2.9 KiB
GenieHive Foundation Gateway Notes
Last updated: 2026-05-01
This document records how GroundRecall should relate to the optional GenieHive Foundation gateway profile.
Boundary
GroundRecall remains the grounded knowledge substrate. It owns:
- source import and provenance
- normalized knowledge objects
- review candidates and promotion records
- canonical query and export
- assistant-neutral bundles
GenieHive remains the model and routing control plane. The Foundation gateway profile adds governance around model access:
- named, revocable client credentials
- request audit logging without prompt or completion content
- model and operation allowlists
- future provider credential indirection
- future provider adapters, quotas, and operator tooling
GroundRecall should not duplicate GenieHive's credential, audit, routing, or budgeting state.
Integration Pattern
GroundRecall-powered workflows that need model assistance should treat GenieHive as an external OpenAI-compatible endpoint:
GroundRecall source/query/export -> client workflow -> GenieHive role/model
The client workflow should carry only:
GENIEHIVE_BASE_URLGENIEHIVE_API_KEY- requested role or model, preferably a role such as
archive_migrator
Provider root keys must not be stored in GroundRecall source notes, promoted objects, exports, assistant bundles, or repo docs.
What To Record In GroundRecall
Allowed operational facts:
- which GenieHive deployment profile is in use, such as
casualorfoundation_gateway - non-secret endpoint locations, such as a localhost or ZeroTier base URL
- role names used by workflows
- commit IDs for GenieHive capability changes
- whether request audit logging and allowlist enforcement are enabled
- test or smoke-test outcomes
Not allowed:
- raw GenieHive API keys
- provider API keys
- provider dashboard credentials
- prompt or completion content copied from audit logs
- secrets embedded in
.envfiles
Current GenieHive Milestones Reflected Here
As of this note, the local GenieHive roadmap has completed:
- baseline and compatibility guard
- config profiles and feature flags
- named client key storage, opt-in named auth, and admin key endpoints
- opt-in request audit logging
- named-key model and operation authorization
Remaining GenieHive work that may matter to GroundRecall-assisted workflows:
- archive migration role/profile config
- provider credential indirection
- Anthropic Messages adapter
- budget and quota enforcement
- admin CLI and operations documentation
- security review
GroundRecall Implications
No GroundRecall schema change is needed for these GenieHive milestones.
GroundRecall may eventually benefit from optional metadata fields or source-note conventions for:
model_gatewaymodel_rolerequest_idworkflow_run_id
Those should remain provenance metadata for generated or assisted artifacts, not a copy of GenieHive's audit table.