blob: 049c03673f8e951c17008277b19c7d12812ddc35 [file] [log] [blame] [view]
zpeng8d6f584a2016-12-16 20:50:281# Adding third_party Libraries
2
3[TOC]
4
5Using third party code can save time and is consistent with our values - no need
6to reinvent the wheel! We put all code that isn't written by Chromium developers
Dirk Pranke568e95c2018-11-01 23:41:507into `//third_party` (even if you end up modifying just a few functions). We do
zpeng8d6f584a2016-12-16 20:50:288this to make it easy to track license compliance, security patches, and supply
9the right credit and attributions. It also makes it a lot easier for other
10projects that embed our code to track what is Chromium licensed and what is
11covered by other licenses.
12
Dirk Pranke568e95c2018-11-01 23:41:5013## Put the code in //third_party
zpeng8d6f584a2016-12-16 20:50:2814
Dirk Pranke568e95c2018-11-01 23:41:5015By default, all code should be checked into [//third_party](../third_party/),
16for the reasons given above. Other locations are only appropriate in a few
17situations and need explicit approval; don't assume that because there's some
18other directory with third_party in the name it's okay to put new things
19there.
zpeng8d6f584a2016-12-16 20:50:2820
Tim van der Lippe5870ac32019-10-18 11:46:5421## Before you start
22
23To make sure the inclusion of a new third_party project makes sense for the
Alex Mineer55764332022-02-25 18:05:1924Chromium project, you should first obtain
John Abd-El-Malek704bca02022-12-14 18:47:5925[Chrome ATL](../ATL_OWNERS) approval. Please include the following information in an
John Abd-El-Malekf44dc07b2023-02-07 02:39:1126email to chrome-atls-discuss@google.com:
Yaron Friedmane34271392022-04-29 16:45:5327* Motivation of your project
28* Design docs
29* Additional checkout size
John Abd-El-Malekdde7f232022-12-14 23:41:5030 * If the increase is significant (e.g., 20+ MB), can we consider limiting the
31 files to be checked in?
Yaron Friedmane34271392022-04-29 16:45:5332* Build time increase
John Abd-El-Malekdde7f232022-12-14 23:41:5033 * If the increase is significant (e.g., 30+ seconds), can we consider making
34 this an optional build target?
35* Binary size increase on Android ([official](https://www.chromium.org/developers/gn-build-configuration) builds)
36 * Any 16 KB increase on Android is flagged on the build bots and
37 justification is needed.
Yaron Friedmane34271392022-04-29 16:45:5338* Binary size increase on Windows
John Abd-El-Malekdde7f232022-12-14 23:41:5039* Is this library maintained on all platforms that we will use it on?
40 * If not, will the Chrome org be expected to maintain this for some or all
41 platforms?
42* Does it have any performance / memory implications (esp. on Android)? Was the
43library designed with intended use on Android?
44* Do we really need the library? Is there any alternative such as an existing
45library already in Chromium? If introducing a library with similar functionality
46as existing, will it be easy for another developer to understand which should be
47used where? Will you commit to consolidating uses in Chromium and remove the
48alternative libraries?
49* For desktop (Win/Mac/Linux/ChromeOS), does the dependency introduce closed
50source components (e.g., binaries, WASM binaries, obfuscated code)? If yes,
51please reach out to Chrome ATLs.
52
Yaron Friedmane34271392022-04-29 16:45:5353
John Abd-El-Malek704bca02022-12-14 18:47:5954Googlers can access [go/chrome-atls](https://goto.google.com/chrome-atls) and review
55existing topics in g/chrome-atls, and can also come to office hours to ask
Alex Mineer55764332022-02-25 18:05:1956questions.
57
Scott Violet50a02e42022-11-29 20:02:3458### Rust
59
60Rust is allowed for third-party libraries as long as there is a business need,
61which includes the following:
62
63* The Rust implementation is the best (e.g., speed, memory, lack of bugs) or
64only existing implementation available for the third-party library.
65* The Rust implementation allows the operation to move to a higher privileged
66process, and this benefits the product by improving on guardrail metrics (e.g.
67through avoiding process startup, IPC overheads, or C++ memory-unsafety
68mitigations).
69* The Rust implementation can meaningfully reduce our expected risk of
70(memory/crashes/undefined behavior) bugs, when compared to the existing
71third-party library and related C++ code required to use the library. We realize
72assessing risk is quite complex and very nuanced. If this is the criteria by
John Abd-El-Malekf44dc07b2023-02-07 02:39:1173which the third-party library is being added, chrome-atls-discuss@google.com and
Scott Violet50a02e42022-11-29 20:02:3474chrome-rust@google.com may ask for more data.
75
76Support for third-party libraries written in Rust is in active development. If
77the library you wish to add is in Rust, reach out to chrome-rust@google.com
78first.
79
Yaron Friedmane34271392022-04-29 16:45:5380### A note on size constraints
81
82The size of Chromium derived executables can impact overall performance of those binaries as they
83need to run on a wide range of devices including those with extremely limited RAM. Additionally, we
84have experience from Windows of the binary size impacting successful patch rate of updates as well
85as constraints from the Android Ecosystem where APKs included in the system image have hard
86limits on their size due to allocation size of the system partition. For more details and
87guidelines on size increases see
Michael Cui5d517752022-11-01 14:11:3288[//docs/speed/binary_size/binary_size_explainer.md](speed/binary_size/binary_size_explainer.md) and Googlers can
89additionally check [go/chrome-binary-size](https://goto.google.com/chrome-binary-size)
Tim van der Lippe5870ac32019-10-18 11:46:5490
Rachael Newitt15546992023-09-17 22:13:0991### Binaries, obfuscated or minified code
92
93The addition of third-party dependencies that contain binaries, obfuscated
94code, or minified code is strongly discouraged. Code review is an important
95part of reducing risk to Chromium and a reviewer asked to approve a change
96that contains any of these has no way to determine the legitimacy of what
97they are approving. Minification for performance optimization is
98[usually not necessary](speed/binary_size/optimization_advice.md), and the
99trade-off in terms of understandability and security is rarely worth
100it.
101
102Where your dependency will form part of a release binary where size is a concern,
103there are existing tools which handle [compression for distribution](speed/binary_size/optimization_advice.md).
104
105You should not check in any pre-built binaries where there is an alternate,
106supported solution for getting them. If you need to compile from source,
107consider using [CIPD](cipd_and_3pp.md) instead.
108
Dirk Pranke4038090a2024-05-09 01:51:37109This is accessible to Googlers only. Non-Googlers can email one of the people
110in third_party/OWNERS for help.
Rachael Newitt15546992023-09-17 22:13:09111
112See [Chrome Code Policy](https://goto.google.com/chrome-code-policy)
113
114
Dirk Pranke568e95c2018-11-01 23:41:50115## Get the code
zpeng8d6f584a2016-12-16 20:50:28116
Dirk Pranke568e95c2018-11-01 23:41:50117There are two common ways to depend on third-party code: you can reference a
Jason D. Clintonb21e99b2021-09-30 19:19:58118Git repo directly (via entries in the DEPS file) or you can check in a
119snapshot. The former is preferable in most cases:
120
1211. If you are actively developing in the upstream repo, then having the DEPS
122 file include the upstream (that's been mirrored to GoB, see below) can be a
123 way to include those changes into Chromium at a particular revision. The
124 DEPS file will be updated to a new revision when you are ready to "roll" the
125 new version into Chromium. This also avoids duplicate copies of the code
126 showing up in multiple repos leading to contributor confusion.
1271. This interacts favorably with our upstream tracking automation. We
128 automatically consume the upstream Git hashes and match them against a
129 database of known upstreams to tracking drift between Chromium and upstream
130 sources.
1311. This makes adding deps that don't need local changes easier. E.g. some of
132 our automation automatically converts non-GN build rules into GN build rules
133 without any additional CLs.
134
135Checking in a snapshot is useful if this is effectively taking on maintenance
136of an unmaintained project (e.g. an ancient library that we're going to GN-ify
137that hasn't been updated in years). And, of course, if the code you need isn't
138in a Git repo, then you have to snapshot.
zpeng8d6f584a2016-12-16 20:50:28139
Tim van der Lippe5870ac32019-10-18 11:46:54140### Node packages
141
142To include a Node package, add the dependency to the
143[Node package.json](../third_party/node/package.json). Make sure to update
144the corresponding [`npm_exclude.txt`](../third_party/node/npm_exclude.txt)
145and [`npm_include.txt`](../third_party/node/npm_include.txt) to make the code
146available during checkout.
147
Dirk Pranke568e95c2018-11-01 23:41:50148### Pulling the code via DEPS
149
150If the code is in a Git repo that you want to mirror, please file an [infra git
151ticket](https://bugs.chromium.org/p/chromium/issues/entry?template=Infra-Git)
152to get the repo mirrored onto chromium.googlesource.com; we don't allow direct
153dependencies on non-Google-hosted repositories, so that we can still build
Jason D. Clintonb21e99b2021-09-30 19:19:58154if an external repository goes down.
Dirk Pranke568e95c2018-11-01 23:41:50155
156Once the mirror is set up, add an entry to [//DEPS](../DEPS) so that gclient
157will pull it in. If the code is only needed on some platforms, add a condition
158to the deps entry so that developers on other platforms don't pull in things
159they don't need.
160
161As for specifying the path where the library is fetched, a path like
162`//third_party/<project_name>/src` is highly recommended so that you can put
163the file like OWNERS or README.chromium at `//third_party/<project_name>`. If
164you have a wrong path in DEPS and want to change the path of the existing
165library in DEPS, please ask the infrastructure team before committing the
166change.
167
David Dorwin7fde299b2020-09-25 02:10:34168Lastly, add the new directory to Chromium's `//third_party/.gitignore`, so that
169it won't show up as untracked files when you run `git status` on the main
170repository.
Dirk Pranke568e95c2018-11-01 23:41:50171
172### Checking in the code directly
173
174If you are checking in a snapshot, please describe the source in the
175README.chromium file, described below. For security reasons, please retrieve
176the code as securely as you can, using HTTPS and GPG signatures if available.
177If retrieving a tarball, please do not check the tarball itself into the tree,
178but do list the source and the SHA-512 hash (for verification) in the
179README.chromium and Change List. The SHA-512 hash can be computed via
180`sha512sum` or `openssl dgst -sha512`. If retrieving from a git
181repository, please list the revision that the code was pulled from.
182
183If you are checking the files in directly, you do not need an entry in DEPS
David Dorwin7fde299b2020-09-25 02:10:34184and do not need to modify `//third_party/.gitignore`.
Dirk Pranke568e95c2018-11-01 23:41:50185
186### Checking in large files
187
Dirk Pranke4038090a2024-05-09 01:51:37188This is accessible to Googlers only. Non-Googlers can email one of the people
189in third_party/OWNERS for help.
Dirk Pranke568e95c2018-11-01 23:41:50190
191See [Moving large files to Google Storage](https://goto.google.com/checking-in-large-files)
192
193## Document the code's context
zpeng8d6f584a2016-12-16 20:50:28194
195### Add OWNERS
196
Dirk Pranke6d3bb8e2024-05-09 00:54:33197Your OWNERS file must either list the email addresses of two Chromium
198committers on the first two lines or include a `file:` directive to an OWNERS
199file within the `third_party` directory that itself conforms to this criterion.
200This will ensure accountability for maintenance of the code over time. While
201there isn't always an ideal or obvious set of people that should go in OWNERS,
202this is critical for first-line triage of any issues that crop up in the code.
zpeng8d6f584a2016-12-16 20:50:28203
204As an OWNER, you're expected to:
205
206* Remove the dependency when/if it is no longer needed
207* Update the dependency when a security or stability bug is fixed upstream
208* Help ensure the Chrome feature that uses the dependency continues to use the
209 dependency in the best way, as the feature and the dependency change over
210 time.
211
212### Add a README.chromium
213
214You need a README.chromium file with information about the project from which
215you're re-using code. See
Dirk Pranke568e95c2018-11-01 23:41:50216[//third_party/README.chromium.template](../third_party/README.chromium.template)
zpeng8d6f584a2016-12-16 20:50:28217for a list of fields to include. A presubmit check will check this has the right
218format.
219
Dirk Pranke568e95c2018-11-01 23:41:50220README.chromium files contain a field indicating whether the package is
221security-critical or not. A package is security-critical if it is compiled
222into the product and does any of the following:
223
224* Accepts untrustworthy inputs from the internet
225* Parses or interprets complex input formats
226* Sends data to internet servers
227* Collects new data
228* Influences or sets security-related policy (including the user experience)
229
Rachael Newittfc2e3342023-07-04 23:07:31230**CPE Prefix**
Adrian Taylor0a06ec32020-03-03 05:00:07231One of the fields is CPEPrefix. This is used by Chromium and Google systems to
232spot known upstream security vulnerabilities, and ensure we merge the fixes
233into our third-party copy. These systems are not foolproof, so as the OWNER,
234it's up to you to keep an eye out rather than solely relying on these
235automated systems. But, adding CPEs decreases the chances of us missing
236vulnerabilities, so they should always be added if possible.
237
238The CPE is a common format shared across the industry; you can look up the CPE
Anne Redulla04f91972023-08-31 04:09:19239for your package [here](https://nvd.nist.gov/products/cpe/search).
240* Use CPE format 2.3 (preferred) or CPE format 2.2 (supported).
241* If the CPE uses the 2.3 URI binding or 2.2 format (i.e. starts with "cpe:/"),
242and no version is explicitly specified within the `CPEPrefix`, the `Version`
243in the `README.chromium` file will be appended to the `CPEPrefix`, if available.
244 * Note: if the `Version` field is set to a git hash value, version matching
245 for vulnerabilities will fail.
246
247When searching for a CPE, you may find that there is not yet a CPE for the
248specific upstream version you're using. This is normal, as CPEs are typically
249allocated only when a vulnerability is found. You should follow the version
250number convention such that, when that does occur in future, we'll be notified.
251If no CPE is available, please specify "unknown".
Adrian Taylor0a06ec32020-03-03 05:00:07252
Adrian Taylor8e0d3fd2020-04-17 20:14:25253If you're using a patched or modified version which is halfway between two
254public versions, please "round downwards" to the lower of the public versions
255(it's better for us to be notified of false-positive vulnerabilities than
256false-negatives).
Adrian Taylor0a06ec32020-03-03 05:00:07257
Rachael Newittfc2e3342023-07-04 23:07:31258
259**Shipped**
260Your README.chromium should also specify whether your third party dependency
261will be shipped as part of a final binary. The "Shipped" field replaces the now
262deprecated special value of "NOT_SHIPPED" which was previously allowed in the
263"License File" field. This use is no longer supported and if your third party
264dependency includes a license you should also use the "Licence File" field to
265reference it, regardless of whether it is shipped or not.
266
267
Anne Redullab75419e2023-09-12 03:34:01268**Multiple packages**
269Each package should have its own README.chromium. However, if this is not
270possible and the information for multiple packages must be placed in a single
271README.chromium, use the below line to separate the data for each package:
272```
273-------------------- DEPENDENCY DIVIDER --------------------
274```
275
276
zpeng8d6f584a2016-12-16 20:50:28277### Add a LICENSE file and run related checks
278
279You need a LICENSE file. Example:
Dirk Pranke568e95c2018-11-01 23:41:50280[//third_party/libjpeg/LICENSE](../third_party/libjpeg/LICENSE).
zpeng8d6f584a2016-12-16 20:50:28281
Andrew Mellen2be00b92022-11-11 16:38:42282Run `//tools/licenses/licenses.py scan`; this will complain about incomplete or missing
Dirk Pranke568e95c2018-11-01 23:41:50283data for third_party checkins. We use `licenses.py credits` to generate the
284about:credits page in Google Chrome builds.
zpeng8d6f584a2016-12-16 20:50:28285
286If the library will never be shipped as a part of Chrome (e.g. build-time tools,
Rachael Newittfc2e3342023-07-04 23:07:31287testing tools), make sure to set the "Shipped" field to "no" so that the license
Rachael Newitt15546992023-09-17 22:13:09288is not included in about:credits page ([more on this below](#credits)).
zpeng8d6f584a2016-12-16 20:50:28289
Dirk Pranke568e95c2018-11-01 23:41:50290## Get a review
zpeng8d6f584a2016-12-16 20:50:28291
Aaron Gablefc8cdad2018-01-16 21:02:40292All third party additions and substantive changes like re-licensing need the
Dirk Pranke568e95c2018-11-01 23:41:50293following sign-offs. Some of these are accessible to Googlers only.
294Non-Googlers can email one of the people in
295[//third_party/OWNERS](../third_party/OWNERS) for help.
zpeng8d6f584a2016-12-16 20:50:28296
John Abd-El-Malek704bca02022-12-14 18:47:59297* Make sure you have the approval from Chrome ATLs as mentioned
Tim van der Lippe8c7498392019-10-28 12:21:04298 [above](#before-you-start).
Alex Rudenkof712a7f2022-02-23 17:55:36299* Get security@chromium.org (or chrome-security@google.com, Google-only)
300 approval. Email the list with relevant details and a link to the CL.
301 Third party code is a hot spot for security vulnerabilities.
Aaron Gablefc8cdad2018-01-16 21:02:40302 When adding a new package that could potentially carry security risk, make
303 sure to highlight risk to security@chromium.org. You may be asked to add
304 a README.security or, in dangerous cases, README.SECURITY.URGENTLY file.
Dirk Pranke6fb90c02018-10-17 02:02:20305* Add chromium-third-party@google.com as a reviewer on your change. This
Adam Langley88658b32018-11-20 22:12:47306 will trigger an automatic round-robin assignment to a reviewer who will check
307 licensing matters. These reviewers may not be able to +1 a change so look for
308 verbal approval in the comments. (This list does not receive or deliver
309 email, so only use it as a reviewer, not for other communication. Internally,
Michael Cui5d517752022-11-01 14:11:32310 see [cl/221704656](http://cl/221704656) for details about how
Dirk Prankef7432812020-06-10 22:38:20311 this is configured.). If you have questions about the third-party process,
312 ask one of the [//third_party/OWNERS](../third_party/OWNERS) instead.
Adam Langley88658b32018-11-20 22:12:47313* Lastly, if all other steps are complete, get a positive code review from a
314 member of [//third_party/OWNERS](../third_party/OWNERS) to land the change.
zpeng8d6f584a2016-12-16 20:50:28315
John Abd-El-Malek704bca02022-12-14 18:47:59316Please send separate emails to the ATLs and security@chromium.org.
317You can skip the ATL review and security@chromium.org when you are only moving
Kentaro Haracd328342022-02-25 08:25:44318existing directories in Chromium to //third_party/.
jochen893d5182017-01-31 22:01:49319
Dirk Pranke568e95c2018-11-01 23:41:50320Subsequent changes don't normally require third-party-owners or security
321approval; you can modify the code as much as you want. When you update code, be
322mindful of security-related mailing lists for the project and relevant CVE to
323update your package.
Dirk Prankebf4136b2018-09-20 22:48:43324
325## How we ensure that the right credits are displayed {#credits}
326
327As we said at the beginning, it is important that Chrome displays the
328right credit and attributions for all of the third_party code we use.
329
330To view this in chrome, you can open chrome://credits.
331
332That page displays a resource embedded in the browser as part of the
333[//components/resources/components_resources.grd](../components/resources/components_resource.grd)
334GRIT file; the actual HTML text is generated in the
335[//components/resources:about_credits](../components/resources/BUILD.gn)
336build target using a template from the output of the
Rachael Newittfc2e3342023-07-04 23:07:31337[//tools/licenses/licenses.py](../tools/licenses/licenses.py) script. Assuming
338you‘ve followed the rules above to ensure that you have the proper path to the
339LICENSE file and set the Shipped value, if it passes the checks, it’ll be
340included automatically.