===== /home/yeff/public_html/devon/panel/data/master_architecture_index.md =====
-rwxr-xr-x 1 root root 50K Apr 9 08:49 /home/yeff/public_html/devon/panel/data/master_architecture_index.md
# DEVON - MASTER ARCHITECTURE INDEX
## Checkpoint 2026-04-03 — Semantic Runtime Reading Canon
### Validated closure
- `build_runtime_contracts.py` already emits canonical runtime contracts with explicit semantics.
- `collect_runtime.py` was refactored so `runtime_status.json` now preserves semantic fields from the registry snapshot into final published runtime rows.
- The Devon collector now emits semantically typed rows including:
- `row_kind`
- `semantic_scope`
- `counts_toward_completion`
- `display_in_cards`
- `display_in_donuts`
- `ui_group`
- `source_contract`
- `status_resolution`
- `rollup_source`
- `stage_rollup` is now a sovereign runtime row type and its `progress_pct` is the canonical source for stage completion in the UI.
- `project_progress.json` remains the sovereign source for global project completion.
- `export_panel_runtime.sh` was validated as the Devon → Waresite publication bridge for:
- `runtime_snapshot.json`
- `runtime_status.json`
- `host_runtime.json`
- `docker_runtime.json`
- `project_progress.json`
### Mandatory semantic runtime rule
Any runtime row that feeds UI completion or operational grouping must be published by Devon with explicit semantic boundaries. Minimum required fields:
- `deployment_stage`
- `subcategory`
- `row_kind`
- `semantic_scope`
- `counts_toward_completion`
- `display_in_cards`
- `display_in_donuts`
- `ui_group`
- `source_contract`
### Mandatory UI reading rule
- Waresite UI must read completion only from declared semantics emitted by Devon.
- Global project completion must read from `project_progress.json`.
- Stage completion must read from `stage_rollup.progress_pct`.
- Subcategory cards must not render percentage donuts when `completionRows == 0`.
- If a runtime row is visible but not eligible for completion, the UI must render `MISSING / not eligible`, never `0%`.
- No semantic mixing between rollup rows and item rows in the same completion calculation.
### Canonical closure reached on 2026-04-03
The semantic runtime bottleneck is considered closed under the following validated path:
1. Devon server changes observable state
2. `collect_runtime.py` regenerates sovereign runtime artifacts
3. `export_panel_runtime.sh` synchronizes runtime artifacts to Waresite
4. Operator Panel reads published semantics without manual donut patching for new server-side evidence
### Operational implication
- The UI is now render-only relative to runtime semantics.
- Newly installed or configured Devon components must appear through collector + export, not through Waresite-side workaround patches.
- Future work returns to Devon server configuration and host/runtime expansion.
### Material Devon runtime-contract artifacts now validated
The following files already exist materially on the Devon server and must be treated as the current runtime-contract artifacts in force:
- Canonical expected-runtime manifest: `/opt/devon/canon/runtime_expected_manifest.json`
- Canonical probe registry: `/opt/devon/canon/runtime_probe_registry.json`
- Contract builder/compiler: `/opt/devon/bin/build_runtime_contracts.py`
These artifacts are the current material base for runtime expectation + probe execution mapping.
They already exist and therefore must be referenced explicitly in continuity and master before any attempt to invent parallel contract files.
version: v3.0
status: ACTIVE
mode: CANONICAL_ROOT
role: supreme_reference
## 1. SYSTEM IDENTITY
Devon is a first-party cognitive development control plane.
It is designed to:
- architect
- validate
- generate
- canonize
- execute
- benchmark
- observe
- promote
All operations follow:
- sandbox-first execution
- evidence-based validation
- PASS / FAIL / MISSING rules
## 1.1 OPERATIONAL CONTEXT RULE
All Devon operations MUST start with canonical context reconstruction.
Mandatory command:
`/home/yeff/public_html/devon/context_dump.sh`
Rules:
- no analysis without dump
- no patch without dump
- no context = MISSING
- ChatGPT memory is NOT a valid source of truth
- only server evidence defines system state
This rule is non-optional and applies to all execution flows.
## 2. GLOBAL STATUS MODEL
PASS = observable evidence exists and validation passes
FAIL = observable evidence exists and validation fails
MISSING = no observable evidence
PLANNED = formally defined but not yet materially present
No inference allowed.
## 3. SUPREME REFERENCE LAW
If a file is not registered in this master index, it does not exist for Devon canonical governance.
This file is the highest human-readable reference for:
- canonical file existence
- file role
- phase ownership
- authority ownership
- precedence and conflict resolution
- structured canon registration
## 4. CANONICAL ROOT
Devon canonical structure is composed of two distinct but complementary roots:
### 4.1 DATA ROOT (UI / Runtime / Contracts)
`/home/yeff/public_html/devon/panel/data/`
Purpose:
- UI data source
- runtime artifacts
- contracts and schemas
- documentation hub bridge
### 4.2 GOVERNANCE ROOT (Operational Canon)
`/home/yeff/public_html/devon/canon/`
Purpose:
- operational rules
- decision registry
- execution flow
- project scope and boundaries
- continuity and next actions
Rule:
- panel/data = system state
- canon = system governance
Both roots are mandatory and must remain strictly separated.
## 5. DOCUMENTATION MODEL
Devon canonical documentation is composed of:
- authority documents
- satellite documents
- structured canonical JSON artifacts
- runtime/support JSON artifacts
- panel/documentation bridge artifacts
Rule:
one concept = one primary authority
A concept may be referenced by multiple files, but only one file may define its sovereign canonical meaning.
## 6. DOCUMENT PRECEDENCE RULE
If two files mention the same concept, precedence is:
1. this master index decides registration and ownership
2. the designated authority file defines the sovereign meaning
3. structured canonical JSON defines machine-readable enforcement
4. satellite files may contextualize but may not redefine
5. runtime/support files may operationalize but may not redefine canon
## 7. CANONICAL ORGANIZATION MODEL
This master index is organized by two mandatory axes:
1. canonical layer
2. installation / configuration order
Rule:
- layer defines cognitive and operational classification
- phase origin preserves real installation and configuration sequence
- no layer may break deployment order
- no categorization may override operational dependency
System flow:
Strategy → Architecture → Delivery → Runtime → Trust → Memory
Cross-layer mandatory controls:
- release artifact hygiene must be defined before unrestricted promotion
- distribution and packaging observability must exist before runtime evidence is treated as operationally complete
- environment-specific exposure policy must exist before memory-bearing runtime is treated as trusted
## 8. LAYERED CANONICAL INDEX
### 8.1 STRATEGY LAYER
Purpose:
defines what is being built, why it exists, under which scope, rules and environment constraints.
Installation/configuration order:
this layer comes first.
Phase origin:
- Phase 01 - Overview & Scope
Authority and registered files:
#### 8.1.1 System Root and Registration
===== /home/yeff/public_html/devon/panel/data/devon_continuity.md =====
-rwxr-xr-x 1 root root 15K Apr 9 00:20 /home/yeff/public_html/devon/panel/data/devon_continuity.md
# DEVON CONTINUITY
## Checkpoint 2026-04-09 — Canon Cleanup + Monitoring Layer
### O que foi feito
- Limpeza completa de arquivos órfãos no Waresite /panel/data
- Limpeza de baks no Devon /opt/devon/bin e /opt/devon/canon
- runtime_row_semantics_canonical.json criado no disco e registrado no master
- monitoring_canonical.json criado — define CPU, memory, disk, network, containers, nginx, security
- sse_bridge_canonical.json criado — transport SSE PLANNED, push_snapshot ainda ACTIVE
- master_architecture_index.md atualizado: seção 8.7, Phase 10, 11.2, 11.3
- hub_index.json atualizado: 10 phases, 12 categories, monitoring_observability adicionado
- project_progress_canonical.json e project_progress_model.json registrados em overview_scope
- runtime_row_semantics_canonical registrado em observability_audit
- Export script Devon corrigido para sincronizar canon completo (panel_export/current)
- DH funcionando e refletindo tudo corretamente
### Próximo passo
- Refatorar Operator Panel (UI) — novo chat
- Após UI: implementar SSE bridge Devon → Waresite
- Após SSE: remover export_panel_runtime.sh
## Checkpoint 2026-04-03 — Semantic Runtime Reading Canon
### Real state validated
- Devon is already emitting real runtime for host, docker, pipeline and project progress.
- Waresite is already consuming published runtime rows from Devon.
- The UI numbers are not being filled manually.
- The current problem is semantic, not cosmetic and not “manual digit editing”.
### Structural diagnosis
- The Operator Panel is still grouping runtime rows with insufficient semantic separation.
- Some visual groups are mixing rollup rows, matrix-derived rows and item-level runtime rows.
- This makes some donuts mathematically calculated but semantically invalid.
- The correct correction is not another ad hoc UI patch.
- The correct correction is explicit semantic typing in the runtime publication contract.
### Sovereign rule now in force
- Devon must publish runtime truth with explicit row semantics.
- Waresite UI must only consume published runtime truth and declared row meaning.
- Canon stays canonical.
- Runtime stays operational.
- UI stays render-only.
- No manual UI recognition workflow is allowed as normal operating mode.
- No ambiguous row grouping is allowed for completion semantics.
### Mandatory next correction
- Canonize the runtime row semantics model.
- Keep the probe-registry model as mandatory architecture.
- Bind every emitted row to an explicit `row_kind` and `semantic_scope`.
- Refactor `collect_runtime.py` and export artifacts to publish semantically typed rows.
- Keep `Canon -> DH -> UI` intact, but eliminate semantic ambiguity in runtime consumption.
### Material Devon runtime-contract artifacts now validated
The following files already exist materially on the Devon server and are the current runtime-contract base in force:
- `/opt/devon/canon/runtime_expected_manifest.json`
- `/opt/devon/canon/runtime_probe_registry.json`
- `/opt/devon/bin/build_runtime_contracts.py`
Operational reading:
- `runtime_expected_manifest.json` is the expected-runtime manifest.
- `runtime_probe_registry.json` is the probe registry.
- `build_runtime_contracts.py` is the builder/compiler that generates these contracts.
Rule now fixed:
- Do not invent a parallel canonical file when the contract base already exists materially in Devon.
- Any semantic/runtime correction must start from these files first.
## 1. MEMORY
### 1.1 Project Identity
- Devon is the cognitive development control plane of the YEFF architecture.
- Waresite server hosts the canonical documentation, Documentation Hub, and Operational UI.
- Devon server is the origin of real runtime, host, container, and execution data.
- The Operational UI does not define truth. It validates and exposes canonical truth.
### 1.2 Canonical References
- Canonical root: `/home/yeff/public_html/devon/panel/data/master_architecture_index.md`
- Canonical child-files: markdown and JSON artifacts referenced by the canonical root
- Canonical contracts: JSON/YAML files consumed by the Documentation Hub and Operational UI
- Canonical continuity file: `/home/yeff/public_html/devon/panel/data/devon_continuity.md`
### 1.3 Fixed Rules
- Evidence first, patch after.
- No guessing.
- No fake status or fake progress.
- Allowed status model is evidence-based and boolean.
- If something does not exist observably, the only allowed status is `MISSING`.
- Operational UI validates canonical contracts. It does not invent architecture.
- Waresite hosts canonical documentation and UI.
- Devon hosts real runtime and operational execution.
- Any new operational discovery must follow canonical expansion order.
- Canonical expansion order is mandatory: `Canon -> DH -> UI`.
### 1.4 Canonized Decisions
- The project truth is defined by canonical documentation, not by chat memory.
- `master_architecture_index.md` remains the canonical root.
- `devon_continuity.md` is the canonical continuity layer between chats.
- The continuity model is divided into two macrosections: `MEMORY` and `TODO`.
- The Operational UI is the operational validation layer, not the source of truth.
- Any new item discovered during server installation/configuration must be canonized before entering DH or UI.
### 1.5 Completed Milestones
- Documentation Hub baseline is already established.
- Operational UI baseline has been finalized as current operational reference.
- The continuity strategy between chats has been defined.
- Canonical expansion flow has been defined.
- Waresite has been defined as the canonical documentation host.
- Devon has been defined as the real runtime source.
### 1.6 Stable Context
- There are two distinct servers in this architecture:
- Waresite: canonical documentation, DH, Operational UI
- Devon: runtime origin, host state, containers, execution
- Server work must converge to canon already defined in Waresite.
- Canon must always lead implementation.
## 2. TODO
### 2.1 Current Focus
- Replace ambiguous UI/runtime reading with a sovereign Devon-side semantic publication model.
- Canonize the runtime probe-registry pattern as mandatory architecture.
- Canonize the runtime row semantics contract as mandatory architecture.
- Prepare the collector refactor from hardcoded runtime logic to registry-driven, semantically typed publication.
- Preserve existing `/opt/devon` runtime, export and bridge assets during the redesign.
### 2.2 Open Operational Fronts
- Define the canonical runtime probe registry artifact and its schema.
- Define the canonical runtime row semantics artifact and its schema.
- Bind every observable stage/subcategory/item to a deterministic probe rule.
- Bind every emitted runtime row to explicit semantic type and counting boundary.
- Refactor `collect_runtime.py` to execute the registry instead of per-case hardcoded logic.
- Stop any workflow where Waresite UI must be patched just to recognize an already-installed Devon component.
- Stop any workflow where Waresite UI must guess row meaning from loose grouping.
- Keep sync/export bridge stable while the collector model is upgraded.
### 2.3 Active Blockers
- Runtime publication is still partially hardcoded in `collect_runtime.py`.
- UI/runtime alignment still depends on case-specific downstream adjustments.
- There is no sovereign registry-driven runtime publication contract yet.
- There is no sovereign runtime row semantics contract yet.
- Current runtime granularity is incomplete for several stage/subcategory views.
- Current row grouping still allows semantic mixing between rollup rows and item rows.
- This creates operational drag and wastes time/energy during Devon server setup.
### 2.4 Next Operational Step
- The next technical deliverable is not another UI patch.
- The next technical deliverable is to evolve the existing Devon contract base, not invent a parallel contract base.
- Start from `/opt/devon/canon/runtime_expected_manifest.json`.
- Start from `/opt/devon/canon/runtime_probe_registry.json`.
- Start from `/opt/devon/bin/build_runtime_contracts.py`.
- The next chat must start from the runtime publication architecture problem, not from another installation micro-fix.
- Waresite UI must remain consumer-only while Devon becomes the complete runtime publisher.
- UI completion semantics must only be computed from semantically typed rows emitted by Devon.
### 2.5 Deferred Items
- Any DH/UI reflection not yet required for immediate continuity use.
- Any runtime/service component not yet evidenced on the Devon server.
- Any UI expansion for components that are not yet canonized.
### 2.6 Devon Host Real Status
#### 2.6.1 Observed Host Baseline
- Hostname observed: `Devon` / `vmi2858754`
- OS observed: Ubuntu 22.04.5 LTS
- Kernel observed: Linux 5.15.0-170-generic
- Architecture observed: x86-64
- CPU observed: 6 vCPU
- Memory observed: 11 GiB RAM
- Disk observed: 100 GB total with approximately 94 GB available
- Current exposed listening service observed: SSH on port 22 only
#### 2.6.2 Observed Security/Network Status
- Firewall status observed: `active`
- UFW policy observed: `deny (incoming), allow (outgoing), disabled (routed)`
- Allowed inbound rule observed: `22/tcp`
- iptables default policy observed: `INPUT DROP`, `FORWARD DROP`, `OUTPUT ACCEPT`
- Reverse proxy observed: `MISSING`
- TLS baseline observed: `MISSING`
#### 2.6.3 Observed Tooling Status
- Python3: `PRESENT`
- Git: `PRESENT`
- Curl: `PRESENT`
- Docker: `MISSING`
- Docker Compose: `MISSING` by consequence of Docker absence
- Nginx: `MISSING`
#### 2.6.4 Observed Devon Paths and Assets
- `/opt/devon`: `PRESENT`
- `/opt/devon/bin`: `PRESENT`
- `/opt/devon/runtime`: `PRESENT`
- `/opt/devon/canon`: `PRESENT`
- `/srv`: `PRESENT`
- `/app`: `MISSING`
#### 2.6.5 Observed Reusable Devon Runtime Assets
- `/opt/devon/bin/collect_runtime.py`
- `/opt/devon/bin/export_panel_runtime.sh`
- `/opt/devon/runtime/host_runtime.json`
- `/opt/devon/runtime/docker_runtime.json`
- `/opt/devon/runtime/runtime_status.json`
- `/opt/devon/runtime/panel_export/current`
- `/opt/devon/canon/*.yaml`
#### 2.6.6 Canonical Reading of Current Host
- The Devon host already contains canonical/runtime/export structure under `/opt/devon`.
- The Devon host does not yet contain container runtime baseline.
- The Devon host does not yet contain reverse proxy/TLS baseline.
- The Devon host must be expanded without breaking existing `/opt/devon` assets or the Waresite bridge.
===== /home/yeff/public_html/devon/panel/data/hub_index.json =====
-rwxr-xr-x 1 root root 46K Apr 9 00:01 /home/yeff/public_html/devon/panel/data/hub_index.json
{
"phases": [
{
"id": "phase-01",
"step": "Phase 01",
"name": "Overview & Scope",
"summary": "master root, project scope, manifest and continuity checkpoint.",
"badge": "overview_scope",
"layers": [
{
"title": "Overview & Scope",
"desc": "master registration, project framing, entry manifest and continuity checkpoint.",
"chips": [
"master root",
"project scope",
"entry manifest",
"checkpoint"
]
}
]
},
{
"id": "phase-02",
"step": "Phase 02",
"name": "Architecture & Engineering Canon",
"summary": "cognitive architecture, governance, artifact structure, contracts, naming, state legitimacy, build promotion, deployment structure and contextual satellites.",
"badge": "architecture_engineering_canon",
"layers": [
{
"title": "Architecture & Engineering Canon",
"desc": "authority and satellite documents that define Devon structural canon.",
"chips": [
"architecture",
"governance",
"contracts",
"naming",
"state legitimacy",
"deployment"
]
}
]
},
{
"id": "phase-03",
"step": "Phase 03",
"name": "Cognitive Flow Canon",
"summary": "deterministic orchestration, LLM role, retrieval role, validation order and execution gating.",
"badge": "cognitive_flow_canon",
"layers": [
{
"title": "Cognitive Flow Canon",
"desc": "interpreter, decision, validation, execution, memory and retrieval in governed flow.",
"chips": [
"interpreter",
"FSM",
"validation",
"execution",
"memory",
"retrieval"
]
}
]
},
{
"id": "phase-04",
"step": "Phase 04",
"name": "Containerization Canon",
"summary": "container topology, isolation and host versus container runtime boundaries.",
"badge": "containerization_canon",
"layers": [
{
"title": "Containerization Canon",
"desc": "runtime boundaries and isolation, without redefining sovereign architecture.",
"chips": [
"topology",
"isolation",
"runtime boundaries"
]
}
]
},
{
"id": "phase-05",
"step": "Phase 05",
"name": "Latency & Performance Canon",
"summary": "latency model, hot path versus cold path, bounded execution and fallback behavior.",
"badge": "latency_performance_canon",
"layers": [
{
"title": "Latency & Performance Canon",
"desc": "time traceability across modules, stages and end-to-end lifecycle.",
"chips": [
"latency",
"hot path",
"cold path",
"fallback"
]
}
]
},
{
"id": "phase-06",
"step": "Phase 06",
"name": "Noise Reduction Canon",
"summary": "signal preservation, redundancy elimination and unnecessary hop reduction.",
"badge": "noise_reduction_canon",
"layers": [
{
"title": "Noise Reduction Canon",
"desc": "remove architectural waste and keep deterministic path lean.",
"chips": [
"signal",
"redundancy elimination",
"less path"
]
}
]
},
{
"id": "phase-07",
"step": "Phase 07",
"name": "Observability & Audit Canon",
"summary": "audit-linked visibility, evidence continuity and operational observability.",
"badge": "observability_audit_canon",
"layers": [
{
"title": "Observability & Audit Canon",
"desc": "traceability for runtime, memory and protected execution.",
"chips": [
"observability",
"audit",
"evidence continuity"
]
}
]
},
{
"id": "phase-08",
"step": "Phase 08",
"name": "Security Canon",
"summary": "security governance, trust model, access boundaries, memory protection and monitoring.",
"badge": "security_canon",
"layers": [
{
"title": "Security Canon",
"desc": "security governance with structured implementation artifacts.",
"chips": [
"zero trust",
"access control",
"memory protection",
"monitoring"
]
}
]
},
{
"id": "phase-09",
"step": "Phase 09",
"name": "Operational Flows Canon",
"summary": "execution sequence, operating flow mapping and operational order integrity.",
"badge": "operational_flows_canon",
"layers": [
{
"title": "Operational Flows Canon",
"desc": "runtime sequence and flow order without redefining sovereign authorities.",
"chips": [
"operational flow",
"sequence",
"order integrity"
]
}
]
},
{
"id": "phase-10",
"step": "Phase 10",
"name": "Monitoring & Real-time Observability",
"summary": "real-time host, container and service monitoring with SSE transport to the Operator Panel.",
"badge": "monitoring_observability",
"layers": [
{
"title": "Monitoring & Real-time Observability",
"desc": "CPU, memory, disk, network, container health, security services and SSE bridge canon.",
"chips": [
"cpu",
"memory",
"containers",
"network",
"security",
"SSE"
]
}
]
}
],
"categories": [
{
"id": "overview_scope",
"title": "Overview & Scope",
"sub": "master registration, project scope, manifest and continuity checkpoint.",
"badge": "phase 01",
"docs": [
{
"id": "master_architecture_index",
"title": "Master Architecture Index",
"path": "../panel/data/master_architecture_index.md",
"phase": "phase-01",
"layer": "overview_scope",
"role": "Supreme canonical root and registration authority.",
"fits": "Defines registration, precedence, authority ownership and completeness rules.",
"depends_on": [
"panel_manifest",
"project_scope"
],
"used_by": [],
"architecture_view": "Supreme human-readable root for all Devon canon.",
"label": "Master Architecture Index",
"type": "text"
},
{
===== /home/yeff/public_html/devon/panel/data/panel_canonical_tree.json =====
-rw-r--r-- 1 root root 12K Mar 23 10:06 /home/yeff/public_html/devon/panel/data/panel_canonical_tree.json
{
"canon_meta": {
"canon_id": "devon-panel-tree",
"version": "1.0.0",
"status": "ACTIVE",
"ui_reference_mode": "claude_like_workspace_plus_devon_governance"
},
"panel_root": {
"navigation_mode": "deployment_order",
"primary_layout": {
"left_column": "chat_and_operator_flow",
"center_column": "artifact_or_preview",
"right_column": "evidence_contracts_timeline"
},
"global_widgets": [
"deployment_stage_switcher",
"card_grid",
"evidence_drawer",
"contract_drawer",
"dependency_graph",
"validation_timeline",
"server_scope_selector",
"project_scope_selector",
"memory_scope_selector"
]
},
"deployment_sections": [
{
"section_id": "S00",
"display_name": "Host Readiness",
"cards": [
{
"card_id": "core-host-readiness",
"display_name": "Host Readiness",
"subcategories": [
"filesystem",
"root_context",
"python_runtime",
"git_runtime",
"docker_runtime",
"canonical_directories"
]
}
]
},
{
"section_id": "S01",
"display_name": "Canon Control Plane",
"cards": [
{
"card_id": "project-scope",
"display_name": "Project Scope",
"subcategories": [
"mission",
"principles",
"scope",
"file_index"
]
},
{
"card_id": "deployment-order",
"display_name": "Deployment Order",
"subcategories": [
"stages",
"dependencies",
"blockers",
"promotion_gates"
]
},
{
"card_id": "card-contracts",
"display_name": "Card Contracts",
"subcategories": [
"identity",
"interfaces",
"dependencies",
"evidence",
"status_rules"
]
}
]
},
{
"section_id": "S02",
"display_name": "Server Registry",
"cards": [
{
"card_id": "server-registry",
"display_name": "Server Registry",
"subcategories": [
"control_plane",
"sandbox_hosts",
"production_hosts",
"shared_services",
"benchmark_nodes",
"storage_nodes"
]
}
]
},
{
"section_id": "S03",
"display_name": "Foundation Infrastructure",
"cards": [
{
"card_id": "infrastructure",
"display_name": "Infrastructure",
"subcategories": [
"containers",
"networking",
"reverse_proxy",
"secrets",
"volumes"
]
},
{
"card_id": "storage-state",
"display_name": "Storage & State",
"subcategories": [
"structured_state",
"cache",
"vector_state",
"artifact_storage"
]
}
]
},
{
"section_id": "S04",
"display_name": "Memory Control Plane",
"cards": [
{
"card_id": "memory-manager",
"display_name": "Memory Manager",
"subcategories": [
"control_plane",
"partition_registry",
"router",
"retention_policy",
"audit_policy",
"namespace_contract"
]
}
]
},
{
"section_id": "S05",
"display_name": "Core Runtime",
"cards": [
{
"card_id": "core-runtime",
"display_name": "Core Runtime",
"subcategories": [
"api_runtime",
"app_server",
"router_registry",
"environment_loader",
"health_endpoints"
]
}
]
},
{
"section_id": "S06",
"display_name": "Observability & Audit Base",
"cards": [
{
"card_id": "observability-audit",
"display_name": "Observability & Audit",
"subcategories": [
"logs",
"metrics",
"traces",
"audit_events",
"evidence_store"
]
}
]
},
{
"section_id": "S07",
"display_name": "Remote & Sandbox Orchestration",
"cards": [
{
"card_id": "remote-orchestration",
"display_name": "Remote Orchestration",
"subcategories": [
"ssh_profiles",
"node_probes",
"remote_runner",
"access_policy"
]
},
{
"card_id": "sandbox-environments",
"display_name": "Sandbox Environments",
"subcategories": [
"mirror_strategy",
"sanitization",
"parity_validation",
"promotion_gate",
"rollback_readiness"
]
}
]
},
{
"section_id": "S08",
"display_name": "Cognition Base",
"cards": [
{
"card_id": "language-understanding",
"display_name": "Language Understanding",
"subcategories": [
"tokenization",
"task_extraction",
"semantic_analysis",
"prompt_interpretation"
]
},
===== /home/yeff/public_html/devon/panel/data/runtime_status.json =====
-rw-r--r-- 1 root root 109K Apr 9 10:11 /home/yeff/public_html/devon/panel/data/runtime_status.json
{
"contract_version": "1.3.0",
"source_contract": "devon-panel-pipeline-runtime",
"observed_at_utc": "2026-04-09T13:11:09Z",
"runtime_snapshot": [
{
"runtime_id": "stage-benchmark_learning",
"item_id": null,
"canonical_matrix_id": null,
"deployment_stage": "benchmark_learning",
"subcategory": "stage_rollup",
"technology": "registry_stage_rollup",
"required": true,
"probe_ref": null,
"maps_to_pipeline_step": null,
"row_kind": "stage_rollup",
"semantic_scope": "stage",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "stage_rollup",
"source_contract": "devon-panel-pipeline-runtime",
"status_resolution": "contract_sequence(required_counted_items)",
"rollup_source": "runtime_items+contract_sequence",
"status": "PENDING",
"overall_status": "PENDING",
"evidence_state": "OBSERVED",
"presence": "PASS",
"functionality": null,
"evidence": {
"observed_item_count": 3,
"counted_item_count": 0,
"pass_steps": 0,
"fail_steps": 0,
"total_steps": 11
},
"observed_at_utc": "2026-04-09T13:11:09Z",
"progress_pct": 0,
"current_step": "preconditions",
"step_statuses": [
{
"step": "preconditions",
"status": "MISSING"
},
{
"step": "install",
"status": "MISSING"
},
{
"step": "configure",
"status": "MISSING"
},
{
"step": "boot",
"status": "MISSING"
},
{
"step": "healthcheck",
"status": "MISSING"
},
{
"step": "integration",
"status": "MISSING"
},
{
"step": "functional_validation",
"status": "MISSING"
},
{
"step": "evidence_collection",
"status": "MISSING"
},
{
"step": "backup_or_snapshot",
"status": "MISSING"
},
{
"step": "rollback",
"status": "MISSING"
},
{
"step": "promotion_gate",
"status": "MISSING"
}
],
"last_run_at": "2026-04-09T13:11:09Z",
"started_at": null,
"finished_at": null,
"duration_ms": null,
"evidence_source": "/opt/devon/runtime/runtime_snapshot.json",
"error_message": null
},
{
"runtime_id": "matrix.mx_120",
"item_id": "matrix.mx_120",
"canonical_matrix_id": "MX-120",
"deployment_stage": "benchmark_learning",
"subcategory": "test_suites",
"technology": "benchmark_runner",
"required": true,
"probe_ref": null,
"maps_to_pipeline_step": "Preconditions",
"row_kind": "matrix_requirement",
"semantic_scope": "canonical_requirement",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "benchmark_learning:test_suites",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "external_runtime_rollup",
"rollup_source": "MX-120",
"status": "MISSING",
"overall_status": "MISSING",
"evidence_state": "OBSERVED",
"presence": "MISSING",
"functionality": "MISSING",
"evidence": {
"error": "probe_ref_not_found:None"
},
"observed_at_utc": "2026-04-09T13:11:09Z",
"progress_pct": 0,
"current_step": "Preconditions",
"step_statuses": [
{
"step": "observed_runtime",
"status": "MISSING"
}
],
"last_run_at": "2026-04-09T13:11:09Z",
"started_at": null,
"finished_at": null,
"duration_ms": null,
"evidence_source": "/opt/devon/runtime/runtime_snapshot.json",
"error_message": null
},
{
"runtime_id": "matrix.mx_121",
"item_id": "matrix.mx_121",
"canonical_matrix_id": "MX-121",
"deployment_stage": "benchmark_learning",
"subcategory": "reward_model",
"technology": "rl_engine",
"required": true,
"probe_ref": "probe.matrix.mx_121",
"maps_to_pipeline_step": "Preconditions",
"row_kind": "matrix_requirement",
"semantic_scope": "canonical_requirement",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "benchmark_learning:reward_model",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "probe_ref",
"rollup_source": "MX-121",
"status": "FAIL",
"overall_status": "FAIL",
"evidence_state": "OBSERVED",
"presence": "PRESENT",
"functionality": "NON_FUNCTIONAL",
"evidence": {
"cmd": [
"bash",
"-lc",
"find /opt/devon -maxdepth 3 -type d | grep -Ei 'modules|services|engine' >/dev/null 2>&1"
],
"return_code": 1,
"stdout": null,
"stderr": null
},
"observed_at_utc": "2026-04-09T13:11:09Z",
"progress_pct": 0,
"current_step": "Preconditions",
"step_statuses": [
{
"step": "observed_runtime",
"status": "FAIL"
}
],
"last_run_at": "2026-04-09T13:11:09Z",
"started_at": null,
"finished_at": null,
"duration_ms": null,
"evidence_source": "/opt/devon/runtime/runtime_snapshot.json",
"error_message": null
},
{
"runtime_id": "matrix.mx_122",
"item_id": "matrix.mx_122",
"canonical_matrix_id": "MX-122",
"deployment_stage": "benchmark_learning",
"subcategory": "promotion_decision",
"technology": "learning_loop",
"required": true,
"probe_ref": null,
"maps_to_pipeline_step": "Preconditions",
"row_kind": "matrix_requirement",
"semantic_scope": "canonical_requirement",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "benchmark_learning:promotion_decision",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "external_runtime_rollup",
"rollup_source": "MX-122",
"status": "MISSING",
"overall_status": "MISSING",
"evidence_state": "OBSERVED",
"presence": "MISSING",
"functionality": "MISSING",
"evidence": {
"error": "probe_ref_not_found:None"
},
"observed_at_utc": "2026-04-09T13:11:09Z",
"progress_pct": 0,
"current_step": "Preconditions",
"step_statuses": [
{
"step": "observed_runtime",
"status": "MISSING"
}
===== /home/yeff/public_html/devon/panel/data/runtime_snapshot.json =====
-rw-r--r-- 1 root root 54K Apr 6 19:31 /home/yeff/public_html/devon/panel/data/runtime_snapshot.json
{
"contract_version": "1.2.0",
"source_contract": "devon-runtime-item-snapshot",
"observed_at_utc": "2026-04-06T22:31:09Z",
"runtime_items": [
{
"runtime_id": "host.filesystem.root",
"item_id": "host.filesystem.root",
"canonical_matrix_id": null,
"deployment_stage": "host_readiness",
"subcategory": "filesystem",
"technology": "filesystem_root",
"required": true,
"probe_ref": "probe.dir.root",
"maps_to_pipeline_step": "Preconditions",
"row_kind": "item_runtime",
"semantic_scope": "operational_completion",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "host_readiness:filesystem",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "probe_ref",
"rollup_source": null,
"status": "PASS",
"overall_status": "PASS",
"presence": "PRESENT",
"functionality": "FUNCTIONAL",
"evidence": {
"path": "/",
"exists": true
},
"observed_at_utc": "2026-04-06T22:31:09Z"
},
{
"runtime_id": "host.root.context",
"item_id": "host.root.context",
"canonical_matrix_id": null,
"deployment_stage": "host_readiness",
"subcategory": "root_context",
"technology": "root_user_context",
"required": true,
"probe_ref": "probe.context.root_user",
"maps_to_pipeline_step": "Preconditions",
"row_kind": "item_runtime",
"semantic_scope": "operational_completion",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "host_readiness:root_context",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "probe_ref",
"rollup_source": null,
"status": "PASS",
"overall_status": "PASS",
"presence": "PRESENT",
"functionality": "FUNCTIONAL",
"evidence": {
"euid": 0,
"is_root": true
},
"observed_at_utc": "2026-04-06T22:31:09Z"
},
{
"runtime_id": "host.python.runtime",
"item_id": "host.python.runtime",
"canonical_matrix_id": null,
"deployment_stage": "host_readiness",
"subcategory": "python_runtime",
"technology": "python3",
"required": true,
"probe_ref": "probe.cmd.python3_version",
"maps_to_pipeline_step": "Install",
"row_kind": "item_runtime",
"semantic_scope": "operational_completion",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "host_readiness:python_runtime",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "probe_ref",
"rollup_source": null,
"status": "PASS",
"overall_status": "PASS",
"presence": "PRESENT",
"functionality": "FUNCTIONAL",
"evidence": {
"cmd": [
"python3",
"--version"
],
"return_code": 0,
"stdout": "Python 3.10.12",
"stderr": null
},
"observed_at_utc": "2026-04-06T22:31:09Z"
},
{
"runtime_id": "host.git.runtime",
"item_id": "host.git.runtime",
"canonical_matrix_id": null,
"deployment_stage": "host_readiness",
"subcategory": "git_runtime",
"technology": "git",
"required": true,
"probe_ref": "probe.cmd.git_version",
"maps_to_pipeline_step": "Install",
"row_kind": "item_runtime",
"semantic_scope": "operational_completion",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "host_readiness:git_runtime",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "probe_ref",
"rollup_source": null,
"status": "PASS",
"overall_status": "PASS",
"presence": "PRESENT",
"functionality": "FUNCTIONAL",
"evidence": {
"cmd": [
"git",
"--version"
],
"return_code": 0,
"stdout": "git version 2.34.1",
"stderr": null
},
"observed_at_utc": "2026-04-06T22:31:09Z"
},
{
"runtime_id": "host.ufw.active",
"item_id": "host.ufw.active",
"canonical_matrix_id": null,
"deployment_stage": "host_readiness",
"subcategory": "security_firewall",
"technology": "ufw",
"required": true,
"probe_ref": "probe.security.ufw_active_ssh",
"maps_to_pipeline_step": "Configure",
"row_kind": "item_runtime",
"semantic_scope": "operational_completion",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "host_readiness:security_firewall",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "probe_ref",
"rollup_source": null,
"status": "PASS",
"overall_status": "PASS",
"presence": "PRESENT",
"functionality": "FUNCTIONAL",
"evidence": {
"installed": true,
"active": true,
"ssh_rule_present": true,
"raw_status": "Status: active\nLogging: on (low)\nDefault: deny (incoming), allow (outgoing), deny (routed)\nNew profiles: skip\n\nTo Action From\n-- ------ ----\n22/tcp ALLOW IN Anywhere # Devon SSH\n22/tcp (v6) ALLOW IN Anywhere (v6) # Devon SSH"
},
"observed_at_utc": "2026-04-06T22:31:09Z"
},
{
"runtime_id": "host.fail2ban.sshd",
"item_id": "host.fail2ban.sshd",
"canonical_matrix_id": null,
"deployment_stage": "host_readiness",
"subcategory": "security_fail2ban",
"technology": "fail2ban",
"required": true,
"probe_ref": "probe.security.fail2ban_sshd",
"maps_to_pipeline_step": "Configure",
"row_kind": "item_runtime",
"semantic_scope": "operational_completion",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "host_readiness:security_fail2ban",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "probe_ref",
"rollup_source": null,
"status": "PASS",
"overall_status": "PASS",
"presence": "PRESENT",
"functionality": "FUNCTIONAL",
"evidence": {
"installed": true,
"active": true,
"sshd_jail_present": true,
"sshd_jail_ok": true
},
"observed_at_utc": "2026-04-06T22:31:09Z"
},
{
"runtime_id": "host.ssh.hardening",
"item_id": "host.ssh.hardening",
"canonical_matrix_id": null,
"deployment_stage": "host_readiness",
"subcategory": "security_ssh",
"technology": "sshd",
"required": true,
"probe_ref": "probe.security.sshd_hardening",
"maps_to_pipeline_step": "Configure",
"row_kind": "item_runtime",
"semantic_scope": "operational_completion",
"counts_toward_completion": true,
"display_in_cards": true,
"display_in_donuts": true,
"ui_group": "host_readiness:security_ssh",
"source_contract": "devon-runtime-expected-manifest",
"status_resolution": "probe_ref",
"rollup_source": null,
"status": "PASS",
"overall_status": "PASS",
"presence": "PRESENT",
"functionality": "FUNCTIONAL",
"evidence": {
"expected": {
"port": "22",
"permitrootlogin": "without-password",
===== /home/yeff/public_html/devon/panel/data/project_progress.json =====
-rw-r--r-- 1 root root 5.4K Apr 6 19:31 /home/yeff/public_html/devon/panel/data/project_progress.json
{
"contract_version": "2.1.0",
"source_contract": "devon-project-progress-runtime",
"observed_at_utc": "2026-04-06T22:31:09Z",
"global_project_progress": {
"global_status": "PENDING",
"progress_pct": 11,
"calculation_mode": "average_stage_rollup_all_runtime_stages",
"eligible_stages": [
"benchmark_learning",
"canon_control_plane",
"cognition_base",
"core_runtime",
"docker_runtime",
"engineering_modules",
"foundation_infrastructure",
"governance_policy",
"host_readiness",
"memory_control_plane",
"observability_audit_base",
"operator_panel",
"remote_access_orchestration",
"sandbox_orchestration",
"server_registry",
"storage_state"
],
"included_stage_count": 16,
"excluded_stage_count": 0,
"observed_stage_count": 16,
"observed_coverage_weight_pct": 100,
"contributing_stages": [
{
"stage_key": "benchmark_learning",
"label": "benchmark_learning",
"runtime_stage": "benchmark_learning",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "canon_control_plane",
"label": "canon_control_plane",
"runtime_stage": "canon_control_plane",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "cognition_base",
"label": "cognition_base",
"runtime_stage": "cognition_base",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "core_runtime",
"label": "core_runtime",
"runtime_stage": "core_runtime",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "docker_runtime",
"label": "docker_runtime",
"runtime_stage": "docker_runtime",
"weight_pct": null,
"stage_progress_pct": 100,
"stage_status": "PASS",
"evidence_state": "OBSERVED"
},
{
"stage_key": "engineering_modules",
"label": "engineering_modules",
"runtime_stage": "engineering_modules",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "foundation_infrastructure",
"label": "foundation_infrastructure",
"runtime_stage": "foundation_infrastructure",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "governance_policy",
"label": "governance_policy",
"runtime_stage": "governance_policy",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "host_readiness",
"label": "host_readiness",
"runtime_stage": "host_readiness",
"weight_pct": null,
"stage_progress_pct": 71,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "memory_control_plane",
"label": "memory_control_plane",
"runtime_stage": "memory_control_plane",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "observability_audit_base",
"label": "observability_audit_base",
"runtime_stage": "observability_audit_base",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "operator_panel",
"label": "operator_panel",
"runtime_stage": "operator_panel",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "remote_access_orchestration",
"label": "remote_access_orchestration",
"runtime_stage": "remote_access_orchestration",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "sandbox_orchestration",
"label": "sandbox_orchestration",
"runtime_stage": "sandbox_orchestration",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "server_registry",
"label": "server_registry",
"runtime_stage": "server_registry",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
},
{
"stage_key": "storage_state",
"label": "storage_state",
"runtime_stage": "storage_state",
"weight_pct": null,
"stage_progress_pct": 0,
"stage_status": "PENDING",
"evidence_state": "OBSERVED"
}
],
"reason_if_missing": null,
"observed_at_utc": "2026-04-06T22:31:09Z"
}
}
===== /home/yeff/public_html/devon/panel/data/host_runtime.json =====
-rw-r--r-- 1 root root 3.4K Apr 9 10:11 /home/yeff/public_html/devon/panel/data/host_runtime.json
{
"contract_version": "1.1.0",
"source_contract": "devon-panel-host-runtime",
"observed_at_utc": "2026-04-09T13:11:09Z",
"host_snapshot": {
"host_id": "devon-control-plane",
"hostname": "Devon",
"overall_status": "PASS",
"cpu": {
"status": "PASS",
"usage_pct": 0.0,
"core_count": 6
},
"memory": {
"status": "PASS",
"used_mb": 591.97,
"total_mb": 11956.82,
"usage_pct": 4.95
},
"disk": {
"status": "PASS",
"used_gb": 3.97,
"total_gb": 96.73,
"usage_pct": 4.11
},
"load": {
"status": "PASS",
"load_1m": 0.23,
"load_5m": 0.13,
"load_15m": 0.09
},
"network": {
"status": "PASS",
"rx_bytes": 1169951537,
"tx_bytes": 591907518
},
"services": [
{
"name": "docker",
"status": "PASS",
"active": true
},
{
"name": "nginx",
"status": "FAIL",
"active": false
},
{
"name": "apache2",
"status": "FAIL",
"active": false
},
{
"name": "httpd",
"status": "FAIL",
"active": false
},
{
"name": "php-fpm",
"status": "FAIL",
"active": false
},
{
"name": "mysql",
"status": "FAIL",
"active": false
},
{
"name": "mariadb",
"status": "FAIL",
"active": false
},
{
"name": "redis-server",
"status": "FAIL",
"active": false
},
{
"name": "redis",
"status": "FAIL",
"active": false
},
{
"name": "ssh",
"status": "PASS",
"active": true
},
{
"name": "fail2ban",
"status": "PASS",
"active": true
}
],
"ports": [
{
"port": 22,
"status": "PASS"
},
{
"port": 53,
"status": "PASS"
}
],
"mounts": [
{
"target": "/",
"usage_pct": "5%",
"size": "97G",
"used": "4.0G",
"status": "PASS"
}
],
"security": {
"status": "PASS",
"ufw": {
"status": "PASS",
"installed": true,
"active": true,
"ssh_rule_present": true,
"raw_status": "Status: active\nLogging: on (low)\nDefault: deny (incoming), allow (outgoing), deny (routed)\nNew profiles: skip\n\nTo Action From\n-- ------ ----\n22/tcp ALLOW IN Anywhere # Devon SSH\n22/tcp (v6) ALLOW IN Anywhere (v6) # Devon SSH"
},
"fail2ban": {
"status": "PASS",
"installed": true,
"active": true,
"sshd_jail_present": true,
"sshd_jail_ok": true
},
"ssh_hardening": {
"status": "PASS",
"port": 22,
"permitrootlogin": "without-password",
"passwordauthentication": "no",
"pubkeyauthentication": "yes",
"x11forwarding": "no",
"allowtcpforwarding": "no"
}
}
},
"status_rules": {
"PASS": "observable host evidence exists and validation passes",
"FAIL": "observable host evidence exists and validation fails",
"MISSING": "host evidence does not exist observably"
}
}
===== /home/yeff/public_html/devon/panel/data/docker_runtime.json =====
-rw-r--r-- 1 root root 950 Apr 9 10:11 /home/yeff/public_html/devon/panel/data/docker_runtime.json
{
"contract_version": "1.0.0",
"source_contract": "devon-panel-docker-runtime",
"observed_at_utc": "2026-04-09T13:11:09Z",
"runtime_snapshot": {
"runtime_id": "docker-runtime-devon-control-plane",
"host_id": "devon-control-plane",
"overall_status": "PASS",
"docker_engine": {
"status": "PASS",
"installed": true,
"active": true,
"version": "29.3.1"
},
"compose": {
"status": "PASS",
"installed": true,
"version": "v5.1.1"
},
"containers": [],
"images": {
"status": "PASS",
"total": 0
},
"volumes": {
"status": "PASS",
"total": 0
},
"networks": {
"status": "PASS",
"total": 3
}
},
"status_rules": {
"PASS": "observable docker evidence exists and validation passes",
"FAIL": "observable docker evidence exists and validation fails",
"MISSING": "docker evidence does not exist observably"
}
}