1use std::collections::{BTreeMap, BTreeSet};
27use std::path::Path;
28
29use serde::{Deserialize, Serialize};
30use serde_json::{json, Value as JsonValue};
31use sha2::{Digest, Sha256};
32
33use super::crystallize::{
34 synthesize_candidate_from_trace, CrystallizationAction, CrystallizationApproval,
35 CrystallizationArtifacts, CrystallizationSideEffect, CrystallizationTrace, CrystallizeOptions,
36 RecoveryFeedbackSummary, SegmentSummary, WorkflowCandidateParameter,
37};
38use crate::value::VmError;
39
40pub const RELEASE_FIXTURE_SCHEMA: &str = "release_harn.crystallization_input.v1";
46
47const MANIFEST_FILE: &str = "manifest.json";
48const DETERMINISTIC_EVENTS_FILE: &str = "deterministic-events.jsonl";
49const AGENT_EVENTS_FILE: &str = "agent-events.jsonl";
50const TOOL_OBSERVATIONS_FILE: &str = "tool-observations.jsonl";
51
52#[derive(Clone, Debug, Default, Serialize, Deserialize)]
58pub struct ReleaseFixtureManifest {
59 pub schema_version: String,
60 pub kind: String,
61 pub generated_by: String,
62 pub generated_at: String,
63 pub run_id: String,
64 pub source_issue: Option<String>,
65 pub consumer_issue: Option<String>,
66 pub release: ReleaseFixtureIdentity,
67 #[serde(skip_serializing, skip_deserializing)]
71 pub raw: Option<JsonValue>,
72}
73
74#[derive(Clone, Debug, Default, Serialize, Deserialize)]
75pub struct ReleaseFixtureIdentity {
76 pub repo: String,
77 pub mode: String,
78 #[serde(default)]
79 pub mock: bool,
80 pub current_version: String,
81 pub next_version: String,
82 pub starting_branch: String,
83 pub target_release_branch: String,
84 pub base_branch: String,
85 pub latest_tag: String,
86}
87
88#[derive(Clone, Debug, Default, Serialize, Deserialize)]
91pub struct ReleaseFixtureEvent {
92 pub schema_version: String,
93 pub event_type: String,
94 pub source: String,
95 #[serde(default)]
96 pub timestamp: Option<String>,
97 #[serde(default)]
98 pub data: JsonValue,
99}
100
101#[derive(Clone, Debug, Default)]
106pub struct ReleaseFixture {
107 pub manifest: ReleaseFixtureManifest,
108 pub deterministic_events: Vec<ReleaseFixtureEvent>,
109 pub agent_events: Vec<ReleaseFixtureEvent>,
110 pub tool_observations: Vec<ReleaseFixtureEvent>,
111}
112
113pub fn load_release_fixture(dir: &Path) -> Result<ReleaseFixture, VmError> {
117 let manifest_path = dir.join(MANIFEST_FILE);
118 let manifest_bytes = std::fs::read(&manifest_path).map_err(|error| {
119 VmError::Runtime(format!(
120 "failed to read release fixture manifest {}: {error}",
121 manifest_path.display()
122 ))
123 })?;
124 let manifest_json: JsonValue = serde_json::from_slice(&manifest_bytes).map_err(|error| {
125 VmError::Runtime(format!(
126 "failed to parse release fixture manifest {}: {error}",
127 manifest_path.display()
128 ))
129 })?;
130 let mut manifest: ReleaseFixtureManifest = serde_json::from_value(manifest_json.clone())
131 .map_err(|error| {
132 VmError::Runtime(format!(
133 "failed to decode release fixture manifest {}: {error}",
134 manifest_path.display()
135 ))
136 })?;
137 manifest.raw = Some(manifest_json);
138
139 if manifest.schema_version != RELEASE_FIXTURE_SCHEMA {
140 return Err(VmError::Runtime(format!(
141 "release fixture manifest {} has unrecognized schema_version {:?} (expected {})",
142 manifest_path.display(),
143 manifest.schema_version,
144 RELEASE_FIXTURE_SCHEMA
145 )));
146 }
147
148 let deterministic_events = load_optional_jsonl(&dir.join(DETERMINISTIC_EVENTS_FILE))?;
149 let agent_events = load_optional_jsonl(&dir.join(AGENT_EVENTS_FILE))?;
150 let tool_observations = load_optional_jsonl(&dir.join(TOOL_OBSERVATIONS_FILE))?;
151
152 Ok(ReleaseFixture {
153 manifest,
154 deterministic_events,
155 agent_events,
156 tool_observations,
157 })
158}
159
160fn load_optional_jsonl(path: &Path) -> Result<Vec<ReleaseFixtureEvent>, VmError> {
161 if !path.exists() {
162 return Ok(Vec::new());
163 }
164 let content = std::fs::read_to_string(path).map_err(|error| {
165 VmError::Runtime(format!(
166 "failed to read release fixture stream {}: {error}",
167 path.display()
168 ))
169 })?;
170 let mut events = Vec::new();
171 for (line_idx, line) in content.lines().enumerate() {
172 let trimmed = line.trim();
173 if trimmed.is_empty() {
174 continue;
175 }
176 let event: ReleaseFixtureEvent = serde_json::from_str(trimmed).map_err(|error| {
177 VmError::Runtime(format!(
178 "failed to decode release fixture event {} line {}: {error}",
179 path.display(),
180 line_idx + 1
181 ))
182 })?;
183 if event.schema_version != RELEASE_FIXTURE_SCHEMA {
184 return Err(VmError::Runtime(format!(
185 "release fixture event {} line {} has unrecognized schema {:?} (expected {})",
186 path.display(),
187 line_idx + 1,
188 event.schema_version,
189 RELEASE_FIXTURE_SCHEMA
190 )));
191 }
192 events.push(event);
193 }
194 Ok(events)
195}
196
197pub fn release_fixture_to_trace(fixture: &ReleaseFixture) -> CrystallizationTrace {
204 let release = &fixture.manifest.release;
205 let mut metadata: BTreeMap<String, JsonValue> = BTreeMap::new();
206 metadata.insert("release.repo".to_string(), json!(release.repo));
207 metadata.insert("release.mode".to_string(), json!(release.mode));
208 metadata.insert("release.mock".to_string(), json!(release.mock));
209 metadata.insert(
210 "release.current_version".to_string(),
211 json!(release.current_version),
212 );
213 metadata.insert(
214 "release.next_version".to_string(),
215 json!(release.next_version),
216 );
217 metadata.insert(
218 "release.starting_branch".to_string(),
219 json!(release.starting_branch),
220 );
221 metadata.insert(
222 "release.target_release_branch".to_string(),
223 json!(release.target_release_branch),
224 );
225 metadata.insert(
226 "release.base_branch".to_string(),
227 json!(release.base_branch),
228 );
229 metadata.insert("release.latest_tag".to_string(), json!(release.latest_tag));
230 metadata.insert("fixture.run_id".to_string(), json!(fixture.manifest.run_id));
231 metadata.insert(
232 "fixture.generated_by".to_string(),
233 json!(fixture.manifest.generated_by),
234 );
235
236 let mut actions = Vec::new();
237 for event in &fixture.deterministic_events {
238 if let Some(action) = deterministic_event_to_action(event, release) {
239 actions.push(action);
240 }
241 }
242 for event in &fixture.tool_observations {
243 if let Some(action) = tool_observation_to_action(event, release) {
244 actions.push(action);
245 }
246 }
247 for event in &fixture.agent_events {
248 if let Some(action) = agent_event_to_action(event, release) {
249 actions.push(action);
250 }
251 }
252
253 actions.sort_by(|left, right| left.timestamp.cmp(&right.timestamp));
254 for (idx, action) in actions.iter_mut().enumerate() {
256 if action.id.trim().is_empty() {
257 action.id = format!("event_{}", idx + 1);
258 }
259 }
260
261 let trace_id = if fixture.manifest.run_id.trim().is_empty() {
262 format!(
263 "release_fixture_{}",
264 hash_short(fixture.manifest.generated_at.as_bytes())
265 )
266 } else {
267 format!("release_fixture_{}", fixture.manifest.run_id)
268 };
269
270 CrystallizationTrace {
271 version: 1,
272 id: trace_id,
273 source: Some(format!(
274 "release_harn.harn run {} ({} -> {})",
275 fixture.manifest.run_id, release.current_version, release.next_version
276 )),
277 source_hash: None,
278 workflow_id: Some("release_harn".to_string()),
279 started_at: actions.first().and_then(|action| action.timestamp.clone()),
280 finished_at: actions.last().and_then(|action| action.timestamp.clone()),
281 flow: None,
282 actions,
283 usage: Default::default(),
284 metadata,
285 }
286}
287
288fn deterministic_event_to_action(
289 event: &ReleaseFixtureEvent,
290 release: &ReleaseFixtureIdentity,
291) -> Option<CrystallizationAction> {
292 let mut action = base_action_from_event(event);
293 let data = &event.data;
294 match event.event_type.as_str() {
295 "release_analysis" => {
296 action.kind = "release_analysis".to_string();
297 action.name = format!(
298 "analyze_release[{}->{}]",
299 data.get("current_version")
300 .and_then(JsonValue::as_str)
301 .unwrap_or(&release.current_version),
302 data.get("next_version")
303 .and_then(JsonValue::as_str)
304 .unwrap_or(&release.next_version),
305 );
306 action.parameters = release_parameters(release);
307 action.deterministic = Some(true);
308 action.fuzzy = Some(false);
309 action.capabilities = vec!["git.read".to_string(), "fs.read".to_string()];
310 action.inputs = data.clone();
311 }
312 "changelog_audit_inputs" => {
313 action.kind = "changelog_audit".to_string();
314 action.name = "collect_changelog_audit_inputs".to_string();
315 action.parameters = release_parameters(release);
316 action.deterministic = Some(true);
317 action.fuzzy = Some(false);
318 action.capabilities = vec!["fs.read".to_string()];
319 action.inputs = data.clone();
320 }
321 "deterministic_finding" => {
322 let finding = data
323 .get("finding")
324 .and_then(JsonValue::as_str)
325 .unwrap_or("finding");
326 action.kind = "release_finding".to_string();
327 action.name = format!("finding[{}]", short_summary(finding, 32));
328 action.deterministic = Some(true);
329 action.fuzzy = Some(false);
330 action.observed_output = Some(json!({"finding": finding}));
331 }
332 "release_step_recorded" => {
333 let step_name = data
334 .get("name")
335 .and_then(JsonValue::as_str)
336 .unwrap_or("step")
337 .to_string();
338 let command = data
339 .get("command")
340 .and_then(JsonValue::as_str)
341 .unwrap_or("")
342 .to_string();
343 let success = data
344 .get("success")
345 .and_then(JsonValue::as_bool)
346 .unwrap_or(true);
347 let status = data.get("status").cloned().unwrap_or(json!(0));
348 let classification = data
349 .get("classification")
350 .and_then(JsonValue::as_str)
351 .unwrap_or("");
352 let recovery_hint = data
353 .get("recovery_hint")
354 .and_then(JsonValue::as_str)
355 .unwrap_or("");
356 action.kind = if success {
357 "release_step".to_string()
358 } else {
359 "shell_failure".to_string()
360 };
361 action.name = sanitize_step_name(&step_name);
362 action.deterministic = Some(true);
363 action.fuzzy = Some(false);
364 action.parameters = BTreeMap::from([
365 ("step".to_string(), json!(step_name)),
366 ("command".to_string(), json!(command)),
367 ]);
368 action.inputs = json!({"command": command});
369 action.observed_output = Some(json!({"status": status, "success": success}));
370 if !success {
371 action.side_effects.push(CrystallizationSideEffect {
372 kind: "shell_failure".to_string(),
373 target: step_name.clone(),
374 capability: Some("shell.exec".to_string()),
375 mutation: None,
376 metadata: BTreeMap::from([(
377 "classification".to_string(),
378 json!(classification),
379 )]),
380 });
381 }
382 action
383 .metadata
384 .insert("classification".to_string(), json!(classification));
385 action
386 .metadata
387 .insert("recovery_hint".to_string(), json!(recovery_hint));
388 action
389 .metadata
390 .insert("success".to_string(), json!(success));
391 }
392 _ => return None,
393 }
394 Some(action)
395}
396
397fn tool_observation_to_action(
398 event: &ReleaseFixtureEvent,
399 release: &ReleaseFixtureIdentity,
400) -> Option<CrystallizationAction> {
401 if event.event_type != "tool_observation" {
402 return None;
403 }
404 let mut action = base_action_from_event(event);
405 let data = &event.data;
406 let tool = data
407 .get("tool")
408 .and_then(JsonValue::as_str)
409 .unwrap_or("shell");
410 let command = data
411 .get("command")
412 .and_then(JsonValue::as_str)
413 .unwrap_or("");
414 let path = data.get("path").and_then(JsonValue::as_str);
415 let step_name = data.get("step_name").and_then(JsonValue::as_str);
416 let success = data
417 .get("success")
418 .and_then(JsonValue::as_bool)
419 .unwrap_or(true);
420
421 action.kind = format!("tool_observation:{tool}");
422 action.name = match (tool, step_name) {
423 (_, Some(name)) if !name.is_empty() => sanitize_step_name(name),
424 ("read_file", Some(_)) | ("read_file", None) => format!(
425 "read_file[{}]",
426 short_summary(path.unwrap_or("unknown"), 48)
427 ),
428 ("shell", _) => format!("shell[{}]", short_summary(command, 48)),
429 _ => format!("{tool}[{}]", short_summary(command, 48)),
430 };
431 action.deterministic = Some(event.source != "agent");
432 action.fuzzy = Some(false);
433 let _ = release; action.inputs = data.clone();
435 action.observed_output = Some(json!({
436 "stdout": data.get("stdout").cloned().unwrap_or(json!("")),
437 "stderr": data.get("stderr").cloned().unwrap_or(json!("")),
438 "status": data.get("status").cloned().unwrap_or(json!(0)),
439 "success": success,
440 }));
441 if !success {
442 action.side_effects.push(CrystallizationSideEffect {
443 kind: "tool_failure".to_string(),
444 target: step_name.unwrap_or(tool).to_string(),
445 capability: Some("shell.exec".to_string()),
446 mutation: None,
447 metadata: BTreeMap::default(),
448 });
449 }
450 action.metadata.insert("tool".to_string(), json!(tool));
451 Some(action)
452}
453
454fn agent_event_to_action(
455 event: &ReleaseFixtureEvent,
456 release: &ReleaseFixtureIdentity,
457) -> Option<CrystallizationAction> {
458 let mut action = base_action_from_event(event);
459 let data = &event.data;
460 match event.event_type.as_str() {
461 "agent_review_attempt" => {
462 let name = data
463 .get("name")
464 .and_then(JsonValue::as_str)
465 .unwrap_or("review");
466 action.kind = "agent_review_attempt".to_string();
467 action.name = format!("agent_review[{}]", sanitize_step_name(name));
468 action.fuzzy = Some(true);
469 action.deterministic = Some(false);
470 action.cost.model_calls = 1;
471 action.parameters = release_parameters(release);
472 action.inputs = data.clone();
473 action.observed_output = data.get("text").cloned();
474 action.approval = Some(CrystallizationApproval {
475 prompt: Some(
476 "Human reviewer must accept the agent-authored audit before promotion."
477 .to_string(),
478 ),
479 approver: None,
480 required: true,
481 boundary: Some("release_audit_review".to_string()),
482 });
483 }
484 "agent_review_artifacts" => {
485 action.kind = "agent_review_artifacts".to_string();
486 action.name = "persist_agent_review_artifacts".to_string();
487 action.deterministic = Some(true);
488 action.fuzzy = Some(false);
489 action.observed_output = Some(data.clone());
490 }
491 "agent_recovery_advice" => {
492 let step_name = data
493 .get("step_name")
494 .and_then(JsonValue::as_str)
495 .unwrap_or("recovery");
496 action.kind = "agent_recovery_advice".to_string();
497 action.name = format!("recovery_advice[{}]", sanitize_step_name(step_name));
498 action.fuzzy = Some(true);
499 action.deterministic = Some(false);
500 action.cost.model_calls = 1;
501 action.observed_output = data.get("text").cloned();
502 action.parameters = BTreeMap::from([("failed_step".to_string(), json!(step_name))]);
503 action.approval = Some(CrystallizationApproval {
504 prompt: Some(
505 "Human reviewer must validate recovery advice before re-running the failing step."
506 .to_string(),
507 ),
508 approver: None,
509 required: true,
510 boundary: Some("recovery_review".to_string()),
511 });
512 action
513 .metadata
514 .insert("failed_step".to_string(), json!(step_name));
515 }
516 "agent_review_skipped" => {
517 action.kind = "agent_review_skipped".to_string();
518 action.name = "agent_review_skipped".to_string();
519 action.deterministic = Some(true);
520 action.fuzzy = Some(false);
521 action.observed_output = data.get("reason").cloned();
522 }
523 _ => return None,
524 }
525 Some(action)
526}
527
528fn base_action_from_event(event: &ReleaseFixtureEvent) -> CrystallizationAction {
529 CrystallizationAction {
530 id: stable_event_id(event),
531 timestamp: event.timestamp.clone(),
532 ..CrystallizationAction::default()
533 }
534}
535
536fn stable_event_id(event: &ReleaseFixtureEvent) -> String {
537 let mut hasher = Sha256::new();
538 hasher.update(event.event_type.as_bytes());
539 hasher.update([0]);
540 hasher.update(event.source.as_bytes());
541 hasher.update([0]);
542 if let Some(timestamp) = &event.timestamp {
543 hasher.update(timestamp.as_bytes());
544 }
545 hasher.update([0]);
546 hasher.update(event.data.to_string().as_bytes());
547 let hex = hex::encode(hasher.finalize());
548 format!(
549 "evt_{}_{}",
550 sanitize_step_name(&event.event_type),
551 hex.chars().take(12).collect::<String>()
552 )
553}
554
555fn release_parameters(release: &ReleaseFixtureIdentity) -> BTreeMap<String, JsonValue> {
556 let mut out = BTreeMap::new();
557 out.insert("repo".to_string(), json!(release.repo));
558 out.insert("base_branch".to_string(), json!(release.base_branch));
559 out.insert(
560 "current_version".to_string(),
561 json!(release.current_version),
562 );
563 out.insert("next_version".to_string(), json!(release.next_version));
564 out.insert(
565 "target_release_branch".to_string(),
566 json!(release.target_release_branch),
567 );
568 out
569}
570
571fn sanitize_step_name(raw: &str) -> String {
572 let cleaned: String = raw
573 .chars()
574 .map(|ch| {
575 if ch.is_ascii_alphanumeric() || ch == '_' || ch == '-' {
576 ch.to_ascii_lowercase()
577 } else {
578 '_'
579 }
580 })
581 .collect();
582 let trimmed = cleaned.trim_matches('_').to_string();
583 if trimmed.is_empty() {
584 "step".to_string()
585 } else {
586 trimmed
587 }
588}
589
590fn short_summary(raw: &str, max_chars: usize) -> String {
591 let cleaned = raw.replace(['\n', '\r', '\t'], " ");
592 let trimmed = cleaned.trim();
593 if trimmed.chars().count() <= max_chars {
594 trimmed.to_string()
595 } else {
596 let prefix: String = trimmed.chars().take(max_chars - 1).collect();
597 format!("{prefix}…")
598 }
599}
600
601fn hash_short(bytes: &[u8]) -> String {
602 let mut hasher = Sha256::new();
603 hasher.update(bytes);
604 hex::encode(hasher.finalize()).chars().take(12).collect()
605}
606
607pub fn build_segment_summary(fixture: &ReleaseFixture) -> SegmentSummary {
612 let mut safe = Vec::new();
613 let mut review = Vec::new();
614 for event in &fixture.deterministic_events {
615 match event.event_type.as_str() {
616 "release_analysis" | "changelog_audit_inputs" => safe.push(event.event_type.clone()),
617 "release_step_recorded" => {
618 let name = event
619 .data
620 .get("name")
621 .and_then(JsonValue::as_str)
622 .unwrap_or("release_step")
623 .to_string();
624 let success = event
625 .data
626 .get("success")
627 .and_then(JsonValue::as_bool)
628 .unwrap_or(true);
629 if success {
630 safe.push(format!("step:{name}"));
631 } else {
632 review.push(format!(
633 "failed step:{name} (deterministic recovery required before re-run)"
634 ));
635 }
636 }
637 "deterministic_finding" => {
638 let finding = event
639 .data
640 .get("finding")
641 .and_then(JsonValue::as_str)
642 .unwrap_or("finding");
643 review.push(format!("finding requires reviewer attention: {finding}"));
644 }
645 _ => {}
646 }
647 }
648 for event in &fixture.agent_events {
649 match event.event_type.as_str() {
650 "agent_review_attempt" => {
651 let name = event
652 .data
653 .get("name")
654 .and_then(JsonValue::as_str)
655 .unwrap_or("agent_review");
656 review.push(format!(
657 "agent review attempt:{name} (model-authored, advisory only)"
658 ));
659 }
660 "agent_recovery_advice" => {
661 let step = event
662 .data
663 .get("step_name")
664 .and_then(JsonValue::as_str)
665 .unwrap_or("step");
666 review.push(format!(
667 "agent recovery advice for {step} (must be validated before re-run)"
668 ));
669 }
670 _ => {}
671 }
672 }
673 let plain = format!(
674 "Safe to automate: {} deterministic event(s) (release analysis, changelog inputs, \
675 successful release steps). Requires human/agent review: {} item(s) including \
676 agent-authored audits, model recovery advice, and any failed deterministic steps. \
677 The crystallized workflow keeps all agent steps behind explicit approval boundaries; \
678 hosts should not promote this candidate to fully autonomous execution without first \
679 resolving the review-required entries.",
680 safe.len(),
681 review.len()
682 );
683 SegmentSummary {
684 deterministic_count: safe.len(),
685 agentic_count: review.len(),
686 safe_to_automate: safe,
687 requires_human_review: review,
688 plain_language: plain,
689 }
690}
691
692pub fn build_recovery_summary(fixture: &ReleaseFixture) -> RecoveryFeedbackSummary {
703 let mut shell_failures = 0usize;
704 let mut failed_steps: Vec<String> = Vec::new();
705 let mut counted_step_names: BTreeSet<String> = BTreeSet::new();
706
707 for event in fixture
708 .deterministic_events
709 .iter()
710 .chain(fixture.tool_observations.iter())
711 {
712 let success = event
713 .data
714 .get("success")
715 .and_then(JsonValue::as_bool)
716 .unwrap_or(true);
717 if success {
718 continue;
719 }
720 let name = event
721 .data
722 .get("name")
723 .or_else(|| event.data.get("step_name"))
724 .and_then(JsonValue::as_str);
725 if let Some(name) = name {
726 if !counted_step_names.insert(name.to_string()) {
727 continue; }
729 if !failed_steps.iter().any(|n| n == name) {
730 failed_steps.push(name.to_string());
731 }
732 }
733 shell_failures += 1;
734 }
735 let recovery_runs = fixture
736 .agent_events
737 .iter()
738 .filter(|event| event.event_type == "agent_recovery_advice")
739 .count();
740 let fed = recovery_runs > 0 && shell_failures > 0;
741 let representation = if fed {
742 format!(
743 "{} shell/tool failure(s) were observed and {} of them triggered an `agent_loop` \
744 recovery advice run. Failure stdout/stderr, classification, and recovery hints from \
745 the failing release step were embedded in the model prompt; the model produced \
746 advisory text only — no automatic re-run or live mutation. Reviewers must validate \
747 the advice before re-running the failing step.",
748 shell_failures, recovery_runs
749 )
750 } else if shell_failures > 0 {
751 format!(
752 "{} shell/tool failure(s) were observed but no agent recovery loop was invoked. \
753 Failure context was recorded for human review only.",
754 shell_failures
755 )
756 } else if recovery_runs > 0 {
757 format!(
758 "No shell/tool failures were observed in this run, but {} agent recovery loop(s) \
759 ran (likely from a previous attempt or a non-shell error path).",
760 recovery_runs
761 )
762 } else {
763 "No shell/tool failures were observed and no recovery loops ran. The release \
764 executed end-to-end on the deterministic path."
765 .to_string()
766 };
767 RecoveryFeedbackSummary {
768 shell_failures_seen: shell_failures,
769 recovery_advice_runs: recovery_runs,
770 failures_fed_into_agent: fed,
771 failed_steps,
772 representation,
773 }
774}
775
776pub fn ingest_release_fixture(
780 dir: &Path,
781 options: CrystallizeOptions,
782) -> Result<
783 (
784 CrystallizationArtifacts,
785 ReleaseFixture,
786 CrystallizationTrace,
787 ),
788 VmError,
789> {
790 let fixture = load_release_fixture(dir)?;
791 let mut trace = release_fixture_to_trace(&fixture);
792 if trace.actions.is_empty() {
793 return Err(VmError::Runtime(format!(
794 "release fixture {} produced zero actions; nothing to crystallize",
795 dir.display()
796 )));
797 }
798 let payload = serde_json::to_vec(&trace.actions).unwrap_or_default();
802 trace.source_hash = Some(format!(
803 "sha256:{}",
804 hex::encode(Sha256::digest(payload.as_slice()))
805 ));
806
807 let segment_summary = build_segment_summary(&fixture);
808 let recovery_summary = build_recovery_summary(&fixture);
809 let release = &fixture.manifest.release;
810 let extra_parameters = release_parameter_definitions(release);
811
812 let artifacts = synthesize_candidate_from_trace(
813 trace.clone(),
814 options,
815 extra_parameters,
816 Some(segment_summary),
817 Some(recovery_summary),
818 )?;
819 Ok((artifacts, fixture, trace))
820}
821
822fn release_parameter_definitions(
823 release: &ReleaseFixtureIdentity,
824) -> Vec<WorkflowCandidateParameter> {
825 fn parameter(name: &str, value: &str) -> WorkflowCandidateParameter {
826 WorkflowCandidateParameter {
827 name: name.to_string(),
828 source_paths: vec![format!("manifest.release.{name}")],
829 examples: if value.trim().is_empty() {
830 Vec::new()
831 } else {
832 vec![value.to_string()]
833 },
834 required: true,
835 }
836 }
837 vec![
838 parameter("repo", &release.repo),
839 parameter("base_branch", &release.base_branch),
840 parameter("current_version", &release.current_version),
841 parameter("next_version", &release.next_version),
842 parameter("target_release_branch", &release.target_release_branch),
843 ]
844}
845
846#[cfg(test)]
847mod tests {
848 use super::*;
849 use std::fs;
850 use tempfile::TempDir;
851
852 fn write_fixture(dir: &Path) {
853 let manifest = json!({
854 "schema_version": RELEASE_FIXTURE_SCHEMA,
855 "kind": "release_harn_crystallization_input",
856 "generated_by": "release_harn.harn",
857 "generated_at": "2026-05-02T00:00:00Z",
858 "run_id": "test-run",
859 "source_issue": "https://github.com/burin-labs/harn-bump-fleet/issues/2",
860 "consumer_issue": "https://github.com/burin-labs/harn/issues/1146",
861 "release": {
862 "repo": "/tmp/harn",
863 "mode": "audit",
864 "mock": true,
865 "current_version": "0.7.52",
866 "next_version": "0.7.53",
867 "starting_branch": "main",
868 "target_release_branch": "release/v0.7.53",
869 "base_branch": "main",
870 "latest_tag": "v0.7.52"
871 }
872 });
873 fs::write(
874 dir.join(MANIFEST_FILE),
875 serde_json::to_string_pretty(&manifest).unwrap(),
876 )
877 .unwrap();
878
879 let det = [
880 json!({
881 "schema_version": RELEASE_FIXTURE_SCHEMA,
882 "event_type": "release_analysis",
883 "source": "deterministic",
884 "timestamp": "2026-05-02T00:00:00Z",
885 "data": {
886 "current_version": "0.7.52",
887 "next_version": "0.7.53",
888 "base_branch": "main"
889 }
890 }),
891 json!({
892 "schema_version": RELEASE_FIXTURE_SCHEMA,
893 "event_type": "changelog_audit_inputs",
894 "source": "deterministic",
895 "timestamp": "2026-05-02T00:00:01Z",
896 "data": {"expected_version": "0.7.53"}
897 }),
898 json!({
899 "schema_version": RELEASE_FIXTURE_SCHEMA,
900 "event_type": "release_step_recorded",
901 "source": "deterministic",
902 "timestamp": "2026-05-02T00:00:02Z",
903 "data": {
904 "name": "ensure-clean-tree",
905 "command": "git status --porcelain",
906 "success": true,
907 "status": 0
908 }
909 }),
910 json!({
911 "schema_version": RELEASE_FIXTURE_SCHEMA,
912 "event_type": "release_step_recorded",
913 "source": "deterministic",
914 "timestamp": "2026-05-02T00:00:03Z",
915 "data": {
916 "name": "push",
917 "command": "git push -u origin release/v0.7.53",
918 "success": false,
919 "status": 1,
920 "classification": "branch_protection",
921 "recovery_hint": "rerun with --no-verify after green hook budget"
922 }
923 }),
924 ];
925 let det_jsonl: String = det
926 .iter()
927 .map(|v| serde_json::to_string(v).unwrap())
928 .collect::<Vec<_>>()
929 .join("\n");
930 fs::write(dir.join(DETERMINISTIC_EVENTS_FILE), det_jsonl + "\n").unwrap();
931
932 let agent = [
933 json!({
934 "schema_version": RELEASE_FIXTURE_SCHEMA,
935 "event_type": "agent_review_attempt",
936 "source": "agent",
937 "timestamp": "2026-05-02T00:00:04Z",
938 "data": {
939 "index": 0,
940 "name": "release_audit",
941 "status": "ok",
942 "text": "audit passes",
943 "validation_findings": []
944 }
945 }),
946 json!({
947 "schema_version": RELEASE_FIXTURE_SCHEMA,
948 "event_type": "agent_recovery_advice",
949 "source": "agent",
950 "timestamp": "2026-05-02T00:00:05Z",
951 "data": {
952 "step_name": "push",
953 "status": "ok",
954 "text": "Re-run with --no-verify"
955 }
956 }),
957 ];
958 let agent_jsonl: String = agent
959 .iter()
960 .map(|v| serde_json::to_string(v).unwrap())
961 .collect::<Vec<_>>()
962 .join("\n");
963 fs::write(dir.join(AGENT_EVENTS_FILE), agent_jsonl + "\n").unwrap();
964
965 let tools = [json!({
966 "schema_version": RELEASE_FIXTURE_SCHEMA,
967 "event_type": "tool_observation",
968 "source": "deterministic",
969 "timestamp": "2026-05-02T00:00:06Z",
970 "data": {
971 "tool": "shell",
972 "command": "git status --porcelain",
973 "success": true,
974 "status": 0,
975 "stdout": "",
976 "stderr": ""
977 }
978 })];
979 let tools_jsonl: String = tools
980 .iter()
981 .map(|v| serde_json::to_string(v).unwrap())
982 .collect::<Vec<_>>()
983 .join("\n");
984 fs::write(dir.join(TOOL_OBSERVATIONS_FILE), tools_jsonl + "\n").unwrap();
985 }
986
987 #[test]
988 fn ingest_emits_a_safe_candidate_with_segment_and_recovery_summary() {
989 let temp = TempDir::new().unwrap();
990 write_fixture(temp.path());
991 let (artifacts, fixture, _trace) = ingest_release_fixture(
992 temp.path(),
993 CrystallizeOptions {
994 workflow_name: Some("release_harn".to_string()),
995 package_name: Some("release-harn".to_string()),
996 ..CrystallizeOptions::default()
997 },
998 )
999 .expect("ingest");
1000
1001 assert_eq!(fixture.manifest.release.next_version, "0.7.53");
1003
1004 assert!(artifacts.report.selected_candidate_id.is_some());
1006 let candidate = &artifacts.report.candidates[0];
1007 assert_eq!(candidate.name, "release_harn");
1008 assert!(candidate.shadow.pass);
1009
1010 let summary = artifacts
1012 .report
1013 .segment_summary
1014 .as_ref()
1015 .expect("segment summary");
1016 assert!(summary.deterministic_count >= 3);
1017 assert!(summary.agentic_count >= 2);
1018 assert!(summary
1019 .requires_human_review
1020 .iter()
1021 .any(|item| item.contains("failed step:push")));
1022
1023 let recovery = artifacts
1025 .report
1026 .recovery_summary
1027 .as_ref()
1028 .expect("recovery summary");
1029 assert!(recovery.shell_failures_seen >= 1);
1030 assert!(recovery.recovery_advice_runs >= 1);
1031 assert!(recovery.failures_fed_into_agent);
1032 assert!(recovery.failed_steps.contains(&"push".to_string()));
1033 assert!(recovery.representation.contains("agent_loop"));
1034
1035 let names: Vec<&str> = candidate
1037 .parameters
1038 .iter()
1039 .map(|p| p.name.as_str())
1040 .collect();
1041 assert!(names.contains(&"next_version"));
1042 assert!(names.contains(&"current_version"));
1043 assert!(names.contains(&"base_branch"));
1044
1045 assert!(artifacts.harn_code.contains("pipeline release_harn"));
1047 }
1048
1049 #[test]
1050 fn rejects_unknown_schema() {
1051 let temp = TempDir::new().unwrap();
1052 let manifest = json!({
1053 "schema_version": "release_harn.crystallization_input.v999",
1054 "kind": "release_harn_crystallization_input",
1055 "generated_by": "release_harn.harn",
1056 "generated_at": "2026-05-02T00:00:00Z",
1057 "run_id": "test-run",
1058 "release": {
1059 "repo": "/tmp/harn",
1060 "mode": "audit",
1061 "mock": true,
1062 "current_version": "0.7.52",
1063 "next_version": "0.7.53",
1064 "starting_branch": "main",
1065 "target_release_branch": "release/v0.7.53",
1066 "base_branch": "main",
1067 "latest_tag": "v0.7.52"
1068 }
1069 });
1070 fs::write(
1071 temp.path().join(MANIFEST_FILE),
1072 serde_json::to_string_pretty(&manifest).unwrap(),
1073 )
1074 .unwrap();
1075 let err = load_release_fixture(temp.path()).unwrap_err();
1076 assert!(format!("{err}").contains("unrecognized schema"));
1077 }
1078
1079 #[test]
1080 fn missing_jsonl_streams_default_to_empty() {
1081 let temp = TempDir::new().unwrap();
1082 let manifest = json!({
1083 "schema_version": RELEASE_FIXTURE_SCHEMA,
1084 "kind": "release_harn_crystallization_input",
1085 "generated_by": "release_harn.harn",
1086 "generated_at": "2026-05-02T00:00:00Z",
1087 "run_id": "no-events-run",
1088 "release": {
1089 "repo": "/tmp/harn",
1090 "mode": "audit",
1091 "mock": true,
1092 "current_version": "0.7.52",
1093 "next_version": "0.7.53",
1094 "starting_branch": "main",
1095 "target_release_branch": "release/v0.7.53",
1096 "base_branch": "main",
1097 "latest_tag": "v0.7.52"
1098 }
1099 });
1100 fs::write(
1101 temp.path().join(MANIFEST_FILE),
1102 serde_json::to_string_pretty(&manifest).unwrap(),
1103 )
1104 .unwrap();
1105 let fixture = load_release_fixture(temp.path()).expect("load");
1106 assert!(fixture.deterministic_events.is_empty());
1107 assert!(fixture.agent_events.is_empty());
1108 assert!(fixture.tool_observations.is_empty());
1109
1110 let err = ingest_release_fixture(temp.path(), CrystallizeOptions::default()).unwrap_err();
1112 assert!(format!("{err}").contains("zero actions"));
1113 }
1114}