-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a SBOM template in CycloneDX format #1224
base: master
Are you sure you want to change the base?
Conversation
Hello. Thanks for PR. As I see, sbom json seems to be "sealed" i.e. it does not allow properties not mentioned in the spec. JSON format itself does not allow comments. And it would be nice if the file would explain itself what it is. On the other hand - XML allows comment and also have clear URI to schema. Are those interchangeable? If yes, I'd prefer XML version with a tiny comment at the top (one sencence + link) about sbom. |
Yes and no; the team behind the CycloneDX specification are pretty responsive; they seem very pragmatic so far. I also think it would be 100% fine to put something like:
-- it's not 100% spec compliant, but it's okay for us to be pragmatic too I think.
I'm not sure what we can do here; at least if you google for
Not really; there is a XML version of the SBOM called SWID that was quite popular a few years ago, but was rapidly overtaken by ISO SPDX (json) and OWASP CycloneDX (json). So far I've seen SBOM metadata in about 60 different projects, and I'd say the split was about 90% CycloneDX and 10% SPDX. I can certainly import a
This would look something like this:
It's up to you what format you'd like; it's the data that's important to me, the CycloneDX JSON file format is just our recommendation. |
If we can add comment to JSON it is enough. I'll check soon what |
047c935
to
7fcd4e9
Compare
I've updated the PR with your suggestion.
The one I found was https://nvd.nist.gov/products/cpe/detail/FA6D4636-68B4-470E-A353-C047C9F973CB?namingFormat=2.3&orderBy=CPEURI&keyword=cpe%3A2.3%3Aa%3Agoogle&status=FINAL Thanks. Richard. |
Looks good. But I'm not sure, if |
Ohh good catch! This is probably something I can handle in uswid -- other projects like jansson also include the |
Also add more documenation and adjust the tests. Noticed in google/brotli#1224 (comment)
Improve supply chain security by including a SBOM file with substituted values. This will be used to construct a composite platform SBOM. Signed-off-by: Richard Hughes <[email protected]>
Hi,
My name is Richard Hughes and I'm a developer at Red Hat. I'm the maintainer of fwupd and LVFS, and am trying to improve software supply chain security by encouraging OEMs, ODMs and IBVs to ship Software Bill of Materials with each firmware binary blob (SBOMs).
I'm working alongside lots of other companies proactively trying to do the right thing. The reason I've opened this pull request is because your project is either used in the build process of a firmware we care about (e.g. EDK II, or coreboot -- e.g. for ChromeOS) or is built into the firmware binary itself. Although my personal focus is on firmware, the SBOM file is in CycloneDX format (one of the most popular industry standards) which makes it also useful when building containers or OS images too.
I would like to contribute this template SBOM file into your project that gets included into source control with substituted values that get populated automatically. I'm not super familiar with Brotli, and so I've done my best populating the project values -- but please point out any that are incorrect and I'll fix them up. I've also put the
sbom.cdx.json
file in what I feel is the right place, but please say if you want me to put it somewhere different or name it a different thing; the directory andsbom
prefix are unimportant. I also wasn’t 100% sure whether to mark the component as a library or application, so advice is welcome.The various firmware build tools will take these incomplete SBOM files and then build them into a complete composite SBOM to represent the firmware. Having an upstream reference to what the PURL and CPE values should be means we have something we can trust; I could quite easily spin up a web-service that we say "what CPE do we use for X" -> "cpe:2.3:a:Y:Z::::::::` but we don't actually know if that's still true, up to date, or what the maintainer actually wants them to be. Putting the template upstream means we can trust the values we find in the checked out code during the build process.
Also, if you’re not happy with being labelled a supplier (which seems more appropriate from a SBOM point of view, but makes some open source maintainers uncomfortable) we can remove that bit.
I've written a bit more about this proposal here https://blogs.gnome.org/hughsie/2024/11/14/firmware-sboms-for-open-source-projects/ and there's also lot more information about firmware SBOMs here: https://lvfs.readthedocs.io/en/latest/sbom.html – many thanks for your time.