use crate::config::AutonomyConfig;
use crate::security::AutonomyLevel;
use crate::trust::{CorrectionType, TrustTracker};
use chrono::Utc;
use parking_lot::Mutex;
use serde::{Deserialize, Serialize};
use std::collections::HashSet;
use std::io::{self, BufRead, Write};
use std::sync::Arc;
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct ApprovalRequest {
pub tool_name: String,
pub arguments: serde_json::Value,
}
#[derive(Debug, Clone, Copy, PartialEq, Eq, Serialize, Deserialize)]
#[serde(rename_all = "lowercase")]
pub enum ApprovalResponse {
Yes,
No,
Always,
}
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct ApprovalLogEntry {
pub timestamp: String,
pub tool_name: String,
pub arguments_summary: String,
pub decision: ApprovalResponse,
pub channel: String,
}
pub struct ApprovalManager {
auto_approve: HashSet<String>,
always_ask: HashSet<String>,
autonomy_level: AutonomyLevel,
non_interactive: bool,
session_allowlist: Mutex<HashSet<String>>,
audit_log: Mutex<Vec<ApprovalLogEntry>>,
trust: Option<Arc<Mutex<TrustTracker>>>,
}
impl ApprovalManager {
pub fn from_config(config: &AutonomyConfig) -> Self {
Self {
auto_approve: config.auto_approve.iter().cloned().collect(),
always_ask: config.always_ask.iter().cloned().collect(),
autonomy_level: config.level,
non_interactive: false,
session_allowlist: Mutex::new(HashSet::new()),
audit_log: Mutex::new(Vec::new()),
trust: None,
}
}
pub fn for_non_interactive(config: &AutonomyConfig) -> Self {
Self {
auto_approve: config.auto_approve.iter().cloned().collect(),
always_ask: config.always_ask.iter().cloned().collect(),
autonomy_level: config.level,
non_interactive: true,
session_allowlist: Mutex::new(HashSet::new()),
audit_log: Mutex::new(Vec::new()),
trust: None,
}
}
pub fn with_trust_tracker(mut self, tracker: Arc<Mutex<TrustTracker>>) -> Self {
self.trust = Some(tracker);
self
}
fn effective_autonomy(&self, domain: &str) -> AutonomyLevel {
match &self.trust {
Some(trust) => trust
.lock()
.effective_autonomy_level(domain, self.autonomy_level),
None => self.autonomy_level,
}
}
pub fn record_tool_success(&self, tool_name: &str) {
if let Some(trust) = &self.trust {
trust.lock().record_success(tool_name);
}
}
pub fn record_tool_correction(
&self,
tool_name: &str,
correction_type: CorrectionType,
description: &str,
) {
if let Some(trust) = &self.trust {
trust
.lock()
.record_correction(tool_name, correction_type, description);
}
}
pub fn is_non_interactive(&self) -> bool {
self.non_interactive
}
pub fn needs_approval(&self, tool_name: &str) -> bool {
let level = self.effective_autonomy(tool_name);
if level == AutonomyLevel::Full {
return false;
}
if level == AutonomyLevel::ReadOnly {
if self.autonomy_level == AutonomyLevel::ReadOnly {
return false;
}
return true;
}
if self.always_ask.contains("*") || self.always_ask.contains(tool_name) {
return true;
}
if self.non_interactive && tool_name == "shell" {
return false;
}
if self.non_interactive && tool_name.contains("__") {
return false;
}
if self.auto_approve.contains("*") || self.auto_approve.contains(tool_name) {
return false;
}
let allowlist = self.session_allowlist.lock();
if allowlist.contains(tool_name) {
return false;
}
true
}
pub fn record_decision(
&self,
tool_name: &str,
args: &serde_json::Value,
decision: ApprovalResponse,
channel: &str,
) {
if decision == ApprovalResponse::Always {
let mut allowlist = self.session_allowlist.lock();
allowlist.insert(tool_name.to_string());
}
if decision == ApprovalResponse::No {
if let Some(trust) = &self.trust {
trust.lock().record_correction(
tool_name,
CorrectionType::UserOverride,
&format!("approval denied via {channel}"),
);
}
}
let summary = summarize_args(args);
let entry = ApprovalLogEntry {
timestamp: Utc::now().to_rfc3339(),
tool_name: tool_name.to_string(),
arguments_summary: summary,
decision,
channel: channel.to_string(),
};
let mut log = self.audit_log.lock();
log.push(entry);
}
pub fn audit_log(&self) -> Vec<ApprovalLogEntry> {
self.audit_log.lock().clone()
}
pub fn session_allowlist(&self) -> HashSet<String> {
self.session_allowlist.lock().clone()
}
pub fn prompt_cli(&self, request: &ApprovalRequest) -> ApprovalResponse {
prompt_cli_interactive(request)
}
}
fn prompt_cli_interactive(request: &ApprovalRequest) -> ApprovalResponse {
let summary = summarize_args(&request.arguments);
eprintln!();
eprintln!("🔧 Agent wants to execute: {}", request.tool_name);
eprintln!(" {summary}");
eprint!(" [Y]es / [N]o / [A]lways for {}: ", request.tool_name);
let _ = io::stderr().flush();
let stdin = io::stdin();
let mut line = String::new();
if stdin.lock().read_line(&mut line).is_err() {
return ApprovalResponse::No;
}
match line.trim().to_ascii_lowercase().as_str() {
"y" | "yes" => ApprovalResponse::Yes,
"a" | "always" => ApprovalResponse::Always,
_ => ApprovalResponse::No,
}
}
fn summarize_args(args: &serde_json::Value) -> String {
match args {
serde_json::Value::Object(map) => {
let parts: Vec<String> = map
.iter()
.map(|(k, v)| {
let val = match v {
serde_json::Value::String(s) => truncate_for_summary(s, 80),
other => {
let s = other.to_string();
truncate_for_summary(&s, 80)
}
};
format!("{k}: {val}")
})
.collect();
parts.join(", ")
}
other => {
let s = other.to_string();
truncate_for_summary(&s, 120)
}
}
}
fn truncate_for_summary(input: &str, max_chars: usize) -> String {
let mut chars = input.chars();
let truncated: String = chars.by_ref().take(max_chars).collect();
if chars.next().is_some() {
format!("{truncated}…")
} else {
input.to_string()
}
}
#[cfg(test)]
mod tests {
use super::*;
use crate::config::AutonomyConfig;
fn supervised_config() -> AutonomyConfig {
AutonomyConfig {
level: AutonomyLevel::Supervised,
auto_approve: vec!["file_read".into(), "memory_recall".into()],
always_ask: vec!["shell".into()],
..AutonomyConfig::default()
}
}
fn full_config() -> AutonomyConfig {
AutonomyConfig {
level: AutonomyLevel::Full,
..AutonomyConfig::default()
}
}
#[test]
fn auto_approve_tools_skip_prompt() {
let mgr = ApprovalManager::from_config(&supervised_config());
assert!(!mgr.needs_approval("file_read"));
assert!(!mgr.needs_approval("memory_recall"));
}
#[test]
fn always_ask_tools_always_prompt() {
let mgr = ApprovalManager::from_config(&supervised_config());
assert!(mgr.needs_approval("shell"));
}
#[test]
fn unknown_tool_needs_approval_in_supervised() {
let mgr = ApprovalManager::from_config(&supervised_config());
assert!(mgr.needs_approval("file_write"));
assert!(mgr.needs_approval("http_request"));
}
#[test]
fn full_autonomy_never_prompts() {
let mgr = ApprovalManager::from_config(&full_config());
assert!(!mgr.needs_approval("shell"));
assert!(!mgr.needs_approval("file_write"));
assert!(!mgr.needs_approval("anything"));
}
#[test]
fn readonly_never_prompts() {
let config = AutonomyConfig {
level: AutonomyLevel::ReadOnly,
..AutonomyConfig::default()
};
let mgr = ApprovalManager::from_config(&config);
assert!(!mgr.needs_approval("shell"));
}
#[test]
fn always_response_adds_to_session_allowlist() {
let mgr = ApprovalManager::from_config(&supervised_config());
assert!(mgr.needs_approval("file_write"));
mgr.record_decision(
"file_write",
&serde_json::json!({"path": "test.txt"}),
ApprovalResponse::Always,
"cli",
);
assert!(!mgr.needs_approval("file_write"));
}
#[test]
fn always_ask_overrides_session_allowlist() {
let mgr = ApprovalManager::from_config(&supervised_config());
mgr.record_decision(
"shell",
&serde_json::json!({"command": "ls"}),
ApprovalResponse::Always,
"cli",
);
assert!(mgr.needs_approval("shell"));
}
#[test]
fn yes_response_does_not_add_to_allowlist() {
let mgr = ApprovalManager::from_config(&supervised_config());
mgr.record_decision(
"file_write",
&serde_json::json!({}),
ApprovalResponse::Yes,
"cli",
);
assert!(mgr.needs_approval("file_write"));
}
#[test]
fn trust_regression_downgrades_full_to_supervised_approval() {
use crate::trust::{CorrectionType, TrustConfig, TrustTracker};
let config = AutonomyConfig {
level: AutonomyLevel::Full,
..AutonomyConfig::default()
};
let trust = Arc::new(Mutex::new(TrustTracker::new(TrustConfig::default())));
let mgr = ApprovalManager::from_config(&config).with_trust_tracker(Arc::clone(&trust));
assert!(!mgr.needs_approval("shell"));
for _ in 0..10 {
trust.lock().record_correction(
"shell",
CorrectionType::UserOverride,
"test regression",
);
}
assert!(mgr.needs_approval("shell"));
assert!(!mgr.needs_approval("file_write"));
}
#[test]
fn trust_regression_in_supervised_forces_prompt_not_silent_bypass() {
use crate::trust::{CorrectionType, TrustConfig, TrustTracker};
let trust = Arc::new(Mutex::new(TrustTracker::new(TrustConfig::default())));
let mgr = ApprovalManager::from_config(&supervised_config())
.with_trust_tracker(Arc::clone(&trust));
for _ in 0..7 {
trust
.lock()
.record_correction("file_write", CorrectionType::UserOverride, "test");
}
assert!(
mgr.needs_approval("file_write"),
"per-tool regression (Supervised→ReadOnly) must still prompt"
);
let readonly_config = AutonomyConfig {
level: AutonomyLevel::ReadOnly,
..AutonomyConfig::default()
};
let readonly_mgr =
ApprovalManager::from_config(&readonly_config).with_trust_tracker(Arc::clone(&trust));
assert!(!readonly_mgr.needs_approval("file_write"));
}
#[test]
fn denial_records_user_override_correction_when_trust_attached() {
use crate::trust::{TrustConfig, TrustTracker};
let trust = Arc::new(Mutex::new(TrustTracker::new(TrustConfig::default())));
let mgr = ApprovalManager::from_config(&supervised_config())
.with_trust_tracker(Arc::clone(&trust));
let before = trust.lock().get_score("file_write");
mgr.record_decision(
"file_write",
&serde_json::json!({"path": "x"}),
ApprovalResponse::No,
"cli",
);
let after = trust.lock().get_score("file_write");
assert!(after < before, "denial should reduce trust score");
}
#[test]
fn audit_log_records_decisions() {
let mgr = ApprovalManager::from_config(&supervised_config());
mgr.record_decision(
"shell",
&serde_json::json!({"command": "rm -rf ./build/"}),
ApprovalResponse::No,
"cli",
);
mgr.record_decision(
"file_write",
&serde_json::json!({"path": "out.txt", "content": "hello"}),
ApprovalResponse::Yes,
"cli",
);
let log = mgr.audit_log();
assert_eq!(log.len(), 2);
assert_eq!(log[0].tool_name, "shell");
assert_eq!(log[0].decision, ApprovalResponse::No);
assert_eq!(log[1].tool_name, "file_write");
assert_eq!(log[1].decision, ApprovalResponse::Yes);
}
#[test]
fn audit_log_contains_timestamp_and_channel() {
let mgr = ApprovalManager::from_config(&supervised_config());
mgr.record_decision(
"shell",
&serde_json::json!({"command": "ls"}),
ApprovalResponse::Yes,
"telegram",
);
let log = mgr.audit_log();
assert_eq!(log.len(), 1);
assert!(!log[0].timestamp.is_empty());
assert_eq!(log[0].channel, "telegram");
}
#[test]
fn summarize_args_object() {
let args = serde_json::json!({"command": "ls -la", "cwd": "/tmp"});
let summary = summarize_args(&args);
assert!(summary.contains("command: ls -la"));
assert!(summary.contains("cwd: /tmp"));
}
#[test]
fn summarize_args_truncates_long_values() {
let long_val = "x".repeat(200);
let args = serde_json::json!({ "content": long_val });
let summary = summarize_args(&args);
assert!(summary.contains('…'));
assert!(summary.len() < 200);
}
#[test]
fn summarize_args_unicode_safe_truncation() {
let long_val = "🦀".repeat(120);
let args = serde_json::json!({ "content": long_val });
let summary = summarize_args(&args);
assert!(summary.contains("content:"));
assert!(summary.contains('…'));
}
#[test]
fn summarize_args_non_object() {
let args = serde_json::json!("just a string");
let summary = summarize_args(&args);
assert!(summary.contains("just a string"));
}
#[test]
fn non_interactive_manager_reports_non_interactive() {
let mgr = ApprovalManager::for_non_interactive(&supervised_config());
assert!(mgr.is_non_interactive());
}
#[test]
fn interactive_manager_reports_interactive() {
let mgr = ApprovalManager::from_config(&supervised_config());
assert!(!mgr.is_non_interactive());
}
#[test]
fn non_interactive_auto_approve_tools_skip_approval() {
let mgr = ApprovalManager::for_non_interactive(&supervised_config());
assert!(!mgr.needs_approval("file_read"));
assert!(!mgr.needs_approval("memory_recall"));
}
#[test]
fn non_interactive_shell_skips_outer_approval_by_default() {
let mgr = ApprovalManager::for_non_interactive(&AutonomyConfig::default());
assert!(!mgr.needs_approval("shell"));
}
#[test]
fn non_interactive_always_ask_tools_need_approval() {
let mgr = ApprovalManager::for_non_interactive(&supervised_config());
assert!(mgr.needs_approval("shell"));
}
#[test]
fn non_interactive_unknown_tools_need_approval_in_supervised() {
let mgr = ApprovalManager::for_non_interactive(&supervised_config());
assert!(mgr.needs_approval("file_write"));
assert!(mgr.needs_approval("http_request"));
}
#[test]
fn non_interactive_full_autonomy_never_needs_approval() {
let mgr = ApprovalManager::for_non_interactive(&full_config());
assert!(!mgr.needs_approval("shell"));
assert!(!mgr.needs_approval("file_write"));
assert!(!mgr.needs_approval("anything"));
}
#[test]
fn non_interactive_readonly_never_needs_approval() {
let config = AutonomyConfig {
level: AutonomyLevel::ReadOnly,
..AutonomyConfig::default()
};
let mgr = ApprovalManager::for_non_interactive(&config);
assert!(!mgr.needs_approval("shell"));
}
#[test]
fn non_interactive_session_allowlist_still_works() {
let mgr = ApprovalManager::for_non_interactive(&supervised_config());
assert!(mgr.needs_approval("file_write"));
mgr.record_decision(
"file_write",
&serde_json::json!({"path": "test.txt"}),
ApprovalResponse::Always,
"telegram",
);
assert!(!mgr.needs_approval("file_write"));
}
#[test]
fn non_interactive_always_ask_overrides_session_allowlist() {
let mgr = ApprovalManager::for_non_interactive(&supervised_config());
mgr.record_decision(
"shell",
&serde_json::json!({"command": "ls"}),
ApprovalResponse::Always,
"telegram",
);
assert!(mgr.needs_approval("shell"));
}
#[test]
fn approval_response_serde_roundtrip() {
let json = serde_json::to_string(&ApprovalResponse::Always).unwrap();
assert_eq!(json, "\"always\"");
let parsed: ApprovalResponse = serde_json::from_str("\"no\"").unwrap();
assert_eq!(parsed, ApprovalResponse::No);
}
#[test]
fn approval_request_serde() {
let req = ApprovalRequest {
tool_name: "shell".into(),
arguments: serde_json::json!({"command": "echo hi"}),
};
let json = serde_json::to_string(&req).unwrap();
let parsed: ApprovalRequest = serde_json::from_str(&json).unwrap();
assert_eq!(parsed.tool_name, "shell");
}
#[test]
fn non_interactive_allows_default_auto_approve_tools() {
let config = AutonomyConfig::default();
let mgr = ApprovalManager::for_non_interactive(&config);
for tool in &config.auto_approve {
assert!(
!mgr.needs_approval(tool),
"default auto_approve tool '{tool}' should not need approval in non-interactive mode"
);
}
}
#[test]
fn non_interactive_denies_unknown_tools() {
let config = AutonomyConfig::default();
let mgr = ApprovalManager::for_non_interactive(&config);
assert!(
mgr.needs_approval("some_unknown_tool"),
"unknown tool should need approval"
);
}
#[test]
fn non_interactive_weather_is_auto_approved() {
let config = AutonomyConfig::default();
let mgr = ApprovalManager::for_non_interactive(&config);
assert!(
!mgr.needs_approval("weather"),
"weather tool must not need approval — it is in the default auto_approve list"
);
}
#[test]
fn always_ask_overrides_auto_approve() {
let mut config = AutonomyConfig::default();
config.always_ask = vec!["weather".into()];
let mgr = ApprovalManager::for_non_interactive(&config);
assert!(
mgr.needs_approval("weather"),
"always_ask must override auto_approve"
);
}
#[test]
fn non_interactive_auto_approves_mcp_tools() {
let config = AutonomyConfig::default();
let mgr = ApprovalManager::for_non_interactive(&config);
assert!(
!mgr.needs_approval("kumiho-memory__kumiho_memory_engage"),
"MCP-namespaced tools should be auto-approved in non-interactive mode"
);
assert!(
!mgr.needs_approval("operator-tools__create_agent"),
"MCP-namespaced tools should be auto-approved in non-interactive mode"
);
}
#[test]
fn interactive_mcp_tools_still_need_approval() {
let config = supervised_config();
let mgr = ApprovalManager::from_config(&config);
assert!(
mgr.needs_approval("kumiho-memory__kumiho_memory_engage"),
"MCP tools should still need approval in interactive supervised mode"
);
}
#[test]
fn non_interactive_always_ask_overrides_mcp_auto_approve() {
let mut config = AutonomyConfig::default();
config.always_ask = vec!["kumiho-memory__kumiho_memory_engage".into()];
let mgr = ApprovalManager::for_non_interactive(&config);
assert!(
mgr.needs_approval("kumiho-memory__kumiho_memory_engage"),
"always_ask should override MCP auto-approve"
);
}
}