You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Correct the spelling of `compliment` & `complimentary` to `complement` &
`complementary` respectively.
* Compliment = a polite expression of praise or admiration.
* Complement = a thing that contributes extra features to something else
in such a way as to improve or emphasize its' quality
Correct spelling makes for easier translation to other languages.
Signed-off-by: Mark Symons <mark.symons@fujitsu.com>
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,9 +68,9 @@ The officially supported media type for Protocol Buffer format is `application/x
68
68
## Related Work
69
69
[SPDX (Software Package Data Exchange)][spdx-url] is a specification that provides low-level details of components, including all files, hashes, authors, and copyrights. SPDX also defines over 300 open source license IDs. CycloneDX builds on top of the work SPDX has accomplished with license IDs, but varies greatly in its approach towards building a software bill of material specification.
70
70
71
-
[SWID (ISO/IEC 19770-2:2015)][swid-url] is used primarily to identify installed software and is the preferred format of the NVD. SWID tags are used in the National Vulnerability Database to describe vulnerable components. The CycloneDX specification compliments this work as CycloneDX documents can incorporate SWID tags and other high-level SWID metadata and optionally include entire SWID documents. Use of SWID tag ID's are useful in determining if a specific component has known vulnerabilities.
71
+
[SWID (ISO/IEC 19770-2:2015)][swid-url] is used primarily to identify installed software and is the preferred format of the NVD. SWID tags are used in the National Vulnerability Database to describe vulnerable components. The CycloneDX specification complements this work as CycloneDX documents can incorporate SWID tags and other high-level SWID metadata and optionally include entire SWID documents. Use of SWID tag ID's are useful in determining if a specific component has known vulnerabilities.
72
72
73
-
[CPE (Common Platform Enumeration)][cpe-url] is a specification that describes the vendor, name, and version for an application, operating system, or hardware device. CPE identifiers are used in the National Vulnerability Database to describe vulnerable components. The CycloneDX specification compliments this work as CycloneDX documents can easily be used to construct exact CPE identifiers that are useful in determining if a specific component has known vulnerabilities.
73
+
[CPE (Common Platform Enumeration)][cpe-url] is a specification that describes the vendor, name, and version for an application, operating system, or hardware device. CPE identifiers are used in the National Vulnerability Database to describe vulnerable components. The CycloneDX specification complements this work as CycloneDX documents can easily be used to construct exact CPE identifiers that are useful in determining if a specific component has known vulnerabilities.
// A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency.
266
266
EXTERNAL_REFERENCE_TYPE_MODEL_CARD=32;
267
-
// Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
267
+
// Plans of Action and Milestones (POAM) complement an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
268
268
EXTERNAL_REFERENCE_TYPE_POAM=33;
269
269
// A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations.
270
270
EXTERNAL_REFERENCE_TYPE_LOG=34;
@@ -536,7 +536,7 @@ message Pedigree {
536
536
repeatedComponentvariants=3;
537
537
// A list of zero or more commits which provide a trail describing how the component deviates from an ancestor, descendant, or variant.
538
538
repeatedCommitcommits=4;
539
-
// A list of zero or more patches describing how the component deviates from an ancestor, descendant, or variant. Patches may be complimentary to commits or may be used in place of commits.
539
+
// A list of zero or more patches describing how the component deviates from an ancestor, descendant, or variant. Patches may be complementary to commits or may be used in place of commits.
540
540
repeatedPatchpatches=5;
541
541
// Notes, observations, and other non-structured commentary describing the components pedigree.
Copy file name to clipboardExpand all lines: schema/bom-1.6.schema.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -985,7 +985,7 @@
985
985
"patches": {
986
986
"type": "array",
987
987
"title": "Patches",
988
-
"description": ">A list of zero or more patches describing how the component deviates from an ancestor, descendant, or variant. Patches may be complimentary to commits or may be used in place of commits.",
988
+
"description": ">A list of zero or more patches describing how the component deviates from an ancestor, descendant, or variant. Patches may be complementary to commits or may be used in place of commits.",
989
989
"items": {"$ref": "#/definitions/patch"}
990
990
},
991
991
"notes": {
@@ -1728,7 +1728,7 @@
1728
1728
"certification-report": "Industry, regulatory, or other certification from an accredited (if applicable) certification body.",
1729
1729
"codified-infrastructure": "Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC).",
1730
1730
"quality-metrics": "Report or system in which quality metrics can be obtained.",
1731
-
"poam": "Plans of Action and Milestones (POAM) compliment an \"attestation\" external reference. POAM is defined by NIST as a \"document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones\".",
1731
+
"poam": "Plans of Action and Milestones (POAM) complement an \"attestation\" external reference. POAM is defined by NIST as a \"document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones\".",
1732
1732
"electronic-signature": "An e-signature is commonly a scanned representation of a written signature or a stylized script of the persons name.",
1733
1733
"digital-signature": "A signature that leverages cryptography, typically public/private key pairs, which provides strong authenticity verification.",
1734
1734
"other": "Use this if no other types accurately describe the purpose of the external reference."
Copy file name to clipboardExpand all lines: schema/bom-1.6.xsd
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1421,7 +1421,7 @@ limitations under the License.
1421
1421
</xs:enumeration>
1422
1422
<xs:enumerationvalue="poam">
1423
1423
<xs:annotation>
1424
-
<xs:documentation>Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".</xs:documentation>
1424
+
<xs:documentation>Plans of Action and Milestones (POAM) complement an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".</xs:documentation>
1425
1425
</xs:annotation>
1426
1426
</xs:enumeration>
1427
1427
<xs:enumerationvalue="electronic-signature">
@@ -1828,7 +1828,7 @@ limitations under the License.
0 commit comments