| # Adding third_party Libraries |
| |
| [TOC] |
| |
| Using third party code can save time and is consistent with our values - no need |
| to reinvent the wheel! We put all code that isn't written by Chromium developers |
| into `//third_party`. We do this to make it easy to track license compliance, |
| security patches, and supply the right credit and attributions. It also makes it |
| a lot easier for other projects that embed our code to track what is Chromium |
| licensed and what is covered by other licenses. |
| |
| ## Put the code in //third_party |
| |
| By default, all third party code should be checked into |
| [//third_party](../third_party/), for the reasons given above. |
| |
| There is one primary exception to this, which is that if a third_party |
| dependency has its own dependencies *and* it can be built on its own (without |
| Chromium), you can check its dependencies into its third_party. For example, |
| Dawn is a project that is developed independently of Chromium, and |
| it has a dependency on GLFW (which Chromium does not have). Dawn |
| can check that dependency into its `//third_party/glfw`, and in a Chromium |
| checkout, that will show up at `//third_party/dawn/third_party/glfw`. |
| That is okay, but it'd be better if we could add GLFW to a Chromium |
| checkout (in chromium/src's `third_party/glfw`) and configure Dawn |
| to use that location when it is being built as part of Chromium. |
| |
| However, if that dependency is also needed by Chromium or another |
| of Chromium's dependencies, then it must be checked out into Chromium's |
| //third_party (i.e., now you have to use `//third_party/glfw`). This |
| prevents us from possibly needing to use two different versions of a |
| dependency. |
| |
| Apart from that, other locations are only appropriate in a few |
| situations and need explicit approval; don't assume that because there's some |
| other directory with third_party in the name it's okay to put new things |
| there. |
| |
| Regardless of where you add a third party dependency, you should use the |
| [recommended directory structure](#standard-dep-structure). |
| |
| ## Before you start |
| |
| To make sure the inclusion of a new third_party project makes sense for the |
| Chromium project, you should first obtain |
| [Chrome ATL](../ATL_OWNERS) approval. Please include the following information in an |
| email to [email protected]: |
| * Motivation of your project |
| * Design docs |
| * Additional checkout size |
| * If the increase is significant (e.g., 20+ MB), can we consider limiting the |
| files to be checked in? |
| * Build time increase |
| * This refers to building `chrome` or test targets in the critical |
| development path. The [compile-size](speed/binary_size/compile_size_builder.md) |
| builder in CQ is a good proxy for the whether the delta is acceptable |
| (caveat that it measures just `chrome` on Linux). |
| * If the increase is significant (e.g., 30+ seconds), can we consider making |
| this an optional build target? |
| * Binary size increase on Android ([official](https://www.chromium.org/developers/gn-build-configuration) builds) |
| * Any increase of 16 KB or more on Android is flagged on the build bots and |
| justification is needed. |
| * Binary size increase on Windows |
| * Is this library maintained on all platforms that we will use it on? |
| * If not, will the Chrome org be expected to maintain this for some or all |
| platforms? |
| * Does it have any performance / memory implications (esp. on Android)? Was the |
| library designed with intended use on Android? |
| * Do we really need the library? Is there any alternative such as an existing |
| library already in Chromium? If introducing a library with similar functionality |
| as existing, will it be easy for another developer to understand which should be |
| used where? Will you commit to consolidating uses in Chromium and remove the |
| alternative libraries? |
| * For desktop (Win/Mac/Linux/ChromeOS), does the dependency introduce closed |
| source components (e.g., binaries, WASM binaries, obfuscated code)? If yes, |
| please reach out to Chrome ATLs. |
| |
| |
| Googlers can access [go/chrome-atls](https://goto.google.com/chrome-atls) and review |
| existing topics in g/chrome-atls, and can also come to office hours to ask |
| questions. |
| |
| ### Rust |
| |
| Rust is allowed for third party libraries. Unlike C++ libraries, Rust third |
| party libraries are [regularly rolled to updated versions by a |
| rotation](https://chromium.googlesource.com/chromium/src/tools/+/HEAD/crates/create_update_cl.md) |
| and can be audited for unsafety. The process for adding a Googler adding new Rust third-party |
| dependencies is documented at go/chrome-rust. External contributors adding a new |
| third party Rust dependency will be shepherded through the process as part of |
| their ATL review. |
| |
| Email [email protected] with any questions about the Rust toolchain. |
| |
| ### A note on size constraints |
| |
| The size of Chromium derived executables can impact overall performance of those binaries as they |
| need to run on a wide range of devices including those with extremely limited RAM. Additionally, we |
| have experience from Windows of the binary size impacting successful patch rate of updates as well |
| as constraints from the Android Ecosystem where APKs included in the system image have hard |
| limits on their size due to allocation size of the system partition. For more details and |
| guidelines on size increases see |
| [//docs/speed/binary_size/binary_size_explainer.md](speed/binary_size/binary_size_explainer.md) and Googlers can |
| additionally check [go/chrome-binary-size](https://goto.google.com/chrome-binary-size) |
| |
| ### Binaries, obfuscated or minified code |
| |
| The addition of third-party dependencies that contain binaries, obfuscated |
| code, or minified code is strongly discouraged. Code review is an important |
| part of reducing risk to Chromium and a reviewer asked to approve a change |
| that contains any of these has no way to determine the legitimacy of what |
| they are approving. Minification for performance optimization is |
| [usually not necessary](speed/binary_size/optimization_advice.md), and the |
| trade-off in terms of understandability and security is rarely worth |
| it. |
| |
| Where your dependency will form part of a release binary where size is a concern, |
| there are existing tools which handle [compression for distribution](speed/binary_size/optimization_advice.md). |
| |
| You should not check in any pre-built binaries where there is an alternate, |
| supported solution for getting them. If you need to compile from source, |
| consider using [CIPD](cipd_and_3pp.md) instead. |
| |
| This is accessible to Googlers only. Non-Googlers can email one of the people |
| in third_party/OWNERS for help. |
| |
| See [Chrome Code Policy](https://goto.google.com/chrome-code-policy) |
| |
| |
| ## Get the code |
| |
| There are two common ways to depend on third-party code: you can reference a |
| Git repo directly (via entries in the DEPS file) or you can check in a |
| snapshot. The former is preferable in most cases: |
| |
| 1. If you are actively developing in the upstream repo, then having the DEPS |
| file include the upstream (that's been mirrored to GoB, see [here](/docs/dependencies.md#adding-to-GoB)) |
| can be a way to include those changes into Chromium at a particular revision. |
| The DEPS file will be updated to a new revision when you are ready to "roll" |
| the new version into Chromium. This also avoids duplicate copies of the code |
| showing up in multiple repos leading to contributor confusion. |
| 1. This interacts favorably with our upstream tracking automation. We |
| automatically consume the upstream Git hashes and match them against a |
| database of known upstreams to tracking drift between Chromium and upstream |
| sources. |
| 1. This makes adding deps that don't need local changes easier. E.g. some of |
| our automation automatically converts non-GN build rules into GN build rules |
| without any additional CLs. |
| |
| Checking in a snapshot is useful if this is effectively taking on maintenance |
| of an unmaintained project (e.g. an ancient library that we're going to GN-ify |
| that hasn't been updated in years). And, of course, if the code you need isn't |
| in a Git repo, then you have to snapshot. |
| |
| ### Node packages |
| |
| To include a Node package, add the dependency to the |
| [Node package.json](../third_party/node/package.json). Make sure to update |
| the corresponding [`npm_exclude.txt`](../third_party/node/npm_exclude.txt) |
| and [`npm_include.txt`](../third_party/node/npm_include.txt) to make the code |
| available during checkout. |
| |
| ### Pulling the code via DEPS |
| |
| See [here](/docs/dependencies.md#adding-dependencies). |
| |
| ### Checking in the code directly |
| |
| If you are checking in a snapshot, you should follow the [standard directory structure](#standard-dep-structure). |
| For security reasons, please retrieve the code as securely as you can, using |
| HTTPS and GPG signatures if available. |
| If retrieving a tarball, please do not check the tarball itself into the tree, |
| but do list the source and the SHA-512 hash (for verification) in the |
| README.chromium and Change List. The SHA-512 hash can be computed via |
| `sha512sum` or `openssl dgst -sha512`. If retrieving from a git |
| repository, please list the upstream URL and revision that the code was pulled |
| from. |
| |
| If you are checking the files in directly, you do not need an entry in DEPS |
| and do not need to modify `//third_party/.gitignore`. |
| |
| ### Checking in large files |
| |
| This is accessible to Googlers only. Non-Googlers can email one of the people |
| in third_party/OWNERS for help. |
| |
| See [Moving large files to Google Storage](https://goto.google.com/checking-in-large-files) |
| |
| ## Standard directory structure for dependencies {standard-dep-structure} |
| |
| Regardless of how you import a dependency, you should use the following |
| directory structure. This folder layout enforces separation between first and |
| third party code, making it easier to manage updates and dependency hygiene |
| long term. |
| |
| Any first party code or files you need for dependency management or |
| interoperability should be added to the top level dependency directory, and the |
| dependency source imported into the child src directory. |
| |
| **Recommended directory structure:** |
| ``` |
| ❯ //third_party/<dependency-name> |
| ├── BUILD.gn |
| ├── README.chromium |
| ├── OWNERS |
| ├── src <-- import third party code here |
| │ ├── LICENSE |
| │ ├── a.h |
| │ └── b.cc |
| ``` |
| |
| **What constitutes a dependency:** |
| |
| * A dependency should be sourced from a single upstream location. Putting code |
| from multiple upstream sources in a single `//third_party` directory makes it |
| difficult to reason about the origin of files and perform automated updates. |
| * If your dependency has its own vendored dependencies, it's not necessary to |
| split these into additional directories. |
| |
| **Formatting:** |
| |
| Do not reformat or apply Chromium-style formatting to any code within the |
| dependency `src` directory. Maintaining the original formatting is essential |
| for generating clean diffs against upstream versions. This simplifies |
| reviewing upstream changes, applying security patches, and performing updates. |
| |
| If you experience issues with submitting a CL due to Chromium formatting |
| requirements which need to be disabled, or you need to format first party code |
| in your top level dependency folder, you can add a language appropriate |
| formatting config (e.g [.clang-format-ignore](https://clang.llvm.org/docs/ClangFormat.html#clang-format-ignore)) |
| to your top level dependency directory. Ensure it does not format the third |
| party code. |
| |
| |
| ## Document the code's context |
| |
| ### Add OWNERS |
| |
| Your OWNERS file must either list the email addresses of two Chromium |
| committers on the first two lines or include a `file:` directive to an OWNERS |
| file within the `third_party` directory that itself conforms to this criterion. |
| This will ensure accountability for maintenance of the code over time. While |
| there isn't always an ideal or obvious set of people that should go in OWNERS, |
| this is critical for first-line triage of any issues that crop up in the code. |
| |
| As an OWNER, you're expected to: |
| |
| * Remove the dependency when/if it is no longer needed |
| * Update the dependency when a security or stability bug is fixed upstream |
| * Help ensure the Chrome feature that uses the dependency continues to use the |
| dependency in the best way, as the feature and the dependency change over |
| time. |
| |
| ### Add a README.chromium |
| |
| You need a README.chromium file with information about the project from which |
| you're re-using code. See |
| [//third_party/README.chromium.template](../third_party/README.chromium.template) |
| for a list of fields to include. A presubmit check will check this has the right |
| format. |
| |
| README.chromium files contain a field indicating whether the package is |
| security-critical or not. A package is security-critical if it is compiled |
| into the product and does any of the following: |
| |
| * Accepts untrustworthy inputs from the internet |
| * Parses or interprets complex input formats |
| * Sends data to internet servers |
| * Collects new data |
| * Influences or sets security-related policy (including the user experience) |
| |
| **Update Mechanism** {#update-mechanism} |
| |
| We aim to autoroll as many dependencies as is feasible, and track those |
| that can't with an exception. |
| |
| The `Update Mechanism:` field specifies how this dependency is kept |
| up-to-date. You will use one of the exact string formats listed below, |
| replacing `(crbug.com/BUG_ID)` with the actual bug link where required. |
| The format is `Primary[.SubsetSpecifier] (crbug.com/BUG_ID)`. |
| |
| **Accepted Values:** |
| * `Autoroll` |
| * `Manual (crbug.com/BUG_ID)` |
| * `Static (crbug.com/BUG_ID)` |
| * `Static.HardFork (crbug.com/BUG_ID)` |
| |
| See below for the meaning of each primary mechanism and subset specifier. |
| |
| **Primary Mechanisms:** |
| |
| * **`Autoroll`** |
| * Updated automatically by a service (e.g., Skia Autoroller, |
| Copybara). |
| * **`Manual`** |
| * Updated manually by OWNERS (e.g., using `roll_deps`). |
| * **`Static`** |
| * Changes are authored by Chromium Authors. |
| * **Security:** Some dependencies will lack vulnerability coverage. If sufficient |
| metadata is provided (e.g. closest point of divergence from an upstream, |
| or a cpe), vulnerabilities will still be filed. |
| |
| **Subset Specifiers** |
| |
| * **`Static`** (With no SubsetSpecifier) |
| * Origin: Not git or package manager upstream. |
| E.g. Blog post, [USENET](https://crsrc.org/c/third_party/webrtc/common_audio/third_party/spl_sqrt_floor/README.chromium;l=12) group. |
| * **`Static.HardFork`** |
| * Originated externally (git or package manager), but now updated and maintained |
| *internally by Chromium committers*, diverging from the original |
| upstream. |
| |
| **Bug Link Format and Purpose:** |
| * **Format:** `(crbug.com/BUG_ID)`. |
| * **Location:** File bugs using the linked template in [Autoroll Exceptions](#autoroll-exceptions). |
| * **Purpose:** The bug is the official record for: |
| * **Manual:** |
| * Justification for not autorolling; *or* |
| * Tracking the work to enable autorolling. |
| * **Static**: |
| * Rationale for the static classification. |
| * Approval from ATL, and `chrome-security@` review outcome. |
| |
| #### Autoroll Exceptions |
| |
| If a dependency can't be autorolled, it needs an exception. OWNERS |
| should file a bug using the template in |
| [`Chromium > ThirdParty > Autoroll Exceptions`](https://issues.chromium.org/issues/new?component=1801247&template=2135097). |
| This component has auto-assignment and will help you track the exception. |
| |
| **CPE Prefix** |
| One of the fields is CPEPrefix. This is used by Chromium and Google systems to |
| spot known upstream security vulnerabilities, and ensure we merge the fixes |
| into our third-party copy. These systems are not foolproof, so as the OWNER, |
| it's up to you to keep an eye out rather than solely relying on these |
| automated systems. But, adding CPEs decreases the chances of us missing |
| vulnerabilities, so they should always be added if possible. |
| |
| The CPE is a common format shared across the industry; you can look up the CPE |
| for your package [here](https://nvd.nist.gov/products/cpe/search). |
| * Use CPE format 2.3 (preferred) or CPE format 2.2 (supported). |
| * If the CPE uses the 2.3 URI binding or 2.2 format (i.e. starts with "cpe:/"), |
| and no version is explicitly specified within the `CPEPrefix`, the `Version` |
| in the `README.chromium` file will be appended to the `CPEPrefix`, if available. |
| * Note: if the `Version` field is set to a git hash value, version matching |
| for vulnerabilities will fail. |
| |
| When searching for a CPE, you may find that there is not yet a CPE for the |
| specific upstream version you're using. This is normal, as CPEs are typically |
| allocated only when a vulnerability is found. You should follow the version |
| number convention such that, when that does occur in future, we'll be notified. |
| If no CPE is available, please specify "unknown". |
| |
| If you're using a patched or modified version which is halfway between two |
| public versions, please "round downwards" to the lower of the public versions |
| (it's better for us to be notified of false-positive vulnerabilities than |
| false-negatives). |
| |
| |
| **Shipped** |
| Your README.chromium should also specify whether your third party dependency |
| will be shipped as part of a final binary. The "Shipped" field replaces the now |
| deprecated special value of "NOT_SHIPPED" which was previously allowed in the |
| "License File" field. This use is no longer supported and all third party |
| dependencies must include a valid license regardless of whether it is shipped |
| or not. |
| |
| |
| **Multiple packages** |
| Adding multiple packages in a single third party directory is not recommended, |
| because it does not follow the best practices for [third party dependency structure](#standard-dep-structure) |
| and complicates vulnerability scanning. |
| |
| Each dependency should have its own third party directory with a few very |
| limited exceptions: |
| * A package manager is used to manage dependencies in the directory via a lockfile. |
| * Your third party dependency has its own vendored transitive dependencies |
| |
| If your dependency is covered by one of the above exceptions and the information |
| for multiple packages must be placed in a single README.chromium, use the below |
| line to separate the data for each package: |
| ``` |
| -------------------- DEPENDENCY DIVIDER -------------------- |
| ``` |
| |
| |
| ### Add a LICENSE file and run related checks |
| |
| You need a LICENSE file. Example: |
| [//third_party/libjpeg/LICENSE](../third_party/libjpeg/LICENSE). Dependencies |
| should not be added without a license file and license type, even if they are |
| not shipped in a final product. Existing dependencies without a license file or |
| license type are currently being cleaned up as part of the metadata uplift |
| effort. If you are an OWNER of a dependency missing license fields, there will |
| soon be a bug filed to fix it. |
| |
| Run `//tools/licenses/licenses.py scan`; this will complain about incomplete or missing |
| data for third_party checkins. We use `licenses.py credits` to generate the |
| about:credits page in Google Chrome builds. |
| |
| If the library will never be shipped as a part of Chrome (e.g. build-time tools, |
| testing tools), make sure to set the "Shipped" field to "no" so that the license |
| is not included in about:credits page ([more on this below](#credits)). |
| |
| When a dependency allows a choice of license, OWNERS should choose the least |
| restrictive license that meets Chromium's needs and document only the chosen |
| license(s) in the README.chromium file. |
| |
| Multiple licenses apply when there are dependencies bundled together, or |
| different parts have different restrictions, these are inherently 'and'. This is |
| very different to a project allowing multiple license options. |
| |
| The `License:` field in README.chromium must use a _comma-separated list_ of licenses |
| that are actively in use. Complex license expressions are not allowed or |
| supported. |
| |
| Use SPDX license identifiers (https://spdx.org/licenses/) when possible e.g. |
| ['Apache-2.0'](https://spdx.org/licenses/Apache-2.0.html). You can find the full |
| allowlist in |
| [depot_tools/+/main:metadata/fields/custom/license_allowlist.py](https://source.chromium.org/chromium/chromium/tools/depot_tools/+/main:metadata/fields/custom/license_allowlist.py). |
| If the dependency uses a license that is not in the allowlist, you will need to |
| add it to the |
| [allowlist](https://source.chromium.org/chromium/chromium/tools/depot_tools/+/main:metadata/fields/custom/license_allowlist.py). |
| This requires approval from the ATLs who will check that the license |
| classification is one of [unencumbered/permissive/notice/reciprocal]. If the |
| license is more restrictive than reciprocal, engage with the ATLs to determine |
| if the dependency is appropriate for Chromium. The license identifier will still |
| need to be added to the restricted list |
| ['WITH_PERMISSION_ONLY'](https://source.chromium.org/chromium/chromium/tools/depot_tools/+/main:metadata/fields/custom/license_allowlist.py). |
| Do not use a license on that list without approval from the ATLs. |
| |
| #### License Classifications |
| |
| Licenses used in our codebase fall into several categories of increasing |
| restrictiveness, with notice-level and less restrictive licenses being allowed |
| in all projects: |
| |
| * **Public Domain/Unencumbered/Permissive Licenses** - These licenses allow |
| you to do almost anything with the code, they may require attribution e.g.: |
| * [CC0-1.0](https://spdx.org/licenses/CC0-1.0.html). |
| * [Unlicense](https://spdx.org/licenses/Unlicense.html). |
| * **Notice Licenses** - (Most open source licenses fall into this category) |
| These licenses are similar to permissive but have additional notice |
| requirements e.g.: |
| * [Apache-2.0](https://spdx.org/licenses/Apache-2.0.html): [`Any modified files |
| must carry prominent notices stating that you changed the |
| files`](https://source.chromium.org/chromium/chromium/src/+/main:third_party/catapult/third_party/coverage/LICENSE.txt;l=98). |
| * [BSD-3-Clause](https://spdx.org/licenses/BSD-3-Clause): [`3. Neither the |
| name of the copyright holder nor the names of its contributors may be |
| used to endorse or promote products derived from this software without |
| specific prior written |
| permission.`](https://source.chromium.org/chromium/chromium/src/+/main:ios/third_party/fishhook/LICENSE;drc=1308ce89bbb959047a73145a0ca4a2f5f7dde894;l=10). |
| |
| Additionally, open source projects like Chromium are also allowed to use reciprocal licenses: |
| |
| * **Reciprocal Licenses** - These licenses require sharing modifications under |
| the same terms: |
| |
| * [MPL-1.1](https://spdx.org/licenses/MPL-1.1.html). |
| * [APSL-2.0](https://spdx.org/licenses/APSL-2.0.html). |
| |
| * **Restricted Licenses !Case-by-case Approval Required!** - These licenses |
| have stricter requirements but are allowed in some circumstances. These |
| licenses may require you to publish the code under the same terms and |
| conditions: |
| |
| * [LGPL-2.1](https://spdx.org/licenses/LGPL-2.1.html). |
| * [GPL-2.0](https://spdx.org/licenses/GPL-2.0.html). |
| |
| Make sure you understand the license terms before checking in a dependency, and |
| when making any local modifications or forks. |
| |
| The following restricted licenses are allowed under the following circumstances |
| (this is not a definitive list): |
| |
| * GPL licenses are allowed for all non-shipped dependencies. |
| * LGPLv2.1 is always okay as long as it is part of the Chromium binary. |
| |
| ## Get a review |
| |
| All third party additions and substantive changes like re-licensing need the |
| following sign-offs. Some of these are accessible to Googlers only. |
| Non-Googlers can email one of the people in |
| [//third_party/OWNERS](../third_party/OWNERS) for help. |
| |
| * Make sure you have the approval from Chrome ATLs as mentioned |
| [above](#before-you-start). |
| * Get [email protected] (or [email protected], Google-only) |
| approval. Document all security considerations, concerns, and risks in the |
| `Description:` field of the README.chromium. Third party code is a hot spot |
| for security vulnerabilities. Help people make informed decisions about |
| relying on this package by highlighting security considerations. |
| * Add [email protected] as a reviewer on your change. This |
| will trigger an automatic round-robin assignment to a reviewer who will check |
| licensing matters. These reviewers may not be able to +1 a change so look for |
| verbal approval in the comments. (This list does not receive or deliver |
| email, so only use it as a reviewer, not for other communication. Internally, |
| see [cl/221704656](http://cl/221704656) for details about how |
| this is configured.). If you have questions about the third-party process, |
| ask one of the [//third_party/OWNERS](../third_party/OWNERS) instead. |
| * Lastly, if all other steps are complete, get a positive code review from a |
| member of [//third_party/OWNERS](../third_party/OWNERS) to land the change. |
| |
| Please send separate emails to the ATLs and [email protected]. |
| You can skip the ATL review and [email protected] when you are only moving |
| existing directories in Chromium to //third_party/. |
| |
| Subsequent changes don't normally require third-party-owners or security |
| approval; you can modify the code as much as you want. When you update code, be |
| mindful of security-related mailing lists for the project and relevant CVE to |
| update your package. |
| |
| ## How we ensure that the right credits are displayed {#credits} |
| |
| As we said at the beginning, it is important that Chrome displays the |
| right credit and attributions for all of the third_party code we use. |
| |
| To view this in chrome, you can open chrome://credits. |
| |
| That page displays a resource embedded in the browser as part of the |
| [//components/resources/components_resources.grd](../components/resources/components_resource.grd) |
| GRIT file; the actual HTML text is generated in the |
| [//components/resources:about_credits](../components/resources/BUILD.gn) |
| build target using a template from the output of the |
| [//tools/licenses/licenses.py](../tools/licenses/licenses.py) script. Assuming |
| you‘ve followed the rules above to ensure that you have the proper path to the |
| LICENSE file and set the Shipped value, if it passes the checks, it’ll be |
| included automatically. |