Skip to main content

Identity-bound causal command substrate from sealed caps. Implements lane_collision_policy + coffee_lane_policy (frozen vs fork-on-hop-off resume) for AI continuity governance.

Project description

tibet-cap-bus

Identity-bound causal command substrate from sealed caps.

Implements lane_collision_policy and coffee_lane_policy (frozen-continuity vs fork-on-hop-off resume semantics) for AI continuity governance.

lane_collision_policy decides what happens when actors meet. coffee_lane_policy decides what happens when they should not.

Pipeline

sender
  -> causal-time          (place: assign causal rank)
  -> mux                  (distribute: lane + policy)
  -> spaceshuttle         (inject: executor-bound memory slot)
  -> tibet-dgx            (align: cluster alignment)
  -> executor             (execute)
  -> receipt cap          (sealed audit record)

What this package provides

  • Clean data modelCap, LanePolicy, PhaseEvidence, UsageEvent, CapReceipt
  • Protocol adapters (adapters.py) — drop-in interface for tibet-mux, tibet-causal-time, tibet-store-mmu, tibet-dgx, tibet-phantom
  • In-memory default implementations — runnable out-of-the-box for local development
  • Branching continuationsreceipt / continue / fork (alpha/beta) / resync-needed / reject
  • Lane policieslane_collision_policy (5 values) + coffee_lane_policy (7 values)
  • Resume semanticsfreeze_resume and fork_on_hop_off as first-class runtime modes
  • Gateway-compatible event exporttibet-cap-bus.gateway-event.v1 contract
  • Validator + fixturevalidate-gateway-event CLI + reference JSON fixture
  • First-class .aint actor binding + JIS attestation fields

In-memory adapters are placeholders. Real implementations land via Protocol replacement (see ROADMAP.md for the 0.2.x release line).

Why this exists

The concept is bigger than messaging:

  • cmail moves continuity
  • cap carries a sealed instruction unit
  • cap-stream moves causally ordered action
  • mux distributes those actions across isolated lanes

This package is the first code sketch of that execution-oriented substrate.

Commands

Demo

tibet-cap-bus demo

Runs a small cap flow with:

  • one sender
  • lamport-style causal placement
  • mux-style lane distribution
  • executor-bound memory slot injection
  • optional cluster alignment marker
  • receipt cap emission

Emit a single cap

tibet-cap-bus emit \
  --actor codex.aint \
  --intent agent.tool.high \
  --authority sam:tool \
  --payload '{\"tool\": \"search\", \"query\": \"cap-stream\"}' \
  --continuation-mode fork

Trace view

tibet-cap-bus trace

Continuation chain

tibet-cap-bus chain
tibet-cap-bus chain --hops 4

Triage lanes

tibet-cap-bus triage

Governance export

tibet-cap-bus governance-export
tibet-cap-bus governance-export --source chain
tibet-cap-bus governance-export --source triage

CBOM export

tibet-cap-bus cbom-export
tibet-cap-bus cbom-export --source chain
tibet-cap-bus cbom-export --source triage

Combined export

tibet-cap-bus export-all
tibet-cap-bus export-all --source chain
tibet-cap-bus export-all --source triage

Gateway-compatible JSONL export

tibet-cap-bus gateway-export
tibet-cap-bus gateway-export --source chain
tibet-cap-bus gateway-export --json

Validate common event lane records

tibet-cap-bus validate-gateway-event
tibet-cap-bus validate-gateway-event --source chain
tibet-cap-bus validate-gateway-event --input fixtures/gateway-event.resume.example.json

This validates the shared event lane used by:

  • tibet-cap-bus
  • tibet-gateway
  • tibet-ai-sbom
  • future live emitters such as brain_api, service_api, or telecom_api

The current contract is tibet-cap-bus.gateway-event.v1.

Package structure

  • models.py
    • canonical records
  • adapters.py
    • phase protocols
  • runtime.py
    • in-memory default implementation
  • cli.py
    • operator surface

Current phases

  1. emit
  2. place
  3. distribute
  4. inject
  5. align
  6. execute

Each phase returns explicit evidence so a future CBOM / audit / usage-event layer can attach cleanly.

The current runtime also projects:

  • cap-dispatched
  • cap-executed

events as a first bridge toward:

  • AI-SBOM usage events
  • CBOM / continuity walkability
  • governance/audit conclusions

It can now also translate receipts back into follow-up caps for bounded chain execution, so the sketch behaves more like a real continuity substrate instead of a single-hop runner.

Fork mode now spawns multiple follow-up caps from one parent, making the chain runner branch rather than only continue linearly.

Each distributed cap now also carries a lane policy so branch children can be treated differently by a future real tibet-mux integration.

Lane policy also now carries an explicit lane_collision_policy:

  • graceful_yield
  • assert_root
  • override_all
  • queue
  • reject

Naast conflict-policy heeft de sketch nu ook een tweede primitive: coffee_lane_policy, voor avoidance en graceful degradation.

Waarden die nu in de sandbox voorkomen:

  • sip_anyway
  • polite_avoid
  • hard_avoid
  • rebuild
  • offline_fallback
  • freeze_resume
  • fork_on_hop_off

Daarmee kunnen trust-, outage- en time-diff signalen per event zichtbaar worden zonder meteen hard in runtimegedrag vast te lopen.

De sandbox vertaalt resume nu ook echt naar verschillend vervolggedrag:

  • freeze_resume -> één .resume.frozen follow-up
  • fork_on_hop_off -> .resume.catchup + .resume.live
  • rebuild -> .resume.rebuild
  • offline_fallback -> .resume.offline

resync-needed and reject now route into explicit triage lanes, so failure and recovery paths are modeled as first-class continuation flows instead of dead ends.

The sketch can now also export a governance-shaped document that mirrors the structure used by tibet-ai-sbom:

  • governance.questions
  • governance.trust_foundation
  • governance.actor_model_provider_links
  • governance.continuation_graph
  • governance.usage_events

And a small CBOM/SoM-shaped document with:

  • cbom.documents
  • canonical_surface
  • surface_status
  • authority
  • material_facts
  • continuity
  • som_events

export-all combines both dialects from the same run so governance and continuity/object views stay aligned.

The sketch can also emit a tibet-gateway-compatible JSONL shape so the sandbox can act as a direct fixture/data generator for tibet-ai-sbom ingest without adapter glue.

That same lane can now also be validated directly, so future emitters can test their records before wiring them into tibet-ai-sbom or tibet-audit.

That event shape now also carries lane-level operational semantics per record, including:

  • lane_class
  • lane_collision_policy
  • preemptible
  • lane_priority
  • _emitter

And the sandbox now ships a first fixture file:

  • fixtures/gateway-event.resume.example.json

The cap and usage-event models now carry:

  • actor_aint
  • actor_jis_pubkey
  • attestation_layer
  • attestation_ref

So the runtime can express not only execution and continuation, but also:

  • who the actor is in .aint terms
  • what trust lane the event claims
  • where later real JIS attestations can attach

Future replacement plan

place

Replace LamportCausalPlacer with real tibet-causal-time.

distribute

Replace IntentMuxDistributor with real tibet-mux.

inject

Replace MemorySlotInjector with real tibet-store-mmu / spaceshuttle hooks.

align

Replace NoopAligner with real tibet-dgx.

execute

Replace EchoExecutor with:

  • agent tools
  • service calls
  • model invocation
  • industrial control adapters

Short framing

This sketch is not the product. It is the attachment point for the product.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tibet_cap_bus-0.1.0.tar.gz (24.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tibet_cap_bus-0.1.0-py3-none-any.whl (20.3 kB view details)

Uploaded Python 3

File details

Details for the file tibet_cap_bus-0.1.0.tar.gz.

File metadata

  • Download URL: tibet_cap_bus-0.1.0.tar.gz
  • Upload date:
  • Size: 24.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_cap_bus-0.1.0.tar.gz
Algorithm Hash digest
SHA256 608b8b729110a0af05da4756ddc19b1549094dd31206747502f7205277da7c99
MD5 8c3ebc478e0ed22d4bc5818574146ebc
BLAKE2b-256 2ee8cb54e2cae2da1f5cee1feab55080d254d95d6690bef8aff600eb61284cf7

See more details on using hashes here.

File details

Details for the file tibet_cap_bus-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: tibet_cap_bus-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 20.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_cap_bus-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7d83c5b6f9f6bf1af0d7339304b3987811c2d890bcb454f03b5eac0af810f905
MD5 da469d654c39f204924fee6fb21301cc
BLAKE2b-256 36e14b5f503efded60d5a3a2c2a59c3c2413330945df6e2a4f0151e836b16a7c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page