Skip to main content

harn_vm/orchestration/
release_fixture.rs

1//! Release-harness fixture ingest.
2//!
3//! `release_harn.harn` (in `harn-bump-fleet`) emits a
4//! `release_harn.crystallization_input.v1` fixture bundle for every run:
5//!
6//! ```text
7//! crystallization-input/
8//!   manifest.json                # release identity + file map
9//!   release-run.json             # full release-harness payload
10//!   deterministic-events.jsonl   # harness facts/findings/step records
11//!   agent-events.jsonl           # model review/changelog/recovery events
12//!   tool-observations.jsonl      # shell/read/tool observations
13//!   README.md                    # human-readable description
14//! ```
15//!
16//! This module ingests one of those bundles and synthesizes a single
17//! crystallization candidate (no repeated-sequence mining required —
18//! the trace IS the workflow). Output is a [`CrystallizationArtifacts`]
19//! that downstream tooling (`build_crystallization_bundle`,
20//! `validate_crystallization_bundle`, `shadow_replay_bundle`) consumes
21//! unchanged.
22//!
23//! See `harn-bump-fleet/release_harn.harn` for the upstream emitter and
24//! `docs/src/workflow-crystallization.md` for the steel-thread story.
25
26use std::collections::{BTreeMap, BTreeSet};
27use std::path::Path;
28
29use serde::{Deserialize, Serialize};
30use serde_json::{json, Value as JsonValue};
31use sha2::{Digest, Sha256};
32
33use super::crystallize::{
34    synthesize_candidate_from_trace, CrystallizationAction, CrystallizationApproval,
35    CrystallizationArtifacts, CrystallizationSideEffect, CrystallizationTrace, CrystallizeOptions,
36    RecoveryFeedbackSummary, SegmentSummary, WorkflowCandidateParameter,
37};
38use crate::value::VmError;
39
40/// Schema marker emitted by `release_harn.harn` on every event/manifest
41/// row. The trailing `.vN` carries the version. Importers MUST refuse
42/// fixtures with any other schema marker — bumping the suffix is how
43/// `release_harn.harn` signals a backwards-incompatible fixture shape
44/// change.
45pub const RELEASE_FIXTURE_SCHEMA: &str = "release_harn.crystallization_input.v1";
46
47const MANIFEST_FILE: &str = "manifest.json";
48const DETERMINISTIC_EVENTS_FILE: &str = "deterministic-events.jsonl";
49const AGENT_EVENTS_FILE: &str = "agent-events.jsonl";
50const TOOL_OBSERVATIONS_FILE: &str = "tool-observations.jsonl";
51
52/// Decoded release-fixture manifest. We keep this struct intentionally
53/// small — only the fields the ingester actually depends on — and
54/// preserve unknown fields verbatim in [`ReleaseFixtureManifest::raw`]
55/// so future schema additions don't lose information when the fixture
56/// is round-tripped.
57#[derive(Clone, Debug, Default, Serialize, Deserialize)]
58pub struct ReleaseFixtureManifest {
59    pub schema_version: String,
60    pub kind: String,
61    pub generated_by: String,
62    pub generated_at: String,
63    pub run_id: String,
64    pub source_issue: Option<String>,
65    pub consumer_issue: Option<String>,
66    pub release: ReleaseFixtureIdentity,
67    /// The full untouched manifest JSON. Useful for downstream
68    /// consumers and for round-tripping unknown fields without losing
69    /// them.
70    #[serde(skip_serializing, skip_deserializing)]
71    pub raw: Option<JsonValue>,
72}
73
74#[derive(Clone, Debug, Default, Serialize, Deserialize)]
75pub struct ReleaseFixtureIdentity {
76    pub repo: String,
77    pub mode: String,
78    #[serde(default)]
79    pub mock: bool,
80    pub current_version: String,
81    pub next_version: String,
82    pub starting_branch: String,
83    pub target_release_branch: String,
84    pub base_branch: String,
85    pub latest_tag: String,
86}
87
88/// One row from one of the JSONL fixtures (deterministic-events,
89/// agent-events, tool-observations).
90#[derive(Clone, Debug, Default, Serialize, Deserialize)]
91pub struct ReleaseFixtureEvent {
92    pub schema_version: String,
93    pub event_type: String,
94    pub source: String,
95    #[serde(default)]
96    pub timestamp: Option<String>,
97    #[serde(default)]
98    pub data: JsonValue,
99}
100
101/// All decoded data from one ingested fixture bundle. Kept distinct
102/// from the eventual [`CrystallizationTrace`] so the importer can run
103/// secondary analysis (segment summary, recovery summary) over the
104/// original event stream.
105#[derive(Clone, Debug, Default)]
106pub struct ReleaseFixture {
107    pub manifest: ReleaseFixtureManifest,
108    pub deterministic_events: Vec<ReleaseFixtureEvent>,
109    pub agent_events: Vec<ReleaseFixtureEvent>,
110    pub tool_observations: Vec<ReleaseFixtureEvent>,
111}
112
113/// Read a release-fixture bundle directory from disk. The manifest is
114/// required; missing JSONL streams are treated as empty (so a fixture
115/// from a release with no agent review still ingests cleanly).
116pub fn load_release_fixture(dir: &Path) -> Result<ReleaseFixture, VmError> {
117    let manifest_path = dir.join(MANIFEST_FILE);
118    let manifest_bytes = std::fs::read(&manifest_path).map_err(|error| {
119        VmError::Runtime(format!(
120            "failed to read release fixture manifest {}: {error}",
121            manifest_path.display()
122        ))
123    })?;
124    let manifest_json: JsonValue = serde_json::from_slice(&manifest_bytes).map_err(|error| {
125        VmError::Runtime(format!(
126            "failed to parse release fixture manifest {}: {error}",
127            manifest_path.display()
128        ))
129    })?;
130    let mut manifest: ReleaseFixtureManifest = serde_json::from_value(manifest_json.clone())
131        .map_err(|error| {
132            VmError::Runtime(format!(
133                "failed to decode release fixture manifest {}: {error}",
134                manifest_path.display()
135            ))
136        })?;
137    manifest.raw = Some(manifest_json);
138
139    if manifest.schema_version != RELEASE_FIXTURE_SCHEMA {
140        return Err(VmError::Runtime(format!(
141            "release fixture manifest {} has unrecognized schema_version {:?} (expected {})",
142            manifest_path.display(),
143            manifest.schema_version,
144            RELEASE_FIXTURE_SCHEMA
145        )));
146    }
147
148    let deterministic_events = load_optional_jsonl(&dir.join(DETERMINISTIC_EVENTS_FILE))?;
149    let agent_events = load_optional_jsonl(&dir.join(AGENT_EVENTS_FILE))?;
150    let tool_observations = load_optional_jsonl(&dir.join(TOOL_OBSERVATIONS_FILE))?;
151
152    Ok(ReleaseFixture {
153        manifest,
154        deterministic_events,
155        agent_events,
156        tool_observations,
157    })
158}
159
160fn load_optional_jsonl(path: &Path) -> Result<Vec<ReleaseFixtureEvent>, VmError> {
161    if !path.exists() {
162        return Ok(Vec::new());
163    }
164    let content = std::fs::read_to_string(path).map_err(|error| {
165        VmError::Runtime(format!(
166            "failed to read release fixture stream {}: {error}",
167            path.display()
168        ))
169    })?;
170    let mut events = Vec::new();
171    for (line_idx, line) in content.lines().enumerate() {
172        let trimmed = line.trim();
173        if trimmed.is_empty() {
174            continue;
175        }
176        let event: ReleaseFixtureEvent = serde_json::from_str(trimmed).map_err(|error| {
177            VmError::Runtime(format!(
178                "failed to decode release fixture event {} line {}: {error}",
179                path.display(),
180                line_idx + 1
181            ))
182        })?;
183        if event.schema_version != RELEASE_FIXTURE_SCHEMA {
184            return Err(VmError::Runtime(format!(
185                "release fixture event {} line {} has unrecognized schema {:?} (expected {})",
186                path.display(),
187                line_idx + 1,
188                event.schema_version,
189                RELEASE_FIXTURE_SCHEMA
190            )));
191        }
192        events.push(event);
193    }
194    Ok(events)
195}
196
197/// Convert a release fixture into a single [`CrystallizationTrace`].
198/// Each release-step / tool-observation / agent-attempt /
199/// recovery-advice event becomes one [`CrystallizationAction`], in
200/// timestamp order. Side effects are inferred from
201/// `release_step_recorded` events; capabilities and approval boundaries
202/// are derived from event type + tool kind.
203pub fn release_fixture_to_trace(fixture: &ReleaseFixture) -> CrystallizationTrace {
204    let release = &fixture.manifest.release;
205    let mut metadata: BTreeMap<String, JsonValue> = BTreeMap::new();
206    metadata.insert("release.repo".to_string(), json!(release.repo));
207    metadata.insert("release.mode".to_string(), json!(release.mode));
208    metadata.insert("release.mock".to_string(), json!(release.mock));
209    metadata.insert(
210        "release.current_version".to_string(),
211        json!(release.current_version),
212    );
213    metadata.insert(
214        "release.next_version".to_string(),
215        json!(release.next_version),
216    );
217    metadata.insert(
218        "release.starting_branch".to_string(),
219        json!(release.starting_branch),
220    );
221    metadata.insert(
222        "release.target_release_branch".to_string(),
223        json!(release.target_release_branch),
224    );
225    metadata.insert(
226        "release.base_branch".to_string(),
227        json!(release.base_branch),
228    );
229    metadata.insert("release.latest_tag".to_string(), json!(release.latest_tag));
230    metadata.insert("fixture.run_id".to_string(), json!(fixture.manifest.run_id));
231    metadata.insert(
232        "fixture.generated_by".to_string(),
233        json!(fixture.manifest.generated_by),
234    );
235
236    let mut actions = Vec::new();
237    for event in &fixture.deterministic_events {
238        if let Some(action) = deterministic_event_to_action(event, release) {
239            actions.push(action);
240        }
241    }
242    for event in &fixture.tool_observations {
243        if let Some(action) = tool_observation_to_action(event, release) {
244            actions.push(action);
245        }
246    }
247    for event in &fixture.agent_events {
248        if let Some(action) = agent_event_to_action(event, release) {
249            actions.push(action);
250        }
251    }
252
253    actions.sort_by(|left, right| left.timestamp.cmp(&right.timestamp));
254    // Re-key after sort so action ids stay deterministic and ordered.
255    for (idx, action) in actions.iter_mut().enumerate() {
256        if action.id.trim().is_empty() {
257            action.id = format!("event_{}", idx + 1);
258        }
259    }
260
261    let trace_id = if fixture.manifest.run_id.trim().is_empty() {
262        format!(
263            "release_fixture_{}",
264            hash_short(fixture.manifest.generated_at.as_bytes())
265        )
266    } else {
267        format!("release_fixture_{}", fixture.manifest.run_id)
268    };
269
270    CrystallizationTrace {
271        version: 1,
272        id: trace_id,
273        source: Some(format!(
274            "release_harn.harn run {} ({} -> {})",
275            fixture.manifest.run_id, release.current_version, release.next_version
276        )),
277        source_hash: None,
278        workflow_id: Some("release_harn".to_string()),
279        started_at: actions.first().and_then(|action| action.timestamp.clone()),
280        finished_at: actions.last().and_then(|action| action.timestamp.clone()),
281        flow: None,
282        actions,
283        usage: Default::default(),
284        metadata,
285    }
286}
287
288fn deterministic_event_to_action(
289    event: &ReleaseFixtureEvent,
290    release: &ReleaseFixtureIdentity,
291) -> Option<CrystallizationAction> {
292    let mut action = base_action_from_event(event);
293    let data = &event.data;
294    match event.event_type.as_str() {
295        "release_analysis" => {
296            action.kind = "release_analysis".to_string();
297            action.name = format!(
298                "analyze_release[{}->{}]",
299                data.get("current_version")
300                    .and_then(JsonValue::as_str)
301                    .unwrap_or(&release.current_version),
302                data.get("next_version")
303                    .and_then(JsonValue::as_str)
304                    .unwrap_or(&release.next_version),
305            );
306            action.parameters = release_parameters(release);
307            action.deterministic = Some(true);
308            action.fuzzy = Some(false);
309            action.capabilities = vec!["git.read".to_string(), "fs.read".to_string()];
310            action.inputs = data.clone();
311        }
312        "changelog_audit_inputs" => {
313            action.kind = "changelog_audit".to_string();
314            action.name = "collect_changelog_audit_inputs".to_string();
315            action.parameters = release_parameters(release);
316            action.deterministic = Some(true);
317            action.fuzzy = Some(false);
318            action.capabilities = vec!["fs.read".to_string()];
319            action.inputs = data.clone();
320        }
321        "deterministic_finding" => {
322            let finding = data
323                .get("finding")
324                .and_then(JsonValue::as_str)
325                .unwrap_or("finding");
326            action.kind = "release_finding".to_string();
327            action.name = format!("finding[{}]", short_summary(finding, 32));
328            action.deterministic = Some(true);
329            action.fuzzy = Some(false);
330            action.observed_output = Some(json!({"finding": finding}));
331        }
332        "release_step_recorded" => {
333            let step_name = data
334                .get("name")
335                .and_then(JsonValue::as_str)
336                .unwrap_or("step")
337                .to_string();
338            let command = data
339                .get("command")
340                .and_then(JsonValue::as_str)
341                .unwrap_or("")
342                .to_string();
343            let success = data
344                .get("success")
345                .and_then(JsonValue::as_bool)
346                .unwrap_or(true);
347            let status = data.get("status").cloned().unwrap_or(json!(0));
348            let classification = data
349                .get("classification")
350                .and_then(JsonValue::as_str)
351                .unwrap_or("");
352            let recovery_hint = data
353                .get("recovery_hint")
354                .and_then(JsonValue::as_str)
355                .unwrap_or("");
356            action.kind = if success {
357                "release_step".to_string()
358            } else {
359                "shell_failure".to_string()
360            };
361            action.name = sanitize_step_name(&step_name);
362            action.deterministic = Some(true);
363            action.fuzzy = Some(false);
364            action.parameters = BTreeMap::from([
365                ("step".to_string(), json!(step_name)),
366                ("command".to_string(), json!(command)),
367            ]);
368            action.inputs = json!({"command": command});
369            action.observed_output = Some(json!({"status": status, "success": success}));
370            if !success {
371                action.side_effects.push(CrystallizationSideEffect {
372                    kind: "shell_failure".to_string(),
373                    target: step_name.clone(),
374                    capability: Some("shell.exec".to_string()),
375                    mutation: None,
376                    metadata: BTreeMap::from([(
377                        "classification".to_string(),
378                        json!(classification),
379                    )]),
380                });
381            }
382            action
383                .metadata
384                .insert("classification".to_string(), json!(classification));
385            action
386                .metadata
387                .insert("recovery_hint".to_string(), json!(recovery_hint));
388            action
389                .metadata
390                .insert("success".to_string(), json!(success));
391        }
392        _ => return None,
393    }
394    Some(action)
395}
396
397fn tool_observation_to_action(
398    event: &ReleaseFixtureEvent,
399    release: &ReleaseFixtureIdentity,
400) -> Option<CrystallizationAction> {
401    if event.event_type != "tool_observation" {
402        return None;
403    }
404    let mut action = base_action_from_event(event);
405    let data = &event.data;
406    let tool = data
407        .get("tool")
408        .and_then(JsonValue::as_str)
409        .unwrap_or("shell");
410    let command = data
411        .get("command")
412        .and_then(JsonValue::as_str)
413        .unwrap_or("");
414    let path = data.get("path").and_then(JsonValue::as_str);
415    let step_name = data.get("step_name").and_then(JsonValue::as_str);
416    let success = data
417        .get("success")
418        .and_then(JsonValue::as_bool)
419        .unwrap_or(true);
420
421    action.kind = format!("tool_observation:{tool}");
422    action.name = match (tool, step_name) {
423        (_, Some(name)) if !name.is_empty() => sanitize_step_name(name),
424        ("read_file", Some(_)) | ("read_file", None) => format!(
425            "read_file[{}]",
426            short_summary(path.unwrap_or("unknown"), 48)
427        ),
428        ("shell", _) => format!("shell[{}]", short_summary(command, 48)),
429        _ => format!("{tool}[{}]", short_summary(command, 48)),
430    };
431    action.deterministic = Some(event.source != "agent");
432    action.fuzzy = Some(false);
433    let _ = release; // release identity only enters via metadata above
434    action.inputs = data.clone();
435    action.observed_output = Some(json!({
436        "stdout": data.get("stdout").cloned().unwrap_or(json!("")),
437        "stderr": data.get("stderr").cloned().unwrap_or(json!("")),
438        "status": data.get("status").cloned().unwrap_or(json!(0)),
439        "success": success,
440    }));
441    if !success {
442        action.side_effects.push(CrystallizationSideEffect {
443            kind: "tool_failure".to_string(),
444            target: step_name.unwrap_or(tool).to_string(),
445            capability: Some("shell.exec".to_string()),
446            mutation: None,
447            metadata: BTreeMap::default(),
448        });
449    }
450    action.metadata.insert("tool".to_string(), json!(tool));
451    Some(action)
452}
453
454fn agent_event_to_action(
455    event: &ReleaseFixtureEvent,
456    release: &ReleaseFixtureIdentity,
457) -> Option<CrystallizationAction> {
458    let mut action = base_action_from_event(event);
459    let data = &event.data;
460    match event.event_type.as_str() {
461        "agent_review_attempt" => {
462            let name = data
463                .get("name")
464                .and_then(JsonValue::as_str)
465                .unwrap_or("review");
466            action.kind = "agent_review_attempt".to_string();
467            action.name = format!("agent_review[{}]", sanitize_step_name(name));
468            action.fuzzy = Some(true);
469            action.deterministic = Some(false);
470            action.cost.model_calls = 1;
471            action.parameters = release_parameters(release);
472            action.inputs = data.clone();
473            action.observed_output = data.get("text").cloned();
474            action.approval = Some(CrystallizationApproval {
475                prompt: Some(
476                    "Human reviewer must accept the agent-authored audit before promotion."
477                        .to_string(),
478                ),
479                approver: None,
480                required: true,
481                boundary: Some("release_audit_review".to_string()),
482            });
483        }
484        "agent_review_artifacts" => {
485            action.kind = "agent_review_artifacts".to_string();
486            action.name = "persist_agent_review_artifacts".to_string();
487            action.deterministic = Some(true);
488            action.fuzzy = Some(false);
489            action.observed_output = Some(data.clone());
490        }
491        "agent_recovery_advice" => {
492            let step_name = data
493                .get("step_name")
494                .and_then(JsonValue::as_str)
495                .unwrap_or("recovery");
496            action.kind = "agent_recovery_advice".to_string();
497            action.name = format!("recovery_advice[{}]", sanitize_step_name(step_name));
498            action.fuzzy = Some(true);
499            action.deterministic = Some(false);
500            action.cost.model_calls = 1;
501            action.observed_output = data.get("text").cloned();
502            action.parameters = BTreeMap::from([("failed_step".to_string(), json!(step_name))]);
503            action.approval = Some(CrystallizationApproval {
504                prompt: Some(
505                    "Human reviewer must validate recovery advice before re-running the failing step."
506                        .to_string(),
507                ),
508                approver: None,
509                required: true,
510                boundary: Some("recovery_review".to_string()),
511            });
512            action
513                .metadata
514                .insert("failed_step".to_string(), json!(step_name));
515        }
516        "agent_review_skipped" => {
517            action.kind = "agent_review_skipped".to_string();
518            action.name = "agent_review_skipped".to_string();
519            action.deterministic = Some(true);
520            action.fuzzy = Some(false);
521            action.observed_output = data.get("reason").cloned();
522        }
523        _ => return None,
524    }
525    Some(action)
526}
527
528fn base_action_from_event(event: &ReleaseFixtureEvent) -> CrystallizationAction {
529    CrystallizationAction {
530        id: stable_event_id(event),
531        timestamp: event.timestamp.clone(),
532        ..CrystallizationAction::default()
533    }
534}
535
536fn stable_event_id(event: &ReleaseFixtureEvent) -> String {
537    let mut hasher = Sha256::new();
538    hasher.update(event.event_type.as_bytes());
539    hasher.update([0]);
540    hasher.update(event.source.as_bytes());
541    hasher.update([0]);
542    if let Some(timestamp) = &event.timestamp {
543        hasher.update(timestamp.as_bytes());
544    }
545    hasher.update([0]);
546    hasher.update(event.data.to_string().as_bytes());
547    let hex = hex::encode(hasher.finalize());
548    format!(
549        "evt_{}_{}",
550        sanitize_step_name(&event.event_type),
551        hex.chars().take(12).collect::<String>()
552    )
553}
554
555fn release_parameters(release: &ReleaseFixtureIdentity) -> BTreeMap<String, JsonValue> {
556    let mut out = BTreeMap::new();
557    out.insert("repo".to_string(), json!(release.repo));
558    out.insert("base_branch".to_string(), json!(release.base_branch));
559    out.insert(
560        "current_version".to_string(),
561        json!(release.current_version),
562    );
563    out.insert("next_version".to_string(), json!(release.next_version));
564    out.insert(
565        "target_release_branch".to_string(),
566        json!(release.target_release_branch),
567    );
568    out
569}
570
571fn sanitize_step_name(raw: &str) -> String {
572    let cleaned: String = raw
573        .chars()
574        .map(|ch| {
575            if ch.is_ascii_alphanumeric() || ch == '_' || ch == '-' {
576                ch.to_ascii_lowercase()
577            } else {
578                '_'
579            }
580        })
581        .collect();
582    let trimmed = cleaned.trim_matches('_').to_string();
583    if trimmed.is_empty() {
584        "step".to_string()
585    } else {
586        trimmed
587    }
588}
589
590fn short_summary(raw: &str, max_chars: usize) -> String {
591    let cleaned = raw.replace(['\n', '\r', '\t'], " ");
592    let trimmed = cleaned.trim();
593    if trimmed.chars().count() <= max_chars {
594        trimmed.to_string()
595    } else {
596        let prefix: String = trimmed.chars().take(max_chars - 1).collect();
597        format!("{prefix}…")
598    }
599}
600
601fn hash_short(bytes: &[u8]) -> String {
602    let mut hasher = Sha256::new();
603    hasher.update(bytes);
604    hex::encode(hasher.finalize()).chars().take(12).collect()
605}
606
607/// Build a [`SegmentSummary`] from an ingested fixture. Splits steps
608/// into "safe to automate" (deterministic events with no shell
609/// failures) vs. "requires human review" (agent events, shell
610/// failures, recovery advice).
611pub fn build_segment_summary(fixture: &ReleaseFixture) -> SegmentSummary {
612    let mut safe = Vec::new();
613    let mut review = Vec::new();
614    for event in &fixture.deterministic_events {
615        match event.event_type.as_str() {
616            "release_analysis" | "changelog_audit_inputs" => safe.push(event.event_type.clone()),
617            "release_step_recorded" => {
618                let name = event
619                    .data
620                    .get("name")
621                    .and_then(JsonValue::as_str)
622                    .unwrap_or("release_step")
623                    .to_string();
624                let success = event
625                    .data
626                    .get("success")
627                    .and_then(JsonValue::as_bool)
628                    .unwrap_or(true);
629                if success {
630                    safe.push(format!("step:{name}"));
631                } else {
632                    review.push(format!(
633                        "failed step:{name} (deterministic recovery required before re-run)"
634                    ));
635                }
636            }
637            "deterministic_finding" => {
638                let finding = event
639                    .data
640                    .get("finding")
641                    .and_then(JsonValue::as_str)
642                    .unwrap_or("finding");
643                review.push(format!("finding requires reviewer attention: {finding}"));
644            }
645            _ => {}
646        }
647    }
648    for event in &fixture.agent_events {
649        match event.event_type.as_str() {
650            "agent_review_attempt" => {
651                let name = event
652                    .data
653                    .get("name")
654                    .and_then(JsonValue::as_str)
655                    .unwrap_or("agent_review");
656                review.push(format!(
657                    "agent review attempt:{name} (model-authored, advisory only)"
658                ));
659            }
660            "agent_recovery_advice" => {
661                let step = event
662                    .data
663                    .get("step_name")
664                    .and_then(JsonValue::as_str)
665                    .unwrap_or("step");
666                review.push(format!(
667                    "agent recovery advice for {step} (must be validated before re-run)"
668                ));
669            }
670            _ => {}
671        }
672    }
673    let plain = format!(
674        "Safe to automate: {} deterministic event(s) (release analysis, changelog inputs, \
675         successful release steps). Requires human/agent review: {} item(s) including \
676         agent-authored audits, model recovery advice, and any failed deterministic steps. \
677         The crystallized workflow keeps all agent steps behind explicit approval boundaries; \
678         hosts should not promote this candidate to fully autonomous execution without first \
679         resolving the review-required entries.",
680        safe.len(),
681        review.len()
682    );
683    SegmentSummary {
684        deterministic_count: safe.len(),
685        agentic_count: review.len(),
686        safe_to_automate: safe,
687        requires_human_review: review,
688        plain_language: plain,
689    }
690}
691
692/// Build a [`RecoveryFeedbackSummary`] from an ingested fixture. Counts
693/// failed `release_step_recorded` events (the canonical failure record
694/// in `release_harn.harn`) and recovery-advice runs, then emits a
695/// plain-language description of how recovery is represented.
696///
697/// The mirrored `tool_observation` rows for the same release steps are
698/// only consulted for failures whose step name does not already appear
699/// in the deterministic stream — that way a per-step failure is counted
700/// exactly once, but a tool observation that is not paired with a
701/// release-step row (e.g. a one-off shell read failure) still counts.
702pub fn build_recovery_summary(fixture: &ReleaseFixture) -> RecoveryFeedbackSummary {
703    let mut shell_failures = 0usize;
704    let mut failed_steps: Vec<String> = Vec::new();
705    let mut counted_step_names: BTreeSet<String> = BTreeSet::new();
706
707    for event in fixture
708        .deterministic_events
709        .iter()
710        .chain(fixture.tool_observations.iter())
711    {
712        let success = event
713            .data
714            .get("success")
715            .and_then(JsonValue::as_bool)
716            .unwrap_or(true);
717        if success {
718            continue;
719        }
720        let name = event
721            .data
722            .get("name")
723            .or_else(|| event.data.get("step_name"))
724            .and_then(JsonValue::as_str);
725        if let Some(name) = name {
726            if !counted_step_names.insert(name.to_string()) {
727                continue; // already counted from the deterministic stream
728            }
729            if !failed_steps.iter().any(|n| n == name) {
730                failed_steps.push(name.to_string());
731            }
732        }
733        shell_failures += 1;
734    }
735    let recovery_runs = fixture
736        .agent_events
737        .iter()
738        .filter(|event| event.event_type == "agent_recovery_advice")
739        .count();
740    let fed = recovery_runs > 0 && shell_failures > 0;
741    let representation = if fed {
742        format!(
743            "{} shell/tool failure(s) were observed and {} of them triggered an `agent_loop` \
744             recovery advice run. Failure stdout/stderr, classification, and recovery hints from \
745             the failing release step were embedded in the model prompt; the model produced \
746             advisory text only — no automatic re-run or live mutation. Reviewers must validate \
747             the advice before re-running the failing step.",
748            shell_failures, recovery_runs
749        )
750    } else if shell_failures > 0 {
751        format!(
752            "{} shell/tool failure(s) were observed but no agent recovery loop was invoked. \
753             Failure context was recorded for human review only.",
754            shell_failures
755        )
756    } else if recovery_runs > 0 {
757        format!(
758            "No shell/tool failures were observed in this run, but {} agent recovery loop(s) \
759             ran (likely from a previous attempt or a non-shell error path).",
760            recovery_runs
761        )
762    } else {
763        "No shell/tool failures were observed and no recovery loops ran. The release \
764         executed end-to-end on the deterministic path."
765            .to_string()
766    };
767    RecoveryFeedbackSummary {
768        shell_failures_seen: shell_failures,
769        recovery_advice_runs: recovery_runs,
770        failures_fed_into_agent: fed,
771        failed_steps,
772        representation,
773    }
774}
775
776/// Top-level convenience: read a fixture from disk and synthesize a
777/// crystallization candidate ready for bundle-build / validate /
778/// shadow-replay. This is what the CLI subcommand wires up.
779pub fn ingest_release_fixture(
780    dir: &Path,
781    options: CrystallizeOptions,
782) -> Result<
783    (
784        CrystallizationArtifacts,
785        ReleaseFixture,
786        CrystallizationTrace,
787    ),
788    VmError,
789> {
790    let fixture = load_release_fixture(dir)?;
791    let mut trace = release_fixture_to_trace(&fixture);
792    if trace.actions.is_empty() {
793        return Err(VmError::Runtime(format!(
794            "release fixture {} produced zero actions; nothing to crystallize",
795            dir.display()
796        )));
797    }
798    // Stamp a content hash on the trace so the manifest's
799    // source_trace_hashes line up with downstream eval pack rubric
800    // expectations even before normalize_trace re-fills it.
801    let payload = serde_json::to_vec(&trace.actions).unwrap_or_default();
802    trace.source_hash = Some(format!(
803        "sha256:{}",
804        hex::encode(Sha256::digest(payload.as_slice()))
805    ));
806
807    let segment_summary = build_segment_summary(&fixture);
808    let recovery_summary = build_recovery_summary(&fixture);
809    let release = &fixture.manifest.release;
810    let extra_parameters = release_parameter_definitions(release);
811
812    let artifacts = synthesize_candidate_from_trace(
813        trace.clone(),
814        options,
815        extra_parameters,
816        Some(segment_summary),
817        Some(recovery_summary),
818    )?;
819    Ok((artifacts, fixture, trace))
820}
821
822fn release_parameter_definitions(
823    release: &ReleaseFixtureIdentity,
824) -> Vec<WorkflowCandidateParameter> {
825    fn parameter(name: &str, value: &str) -> WorkflowCandidateParameter {
826        WorkflowCandidateParameter {
827            name: name.to_string(),
828            source_paths: vec![format!("manifest.release.{name}")],
829            examples: if value.trim().is_empty() {
830                Vec::new()
831            } else {
832                vec![value.to_string()]
833            },
834            required: true,
835        }
836    }
837    vec![
838        parameter("repo", &release.repo),
839        parameter("base_branch", &release.base_branch),
840        parameter("current_version", &release.current_version),
841        parameter("next_version", &release.next_version),
842        parameter("target_release_branch", &release.target_release_branch),
843    ]
844}
845
846#[cfg(test)]
847mod tests {
848    use super::*;
849    use std::fs;
850    use tempfile::TempDir;
851
852    fn write_fixture(dir: &Path) {
853        let manifest = json!({
854            "schema_version": RELEASE_FIXTURE_SCHEMA,
855            "kind": "release_harn_crystallization_input",
856            "generated_by": "release_harn.harn",
857            "generated_at": "2026-05-02T00:00:00Z",
858            "run_id": "test-run",
859            "source_issue": "https://github.com/burin-labs/harn-bump-fleet/issues/2",
860            "consumer_issue": "https://github.com/burin-labs/harn/issues/1146",
861            "release": {
862                "repo": "/tmp/harn",
863                "mode": "audit",
864                "mock": true,
865                "current_version": "0.7.52",
866                "next_version": "0.7.53",
867                "starting_branch": "main",
868                "target_release_branch": "release/v0.7.53",
869                "base_branch": "main",
870                "latest_tag": "v0.7.52"
871            }
872        });
873        fs::write(
874            dir.join(MANIFEST_FILE),
875            serde_json::to_string_pretty(&manifest).unwrap(),
876        )
877        .unwrap();
878
879        let det = [
880            json!({
881                "schema_version": RELEASE_FIXTURE_SCHEMA,
882                "event_type": "release_analysis",
883                "source": "deterministic",
884                "timestamp": "2026-05-02T00:00:00Z",
885                "data": {
886                    "current_version": "0.7.52",
887                    "next_version": "0.7.53",
888                    "base_branch": "main"
889                }
890            }),
891            json!({
892                "schema_version": RELEASE_FIXTURE_SCHEMA,
893                "event_type": "changelog_audit_inputs",
894                "source": "deterministic",
895                "timestamp": "2026-05-02T00:00:01Z",
896                "data": {"expected_version": "0.7.53"}
897            }),
898            json!({
899                "schema_version": RELEASE_FIXTURE_SCHEMA,
900                "event_type": "release_step_recorded",
901                "source": "deterministic",
902                "timestamp": "2026-05-02T00:00:02Z",
903                "data": {
904                    "name": "ensure-clean-tree",
905                    "command": "git status --porcelain",
906                    "success": true,
907                    "status": 0
908                }
909            }),
910            json!({
911                "schema_version": RELEASE_FIXTURE_SCHEMA,
912                "event_type": "release_step_recorded",
913                "source": "deterministic",
914                "timestamp": "2026-05-02T00:00:03Z",
915                "data": {
916                    "name": "push",
917                    "command": "git push -u origin release/v0.7.53",
918                    "success": false,
919                    "status": 1,
920                    "classification": "branch_protection",
921                    "recovery_hint": "rerun with --no-verify after green hook budget"
922                }
923            }),
924        ];
925        let det_jsonl: String = det
926            .iter()
927            .map(|v| serde_json::to_string(v).unwrap())
928            .collect::<Vec<_>>()
929            .join("\n");
930        fs::write(dir.join(DETERMINISTIC_EVENTS_FILE), det_jsonl + "\n").unwrap();
931
932        let agent = [
933            json!({
934                "schema_version": RELEASE_FIXTURE_SCHEMA,
935                "event_type": "agent_review_attempt",
936                "source": "agent",
937                "timestamp": "2026-05-02T00:00:04Z",
938                "data": {
939                    "index": 0,
940                    "name": "release_audit",
941                    "status": "ok",
942                    "text": "audit passes",
943                    "validation_findings": []
944                }
945            }),
946            json!({
947                "schema_version": RELEASE_FIXTURE_SCHEMA,
948                "event_type": "agent_recovery_advice",
949                "source": "agent",
950                "timestamp": "2026-05-02T00:00:05Z",
951                "data": {
952                    "step_name": "push",
953                    "status": "ok",
954                    "text": "Re-run with --no-verify"
955                }
956            }),
957        ];
958        let agent_jsonl: String = agent
959            .iter()
960            .map(|v| serde_json::to_string(v).unwrap())
961            .collect::<Vec<_>>()
962            .join("\n");
963        fs::write(dir.join(AGENT_EVENTS_FILE), agent_jsonl + "\n").unwrap();
964
965        let tools = [json!({
966            "schema_version": RELEASE_FIXTURE_SCHEMA,
967            "event_type": "tool_observation",
968            "source": "deterministic",
969            "timestamp": "2026-05-02T00:00:06Z",
970            "data": {
971                "tool": "shell",
972                "command": "git status --porcelain",
973                "success": true,
974                "status": 0,
975                "stdout": "",
976                "stderr": ""
977            }
978        })];
979        let tools_jsonl: String = tools
980            .iter()
981            .map(|v| serde_json::to_string(v).unwrap())
982            .collect::<Vec<_>>()
983            .join("\n");
984        fs::write(dir.join(TOOL_OBSERVATIONS_FILE), tools_jsonl + "\n").unwrap();
985    }
986
987    #[test]
988    fn ingest_emits_a_safe_candidate_with_segment_and_recovery_summary() {
989        let temp = TempDir::new().unwrap();
990        write_fixture(temp.path());
991        let (artifacts, fixture, _trace) = ingest_release_fixture(
992            temp.path(),
993            CrystallizeOptions {
994                workflow_name: Some("release_harn".to_string()),
995                package_name: Some("release-harn".to_string()),
996                ..CrystallizeOptions::default()
997            },
998        )
999        .expect("ingest");
1000
1001        // Manifest decoded.
1002        assert_eq!(fixture.manifest.release.next_version, "0.7.53");
1003
1004        // Candidate selected and safe to propose.
1005        assert!(artifacts.report.selected_candidate_id.is_some());
1006        let candidate = &artifacts.report.candidates[0];
1007        assert_eq!(candidate.name, "release_harn");
1008        assert!(candidate.shadow.pass);
1009
1010        // Segment summary records both deterministic and agentic items.
1011        let summary = artifacts
1012            .report
1013            .segment_summary
1014            .as_ref()
1015            .expect("segment summary");
1016        assert!(summary.deterministic_count >= 3);
1017        assert!(summary.agentic_count >= 2);
1018        assert!(summary
1019            .requires_human_review
1020            .iter()
1021            .any(|item| item.contains("failed step:push")));
1022
1023        // Recovery summary captures the failed push + advice.
1024        let recovery = artifacts
1025            .report
1026            .recovery_summary
1027            .as_ref()
1028            .expect("recovery summary");
1029        assert!(recovery.shell_failures_seen >= 1);
1030        assert!(recovery.recovery_advice_runs >= 1);
1031        assert!(recovery.failures_fed_into_agent);
1032        assert!(recovery.failed_steps.contains(&"push".to_string()));
1033        assert!(recovery.representation.contains("agent_loop"));
1034
1035        // Release identity surfaces as parameters with `next_version` etc.
1036        let names: Vec<&str> = candidate
1037            .parameters
1038            .iter()
1039            .map(|p| p.name.as_str())
1040            .collect();
1041        assert!(names.contains(&"next_version"));
1042        assert!(names.contains(&"current_version"));
1043        assert!(names.contains(&"base_branch"));
1044
1045        // Generated workflow code references the candidate name.
1046        assert!(artifacts.harn_code.contains("pipeline release_harn"));
1047    }
1048
1049    #[test]
1050    fn rejects_unknown_schema() {
1051        let temp = TempDir::new().unwrap();
1052        let manifest = json!({
1053            "schema_version": "release_harn.crystallization_input.v999",
1054            "kind": "release_harn_crystallization_input",
1055            "generated_by": "release_harn.harn",
1056            "generated_at": "2026-05-02T00:00:00Z",
1057            "run_id": "test-run",
1058            "release": {
1059                "repo": "/tmp/harn",
1060                "mode": "audit",
1061                "mock": true,
1062                "current_version": "0.7.52",
1063                "next_version": "0.7.53",
1064                "starting_branch": "main",
1065                "target_release_branch": "release/v0.7.53",
1066                "base_branch": "main",
1067                "latest_tag": "v0.7.52"
1068            }
1069        });
1070        fs::write(
1071            temp.path().join(MANIFEST_FILE),
1072            serde_json::to_string_pretty(&manifest).unwrap(),
1073        )
1074        .unwrap();
1075        let err = load_release_fixture(temp.path()).unwrap_err();
1076        assert!(format!("{err}").contains("unrecognized schema"));
1077    }
1078
1079    #[test]
1080    fn missing_jsonl_streams_default_to_empty() {
1081        let temp = TempDir::new().unwrap();
1082        let manifest = json!({
1083            "schema_version": RELEASE_FIXTURE_SCHEMA,
1084            "kind": "release_harn_crystallization_input",
1085            "generated_by": "release_harn.harn",
1086            "generated_at": "2026-05-02T00:00:00Z",
1087            "run_id": "no-events-run",
1088            "release": {
1089                "repo": "/tmp/harn",
1090                "mode": "audit",
1091                "mock": true,
1092                "current_version": "0.7.52",
1093                "next_version": "0.7.53",
1094                "starting_branch": "main",
1095                "target_release_branch": "release/v0.7.53",
1096                "base_branch": "main",
1097                "latest_tag": "v0.7.52"
1098            }
1099        });
1100        fs::write(
1101            temp.path().join(MANIFEST_FILE),
1102            serde_json::to_string_pretty(&manifest).unwrap(),
1103        )
1104        .unwrap();
1105        let fixture = load_release_fixture(temp.path()).expect("load");
1106        assert!(fixture.deterministic_events.is_empty());
1107        assert!(fixture.agent_events.is_empty());
1108        assert!(fixture.tool_observations.is_empty());
1109
1110        // Without any events, ingest fails closed (no actions to crystallize).
1111        let err = ingest_release_fixture(temp.path(), CrystallizeOptions::default()).unwrap_err();
1112        assert!(format!("{err}").contains("zero actions"));
1113    }
1114}