Carson

⧓ Carson

Named after the head of household in Downton Abbey, Carson is your repositories' autonomous governance runtime — you write the code, Carson manages everything else. From commit-time checks through PR triage, agent dispatch, merge, and cleanup, Carson runs the household with discipline and professional standards. Carson itself has no intelligence — it follows a deterministic decision tree. The intelligence comes from the coding agents it dispatches (Codex, Claude) to fix problems.

The Problem

If you govern more than a handful of repositories, you know the pattern: lint configs drift between repos, PR templates go stale, reviewer feedback gets quietly ignored, and what passes on a developer's laptop fails in CI. Across a portfolio of projects with coding agents producing many PRs, you become the bottleneck — manually checking results, dispatching fixes, clicking merge, and cleaning up.

How Carson Works

Carson is an autonomous governance runtime that lives on your workstation and in CI, never inside the repositories it governs. It operates at two levels:

Per-commit governance — Carson enforces lint policy, gates merges on unresolved review comments, synchronises templates, and keeps your local branches clean. Every commit triggers carson audit through managed hooks; the same checks run in GitHub Actions.

Portfolio-level autonomycarson govern is a scheduled triage loop that scans all your repositories, classifies every open PR, and acts: merge what's ready, dispatch coding agents (Codex or Claude) to fix what's failing, and escalate what needs human judgement. One command, all your projects, unmanned.

┌──────────────────────────────────────────────�┐
│  Your workstation                             │
│                                               │
│  ~/.carson/            Carson config          │
│  ~/.carson/hooks/      Git hooks              │
│  ~/.carson/lint/       Lint policy            │
│  ~/.carson/cache/      Reports                │
│  ~/.carson/govern/     Dispatch state         │
│                                               │
│  carson govern ──► for each repo:             │
│    1. List open PRs (gh)                      │
│    2. Classify: CI / review / audit status    │
│    3. Act: merge | dispatch agent | escalate  │
│    4. Housekeep: sync + prune                 │
│                                               │
│  Governed repos:  repo-A/  repo-B/  repo-C/   │
│    .github/* templates (committed)            │
│    core.hooksPath → ~/.carson/hooks           │
└──────────────────────────────────────────────┘

This separation is Carson's defining trait — the outsider boundary: no Carson scripts, config files, or governance payloads are ever placed inside a governed repository.

Opinions

Carson is opinionated about governance. These are non-negotiable principles, not configurable defaults:

  • Outsider boundary — Carson lives outside your repo, never inside. No Carson-owned artefacts in your repository. Offboarding leaves no trace.
  • Centralised lint — lint policy at ~/.carson/lint/, shared across all repos. Repo-local config files are forbidden — one source of truth, zero drift.
  • Active review — undisposed reviewer findings block merge. Feedback must be acknowledged, not buried.
  • Self-diagnosing output — every message names the cause and the fix. If you need to debug Carson's output, the output failed.
  • Transparent governance — Carson prepares everything for merge but never oversteps. It does not make decisions for you without telling you.

Everything else — workflow style, merge method, remote name, main branch — is a configurable default chosen during carson setup. See MANUAL.md for the full list of defaults and why each was chosen.

The data flow:

  1. You maintain a policy source — a directory or git repository containing your lint rules (e.g. CODING/rubocop.yml). Carson copies these to ~/.carson/lint/ via carson lint setup.
  2. carson onboard installs git hooks, synchronises .github/* templates, and runs a first governance audit on a host repository.
  3. From that point, every commit triggers carson audit through the managed pre-commit hook. The same carson audit runs in GitHub Actions. If it passes locally, it passes in CI.
  4. carson review gate enforces review accountability: it blocks merge until every actionable reviewer comment has been formally acknowledged by the PR author through a disposition comment.
  5. carson govern triages all open PRs across your portfolio. Ready PRs are merged and housekept. Failing PRs get a coding agent dispatched to fix them. Stuck PRs are escalated for your attention.

Commands at a Glance

Govern — autonomous portfolio management:

Command What it does
carson govern Triage all open PRs: merge ready ones, dispatch agents for failures, escalate the rest.
carson govern --dry-run Show what Carson would do without taking action.
carson govern --loop SECONDS Run the govern cycle continuously, sleeping SECONDS between cycles.
carson housekeep Sync main + prune stale branches (also runs automatically after govern merges).

Setup — run once per machine or per repository:

Command What it does
carson lint setup Seed ~/.carson/lint/ from your policy source.
carson onboard One-command baseline: hooks + templates + first audit.
carson prepare Install or refresh Carson-managed global hooks.
carson refresh Re-apply hooks, templates, and audit after upgrading Carson.
carson offboard Remove Carson from a repository.

Daily — regular development workflow:

Command What it does
carson audit Full governance check (also runs automatically on every commit).
carson sync Fast-forward local main from remote.
carson prune Remove stale local branches whose upstream is gone.
carson template check Detect drift between managed and host .github/* files.
carson template apply Repair drifted .github/* files.

Review — PR merge readiness:

Command What it does
carson review gate Block or approve merge based on unresolved review comments.
carson review sweep Scan recent PRs and update a tracking issue for late feedback.

Info:

Command What it does
carson version Print installed version.
carson inspect Verify Carson-managed hook installation and repository setup.

Quickstart

Prerequisites: Ruby >= 3.4, git, and gem in your PATH. gh (GitHub CLI) is recommended for full review governance features.

# Install
gem install --user-install carson
carson version

Prepare your lint policy. A policy source is any directory (or git URL) that contains a CODING/ folder with your lint configuration files. For Ruby, the required file is CODING/rubocop.yml. Carson copies these into ~/.carson/lint/ so that every governed repository uses the same rules:

carson lint setup --source /path/to/your-policy-repo

Onboard a repository:

carson onboard /path/to/your-repo

After carson onboard, your repository has:

  • Git hooks that run carson audit on every commit.
  • Managed .github/* templates synchronised from Carson.
  • An initial governance audit report.

Commit the generated .github/* changes, and the repository is governed.

Daily workflow:

carson govern --dry-run     # see what Carson would do across all repos
carson govern               # triage PRs, merge ready ones, dispatch agents, housekeep
carson govern --loop 300    # run continuously, cycling every 5 minutes

Or the individual commands if you prefer manual control:

carson audit                # full governance check
carson review gate          # block or approve merge based on review status
carson sync                 # fast-forward local main
carson prune                # clean up stale local branches
  • MANUAL.md — installation, first-time setup, CI configuration, daily operations, troubleshooting.
  • API.md — formal interface contract: commands, exit codes, configuration schema.
  • RELEASE.md — version history and upgrade actions.
  • docs/define.md — product definition and scope.
  • docs/design.md — experience and brand design.
  • docs/develop.md — contributor guide: architecture, development workflow.

Support