This document maps Assurance Hub guidance and evidence expectations to the concrete artifacts emitted by the TRQP Conformance Suite (CTS).
When you run CTS with --evidence-out <dir> (see README), CTS emits an evidence bundle directory containing:
| Artifact | Default path | artifact_kind | Notes |
|---|---|---|---|
| Bundle descriptor | bundle_descriptor.json |
conformance_evidence_bundle_descriptor |
Machine-readable index (paths + hashes). |
| Checksums | checksums.json |
evidence_bundle_checksums |
SHA-256 entries for key artifacts. |
| Run metadata | run.json |
conformance_run_metadata |
Run id, timestamp, profile, SUT target. |
| Verdicts | verdicts.json |
conformance_verdicts |
Per-test outcomes + reasons. |
| Manifest | manifest.json |
conformance_manifest |
Canonical list of run artifacts. |
| Manifest signature (optional) | manifest.sig |
conformance_manifest_signature |
Present for high-assurance profiles. |
| Bundle zip (optional) | bundle.zip |
conformance_evidence_bundle_zip |
Convenience packaging of the directory. |
The Hub evidence matrix uses the “Conformance evidence bundle” row as the primary CTS output. CTS implements this as:
bundle_descriptor.json + checksums.json as the index + integrity layerrun.json + verdicts.json + manifest.json as the audit coremanifest.sig for signed evidence where requiredFor a fast “is the plumbing alive?” check used by the Hub workflow:
smoke profile (profiles/smoke.yaml)bundle_descriptor.json and checksums.json are presentbundle.zip as an artifact if you want a single portable object for downstream inspectionCTS publishes lightweight schemas for its evidence outputs:
schemas/evidence/bundle_descriptor.schema.jsonschemas/evidence/checksums.schema.jsonThis repo ships al-contract.json which references the canonical AL definitions in the Assurance Hub and includes the canonical doc SHA-256 (61c599c5fa06e0c9110f40ff71c0174db5502105b97f1391dbd9ae8548115f71).
This suite includes optional schemas and guidance for GRID-style artifacts.
docs/GRID_SUPPORT.mdschemas/registrar.schema.jsonschemas/grid-status-feed.schema.jsonWhere a directory uses UNTP Digital Identity Anchor (DIA) / Identity Resolver (IDR), conformance evidence SHOULD include DIA context references and resolver documentation. The CTS validator includes lightweight checks for DIA context wiring when identity_anchor.anchor_type indicates UNTP DIA.
CTS recognizes optional supply chain integrity evidence artifacts in bundle descriptors:
| artifact_kind | Example | Purpose |
|---|---|---|
software_sbom |
SPDX/CycloneDX SBOM | Dependency transparency for deployed artifacts |
build_provenance |
provenance attestation | Verifiable build chain for AL3+ |
openssf_scorecard_report |
scorecard output | Automated posture checks evidence |
Reference: docs/reference/openssf-supply-chain.md.
When CTS reports are incorporated into a Combined Assurance Manifest, the resulting artifacts SHOULD be publishable through the Assurance Hub Trust Registry reference service so that conformance evidence becomes discoverable by ecosystem participants.