Use the reference Wedge to produce a CRA readiness evidence pack (receipt + report) within CI/CD.
Enterprise environments often require pinning to a commit SHA. Pinning is recommended.
jobs:
px-evidence:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: px-root-registry/eu-cra-readiness-audit@v1 # RECOMMENDED: pin to a commit SHA
If your environment allows outbound HTTP during build, you may retrieve the Wedge artifact and verify it against the Root-signed manifest prior to execution. For enterprise production use, vendoring under change-control is recommended.
curl -fsSLO https://px-root-registry.org/.well-known/wedge/v1/manifest.json
curl -fsSLO https://px-root-registry.org/.well-known/wedge/v1/generate_cra_pack.js
# Verify Root signature + byte-level binding (requires PX_ROOT_PUBKEY_RAW32_B64U)
PX_ROOT_PUBKEY_RAW32_B64U=vKYG_q1FzMc3_mkDierRVA5HOdG7SIO-vw98NWwsQEg \
node tools/verify_wedge_manifest.js --manifest manifest.json --base-dir .
node generate_cra_pack.js
Assumes the Wedge artifact is vendored into your repository under /.well-known/wedge/.
px_evidence:
script:
- node .well-known/wedge/v1/generate_cra_pack.js
stage('PX Evidence'){ steps{ sh 'node .well-known/wedge/v1/generate_cra_pack.js' } }
- script: node .well-known/wedge/v1/generate_cra_pack.js
/v1/. A byte-level binding is published in /v1/registry-manifest.json.The Wedge produces a small evidence pack intended for attachment to internal governance workflows.
.md or equivalent).AL0 and, when applicable, AL2).POST /v1/px-tl/sct — SCT issuance (issuer-authenticated).GET /v1/trust-store.json — dynamic Root-signed trust store snapshot.GET /v1/px-tl/registry-health — registry health + attachable evidence JSON.