 * Not start with the package name. 497 * More generally, it should not refer to the package name. 498 * Not end with a period (or any punctuation for that matter). 499 * Provide factual information. 500 * Avoid subjective language. 501* `meta.license` must be set and match the upstream license. 502 * If there is no upstream license, `meta.license` should default to `lib.licenses.unfree`. 503 * If in doubt, try to contact the upstream developers for clarification. 504* `meta.mainProgram` must be set to the name of the executable which facilitates the primary function or purpose of the package, if there is such an executable in `$bin/bin/` (or `$out/bin/`, if there is no `"bin"` output). 505 * Packages that only have a single executable in the applicable directory above should set `meta.mainProgram`. 506 For example, the package `ripgrep` only has a single executable `rg` under `$out/bin/`, so `ripgrep.meta.mainProgram` is set to `"rg"`. 507 * Packages like `polkit_gnome` that have no executables in the applicable directory should not set `meta.mainProgram`. 508 * Packages like `e2fsprogs` that have multiple executables, none of which can be considered the main program, should not set `meta.mainProgram`. 509 * Packages which are not primarily used for a single executable do not need to set `meta.mainProgram`. 510 * Always prefer using a hardcoded string (don't use `pname`, for example). 511 * When in doubt, ask for reviewer input. 512* `meta.maintainers` must be set for new packages. 513 514See the Nixpkgs manual for more details on [standard meta-attributes](https://nixos.org/nixpkgs/manual/#sec-standard-meta-attributes). 515 516## Import From Derivation 517 518[Import From Derivation](https://nixos.org/manual/nix/unstable/language/import-from-derivation) (IFD) is disallowed in Nixpkgs for performance reasons: 519[Hydra](https://github.com/NixOS/hydra) evaluates the entire package set, and sequential builds during evaluation would increase evaluation times to become impractical. 520 521Import From Derivation can be worked around in some cases by committing generated intermediate files to version control and reading those instead. 522 523## `overrideAttrs` and `overridePythonAttrs` 524 525Please do not introduce new uses of `overrideAttrs` or `overridePythonAttrs` in Nixpkgs. 526These functions are useful for out-of-tree code because they allow easy overriding a package without changing its source in Nixpkgs, but when contributing to Nixpkgs you *can* change the source of other packages. So instead of using the escape hatch that is overriding, you should try to provide proper support for the functionality you need, in ways that are visible and can be understood and accounted for by the maintainers of the patched package. 527Using `overrideAttrs` and `overridePythonAttrs` in Nixpkgs causes maintainability problems: 528 529* It's easy for multiple packages to end up duplicating basically the same override without noticing. 530* It's not clear when working on an overridden package that it's being overridden elsewhere in Nixpkgs, so `overrideAttrs` and `overridePythonAttrs` are fragile and can break accidentally when the overridden package is changed. 531* Package maintainers will not be requested for review of overrides, even though they are likely to have important knowledge about the package. 532* It is easy for overridden packages to be forgotten and remain around long after they are no longer necessary. 533* Dependency closures end up being bigger than necessary due to unnecessarily including multiple versions of the same package. 534 535Instead, keep all instances of the same package next to each other, and try to minimize how many different instances of a package are in Nixpkgs. 536If you need a patch applied to a dependency, discuss with the maintainer of that dependency whether it would be acceptable to apply to the main version of the package. 537If you need a different version of a dependency, first try modifying your package to work with the version in Nixpkgs — it's often not very hard! — and if that's not possible, try to factor out a function that can build multiple versions of the package, including the main version. 538If you need to enable or disable optional functionality of a dependency, add an explicit flag to the package and use `override` instead. 539 540## Sources 541 542Always fetch source files using [Nixpkgs fetchers](https://nixos.org/manual/nixpkgs/unstable/#chap-pkgs-fetchers). 543Use reproducible sources with a high degree of availability. 544Prefer protocols that support proxies. 545 546A list of schemes for `mirror://` URLs can be found in [`pkgs/build-support/fetchurl/mirrors.nix`](build-support/fetchurl/mirrors.nix), and is supported by [`fetchurl`](https://nixos.org/manual/nixpkgs/unstable/#fetchurl). 547Other fetchers which end up relying on `fetchurl` may also support mirroring. 548 549The preferred source hash type is `sha256`. 550 551Examples going from bad to best practices: 552 553- Bad: Uses `git://` which won't be proxied. 554 555 ```nix 556 { 557 src = fetchgit { 558 url = "git://github.com/NixOS/nix.git"; 559 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 560 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 561 }; 562 } 563 ``` 564 565- Better: This is ok, but an archive fetch will still be faster. 566 567 ```nix 568 { 569 src = fetchgit { 570 url = "https://github.com/NixOS/nix.git"; 571 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 572 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 573 }; 574 } 575 ``` 576 577- Best: Fetches a snapshot archive for the given revision. 578 579 ```nix 580 { 581 src = fetchFromGitHub { 582 owner = "NixOS"; 583 repo = "nix"; 584 rev = "1f795f9f44607cc5bec70d1300150bfefcef2aae"; 585 hash = "sha256-7D4m+saJjbSFP5hOwpQq2FGR2rr+psQMTcyb1ZvtXsQ="; 586 }; 587 } 588 ``` 589 590> [!Note] 591> When fetching from GitHub, always reference revisions by their full commit hash. 592> GitHub shares commit hashes among all forks and returns `404 Not Found` when a short commit hash is ambiguous. 593> It already happened in Nixpkgs for short, 6-character commit hashes. 594> 595> Pushing large amounts of auto generated commits into forks is a practical vector for a denial-of-service attack, and was already [demonstrated against GitHub Actions Beta](https://blog.teddykatz.com/2019/11/12/github-actions-dos.html). 596 597## Patches 598 599Sometimes, changes are needed to the source to allow building a derivation in nixpkgs, or to get earlier access to an upstream fix or improvement. 600When using the `patches` parameter to `mkDerivation`, make sure the patch name clearly describes the reason for the patch, or add a comment. 601 602> [!Note] 603> The version of the package does not need to be changed just because a patch is applied. 604> Declarative package installations don't depend on the version, while imperative `nix-env` installations can use [`upgrade --eq/leq/--always`](https://nix.dev/manual/nix/2.25/command-ref/nix-env/upgrade#flags). 605> 606> See [Versioning](#versioning) for details on package versioning. 607 608The following describes two ways to include the patch. 609Regardless of how the patch is included, you _must_ ensure its purpose is clear and obvious. 610This enables other maintainers to more easily determine when old patches are no longer required. 611Typically, you can improve clarity with carefully considered filenames, attribute names, and/or comments; these should explain the patch's _intention_. 612Additionally, it may sometimes be helpful to clarify _how_ it resolves the issue. 613For example: _"fix gcc14 build by adding missing include"_. 614 615### Fetching patches 616 617In the interest of keeping our maintenance burden and the size of Nixpkgs to a minimum, patches already merged upstream or published elsewhere _should_ be retrieved using `fetchpatch2`: 618 619```nix 620{ 621 patches = [ 622 (fetchpatch2 { 623 name = "make-no-atomics-a-soft-failure.patch"; 624 url = "https://github.com/boostorg/math/commit/7d482f6ebc356e6ec455ccb5f51a23971bf6ce5b.patch?full_index=1"; 625 hash = "sha256-9Goa0NTUdSOs1Vm+FnkoSFhw0o8ZLNOw6cLUqCVnF5Y="; 626 }) 627 ]; 628} 629``` 630 631> [!Warning] 632> If the patch file contains short commit hashes, use `fetchpatch` instead of `fetchpatch2` ([tracking issue](https://github.com/NixOS/nixpkgs/issues/257446)). 633> This is the case if the patch contains a line similar to `index 0c97fcc35..f533e464a 100644`. 634> Depending on the patch source it is possible to expand the commit hash, in which case using `fetchpatch2` is acceptable (e.g. GitHub supports appending `?full_index=1` to the URL, as seen above). 635 636If a patch is available online but does not cleanly apply, it can be modified in some fixed ways by using additional optional arguments for `fetchpatch2`. 637Check [the `fetchpatch` reference](https://nixos.org/manual/nixpkgs/unstable/#fetchpatch) for details. 638 639When adding patches in this manner you should be reasonably sure that the used URL is stable. 640Patches referencing open pull requests will change when the PR is updated and code forges (such as GitHub) usually garbage collect commits that are no longer reachable due to rebases/amends. 641 642### Vendoring patches 643 644In the following cases, a `.patch` file _should_ be added to Nixpkgs repository, instead of retrieved: 645 646- solves problems unique to packaging in Nixpkgs 647- cannot be fetched easily 648- has a high chance to disappear in the future due to unstable or unreliable URLs 649 650The latter avoids link rot when the upstream abandons, squashes or rebases their change, in which case the commit may get garbage-collected. 651 652```nix 653{ patches = [ ./0001-add-missing-include.patch ]; } 654``` 655 656If you do need to do create this sort of patch file, one way to do so is with git: 657 6581. Move to the root directory of the source code you're patching. 659 660 ```ShellSession 661 $ cd the/program/source 662 ``` 663 6642. If a git repository is not already present, create one and stage all of the source files. 665 666 ```ShellSession 667 $ git init 668 $ git add -A 669 ``` 670 6713. Edit some files to make whatever changes need to be included in the patch. 672 6734. Use git to create a diff, and pipe the output to a patch file: 674 675 ```ShellSession 676 $ git diff -a > nixpkgs/pkgs/the/package/0001-changes.patch 677 ``` 678 679## Deprecating/removing packages 680 681There is currently no policy when to remove a package. 682 683Before removing a package, one should try to find a new maintainer or fix smaller issues first. 684 685### Steps to remove a package from Nixpkgs 686 687We use jbidwatcher as an example for a discontinued project here. 688 6891. Have Nixpkgs checked out locally and up to date. 6901. Create a new branch for your change, e.g. `git checkout -b jbidwatcher` 6911. Remove the actual package including its directory, e.g. `git rm -rf pkgs/applications/misc/jbidwatcher` 6921. Remove the package from the list of all packages (`pkgs/top-level/all-packages.nix`). 6931. Add an alias for the package name in `pkgs/top-level/aliases.nix` (There is also `pkgs/applications/editors/vim/plugins/aliases.nix`. 694 Package sets typically do not have aliases, so we can't add them there.) 695 696 For example in this case: 697 698 ```nix 699 { 700 jbidwatcher = throw "jbidwatcher was discontinued in march 2021"; # added 2021-03-15 701 } 702 ``` 703 704 The throw message should explain in short why the package was removed for users that still have it installed. 705 7061. Test if the changes introduced any issues by running `nix-env -qaP -f . --show-trace`. 707 It should show the list of packages without errors. 7081. Commit the changes. 709 Explain again why the package was removed. 710 If it was declared discontinued upstream, add a link to the source. 711 712 ```ShellSession 713 $ git add pkgs/applications/misc/jbidwatcher/default.nix pkgs/top-level/all-packages.nix pkgs/top-level/aliases.nix 714 $ git commit 715 ``` 716 717 Example commit message: 718 719 ``` 720 jbidwatcher: remove 721 722 project was discontinued in march 2021. the program does not work anymore because ebay changed the login. 723 724 https://web.archive.org/web/20210315205723/http://www.jbidwatcher.com/ 725 ``` 726 7271. Push changes to your GitHub fork with `git push` 7281. Create a pull request against Nixpkgs. 729 Mention the package maintainer. 730 731This is how the pull request looks like in this case: [https://github.com/NixOS/nixpkgs/pull/116470](https://github.com/NixOS/nixpkgs/pull/116470) 732 733## Package tests 734 735To run the main types of tests locally: 736 737- Run package-internal tests with `nix-build --attr pkgs.PACKAGE.passthru.tests` 738- Run [NixOS tests](https://nixos.org/manual/nixos/unstable/#sec-nixos-tests) with `nix-build --attr nixosTests.NAME`, where `NAME` is the name of the test listed in `nixos/tests/all-tests.nix` 739- Run [global package tests](https://nixos.org/manual/nixpkgs/unstable/#sec-package-tests) with `nix-build --attr tests.PACKAGE`, where `PACKAGE` is the name of the test listed in `pkgs/test/default.nix` 740- See `lib/tests/NAME.nix` for instructions on running specific library tests 741 742Tests are important to ensure quality and make reviews and automatic updates easy. 743 744The following types of tests exists: 745 746* [NixOS **module tests**](https://nixos.org/manual/nixos/stable/#sec-nixos-tests), which spawn one or more NixOS VMs. 747 They exercise both NixOS modules and the packaged programs used within them. 748 For example, a NixOS module test can start a web server VM running the `nginx` module, and a client VM running `curl` or a graphical `firefox`, and test that they can talk to each other and display the correct content. 749* Nix **package tests** are a lightweight alternative to NixOS module tests. 750 They should be used to create simple integration tests for packages, but cannot test NixOS services, and some programs with graphical user interfaces may also be difficult to test with them. 751* The **`checkPhase` of a package**, which should execute the unit tests that are included in the source code of a package. 752 753Here in the nixpkgs manual we describe mostly _package tests_; for _module tests_ head over to the corresponding [section in the NixOS manual](https://nixos.org/manual/nixos/stable/#sec-nixos-tests). 754 755### Writing inline package tests 756 757For very simple tests, they can be written inline: 758 759```nix 760# ... , 761{ yq-go }: 762 763buildGoModule rec { 764 # … 765 766 passthru.tests = { 767 simple = runCommand "${pname}-test" { } '' 768 echo "test: 1" | ${yq-go}/bin/yq eval -j > $out 769 [ "$(cat $out | tr -d $'\n ')" = '{"test":1}' ] 770 ''; 771 }; 772} 773``` 774 775Any derivation can be specified as a test, even if it's in a different file. 776Such a derivation that implements a test can depend on the package under test, even in the presence of `overrideAttrs`. 777 778In the following example, `(my-package.overrideAttrs f).passthru.tests` will work as expected, as long as the definition of `tests` does not rely on the original `my-package` or overrides all occurrences of `my-package`: 779 780```nix 781# my-package/default.nix 782{ stdenv, callPackage }: 783stdenv.mkDerivation (finalAttrs: { 784 # ... 785 passthru.tests.example = callPackage ./example.nix { my-package = finalAttrs.finalPackage; }; 786}) 787``` 788 789```nix 790# my-package/example.nix 791{ 792 runCommand, 793 lib, 794 my-package, 795 ... 796}: 797runCommand "my-package-test" 798 { 799 nativeBuildInputs = [ my-package ]; 800 src = lib.sources.sourcesByRegex ./. [ 801 ".*.in" 802 ".*.expected" 803 ]; 804 } 805 '' 806 my-package --help 807 my-package <example.in >example.actual 808 diff -U3 --color=auto example.expected example.actual 809 mkdir $out 810 '' 811``` 812 813### Writing larger package tests 814[larger-package-tests]: #writing-larger-package-tests 815 816This is an example using the `phoronix-test-suite` package with the current best practices. 817 818Add the tests in `passthru.tests` to the package definition like this: 819 820```nix 821{ 822 stdenv, 823 lib, 824 fetchurl, 825 callPackage, 826}: 827 828stdenv.mkDerivation { 829 # … 830 831 passthru.tests = { 832 simple-execution = callPackage ./tests.nix { }; 833 }; 834 835 meta = { 836 # … 837 }; 838} 839``` 840 841Create `tests.nix` in the package directory: 842 843```nix 844{ runCommand, phoronix-test-suite }: 845 846let 847 inherit (phoronix-test-suite) pname version; 848 849in 850runCommand "${pname}-tests" { meta.timeout = 60; } '' 851 # automatic initial setup to prevent interactive questions 852 ${phoronix-test-suite}/bin/phoronix-test-suite enterprise-setup >/dev/null 853 # get version of installed program and compare with package version 854 if [[ `${phoronix-test-suite}/bin/phoronix-test-suite version` != *"${version}"* ]]; then 855 echo "Error: program version does not match package version" 856 exit 1 857 fi 858 # run dummy command 859 ${phoronix-test-suite}/bin/phoronix-test-suite dummy_module.dummy-command >/dev/null 860 # needed for Nix to register the command as successful 861 touch $out 862'' 863``` 864 865### Running package tests 866 867You can run these tests with: 868 869```ShellSession 870$ cd path/to/nixpkgs 871$ nix-build -A phoronix-test-suite.tests 872``` 873 874### Examples of package tests 875 876Here are examples of package tests: 877 878- [Jasmin compile test](by-name/ja/jasmin/test-assemble-hello-world/default.nix) 879- [Lobster compile test](development/compilers/lobster/test-can-run-hello-world.nix) 880- [Spacy annotation test](development/python-modules/spacy/annotation-test/default.nix) 881- [Libtorch test](development/libraries/science/math/libtorch/test/default.nix) 882- [Multiple tests for nanopb](./by-name/na/nanopb/package.nix) 883 884### Linking NixOS module tests to a package 885 886Like [package tests][larger-package-tests] as shown above, [NixOS module tests](https://nixos.org/manual/nixos/stable/#sec-nixos-tests) can also be linked to a package, so that the tests can be easily run when changing the related package. 887 888For example, assuming we're packaging `nginx`, we can link its module test via `passthru.tests`: 889 890```nix 891{ 892 stdenv, 893 lib, 894 nixosTests, 895}: 896 897stdenv.mkDerivation { 898 # ... 899 900 passthru.tests = { 901 nginx = nixosTests.nginx; 902 }; 903 904 # ... 905} 906``` 907 908## Automatic package updates 909[automatic-package-updates]: #automatic-package-updates 910 911Nixpkgs periodically tries to update all packages that have a `passthru.updateScript` attribute. 912 913> [!Note] 914> A common pattern is to use the [`nix-update-script`](../pkgs/by-name/ni/nix-update/nix-update-script.nix) attribute provided in Nixpkgs, which runs [`nix-update`](https://github.com/Mic92/nix-update): 915> 916> ```nix 917> { stdenv, nix-update-script }: 918> stdenv.mkDerivation { 919> # ... 920> passthru.updateScript = nix-update-script { }; 921> } 922> ``` 923> 924> For simple packages, this is often enough, and will ensure that the package is updated automatically by [`nixpkgs-update`](https://github.com/nix-community/nixpkgs-update) when a new version is released. 925> The [update bot](https://nix-community.org/update-bot) runs periodically to attempt to automatically update packages, and will run `passthru.updateScript` if set. 926> While not strictly necessary if the project is listed on [Repology](https://repology.org), using `nix-update-script` allows the package to update via many more sources (e.g. GitHub releases). 927 928The `passthru.updateScript` attribute can contain one of the following: 929 930- an executable file, either on the file system: 931 932 ```nix 933 { stdenv }: 934 stdenv.mkDerivation { 935 # ... 936 passthru.updateScript = ./update.sh; 937 } 938 ``` 939 940 or inside the expression itself: 941 942 ```nix 943 { stdenv, writeScript }: 944 stdenv.mkDerivation { 945 # ... 946 passthru.updateScript = writeScript "update-zoom-us" '' 947 #!/usr/bin/env nix-shell 948 #!nix-shell -i bash -p curl pcre2 common-updater-scripts 949 950 set -eu -o pipefail 951 952 version="$(curl -sI https://zoom.us/client/latest/zoom_x86_64.tar.xz | grep -Fi 'Location:' | pcre2grep -o1 '/(([0-9]\.?)+)/')" 953 update-source-version zoom-us "$version" 954 ''; 955 } 956 ``` 957 958- a list, a script file followed by arguments to be passed to it: 959 960 ```nix 961 { stdenv }: 962 stdenv.mkDerivation { 963 # ... 964 passthru.updateScript = [ 965 ../../update.sh 966 pname 967 "--requested-release=unstable" 968 ]; 969 } 970 ``` 971 972- an attribute set containing: 973 - `command` 974 975 A string or list in the [format expected by `passthru.updateScript`][automatic-package-updates] 976 977 - `attrPath` (optional) 978 979 A string containing the canonical attribute path for the package. 980 981 If present, it will be passed to the update script instead of the attribute path on which the package was discovered during Nixpkgs traversal. 982 983 - `supportedFeatures` (optional) 984 985 A list of the [extra features the script supports][supported-features]. 986 987 ```nix 988 { stdenv }: 989 stdenv.mkDerivation rec { 990 pname = "my-package"; 991 # ... 992 passthru.updateScript = { 993 command = [ 994 ../../update.sh 995 pname 996 ]; 997 attrPath = pname; 998 supportedFeatures = [ 999 # ... 1000 ]; 1001 }; 1002 } 1003 ``` 1004 1005### How are update scripts executed? 1006 1007Update scripts are to be invoked by the [automatic package update script](../maintainers/scripts/update.nix). 1008You can run `nix-shell maintainers/scripts/update.nix` in the root of Nixpkgs repository for information on how to use it. 1009`update.nix` offers several modes for selecting packages to update, and it will execute update scripts for all matched packages that have an `updateScript` attribute. 1010 1011Update scripts will be run inside the [Nixpkgs development shell](../shell.nix), providing access to some useful tools for CI. 1012Furthermore each update script will be passed the following environment variables: 1013 1014- [`UPDATE_NIX_NAME`] – content of the `name` attribute of the updated package 1015- [`UPDATE_NIX_PNAME`] – content of the `pname` attribute of the updated package 1016- [`UPDATE_NIX_OLD_VERSION`] – content of the `version` attribute of the updated package 1017- [`UPDATE_NIX_ATTR_PATH`] – attribute path the `update.nix` discovered the package on (or the package's specified `attrPath` when available). 1018 Example: `pantheon.elementary-terminal` 1019 1020> [!Note] 1021> An update script will be usually run from the root of the Nixpkgs repository, but you should not rely on that. 1022> Also note that `update.nix` executes update scripts in parallel by default, so you should avoid running `git commit` or any other commands that cannot handle that. 1023 1024While update scripts should not create commits themselves, `update.nix` supports automatically creating commits when running it with `--argstr commit true`. 1025If you need to customize commit message, you can have the update script implement the `commit` feature. 1026 1027### Supported features 1028[update-script-supported-features]: #supported-features 1029 1030- `commit` 1031 1032 This feature allows update scripts to *ask* `update.nix` to create Git commits. 1033 1034 When support of this feature is declared, whenever the update script exits with `0` return status, it is expected to print a JSON list containing an object described below for each updated attribute to standard output. 1035 Example: 1036 1037 ```json 1038 [ 1039 { 1040 "attrPath": "volume_key", 1041 "oldVersion": "0.3.11", 1042 "newVersion": "0.3.12", 1043 "files": [ 1044 "/path/to/nixpkgs/pkgs/development/libraries/volume-key/default.nix" 1045 ] 1046 } 1047 ] 1048 ``` 1049 ::: 1050 1051 When `update.nix` is run with `--argstr commit true`, it will create a separate commit for each of the objects. 1052 An empty list can be returned when the script did not update any files; for example, when the package is already at the latest version. 1053 1054 The commit object contains the following values: 1055 1056 - `attrPath` – a string containing the attribute path 1057 - `oldVersion` – a string containing the old version 1058 - `newVersion` – a string containing the new version 1059 - `files` – a non-empty list of file paths (as strings) to add to the commit 1060 - `commitBody` (optional) – a string with extra content to be appended to the default commit message (useful for adding changelog links) 1061 - `commitMessage` (optional) – a string to use instead of the default commit message 1062 1063 If the returned list contains exactly one object (e.g. `[{}]`), all values are optional and will be determined automatically. 1064 1065## Reviewing contributions 1066 1067### Package updates 1068 1069A package update is the most trivial and common type of pull request. 1070These pull requests mainly consist of updating the version part of the package name and the source hash. 1071 1072It can happen that non-trivial updates include patches or more complex changes. 1073 1074Reviewing process: 1075 1076- Ensure that the package versioning [fits the guidelines](#versioning). 1077- Ensure that the commit text [fits the guidelines](../CONTRIBUTING.md#commit-conventions). 1078- Ensure that the package maintainers are notified. 1079 - The continuous integration system will make GitHub notify users based on the submitted changes, but it can happen that it misses some of the package maintainers. 1080- Ensure that the meta field information [fits the guidelines](#meta-attributes) and is correct: 1081 - License can change with version updates, so it should be checked to match the upstream license. 1082 - If the package has no maintainer, a maintainer must be set. 1083 This can be the update submitter or a community member that accepts to take maintainership of the package. 1084- Verify any change of upstream. 1085 - If switching from e.g. PyPi to GitHub, verify that the repo is the official one. 1086 - If switching to a fork, check with external sources like other package repositories for community consensus. 1087- Ensure any special packaging choices and required context are documented in i.e. the name of a patch or in a comment. 1088 - If a special version of a package is pinned, document why, so others know if/when it can be unpinned. 1089 - If any (especially opinionated) patch or `substituteInPlace` is applied, document why. 1090 - If any non-default build flags are set, document why. 1091 - If checks are partially or fully disabled, document why. 1092- Ensure that the code contains no typos. 1093- Build the package locally. 1094 - Pull requests are often targeted to the master or staging branch, and building the pull request locally when it is submitted can trigger many source builds. 1095 - It is possible to rebase the changes on nixos-unstable or nixpkgs-unstable for easier review by running the following commands from a nixpkgs clone. 1096 1097 ```ShellSession 1098 $ git fetch origin nixos-unstable 1099 $ git fetch origin pull/PRNUMBER/head 1100 $ git rebase --onto nixos-unstable BASEBRANCH FETCH_HEAD 1101 ``` 1102 1103 - The first command fetches the nixos-unstable branch. 1104 - The second command fetches the pull request changes, `PRNUMBER` is the number at the end of the pull request title and `BASEBRANCH` the base branch of the pull request. 1105 - The third command rebases the pull request changes to the nixos-unstable branch. 1106 - The [nixpkgs-review](https://github.com/Mic92/nixpkgs-review) tool can be used to review a pull request content in a single command. 1107 `PRNUMBER` should be replaced by the number at the end of the pull request title. 1108 You can also provide the full github pull request url. 1109 1110 ```ShellSession 1111 $ nix-shell -p nixpkgs-review --run "nixpkgs-review pr PRNUMBER" 1112 ``` 1113- Run every binary. 1114 1115Sample template for a package update review is provided below. 1116 1117```markdown 1118##### Reviewed points 1119 1120- [ ] package name fits guidelines 1121- [ ] package version fits guidelines 1122- [ ] package builds on ARCHITECTURE 1123- [ ] executables tested on ARCHITECTURE 1124- [ ] any change of upstream are verified 1125- [ ] the motives for any special packaging choices are documented 1126- [ ] all depending packages build 1127- [ ] patches have a comment describing either the upstream URL or a reason why the patch wasn't upstreamed 1128- [ ] patches that are remotely available are fetched rather than vendored 1129 1130##### Possible improvements 1131 1132##### Comments 1133``` 1134 1135### New packages 1136 1137New packages are a common type of pull requests. 1138These pull requests consist in adding a new nix-expression for a package. 1139 1140Review process: 1141 1142- Ensure that all file paths [fit the guidelines](../CONTRIBUTING.md#file-naming-and-organisation). 1143- Ensure that the package name and version [fits the guidelines](#package-naming). 1144- Ensure that the package versioning [fits the guidelines](#versioning). 1145- Ensure that the commit text [fits the guidelines](../CONTRIBUTING.md#commit-conventions). 1146- Ensure that the source is fetched from an official location, one of our [trusted mirrors](./build-support/fetchurl/mirrors.nix), or a mirror trusted by the authors. 1147- Ensure that the meta fields [fits the guidelines](#meta-attributes) and contain the correct information: 1148 - License must match the upstream license. 1149 - Platforms should be set (or the package will not get binary substitutes). 1150 - Maintainers must be set. 1151 This can be the package submitter or a community member that accepts taking up maintainership of the package. 1152 - The `meta.mainProgram` must be set if a main executable exists. 1153- Ensure any special packaging choices and required context are documented in, i.e., the name of a patch or in a comment. 1154 - If a special version of a package is pinned, document why, so others know if/when it can be unpinned. 1155 - If any (especially opinionated) patch or `substituteInPlace` is applied, document why. 1156 - If any non-default build flags are set, document why. 1157 - If checks are partially or fully disabled, document why. 1158- Report detected typos. 1159- Ensure the package source: 1160 - Uses `mirror://` URLs when available. 1161 - Uses the most appropriate functions (e.g. packages from GitHub should use `fetchFromGitHub`). 1162- Build the package locally. 1163- Run every binary. 1164 1165Sample template for a new package review is provided below. 1166 1167```markdown 1168##### Reviewed points 1169 1170- [ ] package path fits guidelines 1171- [ ] package name fits guidelines 1172- [ ] package version fits guidelines 1173- [ ] package builds on ARCHITECTURE 1174- [ ] executables tested on ARCHITECTURE 1175- [ ] `meta.description` is set and fits guidelines 1176- [ ] `meta.license` fits upstream license 1177- [ ] `meta.platforms` is set 1178- [ ] `meta.maintainers` is set 1179- [ ] `meta.mainProgram` is set, if applicable. 1180- [ ] build time only dependencies are declared in `nativeBuildInputs` 1181- [ ] source is fetched from an official or trusted location 1182- [ ] source is fetched using the appropriate function 1183- [ ] the motives for any special packaging choices are documented 1184- [ ] the list of `phases` is not overridden 1185- [ ] when a phase (like `installPhase`) is overridden it starts with `runHook preInstall` and ends with `runHook postInstall`. 1186- [ ] patches have a comment describing either the upstream URL or a reason why the patch wasn't upstreamed 1187- [ ] patches that are remotely available are fetched rather than vendored 1188 1189##### Possible improvements 1190 1191##### Comments 1192``` 1193 1194## Security 1195 1196### Submitting security fixes 1197[security-fixes]: #submitting-security-fixes 1198 1199Security fixes are submitted in the same way as other changes and thus the same guidelines apply. 1200 1201- If a new version fixing the vulnerability has been released, update the package; 1202- If the security fix comes in the form of a patch and a CVE is available, then add the patch to the Nixpkgs tree, and apply it to the package. 1203 The name of the patch should be the CVE identifier, so e.g. `CVE-2019-13636.patch`; If a patch is fetched the name needs to be set as well, e.g.: 1204 1205 ```nix 1206 (fetchpatch { 1207 name = "CVE-2019-11068.patch"; 1208 url = "https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6.patch"; 1209 hash = "sha256-SEKe/8HcW0UBHCfPTTOnpRlzmV2nQPPeL6HOMxBZd14="; 1210 }) 1211 ``` 1212 1213If a security fix applies to both master and a stable release then, similar to regular changes, they are preferably delivered via master first and cherry-picked to the release branch. 1214 1215Critical security fixes may by-pass the staging branches and be delivered directly to release branches such as `master` and `release-*`. 1216 1217### Vulnerability Roundup 1218 1219#### Issues 1220 1221Vulnerable packages in Nixpkgs are managed using issues. 1222Currently opened ones can be found using the following: 1223 1224[github.com/NixOS/nixpkgs/issues?q=is:issue+is:open+"Vulnerability+roundup"](https://github.com/NixOS/nixpkgs/issues?q=is%3Aissue+is%3Aopen+%22Vulnerability+roundup%22) 1225 1226Each issue corresponds to a vulnerable version of a package; as a consequence: 1227 1228- One issue can contain several CVEs; 1229- One CVE can be shared across several issues; 1230- A single package can be concerned by several issues. 1231 1232 1233A "Vulnerability roundup" issue usually respects the following format: 1234 1235```txt 1236<link to relevant package search on search.nix.gsc.io>, <link to relevant files in Nixpkgs on GitHub> 1237 1238<list of related CVEs, their CVSS score, and the impacted NixOS version> 1239 1240<list of the scanned Nixpkgs versions> 1241 1242<list of relevant contributors> 1243``` 1244 1245Note that there can be an extra comment containing links to previously reported (and still open) issues for the same package. 1246 1247 1248#### Triaging and Fixing 1249 1250**Note**: An issue can be a "false positive" (i.e. automatically opened, but without the package it refers to being actually vulnerable). 1251If you find such a "false positive", comment on the issue an explanation of why it falls into this category, linking as much information as the necessary to help maintainers double check. 1252 1253If you are investigating a "true positive": 1254 1255- Find the earliest patched version or a code patch in the CVE details; 1256- Is the issue already patched (version up-to-date or patch applied manually) in Nixpkgs's `master` branch? 1257 - **No**: 1258 - [Submit a security fix][security-fixes]; 1259 - Once the fix is merged into `master`, [submit the change to the vulnerable release branch(es)](../CONTRIBUTING.md#how-to-backport-pull-requests); 1260 - **Yes**: [Backport the change to the vulnerable release branch(es)](../CONTRIBUTING.md#how-to-backport-pull-requests). 1261- When the patch has made it into all the relevant branches (`master`, and the vulnerable releases), close the relevant issue(s).