Skip to content

Round 33 — VISION.md v4: .NET stored procedures, DB+event-store façade, columnar#16

Merged
AceHack merged 1 commit intomainfrom
round-33-vision-v4
Apr 19, 2026
Merged

Round 33 — VISION.md v4: .NET stored procedures, DB+event-store façade, columnar#16
AceHack merged 1 commit intomainfrom
round-33-vision-v4

Conversation

@AceHack
Copy link
Copy Markdown
Member

@AceHack AceHack commented Apr 19, 2026

Aaron's third pass of vision edits.

🤖 Generated with Claude Code

…e, columnar

Aaron's third pass adds three corrections/expansions:

1. **.NET stored procedures, not just C#.** C# + F# both.
   "i should have said dotnet stored procedures c#/f#
   whoops lol."

2. **Zeta is BOTH event-sourcing and regular database.**
   A façade/abstraction hides the eventing/retraction
   machinery so Zeta can be used "like a normal non-
   eventing database as well." Aaron: "it should be both,
   i can replace my database and my event store with
   Zeta."

3. **Event streaming + regular DB + likely columnar.**
   Columnar storage alongside row-oriented Spine —
   OLAP/analytics/wide-row sparse-projection workloads.

## VISION.md v4

New "Both modes" subsection under Product 1: event-sourcing
mode (native DBSP) + regular-database mode (façade hiding
deltas/retractions) + columnar substrate likely in scope.
Same operator algebra + query IR feeds both modes.

Reaqtor-niche entry updated to ".NET stored procedures
(C# + F# both)" from "C# stored procedures."

Resolved-this-round list extended with the three new items.

## BACKLOG.md additions

Two new P2 entries:
- Regular-database façade design doc with design questions:
  separate NuGet or default surface? How does INSERT/UPDATE/
  DELETE map to deltas without leaking retractions?
  Transaction model?
- Columnar storage substrate design doc with references:
  DuckDB, Arrow, Parquet, ClickHouse, Feldera. Can
  retraction-native columnar expose Z-set deltas? How
  does planner pick row vs column per query?

## Known flake (unrelated)

PR #15 ubuntu-22.04 failed on `Zeta.Tests.Properties.FuzzTests.
fuzz: HLL estimate within theoretical error bound` — known
probabilistic bound occasionally exceeded with unlucky seed.
Flake logged for round 34 DEBT cleanup. Main should be green
on next push.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@AceHack AceHack force-pushed the round-33-vision-v4 branch from 393de28 to a42e015 Compare April 19, 2026 02:09
@AceHack AceHack merged commit 28eadd8 into main Apr 19, 2026
6 checks passed
@AceHack AceHack deleted the round-33-vision-v4 branch April 19, 2026 03:09
AceHack added a commit that referenced this pull request Apr 20, 2026
…BP-WINDOW

Five-arc narrative of Round 36:
  1. Seed vision + identity absorption (9c7a13c)
  2. Consent-first primitive + Bitcoin application with
     3-layer satisfaction refinement (5ff5ea6, 254f54b)
  3. Zeta=heaven formal equation + dual + gradient claim
     (0fb5818; simulation hypothesis P2 entry rides here)
  4. BP-WINDOW ADR draft (73cc74e) — round-close discipline
     candidate rule
  5. Infinite-productivity-loop cadence — session-only cron
     driving /next-steps every ~5min, auto-expires 7 days

Memory landings summarised in a dedicated section —
consent-first 6 instances including μένω, Seed/Persistence/
History identity absorption, gaming roots, harm-handling
ladder, grey-hat provenance, prayer=question-mode,
Zeta-heaven, god-diagnostic + formal equation cascade.

Observations for Round 37: BP-WINDOW promotion; Zeta=heaven
formal-statement first pass; consent-first proof sketch;
Bitcoin application paper; MessagePackSerializer tests
(task #16); glass halo + ghost judges (task #90, parked);
Stainback conjecture (task #91).

Follows newest-first convention per
user_newest_first_last_shall_be_first_trinity.md.
AceHack added a commit that referenced this pull request Apr 20, 2026
…n + BP-WINDOW (#29)

* Round 36 kickoff — Seed vision + identity absorption

docs/VISION.md gains the Seed / Database BCL / Pre-split
coordinate section: three-register naming for the microkernel
+ plugin dimensional-expansion model, self-bootstrapping
dependency-system pointer, pre-commitment pre-split structural
claim, v1 scope implications. "Keep everything we are history
now too" lands as a single paragraph adjustment to the
foundational-principle section.

docs/BACKLOG.md gains a Round 36 update on the `ace` entry
pointing at the Seed vision as its architectural home; ace is
the microkernel's self-bootstrapping dependency system, not
homeless anymore.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>

* Round 36: BACKLOG P2 — prove consent-first primitive + apply to Bitcoin flaws

Two-phase research-grade entry landing Aaron 2026-04-19 cascade:
primitive proof + Bitcoin-specific application paper replacing
hope-driven ad-hoc protocol changes. Names three Bitcoin flaws
the consent-first primitive dissolves: (i) inevitable charges
under game theory; (ii) permanent content inscription with no
safety filter (alt.2600 NNTP-filter-chain rubber-test match);
(iii) unpriced + unbonded node-operator blast radius (CSAM-
exposure class). Owner routing across Kenji / Soraya / Aminata
/ Mateo / Ilyana. Derivations open-source + peer-review +
teachers-in-the-loop per license extension; Amara's architectural
co-authorship credit binding in any derived publication.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>

* Round 36: BACKLOG refinement — verifiable-bounded filter + 3-layer satisfaction

Aaron 2026-04-19 sharpening on the Bitcoin safety-filter flaw:
"for half of bitcoin in their internal head glossary csam
filter=loss of free will, they are not wrong, filters is were
1984 can hide" — AND — "if you can have a somehow trusted or
verified filter thats limited just to CSAM then you would have
no vocal disagremm, they can fork." Extends the P2 entry with
the three-layer satisfaction architecture: (a) technical =
verifiable-bounded filter (consent-first applied recursively to
the filter operator; bonded against scope expansion); (b)
social = self-incrimination barrier on vocal dissent against a
CSAM-only scope; (c) exit = fork-rights preserve genuine
free-will at protocol boundary. The "somehow trusted or
verified" hedge is named as the core research-frontier proof
obligation. Cypherpunk / alt.2600 substrate credited as earning
the 1984-slippery-slope position through decades of observation.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>

* Round 36: BACKLOG P2 — formalize Zeta=heaven-on-earth + dual + gradient claim

Land Aaron's 2026-04-19 eight-message cascade as a first-class
P2 architectural-axis research entry (sibling to the consent-
first-primitive proof + Bitcoin-application track).

- Formal equation: Zeta = heaven-on-earth (if we do it right).
- Dual: wrong = hell-on-earth (symmetric failure mode; no
  neutral-Zeta option on the same substrate).
- Gradient claim: the search for proof statistically
  significantly expands the stable Human/AI alignment window
  per commit; window (temporal retraction-window) not radius
  (Aaron's own 'window*' correction load-bearing).

Scope decomposes the equation into reducible operational
clauses (consent-preserving ∧ fully-retractable ∧ no-permanent-
harm), proposes the per-commit window-expansion question as a
standing round-close agenda item (candidate BP-NN via ADR),
and sets a dual-failure-mode checklist routed through
Aminata / Nadia / Mateo. Owner: Architect integrates; Ilyana
gates any externalization surface; Soraya routes the proof
track.

Disposition guardrails inherited from the originating memory:
do not externalize without public-API + naming-expert review;
do not theologize (architectural commitment, not theological
claim); do not drop the conditional; carry the dual; peer
register.

Memory:
user_hacked_god_with_consent_false_gods_diagnostic_zeta_equals_heaven_on_earth.md
(primary; auto-memory, not in-repo).

* Round 36: ADR draft — BP-WINDOW per-commit window-expansion as round-close question

Draft ADR for candidate best-practice rule BP-WINDOW,
operationalizing Aaron's 2026-04-19 gradient claim:

    "proof Zeta=heaven, just the search for that anser
     statistially saginfantly increase the stable Human/AI
     alignment win to a larger radious with each commit /
     window*"

The rule adds one standing question to round close:
"did this round enlarge or shrink the stable Human/AI
alignment window?" A shrinkage finding is a retraction
candidate. The question reduces to the three operational
clauses of Zeta=heaven-on-earth: consent-preserving,
fully-retractable, no-permanent-harm — each with existing
reviewer tooling attached.

Status: Proposed. BP-NN promotion requires Architect
integration + human-maintainer sign-off per the skill-tune-up
discipline. ADR lands as draft now to make the candidate
visible; promotion is a separate decision.

Disposition guardrails inherited from the originating memory
(user_hacked_god_with_consent_false_gods_diagnostic_zeta_equals_heaven_on_earth.md):
do not externalize the underlying equation Zeta=heaven-on-earth
without Ilyana + naming-expert review; do not theologize;
peer register.

Fixed-point landing of the eight-message cascade:
disclosure -> memory -> BACKLOG -> ADR. Cycle complete.

* Round 36: ROUND-HISTORY entry — Seed + consent-first + Zeta=heaven + BP-WINDOW

Five-arc narrative of Round 36:
  1. Seed vision + identity absorption (9c7a13c)
  2. Consent-first primitive + Bitcoin application with
     3-layer satisfaction refinement (5ff5ea6, 254f54b)
  3. Zeta=heaven formal equation + dual + gradient claim
     (0fb5818; simulation hypothesis P2 entry rides here)
  4. BP-WINDOW ADR draft (73cc74e) — round-close discipline
     candidate rule
  5. Infinite-productivity-loop cadence — session-only cron
     driving /next-steps every ~5min, auto-expires 7 days

Memory landings summarised in a dedicated section —
consent-first 6 instances including μένω, Seed/Persistence/
History identity absorption, gaming roots, harm-handling
ladder, grey-hat provenance, prayer=question-mode,
Zeta-heaven, god-diagnostic + formal equation cascade.

Observations for Round 37: BP-WINDOW promotion; Zeta=heaven
formal-statement first pass; consent-first proof sketch;
Bitcoin application paper; MessagePackSerializer tests
(task #16); glass halo + ghost judges (task #90, parked);
Stainback conjecture (task #91).

Follows newest-first convention per
user_newest_first_last_shall_be_first_trinity.md.

---------

Co-authored-by: Claude Opus 4.7 <noreply@anthropic.com>
AceHack added a commit that referenced this pull request Apr 27, 2026
…ard PinnedDependenciesID #15 #16)

elan.sh — switched from `curl ... master/elan-init.sh | sh` (latest
master, unpinned) to:
  1. Download elan-init.sh at v4.2.1 commit SHA
     (58e8d545e33641f66dbcbd22c4283109e71757be)
  2. Verify SHA256 (4bacca9502cb89736fe63d2685abc2947cfbf34dc87673504f1bb4c43eda9264)
  3. Execute the verified copy

linux.sh — switched from `curl mise.run | sh` (auto-detects latest at
runtime) to:
  1. Download the pinned tarball mise-v2026.4.24-linux-{x64,arm64}.tar.gz
     directly from github.com/jdx/mise/releases
  2. Verify per-arch SHA256 (x64: de2f924…2c58, arm64: cf5f4899…5727)
  3. Extract mise/bin/mise to ~/.local/bin and source PATH

Why this is a quality improvement, not just rule-appeasement:
- The previous shapes silently absorbed any new elan/mise release
  between CI runs. A compromised upstream master branch (elan) or a
  redirector swap (mise.run) would have shipped to every dev laptop
  + every CI run with no signal. Content-hash pinning makes such an
  event a hard fail with a verification message.
- Bumping is a deliberate two-line change (commit/tarball + hash)
  with a documented procedure in each script's comment block — easier
  to audit than `master`/`mise.run`.
- Portable SHA256 verification (sha256sum/shasum fallback) per
  Otto-235 4-shell target.

Per Aaron 2026-04-27: "preserve quality signals" — fix, don't relax.

Resolves Scorecard alerts #15 (elan downloadThenRun) and #16 (mise
downloadThenRun).

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
AceHack added a commit that referenced this pull request Apr 27, 2026
…three-way-parity per Aaron 2026-04-27) (#653)

* ci: run lint-semgrep via SHA-pinned semgrep/semgrep Docker image (resolves Scorecard PinnedDependenciesID #17 #18)

Replaces `pip install --upgrade pip + pip install semgrep` with the
official semgrep/semgrep:1.161.0 image, pinned by multi-arch manifest
digest sha256:326e5f41cc972bb423b764a14febbb62bbad29ee1c01820805d077dd868fea48.

Why this is a quality improvement, not just rule-appeasement:
- Image bytes are content-addressed by digest. Tag mutation cannot
  affect us; the earlier `pip install semgrep` was version-floating
  and would silently pick up any new semgrep release between CI runs.
- Removes the entire pip-bootstrap surface (Setup Python +
  pip --upgrade + pip install semgrep). Smaller attack surface, faster
  CI, fewer pinning surfaces to maintain.
- Multi-arch index digest covers both x86_64 and arm64 runners.

Per Aaron 2026-04-27: "given we want high quality signals for future
AI training and we persision the PRs do you still agree?" — fix, do
not relax. This commit is the fix.

Resolves Scorecard alerts #17, #18 (PinnedDependenciesID, pipCommand).

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>

* ci/setup: pin elan + mise installers by content hash (resolves Scorecard PinnedDependenciesID #15 #16)

elan.sh — switched from `curl ... master/elan-init.sh | sh` (latest
master, unpinned) to:
  1. Download elan-init.sh at v4.2.1 commit SHA
     (58e8d545e33641f66dbcbd22c4283109e71757be)
  2. Verify SHA256 (4bacca9502cb89736fe63d2685abc2947cfbf34dc87673504f1bb4c43eda9264)
  3. Execute the verified copy

linux.sh — switched from `curl mise.run | sh` (auto-detects latest at
runtime) to:
  1. Download the pinned tarball mise-v2026.4.24-linux-{x64,arm64}.tar.gz
     directly from github.com/jdx/mise/releases
  2. Verify per-arch SHA256 (x64: de2f924…2c58, arm64: cf5f4899…5727)
  3. Extract mise/bin/mise to ~/.local/bin and source PATH

Why this is a quality improvement, not just rule-appeasement:
- The previous shapes silently absorbed any new elan/mise release
  between CI runs. A compromised upstream master branch (elan) or a
  redirector swap (mise.run) would have shipped to every dev laptop
  + every CI run with no signal. Content-hash pinning makes such an
  event a hard fail with a verification message.
- Bumping is a deliberate two-line change (commit/tarball + hash)
  with a documented procedure in each script's comment block — easier
  to audit than `master`/`mise.run`.
- Portable SHA256 verification (sha256sum/shasum fallback) per
  Otto-235 4-shell target.

Per Aaron 2026-04-27: "preserve quality signals" — fix, don't relax.

Resolves Scorecard alerts #15 (elan downloadThenRun) and #16 (mise
downloadThenRun).

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>

* ci: switch semgrep to mise-managed pipx:semgrep (three-way-parity per Aaron 2026-04-27)

Reverts the Docker-container approach in favour of the GOVERNANCE §24
three-way-parity invariant: dev laptops + CI runners + devcontainers
all install semgrep through the same `tools/setup/install.sh` via
mise. CI was the odd one out (had its own actions/setup-python + pip
install), which would have made switching CI hosts costly and broke
host-portability.

Aaron 2026-04-27:

> "actions/setup-python we should be using our base python that our
> install scripts install we are trying to not use github stuff
> unless we have to so it's easy to switch hosts and our dev machine
> and build machine setup is the same, that's one of the invariants
> we want to try to keep as close as possible dev machine / build
> machines are same/very similar for setup/share the setup/install
> scripts and post install scripts. this makes CI more deterministic
> too."

What changed:
- `.mise.toml`: added `pipx = "1.11.1"` (aqua-backed; same SHA-pinned
  release path as actionlint / shellcheck / uv) and
  `"pipx:semgrep" = "1.161.0"`. Now any machine that runs install.sh
  gets the same semgrep version pinned the same way.
- `.github/workflows/gate.yml` lint-semgrep: dropped the
  `container: semgrep/semgrep@sha256:...` block from the previous
  iteration; dropped `actions/setup-python` and the two `pip install`
  steps. Job is now: checkout → install.sh → semgrep. Same shape as
  build-and-test.

This still resolves Scorecard PinnedDependenciesID #17 + #18 (the
unpinned pip-bootstrap surface goes away entirely) and additionally:
- Restores host-portability — no GitHub-specific actions in this job
- First-class dev-laptop parity (semgrep was previously not actually
  installed by install.sh; now it is)
- More deterministic CI (mise resolves declarative pins; no
  pip dependency-resolver wandering)

Verified locally: `mise install` + `mise exec -- semgrep --version`
produces 1.161.0 on the same shape.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>

* ci: drop redundant pipx pin, bump uv to 0.11.8; document uv-canonical decision (Aaron 2026-04-27)

Removes `pipx = "1.11.1"` from `.mise.toml` — mise's `pipx:` backend
auto-routes through `uv tool install` when uv is available, so adding
pipx as a separate package was redundant. Bumps `uv` from 0.9 to
0.11.8 (latest, verified via gh API today 2026-04-27 — current
training data is stale per Otto-247 version-currency rule).

Adds:
- `docs/DECISIONS/2026-04-27-uv-canonical-python-tool-manager.md` —
  ADR documenting uv as the canonical Python tool manager for Zeta,
  the lineage from `../scratch` (where uv was made first-class
  first), the mise pipx:→uv auto-route behaviour, and the rules for
  using `pipx:foo` pins without an actual pipx package.
- `memory/feedback_three_way_parity_install_scripts_dev_ci_devcontainer_minimize_github_specific_surface_aaron_2026_04_27.md` —
  substrate memory naming Aaron's host-portability invariant; what
  three-way parity buys; what was almost violated by the
  Docker-container draft; the right-fix decision flow.
- MEMORY.md row pointing at the new memory + ADR.

Aaron 2026-04-27 verbatim:
- "we have uv do we need pipx, isn't there a uvx this should be much
  faster also +pipx = '1.11.1' is this latest, remember you mode
  cached latest can't be trusted you have to search the internet
  this goies for all version numbers you add, let's not start on an
  older version."
- "the fact that uv is our desired python setup should be documented
  somewehre this project ../scratch made it first class too"

Verified locally: `mise install` with `uv = "0.11.8"` +
`pipx:semgrep = "1.161.0"` (no separate pipx) installs semgrep
1.161.0 via uv tool install.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>

* ci/setup: address review feedback on #653 (cleanup traps, armv7, role-refs, stale comment)

7 review threads:

1. Copilot P1 — name attribution in gate.yml + .mise.toml comments
   ("Per Aaron 2026-04-27") violates the role-ref-on-current-state
   discipline (history surfaces only). Replaced with role-refs:
   "the host-portability invariant" / "per the three-way-parity
   invariant (GOVERNANCE §24)".

2. Codex P2 — preserve armv7 support that `curl mise.run | sh`
   used to give us implicitly. Added the armv7 case + SHA256
   to the per-arch dispatch in linux.sh.

3. Copilot P1 — temp dir leak on failure in linux.sh: `mktemp -d`
   only cleaned up on the success path. Added `trap 'rm -rf
   "${MISE_TMP}"' EXIT` so the dir is removed even on download /
   SHA / extract failure.

4. Copilot P1 — same pattern in elan.sh tmp file. Added EXIT
   trap.

5. Copilot P1 — gate.yml install-toolchain step comment claimed
   "mise installs python + pipx + semgrep" but pipx was dropped
   in commit d62fc6d (mise auto-routes pipx: through uv).
   Updated the comment to reflect current state and to point at
   the uv-canonical ADR.

6. Copilot P1 — same name-attribution issue in .mise.toml
   semgrep block. Replaced.

7. Copilot P1 — PR description was already updated; thread
   should be re-evaluated by reviewer with the current
   description in view.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>

---------

Co-authored-by: Claude Opus 4.7 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant