Skip to content

Commit 8c0a27f

Browse files
committed
Comment out mentions and links to c2pa testfiles repo, other cleanup
1 parent bfbd8ef commit 8c0a27f

File tree

5 files changed

+45
-11
lines changed

5 files changed

+45
-11
lines changed

docs/manifest/examples.mdx

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,17 @@ import CodeBlock from '@theme/CodeBlock';
77

88
## C2PA test files
99

10-
The C2PA [public-testfiles](https://github.com/c2pa-org/public-testfiles) repository contains numerous examples of asset files with Content Credentials. See https://spec.c2pa.org/public-testfiles/ for links to easily inspect each asset file using Verify using [an asset URL](../verify.mdx#using-an-asset-url) and to the corresponding [manifest report](../c2patool/docs/usage.md#displaying-manifest-data) and [detailed manifest report](../c2patool/docs/usage.md#detailed-manifest-report) from C2PA Tool.
10+
The C2PA [public-testfiles](https://github.com/c2pa-org/public-testfiles) repository contains numerous examples of asset files with Content Credentials. This repository is currently being updated.
11+
12+
<!--
13+
See https://spec.c2pa.org/public-testfiles/ for links to easily inspect each asset file using Verify using [an asset URL](../verify.mdx#using-an-asset-url) and to the corresponding [manifest report](../c2patool/docs/usage.md#displaying-manifest-data) and [detailed manifest report](../c2patool/docs/usage.md#detailed-manifest-report) from C2PA Tool.
1114

1215
:::note
1316
The claims on these test files were signed with C2PA Tool's built-in test certificate and key (which is not on the [known certificate list](../trust-list.mdx)). Thus, Verify will display the warning: "The Content Credential issuer couldn’t be recognized. This file may not come from where it claims to."
1417
:::
1518

19+
-->
20+
1621
## Examples from C2PA Tool
1722

1823
The command-line [C2PA Tool](../c2patool/readme.md), `c2patool`, is helpful when developing applications to work with manifest data. When saving a manifest, it has two modes:

docs/manifest/reading/ingredients-reading.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,16 +77,19 @@ The ingredient object's `relationship` property describes its relationship to th
7777
The [ValidationResults](/docs/manifest/json-ref/reader#validationresults) object contains the the validation results for the active manifest and any changes to ingredients.
7878

7979
When ingredients are added, the SDK validates their Content Credentials (if any). However, the validation status of an ingredient does not imply anything about the validation status of the composed asset containing the ingredient. In other words:
80-
- A composed asset's Content Credentials may be valid, but one or more of its ingredients may have invalid Content Credentials. For example, test file [adobe-20220124-XCA.jpg](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-XCA.jpg)
81-
- A composed asset's Content Credentials may be invalid, but one or more of its ingredients may have valid Content Credentials. For example, test file [adobe-20220124-CIE-sig-CA.jpg](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-CIE-sig-CA.jpg).
80+
81+
- A composed asset's Content Credentials may be valid, but one or more of its ingredients may have invalid Content Credentials. <!--- For example, test file [adobe-20220124-XCA.jpg](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-XCA.jpg). -->
82+
- A composed asset's Content Credentials may be invalid, but one or more of its ingredients may have valid Content Credentials. <!-- For example, test file [adobe-20220124-CIE-sig-CA.jpg](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-CIE-sig-CA.jpg). -->
8283

8384
:::note
84-
Ingredient certificates are validated when they are added to the manifest store, NOT during validation of the composed asset.
85+
Ingredient certificates are validated when they are added to the manifest store, NOT during validation of the composed asset.
8586
:::
8687

8788
### Example of ingredient with invalid credentials
8889

90+
<!--
8991
As noted above, the test file [adobe-20220124-CIE-sig-CA.jpg](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-CIE-sig-CA.jpg) has an ingredient with invalid Content Credentials, as shown in this snippet from the manifest store:
92+
-->
9093

9194
```json
9295
...
@@ -123,8 +126,11 @@ As noted above, the test file [adobe-20220124-CIE-sig-CA.jpg](https://verify.con
123126
]
124127
```
125128

129+
<!--
130+
126131
## Examples
127132

128133
The [C2PA public-testfiles](https://spec.c2pa.org/public-testfiles/image/) repository has several examples of images with multiple ingredients:
129134
- [Image with two ingredients](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-CAICA.jpg); [View JSON manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-CAICA/manifest_store.json)
130135
- [Image with seven ingredients](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-CAIAIIICAICIICAIICICA.jpg); [View JSON manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-CAIAIIICAICIICAIICICA/manifest_store.json)
136+
-->

docs/manifest/reading/validation.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,16 @@ In the latest version of the SDK:
1010
- Builder performs validation by default, so you can't create an invalid manifest. Previously, the SDK was permissive in this regard.
1111
- Validation is much stricter.
1212

13-
::: note
13+
:::note
1414
There is a setting to disable full validation when signing.
1515
:::
1616

17-
<div class="review-comment">
17+
<!--
1818
Need a high-level summary of full validation, what we're looking for, etc.
19-
</div>
19+
--->
2020

2121
`Reader` has these validation methods:
22+
2223
- `validation_state()` returns `ValidationState` object (`validation_state` in JSON), which can be `Invalid`, `Valid` or `Trusted`.
2324
- `validation_results()` returns `ValidationResults` (`validation_results` in JSON), which can be `success`, `informational`, and `failure` codes for the active manifest and ingredients.
2425

docs/manifest/writing/writing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ id: writing-index
33
title: Building and writing manifest data
44
---
55

6-
Use a [ManifestDefinition](../json-ref/manifest-def.mdx) structure to define and construct manifest data for writing. The Rust library and other language libraries provide methods and objects for working with this structure. This JSON reference is generated from the JSON schema for the [ManifestDefinition](https://docs.rs/c2pa/latest/c2pa/struct.ManifestDefinition.html) object (_struct_ in Rust terminology).
6+
Use a [ManifestDefinition](../json-ref/manifest-def.mdx) structure to define and construct manifest data for writing. The Rust library and other language libraries provide methods and objects for working with this structure.
77

88
- [Writing ingredients](ingredients.md)
99
- [Writing assertions and actions](assertions-actions.md)
10-
- [ManifestDefinition JSON reference](manifest/json-ref/manifest-def.mdx)
10+
- [ManifestDefinition JSON reference](manifest/json-ref/manifest-def.mdx) generated from the JSON schema for the [ManifestDefinition](https://docs.rs/c2pa/latest/c2pa/struct.ManifestDefinition.html) object (_struct_ in Rust terminology).

docs/verify.mdx

Lines changed: 24 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,18 +46,22 @@ https://verify.contentauthenticity.org?source=<ASSET_URL>
4646

4747
where `<ASSET_URL>` is the URL of the asset.
4848

49-
For example: https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-CICA.jpg
49+
For example: https://verify.contentauthenticity.org?source=https://crandmck.github.io/test-images/images/AdobeStock_623162598.jpeg
5050

5151
:::note
5252
To use Verify on an asset URL, the URL must not require any authentication and the hosting server must allow cross-origin resource sharing (CORS) in the `Access-Control-Allow-Origin` HTTP response header.
5353
:::
5454

55+
<!--
56+
5557
### C2PA test files
5658

5759
The [C2PA public-testfiles](https://spec.c2pa.org/public-testfiles/image/) repository contains image files that demonstrate Content Credentials, including multiple ingredients, Exif metadata, and various error conditions, along with links to inspect the assets using Verify and to view the corresponding manifest reports from the [C2PA Tool](c2patool).
5860

5961
Currently, most of the asset files in the repository are JPEG images, but a few [PDF](https://spec.c2pa.org/public-testfiles/pdf/) and [video](https://spec.c2pa.org/public-testfiles/video/) test files are also available.
6062

63+
-->
64+
6165
## Information displayed
6266

6367
Once you've uploaded an asset or entered an asset URL, if the asset:
@@ -206,7 +210,12 @@ import verify_validation_error from '../static/img/verify-validation-error.png';
206210
style={{ width: '300px', display: 'block', margin: '10px auto' }}
207211
/>
208212

209-
Verify displays this warning if the `validation_status` array contains any elements. For example, a [this image](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-E-dat-CA.jpg) with a hard binding hash mismatch error, as shown in [this manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-E-dat-CA/manifest_store.json):
213+
Verify displays this warning if the `validation_status` array contains any elements. For example, here is an snippet from the manifest of an image with a hard binding hash mismatch error,
214+
215+
<!--
216+
For example, a [this image](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-E-dat-CA.jpg) with a hard binding hash mismatch error, as shown in [this manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-E-dat-CA/manifest_store.json):
217+
218+
-->
210219

211220
```
212221
"validation_status": [
@@ -218,8 +227,14 @@ Verify displays this warning if the `validation_status` array contains any eleme
218227
]
219228
```
220229

230+
<!--
231+
221232
Another example that can result in this message is shown in [this image](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-E-clm-CAICAI.jpg) with a missing referenced claim, as shown in [this manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-E-clm-CAICAI/manifest_store.json):
222233

234+
-->
235+
236+
Another example that can result in this message is a missing referenced claim, as shown in snippet of manifest data:
237+
223238
```
224239
"validation_status": [
225240
{
@@ -250,11 +265,15 @@ import verify_process from '../static/img/verify-process.png';
250265

251266
<img src={verify_process} style={{ width: '600px' }} />
252267

268+
<!--
269+
253270
See the above example yourself, based on a C2PA test image:
254271

255272
- [Inspect using Verify](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-CAICAI.jpg)
256273
- [View the corresponding manifest report from C2PA Tool](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-CAICAI/manifest_store.json)
257274

275+
-->
276+
258277
#### App or device used
259278

260279
The value shown for **App or device used** is derived from the `claim_generator` property in the active manifest. The string is truncated at the first space character and then underscore and slash characters are converted to spaces. In the above example, `"claim_generator": "make_test_images/0.16.1 c2pa-rs/0.16.1"` is displayed as **make test images 0.16.1**.
@@ -401,7 +420,10 @@ The Exif metadata assertions from the JSON manifest for the above example is sho
401420

402421
</details>
403422

423+
<!--
424+
404425
See the above example yourself, based on a C2PA test image:
405426

406427
- [Inspect using Verify](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/truepic-20230212-camera.jpg)
407428
- [View the corresponding manifest report from C2PA Tool](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/truepic-20230212-camera/manifest_store.json)
429+
-->

0 commit comments

Comments
 (0)