mod agent;
mod agent_config;
mod agent_observe;
mod agent_tools;
pub(crate) mod api;
pub(crate) mod autonomy_budget;
pub mod capabilities;
mod compaction;
mod config_builtins;
pub(crate) mod content;
mod conversation;
pub(crate) mod cost;
pub(crate) mod cost_route;
pub(crate) mod daemon;
pub(crate) mod fake;
pub(crate) mod helpers;
pub(crate) mod ledger;
pub(crate) mod mock;
pub(crate) mod permissions;
pub mod plan;
pub mod readiness;
pub(crate) mod schema_recover;
pub(crate) mod structural_experiments;
pub(crate) mod structured_envelope;
pub(crate) mod tool_search;
mod transcript_stats;
use std::sync::OnceLock;
pub(crate) fn shared_streaming_client() -> &'static reqwest::Client {
static CLIENT: OnceLock<reqwest::Client> = OnceLock::new();
CLIENT.get_or_init(|| {
client_builder_for_tests(
reqwest::Client::builder()
.connect_timeout(std::time::Duration::from_secs(30))
.pool_max_idle_per_host(4),
)
.build()
.unwrap_or_else(|_| reqwest::Client::new())
})
}
pub(crate) fn shared_blocking_client() -> &'static reqwest::Client {
static CLIENT: OnceLock<reqwest::Client> = OnceLock::new();
CLIENT.get_or_init(|| {
client_builder_for_tests(
reqwest::Client::builder()
.connect_timeout(std::time::Duration::from_secs(30))
.timeout(std::time::Duration::from_secs(120))
.pool_max_idle_per_host(4),
)
.build()
.unwrap_or_else(|_| reqwest::Client::new())
})
}
pub(crate) fn shared_utility_client() -> &'static reqwest::Client {
static CLIENT: OnceLock<reqwest::Client> = OnceLock::new();
CLIENT.get_or_init(|| {
client_builder_for_tests(
reqwest::Client::builder()
.connect_timeout(std::time::Duration::from_secs(10))
.timeout(std::time::Duration::from_secs(15))
.pool_max_idle_per_host(2),
)
.build()
.unwrap_or_else(|_| reqwest::Client::new())
})
}
#[cfg(test)]
fn client_builder_for_tests(builder: reqwest::ClientBuilder) -> reqwest::ClientBuilder {
builder.danger_accept_invalid_certs(true)
}
#[cfg(not(test))]
fn client_builder_for_tests(builder: reqwest::ClientBuilder) -> reqwest::ClientBuilder {
builder
}
pub use api::{
ollama_runtime_settings_from_env, warm_ollama_model, warm_ollama_model_with_settings,
OllamaRuntimeSettings, HARN_OLLAMA_KEEP_ALIVE_ENV, HARN_OLLAMA_NUM_CTX_ENV,
OLLAMA_DEFAULT_KEEP_ALIVE, OLLAMA_DEFAULT_NUM_CTX, OLLAMA_HOST_ENV,
};
pub use fake::{
fake_llm_captured_calls, install_fake_llm_script, FakeLlmCall, FakeLlmError, FakeLlmEvent,
FakeLlmGuard, FakeLlmScript, FakeLlmTurn, FakeStopReason,
};
pub use mock::{
drain_tool_recordings, load_tool_replay_fixtures, set_tool_recording_mode, ToolRecordingMode,
};
mod healthcheck;
pub(crate) mod provider;
pub(crate) mod providers;
pub(crate) mod rate_limit;
mod stream;
pub(crate) mod tools;
mod trace;
pub(crate) mod trigger_predicate;
#[cfg(test)]
pub(crate) fn env_lock() -> &'static std::sync::Mutex<()> {
use std::sync::{Mutex, OnceLock};
static LOCK: OnceLock<Mutex<()>> = OnceLock::new();
LOCK.get_or_init(|| Mutex::new(()))
}
pub const LLM_CALLS_DISABLED_ENV: &str = "HARN_LLM_CALLS_DISABLED";
pub(crate) fn llm_calls_disabled() -> bool {
std::env::var(LLM_CALLS_DISABLED_ENV)
.ok()
.is_some_and(|value| matches!(value.as_str(), "1" | "true" | "yes" | "on"))
}
pub(crate) fn ensure_real_llm_allowed(provider: &str) -> Result<(), crate::value::VmError> {
if !llm_calls_disabled() || provider == "mock" || provider == "fake" {
return Ok(());
}
Err(crate::value::VmError::Runtime(format!(
"LLM calls are disabled by {LLM_CALLS_DISABLED_ENV}; provider `{provider}` would make a real LLM request"
)))
}
use std::rc::Rc;
use std::sync::Arc;
use crate::stdlib::{json_to_vm_value, schema_result_value};
use crate::value::{VmChannelHandle, VmError, VmStream, VmStreamCancel, VmValue};
use crate::vm::Vm;
use self::api::{vm_build_llm_result, vm_call_completion_full};
use self::daemon::parse_daemon_loop_config;
use self::helpers::{opt_bool, opt_int, opt_str, opt_str_list};
use self::stream::vm_stream_llm;
use self::trace::emit_agent_event;
use self::trace::trace_llm_call;
pub use self::api::{
normalize_ollama_keep_alive, ollama_readiness, OllamaReadinessOptions, OllamaReadinessResult,
OllamaWarmupResult,
};
pub fn install_current_host_bridge(bridge: Rc<crate::bridge::HostBridge>) {
agent::install_current_host_bridge(bridge);
}
pub fn clear_current_host_bridge() {
agent::clear_current_host_bridge();
}
pub(crate) fn append_observability_sidecar_entry(
event_type: &str,
fields: serde_json::Map<String, serde_json::Value>,
) {
agent_observe::append_llm_observability_entry(event_type, fields);
}
fn output_validation_mode(opts: &api::LlmCallOptions) -> &str {
opts.output_validation.as_deref().unwrap_or("off")
}
fn parse_task_ledger_from_vm_options(
options: &Option<std::collections::BTreeMap<String, VmValue>>,
) -> ledger::TaskLedger {
use ledger::{Deliverable, DeliverableStatus, TaskLedger};
let Some(opts) = options.as_ref() else {
return TaskLedger::default();
};
if let Some(explicit) = opts.get("task_ledger") {
let json = helpers::vm_value_to_json(explicit);
if let Ok(parsed) = serde_json::from_value::<TaskLedger>(json) {
return parsed;
}
}
let mut builder = TaskLedger::default();
if let Some(VmValue::String(s)) = opts.get("root_task") {
builder.root_task = s.trim().to_string();
}
if let Some(deliverables) = opts.get("deliverables").and_then(|v| match v {
VmValue::List(items) => Some(items.clone()),
_ => None,
}) {
for (idx, item) in deliverables.iter().enumerate() {
let text = item.display().trim().to_string();
if text.is_empty() {
continue;
}
builder.deliverables.push(Deliverable {
id: format!("deliverable-{}", idx + 1),
text,
status: DeliverableStatus::Open,
note: None,
});
}
}
builder
}
fn schema_validation_errors(result: &VmValue) -> Vec<String> {
match result {
VmValue::EnumVariant {
enum_name,
variant,
fields,
} if enum_name.as_ref() == "Result" && variant.as_ref() == "Err" => fields
.first()
.and_then(|payload| payload.as_dict())
.and_then(|payload| payload.get("errors"))
.and_then(|errors| match errors {
VmValue::List(items) => Some(items.iter().map(|err| err.display()).collect()),
_ => None,
})
.unwrap_or_else(|| vec!["schema validation failed".to_string()]),
_ => Vec::new(),
}
}
fn compute_validation_errors(data: &VmValue, opts: &api::LlmCallOptions) -> Vec<String> {
let Some(schema_json) = &opts.output_schema else {
return Vec::new();
};
let schema_vm = json_to_vm_value(schema_json);
let validation = schema_result_value(data, &schema_vm, false);
schema_validation_errors(&validation)
}
pub(crate) fn structured_output_errors(
result: &VmValue,
opts: &api::LlmCallOptions,
) -> Vec<String> {
let Some(dict) = result.as_dict() else {
return vec!["structured output result was not a dict".to_string()];
};
if let Some(data) = dict.get("data") {
return compute_validation_errors(data, opts);
}
let mut errors = vec!["response did not contain parseable JSON".to_string()];
if let Some(VmValue::List(violations)) = dict.get("protocol_violations") {
let joined = violations
.iter()
.map(VmValue::display)
.collect::<Vec<_>>()
.join("; ");
if !joined.is_empty() {
errors.push(format!("protocol violations: {joined}"));
}
}
if let Some(stop_reason) = dict.get("stop_reason").map(VmValue::display) {
if matches!(stop_reason.as_str(), "length" | "max_tokens") {
errors.push("response hit the token limit before producing complete JSON".to_string());
}
}
errors
}
#[derive(Debug, Clone)]
pub(crate) enum SchemaNudge {
Auto,
Verbatim(String),
Disabled,
}
pub(crate) fn parse_schema_nudge(
options: &Option<std::collections::BTreeMap<String, VmValue>>,
) -> SchemaNudge {
let Some(opts) = options.as_ref() else {
return SchemaNudge::Auto;
};
match opts.get("schema_retry_nudge") {
None | Some(VmValue::Nil) => SchemaNudge::Auto,
Some(VmValue::Bool(true)) => SchemaNudge::Auto,
Some(VmValue::Bool(false)) => SchemaNudge::Disabled,
Some(VmValue::String(s)) => SchemaNudge::Verbatim(s.to_string()),
Some(other) => SchemaNudge::Verbatim(other.display()),
}
}
pub(crate) fn build_schema_nudge(
errors: &[String],
schema: Option<&serde_json::Value>,
mode: &SchemaNudge,
) -> String {
let errors_line = if errors.is_empty() {
String::from("(no detailed errors)")
} else {
errors.join("; ")
};
match mode {
SchemaNudge::Disabled => String::new(),
SchemaNudge::Verbatim(s) => {
format!("{s}\n\nValidation errors: {errors_line}")
}
SchemaNudge::Auto => {
let mut required_keys: Vec<String> = Vec::new();
let mut property_keys: Vec<String> = Vec::new();
let mut shape_lines: Vec<String> = Vec::new();
if let Some(schema) = schema {
if let Some(req) = schema.get("required").and_then(|v| v.as_array()) {
for r in req {
if let Some(k) = r.as_str() {
required_keys.push(k.to_string());
}
}
}
if let Some(props) = schema.get("properties").and_then(|v| v.as_object()) {
for k in props.keys() {
property_keys.push(k.clone());
}
}
collect_schema_shape_lines(schema, "root", 0, &mut shape_lines);
}
let mut msg =
String::from("Your previous response did not match the required JSON schema.");
msg.push_str(&format!("\nValidation errors: {errors_line}."));
if !required_keys.is_empty() {
msg.push_str(&format!("\nRequired keys: {}.", required_keys.join(", ")));
}
if !property_keys.is_empty() {
msg.push_str(&format!(
"\nAllowed top-level keys: {}.",
property_keys.join(", ")
));
}
if !shape_lines.is_empty() {
msg.push_str("\nExpected JSON schema shape:");
for line in shape_lines {
msg.push_str("\n- ");
msg.push_str(&line);
}
}
msg.push_str(
"\nRespond again with ONLY valid JSON conforming to the schema. No prose, no markdown fences.",
);
msg
}
}
}
const SCHEMA_NUDGE_MAX_DEPTH: usize = 3;
const SCHEMA_NUDGE_MAX_LINES: usize = 8;
const SCHEMA_NUDGE_MAX_KEYS: usize = 16;
fn collect_schema_shape_lines(
schema: &serde_json::Value,
path: &str,
depth: usize,
lines: &mut Vec<String>,
) {
if depth > SCHEMA_NUDGE_MAX_DEPTH || lines.len() >= SCHEMA_NUDGE_MAX_LINES {
return;
}
let object_like = schema
.get("type")
.and_then(|value| value.as_str())
.is_some_and(|kind| kind == "object")
|| schema.get("properties").is_some();
if object_like {
if let Some(props) = schema.get("properties").and_then(|value| value.as_object()) {
let mut keys = props.keys().cloned().collect::<Vec<_>>();
keys.sort();
if !keys.is_empty() {
let mut line = format!("{path} object allowed keys: {}", join_limited_keys(&keys));
let required = schema_required_keys(schema);
if !required.is_empty() {
line.push_str(&format!(
"; required keys: {}",
join_limited_keys(&required)
));
}
lines.push(line);
}
for key in keys {
if lines.len() >= SCHEMA_NUDGE_MAX_LINES {
break;
}
if let Some(child_schema) = props.get(&key) {
let child_path = if path == "root" {
key
} else {
format!("{path}.{key}")
};
collect_schema_shape_lines(child_schema, &child_path, depth + 1, lines);
}
}
}
}
let array_like = schema
.get("type")
.and_then(|value| value.as_str())
.is_some_and(|kind| kind == "array")
|| schema.get("items").is_some();
if array_like {
if let Some(items) = schema.get("items") {
collect_schema_shape_lines(items, &format!("{path}[]"), depth + 1, lines);
}
}
}
fn schema_required_keys(schema: &serde_json::Value) -> Vec<String> {
let mut keys = schema
.get("required")
.and_then(|value| value.as_array())
.map(|items| {
items
.iter()
.filter_map(|item| item.as_str().map(ToString::to_string))
.collect::<Vec<_>>()
})
.unwrap_or_default();
keys.sort();
keys
}
fn join_limited_keys(keys: &[String]) -> String {
if keys.len() <= SCHEMA_NUDGE_MAX_KEYS {
return keys.join(", ");
}
format!(
"{}, ... (+{} more)",
keys[..SCHEMA_NUDGE_MAX_KEYS].join(", "),
keys.len() - SCHEMA_NUDGE_MAX_KEYS
)
}
pub(crate) use self::agent::completion_judge::parse_completion_judge_option;
pub(crate) use self::agent::parse_skill_match_config_public as parse_skill_match_config_dict;
pub(crate) use self::agent::SkillMatchConfig;
pub use self::agent::{
current_agent_session_id, drain_global_pending_feedback, push_pending_feedback_global,
register_session_end_hook, wait_for_global_pending_feedback,
};
pub(crate) use self::agent::{
current_host_bridge, emit_agent_event as emit_live_agent_event, parse_mcp_server_specs,
parse_skill_config, run_agent_loop_internal,
};
pub(crate) use self::agent_config::{
agent_loop_profile_defaults, agent_loop_result_from_llm, parse_command_policy_from_options,
AgentLoopConfig, DEFAULT_MAX_VERIFY_ATTEMPTS,
};
pub use self::agent_config::{
register_agent_loop_with_bridge, register_llm_call_structured_with_bridge,
register_llm_call_with_bridge,
};
pub(crate) use self::api::vm_call_llm_full;
pub use self::api::{
fetch_provider_max_context, probe_openai_compatible_model, selected_model_for_provider,
supports_model_readiness_probe, ModelReadiness,
};
pub(crate) use self::compaction::resolve_agent_loop_auto_compact;
pub use self::cost::{calculate_cost_for_provider, peek_total_cost};
pub use self::healthcheck::{
build_healthcheck_url, run_provider_healthcheck, run_provider_healthcheck_with_options,
ProviderHealthcheckOptions, ProviderHealthcheckResult,
};
pub(crate) use self::helpers::extract_llm_options;
pub use self::helpers::resolve_api_key;
pub use self::helpers::vm_value_to_json;
pub use self::mock::{
clear_cli_llm_mock_mode, enable_cli_llm_mock_recording, install_cli_llm_mocks, set_replay_mode,
take_cli_llm_recordings, LlmMock, LlmReplayMode, MockError,
};
pub use self::trace::{
agent_trace_summary, enable_tracing, peek_agent_trace, peek_trace, peek_trace_summary,
take_agent_trace, take_trace, AgentTraceEvent, LlmTraceEntry,
};
pub fn reset_llm_state() {
cost::reset_cost_state();
trace::reset_trace_state();
trace::reset_agent_trace_state();
provider::register_default_providers();
rate_limit::reset_rate_limit_state();
mock::reset_llm_mock_state();
trigger_predicate::reset_trigger_predicate_state();
capabilities::clear_user_overrides();
autonomy_budget::reset_autonomy_budget_state();
crate::step_runtime::reset_thread_local_state();
}
async fn llm_call_impl(args: Vec<VmValue>) -> Result<VmValue, VmError> {
let options = args.get(2).and_then(|a| a.as_dict()).cloned();
let opts = extract_llm_options(&args)?;
let provider = opts.provider.clone();
let model = opts.model.clone();
match execute_llm_call(opts, options, None).await {
Ok(v) => Ok(v),
Err(err) => Err(VmError::Thrown(build_llm_error_dict(
&err, &provider, &model,
))),
}
}
pub(crate) fn build_llm_error_dict(err: &VmError, provider: &str, model: &str) -> VmValue {
let category = crate::value::error_to_category(err);
let message = llm_error_message(err);
let llm_error = api::classify_llm_error(category.clone(), &message);
if let VmError::Thrown(VmValue::Dict(existing)) = err {
let mut dict = existing.as_ref().clone();
dict.entry("category".to_string())
.or_insert_with(|| VmValue::String(Rc::from(category.as_str())));
dict.entry("kind".to_string())
.or_insert_with(|| VmValue::String(Rc::from(llm_error.kind.as_str())));
dict.entry("reason".to_string())
.or_insert_with(|| VmValue::String(Rc::from(llm_error.reason.as_str())));
dict.entry("message".to_string())
.or_insert_with(|| VmValue::String(Rc::from(message.as_str())));
dict.insert("provider".to_string(), VmValue::String(Rc::from(provider)));
dict.insert("model".to_string(), VmValue::String(Rc::from(model)));
return VmValue::Dict(Rc::new(dict));
}
let mut dict = std::collections::BTreeMap::new();
dict.insert(
"category".to_string(),
VmValue::String(Rc::from(category.as_str())),
);
dict.insert(
"kind".to_string(),
VmValue::String(Rc::from(llm_error.kind.as_str())),
);
dict.insert(
"reason".to_string(),
VmValue::String(Rc::from(llm_error.reason.as_str())),
);
dict.insert("message".to_string(), VmValue::String(Rc::from(message)));
if let Some(ms) = agent_observe::extract_retry_after_ms(err) {
dict.insert("retry_after_ms".to_string(), VmValue::Int(ms as i64));
}
dict.insert("provider".to_string(), VmValue::String(Rc::from(provider)));
dict.insert("model".to_string(), VmValue::String(Rc::from(model)));
VmValue::Dict(Rc::new(dict))
}
fn llm_error_message(err: &VmError) -> String {
match err {
VmError::CategorizedError { message, .. } => message.clone(),
VmError::Thrown(VmValue::String(s)) => s.to_string(),
VmError::Thrown(VmValue::Dict(d)) => d
.get("message")
.map(|v| v.display())
.unwrap_or_else(|| err.to_string()),
_ => err.to_string(),
}
}
pub(crate) async fn execute_llm_call(
opts: api::LlmCallOptions,
options: Option<std::collections::BTreeMap<String, VmValue>>,
bridge: Option<&Rc<crate::bridge::HostBridge>>,
) -> Result<VmValue, VmError> {
let outcome = execute_schema_retry_loop(opts, options, bridge).await?;
if outcome.errors.is_empty() {
return Ok(outcome.vm_result);
}
let hint = if outcome.schema_retries_budget == 0 {
" (hint: set `schema_retries: N` in the llm_call options to automatically re-prompt the model with a corrective nudge)"
} else {
" (hint: schema_retries budget exhausted — the model did not produce conforming output after the configured retries; consider raising `schema_retries` or relaxing the schema)"
};
let message = format!(
"LLM output failed schema validation: {}{hint}",
outcome.errors.join("; ")
);
match outcome.output_validation_mode.as_str() {
"error" => Err(crate::value::VmError::CategorizedError {
message,
category: crate::value::ErrorCategory::SchemaValidation,
}),
"warn" => {
crate::events::log_warn("llm", &message);
Ok(outcome.vm_result)
}
_ => Ok(outcome.vm_result),
}
}
pub(crate) struct SchemaLoopOutcome {
pub vm_result: VmValue,
pub raw_text: String,
pub errors: Vec<String>,
pub attempts: usize,
pub schema_retries_budget: usize,
pub output_validation_mode: String,
}
pub(crate) async fn execute_schema_retry_loop(
mut opts: api::LlmCallOptions,
options: Option<std::collections::BTreeMap<String, VmValue>>,
bridge: Option<&Rc<crate::bridge::HostBridge>>,
) -> Result<SchemaLoopOutcome, VmError> {
let _ = structural_experiments::apply_structural_experiment(&mut opts, None).await?;
let retry_config = agent_observe::LlmRetryConfig {
retries: helpers::opt_int(&options, "llm_retries")
.unwrap_or(agent_observe::DEFAULT_LLM_CALL_RETRIES as i64)
.max(0) as usize,
backoff_ms: helpers::opt_int(&options, "llm_backoff_ms")
.unwrap_or(agent_observe::DEFAULT_LLM_CALL_BACKOFF_MS as i64)
.max(0) as u64,
};
let schema_retries = helpers::opt_int(&options, "schema_retries")
.unwrap_or(1)
.max(0) as usize;
let nudge_mode = parse_schema_nudge(&options);
let tool_format = helpers::opt_str(&options, "tool_format");
let bridged = bridge.is_some();
let user_visible = bridged && helpers::opt_bool(&options, "user_visible");
let output_validation_mode = output_validation_mode(&opts).to_string();
let expects_structured = helpers::expects_structured_output(&opts);
let original_messages = opts.messages.clone();
for attempt in 0..=schema_retries {
let result = agent_observe::observed_llm_call(
&opts,
tool_format.as_deref(),
bridge,
&retry_config,
None,
user_visible,
bridged, None,
)
.await?;
let raw_text = result.text.clone();
let vm_result = agent_config::build_llm_call_result(&result, &opts);
if !expects_structured {
return Ok(SchemaLoopOutcome {
vm_result,
raw_text,
errors: Vec::new(),
attempts: attempt + 1,
schema_retries_budget: schema_retries,
output_validation_mode,
});
}
let errors = structured_output_errors(&vm_result, &opts);
if errors.is_empty() {
return Ok(SchemaLoopOutcome {
vm_result,
raw_text,
errors,
attempts: attempt + 1,
schema_retries_budget: schema_retries,
output_validation_mode,
});
}
let more_attempts = attempt < schema_retries;
if more_attempts {
let nudge = build_schema_nudge(&errors, opts.output_schema.as_ref(), &nudge_mode);
emit_agent_event(AgentTraceEvent::SchemaRetry {
attempt: attempt + 1,
errors: errors.clone(),
nudge_used: !nudge.is_empty(),
correction_prompt: nudge.clone(),
});
opts.messages = original_messages.clone();
if !nudge.is_empty() {
opts.messages.push(serde_json::json!({
"role": "user",
"content": nudge,
}));
}
continue;
}
return Ok(SchemaLoopOutcome {
vm_result,
raw_text,
errors,
attempts: attempt + 1,
schema_retries_budget: schema_retries,
output_validation_mode,
});
}
unreachable!("schema retry loop exited without returning");
}
fn llm_safe_envelope_ok(response: VmValue) -> VmValue {
let mut dict = std::collections::BTreeMap::new();
dict.insert("ok".to_string(), VmValue::Bool(true));
dict.insert("response".to_string(), response);
dict.insert("error".to_string(), VmValue::Nil);
VmValue::Dict(Rc::new(dict))
}
fn llm_safe_envelope_err(err: &VmError) -> VmValue {
if let VmError::Thrown(VmValue::Dict(d)) = err {
let mut dict = std::collections::BTreeMap::new();
dict.insert("ok".to_string(), VmValue::Bool(false));
dict.insert("response".to_string(), VmValue::Nil);
dict.insert("error".to_string(), VmValue::Dict(d.clone()));
return VmValue::Dict(Rc::new(dict));
}
let category = crate::value::error_to_category(err);
let message = llm_error_message(err);
let llm_error = api::classify_llm_error(category.clone(), &message);
let mut err_dict = std::collections::BTreeMap::new();
err_dict.insert(
"category".to_string(),
VmValue::String(Rc::from(category.as_str())),
);
err_dict.insert(
"kind".to_string(),
VmValue::String(Rc::from(llm_error.kind.as_str())),
);
err_dict.insert(
"reason".to_string(),
VmValue::String(Rc::from(llm_error.reason.as_str())),
);
err_dict.insert("message".to_string(), VmValue::String(Rc::from(message)));
let mut dict = std::collections::BTreeMap::new();
dict.insert("ok".to_string(), VmValue::Bool(false));
dict.insert("response".to_string(), VmValue::Nil);
dict.insert("error".to_string(), VmValue::Dict(Rc::new(err_dict)));
VmValue::Dict(Rc::new(dict))
}
pub(crate) fn rewrite_structured_args(args: Vec<VmValue>) -> Result<Vec<VmValue>, VmError> {
if args.len() < 2 {
return Err(VmError::Runtime(
"llm_call_structured: missing required `schema` argument (expected \
(prompt, schema, options?))"
.to_string(),
));
}
let prompt = args.first().cloned().unwrap_or(VmValue::Nil);
let schema = match args.get(1) {
Some(VmValue::Dict(_)) => args.get(1).cloned().unwrap(),
Some(other) => {
return Err(VmError::Runtime(format!(
"llm_call_structured: `schema` must be a dict (JSON Schema), got {}",
other.type_name()
)));
}
None => unreachable!("len check above guarantees arg index 1"),
};
let mut options = args
.get(2)
.and_then(|a| a.as_dict())
.cloned()
.unwrap_or_default();
let system = options
.remove("system")
.filter(|v| !matches!(v, VmValue::Nil));
let retries_alias = options.remove("retries").and_then(|v| v.as_int());
if let Some(n) = retries_alias {
options
.entry("schema_retries".to_string())
.or_insert(VmValue::Int(n));
} else {
options
.entry("schema_retries".to_string())
.or_insert(VmValue::Int(3));
}
options
.entry("output_schema".to_string())
.or_insert(schema.clone());
options
.entry("json_schema".to_string())
.or_insert(schema.clone());
options
.entry("output_format".to_string())
.or_insert_with(|| {
let mut fmt = std::collections::BTreeMap::new();
fmt.insert("kind".to_string(), VmValue::String(Rc::from("json_schema")));
fmt.insert("schema".to_string(), schema);
fmt.insert("strict".to_string(), VmValue::Bool(true));
VmValue::Dict(Rc::new(fmt))
});
options
.entry("response_format".to_string())
.or_insert(VmValue::String(Rc::from("json")));
options
.entry("output_validation".to_string())
.or_insert(VmValue::String(Rc::from("error")));
Ok(vec![
prompt,
system.unwrap_or(VmValue::Nil),
VmValue::Dict(Rc::new(options)),
])
}
pub(crate) fn extract_structured_data(response: VmValue) -> VmValue {
match response {
VmValue::Dict(d) => d.get("data").cloned().unwrap_or(VmValue::Nil),
other => other,
}
}
pub(crate) fn structured_safe_envelope_ok(data: VmValue) -> VmValue {
let mut dict = std::collections::BTreeMap::new();
dict.insert("ok".to_string(), VmValue::Bool(true));
dict.insert("data".to_string(), data);
dict.insert("error".to_string(), VmValue::Nil);
VmValue::Dict(Rc::new(dict))
}
pub(crate) fn structured_safe_envelope_err(err: &VmError) -> VmValue {
if let VmError::Thrown(VmValue::Dict(d)) = err {
let mut dict = std::collections::BTreeMap::new();
dict.insert("ok".to_string(), VmValue::Bool(false));
dict.insert("data".to_string(), VmValue::Nil);
dict.insert("error".to_string(), VmValue::Dict(d.clone()));
return VmValue::Dict(Rc::new(dict));
}
let category = crate::value::error_to_category(err);
let message = llm_error_message(err);
let llm_error = api::classify_llm_error(category.clone(), &message);
let mut err_dict = std::collections::BTreeMap::new();
err_dict.insert(
"category".to_string(),
VmValue::String(Rc::from(category.as_str())),
);
err_dict.insert(
"kind".to_string(),
VmValue::String(Rc::from(llm_error.kind.as_str())),
);
err_dict.insert(
"reason".to_string(),
VmValue::String(Rc::from(llm_error.reason.as_str())),
);
err_dict.insert("message".to_string(), VmValue::String(Rc::from(message)));
let mut dict = std::collections::BTreeMap::new();
dict.insert("ok".to_string(), VmValue::Bool(false));
dict.insert("data".to_string(), VmValue::Nil);
dict.insert("error".to_string(), VmValue::Dict(Rc::new(err_dict)));
VmValue::Dict(Rc::new(dict))
}
pub fn register_llm_builtins(vm: &mut Vm) {
rate_limit::init_from_config();
agent_config::register_agent_subscribe(vm);
agent_config::register_agent_inject_feedback(vm);
vm.register_async_builtin("__cost_route", |args| async move {
cost_route::cost_route_impl(args).await
});
vm.register_async_builtin("llm_call", |args| async move { llm_call_impl(args).await });
vm.register_async_builtin("llm_stream_call", |args| async move {
llm_stream_call_impl(args).await
});
vm.register_async_builtin("llm_call_safe", |args| async move {
match llm_call_impl(args).await {
Ok(response) => Ok(llm_safe_envelope_ok(response)),
Err(err) => Ok(llm_safe_envelope_err(&err)),
}
});
vm.register_async_builtin("llm_call_structured", |args| async move {
let rewritten = rewrite_structured_args(args)?;
let response = llm_call_impl(rewritten).await?;
Ok(extract_structured_data(response))
});
vm.register_async_builtin("llm_call_structured_safe", |args| async move {
let rewritten = match rewrite_structured_args(args) {
Ok(v) => v,
Err(err) => return Ok(structured_safe_envelope_err(&err)),
};
match llm_call_impl(rewritten).await {
Ok(response) => Ok(structured_safe_envelope_ok(extract_structured_data(
response,
))),
Err(err) => Ok(structured_safe_envelope_err(&err)),
}
});
vm.register_async_builtin("llm_call_structured_result", |args| async move {
structured_envelope::llm_call_structured_result_impl(args, None).await
});
vm.register_async_builtin("schema_recover", |args| async move {
schema_recover::schema_recover_impl(args, None).await
});
vm.register_async_builtin("with_rate_limit", |args| async move {
let provider = args.first().map(|a| a.display()).unwrap_or_default();
if provider.is_empty() {
return Err(VmError::Runtime(
"with_rate_limit: provider name is required".to_string(),
));
}
let closure = match args.get(1) {
Some(VmValue::Closure(c)) => c.clone(),
_ => {
return Err(VmError::Runtime(
"with_rate_limit: second argument must be a closure".to_string(),
))
}
};
let opts = args.get(2).and_then(|a| a.as_dict()).cloned();
let max_retries = helpers::opt_int(&opts, "max_retries").unwrap_or(5).max(0) as usize;
let mut backoff_ms = helpers::opt_int(&opts, "backoff_ms").unwrap_or(1000).max(1) as u64;
let mut attempt: usize = 0;
loop {
rate_limit::acquire_permit(&provider).await;
let mut child_vm = crate::vm::clone_async_builtin_child_vm().ok_or_else(|| {
VmError::Runtime("with_rate_limit requires an async builtin VM context".to_string())
})?;
match child_vm.call_closure_pub(&closure, &[]).await {
Ok(v) => return Ok(v),
Err(err) => {
let cat = crate::value::error_to_category(&err);
let retryable = matches!(
cat,
crate::value::ErrorCategory::RateLimit
| crate::value::ErrorCategory::Overloaded
| crate::value::ErrorCategory::TransientNetwork
| crate::value::ErrorCategory::Timeout
);
if !retryable || attempt >= max_retries {
return Err(err);
}
crate::events::log_debug(
"llm.with_rate_limit",
&format!(
"retrying after {cat:?} (attempt {}/{max_retries}) in {backoff_ms}ms",
attempt + 1
),
);
tokio::time::sleep(std::time::Duration::from_millis(backoff_ms)).await;
backoff_ms = backoff_ms.saturating_mul(2).min(30_000);
attempt += 1;
}
}
}
});
vm.register_async_builtin("llm_completion", |args| async move {
let prefix = args.first().map(|a| a.display()).unwrap_or_default();
let suffix = args.get(1).and_then(|a| {
if matches!(a, VmValue::Nil) {
None
} else {
Some(a.display())
}
});
let opts = extract_llm_options(&[
VmValue::String(Rc::from(prefix.clone())),
args.get(2).cloned().unwrap_or(VmValue::Nil),
args.get(3).cloned().unwrap_or(VmValue::Nil),
])?;
if let Some(span_id) = crate::tracing::current_span_id() {
crate::tracing::span_set_metadata(
span_id,
"model",
serde_json::json!(opts.model.clone()),
);
crate::tracing::span_set_metadata(
span_id,
"provider",
serde_json::json!(opts.provider.clone()),
);
}
let start = std::time::Instant::now();
let result = vm_call_completion_full(&opts, &prefix, suffix.as_deref()).await?;
trace_llm_call(LlmTraceEntry {
model: result.model.clone(),
input_tokens: result.input_tokens,
output_tokens: result.output_tokens,
duration_ms: start.elapsed().as_millis() as u64,
});
if let Some(span_id) = crate::tracing::current_span_id() {
crate::tracing::span_set_metadata(span_id, "status", serde_json::json!("ok"));
crate::tracing::span_set_metadata(
span_id,
"input_tokens",
serde_json::json!(result.input_tokens),
);
crate::tracing::span_set_metadata(
span_id,
"output_tokens",
serde_json::json!(result.output_tokens),
);
}
Ok(vm_build_llm_result(&result, None, None, None))
});
vm.register_async_builtin("agent_loop", |args| async move {
let options = args.get(2).and_then(|a| a.as_dict()).cloned();
let profile_defaults = agent_config::agent_loop_profile_defaults(&options, "agent_loop")?;
let max_iterations =
opt_int(&options, "max_iterations").unwrap_or(profile_defaults.max_iterations)
as usize;
let persistent = opt_bool(&options, "persistent");
let max_nudges =
opt_int(&options, "max_nudges").unwrap_or(profile_defaults.max_nudges) as usize;
let custom_nudge = opt_str(&options, "nudge");
let tool_retries =
opt_int(&options, "tool_retries").unwrap_or(profile_defaults.tool_retries) as usize;
let schema_retries =
opt_int(&options, "schema_retries").unwrap_or(profile_defaults.schema_retries)
as usize;
let tool_backoff_ms = opt_int(&options, "tool_backoff_ms").unwrap_or(1000) as u64;
let tool_format = opt_str(&options, "tool_format").unwrap_or_else(|| "text".to_string());
let native_tool_fallback = opt_str(&options, "native_tool_fallback")
.map(|value| {
crate::orchestration::NativeToolFallbackPolicy::parse(&value).ok_or_else(|| {
crate::value::VmError::Runtime(format!(
"agent_loop: native_tool_fallback must be one of allow, allow_once, reject; got `{value}`"
))
})
})
.transpose()?
.unwrap_or_default();
let daemon = opt_bool(&options, "daemon");
let session_id = opt_str(&options, "session_id").unwrap_or_default();
let auto_compact = resolve_agent_loop_auto_compact(&args, &options).await?;
let policy = options.as_ref().and_then(|o| o.get("policy")).map(|v| {
let json = crate::llm::helpers::vm_value_to_json(v);
serde_json::from_value::<crate::orchestration::CapabilityPolicy>(json)
.unwrap_or_default()
});
let command_policy =
agent_config::parse_command_policy_from_options(&options, "agent_loop")?;
let turn_policy = options
.as_ref()
.and_then(|o| o.get("turn_policy"))
.map(|v| {
let json = crate::llm::helpers::vm_value_to_json(v);
serde_json::from_value::<crate::orchestration::TurnPolicy>(json).unwrap_or_default()
});
let approval_policy = options
.as_ref()
.and_then(|o| o.get("approval_policy"))
.map(|v| {
let json = crate::llm::helpers::vm_value_to_json(v);
serde_json::from_value::<crate::orchestration::ToolApprovalPolicy>(json)
.unwrap_or_default()
});
let permissions = crate::llm::permissions::parse_dynamic_permission_policy(
options.as_ref().and_then(|o| o.get("permissions")),
"agent_loop",
)?;
let done_sentinel = agent_config::parse_done_sentinel_option(&options)?;
let break_unless_phase = opt_str(&options, "break_unless_phase");
let exit_when_verified = opt_bool(&options, "exit_when_verified");
let daemon_config = parse_daemon_loop_config(options.as_ref());
let (skill_registry, skill_match, working_files) =
crate::llm::agent::parse_skill_config(&options);
let mcp_servers = crate::llm::agent::parse_mcp_server_specs(&options)?;
let autonomy_budget = crate::llm::autonomy_budget::parse_autonomy_budget(
options.as_ref(),
&session_id,
"agent_loop",
)?;
let mut opts = extract_llm_options(&args)?;
let budget = opts.budget.clone();
let result = run_agent_loop_internal(
&mut opts,
AgentLoopConfig {
persistent,
max_iterations,
max_nudges,
nudge: custom_nudge,
done_sentinel,
break_unless_phase,
tool_retries,
tool_backoff_ms,
schema_retries,
schema_retry_nudge: parse_schema_nudge(&options),
tool_format,
native_tool_fallback,
auto_compact,
policy,
command_policy,
permissions,
approval_policy,
daemon,
daemon_config,
llm_retries: opt_int(&options, "llm_retries")
.unwrap_or(profile_defaults.llm_retries) as usize,
llm_backoff_ms: opt_int(&options, "llm_backoff_ms").unwrap_or(2000) as u64,
token_budget: opt_int(&options, "token_budget"),
budget,
exit_when_verified,
loop_detect_warn: opt_int(&options, "loop_detect_warn").unwrap_or(2) as usize,
loop_detect_block: opt_int(&options, "loop_detect_block").unwrap_or(3) as usize,
loop_detect_skip: opt_int(&options, "loop_detect_skip").unwrap_or(4) as usize,
tool_examples: opt_str(&options, "tool_examples"),
turn_policy,
stop_after_successful_tools: opt_str_list(&options, "stop_after_successful_tools"),
require_successful_tools: opt_str_list(&options, "require_successful_tools"),
session_id,
event_sink: None,
task_ledger: parse_task_ledger_from_vm_options(&options),
post_turn_callback: agent_config::parse_closure_option(
&options,
"post_turn_callback",
)?,
verify_completion: agent_config::parse_closure_option(
&options,
"verify_completion",
)?,
verify_completion_judge:
agent::completion_judge::parse_completion_judge_option(&options)?,
max_verify_attempts: opt_int(&options, "max_verify_attempts")
.filter(|n| *n >= 0)
.map(|n| n as usize)
.unwrap_or(agent_config::DEFAULT_MAX_VERIFY_ATTEMPTS),
llm_transcript_dir: opt_str(&options, "llm_transcript_dir"),
skill_registry,
skill_match,
working_files,
mcp_servers,
mcp_clients: Default::default(),
autonomy_budget,
},
)
.await?;
Ok(json_to_vm_value(&result))
});
register_llm_stream(vm);
conversation::register_conversation_builtins(vm);
config_builtins::register_config_builtins(vm);
cost::register_cost_builtins(vm);
register_llm_mock_builtins(vm);
transcript_stats::register_transcript_builtins(vm);
vm.register_builtin("agent_trace", |_args, _out| {
let events = trace::peek_agent_trace();
let list: Vec<VmValue> = events
.iter()
.filter_map(|e| serde_json::to_value(e).ok())
.map(|v| json_to_vm_value(&v))
.collect();
Ok(VmValue::List(Rc::new(list)))
});
vm.register_builtin("agent_trace_summary", |_args, _out| {
let summary = trace::agent_trace_summary();
Ok(json_to_vm_value(&summary))
});
}
fn register_llm_mock_builtins(vm: &mut Vm) {
use mock::{get_llm_mock_calls, push_llm_mock, reset_llm_mock_state, LlmMock, MockError};
vm.register_builtin("llm_mock", |args, _out| {
let config = match args.first() {
Some(VmValue::Dict(d)) => d,
_ => {
return Err(crate::value::VmError::Runtime(
"llm_mock: expected a dict argument".to_string(),
))
}
};
let text = config.get("text").map(|v| v.display()).unwrap_or_default();
let tool_calls = match config.get("tool_calls") {
Some(VmValue::List(list)) => list
.iter()
.map(helpers::vm_value_to_json)
.collect::<Vec<_>>(),
_ => Vec::new(),
};
let match_pattern = config.get("match").and_then(|v| {
if matches!(v, VmValue::Nil) {
None
} else {
Some(v.display())
}
});
let consume_on_match = matches!(config.get("consume_match"), Some(VmValue::Bool(true)));
let input_tokens = config.get("input_tokens").and_then(|v| v.as_int());
let output_tokens = config.get("output_tokens").and_then(|v| v.as_int());
let cache_read_tokens = config.get("cache_read_tokens").and_then(|v| v.as_int());
let cache_write_tokens = config
.get("cache_write_tokens")
.and_then(|v| v.as_int())
.or_else(|| {
config
.get("cache_creation_input_tokens")
.and_then(|v| v.as_int())
});
let thinking = config.get("thinking").and_then(|v| {
if matches!(v, VmValue::Nil) {
None
} else {
Some(v.display())
}
});
let thinking_summary = config.get("thinking_summary").and_then(|v| {
if matches!(v, VmValue::Nil) {
None
} else {
Some(v.display())
}
});
let stop_reason = config.get("stop_reason").and_then(|v| {
if matches!(v, VmValue::Nil) {
None
} else {
Some(v.display())
}
});
let model = config
.get("model")
.map(|v| v.display())
.unwrap_or_else(|| "mock".to_string());
let error = match config.get("error") {
None | Some(VmValue::Nil) => None,
Some(VmValue::Dict(err_dict)) => {
let category_str = err_dict
.get("category")
.map(|v| v.display())
.unwrap_or_default();
if category_str.is_empty() {
return Err(crate::value::VmError::Runtime(
"llm_mock: error.category is required".to_string(),
));
}
let category = crate::value::ErrorCategory::parse(&category_str);
if category.as_str() != category_str {
return Err(crate::value::VmError::Runtime(format!(
"llm_mock: unknown error category `{category_str}`",
)));
}
let message = err_dict
.get("message")
.map(|v| v.display())
.unwrap_or_default();
let retry_after_ms = match err_dict.get("retry_after_ms") {
None | Some(VmValue::Nil) => None,
Some(v) => match v.as_int() {
Some(n) if n >= 0 => Some(n as u64),
_ => {
return Err(crate::value::VmError::Runtime(
"llm_mock: error.retry_after_ms must be a non-negative int"
.to_string(),
));
}
},
};
Some(MockError {
category,
message,
retry_after_ms,
})
}
_ => {
return Err(crate::value::VmError::Runtime(
"llm_mock: error must be a dict {category, message, retry_after_ms?}"
.to_string(),
));
}
};
push_llm_mock(LlmMock {
text,
tool_calls,
match_pattern,
consume_on_match,
input_tokens,
output_tokens,
cache_read_tokens,
cache_write_tokens,
thinking,
thinking_summary,
stop_reason,
model,
provider: None,
blocks: None,
error,
});
Ok(VmValue::Nil)
});
vm.register_builtin("llm_mock_calls", |_args, _out| {
let calls = get_llm_mock_calls();
let result: Vec<VmValue> = calls
.iter()
.map(|c| {
let mut dict = std::collections::BTreeMap::new();
let messages: Vec<VmValue> = c.messages.iter().map(json_to_vm_value).collect();
dict.insert("messages".to_string(), VmValue::List(Rc::new(messages)));
dict.insert(
"system".to_string(),
match &c.system {
Some(s) => VmValue::String(Rc::from(s.as_str())),
None => VmValue::Nil,
},
);
dict.insert(
"tools".to_string(),
match &c.tools {
Some(t) => {
let tools: Vec<VmValue> = t.iter().map(json_to_vm_value).collect();
VmValue::List(Rc::new(tools))
}
None => VmValue::Nil,
},
);
dict.insert("thinking".to_string(), json_to_vm_value(&c.thinking));
VmValue::Dict(Rc::new(dict))
})
.collect();
Ok(VmValue::List(Rc::new(result)))
});
vm.register_builtin("llm_mock_clear", |_args, _out| {
reset_llm_mock_state();
Ok(VmValue::Nil)
});
vm.register_builtin("llm_mock_push_scope", |_args, _out| {
mock::push_llm_mock_scope();
Ok(VmValue::Nil)
});
vm.register_builtin("llm_mock_pop_scope", |_args, _out| {
if !mock::pop_llm_mock_scope() {
return Err(crate::value::VmError::Thrown(VmValue::String(Rc::from(
"llm_mock_pop_scope: no scope to pop",
))));
}
Ok(VmValue::Nil)
});
}
fn register_llm_stream(vm: &mut Vm) {
vm.register_async_builtin("llm_stream", |args| async move {
let opts = extract_llm_options(&args)?;
let provider = opts.provider.clone();
let prompt_text = opts
.messages
.last()
.and_then(|m| m["content"].as_str())
.unwrap_or("")
.to_string();
let (tx, rx) = tokio::sync::mpsc::channel::<VmValue>(64);
let closed = Arc::new(std::sync::atomic::AtomicBool::new(false));
let closed_clone = closed.clone();
#[allow(clippy::arc_with_non_send_sync)]
let tx_arc = Arc::new(tx);
let tx_for_task = tx_arc.clone();
tokio::task::spawn_local(async move {
if provider == "mock" {
let words: Vec<&str> = prompt_text.split_whitespace().collect();
for word in &words {
let _ = tx_for_task.send(VmValue::String(Rc::from(*word))).await;
}
closed_clone.store(true, std::sync::atomic::Ordering::Relaxed);
return;
}
let result = vm_stream_llm(&opts, &tx_for_task).await;
closed_clone.store(true, std::sync::atomic::Ordering::Relaxed);
if let Err(e) = result {
let _ = tx_for_task
.send(VmValue::String(Rc::from(format!("error: {e}"))))
.await;
}
});
#[allow(clippy::arc_with_non_send_sync)]
let handle = VmChannelHandle {
name: Rc::from("llm_stream"),
sender: tx_arc,
receiver: Arc::new(tokio::sync::Mutex::new(rx)),
closed,
};
Ok(VmValue::Channel(handle))
});
}
fn llm_stream_chunk(
delta: &str,
visible_delta: &str,
partial: &str,
finish_reason: Option<&str>,
) -> VmValue {
let mut dict = std::collections::BTreeMap::new();
dict.insert(
"delta".to_string(),
VmValue::String(Rc::from(delta.to_string())),
);
dict.insert(
"visible_delta".to_string(),
VmValue::String(Rc::from(visible_delta.to_string())),
);
dict.insert(
"partial".to_string(),
VmValue::String(Rc::from(partial.to_string())),
);
dict.insert("role".to_string(), VmValue::String(Rc::from("assistant")));
dict.insert(
"finish_reason".to_string(),
finish_reason
.map(|reason| VmValue::String(Rc::from(reason.to_string())))
.unwrap_or(VmValue::Nil),
);
VmValue::Dict(Rc::new(dict))
}
async fn forward_llm_stream_delta(
stream_tx: &tokio::sync::mpsc::Sender<Result<VmValue, VmError>>,
visible: &mut crate::visible_text::VisibleTextState,
delta: String,
) -> Result<String, ()> {
let (partial, visible_delta) = visible.push(&delta, true);
let chunk = llm_stream_chunk(&delta, &visible_delta, &partial, None);
stream_tx.send(Ok(chunk)).await.map_err(|_| ())?;
Ok(partial)
}
async fn send_llm_stream_error(
stream_tx: &tokio::sync::mpsc::Sender<Result<VmValue, VmError>>,
err: VmError,
provider: &str,
model: &str,
) {
let wrapped = VmError::Thrown(build_llm_error_dict(&err, provider, model));
let _ = stream_tx.send(Err(wrapped)).await;
}
async fn llm_stream_call_impl(args: Vec<VmValue>) -> Result<VmValue, VmError> {
let opts = extract_llm_options(&args)?;
let provider = opts.provider.clone();
let model = opts.model.clone();
let (stream_tx, stream_rx) = tokio::sync::mpsc::channel::<Result<VmValue, VmError>>(64);
let (delta_tx, mut delta_rx) = tokio::sync::mpsc::unbounded_channel::<String>();
let cancel = VmStreamCancel::new();
let mut cancel_rx = cancel.subscribe();
tokio::task::spawn_local(async move {
let mut visible = crate::visible_text::VisibleTextState::default();
let mut partial = String::new();
let mut deltas_open = true;
let mut llm_task = tokio::task::spawn_local(async move {
api::vm_call_llm_full_streaming(&opts, delta_tx).await
});
loop {
tokio::select! {
_ = cancel_rx.changed() => {
llm_task.abort();
break;
}
_ = stream_tx.closed() => {
llm_task.abort();
break;
}
maybe_delta = delta_rx.recv(), if deltas_open => {
match maybe_delta {
Some(delta) => {
match forward_llm_stream_delta(&stream_tx, &mut visible, delta).await {
Ok(next_partial) => partial = next_partial,
Err(()) => {
llm_task.abort();
break;
}
}
}
None => deltas_open = false,
}
}
joined = &mut llm_task => {
while let Ok(delta) = delta_rx.try_recv() {
match forward_llm_stream_delta(&stream_tx, &mut visible, delta).await {
Ok(next_partial) => partial = next_partial,
Err(()) => break,
}
}
match joined {
Ok(Ok(result)) => {
let final_chunk = llm_stream_chunk(
"",
"",
&partial,
result.stop_reason.as_deref(),
);
let _ = stream_tx.send(Ok(final_chunk)).await;
}
Ok(Err(err)) => {
send_llm_stream_error(&stream_tx, err, &provider, &model).await;
}
Err(join_err) if join_err.is_cancelled() => {}
Err(join_err) => {
let err = VmError::Thrown(VmValue::String(Rc::from(format!(
"llm_stream_call background task failed: {join_err}"
))));
send_llm_stream_error(&stream_tx, err, &provider, &model).await;
}
}
break;
}
}
}
});
Ok(VmValue::Stream(VmStream {
done: Rc::new(std::cell::Cell::new(false)),
receiver: Rc::new(tokio::sync::Mutex::new(stream_rx)),
cancel: Some(cancel),
}))
}
#[cfg(test)]
mod tests {
use super::api::LlmCallOptions;
use super::{
build_schema_nudge, compute_validation_errors, execute_llm_call, reset_llm_state,
structured_output_errors, SchemaNudge,
};
use crate::llm::mock;
use crate::value::VmValue;
use std::rc::Rc;
fn base_opts() -> LlmCallOptions {
LlmCallOptions {
provider: "mock".to_string(),
model: "mock".to_string(),
api_key: String::new(),
route_policy: super::api::LlmRoutePolicy::Manual,
fallback_chain: Vec::new(),
route_fallbacks: Vec::new(),
routing_decision: None,
session_id: None,
messages: Vec::new(),
system: None,
transcript_summary: None,
max_tokens: 128,
temperature: None,
top_p: None,
top_k: None,
stop: None,
seed: None,
frequency_penalty: None,
presence_penalty: None,
output_format: super::api::OutputFormat::JsonObject,
response_format: Some("json".to_string()),
json_schema: None,
output_schema: Some(serde_json::json!({
"type": "object",
"properties": {
"name": {"type": "string"}
}
})),
output_validation: Some("error".to_string()),
thinking: crate::llm::api::ThinkingConfig::Disabled,
anthropic_beta_features: Vec::new(),
vision: false,
tools: None,
native_tools: None,
tool_choice: None,
tool_search: None,
cache: false,
stream: true,
timeout: None,
idle_timeout: None,
provider_overrides: None,
budget: None,
prefill: None,
structural_experiment: None,
applied_structural_experiment: None,
}
}
#[test]
fn output_validation_accepts_matching_schema() {
let opts = base_opts();
let mut map = std::collections::BTreeMap::new();
map.insert("name".to_string(), VmValue::String(Rc::from("Ada")));
let data = VmValue::Dict(Rc::new(map));
let errors = compute_validation_errors(&data, &opts);
assert!(errors.is_empty(), "schema should pass: {errors:?}");
}
#[test]
fn output_validation_rejects_mismatched_schema_in_error_mode() {
let opts = base_opts();
let mut map = std::collections::BTreeMap::new();
map.insert("name".to_string(), VmValue::Int(42));
let data = VmValue::Dict(Rc::new(map));
let errors = compute_validation_errors(&data, &opts);
assert!(!errors.is_empty(), "schema should fail");
assert!(errors.join(" ").contains("string"));
}
#[test]
fn structured_output_errors_report_missing_json() {
let result = VmValue::Dict(Rc::new(std::collections::BTreeMap::from([
(
"text".to_string(),
VmValue::String(Rc::from("Analyzing the task")),
),
(
"protocol_violations".to_string(),
VmValue::List(Rc::new(vec![VmValue::String(Rc::from(
"stray text outside response tags",
))])),
),
(
"stop_reason".to_string(),
VmValue::String(Rc::from("length")),
),
])));
let errors = structured_output_errors(&result, &base_opts());
assert!(errors.iter().any(|err| err.contains("parseable JSON")));
assert!(errors.iter().any(|err| err.contains("protocol violations")));
assert!(errors.iter().any(|err| err.contains("token limit")));
}
#[test]
fn schema_retry_nudge_includes_nested_array_object_keys() {
let schema = serde_json::json!({
"type": "object",
"required": ["summary", "findings"],
"additionalProperties": false,
"properties": {
"summary": {"type": "string"},
"findings": {
"type": "array",
"items": {
"type": "object",
"additionalProperties": false,
"properties": {
"severity": {"type": "string"},
"title": {"type": "string"},
"detail": {"type": "string"},
"file": {"type": ["string", "null"]},
"line_start": {"type": ["integer", "null"]}
}
}
}
}
});
let nudge = build_schema_nudge(
&["findings[0].description is not allowed".to_string()],
Some(&schema),
&SchemaNudge::Auto,
);
assert!(nudge.contains("Required keys: summary, findings."));
assert!(nudge.contains("Expected JSON schema shape:"));
assert!(nudge.contains("findings[] object allowed keys"));
assert!(nudge.contains("detail"));
assert!(nudge.contains("line_start"));
}
#[tokio::test(flavor = "current_thread")]
async fn execute_llm_call_retries_when_response_has_no_json_data() {
reset_llm_state();
mock::push_llm_mock(mock::LlmMock {
text: "Analyzing the task carefully".to_string(),
tool_calls: Vec::new(),
match_pattern: None,
consume_on_match: false,
input_tokens: None,
output_tokens: None,
cache_read_tokens: None,
cache_write_tokens: None,
thinking: None,
thinking_summary: None,
stop_reason: None,
model: "mock".to_string(),
provider: Some("mock".to_string()),
blocks: None,
error: None,
});
mock::push_llm_mock(mock::LlmMock {
text: "{\"name\":\"Ada\"}".to_string(),
tool_calls: Vec::new(),
match_pattern: None,
consume_on_match: false,
input_tokens: None,
output_tokens: None,
cache_read_tokens: None,
cache_write_tokens: None,
thinking: None,
thinking_summary: None,
stop_reason: None,
model: "mock".to_string(),
provider: Some("mock".to_string()),
blocks: None,
error: None,
});
let response = execute_llm_call(base_opts(), None, None)
.await
.expect("structured retry should recover");
let dict = response.as_dict().expect("dict response");
let data = dict
.get("data")
.and_then(VmValue::as_dict)
.expect("parsed data");
assert_eq!(
data.get("name").map(VmValue::display).as_deref(),
Some("Ada")
);
assert_eq!(mock::get_llm_mock_calls().len(), 2);
}
}