Skip to content

number1projects/capsuleos

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

119 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

CapsuleOS

Verify Public Surface Releases License Apache-2.0 Open Issues CITATION.cff N1Hub.com Portal Source

CapsuleOS is the canonical public technical core for the capsule-first foundations behind N1Hub.

This repository was previously published as capsule-specs.

The public portal for this repository currently lives at https://n1hub.com/projects/capsule-specs/, with open site source in https://github.com/n1projects/n1hub.

This repository is intentionally narrow. It does not try to expose the full private application or every internal workflow. Instead, it publishes the highest-signal public artifacts needed to understand the model:

  • the 5-Element Law
  • the 16 validation gates
  • canonical relation types
  • validator-facing docs and OpenAPI
  • JSON schema, validator API envelope schema, and neuro-concentrate schema
  • a compact reference pack for canonical enums, gate families, validator option flags, and validator route behavior summaries
  • minimal example capsules
  • a small curated raw capsule source set for law, confidence-vector, subtype, and version-lineage semantics

Why this repository exists

N1Hub is being built as a portable, validator-backed, open-core knowledge system. Public documentation, examples, and schema artifacts need their own clean home so contributors, integrators, and maintainers can understand the format without reading the whole private working repository.

This repository is that home.

Human and agent layers

This public surface is intentionally dual-layer:

  • human layer Short orientation, role-specific entry paths, concentrated summaries, and the smallest safe reading set.
  • agent layer Machine-readable maps, stronger-source hierarchy, schemas, OpenAPI, examples, references, and verification-facing artifacts that LLMs and automation can traverse deeply.

Humans should not need to read the whole tree. Agents can traverse the deeper machine-readable surface and return bounded answers back to their operators.

Start here

Audience golden paths

If you already know why you are here, use the narrowest public lane instead of reading the whole front door first:

If you want the full machine-readable lane map, inspect PUBLIC_AUDIENCE_PATHS.json.

Public branch model

This repository uses two public branches:

  • main Stable public branch for reviewer-facing, release-facing, and contributor-safe changes.
  • dream Public exploration branch for larger still-public work before it is collapsed into smaller reviewable slices for main.

Neither branch is a private vault. Private maintainer material stays outside tracked repo files.

Repository layout

  • docs/ Public human-readable reference docs.
  • schemas/ Machine-readable JSON Schema artifacts for capsules, validator API envelopes, and single-file bundle variants.
  • references/ Compact machine-readable contract references for canonical enums, gate families, and validator option flags.
  • projections/ Public-safe TypeScript and Zod projection artifacts for source-level consumers.
  • dist/ Gitignored build output for the consumable package-export projection layer.
  • examples/ Minimal example capsules for documentation and validation.
  • examples/api/ Concrete validator request and response payload examples.
  • examples/client/ Minimal curl, Node, Python, source-level TypeScript/Zod, and installed-package consumer recipes across all published validator routes plus raw-JSON consumer paths.
  • examples/invalid/ Intentionally schema-invalid capsule fixtures for raw-schema consumers.
  • examples/api-invalid/ Intentionally schema-invalid validator API envelope fixtures for raw-schema consumers.
  • examples/archive-invalid/ Intentionally schema-invalid archive-bundle fixtures for portability and export consumers.
  • openapi/ OpenAPI reference for validator-facing HTTP surfaces.
  • capsules/ Curated raw public capsules used as source material for the public specs and exported as package-level reference assets.

Repository health

The repository is structured to look like a serious OSS-maintained surface rather than a one-off export:

Scope

This repository is a public specification and reference surface. It is not the complete N1Hub runtime, not a private vault dump, and not a release of internal operator tooling.

Maintainer

Primary maintainer: egor-n1

Maintainer and review policy:

Quick start

  1. Read docs/overview.md.
  2. Read docs/projection-doctrine.md and docs/domain-boundaries.md.
  3. Read docs/5-element-law.md and docs/16-gates.md.
  4. Read docs/portability.md if you need the public portability / archive trust posture.
  5. Inspect docs/schema-family-reference.md to choose the right schema family and abstraction level.
  6. Inspect schemas/capsule-schema.json.
  7. Inspect docs/schema-bundles.md, schemas/capsule-schema.bundle.json, and schemas/validator-api-envelopes.bundle.json if you want single-file schema imports instead of multi-file $ref wiring.
  8. Inspect docs/reference-pack.md and references/ if you want compact machine-readable enums, gate IDs, validator route behavior summaries, and validator option flags without parsing larger schemas first.
  9. Inspect docs/schema-validation-recipes.md if you want to validate capsules and validator-envelope payloads directly against the published raw JSON Schemas with Ajv.
  10. Inspect docs/archive-validation-recipes.md if you want to validate the published archive-bundle sample directly against the public portability/export schema.
  11. Inspect docs/invalid-archive-bundle-examples.md if you want structural negative archive fixtures that should fail raw-schema validation before any stronger replay-policy or hosted-import assumptions are involved.
  12. Inspect docs/invalid-capsule-examples.md if you want structural negative fixtures that should fail raw-schema validation before any stronger live-validator behavior is involved.
  13. Inspect docs/invalid-api-envelope-examples.md if you want structural negative validator-envelope fixtures that should fail raw-schema validation before any stronger live-validator route behavior is involved.
  14. Inspect docs/integrity-recipes.md if you want the exact public sealing rule for integrity_sha3_512, the shortest recomputation path, and the repair boundary for the intentional G16 example.
  15. Inspect docs/python-consumption.md if you want a cross-language raw-JSON path for compact references, validator-envelope request/response flows, and public G16 seal proofs without depending on the Node projection layer.
  16. Inspect docs/type-projections.md, docs/npm-consumption.md, projections/typescript/capsule.ts, projections/zod/capsule.ts, projections/typescript/validator-api.ts, and projections/zod/validator-api.ts if you need source-level or package-level consumer artifacts in addition to raw JSON Schema and raw validator envelope schemas.
  17. Inspect schemas/validator-api-envelopes.schema.json if you need request and response contracts for the validator HTTP surface.
  18. Inspect PUBLIC_TRACEABILITY_MATRIX.json if you want the bounded map from public claims to files and verification commands.
  19. Inspect PUBLIC_EXAMPLE_COVERAGE.json if you want the bounded map from examples to covered routes, law surfaces, and negative paths.
  20. Inspect PUBLIC_MAINTENANCE_MODEL.json if you want the bounded model for issue intake, review rules, and release posture.
  21. Inspect PUBLIC_CHANGE_CONTROL_MODEL.json if you want the bounded model for additive, deprecated, and breaking public changes.
  22. Inspect PUBLIC_OWNERSHIP_MAP.json if you want the bounded map of which artifact families are maintained here and which stronger surfaces outrank them.
  23. Inspect PUBLIC_DEPENDENCY_GRAPH.json if you want the bounded map of which public artifacts depend on which stronger surfaces and in what order they are easiest to read.
  24. Inspect PUBLIC_ASSURANCE_CASE.json if you want the bounded public claims, strongest evidence, and explicit non-claims in one reviewer-facing surface.
  25. Inspect PUBLIC_UPDATE_COHERENCE_MAP.json if you want the bounded sync groups that must move together when release, reviewer, or contract surfaces change.
  26. Inspect PUBLIC_LIMITATIONS_REGISTER.json if you want the bounded map of deferred domains, non-promises, and public review limits.
  27. Inspect PUBLIC_EVIDENCE_TIMELINE.json if you want the bounded map of how this public surface hardened over time.
  28. Inspect PUBLIC_REVIEW_SCORECARD.json if you want the bounded reviewer-grade checklist for public repository maturity.
  29. Inspect PUBLIC_VERIFICATION_MATRIX.json if you want the bounded map of which verification families protect which public surfaces.
  30. Inspect PUBLIC_AUDIENCE_PATHS.json if you want the bounded role-specific entry paths for reviewers, integrators, contributors, tool-builders, and maintainers.
  31. Inspect PUBLIC_EVIDENCE_STRENGTH_MAP.json if you want the bounded map of which public artifacts are strongest, secondary, or illustrative.
  32. Inspect PUBLIC_ADOPTION_READINESS.json if you want the bounded map of which audience paths are ready today, which prerequisites apply, and which hosted-runtime expectations stay deferred.
  33. Inspect PUBLIC_FRESHNESS_MODEL.json if you want the bounded map of which public summary layers go stale under which triggers and how freshness is kept tied to release evidence.
  34. Inspect PUBLIC_ECOSYSTEM_VALUE_MAP.json if you want the bounded map of why this public surface is concretely useful to reviewers, integrators, tool-builders, contributors, and external OSS-support programs.
  35. Inspect PUBLIC_DECISION_LOG.json if you want the bounded map of the major public decisions and the rationale behind this repository's projection, trust posture, and release discipline.
  36. Inspect PUBLIC_EVIDENCE_GAPS_REGISTER.json if you want the bounded map of which high-signal public evidence still remains intentionally incomplete and where review confidence must stay bounded.
  37. Inspect PUBLIC_PROGRAM_FIT_MAP.json if you want the bounded map of why this public surface is already reviewer/program-credible and where that fit is still intentionally bounded.
  38. Inspect PUBLIC_PUBLICATION_READINESS.json if you want the bounded map of why this repo remains coherent as a published GitHub surface and which post-publication signals remain intentionally deferred.
  39. Compare the examples in examples/ with the schema in schemas/.
  40. Review the raw capsule sources in capsules/ for the confidence-vector, subtype, and version-lineage law-adjacent surfaces.
  41. Read docs/repo-validation-workflow.md if you are preparing a bounded repo-only contribution.
  42. Run npm run verify:repo for the repository-local integrity checks.
  43. Run npm run check:package-surface if you want to confirm the packable projection-export layer as a consumer artifact.
  44. Run npm run check:package-install if you want to confirm that the packed artifact installs cleanly into fresh CommonJS, ESM, TypeScript, raw-schema, archive-schema, bundled-schema, invalid-fixture, compact-reference, integrity-recipe, and Python raw-asset consumers.
  45. Run npm run check:raw-capsules if you want to confirm the curated raw capsule set stays structurally aligned and package-consumable.
  46. Run npm run check:reference-pack if you want to confirm the compact reference pack stays aligned to the stronger schema and gate surfaces.
  47. Run npm run check:openapi-coherence if you want to confirm the compact validator route and envelope-family summaries stay aligned to the stronger published OpenAPI contract.
  48. Run npm run check:schema-bundles if you want to confirm the committed single-file bundled schema artifacts and their consumer recipes stay aligned to the stronger raw schema files.
  49. Run npm run check:schema-recipes if you want to confirm the Ajv-based raw JSON Schema consumer recipes stay executable and aligned to the published schema exports.
  50. Run npm run check:archive-recipes if you want to confirm the archive-bundle validation recipes stay executable and aligned to the published portability/export schema.
  51. Run npm run check:invalid-archive-examples if you want to confirm the published schema-invalid archive fixtures keep failing for the documented structural reasons.
  52. Run npm run check:invalid-examples if you want to confirm the published schema-invalid capsule fixtures keep failing for the documented structural reasons.
  53. Run npm run check:invalid-api-examples if you want to confirm the published schema-invalid validator-envelope fixtures keep failing for the documented structural reasons.
  54. Run npm run check:integrity-recipes if you want to confirm the published examples, validator API payloads, and sealing recipes stay aligned to the current public G16 rule.
  55. Run npm run check:python-recipes if you want to confirm the cross-language Python consumer recipes stay aligned to the published compact references, validator-envelope request/response payloads, public example seals, and extracted packed-artifact layout.

Source of truth

This repository is assembled from public-safe source materials curated out of the sovereign N1Hub vault and validator surfaces. Files here are projection artifacts for public use; the boundary rules are summarized in PUBLIC_BOUNDARY_MAP.json.

Current status

This is the initial public projection of the N1Hub open-core specification surface. The current release focuses on schema, validator-facing contracts, examples, and repository health rather than on the full runtime codebase.

Wave 2, Wave 3, and Wave 4 are delivered in v0.2.0. The next widening pass should continue projection-friendly references and other public-safe contract families from the stable public baseline without reopening the private runtime boundary.

About

CapsuleOS by Number One Projects. Canonical public technical core.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors