Releases
License Apache-2.0
Open Issues
CITATION.cff
N1Hub.com
Portal Source
CapsuleOS is the canonical public technical core for the capsule-first foundations behind N1Hub.
This repository was previously published as capsule-specs.
The public portal for this repository currently lives at https://n1hub.com/projects/capsule-specs/, with open site source in https://github.com/n1projects/n1hub.
This repository is intentionally narrow. It does not try to expose the full private application or every internal workflow. Instead, it publishes the highest-signal public artifacts needed to understand the model:
- the 5-Element Law
- the 16 validation gates
- canonical relation types
- validator-facing docs and OpenAPI
- JSON schema, validator API envelope schema, and neuro-concentrate schema
- a compact reference pack for canonical enums, gate families, validator option flags, and validator route behavior summaries
- minimal example capsules
- a small curated raw capsule source set for law, confidence-vector, subtype, and version-lineage semantics
N1Hub is being built as a portable, validator-backed, open-core knowledge system. Public documentation, examples, and schema artifacts need their own clean home so contributors, integrators, and maintainers can understand the format without reading the whole private working repository.
This repository is that home.
This public surface is intentionally dual-layer:
- human layer Short orientation, role-specific entry paths, concentrated summaries, and the smallest safe reading set.
- agent layer Machine-readable maps, stronger-source hierarchy, schemas, OpenAPI, examples, references, and verification-facing artifacts that LLMs and automation can traverse deeply.
Humans should not need to read the whole tree. Agents can traverse the deeper machine-readable surface and return bounded answers back to their operators.
QUICKSTART.mdfor the fastest safe orientationONBOARDING.mdfor the full contributor pathdocs/audience-paths.mdfor the bounded reviewer, integrator, contributor, tool-builder, and maintainer lanesPUBLIC_AUDIENCE_PATHS.jsonfor the same role-specific entry paths in machine-readable formdocs/overview.mdfor the public boundarydocs/repository-identity.mdfor the canonical public repo identity and URL alignment rulesdocs/projection-doctrine.mdfor the files-as-projections ruledocs/domain-boundaries.mdfor published vs deferred domainsdocs/generator-readiness.mdfor the generator/projection modeldocs/portability.mdfor public portability and no-lock-in posturedocs/archive-bundles.mdfor the archive export / replay contractdocs/archive-validation-recipes.mdfor direct Ajv validation of the published archive-bundle contract from repo and installed-package pathsdocs/invalid-archive-bundle-examples.mdfor intentionally schema-invalid archive-bundle fixtures and their bounded structural rejection reasonsdocs/schema-family-reference.mdfor choosing the right schema family firstdocs/reference-pack.mdfor compact machine-readable enums, gate IDs, validator option flags, and validator route behavior summariesdocs/openapi.mdfor the strongest published validator HTTP contract and the boundary between OpenAPI and compact route/envelope summariesdocs/schema-bundles.mdfor single-file bundled schema artifacts when you want less multi-file$refwiringdocs/schema-validation-recipes.mdfor raw JSON Schema validation with Ajv from a repo checkout or installed packagedocs/invalid-capsule-examples.mdfor intentionally schema-invalid capsule fixtures and the boundary between raw-schema rejection and validator-only failuresdocs/invalid-api-envelope-examples.mdfor intentionally schema-invalid validator API envelopes and the boundary between raw-schema rejection and structurally valid negative API payloadsdocs/integrity-recipes.mdfor recomputingintegrity_sha3_512, verifying sealed examples, and repairing the intentionalG16teaching exampledocs/python-consumption.mdfor cross-language Python consumption of compact references, validator-envelope request/response flows, and publicG16seal proofs from a repo checkout or extracted packed artifactdocs/openapi-codegen-recipes.mdfor directopenapi-typescriptgeneration from the strongest published OpenAPI contract across repo-local plus package-level CommonJS, ESM, and TypeScript consumer pathsdocs/schema-reference.mdfor field-level referencedocs/type-projections.mdfor the public-safe TypeScript and Zod projection layerdocs/npm-consumption.mdfor the buildable package surface, local tarball install path, and subpath entrypointsexamples/client/recipe-index.jsonfor the machine-readable runtime-lane and task navigator across the published client recipes,schemas/client-recipe-index.schema.jsonif you want that navigator as a bounded JSON Schema contract, andexamples/client/ts-client-recipe-index.tsif you want the same navigator through a source-level TypeScript projectiondocs/api-envelopes.mdfor concrete validator request and response shapesdocs/example-coverage.mdfor the bounded map of what the public examples actually coverdocs/maintainer-operations.mdfor the bounded maintainer workflow and release posturedocs/change-control.mdfor the explicit public change, deprecation, and breaking-change posturedocs/artifact-ownership.mdfor the bounded ownership and stronger-source hierarchy across public artifact familiesdocs/dependency-graph.mdfor the bounded map of which public artifacts depend on which stronger surfacesdocs/assurance-case.mdfor the bounded public claims, strongest evidence, and explicit limitsdocs/update-coherence.mdfor the bounded sync groups that must move together when public artifacts changedocs/limitations-register.mdfor the bounded map of deferred scope, non-promises, and public limitationsdocs/evidence-timeline.mdfor the bounded active-maintenance and public-hardening timelinedocs/review-scorecard.mdfor the bounded reviewer-grade checklist across public repo criteriadocs/verification-matrix.mdfor the bounded map of which check families protect which public surfacesdocs/audience-paths.mdfor the bounded role-specific entry paths through the public surfacedocs/evidence-strength.mdfor the bounded map of which public surfaces are strongest and which are only secondary or illustrativedocs/adoption-readiness.mdfor the bounded map of what each public audience can adopt today and what remains deferreddocs/freshness.mdfor the bounded map of which public surfaces go stale under which triggers and how summary drift becomes visibledocs/ecosystem-value.mdfor the bounded map of why this public surface matters to reviewers, integrators, tool-builders, contributors, and OSS-support programsdocs/decision-log.mdfor the bounded map of the major public design decisions and why this specs surface is shaped the way it isdocs/evidence-gaps.mdfor the bounded map of which important public evidence is still intentionally missing and which review gaps remain opendocs/program-fit.mdfor the bounded map of why this public surface is a credible OSS-support-program and reviewer-facing candidate without overclaiming maturitydocs/publication-readiness.mdfor the bounded map of why this public surface remains coherent as a published GitHub surface without pretending that publication equals adoption or approvalPUBLIC_REPOSITORY_IDENTITY.jsonfor the machine-readable canonical repo identity, release URL, and package/schema alignment layerschemas/validator-api-envelopes.schema.jsonfor machine-readable validator envelope contractsdocs/integration-guide.mdfor the safest consumer path through schema, examples, and API envelopesdocs/route-reference.mdfor per-route sample mappingdocs/public-contract-index.mdfor a complete public surface mapdocs/contract-catalog.mdfor the machine-readable contract mapdocs/reviewer-guide.mdfor the fastest evaluator/reviewer path through the repositorydocs/evaluation-packet.mdfor the condensed external review pathdocs/failure-model.mdfor the fail-closed public trust posturedocs/traceability.mdfor the end-to-end claim-to-evidence mapdocs/capability-matrix.mdfor the concrete “what can I do with this repo?” viewdocs/verification.mdfor the repo verification stackdocs/community-health.mdfor contributor intake and maintainer-facing community boundariesdocs/repo-validation-workflow.mdfor the contributor-facing repo-only validation path before a PRdocs/github-operations.mdfor the repo-owned GitHub label, milestone, release-note, and update-hygiene surfacedocs/release-evidence.mdfor human and machine-readable release evidencedocs/source-materials.mdfor provenance and projection inputsdocs/faq.mdfor the shortest answers to scope questionsdocs/compatibility.mdfor stability expectationsVERSIONING.mdfor release and contract-change policyROADMAP.mdfor the current evolution path
If you already know why you are here, use the narrowest public lane instead of reading the whole front door first:
- reviewers:
docs/reviewer-guide.md,PUBLIC_EVALUATION_PACKET.json - integrators:
QUICKSTART.md,docs/integration-guide.md,docs/api-envelopes.md - tool-builders:
QUICKSTART.md,docs/schema-family-reference.md,docs/reference-pack.md - contributors:
ONBOARDING.md,CONTRIBUTING.md,docs/repo-validation-workflow.md - maintainers:
MAINTAINERS.md,GOVERNANCE.md,docs/maintainer-operations.md
If you want the full machine-readable lane map, inspect
PUBLIC_AUDIENCE_PATHS.json.
This repository uses two public branches:
mainStable public branch for reviewer-facing, release-facing, and contributor-safe changes.dreamPublic exploration branch for larger still-public work before it is collapsed into smaller reviewable slices formain.
Neither branch is a private vault. Private maintainer material stays outside tracked repo files.
docs/Public human-readable reference docs.schemas/Machine-readable JSON Schema artifacts for capsules, validator API envelopes, and single-file bundle variants.references/Compact machine-readable contract references for canonical enums, gate families, and validator option flags.projections/Public-safe TypeScript and Zod projection artifacts for source-level consumers.dist/Gitignored build output for the consumable package-export projection layer.examples/Minimal example capsules for documentation and validation.examples/api/Concrete validator request and response payload examples.examples/client/Minimal curl, Node, Python, source-level TypeScript/Zod, and installed-package consumer recipes across all published validator routes plus raw-JSON consumer paths.examples/invalid/Intentionally schema-invalid capsule fixtures for raw-schema consumers.examples/api-invalid/Intentionally schema-invalid validator API envelope fixtures for raw-schema consumers.examples/archive-invalid/Intentionally schema-invalid archive-bundle fixtures for portability and export consumers.openapi/OpenAPI reference for validator-facing HTTP surfaces.capsules/Curated raw public capsules used as source material for the public specs and exported as package-level reference assets.
The repository is structured to look like a serious OSS-maintained surface rather than a one-off export:
- community files for contributions, conduct, support, and security
- citation metadata in
CITATION.cfffor external reuse and referencing - issue and pull-request templates
- custom GitHub label taxonomy aligned to contract, schema, validator, docs, governance, and integration/release work
- roadmap waves for delivered and next-step public work in
ROADMAP.md - GitHub-native update hygiene in
.github/dependabot.yml - GitHub release-note categorization in
.github/release.yml - repo-owned GitHub label and milestone configs in
.github/labels.jsonand.github/milestones.json - explicit community-health guidance and intake verification
- machine-readable provenance in
SOURCE_MANIFEST.json - machine-readable contract discovery in
PUBLIC_CONTRACT_CATALOG.json - machine-readable release evidence in
PUBLIC_RELEASE_METADATA.json - machine-readable reviewer/program profile in
PUBLIC_PROJECT_PROFILE.json - machine-readable evaluation packet in
PUBLIC_EVALUATION_PACKET.json - machine-readable failure model in
PUBLIC_FAILURE_MODEL.json - machine-readable example coverage in
PUBLIC_EXAMPLE_COVERAGE.json - machine-readable maintenance model in
PUBLIC_MAINTENANCE_MODEL.json - machine-readable change-control model in
PUBLIC_CHANGE_CONTROL_MODEL.json - machine-readable ownership map in
PUBLIC_OWNERSHIP_MAP.json - machine-readable dependency graph in
PUBLIC_DEPENDENCY_GRAPH.json - machine-readable assurance case in
PUBLIC_ASSURANCE_CASE.json - machine-readable update-coherence map in
PUBLIC_UPDATE_COHERENCE_MAP.json - machine-readable limitations register in
PUBLIC_LIMITATIONS_REGISTER.json - machine-readable evidence timeline in
PUBLIC_EVIDENCE_TIMELINE.json - machine-readable review scorecard in
PUBLIC_REVIEW_SCORECARD.json - machine-readable verification matrix in
PUBLIC_VERIFICATION_MATRIX.json - machine-readable audience paths in
PUBLIC_AUDIENCE_PATHS.json - machine-readable evidence-strength map in
PUBLIC_EVIDENCE_STRENGTH_MAP.json - machine-readable adoption-readiness map in
PUBLIC_ADOPTION_READINESS.json - machine-readable freshness model in
PUBLIC_FRESHNESS_MODEL.json - machine-readable ecosystem-value map in
PUBLIC_ECOSYSTEM_VALUE_MAP.json - machine-readable decision log in
PUBLIC_DECISION_LOG.json - machine-readable evidence-gaps register in
PUBLIC_EVIDENCE_GAPS_REGISTER.json - machine-readable program-fit map in
PUBLIC_PROGRAM_FIT_MAP.json - machine-readable publication-readiness map in
PUBLIC_PUBLICATION_READINESS.json - machine-readable traceability matrix in
PUBLIC_TRACEABILITY_MATRIX.json - machine-readable capability matrix in
PUBLIC_CAPABILITY_MATRIX.json - machine-readable boundary map in
PUBLIC_BOUNDARY_MAP.json - machine-readable portability profile in
PUBLIC_PORTABILITY_PROFILE.json - a public-release review in
PUBLIC_RELEASE_REVIEW.md - repo-local verification via
npm run verify:repo - local validator-backed example checks
- machine-readable validator API envelope schemas backed by repo-local validation
- compact machine-readable contract references, including published validator route behavior summaries, exported directly for tool-builders and package consumers
- raw JSON Schema consumer recipes for Ajv-based structural validation from repo-relative files and installed package exports
- archive-bundle schema validation recipes for portability/export consumers from repo-relative files and installed package exports
- intentionally schema-invalid archive-bundle fixtures plus Ajv rejection recipes for raw-schema portability consumers
- single-file bundled schema artifacts plus repo-local and package-level Ajv bundle recipes for lower-friction codegen and polyglot consumers
- intentionally schema-invalid capsule fixtures plus Ajv rejection recipes for raw-schema consumers
- intentionally schema-invalid validator API envelope fixtures plus Ajv rejection recipes for raw-schema consumers
- integrity-seal recomputation recipes plus local proof that published example/API seals stay aligned to the current validator-owned
G16rule - public-safe TypeScript and Zod projections for source-level consumers under
projections/ - public-safe TypeScript and Zod validator API envelope projections for source-level validator clients under
projections/ - a buildable and packable package-export layer for the maintained projection surface
- a fresh-project tarball-install verification path for CommonJS, ESM, and TypeScript package consumers
- package-consumer support-response recipes for installed
gatesandstatspayload parsing across CommonJS, ESM, and TypeScript flows - a cross-language Python consumer path for compact references, published validator route flows, and public
G16seal proofs from repo-local files or extracted packed artifacts - direct repo-local and installed-package OpenAPI code-generation recipes for tool-builders who want generated TypeScript declarations from the strongest published HTTP contract
- curated raw capsule source assets with repo-local contract checks and package subpath exports
- a repo-local audit script under
scripts/audit-public-surface.js - API payload examples under
examples/api/ - consumer recipes under
examples/client/ - route-level reference docs under
docs/route-reference.md - a release checklist in
RELEASING.md - Apache-2 attribution guidance in
NOTICE
This repository is a public specification and reference surface. It is not the complete N1Hub runtime, not a private vault dump, and not a release of internal operator tooling.
Primary maintainer: egor-n1
Maintainer and review policy:
- Read
docs/overview.md. - Read
docs/projection-doctrine.mdanddocs/domain-boundaries.md. - Read
docs/5-element-law.mdanddocs/16-gates.md. - Read
docs/portability.mdif you need the public portability / archive trust posture. - Inspect
docs/schema-family-reference.mdto choose the right schema family and abstraction level. - Inspect
schemas/capsule-schema.json. - Inspect
docs/schema-bundles.md,schemas/capsule-schema.bundle.json, andschemas/validator-api-envelopes.bundle.jsonif you want single-file schema imports instead of multi-file$refwiring. - Inspect
docs/reference-pack.mdandreferences/if you want compact machine-readable enums, gate IDs, validator route behavior summaries, and validator option flags without parsing larger schemas first. - Inspect
docs/schema-validation-recipes.mdif you want to validate capsules and validator-envelope payloads directly against the published raw JSON Schemas with Ajv. - Inspect
docs/archive-validation-recipes.mdif you want to validate the published archive-bundle sample directly against the public portability/export schema. - Inspect
docs/invalid-archive-bundle-examples.mdif you want structural negative archive fixtures that should fail raw-schema validation before any stronger replay-policy or hosted-import assumptions are involved. - Inspect
docs/invalid-capsule-examples.mdif you want structural negative fixtures that should fail raw-schema validation before any stronger live-validator behavior is involved. - Inspect
docs/invalid-api-envelope-examples.mdif you want structural negative validator-envelope fixtures that should fail raw-schema validation before any stronger live-validator route behavior is involved. - Inspect
docs/integrity-recipes.mdif you want the exact public sealing rule forintegrity_sha3_512, the shortest recomputation path, and the repair boundary for the intentionalG16example. - Inspect
docs/python-consumption.mdif you want a cross-language raw-JSON path for compact references, validator-envelope request/response flows, and publicG16seal proofs without depending on the Node projection layer. - Inspect
docs/type-projections.md,docs/npm-consumption.md,projections/typescript/capsule.ts,projections/zod/capsule.ts,projections/typescript/validator-api.ts, andprojections/zod/validator-api.tsif you need source-level or package-level consumer artifacts in addition to raw JSON Schema and raw validator envelope schemas. - Inspect
schemas/validator-api-envelopes.schema.jsonif you need request and response contracts for the validator HTTP surface. - Inspect
PUBLIC_TRACEABILITY_MATRIX.jsonif you want the bounded map from public claims to files and verification commands. - Inspect
PUBLIC_EXAMPLE_COVERAGE.jsonif you want the bounded map from examples to covered routes, law surfaces, and negative paths. - Inspect
PUBLIC_MAINTENANCE_MODEL.jsonif you want the bounded model for issue intake, review rules, and release posture. - Inspect
PUBLIC_CHANGE_CONTROL_MODEL.jsonif you want the bounded model for additive, deprecated, and breaking public changes. - Inspect
PUBLIC_OWNERSHIP_MAP.jsonif you want the bounded map of which artifact families are maintained here and which stronger surfaces outrank them. - Inspect
PUBLIC_DEPENDENCY_GRAPH.jsonif you want the bounded map of which public artifacts depend on which stronger surfaces and in what order they are easiest to read. - Inspect
PUBLIC_ASSURANCE_CASE.jsonif you want the bounded public claims, strongest evidence, and explicit non-claims in one reviewer-facing surface. - Inspect
PUBLIC_UPDATE_COHERENCE_MAP.jsonif you want the bounded sync groups that must move together when release, reviewer, or contract surfaces change. - Inspect
PUBLIC_LIMITATIONS_REGISTER.jsonif you want the bounded map of deferred domains, non-promises, and public review limits. - Inspect
PUBLIC_EVIDENCE_TIMELINE.jsonif you want the bounded map of how this public surface hardened over time. - Inspect
PUBLIC_REVIEW_SCORECARD.jsonif you want the bounded reviewer-grade checklist for public repository maturity. - Inspect
PUBLIC_VERIFICATION_MATRIX.jsonif you want the bounded map of which verification families protect which public surfaces. - Inspect
PUBLIC_AUDIENCE_PATHS.jsonif you want the bounded role-specific entry paths for reviewers, integrators, contributors, tool-builders, and maintainers. - Inspect
PUBLIC_EVIDENCE_STRENGTH_MAP.jsonif you want the bounded map of which public artifacts are strongest, secondary, or illustrative. - Inspect
PUBLIC_ADOPTION_READINESS.jsonif you want the bounded map of which audience paths are ready today, which prerequisites apply, and which hosted-runtime expectations stay deferred. - Inspect
PUBLIC_FRESHNESS_MODEL.jsonif you want the bounded map of which public summary layers go stale under which triggers and how freshness is kept tied to release evidence. - Inspect
PUBLIC_ECOSYSTEM_VALUE_MAP.jsonif you want the bounded map of why this public surface is concretely useful to reviewers, integrators, tool-builders, contributors, and external OSS-support programs. - Inspect
PUBLIC_DECISION_LOG.jsonif you want the bounded map of the major public decisions and the rationale behind this repository's projection, trust posture, and release discipline. - Inspect
PUBLIC_EVIDENCE_GAPS_REGISTER.jsonif you want the bounded map of which high-signal public evidence still remains intentionally incomplete and where review confidence must stay bounded. - Inspect
PUBLIC_PROGRAM_FIT_MAP.jsonif you want the bounded map of why this public surface is already reviewer/program-credible and where that fit is still intentionally bounded. - Inspect
PUBLIC_PUBLICATION_READINESS.jsonif you want the bounded map of why this repo remains coherent as a published GitHub surface and which post-publication signals remain intentionally deferred. - Compare the examples in
examples/with the schema inschemas/. - Review the raw capsule sources in
capsules/for the confidence-vector, subtype, and version-lineage law-adjacent surfaces. - Read
docs/repo-validation-workflow.mdif you are preparing a bounded repo-only contribution. - Run
npm run verify:repofor the repository-local integrity checks. - Run
npm run check:package-surfaceif you want to confirm the packable projection-export layer as a consumer artifact. - Run
npm run check:package-installif you want to confirm that the packed artifact installs cleanly into fresh CommonJS, ESM, TypeScript, raw-schema, archive-schema, bundled-schema, invalid-fixture, compact-reference, integrity-recipe, and Python raw-asset consumers. - Run
npm run check:raw-capsulesif you want to confirm the curated raw capsule set stays structurally aligned and package-consumable. - Run
npm run check:reference-packif you want to confirm the compact reference pack stays aligned to the stronger schema and gate surfaces. - Run
npm run check:openapi-coherenceif you want to confirm the compact validator route and envelope-family summaries stay aligned to the stronger published OpenAPI contract. - Run
npm run check:schema-bundlesif you want to confirm the committed single-file bundled schema artifacts and their consumer recipes stay aligned to the stronger raw schema files. - Run
npm run check:schema-recipesif you want to confirm the Ajv-based raw JSON Schema consumer recipes stay executable and aligned to the published schema exports. - Run
npm run check:archive-recipesif you want to confirm the archive-bundle validation recipes stay executable and aligned to the published portability/export schema. - Run
npm run check:invalid-archive-examplesif you want to confirm the published schema-invalid archive fixtures keep failing for the documented structural reasons. - Run
npm run check:invalid-examplesif you want to confirm the published schema-invalid capsule fixtures keep failing for the documented structural reasons. - Run
npm run check:invalid-api-examplesif you want to confirm the published schema-invalid validator-envelope fixtures keep failing for the documented structural reasons. - Run
npm run check:integrity-recipesif you want to confirm the published examples, validator API payloads, and sealing recipes stay aligned to the current publicG16rule. - Run
npm run check:python-recipesif you want to confirm the cross-language Python consumer recipes stay aligned to the published compact references, validator-envelope request/response payloads, public example seals, and extracted packed-artifact layout.
This repository is assembled from public-safe source materials curated out of the sovereign N1Hub vault and validator surfaces. Files here are projection artifacts for public use; the boundary rules are summarized in PUBLIC_BOUNDARY_MAP.json.
This is the initial public projection of the N1Hub open-core specification surface. The current release focuses on schema, validator-facing contracts, examples, and repository health rather than on the full runtime codebase.
Wave 2, Wave 3, and Wave 4 are delivered in v0.2.0.
The next widening pass should continue projection-friendly references and other public-safe contract families from the stable public baseline without reopening the private runtime boundary.