Skip to main content

Architecture Overview

The Traceability Report Framework separates evidence creation, packaging, validation, and consumption. This page explains how the pieces fit together.

High-level pipeline

Source tools  -->  Extractors  -->  Artifact store  -->  TWPack builder  -->  Validators / Viewers
(requirements, (JSONL + metadata) (CLI, CI jobs) (CLI, validator, viewer)
tests, design)
  1. Source tools – Requirements management, test management, CI systems, experiment trackers, suppliers.
  2. Extractors – Scripts or connectors convert tool data into TRF artifact/link JSONL.
  3. Artifact store – Git repository or evidence directory containing JSONL, attachments, and configuration.
  4. TWPack builder – CLI assembles deterministic packages, applies profiles, signs archives.
  5. Validators / viewers – Ensure package integrity and provide human-readable dashboards.

Components

  • Profiles and extensions – Define available artifact kinds, validation rules, coverage expectations.
  • Configuration (trf.yaml) – Maps repository directories to artifact kinds, declares link inference strategies, selects profiles.
  • TWPack archive – Contains manifest, artifacts, links, signatures, attachments.
  • Signer/validator – Applies cryptographic signatures, runs schema/hashing/timestamp checks.
  • Viewer – Desktop app for interactive exploration.

Package lifecycle

StageWhat happensTypical tooling
Collect dataExport from DOORS, Jira, Git, CI, ML platformsCustom scripts, adapters
Normalize artifactsConvert to JSONL, apply naming conventionsCLI helpers, ETL jobs
Link generationInfer or import relationshipsCLI inference, CSV imports, custom scripts
BuildRun tw build, attach filesCLI, CI pipeline
Sign & validatetw sign, tw validate, trf-validatorPKI infrastructure, validator
DistributeShare via git, artifact storage, regulator portalsGit LFS, S3, artifact registries
Monitor & updateWatch for source changes, rebuild as neededtw build --watch, scheduled jobs

Environment patterns

ScenarioCharacteristicsRecommended setup
Team workstationsDevelopers generate ad hoc packs while codingCLI, viewer, local trf.yaml
CI pipelinesAutomated builds per commitCLI in container, validator, artifacts uploaded
Supplier integrationMultiple TWPack inputs mergedSigning keys per supplier, tw merge, validation gateways
Audit/assessmentLong-term storage and reviewSigned TWPack, exported reports, viewer snapshots

Data stores

  • Git – Version control for artifact JSONL, configuration, schemas.
  • Object storage – Retain large attachments and archived TWPack releases.
  • Secrets manager/HSM – Protect signing keys and certificates.
  • Dashboards – Optional BI tools ingest exported CSV/JSON for leadership metrics.

Integration approach

  1. Identify authoritative systems for each evidence type.
  2. Build idempotent extractors that run during CI or nightly jobs.
  3. Normalize data into artifacts/ and links/ directories.
  4. Validate continuously; fail builds on schema or coverage regressions.
  5. Deliver signed TWPack archives plus targeted reports to stakeholders.

Dive into data specifics in Data Model and version-management practices in Framework Versioning.