diff --git a/docs/manifest/examples.mdx b/docs/manifest/examples.mdx index 2d3aea8..6b4d691 100644 --- a/docs/manifest/examples.mdx +++ b/docs/manifest/examples.mdx @@ -7,12 +7,17 @@ import CodeBlock from '@theme/CodeBlock'; ## C2PA test files -The C2PA [public-testfiles](https://github.com/c2pa-org/public-testfiles) repository contains numerous examples of asset files with Content Credentials. See https://spec.c2pa.org/public-testfiles/ for links to easily inspect each asset file using Verify using [an asset URL](../verify.mdx#using-an-asset-url) and to the corresponding [manifest report](../c2patool/docs/usage.md#displaying-manifest-data) and [detailed manifest report](../c2patool/docs/usage.md#detailed-manifest-report) from C2PA Tool. +The C2PA [public-testfiles](https://github.com/c2pa-org/public-testfiles) repository contains numerous examples of asset files with Content Credentials. This repository is currently being updated. + + + ## Examples from C2PA Tool The command-line [C2PA Tool](../c2patool/readme.md), `c2patool`, is helpful when developing applications to work with manifest data. When saving a manifest, it has two modes: diff --git a/docs/manifest/reading/ingredients-reading.md b/docs/manifest/reading/ingredients-reading.md index 15c018f..d370954 100644 --- a/docs/manifest/reading/ingredients-reading.md +++ b/docs/manifest/reading/ingredients-reading.md @@ -77,16 +77,19 @@ The ingredient object's `relationship` property describes its relationship to th The [ValidationResults](/docs/manifest/json-ref/reader#validationresults) object contains the the validation results for the active manifest and any changes to ingredients. When ingredients are added, the SDK validates their Content Credentials (if any). However, the validation status of an ingredient does not imply anything about the validation status of the composed asset containing the ingredient. In other words: -- A composed asset's Content Credentials may be valid, but one or more of its ingredients may have invalid Content Credentials. For example, test file [adobe-20220124-XCA.jpg](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-XCA.jpg) -- A composed asset's Content Credentials may be invalid, but one or more of its ingredients may have valid Content Credentials. For example, test file [adobe-20220124-CIE-sig-CA.jpg](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-CIE-sig-CA.jpg). + +- A composed asset's Content Credentials may be valid, but one or more of its ingredients may have invalid Content Credentials. +- A composed asset's Content Credentials may be invalid, but one or more of its ingredients may have valid Content Credentials. :::note -Ingredient certificates are validated when they are added to the manifest store, NOT during validation of the composed asset. +Ingredient certificates are validated when they are added to the manifest store, NOT during validation of the composed asset. ::: ### Example of ingredient with invalid credentials + ```json ... @@ -123,8 +126,11 @@ As noted above, the test file [adobe-20220124-CIE-sig-CA.jpg](https://verify.con ] ``` + diff --git a/docs/manifest/reading/validation.md b/docs/manifest/reading/validation.md index a2f1210..aeb38e7 100644 --- a/docs/manifest/reading/validation.md +++ b/docs/manifest/reading/validation.md @@ -10,15 +10,16 @@ In the latest version of the SDK: - Builder performs validation by default, so you can't create an invalid manifest. Previously, the SDK was permissive in this regard. - Validation is much stricter. -::: note +:::note There is a setting to disable full validation when signing. ::: -