Authority Map¶
Reference Position¶
flowchart TD
family["Reproducible Research"] --> program["Deep Dive DVC"]
program --> reference["Authority Map"]
reference --> review["Design or review decision"]
review --> capstone["Capstone proof surface"]
flowchart TD
trigger["Hit a naming, boundary, or trade-off question"] --> lookup["Use this page as a glossary, map, rubric, or atlas"]
lookup --> compare["Compare the current code or workflow against the boundary"]
compare --> decision["Turn the comparison into a keep, change, or reject call"]
Read the first diagram as a lookup map: this page is part of the review shelf, not a first-read narrative. Read the second diagram as the reference rhythm: arrive with a concrete ambiguity, compare the current work against the boundary on the page, then turn that comparison into a decision.
Deep Dive DVC repeatedly asks which layer of state is authoritative. This page answers that question directly.
Use it when the repository contains many kinds of files but you need to know which one is supposed to settle a trust question.
State Layers And Their Jobs¶
| Layer | What it is authoritative for | What it is not authoritative for |
|---|---|---|
| workspace files | the current visible checkout | long-term identity or durable recovery |
dvc.yaml |
the declared pipeline contract | proof that a stage actually ran with a specific state |
dvc.lock |
recorded execution state and dependency hashes | downstream release policy by itself |
| DVC cache | content-addressed local materialization of tracked data | durable off-machine survival |
| DVC remote | durable recovery source when local cache is lost | human-readable release meaning |
publish/v1/ |
downstream contract another person may trust | the full internal state story |
Review Order¶
When a trust question is ambiguous, inspect the layers in this order:
dvc.yamlfor declared responsibilitydvc.lockfor recorded execution state- DVC remote or recovery drills for durability
publish/v1/for downstream release trust
That order prevents one common DVC mistake: jumping from a visible file straight to a trust claim without checking what authority that file actually has.
Which Layer Answers Which Question¶
| Question | Start with |
|---|---|
| what does this pipeline claim it will do | dvc.yaml |
| what exact state did it record after execution | dvc.lock |
| can this repository restore tracked data after local loss | the DVC remote plus dvc pull |
| what may downstream users rely on | publish/v1/ plus its manifest |
| what is merely visible today in the working tree | workspace files |
| what changed meaningfully between comparable runs | params.yaml, metrics/metrics.json, and experiment metadata |
Common Authority Mistakes¶
| Mistake | Why it fails |
|---|---|
| treating a workspace path as stable identity | the bytes may change while the path stays the same |
treating dvc.yaml as proof of execution |
declaration is not the same as recorded state |
| treating the local cache as durable recovery | it disappears with the machine or cleanup |
| treating the publish bundle as the whole repository truth | promoted state is intentionally smaller than the internal state story |
| treating a successful restore as proof of semantic comparability | durability does not guarantee that params or metrics still mean the same thing |
Best Companion Pages¶
The most useful companion pages for this map are: