# CHORUS – Container-First Context Platform (Alpha) CHORUS is the runtime that ties the CHORUS ecosystem together: libp2p mesh, DHT-backed storage, council/task coordination, and (eventually) SLURP contextual intelligence. The repository you are looking at is the in-progress container-first refactor. Several core systems boot today, but higher-level services (SLURP, SHHH, full HMMM routing) are still landing. ## Current Status | Area | Status | Notes | | --- | --- | --- | | libp2p node + PubSub | ✅ Running | `internal/runtime/shared.go` spins up the mesh, hypercore logging, availability broadcasts. | | DHT + DecisionPublisher | ✅ Running | Encrypted storage wired through `pkg/dht`; decisions written via `ucxl.DecisionPublisher`. | | Election manager | ✅ Running | Admin election integrated with Backbeat; metrics exposed under `pkg/metrics`. | | SLURP (context intelligence) | 🚧 Stubbed | `pkg/slurp/slurp.go` contains TODOs for resolver, temporal graphs, intelligence. Leader integration scaffolding exists but uses placeholder IDs/request forwarding. | | SHHH (secrets sentinel) | ❌ Not implemented | No `pkg/shhh` module yet; redaction hooks are pending. | | HMMM routing | 🚧 Partial | PubSub topics join, but capability/role announcements and HMMM router wiring are placeholders (`internal/runtime/agent_support.go`). | See `docs/progress/CHORUS-WHOOSH-development-plan.md` for the detailed build plan and `docs/progress/CHORUS-WHOOSH-roadmap.md` for sequencing. ## Quick Start (Alpha) The container-first workflows are still evolving; expect frequent changes. ```bash git clone https://gitea.chorus.services/tony/CHORUS.git cd CHORUS cp docker/chorus.env.example docker/chorus.env # adjust env vars (KACHING license, bootstrap peers, etc.) docker compose -f docker/docker-compose.yml up --build ``` You’ll get a single agent container with: - libp2p networking (mDNS + configured bootstrap peers) - election heartbeat - DHT storage (AGE-encrypted) - HTTP API + health endpoints **Missing today:** SLURP context resolution, SHHH redaction, HMMM per-issue routing. Expect log warnings/TODOs for those paths. ## Roadmap Highlights 1. **Security substrate** – land SHHH sentinel, finish SLURP leader-only operations, validate COOEE enrolment (see roadmap Phase 1). 2. **Autonomous teams** – coordinate with WHOOSH for deployment telemetry + SLURP context export. 3. **UCXL + KACHING** – hook runtime telemetry into KACHING and enforce UCXL validator. Track progress via the shared roadmap and weekly burndown dashboards. ## Related Projects - [WHOOSH](https://gitea.chorus.services/tony/WHOOSH) – council/team orchestration - [KACHING](https://gitea.chorus.services/tony/KACHING) – telemetry/licensing - [SLURP](https://gitea.chorus.services/tony/SLURP) – contextual intelligence prototypes - [HMMM](https://gitea.chorus.services/tony/hmmm) – meta-discussion layer ## Contributing This repo is still alpha. Please coordinate via the roadmap tickets before landing changes. Major security/runtime decisions should include a Decision Record with a UCXL address so SLURP/BUBBLE can ingest it later.