Skip to content

Commit 130d7a3

Browse files
authored
Explain new Supply Chain characteristics in the docs (#665)
Signed-off-by: Juan Cruz Viotti <[email protected]>
1 parent 2788a22 commit 130d7a3

File tree

3 files changed

+52
-3
lines changed

3 files changed

+52
-3
lines changed

docs/commercial.md

Lines changed: 47 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,56 @@ Sourcemeta One is available in two editions:
2424
hosting solution that competes with Sourcemeta. After four years from each
2525
release, the code transitions to AGPL-3.0.
2626

27-
- **Enterprise**: Includes additional features not available in the Community
28-
edition. Requires a [commercial
27+
- **Enterprise**: Includes additional features and supply chain security
28+
capabilities not available in the Community edition. Requires a [commercial
2929
license](https://github.com/sourcemeta/one/blob/main/LICENSE-COMMERCIAL)
3030
from Sourcemeta.
3131

32+
## Supply Chain Security
33+
34+
Starting with v4.2.2, the Enterprise container image ships with built-in
35+
supply chain security and regulatory compliance capabilities:
36+
37+
- **Signed Container Images.** Every Enterprise image is cryptographically
38+
signed using [Cosign](https://github.com/sigstore/cosign) and the
39+
[Sigstore](https://www.sigstore.dev/) transparency log, allowing you to
40+
verify image authenticity and integrity before deployment.
41+
42+
- **Software Bill of Materials (SBOM).** Each release includes an SPDX SBOM
43+
attached as a signed attestation to the container image, providing full
44+
visibility into all vendored, npm, and system-level dependencies for
45+
vulnerability management and audit purposes.
46+
47+
- **FIPS-Ready Cryptography.** The Enterprise image is built with the OpenSSL
48+
FIPS provider (`openssl-provider-fips`) for all cryptographic operations,
49+
supporting organizations that require FIPS 140 compliance.
50+
51+
### Verifying Image Signatures
52+
53+
You can verify that an Enterprise container image was built and signed by
54+
Sourcemeta's official GitHub Actions pipeline using
55+
[Cosign](https://github.com/sigstore/cosign). For example:
56+
57+
```sh
58+
cosign verify \
59+
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" \
60+
--certificate-identity-regexp "^https://github.com/sourcemeta/one/" \
61+
ghcr.io/sourcemeta/one-enterprise:v4.2.2
62+
```
63+
64+
### Retrieving the SBOM
65+
66+
The SPDX SBOM is attached as a signed in-toto attestation. You can verify and
67+
extract it using Cosign. For example:
68+
69+
```sh
70+
cosign verify-attestation --type spdx \
71+
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" \
72+
--certificate-identity-regexp "^https://github.com/sourcemeta/one/" \
73+
ghcr.io/sourcemeta/one-enterprise:v4.2.2 \
74+
| jq -r '.payload' | base64 -d | jq '.predicate'
75+
```
76+
3277
## Our Commitment to Excellence
3378

3479
Sourcemeta is led by a member of the JSON Schema Technical Steering Committee,

docs/index.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,10 @@ concerns and ensuring no vendor lock-in. If Sourcemeta would ever cease
103103
operations, you retain full access to continue running and maintaining your
104104
instances.
105105

106+
**Supply chain security**: The Enterprise container image is cryptographically
107+
signed with Cosign/Sigstore, includes a signed SPDX Software Bill of Materials
108+
(SBOM), and ships with the OpenSSL FIPS provider for FIPS-ready cryptography.
109+
106110
**Expert commercial support & training**: [Commercial
107111
Licenses](./commercial.md) give you access to world-class JSON Schema expertise
108112
whenever you need it. Upon request, we provide managed hosting, and we also

enterprise/scripts/cosign.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ cosign verify \
4343
echo "Cosign: Signature verified successfully" 1>&2
4444

4545
echo "Cosign: Verifying SBOM attestation for ${IMAGE}@${DIGEST}" 1>&2
46-
cosign verify-attestation --type spdxjson \
46+
cosign verify-attestation --type spdx \
4747
--certificate-oidc-issuer "$CERTIFICATE_OIDC_ISSUER" \
4848
--certificate-identity "$CERTIFICATE_IDENTITY" \
4949
"${IMAGE}@${DIGEST}"

0 commit comments

Comments
 (0)