{ "phases": [ { "id": "phase-01", "step": "Phase 01", "name": "Overview & Scope", "summary": "master root, project scope, manifest and continuity checkpoint.", "badge": "overview_scope", "layers": [ { "title": "Overview & Scope", "desc": "master registration, project framing, entry manifest and continuity checkpoint.", "chips": [ "master root", "project scope", "entry manifest", "checkpoint" ] } ] }, { "id": "phase-02", "step": "Phase 02", "name": "Architecture & Engineering Canon", "summary": "cognitive architecture, governance, artifact structure, contracts, naming, state legitimacy, build promotion, deployment structure and contextual satellites.", "badge": "architecture_engineering_canon", "layers": [ { "title": "Architecture & Engineering Canon", "desc": "authority and satellite documents that define Devon structural canon.", "chips": [ "architecture", "governance", "contracts", "naming", "state legitimacy", "deployment" ] } ] }, { "id": "phase-03", "step": "Phase 03", "name": "Cognitive Flow Canon", "summary": "deterministic orchestration, LLM role, retrieval role, validation order and execution gating.", "badge": "cognitive_flow_canon", "layers": [ { "title": "Cognitive Flow Canon", "desc": "interpreter, decision, validation, execution, memory and retrieval in governed flow.", "chips": [ "interpreter", "FSM", "validation", "execution", "memory", "retrieval" ] } ] }, { "id": "phase-04", "step": "Phase 04", "name": "Containerization Canon", "summary": "container topology, isolation and host versus container runtime boundaries.", "badge": "containerization_canon", "layers": [ { "title": "Containerization Canon", "desc": "runtime boundaries and isolation, without redefining sovereign architecture.", "chips": [ "topology", "isolation", "runtime boundaries" ] } ] }, { "id": "phase-05", "step": "Phase 05", "name": "Latency & Performance Canon", "summary": "latency model, hot path versus cold path, bounded execution and fallback behavior.", "badge": "latency_performance_canon", "layers": [ { "title": "Latency & Performance Canon", "desc": "time traceability across modules, stages and end-to-end lifecycle.", "chips": [ "latency", "hot path", "cold path", "fallback" ] } ] }, { "id": "phase-06", "step": "Phase 06", "name": "Noise Reduction Canon", "summary": "signal preservation, redundancy elimination and unnecessary hop reduction.", "badge": "noise_reduction_canon", "layers": [ { "title": "Noise Reduction Canon", "desc": "remove architectural waste and keep deterministic path lean.", "chips": [ "signal", "redundancy elimination", "less path" ] } ] }, { "id": "phase-07", "step": "Phase 07", "name": "Observability & Audit Canon", "summary": "audit-linked visibility, evidence continuity and operational observability.", "badge": "observability_audit_canon", "layers": [ { "title": "Observability & Audit Canon", "desc": "traceability for runtime, memory and protected execution.", "chips": [ "observability", "audit", "evidence continuity" ] } ] }, { "id": "phase-08", "step": "Phase 08", "name": "Security Canon", "summary": "security governance, trust model, access boundaries, memory protection and monitoring.", "badge": "security_canon", "layers": [ { "title": "Security Canon", "desc": "security governance with structured implementation artifacts.", "chips": [ "zero trust", "access control", "memory protection", "monitoring" ] } ] }, { "id": "phase-09", "step": "Phase 09", "name": "Operational Flows Canon", "summary": "execution sequence, operating flow mapping and operational order integrity.", "badge": "operational_flows_canon", "layers": [ { "title": "Operational Flows Canon", "desc": "runtime sequence and flow order without redefining sovereign authorities.", "chips": [ "operational flow", "sequence", "order integrity" ] } ] }, { "id": "phase-10", "step": "Phase 10", "name": "Monitoring & Real-time Observability", "summary": "real-time host, container and service monitoring with SSE transport to the Operator Panel.", "badge": "monitoring_observability", "layers": [ { "title": "Monitoring & Real-time Observability", "desc": "CPU, memory, disk, network, container health, security services and SSE bridge canon.", "chips": [ "cpu", "memory", "containers", "network", "security", "SSE" ] } ] } ], "categories": [ { "id": "overview_scope", "title": "Overview & Scope", "sub": "master registration, project scope, manifest and continuity checkpoint.", "badge": "phase 01", "docs": [ { "id": "master_architecture_index", "title": "Master Architecture Index", "path": "../panel/data/master_architecture_index.md", "phase": "phase-01", "layer": "overview_scope", "role": "Supreme canonical root and registration authority.", "fits": "Defines registration, precedence, authority ownership and completeness rules.", "depends_on": [ "panel_manifest", "project_scope" ], "used_by": [], "architecture_view": "Supreme human-readable root for all Devon canon.", "label": "Master Architecture Index", "type": "text" }, { "id": "panel_manifest", "title": "Panel Manifest", "path": "../panel/data/panel_manifest.json", "phase": "phase-01", "layer": "overview_scope", "role": "Entry manifest and machine-readable panel entry point.", "fits": "Belongs to project overview and registration surface.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Entry manifest for the panel and documentation surface.", "label": "Panel Manifest", "type": "json" }, { "id": "project_scope", "title": "Project Scope Canonical", "path": "../panel/data/project_scope_canonical.json", "phase": "phase-01", "layer": "overview_scope", "role": "Machine-readable project scope authority.", "fits": "Defines project framing and scope surface.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Scope anchor for the project overview.", "label": "Project Scope Canonical", "type": "json" }, { "id": "devon_continuity", "title": "Devon Continuity", "path": "../panel/data/devon_continuity.md", "phase": "phase-01", "layer": "overview_scope", "role": "Canonical continuity memory and operational TODO document.", "fits": "Supports cross-chat continuity, governance, and handoff.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Canonical continuity layer for stable memory and mutable execution flow.", "label": "Devon Continuity", "type": "text" }, { "id": "deployment_order", "title": "Deployment Order Canonical", "path": "../panel/data/deployment_order_canonical.json", "phase": "phase-01", "layer": "overview_scope", "role": "Machine-readable deployment order authority.", "fits": "Defines canonical installation and configuration order.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Deployment order reference.", "label": "Deployment Order Canonical", "type": "json" }, { "id": "sandbox_environment", "title": "Sandbox Environment Canonical", "path": "../panel/data/sandbox_environment_canonical.json", "phase": "phase-01", "layer": "overview_scope", "role": "Machine-readable sandbox environment authority.", "fits": "Defines sandbox execution boundaries and environment expectations.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Sandbox boundary reference.", "label": "Sandbox Environment Canonical", "type": "json" }, { "id": "server_registry", "title": "Server Registry Canonical", "path": "../panel/data/server_registry_canonical.json", "phase": "phase-01", "layer": "overview_scope", "role": "Machine-readable server registry authority.", "fits": "Defines canonical server identities and registry surface.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Server registry reference.", "label": "Server Registry Canonical", "type": "json" }, { "id": "project_progress_canonical", "title": "Project Progress Canonical", "path": "../panel/data/project_progress_canonical.json", "phase": "phase-01", "layer": "overview_scope", "role": "Sovereign canonical model for global project progress calculation.", "fits": "Defines the only valid calculation mode and required fields for global progress.", "depends_on": [ "master_architecture_index" ], "used_by": [ "project_progress_model" ], "architecture_view": "Global progress canonical authority.", "label": "Project Progress Canonical", "type": "json" }, { "id": "project_progress_model", "title": "Project Progress Model", "path": "../panel/data/project_progress_model.json", "phase": "phase-01", "layer": "overview_scope", "role": "Sovereign stage weighting model for global project progress.", "fits": "Defines explicit weights per stage for the global progress donut.", "depends_on": [ "project_progress_canonical", "master_architecture_index" ], "used_by": [], "architecture_view": "Stage weight authority for global progress.", "label": "Project Progress Model", "type": "json" } ], "phase_id": "phase-01" }, { "id": "architecture_engineering_core", "title": "Architecture & Engineering Canon", "sub": "authority and satellite documents for architecture, governance, contracts, naming, deployment and contextual boundaries.", "badge": "phase 02", "docs": [ { "id": "cas", "title": "CAS · Cognitive Architecture Spec", "path": "../panel/data/cas.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary authority for cognitive architecture placement.", "fits": "Owns architecture layers and separation between probabilistic and deterministic components.", "depends_on": [ "master_architecture_index" ], "used_by": [ "cfc", "ccc", "lpc", "sec", "ofc" ], "architecture_view": "Sovereign architecture meaning.", "label": "CAS · Cognitive Architecture Spec", "type": "text" }, { "id": "cgs", "title": "CGS · Canonical Governance Spec", "path": "../panel/data/cgs.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary governance authority.", "fits": "Owns governance structure and canonical responsibility boundaries.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Governance backbone of the structural canon.", "label": "CGS · Canonical Governance Spec", "type": "text" }, { "id": "acs", "title": "ACS · Artifact Canon Structure", "path": "../panel/data/acs.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary artifact canon authority.", "fits": "Defines artifact structure and canonical placement logic.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Artifact structure ownership.", "label": "ACS · Artifact Canon Structure", "type": "text" }, { "id": "css", "title": "CSS · Contracts & Schemas Spec", "path": "../panel/data/css.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary contracts and schemas authority.", "fits": "Owns contracts, schema legitimacy and structured interfaces.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Schema and contract sovereignty.", "label": "CSS · Contracts & Schemas Spec", "type": "text" }, { "id": "ncs", "title": "NCS · Naming Canon Spec", "path": "../panel/data/ncs.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary naming authority.", "fits": "Owns naming legitimacy across canon artifacts.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Naming governance surface.", "label": "NCS · Naming Canon Spec", "type": "text" }, { "id": "sts", "title": "STS · State Transition Spec", "path": "../panel/data/sts.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary state legitimacy authority.", "fits": "Owns state legitimacy and transition boundary rules.", "depends_on": [ "master_architecture_index" ], "used_by": [ "cfc", "ofc" ], "architecture_view": "State governance authority.", "label": "STS · State Transition Spec", "type": "text" }, { "id": "brps", "title": "BRPS · Build Release Promotion Spec", "path": "../panel/data/brps.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary release and promotion authority.", "fits": "Owns build, release and promotion rules, including packaging audit, SBOM, sourcemap blocking, sensitive artifact protection and environment-aware promotion safeguards.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Promotion governance surface with release packaging safeguards.", "label": "BRPS · Build Release Promotion Spec", "type": "text" }, { "id": "cdms", "title": "CDMS · Canonical Deployment Model Spec", "path": "../panel/data/cdms.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary deployment structure authority.", "fits": "Owns deployment structure and placement boundaries.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Deployment structure authority.", "label": "CDMS · Canonical Deployment Model Spec", "type": "text" }, { "id": "ris", "title": "RIS · Role Interaction Spec", "path": "../panel/data/ris.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Satellite contextual document.", "fits": "Provides role interaction context without redefining sovereign authority.", "depends_on": [ "cas", "cfc" ], "used_by": [], "architecture_view": "Contextual relation layer.", "label": "RIS · Role Interaction Spec", "type": "text" }, { "id": "ofms", "title": "OFMS · Operational Flow Mapping Spec", "path": "../panel/data/ofms.md", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Satellite contextual document.", "fits": "Provides contextual flow mapping without redefining canonical flow.", "depends_on": [ "cfc", "ofc" ], "used_by": [], "architecture_view": "Contextual flow map.", "label": "OFMS · Operational Flow Mapping Spec", "type": "text" }, { "id": "card_contract_minimums", "title": "Card Contract Minimums", "path": "../panel/data/card_contract_minimums.json", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Structured contract support artifact.", "fits": "Defines minimum card contract fields for panel and documentation surfaces.", "depends_on": [ "css" ], "used_by": [], "architecture_view": "Contract minimum support layer.", "label": "Card Contract Minimums", "type": "json" }, { "id": "panel_data_contract", "title": "Panel Data Contract", "path": "../panel/data/panel_data_contract.json", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Structured panel data contract authority.", "fits": "Defines machine-readable panel data contract boundaries.", "depends_on": [ "css" ], "used_by": [], "architecture_view": "Panel data contract support layer.", "label": "Panel Data Contract", "type": "json" }, { "id": "panel_component_contract", "title": "Panel Component Contract", "path": "../panel/data/panel_component_contract.json", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Structured panel component contract authority.", "fits": "Defines machine-readable component contract boundaries.", "depends_on": [ "css" ], "used_by": [], "architecture_view": "Panel component contract support layer.", "label": "Panel Component Contract", "type": "json" }, { "id": "panel_sync_contract", "title": "Panel Sync Contract", "path": "../panel/data/panel_sync_contract.json", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Structured panel sync contract authority.", "fits": "Defines machine-readable sync contract boundaries.", "depends_on": [ "css" ], "used_by": [], "architecture_view": "Panel sync contract support layer.", "label": "Panel Sync Contract", "type": "json" }, { "id": "panel_canonical_tree", "title": "Panel Canonical Tree", "path": "../panel/data/panel_canonical_tree.json", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary panel canonical tree authority.", "fits": "Defines structural panel tree and canonical UI grouping.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Panel tree authority.", "label": "Panel Canonical Tree", "type": "json" }, { "id": "panel_navigation_spec", "title": "Panel Navigation Spec", "path": "../panel/data/panel_navigation_spec.json", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary panel navigation authority.", "fits": "Defines canonical panel navigation structure.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Panel navigation authority.", "label": "Panel Navigation Spec", "type": "json" }, { "id": "panel_ui_blueprint", "title": "Panel UI Blueprint", "path": "../panel/data/panel_ui_blueprint.json", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary panel UI blueprint authority.", "fits": "Defines canonical panel UI blueprint expectations.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Panel UI blueprint authority.", "label": "Panel UI Blueprint", "type": "json" }, { "id": "canonical_matrix_v1", "title": "Canonical Matrix v1", "path": "../panel/data/canonical_matrix_v1.json", "phase": "phase-02", "layer": "architecture_engineering_core", "role": "Primary canonical matrix authority.", "fits": "Defines machine-readable canonical matrix structure.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Canonical matrix authority.", "label": "Canonical Matrix v1", "type": "json" } ], "phase_id": "phase-02" }, { "id": "cognitive_flow", "title": "Cognitive Flow Canon", "sub": "deterministic orchestration, validation order, execution gating and flow control.", "badge": "phase 03", "docs": [ { "id": "cfc", "title": "CFC · Cognitive Flow Canon", "path": "../panel/data/cfc.md", "phase": "phase-03", "layer": "cognitive_flow", "role": "Primary authority for deterministic orchestration.", "fits": "Owns governed flow, validation order and execution permission.", "depends_on": [ "cas", "sts" ], "used_by": [ "ofc", "lpc", "ris" ], "architecture_view": "Sovereign flow meaning.", "label": "CFC · Cognitive Flow Canon", "type": "text" }, { "id": "ccc", "title": "CCC · Cognitive Component Context", "path": "../panel/data/ccc.md", "phase": "phase-03", "layer": "cognitive_flow", "role": "Contextual component reference.", "fits": "Describes cognitive component relationships without redefining sovereign flow authority.", "depends_on": [ "cfc", "cas" ], "used_by": [], "architecture_view": "Contextual support layer for Phase 03 cognitive flow.", "label": "CCC · Cognitive Component Context", "type": "text" } ], "phase_id": "phase-03" }, { "id": "containerization", "title": "Containerization Canon", "sub": "deployment topology, service isolation and runtime/container boundaries under sovereign Phase 04 authority.", "badge": "phase 04", "docs": [ { "id": "cdms", "title": "CDMS · Canonical Deployment Model Spec", "path": "../panel/data/cdms.md", "phase": "phase-04", "layer": "containerization", "role": "Primary deployment structure and containerization authority.", "fits": "Owns container topology, isolation boundaries and deployment placement for Phase 04.", "depends_on": [ "cas", "cfc", "server_registry" ], "used_by": [], "architecture_view": "Sovereign Phase 04 containerization authority.", "label": "CDMS · Canonical Deployment Model Spec", "type": "text" } ], "phase_id": "phase-04" }, { "id": "latency_performance", "title": "Latency & Performance Canon", "sub": "latency model, hot path, cold path and bounded performance design.", "badge": "phase 05", "docs": [ { "id": "lpc", "title": "LPC · Latency & Performance Canon", "path": "../panel/data/lpc.md", "phase": "phase-05", "layer": "latency_performance", "role": "Primary latency budget authority.", "fits": "Owns latency model, fallback rules and performance law.", "depends_on": [ "cfc" ], "used_by": [], "architecture_view": "Performance governance authority.", "label": "LPC · Latency & Performance Canon", "type": "text" } ], "phase_id": "phase-05" }, { "id": "noise_reduction", "title": "Noise Reduction Canon", "sub": "signal preservation, redundancy elimination and hop reduction.", "badge": "phase 06", "docs": [ { "id": "nrc", "title": "NRC · Noise Reduction Canon", "path": "../panel/data/nrc.md", "phase": "phase-06", "layer": "noise_reduction", "role": "Primary noise reduction authority.", "fits": "Owns anti-redundancy and anti-waste architectural guidance.", "depends_on": [ "lpc", "cfc" ], "used_by": [], "architecture_view": "Path simplification authority.", "label": "NRC · Noise Reduction Canon", "type": "text" } ], "phase_id": "phase-06" }, { "id": "observability_audit", "title": "Observability & Audit Canon", "sub": "documentation-facing audit model, evidence traceability and observability control, including distribution/package failure visibility, with runtime audit delegated to the Operator Panel.", "badge": "phase 07", "docs": [ { "id": "oac", "title": "OAC · Observability & Audit Canon", "path": "../panel/data/oac.md", "phase": "phase-07", "layer": "observability_audit", "role": "Primary observability and audit authority for the documentation side.", "fits": "Owns evidence traceability, audit-linked visibility, distribution/package failure visibility and the canonical audit model expected by runtime operations.", "depends_on": [ "cfc", "sec" ], "used_by": [], "architecture_view": "Documentation-side audit canon and observability authority, including distribution failure visibility.", "label": "OAC · Observability & Audit Canon", "type": "text" }, { "id": "panel_runtime_bridge", "title": "Panel Runtime Bridge", "path": "../panel/data/panel_runtime_bridge.json", "phase": "phase-04", "layer": "observability_audit", "role": "Runtime bridge authority.", "fits": "Connects canonical runtime expectations to observable runtime support artifacts.", "depends_on": [ "panel_data_contract", "panel_sync_contract" ], "used_by": [], "architecture_view": "Runtime bridge support layer.", "label": "Panel Runtime Bridge", "type": "json" }, { "id": "host_runtime_support", "title": "Host Runtime Support", "path": "../panel/data/host_runtime.json", "phase": "phase-04", "layer": "observability_audit", "role": "Runtime support artifact.", "fits": "Observable host runtime support record.", "depends_on": [ "panel_runtime_bridge" ], "used_by": [], "architecture_view": "Host runtime support evidence.", "label": "Host Runtime Support", "type": "json" }, { "id": "docker_runtime_support", "title": "Docker Runtime Support", "path": "../panel/data/docker_runtime.json", "phase": "phase-04", "layer": "observability_audit", "role": "Runtime support artifact.", "fits": "Observable docker runtime support record.", "depends_on": [ "panel_runtime_bridge" ], "used_by": [], "architecture_view": "Docker runtime support evidence.", "label": "Docker Runtime Support", "type": "json" }, { "id": "runtime_status_support", "title": "Runtime Status Support", "path": "../panel/data/runtime_status.json", "phase": "phase-04", "layer": "observability_audit", "role": "Runtime support artifact.", "fits": "Observable pipeline/runtime status support record.", "depends_on": [ "panel_runtime_bridge" ], "used_by": [], "architecture_view": "Runtime status support evidence.", "label": "Runtime Status Support", "type": "json" }, { "id": "runtime_row_semantics", "title": "Runtime Row Semantics Canonical", "path": "../panel/data/runtime_row_semantics_canonical.json", "phase": "phase-07", "layer": "observability_audit", "role": "Canonical semantic typing contract for every runtime row published by Devon.", "fits": "Defines row_kind, semantic_scope and completion eligibility rules for runtime rows.", "depends_on": [ "oac", "panel_runtime_bridge" ], "used_by": [], "architecture_view": "Runtime row semantic contract authority.", "label": "Runtime Row Semantics Canonical", "type": "json" } ], "phase_id": "phase-07" }, { "id": "security_governance", "title": "Security Canon", "sub": "security governance authority plus structured implementation artifacts, including environment-specific memory/data exposure policy and operator/runtime/debug separation.", "badge": "phase 08", "docs": [ { "id": "sec", "title": "SEC · Security Canon", "path": "../panel/data/sec.md", "phase": "phase-08", "layer": "security_governance", "role": "Primary security governance authority.", "fits": "Owns trust model, access control, memory protection, environment-specific memory/data exposure policy, operator/runtime/debug separation and security monitoring expectations.", "depends_on": [ "master_architecture_index" ], "used_by": [ "host_security", "app_security", "module_security", "runtime_security", "delivery_security", "approval_policy", "memory_isolation", "security_monitoring" ], "architecture_view": "Sovereign security meaning with environment exposure boundaries.", "label": "SEC · Security Canon", "type": "text" }, { "id": "host_security", "title": "Host Security Canonical", "path": "../panel/data/host_security_canonical.json", "phase": "phase-08", "layer": "security_governance", "role": "Structured host security implementation.", "fits": "Machine-readable host security canon.", "depends_on": [ "sec" ], "used_by": [], "architecture_view": "Host security implementation layer.", "label": "Host Security Canonical", "type": "json" }, { "id": "app_security", "title": "App Security Canonical", "path": "../panel/data/app_security_canonical.json", "phase": "phase-08", "layer": "security_governance", "role": "Structured app security implementation.", "fits": "Machine-readable application security canon.", "depends_on": [ "sec" ], "used_by": [], "architecture_view": "Application security implementation layer.", "label": "App Security Canonical", "type": "json" }, { "id": "module_security", "title": "Module Security Canonical", "path": "../panel/data/module_security_canonical.json", "phase": "phase-08", "layer": "security_governance", "role": "Structured module security implementation.", "fits": "Machine-readable module security canon.", "depends_on": [ "sec" ], "used_by": [], "architecture_view": "Module security implementation layer.", "label": "Module Security Canonical", "type": "json" }, { "id": "runtime_security", "title": "Runtime Security Canonical", "path": "../panel/data/runtime_security_canonical.json", "phase": "phase-08", "layer": "security_governance", "role": "Structured runtime security implementation.", "fits": "Machine-readable runtime security canon.", "depends_on": [ "sec" ], "used_by": [], "architecture_view": "Runtime security implementation layer.", "label": "Runtime Security Canonical", "type": "json" }, { "id": "delivery_security", "title": "Delivery Security Canonical", "path": "../panel/data/delivery_security_canonical.json", "phase": "phase-08", "layer": "security_governance", "role": "Structured delivery security implementation.", "fits": "Machine-readable delivery security canon.", "depends_on": [ "sec" ], "used_by": [], "architecture_view": "Delivery security implementation layer.", "label": "Delivery Security Canonical", "type": "json" }, { "id": "approval_policy", "title": "Approval Canonization Policy", "path": "../panel/data/approval_canonization_policy.json", "phase": "phase-08", "layer": "security_governance", "role": "Structured approval and canonization policy.", "fits": "Machine-readable approval guardrails.", "depends_on": [ "sec" ], "used_by": [], "architecture_view": "Approval policy implementation layer.", "label": "Approval Canonization Policy", "type": "json" }, { "id": "memory_isolation", "title": "Memory Isolation Canonical", "path": "../panel/data/memory_isolation_canonical.json", "phase": "phase-08", "layer": "security_governance", "role": "Structured memory isolation canon.", "fits": "Machine-readable memory partition and isolation rules.", "depends_on": [ "sec" ], "used_by": [], "architecture_view": "Memory isolation implementation layer.", "label": "Memory Isolation Canonical", "type": "json" }, { "id": "security_monitoring", "title": "Security Monitoring Canonical", "path": "../panel/data/security_monitoring_canonical.json", "phase": "phase-08", "layer": "security_governance", "role": "Structured security monitoring canon.", "fits": "Machine-readable security monitoring rules.", "depends_on": [ "sec" ], "used_by": [], "architecture_view": "Security monitoring implementation layer.", "label": "Security Monitoring Canonical", "type": "json" } ], "phase_id": "phase-08" }, { "id": "operational_flows", "title": "Operational Flows Canon", "sub": "documentation-facing operational sequence, runtime flow order and end-to-end action routing with real execution audit delegated to the Operator Panel.", "badge": "phase 09", "docs": [ { "id": "ofc", "title": "OFC · Operational Flows Canon", "path": "../panel/data/ofc.md", "phase": "phase-09", "layer": "operational_flows", "role": "Primary operational flow authority for the documentation side.", "fits": "Owns canonical operational sequence and ordered runtime flow expectations, while real execution audit remains operational.", "depends_on": [ "cfc", "sts" ], "used_by": [], "architecture_view": "Documentation-side operational flow authority.", "label": "OFC · Operational Flows Canon", "type": "text" } ], "phase_id": "phase-09" }, { "id": "delivery_layer", "title": "Delivery Layer", "sub": "build progression, release logic, pipeline mapping and operational content indexing.", "badge": "phase 09 / phase 02", "docs": [ { "id": "subcategory_pipelines", "title": "Subcategory Pipelines", "path": "../panel/data/subcategory_pipelines.json", "phase": "phase-09", "layer": "delivery_layer", "role": "Structured delivery pipeline authority.", "fits": "Defines subcategory pipeline sequence for operational surfaces.", "depends_on": [ "ofc" ], "used_by": [], "architecture_view": "Delivery pipeline support layer.", "label": "Subcategory Pipelines", "type": "json" }, { "id": "panel_content_index", "title": "Panel Content Index", "path": "../panel/data/panel_content_index.json", "phase": "phase-09", "layer": "delivery_layer", "role": "Structured panel content index authority.", "fits": "Defines stage-to-content mapping for the Operator Panel.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Content-index support layer.", "label": "Panel Content Index", "type": "json" } ], "phase_id": "phase-09" }, { "id": "memory_learning_reasoning", "title": "Memory, Learning & Reasoning Governance", "sub": "trust-bound memory, learning and reasoning expansion activated from Phase 08 and maintained as post-core canonical expansion.", "badge": "phase 08 / post-core", "docs": [ { "id": "memory_arch", "title": "Memory Canonical Architecture", "path": "../panel/data/memory_canonical_architecture.json", "phase": "phase-08", "layer": "memory_learning_reasoning", "role": "Structured memory architecture canon.", "fits": "Machine-readable memory architecture baseline.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Memory architecture support layer.", "label": "Memory Canonical Architecture", "type": "json" }, { "id": "memory_lifecycle", "title": "Memory Lifecycle Canonical", "path": "../panel/data/memory_lifecycle_canonical.json", "phase": "phase-08", "layer": "memory_learning_reasoning", "role": "Structured memory lifecycle canon.", "fits": "Machine-readable consolidation and lifecycle rules.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Memory lifecycle support layer.", "label": "Memory Lifecycle Canonical", "type": "json" }, { "id": "learning_gov", "title": "Learning Governance Canonical", "path": "../panel/data/learning_governance_canonical.json", "phase": "phase-08", "layer": "memory_learning_reasoning", "role": "Structured learning governance canon.", "fits": "Machine-readable learning guardrails.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Learning governance support layer.", "label": "Learning Governance Canonical", "type": "json" }, { "id": "planning_reasoning", "title": "Planning Reasoning Canonical", "path": "../panel/data/planning_reasoning_canonical.json", "phase": "phase-08", "layer": "memory_learning_reasoning", "role": "Structured planning and reasoning canon.", "fits": "Machine-readable planning and reasoning boundaries.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Planning governance support layer.", "label": "Planning Reasoning Canonical", "type": "json" }, { "id": "tool_execution", "title": "Tool Execution Canonical", "path": "../panel/data/tool_execution_canonical.json", "phase": "phase-08", "layer": "memory_learning_reasoning", "role": "Structured tool execution canon.", "fits": "Machine-readable permission and execution boundaries.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Tool execution governance support layer.", "label": "Tool Execution Canonical", "type": "json" }, { "id": "knowledge_ingestion", "title": "Knowledge Ingestion Canonical", "path": "../panel/data/knowledge_ingestion_canonical.json", "phase": "phase-08", "layer": "memory_learning_reasoning", "role": "Structured knowledge ingestion canon.", "fits": "Machine-readable ingestion and indexing boundaries.", "depends_on": [ "master_architecture_index" ], "used_by": [], "architecture_view": "Knowledge ingestion support layer.", "label": "Knowledge Ingestion Canonical", "type": "json" } ], "phase_id": "phase-08" }, { "id": "monitoring_observability", "title": "Monitoring & Real-time Observability", "sub": "real-time host, container and service monitoring canon with SSE bridge authority.", "badge": "phase 10", "docs": [ { "id": "monitoring_canonical", "title": "Monitoring Canonical", "path": "../panel/data/monitoring_canonical.json", "phase": "phase-10", "layer": "monitoring_observability", "role": "Primary real-time monitoring authority.", "fits": "Defines all monitoring targets, metrics, alert thresholds and refresh intervals.", "depends_on": [ "master_architecture_index" ], "used_by": [ "sse_bridge_canonical" ], "architecture_view": "Sovereign monitoring authority for host, containers and services.", "label": "Monitoring Canonical", "type": "json" }, { "id": "sse_bridge_canonical", "title": "SSE Bridge Canonical", "path": "../panel/data/sse_bridge_canonical.json", "phase": "phase-10", "layer": "monitoring_observability", "role": "SSE transport authority replacing push_snapshot model.", "fits": "Defines the permanent SSE channel from Devon to Waresite Operator Panel.", "depends_on": [ "monitoring_canonical" ], "used_by": [], "architecture_view": "SSE bridge transport authority.", "label": "SSE Bridge Canonical", "type": "json" } ], "phase_id": "phase-10" } ] }