You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/manifest/assertions-actions.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ title: Assertions and actions
7
7
8
8
Assertions provide information about when, where, and how an asset was created or transformed.
9
9
10
-
In the JSON manifest, each assertion is specified by a [ManifestAssertion](../manifest/manifest-ref#manifestassertion) object. All the assertions in the manifest are in the `assertions` array. A ManifestAssertion object has two required properties, `label`, a string, and `data`, which can contain arbitrary information; and two optional properties, `kind` and `instance`.
10
+
In the JSON manifest, each assertion is specified by a [ManifestAssertion](../manifest/manifest-ref.mdx#manifestassertion) object. All the assertions in the manifest are in the `assertions` array. A ManifestAssertion object has two required properties, `label`, a string, and `data`, which can contain arbitrary information; and two optional properties, `kind` and `instance`.
11
11
12
12
The standard form of an assertion in a JSON manifest is:
13
13
@@ -37,7 +37,7 @@ Metadata assertions must include one or more `@context` properties in the `data`
37
37
38
38
### C2PA standard assertions
39
39
40
-
The C2PA Technical Specification defines a [set of standard assertions](https://c2pa.org/specifications/specifications/1.3/specs/C2PA_Specification.html#_standard_c2pa_assertion_summary) and their corresponding labels. In addition, you can define [custom assertions](#custom-assertions) for your specific application.
40
+
The C2PA Technical Specification defines a [set of standard assertions](https://c2pa.org/specifications/specifications/1.4/specs/C2PA_Specification.html#_standard_c2pa_assertion_summary) and their corresponding labels. In addition, you can define [custom assertions](#custom-assertions) for your specific application.
41
41
42
42
The following table summarizes some of the most important standard assertions.
43
43
@@ -71,7 +71,7 @@ The value of each of these properties is an object with a `use` property that ca
71
71
-`notAllowed`: Permission is NOT granted for this type of use.
72
72
-`constrained`: Permission is not unconditionally granted for this use. You can provide more details (such as contact information) in the `constraints_info` text property.
73
73
74
-
For more information, see the [C2PA Technical Specification](https://c2pa.org/specifications/specifications/1.3/specs/C2PA_Specification.html#_training_and_data_mining).
74
+
For more information, see the [C2PA Technical Specification](https://c2pa.org/specifications/specifications/1.4/specs/C2PA_Specification.html#_training_and_data_mining).
Copy file name to clipboardExpand all lines: docs/manifest/examples.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,9 +9,9 @@ import CodeBlock from '@theme/CodeBlock';
9
9
10
10
The C2PA [public-testfiles](https://github.com/c2pa-org/public-testfiles) repository contains numerous examples of asset files with Content Credentials. See https://c2pa.org/public-testfiles/ for links to easily inspect each asset file using Verify using [an asset URL](../verify#entering-an-asset-url) and to the corresponding [manifest report](../c2patool/#displaying-manifest-data) and [detailed manifest report](../c2patool/#detailed-manifest-report) from C2PA Tool.
11
11
12
-
## Examples from c2patool
12
+
## Examples from C2PA Tool
13
13
14
-
The command-line tool [`c2patool`](/docs/c2patool) is helpful when developing applications to work with manifest data. When saving a manifest, it has two modes:
14
+
The command-line [C2PA Tool](/docs/c2patool), `c2patool`, is helpful when developing applications to work with manifest data. When saving a manifest, it has two modes:
15
15
16
16
-**Standard mode** (the default), where it saves a manifest file in JSON format, which is simplified and slightly different from the underlying binary manifest structure.
17
17
-**Detailed mode** (specified with the `-d` option), where it saves a file that more closely reflects the actual structure of the binary data, including assertions with JUMBF URLs and their associated hashes.
Copy file name to clipboardExpand all lines: docs/manifest/ingredients.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ The C2PA Technical Specification describes _ingredient assertions_ but the CAI S
15
15
16
16
## Ingredient objects
17
17
18
-
Each ingredient used to create an asset is listed in the [JSON manifest](manifest-ref)`ingredients` array. When an ingredient itself has Content Credentials, those manifests are included in the composed asset's manifest store to keep the provenance data intact.
18
+
Each ingredient used to create an asset is listed in the [JSON manifest](manifest-ref.mdx)`ingredients` array. When an ingredient itself has Content Credentials, those manifests are included in the composed asset's manifest store to keep the provenance data intact.
19
19
20
20
The `ingredients` array contains an [ingredient object](manifest-ref#ingredient) for each ingredient. The only required property of the `ingredient` object is the `title` property, which usually is the source file name.
Copy file name to clipboardExpand all lines: docs/manifest/signing-manifests.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: Signing manifests
4
4
---
5
5
6
6
:::tip
7
-
Before reading this page, be sure to read [Getting started](/docs/getting-started) so you'll have some basic background on public-key infrastructure (PKI) technology, certificates, and signing manifests.
7
+
Before reading this page, be sure to read [Getting started](../getting-started.mdx) so you'll have some basic background on public-key infrastructure (PKI) technology, certificates, and signing manifests.
8
8
:::
9
9
10
10
## Overview
@@ -72,7 +72,7 @@ The information in this table is based on the [C2PA specification Trust Model se
72
72
Here is an example of generating a C2PA-compliant set of credentials using [GlobalSign](http://globalsign.com/) certificate authority (CA).
73
73
74
74
:::note
75
-
GlobalSign is just one of many CAs. For a list of some others, see [Getting started](/docs/getting-started#getting-a-security-certificate).
75
+
GlobalSign is just one of many CAs. For a list of some others, see [Getting started](../getting-started.mdx#getting-a-security-certificate).
76
76
:::note
77
77
78
78
Credential management is a complex topic and different for every organization. See [above](#overview) for links to best practices.
@@ -167,7 +167,7 @@ You now have all the needed information to configure C2PA Tool for manifest sign
167
167
168
168
The `private_key` and `sign_cert` properties must be full paths to the key and certificate chain files generated above.
169
169
170
-
You can now use C2PA Tool as described in its [documentation](/docs/c2patool/#adding-a-manifest-to-an-asset-file) to add a manifest to an image or other asset file. The command will be something like this:
170
+
You can now use C2PA Tool as described in its [documentation](../c2patool/readme.md#adding-a-manifest-to-an-asset-file) to add a manifest to an image or other asset file. The command will be something like this:
The example above uses the information in `my_manifest.json` to add a new manifest to output `signed_image.jpg` using source `my_image.jpg`. The manifest will be signed using the PS256 signature algorithm with private key `mykey.pem`. The manifest will contain the trust chain specified in `mycerts.pem`.
177
177
178
178
:::warning
179
-
In a production application, do not access a private key and certificate directly from the file system as shown in this example. Doing so is fine during development, but not in production because it exposes these sensitive files to potential attackers. Instead use a hardware security module (HSM) and optionally a Key Management Service (KMS) to access them; for example as show in the [C2PA Python Example](../../docs/c2pa-python-example).
179
+
In a production application, do not access a private key and certificate directly from the file system as shown in this example. Doing so is fine during development, but not in production because it exposes these sensitive files to potential attackers. Instead use a hardware security module (HSM) and optionally a Key Management Service (KMS) to access them; for example as show in the [C2PA Python Example](../c2pa-python-example/readme.md).
0 commit comments