-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a SBOM template in CycloneDX format #6455
base: master
Are you sure you want to change the base?
Conversation
The PatchCheck is probably failing because one line in the commit message is 80 characters (i.e. over the 72? 73? limit). |
@bexcran the checkpatch seems to be lots of:
Do you really want this with CRLF endings? I've never tested uswid (or any of the other SBOM tools) with Windows line-endings, but I'm not against starting :) |
Unfortunately the edk2 repos are configured to require CRLF line endings unless specifically excluded - for example Makefiles need to use LF. So we probably will need to use CRLF for now, if possible. |
Improve supply chain security by including a SBOM file with substituted values. This will be used to construct a composite platform SBOM. Signed-off-by: Richard Hughes <[email protected]>
Done! Thanks for explaining, TIL. |
Hi @hughsie, all for this. There are some aspects I'm unclear on, which ... may be better suited for the mailing list? |
Thanks.
Happy to discuss there; but which mailing list is most suitable?
If you mean git submodules the plan is this: https://docs.google.com/presentation/d/1OPBHYZAr9SWDrmXpistJrVqd8wdN94oOfDfFXoEjTxg/edit?usp=sharing -- i.e. each thing like openssl (and deps, and deps of deps) gets the same kind of SBOM file. I'm about 85% through all the deps already.
Sure, I'm happy to do that too -- I'd need a little guidance on format and location. Long term they'll also be per-module data (as in new things in ShellPkg/* SignedCapsulePkg/* -- but I need to discuss more with the IBVs on whether adding SBOM information to the existing inf file is the plan, or whether duplicating information from the inf file into a new per-module SBOM file is what we want to do. I'm erring on the latter but it's a huge job and there's a lot of confounding factors because the OBVs typically don't just use edk, there's a lot of secret "value added" source too. |
I guess [email protected] or [email protected]. Both valid, but I tend to default towards devel.
Yes, exactly, thanks. |
Yes, that's a good question I don't have a good answer for yet. I suspect we'll want something like |
Hi,
My name is Richard Hughes and I'm a developer at Red Hat. I'm the maintainer of fwupd and LVFS, and am trying to improve software supply chain security by encouraging OEMs, ODMs and IBVs to ship Software Bill of Materials with each firmware binary blob (SBOMs).
I'm working alongside lots of other companies proactively trying to do the right thing. Although my personal focus is on firmware, the SBOM file is in CycloneDX format (one of the most popular industry standards) which makes it also useful when building CI targets too.
I would like to contribute this template SBOM file into your project that gets included into source control with substituted values that get populated automatically. I'm not super familiar with EDK, and so I've done my best populating the project values -- but please point out any that are incorrect and I'll fix them up. I've also put the
sbom.cdx.json
file in what I feel is the right place, but please say if you want me to put it somewhere different or name it a different thing; the directory andsbom
prefix are unimportant.The various firmware build tools will take these incomplete SBOM files and then build them into a complete composite SBOM to represent the firmware. Having an upstream reference to what the PURL and CPE values should be means we have something we can trust; I could quite easily spin up a web-service that we say "what CPE do we use for X" -> "cpe:2.3:a:Y:Z::::::::` but we don't actually know if that's still true, up to date, or what the maintainer actually wants them to be. Putting the template upstream means we can trust the values we find in the checked out code during the build process.
I've written a bit more about this proposal here https://blogs.gnome.org/hughsie/2024/11/14/firmware-sboms-for-open-source-projects/ and there's also lot more information about firmware SBOMs here: https://lvfs.readthedocs.io/en/latest/sbom.html – many thanks for your time and all the work that you do.