Integration Guide
This guide describes how to emit, sign, store, and verify Reciprium receipts in real-world delivery systems.
End-to-End Flow
- Build
intentcontext and compute content digest for approved input. - Populate
subjectandscopefrom runtime identity/target metadata. - Execute mutation and collect runtime evidence into
execution/artifacts. - Run checks and write
verificationoutcomes. - Canonicalize and sign according to Signatures.
- Optionally chain with
hashChainmetadata. - Persist receipt and associated evidence artifacts.
Minimum Integration Contract
- Emit valid envelope shape.
- Sign with trusted key material.
- Preserve receipt bytes/fields after signing.
- Keep artifact references stable and retrievable.
Platform Patterns
Reference integrations (separate examples repo):
Reference receipt documents (this spec repo):
v1/examples/terraform-basic.jsonv1/examples/terraform-full.jsonv1/examples/gitops-basic.jsonv1/examples/database-migration.jsonv1/examples/secret-rotation.jsonv1/examples/break-glass-access.json
Verification Pipeline Guidance
At ingestion time:
- Validate structure against JSON Schema.
- Verify signatures and
signedContent.contentHash. - Validate chain continuity if chaining is used.
- Evaluate verification policy requirements.
Extension Strategy
Use namespaced extension keys (reverse.domain) for provider-specific metadata
such as dev.reciprium.terraform.