Skip to main content

harn_vm/orchestration/
mod.rs

1use std::path::PathBuf;
2use std::{cell::RefCell, thread_local};
3
4use serde::{Deserialize, Serialize};
5
6use crate::llm::vm_value_to_json;
7use crate::value::{VmError, VmValue};
8
9pub(crate) fn now_rfc3339() -> String {
10    use std::time::{SystemTime, UNIX_EPOCH};
11    let ts = SystemTime::now()
12        .duration_since(UNIX_EPOCH)
13        .unwrap_or_default()
14        .as_secs();
15    format!("{ts}")
16}
17
18pub(crate) fn new_id(prefix: &str) -> String {
19    format!("{prefix}_{}", uuid::Uuid::now_v7())
20}
21
22pub(crate) fn default_run_dir() -> PathBuf {
23    let base = std::env::current_dir().unwrap_or_else(|_| PathBuf::from("."));
24    crate::runtime_paths::run_root(&base)
25}
26
27mod hooks;
28pub use hooks::*;
29
30mod command_policy;
31pub use command_policy::*;
32
33mod compaction;
34pub use compaction::*;
35
36mod artifacts;
37pub use artifacts::*;
38
39mod assemble;
40pub use assemble::*;
41
42mod handoffs;
43pub use handoffs::*;
44
45mod friction;
46pub use friction::*;
47
48mod crystallize;
49pub use crystallize::*;
50
51mod policy;
52pub use policy::*;
53
54mod workflow;
55pub use workflow::*;
56
57mod records;
58pub use records::*;
59
60thread_local! {
61    static CURRENT_MUTATION_SESSION: RefCell<Option<MutationSessionRecord>> = const { RefCell::new(None) };
62    /// Workflow-level skill context, installed by `workflow_execute` so
63    /// every per-node agent loop constructed inside `execute_stage_node`
64    /// can pick up the same `skills:` / `skill_match:` registry without
65    /// threading a new parameter through every helper. Cleared on
66    /// workflow exit (success or error) by `WorkflowSkillContextGuard`.
67    static CURRENT_WORKFLOW_SKILL_CONTEXT: RefCell<Option<WorkflowSkillContext>> = const { RefCell::new(None) };
68}
69
70/// Skill wiring threaded from `workflow_execute` into the per-stage
71/// agent loops via thread-local context. `VmValue` wraps `Rc` and is
72/// not `Send`, so we store it in a thread-local rather than a mutex —
73/// the workflow runner pins itself to one task via `LocalSet`, so
74/// every stage observes the same context.
75#[derive(Clone, Default)]
76pub struct WorkflowSkillContext {
77    pub registry: Option<VmValue>,
78    pub match_config: Option<VmValue>,
79}
80
81pub fn install_workflow_skill_context(context: Option<WorkflowSkillContext>) {
82    CURRENT_WORKFLOW_SKILL_CONTEXT.with(|slot| {
83        *slot.borrow_mut() = context;
84    });
85}
86
87pub fn current_workflow_skill_context() -> Option<WorkflowSkillContext> {
88    CURRENT_WORKFLOW_SKILL_CONTEXT.with(|slot| slot.borrow().clone())
89}
90
91/// RAII guard that clears the workflow skill context on drop. Paired
92/// with `install_workflow_skill_context` at the top of `execute_workflow`
93/// so the context never leaks past a workflow's scope.
94pub struct WorkflowSkillContextGuard;
95
96impl Drop for WorkflowSkillContextGuard {
97    fn drop(&mut self) {
98        install_workflow_skill_context(None);
99    }
100}
101
102#[derive(Clone, Debug, Default, Serialize, Deserialize, PartialEq, Eq)]
103#[serde(default)]
104pub struct MutationSessionRecord {
105    pub session_id: String,
106    pub parent_session_id: Option<String>,
107    pub run_id: Option<String>,
108    pub worker_id: Option<String>,
109    pub execution_kind: Option<String>,
110    pub mutation_scope: String,
111    /// Declarative per-tool approval policy for this session. When `None`,
112    /// no policy-driven approval is requested; the session update stream
113    /// remains the only host-observable surface for tool dispatch.
114    pub approval_policy: Option<ToolApprovalPolicy>,
115}
116
117impl MutationSessionRecord {
118    pub fn normalize(mut self) -> Self {
119        if self.session_id.is_empty() {
120            self.session_id = new_id("session");
121        }
122        if self.mutation_scope.is_empty() {
123            self.mutation_scope = "read_only".to_string();
124        }
125        self
126    }
127}
128
129pub fn install_current_mutation_session(session: Option<MutationSessionRecord>) {
130    CURRENT_MUTATION_SESSION.with(|slot| {
131        *slot.borrow_mut() = session.map(MutationSessionRecord::normalize);
132    });
133}
134
135pub fn current_mutation_session() -> Option<MutationSessionRecord> {
136    CURRENT_MUTATION_SESSION.with(|slot| slot.borrow().clone())
137}
138pub(crate) fn parse_json_payload<T: for<'de> Deserialize<'de>>(
139    json: serde_json::Value,
140    label: &str,
141) -> Result<T, VmError> {
142    let payload = json.to_string();
143    let mut deserializer = serde_json::Deserializer::from_str(&payload);
144    let mut tracker = serde_path_to_error::Track::new();
145    let path_deserializer = serde_path_to_error::Deserializer::new(&mut deserializer, &mut tracker);
146    T::deserialize(path_deserializer).map_err(|error| {
147        let snippet = if payload.len() > 600 {
148            format!("{}...", &payload[..600])
149        } else {
150            payload.clone()
151        };
152        VmError::Runtime(format!(
153            "{label} parse error at {}: {} | payload={}",
154            tracker.path(),
155            error,
156            snippet
157        ))
158    })
159}
160
161pub(crate) fn parse_json_value<T: for<'de> Deserialize<'de>>(
162    value: &VmValue,
163) -> Result<T, VmError> {
164    parse_json_payload(vm_value_to_json(value), "orchestration")
165}
166
167#[cfg(test)]
168mod tests;