# ESP-IDF SBOM Tool (**esp-idf-sbom**)
> :warning: **This is experimental implementation, which is subject to change without prior
> notice and no backward compatibility is guaranteed.**
The esp-idf-sbom tool creates [Software bill of materials][1] (SBOM)
files in the [Software Package Data Exchange][2] (SPDX) format for applications
generated by the [Espressif IoT Development Framework][3] (ESP-IDF).
It also allows to check generated SBOM files for know vulnerabilities against
the [National Vulnerability Database][4] (NVD) based on the
[Common Platform Enumeration][5] (CPE) provided in the SBOM.
### Table of Contents
- [Required ESP-IDF versions](#required-esp-idf-versions)
- [Installation](#installation)
- [Creating SBOM](#creating-sbom)
- [Checking vulnerabilities](#checking-vulnerabilities)
- [Usage example](#usage-example)
- [SPDX SBOM layout](#spdx-sbom-layout)
- [Manifest file](#manifest-file)
- [Validating manifest files](#validating-manifest-files)
- [Checking manifest files for vulnerabilities](#checking-manifest-files-for-vulnerabilities)
- [Licenses and Copyrights](#licenses-and-copyrights)
- [Return Values](#return-values)
- [Resources](#resources)
## Required ESP-IDF versions
All release branches of currently supported ESP-IDF versions allow to
generate the SBOM file.
| ESP-IDF version | branch with SBOM support | commits
|-----------------|---------------------------|----------------------------------------------------------------------------------------------------------------------------------|
| 4.3 | release/v4.3 | [befb32b45bc9314b48c29624f9a2c2ef30e34260](https://github.com/espressif/esp-idf/commit/befb32b45bc9314b48c29624f9a2c2ef30e34260) |
| | | [f1eef50947ab5770ae4d904c07615e7acab06002](https://github.com/espressif/esp-idf/commit/f1eef50947ab5770ae4d904c07615e7acab06002) |
| 4.4 | release/v4.4 | [ee505a996045c3657711c3d70c58af8dd48b1426](https://github.com/espressif/esp-idf/commit/ee505a996045c3657711c3d70c58af8dd48b1426) |
| | | [53f271ce108d6fa99cf92d59fe9b9dcc4b8fb45b](https://github.com/espressif/esp-idf/commit/53f271ce108d6fa99cf92d59fe9b9dcc4b8fb45b) |
| 5.0 | release/v5.0 | [30735b33efabd6cf038bcb258b674cf828ad5ecf](https://github.com/espressif/esp-idf/commit/30735b33efabd6cf038bcb258b674cf828ad5ecf) |
| | | [9156bbb55c920d6704329975311c331b931ed6bc](https://github.com/espressif/esp-idf/commit/9156bbb55c920d6704329975311c331b931ed6bc) |
| 5.1 | release/v5.1 | [0f781c718c8548cd2b0e41a30e1814f1c6ed93a2](https://github.com/espressif/esp-idf/commit/0f781c718c8548cd2b0e41a30e1814f1c6ed93a2) |
| | | [03162bb276d4155760e8aa839020f0587f5ef599](https://github.com/espressif/esp-idf/commit/03162bb276d4155760e8aa839020f0587f5ef599) |
| latest | master | |
Older versions, e.g. `v5.0.2`, do not have the required code merged and the following error
message will be printed.
E: Project description file "build/project_description.json" does not support SBOM generation. Please see the list of IDF versions required by esp-idf-sbom.
If you see this error message and want to try `esp-idf-sbom`, you can
1. switch to the release branch for version you are using. For example `release/v5.0` if you are using `v5.0.2`.
2. use future ESP-IDF versions to experiment with esp-idf-sbom.
3. use `git-cherry-pick` and apply commits for your release from the table above. For example for `v5.0.2` use
$ git cherry-pick 30735b33efabd6cf038bcb258b674cf828ad5ecf 9156bbb55c920d6704329975311c331b931ed6bc
## Installation
Currently esp-idf-sbom is not integrated into ESP-IDF and needs to by installed
separately from Python Package Index (PyPI) with
pip install esp-idf-sbom
After installation the `esp-idf-sbom` command should be available or the esp_idf_sbom
python module can be used with
python -m esp_idf_sbom
## Creating SBOM
The application has to be built before the SBOM file can be created. This step should
not be required in the future once esp-idf-sbom is integrated into ESP-IDF.
The SBOM file can be created with
esp-idf-sbom create <project description file>
The `project description file` is a path to the *project_description.json* file, which
is by default created by the ESP-IDF build system in the project's *build* directory.
The generated SBOM file is printed to the standard output stream by default or can be
saved in a file if the `--output-file` option is used.
## Checking vulnerabilities
Vulnerabilities are checked based on the [Common Platform Enumeration][5] (CPE) information
included in the SBOM file for SPDX packages. While checking for vulnerabilities, only packages
with direct or indirect relationship to the **project** package are examined. For example if mbedtls
component is compiled, due to component dependecies, but it's actually not linked into the
final binary, it will be by default presented in the SBOM file, but it will not be reachable
from the root **project** package and hence it will not be checked for vulnerabilities.
The reason for this is to avoid possible false positives, because such packages
have no direct impact on the resulting application. This can be changed with the `--check-all-packages`
option. If used, all packages in the SBOM file will be checked for possible vulnerabilities
regardless their relationships to the application binary.
SBOM file generated by the esp-idf-sbom tool can be checked for known vulnerabilities
with
esp-idf-sbom check [SBOM file]
If *SBOM file* is not provided, the standard input stream is used.
The default report format consists of multiple tables:
1. Report summary
2. Packages with Identified Vulnerabilities
3. Packages with Possible Vulnerabilities
4. Packages with Excluded Vulnerabilities
5. Packages with No Identified Vulnerabilities
6. Packages without CPE and Keyword Information
The output format may be changed with the `--format` option, which supports exporting
the report into **json**, **csv** or **markdown** format.
If package is not vulnerable to a specific CVE, it can be added to the manifest **cve-exclude-list**
list and checker will not report it as identified vulnerability, but as excluded vulnerability.
When the `--extended-scan` option is applied with the check command, the
checker uses the product part of the CPE from the SBOM file to search
through descriptions of unanalyzed CVEs in NVD. This can be beneficial for
getting early notifications about potential new CVEs that have not yet been
analyzed by the NVD and do not have a CPE assigned. In addition to the CPE
product name, all keywords specified in **cve-keywords** in the related
manifest file, which are also included in the SBOM, are checked. For instance,
the CPE product part for mbedtls is **mbed_tls**, so this keyword will be
searched when `--extended-scan` is used. If the mbedtls library manifest file
contains **mbed tls** and **mbedtls** in **cve-keywords**, these will also be
searched. Be aware that using the `--extended-scan` option may result in false
positive reports that are unrelated to the scanned packages or their versions.
These reports must be thoroughly analyzed and are included in a separate table
titled `Packages with Possible Vulnerabilities` in the report.
The vulnerability check typically uses the NVD REST API by default, provided by
[https://nvd.nist.gov](https://nvd.nist.gov). However, an alternative source of
information for the vulnerability check can be a local NVD mirror, available
from the [esp-nvd-mirror][6] repository. The NVD mirror may provide a faster
and more reliable way to perform vulnerability checks in case there are
availability issues with NVD API endpoints or when a large number of packages
need to be scanned quickly. You can enable the use of the local NVD mirror with
the `--local-db` option.
esp-idf-sbom check --local-db [SBOM file]
By default, the `--local-db` option updates the NVD mirror before performing a
vulnerability check. To disable this, use the `--no-sync-db` option. Be aware
that the initial setup of the NVD mirror may take some time. You can also
update the NVD mirror manually with the `sync-db` command.
esp-idf-sbom sync-db
esp-idf-sbom check --local-db --no-sync-db [SBOM file]
## Usage example
This is an example of basic usage for the blink project, which is part of the ESP-IDF.
It's expected that ESP-IDF is installed and set.
$ cd examples/get-started/blink/ # In esp-idf directory go to the blink example
$ idf.py build # Project has to be built first
$ esp-idf-sbom create -o blink.spdx build/project_description.json
$ esp-idf-sbom check blink.spdx
$ esp-idf-sbom create build/project_description.json | esp-idf-sbom check
The resulting `blink.spdx` sbom file can be found in the `blink` project directory.
## SPDX SBOM layout
The SBOM file is created based on application sources, build artefacts, information
provided by the ESP-IDF build system and SBOM manifest files. The resulting SBOM
file contains SPDX packages for the final **project** application, used **toolchain**,
**components** used during build, git **submodules** and **subpackages**. The **subpackages**
are created based on `sbom.yml` manifest files found in **submodules** and **subpackages**
sub-directories or referenced manifest files or manifest files for virtual packages.
Please see [Manifest file](#manifest-file).
Packages are linked together with SPDX *DEPENDS_ON* relationships with the **project** package
as the root package. By default packages for configuration only components and components not
linked into the application are present in SBOM, but are not linked through SPDX
relationships. In other worlds dependencies on such packages are removed. This behaviour
can be altered with `--add-config-deps` and `--add-unused-deps` command line options.
## Manifest file
During SBOM generation the esp-idf-sbom tool is looking for `sbom.yml` manifest files.
They are used as a source of information for the corresponding SPDX package in the SBOM file
as described above.
The manifest file may be present at root of **project**, **component**, **submodule** or
in any of their sub-directories. If `sbom.yml` is found in a sub-directory a new **subpackage**
SPDX package is created and linked with the parent SPDX package. This can be used in cases
where e.g. one **component** contains multiple libraries and they should be represented
by separate SPDX packages.
Example of multiple `sbom.yml` files usage for the `console` component.
console
├── argtable3
│ └── sbom.yml
├── linenoise
│ └── sbom.yml
└── sbom.yml
The `esp-idf-sbom` tool will create main console **component** package, which will
contain two **subpackages** for `argtable3` and `linenoise` libraries. Please note that
the manifest file in the `console` component root directory is not necessary to create
SPDX package, because `esp-idf-sbom` automatically creates SPDX package for each
**component**. The `sbom.yml` files may be placed at any sub-directory depth and
`esp-idf-sbom` will create proper SPDX package hierarchy for them.
The `sbom.yml` is a simple yaml file, which may contain the following entries.
* **name**:
Package name that will be used in the SPDX package.
* **version**:
Package version.
* **description**:
Short package description.
* **repository**:
Link to git repository.
* **url**:
Link to package download location.
* **cpe**:
CPE used for vulnerabilities check against NVD. This can be single CPE value or a
list of CPEs.
* **supplier**:
Package supplier. Person or organization distributing the package. Should be prefixed
with *Person:* or *Organization:* as described in SPDX specification.
* **originator**:
Package originator. If the package comes from another person or organization
that has been identified as a supplier. For example if a component is based
on 3rd party code with some modifications, the originator is the 3rd party code
author, but the supplier is the person or organization distributing the final
component. For more detailed information please see the SPDX specification.
As for supplier, *Person:* or *Organization:* prefix should be used for
originator value.
* **hash**:
SHA of the directory(`git-tree` object) the manifest file describes or HEAD SHA of a submodule. This value
is used during the manifest file validation to check if the hash in the manifest file matches the
SHA recorded in the `git-tree`. Its purpose is to make sure that the information in the manifest
file is up-to-date. For example if a submodule or 3rd party library is updated, the
version in the manifest file should be probably updated too. The SHA value can be obtained
e.g. with `git ls-tree HEAD <path>`, where `<path>` is a package directory, which is described by
the manifest file. Please note that a hash value for a directory, not a submodule, cannot
be placed in manifest file, which is stored within the same directory, because the directory SHA
in `git-tree` will change every time the manifest file changes(chicken egg problem). To make
the hash variable work, it needs to be placed in a referenced manifest, which is not stored
within a directory it describes. For example freertos component can have main `sbom.yml`
manifest file, which refers to `sbom_FreeRTOS-Kernel.yml` manifest describing the `FreeRTOS-Kernel`
package in the `FreeRTOS-Kernel` directory.
components/freertos/sbom.yml
```
manifests:
- path: sbom_FreeRTOS-Kernel.yml
dest: FreeRTOS-Kernel
```
components/freertos/sbom_FreeRTOS-Kernel.yml
```
name: 'freertos'
version: '10.4.3'
cpe: cpe:2.3:o:amazon:freertos:{}:*:*:*:*:*:*:*
supplier: 'Organization: Espressif Systems (Shanghai) CO LTD'
originator: 'Organization: Amazon Web Services'
description: An open-source, real-time operating system (RTOS) with additional features and patches from Espressif.
hash: 4e8101b6f57a0640ae54c6da605c1b532c0f8f89
cve-exclude-list:
- cve: CVE-2021-43997
reason: This vulnerability only affects ARMv7-M and ARMv8-M ports of FreeRTOS and hence does not affect Espressif SoCs which are not based on these architectures.
```
* **license**:
License expression explicitly declared by the author.
* **copyright**:
Copyright explicitly declared by the author. This can be single string or a
list of copyrights.
* **cve-exclude-list**:
List of already evaluated CVEs, which do not apply to this package. This can be used
to exclude CVEs from the `esp-idf-sbom` checker report in case the package is not
vulnerable to specific CVEs. Each CVE in the exclude list is represented as dictionary with
the `cve` and `reason` keys. Information about excluded CVEs is added to the generated
SBOM file into `PackageComment` SPDX tag and later used by the checker.
* cve: CVE-ID
* reason : description why this package is not vulnerable to this CVE
```
version: 0.1.0
description: Blink application example
cve-exclude-list:
- cve: CVE-2023-1234
reason: Description why this package is not vulnerable
```
* **cve-keywords**:
When using the `--extended-scan` option to run the checker, look for these keywords
in the CVE descriptions. These keywords are also included in the generated
SBOM file.
```
cve-keywords:
- mbedtls
- mbed tls
```
* **manifests**:
List of manifest files which cannot be added directly into the **component** or **submodule**
sub-directories to create **subpackage**. For example the following will create a new
SPDX package for the `subpackage` directory with information from the `subpackage.yml` manifest file.
This manifest file is treated as it would be actually stored in the `subpackage` directoery.
* path: path of manifest file relatitve to the sbom.yml
* dest: destination directory for path, again relative to sbom.yml
```
version: 0.1.0
description: Blink application example
manifests:
- path: subpackage.yml
dest: subpackage
```
* **virtpackages**:
In some situations, it can be beneficial to define a relationship or dependency
on a package that isn't physically available during compilation. For example,
certain functionality required by an application might be implemented in ROM
and used by the application. A case in point is mbedtls, which could reside in
the ROM and be utilized by the application depending on configuration settings.
In these instances, a virtual package can be useful to represent this
dependency.
```
virtpackages:
- virt_pkg1.yml
- virt_pkg2.yml
```
* **if**:
An expression utilizing the configuration variables can conditionally
include a package. This condition is disregarded for **project** and
**component** packages, which are always included. The operators listed
below, in order of decreasing precedence, can be used. The order of
operations can be adjusted using brackets. If the expression evaluates to
**true**, the package is included. The **--disable-conditions** option can
disable conditions usage.
- **!**: negation
- **<**, **>**, **>=**, **<=**: comparison
- **=**, **!=**: equal, not equal
- **&&**: logical and
- **||**: logical or
```
if: 'IDF_TARGET = "esp32"'
if: '(IDF_TARGET_ESP32 || IDF_TARGET = "esp32") && !IDF_TOOLCHAIN_GCC'
if: '1536 <= FREERTOS_ISR_STACKSIZE < 0xffff'
```
Example of the `sbom.yml` manifest file for the ESP-IDF blink project.
version: 0.1.0
description: Blink application example
url: https://blink.org/blink-0.1.0.tar.gz # non-existing package download URL example
cpe: cpe:2.3:a:hrbata:blink:{}:*:*:*:*:*:*:* # non-existing CPE example
supplier: 'Person: Frantisek Hrbata (frantisek.hrbata@espressif.com)'
originator: 'Organization: Espressif Systems (Shanghai) CO LTD'
cve-exclude-list:
- cve: CVE-2023-1234
reason: Description why this package is not vulnerable
- cve: CVE-2023-1235
reason: Description why this package is not vulnerable
Information from the `sbom.yml` manifest file are mapped to the following SPDX tags.
| manifest | SPDX |
|-----------------|------------------------------|
| name | PackageName |
| version | PackageVersion |
| description | PackageSummary |
| repository | ExternalRef OTHER repository |
| url | PackageDownloadLocation |
| cpe | ExternalRef cpe23Type |
| supplier | PackageSupplier |
| originator | PackageOriginator |
| license | PackageLicenseDeclared |
| copyright | PackageCopyrightText |
| cve-exclude-list| PackageComment |
| cve-keywords | PackageComment |
Even though the `sbom.yml` file is the primary source of information, the esp-idf-sbom tool
is also looking at other places if it's not present. The `idf_component.yml` manifest file,
used for components managed by the component manager, may contain `sbom` dictionary/namespace,
which will be used by esp-idf-sbom if presented. This dictionary may contain the same information
as `sbom.yml`.
Example of the `idf_component.yml` manifest file for led_strip managed component.
dependencies:
idf:
version: '>=5.0'
description: Driver for Addressable LED Strip (WS2812, etc)
url: https://github.com/espressif/idf-extra-components/tree/master/led_strip
version: 2.4.1
sbom:
cpe: cpe:2.3:a:hrbata:led_strip:{}:*:*:*:*:*:*:* # non-existing CPE example
supplier: 'Organization: Espressif Systems (Shanghai) CO LTD'
cve-exclude-list:
- cve: CVE-2023-1234
reason: Description why this package is not vulnerable
- cve: CVE-2023-1235
reason: Description why this package is not vulnerable
If the `sbom` dictionary is not presented in `idf_component.yml` or it's missing some information,
the version, description, maintainers and url information from `idf_component.yml` manifest is used.
Information from the `idf_component.yml` manifest file are mapped to the following SPDX tags.
| manifest | SPDX |
|--------------|------------------------------|
| name | PackageName |
| version | PackageVersion |
| description | PackageSummary |
| maintainers | PackageSupplier |
| url | PackageDownloadLocation |
Component version may be guessed based on git-describe and Espressif
as a default supplier may be guessed based on git repository or package URL. The guessing
may be disabled by using the '--no-guess' option.
For git submodules, the `.gitmodules` configuration file is also checked for additional submodule
information. Submodule configuration may contain variables with the `sbom-` prefix, which are considered as
SBOM manifest information. All keys used in the `sbom.yml` manifest file can also be specified in
`.gitmodules` with the `git-config` format instead of yaml.
Example of manifest information added for the `micro-ecc` submodule in `.gitmodules`.
[submodule "components/bootloader/subproject/components/micro-ecc/micro-ecc"]
path = components/bootloader/subproject/components/micro-ecc/micro-ecc
url = ../../kmackay/micro-ecc.git
sbom-version = 1.0
sbom-cpe = cpe:2.3:a:micro-ecc_project:micro-ecc:{}:*:*:*:*:*:*:*
sbom-supplier = Person: Ken MacKay
sbom-url = https://github.com/kmackay/micro-ecc
sbom-description = A small and fast ECDH and ECDSA implementation for 8-bit, 32-bit, and 64-bit processors
sbom-hash = d037ec89546fad14b5c4d5456c2e23a71e554966
sbom-cve-exclude-list = CVE-2023-1234 Description why this package is not vulnerable
sbom-cve-exclude-list = CVE-2023-1235 Description why this package is not vulnerable
Manifest information is gathered in the following order and only missing
values are added. If e.g. `version` is found in `sbom.yml` any other
`version` value found e.g. in `.gitmodules` is ignored.
1. referenced manifest from parent package
2. `sbom.yml`
3. `sbom` dictionary/namespace in `idf_component.yml`
4. sbom information contained in submodule configuration in `.gitmodules`
5. `idf_component.yml` information provided for component manager
### Validating manifest files
Manifest files are validated while the SBOM is generated. They can be also validated explicitly
with the `esp-idf-sbom manifest validate` command.
esp-idf-sbom manifest validate [PATH_TO_VALIDATE...]
`PATH_TO_VALIDATE` is an optional path to a manifest file(sbom.yml, idf_manifest.yml or .gitmodules) or
directory, which will be searched for manifest files. If `PATH_TO_VALIDATE` is not provided, the current
working directory is used.
Usage example:
$ esp-idf-sbom manifest validate ~/work/esp-idf ~/work/idf-extra-components/
$ esp-idf-sbom manifest validate ~/work/esp-idf/.gitmodules ~/work/esp-idf/components/freertos/FreeRTOS-Kernel/sbom.yml
### Checking manifest files for vulnerabilities
The `esp-idf-sbom` tool uses the generated SBOM SPDX file to check for possible vulnerabilities.
It also allows to scan for vulnerabilities based on the information presented in manifest
files. This can be used e.g. to scan a whole repository without a need to generate the SBOM SPDX file.
esp-idf-sbom validate-submodule-hash [PATH_TO_CHECK...]
`PATH_TO_CHECK` is an optional path to a manifest file(sbom.yml, idf_manifest.yml or .gitmodules) or
directory, which will be searched for manifest files. If `PATH_TO_CHECK` is not provided, the current
working directory is used.
Usage example:
$ esp-idf-sbom manifest check ~/work/esp-idf ~/work/idf-extra-components/
$ esp-idf-sbom manifest check ~/work/esp-idf/.gitmodules ~/work/esp-idf/components/freertos/FreeRTOS-Kernel/sbom.yml
# Use a local NVD mirror for vulnerability checks.
$ esp-idf-sbom manifest check --local-db ~/work/esp-idf ~/work/idf-extra-components/
## Licenses and Copyrights
Adding licenses and copyrights information into the SBOM file has to be explicitly
requested by using the `--file-tags` option. This requires to scan all files and
may take some time. It also may result in a quite big SBOM file.
All **component** and **submodule** files are scanned for the `SPDX-License-Identifier`,
`SPDX-FileCopyrightText` and `SPDX-FileContributor` SPDX file tags. Information from
these tags is used in the generated SBOM file to specify licenses and copyrights for
SPDX packages which represent **project**, **component** or **submodule**. The project's
final license expression is a logical AND of all licenses concluded from **components**
and **submodules** used in the final project binary.
The license can be also explicitly declared by the author in the `sbom.yml` file with the `license`
variable. This information is used as a value for the `PackageLicenseDeclared` SPDX tag for
given **project**, **component** or **submodule**.
## Return Values
* **0**:
No error, no vulnerability found, manifest file(s) valid.
* **1**:
Vulnerability found or manifest file not valid.
* **128**:
Fatal error.
## Resources
* DevCon24 presentation - [Enhancing IoT Security Generating SBOMs with esp-idf-sbom][7]
[1]: https://en.wikipedia.org/wiki/Software_supply_chain
[2]: https://spdx.dev
[3]: https://docs.espressif.com/projects/esp-idf/en/latest
[4]: https://nvd.nist.gov
[5]: https://en.wikipedia.org/wiki/Common_Platform_Enumeration
[6]: https://github.com/espressif/esp-nvd-mirror
[7]: https://www.youtube.com/watch?v=ODZwxKawVXo
Raw data
{
"_id": null,
"home_page": "https://github.com/espressif/esp-idf-sbom",
"name": "esp-idf-sbom",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.7",
"maintainer_email": null,
"keywords": "espressif, embedded, spdx, sbom",
"author": "Espressif Systems",
"author_email": null,
"download_url": "https://files.pythonhosted.org/packages/bd/d3/c7da86d1f58bb94ae63c2fdfb2b0abf45304625da900897f6844214b5e39/esp-idf-sbom-0.19.1.tar.gz",
"platform": null,
"description": "# ESP-IDF SBOM Tool (**esp-idf-sbom**)\n\n> :warning: **This is experimental implementation, which is subject to change without prior\n> notice and no backward compatibility is guaranteed.**\n\nThe esp-idf-sbom tool creates [Software bill of materials][1] (SBOM)\nfiles in the [Software Package Data Exchange][2] (SPDX) format for applications\ngenerated by the [Espressif IoT Development Framework][3] (ESP-IDF).\nIt also allows to check generated SBOM files for know vulnerabilities against\nthe [National Vulnerability Database][4] (NVD) based on the\n[Common Platform Enumeration][5] (CPE) provided in the SBOM.\n\n### Table of Contents\n- [Required ESP-IDF versions](#required-esp-idf-versions)\n- [Installation](#installation)\n- [Creating SBOM](#creating-sbom)\n- [Checking vulnerabilities](#checking-vulnerabilities)\n- [Usage example](#usage-example)\n- [SPDX SBOM layout](#spdx-sbom-layout)\n- [Manifest file](#manifest-file)\n - [Validating manifest files](#validating-manifest-files)\n - [Checking manifest files for vulnerabilities](#checking-manifest-files-for-vulnerabilities)\n- [Licenses and Copyrights](#licenses-and-copyrights)\n- [Return Values](#return-values)\n- [Resources](#resources)\n\n## Required ESP-IDF versions\n\nAll release branches of currently supported ESP-IDF versions allow to\ngenerate the SBOM file.\n\n| ESP-IDF version | branch with SBOM support | commits\n|-----------------|---------------------------|----------------------------------------------------------------------------------------------------------------------------------|\n| 4.3 | release/v4.3 | [befb32b45bc9314b48c29624f9a2c2ef30e34260](https://github.com/espressif/esp-idf/commit/befb32b45bc9314b48c29624f9a2c2ef30e34260) |\n| | | [f1eef50947ab5770ae4d904c07615e7acab06002](https://github.com/espressif/esp-idf/commit/f1eef50947ab5770ae4d904c07615e7acab06002) |\n| 4.4 | release/v4.4 | [ee505a996045c3657711c3d70c58af8dd48b1426](https://github.com/espressif/esp-idf/commit/ee505a996045c3657711c3d70c58af8dd48b1426) |\n| | | [53f271ce108d6fa99cf92d59fe9b9dcc4b8fb45b](https://github.com/espressif/esp-idf/commit/53f271ce108d6fa99cf92d59fe9b9dcc4b8fb45b) |\n| 5.0 | release/v5.0 | [30735b33efabd6cf038bcb258b674cf828ad5ecf](https://github.com/espressif/esp-idf/commit/30735b33efabd6cf038bcb258b674cf828ad5ecf) |\n| | | [9156bbb55c920d6704329975311c331b931ed6bc](https://github.com/espressif/esp-idf/commit/9156bbb55c920d6704329975311c331b931ed6bc) |\n| 5.1 | release/v5.1 | [0f781c718c8548cd2b0e41a30e1814f1c6ed93a2](https://github.com/espressif/esp-idf/commit/0f781c718c8548cd2b0e41a30e1814f1c6ed93a2) |\n| | | [03162bb276d4155760e8aa839020f0587f5ef599](https://github.com/espressif/esp-idf/commit/03162bb276d4155760e8aa839020f0587f5ef599) |\n| latest | master | |\n\nOlder versions, e.g. `v5.0.2`, do not have the required code merged and the following error\nmessage will be printed.\n\n E: Project description file \"build/project_description.json\" does not support SBOM generation. Please see the list of IDF versions required by esp-idf-sbom.\n\nIf you see this error message and want to try `esp-idf-sbom`, you can\n\n1. switch to the release branch for version you are using. For example `release/v5.0` if you are using `v5.0.2`.\n2. use future ESP-IDF versions to experiment with esp-idf-sbom.\n3. use `git-cherry-pick` and apply commits for your release from the table above. For example for `v5.0.2` use\n\n $ git cherry-pick 30735b33efabd6cf038bcb258b674cf828ad5ecf 9156bbb55c920d6704329975311c331b931ed6bc\n\n\n## Installation\n\nCurrently esp-idf-sbom is not integrated into ESP-IDF and needs to by installed\nseparately from Python Package Index (PyPI) with\n\n pip install esp-idf-sbom\n\nAfter installation the `esp-idf-sbom` command should be available or the esp_idf_sbom\npython module can be used with\n\n python -m esp_idf_sbom\n\n\n## Creating SBOM\n\nThe application has to be built before the SBOM file can be created. This step should\nnot be required in the future once esp-idf-sbom is integrated into ESP-IDF.\n\nThe SBOM file can be created with\n\n esp-idf-sbom create <project description file>\n\nThe `project description file` is a path to the *project_description.json* file, which\nis by default created by the ESP-IDF build system in the project's *build* directory.\nThe generated SBOM file is printed to the standard output stream by default or can be\nsaved in a file if the `--output-file` option is used.\n\n\n## Checking vulnerabilities\n\nVulnerabilities are checked based on the [Common Platform Enumeration][5] (CPE) information\nincluded in the SBOM file for SPDX packages. While checking for vulnerabilities, only packages\nwith direct or indirect relationship to the **project** package are examined. For example if mbedtls\ncomponent is compiled, due to component dependecies, but it's actually not linked into the\nfinal binary, it will be by default presented in the SBOM file, but it will not be reachable\nfrom the root **project** package and hence it will not be checked for vulnerabilities.\nThe reason for this is to avoid possible false positives, because such packages\nhave no direct impact on the resulting application. This can be changed with the `--check-all-packages`\noption. If used, all packages in the SBOM file will be checked for possible vulnerabilities\nregardless their relationships to the application binary.\n\nSBOM file generated by the esp-idf-sbom tool can be checked for known vulnerabilities\nwith\n\n esp-idf-sbom check [SBOM file]\n\nIf *SBOM file* is not provided, the standard input stream is used.\n\nThe default report format consists of multiple tables:\n\n1. Report summary\n2. Packages with Identified Vulnerabilities\n3. Packages with Possible Vulnerabilities\n4. Packages with Excluded Vulnerabilities\n5. Packages with No Identified Vulnerabilities\n6. Packages without CPE and Keyword Information\n\nThe output format may be changed with the `--format` option, which supports exporting\nthe report into **json**, **csv** or **markdown** format.\n\nIf package is not vulnerable to a specific CVE, it can be added to the manifest **cve-exclude-list**\nlist and checker will not report it as identified vulnerability, but as excluded vulnerability.\n\nWhen the `--extended-scan` option is applied with the check command, the\nchecker uses the product part of the CPE from the SBOM file to search\nthrough descriptions of unanalyzed CVEs in NVD. This can be beneficial for\ngetting early notifications about potential new CVEs that have not yet been\nanalyzed by the NVD and do not have a CPE assigned. In addition to the CPE\nproduct name, all keywords specified in **cve-keywords** in the related\nmanifest file, which are also included in the SBOM, are checked. For instance,\nthe CPE product part for mbedtls is **mbed_tls**, so this keyword will be\nsearched when `--extended-scan` is used. If the mbedtls library manifest file\ncontains **mbed tls** and **mbedtls** in **cve-keywords**, these will also be\nsearched. Be aware that using the `--extended-scan` option may result in false\npositive reports that are unrelated to the scanned packages or their versions.\nThese reports must be thoroughly analyzed and are included in a separate table\ntitled `Packages with Possible Vulnerabilities` in the report.\n\nThe vulnerability check typically uses the NVD REST API by default, provided by\n[https://nvd.nist.gov](https://nvd.nist.gov). However, an alternative source of\ninformation for the vulnerability check can be a local NVD mirror, available\nfrom the [esp-nvd-mirror][6] repository. The NVD mirror may provide a faster\nand more reliable way to perform vulnerability checks in case there are\navailability issues with NVD API endpoints or when a large number of packages\nneed to be scanned quickly. You can enable the use of the local NVD mirror with\nthe `--local-db` option.\n\n esp-idf-sbom check --local-db [SBOM file]\n\nBy default, the `--local-db` option updates the NVD mirror before performing a\nvulnerability check. To disable this, use the `--no-sync-db` option. Be aware\nthat the initial setup of the NVD mirror may take some time. You can also\nupdate the NVD mirror manually with the `sync-db` command.\n\n esp-idf-sbom sync-db\n esp-idf-sbom check --local-db --no-sync-db [SBOM file]\n\n\n## Usage example\n\nThis is an example of basic usage for the blink project, which is part of the ESP-IDF.\nIt's expected that ESP-IDF is installed and set.\n\n $ cd examples/get-started/blink/ # In esp-idf directory go to the blink example\n $ idf.py build # Project has to be built first\n $ esp-idf-sbom create -o blink.spdx build/project_description.json\n $ esp-idf-sbom check blink.spdx\n\n $ esp-idf-sbom create build/project_description.json | esp-idf-sbom check\n\nThe resulting `blink.spdx` sbom file can be found in the `blink` project directory.\n\n\n## SPDX SBOM layout\n\nThe SBOM file is created based on application sources, build artefacts, information\nprovided by the ESP-IDF build system and SBOM manifest files. The resulting SBOM\nfile contains SPDX packages for the final **project** application, used **toolchain**,\n**components** used during build, git **submodules** and **subpackages**. The **subpackages**\nare created based on `sbom.yml` manifest files found in **submodules** and **subpackages**\nsub-directories or referenced manifest files or manifest files for virtual packages.\nPlease see [Manifest file](#manifest-file).\n\nPackages are linked together with SPDX *DEPENDS_ON* relationships with the **project** package\nas the root package. By default packages for configuration only components and components not\nlinked into the application are present in SBOM, but are not linked through SPDX\nrelationships. In other worlds dependencies on such packages are removed. This behaviour\ncan be altered with `--add-config-deps` and `--add-unused-deps` command line options.\n\n\n## Manifest file\n\nDuring SBOM generation the esp-idf-sbom tool is looking for `sbom.yml` manifest files.\nThey are used as a source of information for the corresponding SPDX package in the SBOM file\nas described above.\n\nThe manifest file may be present at root of **project**, **component**, **submodule** or\nin any of their sub-directories. If `sbom.yml` is found in a sub-directory a new **subpackage**\nSPDX package is created and linked with the parent SPDX package. This can be used in cases\nwhere e.g. one **component** contains multiple libraries and they should be represented\nby separate SPDX packages.\n\nExample of multiple `sbom.yml` files usage for the `console` component.\n\n console\n \u251c\u2500\u2500 argtable3\n \u2502\u00a0\u00a0 \u2514\u2500\u2500 sbom.yml\n \u251c\u2500\u2500 linenoise\n \u2502\u00a0\u00a0 \u2514\u2500\u2500 sbom.yml\n \u2514\u2500\u2500 sbom.yml\n\nThe `esp-idf-sbom` tool will create main console **component** package, which will\ncontain two **subpackages** for `argtable3` and `linenoise` libraries. Please note that\nthe manifest file in the `console` component root directory is not necessary to create\nSPDX package, because `esp-idf-sbom` automatically creates SPDX package for each\n**component**. The `sbom.yml` files may be placed at any sub-directory depth and\n`esp-idf-sbom` will create proper SPDX package hierarchy for them.\n\nThe `sbom.yml` is a simple yaml file, which may contain the following entries.\n\n* **name**:\n Package name that will be used in the SPDX package.\n* **version**:\n Package version.\n* **description**:\n Short package description.\n* **repository**:\n Link to git repository.\n* **url**:\n Link to package download location.\n* **cpe**:\n CPE used for vulnerabilities check against NVD. This can be single CPE value or a\n list of CPEs.\n* **supplier**:\n Package supplier. Person or organization distributing the package. Should be prefixed\n with *Person:* or *Organization:* as described in SPDX specification.\n* **originator**:\n Package originator. If the package comes from another person or organization\n that has been identified as a supplier. For example if a component is based\n on 3rd party code with some modifications, the originator is the 3rd party code\n author, but the supplier is the person or organization distributing the final\n component. For more detailed information please see the SPDX specification.\n As for supplier, *Person:* or *Organization:* prefix should be used for\n originator value.\n* **hash**:\n SHA of the directory(`git-tree` object) the manifest file describes or HEAD SHA of a submodule. This value\n is used during the manifest file validation to check if the hash in the manifest file matches the\n SHA recorded in the `git-tree`. Its purpose is to make sure that the information in the manifest\n file is up-to-date. For example if a submodule or 3rd party library is updated, the\n version in the manifest file should be probably updated too. The SHA value can be obtained\n e.g. with `git ls-tree HEAD <path>`, where `<path>` is a package directory, which is described by\n the manifest file. Please note that a hash value for a directory, not a submodule, cannot\n be placed in manifest file, which is stored within the same directory, because the directory SHA\n in `git-tree` will change every time the manifest file changes(chicken egg problem). To make\n the hash variable work, it needs to be placed in a referenced manifest, which is not stored\n within a directory it describes. For example freertos component can have main `sbom.yml`\n manifest file, which refers to `sbom_FreeRTOS-Kernel.yml` manifest describing the `FreeRTOS-Kernel`\n package in the `FreeRTOS-Kernel` directory.\n\ncomponents/freertos/sbom.yml\n```\nmanifests:\n - path: sbom_FreeRTOS-Kernel.yml\n dest: FreeRTOS-Kernel\n```\ncomponents/freertos/sbom_FreeRTOS-Kernel.yml\n```\nname: 'freertos'\nversion: '10.4.3'\ncpe: cpe:2.3:o:amazon:freertos:{}:*:*:*:*:*:*:*\nsupplier: 'Organization: Espressif Systems (Shanghai) CO LTD'\noriginator: 'Organization: Amazon Web Services'\ndescription: An open-source, real-time operating system (RTOS) with additional features and patches from Espressif.\nhash: 4e8101b6f57a0640ae54c6da605c1b532c0f8f89\ncve-exclude-list:\n - cve: CVE-2021-43997\n reason: This vulnerability only affects ARMv7-M and ARMv8-M ports of FreeRTOS and hence does not affect Espressif SoCs which are not based on these architectures.\n```\n\n* **license**:\n License expression explicitly declared by the author.\n* **copyright**:\n Copyright explicitly declared by the author. This can be single string or a\n list of copyrights.\n* **cve-exclude-list**:\n List of already evaluated CVEs, which do not apply to this package. This can be used\n to exclude CVEs from the `esp-idf-sbom` checker report in case the package is not\n vulnerable to specific CVEs. Each CVE in the exclude list is represented as dictionary with\n the `cve` and `reason` keys. Information about excluded CVEs is added to the generated\n SBOM file into `PackageComment` SPDX tag and later used by the checker.\n\n * cve: CVE-ID\n * reason : description why this package is not vulnerable to this CVE\n```\n version: 0.1.0\n description: Blink application example\n cve-exclude-list:\n - cve: CVE-2023-1234\n reason: Description why this package is not vulnerable\n```\n\n* **cve-keywords**:\n When using the `--extended-scan` option to run the checker, look for these keywords\n in the CVE descriptions. These keywords are also included in the generated\n SBOM file.\n```\n cve-keywords:\n - mbedtls\n - mbed tls\n```\n\n* **manifests**:\n List of manifest files which cannot be added directly into the **component** or **submodule**\n sub-directories to create **subpackage**. For example the following will create a new\n SPDX package for the `subpackage` directory with information from the `subpackage.yml` manifest file.\n This manifest file is treated as it would be actually stored in the `subpackage` directoery.\n\n * path: path of manifest file relatitve to the sbom.yml\n * dest: destination directory for path, again relative to sbom.yml\n```\n version: 0.1.0\n description: Blink application example\n manifests:\n - path: subpackage.yml\n dest: subpackage\n```\n\n* **virtpackages**:\n In some situations, it can be beneficial to define a relationship or dependency\n on a package that isn't physically available during compilation. For example,\n certain functionality required by an application might be implemented in ROM\n and used by the application. A case in point is mbedtls, which could reside in\n the ROM and be utilized by the application depending on configuration settings.\n In these instances, a virtual package can be useful to represent this\n dependency.\n```\n virtpackages:\n - virt_pkg1.yml\n - virt_pkg2.yml\n```\n\n* **if**:\n An expression utilizing the configuration variables can conditionally\n include a package. This condition is disregarded for **project** and\n **component** packages, which are always included. The operators listed\n below, in order of decreasing precedence, can be used. The order of\n operations can be adjusted using brackets. If the expression evaluates to\n **true**, the package is included. The **--disable-conditions** option can\n disable conditions usage.\n\n - **!**: negation\n - **<**, **>**, **>=**, **<=**: comparison\n - **=**, **!=**: equal, not equal\n - **&&**: logical and\n - **||**: logical or\n```\n if: 'IDF_TARGET = \"esp32\"'\n if: '(IDF_TARGET_ESP32 || IDF_TARGET = \"esp32\") && !IDF_TOOLCHAIN_GCC'\n if: '1536 <= FREERTOS_ISR_STACKSIZE < 0xffff'\n```\n\nExample of the `sbom.yml` manifest file for the ESP-IDF blink project.\n\n version: 0.1.0\n description: Blink application example\n url: https://blink.org/blink-0.1.0.tar.gz # non-existing package download URL example\n cpe: cpe:2.3:a:hrbata:blink:{}:*:*:*:*:*:*:* # non-existing CPE example\n supplier: 'Person: Frantisek Hrbata (frantisek.hrbata@espressif.com)'\n originator: 'Organization: Espressif Systems (Shanghai) CO LTD'\n cve-exclude-list:\n - cve: CVE-2023-1234\n reason: Description why this package is not vulnerable\n - cve: CVE-2023-1235\n reason: Description why this package is not vulnerable\n\n\nInformation from the `sbom.yml` manifest file are mapped to the following SPDX tags.\n\n| manifest | SPDX |\n|-----------------|------------------------------|\n| name | PackageName |\n| version | PackageVersion |\n| description | PackageSummary |\n| repository | ExternalRef OTHER repository |\n| url | PackageDownloadLocation |\n| cpe | ExternalRef cpe23Type |\n| supplier | PackageSupplier |\n| originator | PackageOriginator |\n| license | PackageLicenseDeclared |\n| copyright | PackageCopyrightText |\n| cve-exclude-list| PackageComment |\n| cve-keywords | PackageComment |\n\nEven though the `sbom.yml` file is the primary source of information, the esp-idf-sbom tool\nis also looking at other places if it's not present. The `idf_component.yml` manifest file,\nused for components managed by the component manager, may contain `sbom` dictionary/namespace,\nwhich will be used by esp-idf-sbom if presented. This dictionary may contain the same information\nas `sbom.yml`.\n\nExample of the `idf_component.yml` manifest file for led_strip managed component.\n\n dependencies:\n idf:\n version: '>=5.0'\n description: Driver for Addressable LED Strip (WS2812, etc)\n url: https://github.com/espressif/idf-extra-components/tree/master/led_strip\n version: 2.4.1\n sbom:\n cpe: cpe:2.3:a:hrbata:led_strip:{}:*:*:*:*:*:*:* # non-existing CPE example\n supplier: 'Organization: Espressif Systems (Shanghai) CO LTD'\n cve-exclude-list:\n - cve: CVE-2023-1234\n reason: Description why this package is not vulnerable\n - cve: CVE-2023-1235\n reason: Description why this package is not vulnerable\n\nIf the `sbom` dictionary is not presented in `idf_component.yml` or it's missing some information,\nthe version, description, maintainers and url information from `idf_component.yml` manifest is used.\n\nInformation from the `idf_component.yml` manifest file are mapped to the following SPDX tags.\n\n| manifest | SPDX |\n|--------------|------------------------------|\n| name | PackageName |\n| version | PackageVersion |\n| description | PackageSummary |\n| maintainers | PackageSupplier |\n| url | PackageDownloadLocation |\n\nComponent version may be guessed based on git-describe and Espressif\nas a default supplier may be guessed based on git repository or package URL. The guessing\nmay be disabled by using the '--no-guess' option.\n\nFor git submodules, the `.gitmodules` configuration file is also checked for additional submodule\ninformation. Submodule configuration may contain variables with the `sbom-` prefix, which are considered as\nSBOM manifest information. All keys used in the `sbom.yml` manifest file can also be specified in\n`.gitmodules` with the `git-config` format instead of yaml.\n\nExample of manifest information added for the `micro-ecc` submodule in `.gitmodules`.\n\n [submodule \"components/bootloader/subproject/components/micro-ecc/micro-ecc\"]\n path = components/bootloader/subproject/components/micro-ecc/micro-ecc\n url = ../../kmackay/micro-ecc.git\n sbom-version = 1.0\n sbom-cpe = cpe:2.3:a:micro-ecc_project:micro-ecc:{}:*:*:*:*:*:*:*\n sbom-supplier = Person: Ken MacKay\n sbom-url = https://github.com/kmackay/micro-ecc\n sbom-description = A small and fast ECDH and ECDSA implementation for 8-bit, 32-bit, and 64-bit processors\n sbom-hash = d037ec89546fad14b5c4d5456c2e23a71e554966\n sbom-cve-exclude-list = CVE-2023-1234 Description why this package is not vulnerable\n sbom-cve-exclude-list = CVE-2023-1235 Description why this package is not vulnerable\n\n\nManifest information is gathered in the following order and only missing\nvalues are added. If e.g. `version` is found in `sbom.yml` any other\n`version` value found e.g. in `.gitmodules` is ignored.\n\n1. referenced manifest from parent package\n2. `sbom.yml`\n3. `sbom` dictionary/namespace in `idf_component.yml`\n4. sbom information contained in submodule configuration in `.gitmodules`\n5. `idf_component.yml` information provided for component manager\n\n\n### Validating manifest files\n\nManifest files are validated while the SBOM is generated. They can be also validated explicitly\nwith the `esp-idf-sbom manifest validate` command.\n\n esp-idf-sbom manifest validate [PATH_TO_VALIDATE...]\n\n`PATH_TO_VALIDATE` is an optional path to a manifest file(sbom.yml, idf_manifest.yml or .gitmodules) or\ndirectory, which will be searched for manifest files. If `PATH_TO_VALIDATE` is not provided, the current\nworking directory is used.\n\nUsage example:\n\n $ esp-idf-sbom manifest validate ~/work/esp-idf ~/work/idf-extra-components/\n $ esp-idf-sbom manifest validate ~/work/esp-idf/.gitmodules ~/work/esp-idf/components/freertos/FreeRTOS-Kernel/sbom.yml\n\n\n### Checking manifest files for vulnerabilities\n\nThe `esp-idf-sbom` tool uses the generated SBOM SPDX file to check for possible vulnerabilities.\nIt also allows to scan for vulnerabilities based on the information presented in manifest\nfiles. This can be used e.g. to scan a whole repository without a need to generate the SBOM SPDX file.\n\n esp-idf-sbom validate-submodule-hash [PATH_TO_CHECK...]\n\n`PATH_TO_CHECK` is an optional path to a manifest file(sbom.yml, idf_manifest.yml or .gitmodules) or\ndirectory, which will be searched for manifest files. If `PATH_TO_CHECK` is not provided, the current\nworking directory is used.\n\nUsage example:\n\n $ esp-idf-sbom manifest check ~/work/esp-idf ~/work/idf-extra-components/\n $ esp-idf-sbom manifest check ~/work/esp-idf/.gitmodules ~/work/esp-idf/components/freertos/FreeRTOS-Kernel/sbom.yml\n # Use a local NVD mirror for vulnerability checks.\n $ esp-idf-sbom manifest check --local-db ~/work/esp-idf ~/work/idf-extra-components/\n\n\n## Licenses and Copyrights\n\nAdding licenses and copyrights information into the SBOM file has to be explicitly\nrequested by using the `--file-tags` option. This requires to scan all files and\nmay take some time. It also may result in a quite big SBOM file.\n\nAll **component** and **submodule** files are scanned for the `SPDX-License-Identifier`,\n`SPDX-FileCopyrightText` and `SPDX-FileContributor` SPDX file tags. Information from\nthese tags is used in the generated SBOM file to specify licenses and copyrights for\nSPDX packages which represent **project**, **component** or **submodule**. The project's\nfinal license expression is a logical AND of all licenses concluded from **components**\nand **submodules** used in the final project binary.\n\nThe license can be also explicitly declared by the author in the `sbom.yml` file with the `license`\nvariable. This information is used as a value for the `PackageLicenseDeclared` SPDX tag for\ngiven **project**, **component** or **submodule**.\n\n\n## Return Values\n\n* **0**:\n No error, no vulnerability found, manifest file(s) valid.\n* **1**:\n Vulnerability found or manifest file not valid.\n* **128**:\n Fatal error.\n\n\n## Resources\n\n* DevCon24 presentation - [Enhancing IoT Security Generating SBOMs with esp-idf-sbom][7]\n\n\n[1]: https://en.wikipedia.org/wiki/Software_supply_chain\n[2]: https://spdx.dev\n[3]: https://docs.espressif.com/projects/esp-idf/en/latest\n[4]: https://nvd.nist.gov\n[5]: https://en.wikipedia.org/wiki/Common_Platform_Enumeration\n[6]: https://github.com/espressif/esp-nvd-mirror\n[7]: https://www.youtube.com/watch?v=ODZwxKawVXo\n",
"bugtrack_url": null,
"license": null,
"summary": "SPDX SBOM generator for ESP-IDF projects",
"version": "0.19.1",
"project_urls": {
"Homepage": "https://github.com/espressif/esp-idf-sbom"
},
"split_keywords": [
"espressif",
" embedded",
" spdx",
" sbom"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "0d0fdbc1dc4d67e644152ef0a852d8d81e21cd92b37eb8278d88286df4daf5f1",
"md5": "a5603e2b68215f6d421422cffff4f039",
"sha256": "98dee35c3861963bd5b6e095eea77a95455259fb2d6d21728432f90cf37bf9ad"
},
"downloads": -1,
"filename": "esp_idf_sbom-0.19.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "a5603e2b68215f6d421422cffff4f039",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.7",
"size": 57122,
"upload_time": "2024-10-22T13:36:32",
"upload_time_iso_8601": "2024-10-22T13:36:32.274507Z",
"url": "https://files.pythonhosted.org/packages/0d/0f/dbc1dc4d67e644152ef0a852d8d81e21cd92b37eb8278d88286df4daf5f1/esp_idf_sbom-0.19.1-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "bdd3c7da86d1f58bb94ae63c2fdfb2b0abf45304625da900897f6844214b5e39",
"md5": "bd5b4d1c00f15d21b8fea2e5d5f999b4",
"sha256": "fb6e002aba0cc5f2a6caf16148a043e7324e71fa2d0afff84399eb6430450ace"
},
"downloads": -1,
"filename": "esp-idf-sbom-0.19.1.tar.gz",
"has_sig": false,
"md5_digest": "bd5b4d1c00f15d21b8fea2e5d5f999b4",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.7",
"size": 62100,
"upload_time": "2024-10-22T13:36:33",
"upload_time_iso_8601": "2024-10-22T13:36:33.896875Z",
"url": "https://files.pythonhosted.org/packages/bd/d3/c7da86d1f58bb94ae63c2fdfb2b0abf45304625da900897f6844214b5e39/esp-idf-sbom-0.19.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-10-22 13:36:33",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "espressif",
"github_project": "esp-idf-sbom",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"lcname": "esp-idf-sbom"
}