The Robot Repo Bot is an autonomous infrastructure agent designed to enforce Rhodium Standard (RSR) compliance across distributed repositories. Unlike passive linters, the Robot actively "heals" the filesystem using SaltStack, ensured by a formally verified Ada/SPARK control plane.
The Robot operates on a Hexagonal Architecture, separating the Safety Logic from the Execution Engine.
@startuml
skinparam monochrome true
package "Control Plane (The Brain)" {
[Ada/SPARK Coordinator] as Ada
note right: Formally Verified\nState Safety
}
package "Execution Plane (The Muscle)" {
[Python Engine] as Python
[SaltStack Local] as Salt
}
database "Filesystem" as FS
User -> Ada : "Repair Ruthlessly"
Ada -> Ada : Check Safety Contract\n(Is_Safe?)
Ada -> Python : Dispatch Valid Command
Python -> Salt : Apply State
Salt -> FS : Enforce Permissions/Structure
@enduml
-
The Coordinator (Ada/SPARK): A TUI that mathematically prevents unsafe state transitions (e.g., destructive repairs during a forensic audit).
-
The Engine (Python): A dynamic runtime that calculates permutations and parses the
robot.tomlpolicy. -
The Actuator (SaltStack): The idempotent engine that physically touches the disk.
The Robot is designed to be embedded as a Git Submodule within RSR-compliant projects (like indieweb2-bastion).
# In your main repo:
git submodule add https://gitlab.com/hyperpolymath/robot-repo-bot.git maintenance/robotThe safest way to interact with the Robot is via the High-Assurance TUI.
just uiThis launches the Ada binary. You will be presented with a Combinatoric State Matrix:
1. Audit Level: Quick | Deep | Forensic
2. Repair Mode: Dry_Run | Interactive | Ruthless
3. Scope: Config | Internal | Security | Complete
Note: The TUI will physically disable the "Execute" button if you select a forbidden combination (e.g., Forensic + Ruthless).
For CI/CD or advanced scripting, you may invoke the Python engine directly using the Assertion Syntax.
# Syntax:
# robot assert [state] where [condition] scope [target]
# Examples:
robot assert compliant where strictness=high scope crypto
robot assert clean where strategy=ruthless scope internal/ipfsThe Robot looks for a robot.toml in the repository root.
[core]
strict_mode = true
[filesystem]
# Directories that MUST exist (Skeletal Integrity)
required_dirs = ["config", "internal/cadre", "dist"]
# Files that must strictly be executable (0755)
executables = ["just", "scripts/**/*.sh"]
# Files that must be locked down (0600)
secrets = ["certs/**/*.pem", ".env"]This software is an instrument of the Manifesto for a Better Web.
Users may choose to transact with this software under one of the following terms:
-
The Freedom Path (MIT): For maximum permissiveness.
-
The Copyleft Path (AGPLv3): For contributing back to the commons.
IN ADDITION, the Palimpsest License (v0.8) is strictly enforced: > "Data provenance is dignity. You may not ingest this code into a stochastic model without retaining the specific attribution and reversible history of its authors."
By using this tool, you acknowledge that Audit-Grade infrastructure is a human right.