blob: 8e32c368469023ba2bd45cbb3462a0003158d9c5 [file] [log] [blame]
Alex Gaynorc72e63f2013-09-09 21:44:26 -07001Contributing
2============
3
4Process
5-------
6
7As an open source project, ``cryptography`` welcomes contributions of all
8forms. These can include:
9
10* Bug reports and feature requests
11* Pull requests for both code and documentation
12* Patch reviews
13
Alex Gaynor2c67c822013-09-09 23:44:13 -070014You can file bugs and submit pull requests on `GitHub`_. To discuss larger
Alex Gaynorc72e63f2013-09-09 21:44:26 -070015changes you can start a conversation on `our mailing list`_.
16
17Because cryptography is so complex, and the implications of getting it wrong so
18devastating, ``cryptography`` has a strict code review policy:
19
20* Patches must *never* be pushed directly to ``master``, all changes (even the
21 most trivial typo fixes!) must be submitted as a pull request.
22* A committer may *never* merge their own pull request, a second party must
Alex Gaynore6466a52013-10-18 14:53:04 -070023 merge their changes. If multiple people work on a pull request, it must be
24 merged by someone who did not work on it.
Alex Gaynorc72e63f2013-09-09 21:44:26 -070025* A patch which breaks tests, or introduces regressions by changing or removing
26 existing tests should not be merged. Tests must always be passing on
27 ``master``.
28* If somehow the tests get into a failing state on ``master`` (such as by a
29 backwards incompatible release of a dependency) no pull requests may be
30 merged until this is rectified.
Alex Gaynorf3f00182013-12-13 19:22:33 -080031* All merged patches must have 100% test coverage.
Alex Gaynor3f230402014-01-08 09:21:57 -080032* New features and significant bug fixes should be documented in the
33 :doc:`/changelog`.
Alex Gaynorc72e63f2013-09-09 21:44:26 -070034
35The purpose of these policies is to minimize the chances we merge a change
36which jeopardizes our users' security.
37
Alex Gaynor99b69d92013-10-19 17:52:58 -070038If you believe you've identified a security issue in ``cryptography``, please
39follow the directions on the :doc:`security page </security>`.
Alex Gaynorc72e63f2013-09-09 21:44:26 -070040
41Code
42----
43
44When in doubt, refer to `PEP 8`_ for Python code.
45
46Every code file must start with the boilerplate notice of the Apache License.
47Additionally, every Python code file must contain
48
49.. code-block:: python
50
51 from __future__ import absolute_import, division, print_function
52
Alex Gaynore21b0b22013-12-12 12:39:05 -080053API Considerations
54~~~~~~~~~~~~~~~~~~
55
56Most projects' APIs are designed with a philosophy of "make easy things easy,
57and make hard things possible". One of the perils of writing cryptographic code
Alex Gaynor95243f52013-12-21 19:37:24 -080058is that secure code looks just like insecure code, and its results are almost
Alex Gaynor15cf6b92013-12-21 19:22:39 -080059always indistinguishable. As a result ``cryptography`` has, as a design
60philosophy: "make it hard to do insecure things". Here are a few strategies for
61API design which should be both followed, and should inspire other API choices:
Alex Gaynore21b0b22013-12-12 12:39:05 -080062
63If it is incorrect to ignore the result of a method, it should raise an
64exception, and not return a boolean ``True``/``False`` flag. For example, a
65method to verify a signature should raise ``InvalidSignature``, and not return
66whether the signature was valid.
67
68.. code-block:: python
69
70 # This is bad.
71 def verify(sig):
72 # ...
73 return is_valid
74
75 # Good!
76 def verify(sig):
77 # ...
78 if not is_valid:
79 raise InvalidSignature
80
Alex Gaynor6955ea32013-12-21 19:26:19 -080081Every recipe should include a version or algorithmic marker of some sort in its
82output in order to allow transparent upgrading of the algorithms in use, as
83the algorithms or parameters needed to achieve a given security margin evolve.
84
Alex Gaynore21b0b22013-12-12 12:39:05 -080085APIs at the :doc:`/hazmat/primitives/index` layer should always take an
86explicit backend, APIs at the recipes layer should automatically use the
Alex Gaynorf8796b12013-12-13 20:28:55 -080087:func:`~cryptography.hazmat.backends.default_backend`, but optionally allow
Alex Gaynor2a5b4a82013-12-12 17:53:08 -080088specifying a different backend.
Alex Gaynore21b0b22013-12-12 12:39:05 -080089
Alex Gaynore6466a52013-10-18 14:53:04 -070090C bindings
Alex Gaynor5246e2d2013-12-12 12:23:18 -080091~~~~~~~~~~
Alex Gaynore6466a52013-10-18 14:53:04 -070092
93When binding C code with ``cffi`` we have our own style guide, it's pretty
94simple.
95
96Don't name parameters:
97
98.. code-block:: c
99
100 // Good
101 long f(long);
102 // Bad
103 long f(long x);
104
Paul Kehrer3ed80ba2013-10-19 20:00:26 -0500105...unless they're inside a struct:
106
107.. code-block:: c
108
109 struct my_struct {
110 char *name;
111 int number;
112 ...;
113 };
114
Paul Kehrer047dab82013-12-27 16:45:52 -0600115Include ``void`` if the function takes no arguments:
Alex Gaynore6466a52013-10-18 14:53:04 -0700116
117.. code-block:: c
118
119 // Good
Alex Gaynore6466a52013-10-18 14:53:04 -0700120 long f(void);
Paul Kehrer047dab82013-12-27 16:45:52 -0600121 // Bad
122 long f();
Alex Gaynore6466a52013-10-18 14:53:04 -0700123
124Wrap lines at 80 characters like so:
125
126.. code-block:: c
127
128 // Pretend this went to 80 characters
129 long f(long, long,
130 int *)
131
Alex Gaynor1e8744a2013-10-18 14:57:18 -0700132Include a space after commas between parameters:
133
134.. code-block:: c
135
136 // Good
137 long f(int, char *)
138 // Bad
139 long f(int,char *)
140
Paul Kehrer745ee072013-12-27 20:42:54 -0600141Values set by ``#define`` should be assigned the appropriate type. If you see
Paul Kehrerccd9c002013-12-27 20:25:06 -0600142this:
143
144.. code-block:: c
145
Alex Stapleton9020b482013-12-28 16:28:59 +0000146 #define SOME_INTEGER_LITERAL 0x0;
147 #define SOME_UNSIGNED_INTEGER_LITERAL 0x0001U;
148 #define SOME_STRING_LITERAL "hello";
Paul Kehrerccd9c002013-12-27 20:25:06 -0600149
150...it should be added to the bindings like so:
151
152.. code-block:: c
153
Alex Stapleton9020b482013-12-28 16:28:59 +0000154 static const int SOME_INTEGER_LITERAL;
155 static const unsigned int SOME_UNSIGNED_INTEGER_LITERAL;
156 static const char *const SOME_STRING_LITERAL;
Paul Kehrerccd9c002013-12-27 20:25:06 -0600157
Alex Gaynorc72e63f2013-09-09 21:44:26 -0700158Documentation
159-------------
160
161All features should be documented with prose.
162
163Docstrings should be written like this:
164
165.. code-block:: python
166
167 def some_function(some_arg):
168 """
169 Does some things.
170
171 :param some_arg: Some argument.
172 """
173
174So, specifically:
175
Alex Gaynor05a190e2013-10-29 17:11:25 -0700176* Always use three double quotes.
177* Put the three double quotes on their own line.
178* No blank line at the end.
179* Use Sphinx parameter/attribute documentation `syntax`_.
180
Alex Gaynora6596882013-11-13 12:54:03 -0800181Because of the inherent challenges in implementing correct cryptographic
Alex Gaynore9d64d72013-11-13 10:28:01 -0800182systems, we want to make our documentation point people in the right directions
183as much as possible. To that end:
184
185* When documenting a generic interface, use a strong algorithm in examples.
186 (e.g. when showing a hashing example, don't use
Alex Gaynor15cf6b92013-12-21 19:22:39 -0800187 :class:`~cryptography.hazmat.primitives.hashes.MD5`)
Alex Gaynor5cbab0c2013-11-13 11:55:57 -0800188* When giving prescriptive advice, always provide references and supporting
Alex Gaynore9d64d72013-11-13 10:28:01 -0800189 material.
Alex Gaynord118c912013-11-13 11:56:49 -0800190* When there is real disagreement between cryptographic experts, represent both
Alex Gaynor54e04002013-11-15 16:44:41 -0800191 sides of the argument and describe the trade-offs clearly.
Alex Gaynore9d64d72013-11-13 10:28:01 -0800192
Alex Gaynor05a190e2013-10-29 17:11:25 -0700193When documenting a new module in the ``hazmat`` package, its documentation
194should begin with the "Hazardous Materials" warning:
195
196.. code-block:: rest
197
198 .. hazmat::
Alex Gaynorc72e63f2013-09-09 21:44:26 -0700199
Alex Gaynor953ebf82013-12-08 10:28:30 -0800200When referring to a hypothetical individual (such as "a person receiving an
201encrypted message") use gender neutral pronouns (they/them/their).
202
Richard Wall40cde822013-10-01 20:20:15 +0100203Development Environment
204-----------------------
Richard Wall0d9bb142013-10-01 16:17:24 +0100205
206Working on ``cryptography`` requires the installation of a small number of
Alex Gaynor166cbd32013-10-01 13:30:29 -0700207development dependencies. These are listed in ``dev-requirements.txt`` and they
208can be installed in a `virtualenv`_ using `pip`_. Once you've installed the
209dependencies, install ``cryptography`` in ``editable`` mode. For example:
Richard Wall0d9bb142013-10-01 16:17:24 +0100210
Alex Gaynorae5c9072013-10-06 11:04:08 -0700211.. code-block:: console
Richard Wall0d9bb142013-10-01 16:17:24 +0100212
Alex Gaynor7587ded2013-10-06 12:14:05 -0700213 $ # Create a virtualenv and activate it
Richard Wall7d4ca1e2013-10-01 21:10:45 +0100214 $ pip install --requirement dev-requirements.txt
215 $ pip install --editable .
Richard Wall0d9bb142013-10-01 16:17:24 +0100216
217You are now ready to run the tests and build the documentation.
Richard Wall0d9bb142013-10-01 16:17:24 +0100218
Richard Wall40cde822013-10-01 20:20:15 +0100219Running Tests
Alex Gaynor5246e2d2013-12-12 12:23:18 -0800220~~~~~~~~~~~~~
Richard Wall0d9bb142013-10-01 16:17:24 +0100221
Alex Gaynor166cbd32013-10-01 13:30:29 -0700222``cryptography`` unit tests are found in the ``tests/`` directory and are
223designed to be run using `pytest`_. `pytest`_ will discover the tests
224automatically, so all you have to do is:
Richard Wall0d9bb142013-10-01 16:17:24 +0100225
Alex Gaynorae5c9072013-10-06 11:04:08 -0700226.. code-block:: console
Richard Wall0d9bb142013-10-01 16:17:24 +0100227
Richard Wall7d4ca1e2013-10-01 21:10:45 +0100228 $ py.test
Richard Wall0d9bb142013-10-01 16:17:24 +0100229 ...
Alex Gaynor15cf6b92013-12-21 19:22:39 -0800230 62746 passed in 220.43 seconds
Richard Wall0d9bb142013-10-01 16:17:24 +0100231
232This runs the tests with the default Python interpreter.
233
234You can also verify that the tests pass on other supported Python interpreters.
Richard Wallc3d1eb52013-10-01 16:29:07 +0100235For this we use `tox`_, which will automatically create a `virtualenv`_ for
Richard Wall40cde822013-10-01 20:20:15 +0100236each supported Python version and run the tests. For example:
Richard Wall0d9bb142013-10-01 16:17:24 +0100237
Alex Gaynorae5c9072013-10-06 11:04:08 -0700238.. code-block:: console
Richard Wall0d9bb142013-10-01 16:17:24 +0100239
Richard Wall7d4ca1e2013-10-01 21:10:45 +0100240 $ tox
Richard Wall0d9bb142013-10-01 16:17:24 +0100241 ...
Richard Wall40cde822013-10-01 20:20:15 +0100242 ERROR: py26: InterpreterNotFound: python2.6
243 py27: commands succeeded
244 ERROR: pypy: InterpreterNotFound: pypy
245 ERROR: py32: InterpreterNotFound: python3.2
246 py33: commands succeeded
247 docs: commands succeeded
248 pep8: commands succeeded
Richard Wall0d9bb142013-10-01 16:17:24 +0100249
Alex Gaynor166cbd32013-10-01 13:30:29 -0700250You may not have all the required Python versions installed, in which case you
251will see one or more ``InterpreterNotFound`` errors.
Richard Wall0d9bb142013-10-01 16:17:24 +0100252
253Building Documentation
Alex Gaynor5246e2d2013-12-12 12:23:18 -0800254~~~~~~~~~~~~~~~~~~~~~~
Richard Wall0d9bb142013-10-01 16:17:24 +0100255
Alex Gaynor166cbd32013-10-01 13:30:29 -0700256``cryptography`` documentation is stored in the ``docs/`` directory. It is
257written in `reStructured Text`_ and rendered using `Sphinx`_.
Richard Wall0d9bb142013-10-01 16:17:24 +0100258
Richard Wall7d4ca1e2013-10-01 21:10:45 +0100259Use `tox`_ to build the documentation. For example:
Richard Wall0d9bb142013-10-01 16:17:24 +0100260
Alex Gaynorae5c9072013-10-06 11:04:08 -0700261.. code-block:: console
Richard Wall0d9bb142013-10-01 16:17:24 +0100262
Richard Wall7d4ca1e2013-10-01 21:10:45 +0100263 $ tox -e docs
Richard Wall0d9bb142013-10-01 16:17:24 +0100264 ...
Richard Wallc3d1eb52013-10-01 16:29:07 +0100265 docs: commands succeeded
Richard Wall0d9bb142013-10-01 16:17:24 +0100266 congratulations :)
267
Alex Gaynor15cf6b92013-12-21 19:22:39 -0800268The HTML documentation index can now be found at
269``docs/_build/html/index.html``.
Richard Wall40cde822013-10-01 20:20:15 +0100270
Alex Gaynorc72e63f2013-09-09 21:44:26 -0700271
Donald Stufft85707942013-10-04 23:55:27 -0400272.. _`GitHub`: https://github.com/pyca/cryptography
Alex Gaynorc72e63f2013-09-09 21:44:26 -0700273.. _`our mailing list`: https://mail.python.org/mailman/listinfo/cryptography-dev
274.. _`PEP 8`: http://www.peps.io/8/
275.. _`syntax`: http://sphinx-doc.org/domains.html#info-field-lists
Richard Wallc3d1eb52013-10-01 16:29:07 +0100276.. _`pytest`: https://pypi.python.org/pypi/pytest
277.. _`tox`: https://pypi.python.org/pypi/tox
278.. _`virtualenv`: https://pypi.python.org/pypi/virtualenv
279.. _`pip`: https://pypi.python.org/pypi/pip
280.. _`sphinx`: https://pypi.python.org/pypi/sphinx
Alex Gaynora05358d2013-11-06 11:01:22 -0800281.. _`reStructured Text`: http://sphinx-doc.org/rest.html