Skip to main content

harn_vm/orchestration/
mod.rs

1use std::path::PathBuf;
2use std::{cell::RefCell, thread_local};
3
4use serde::{Deserialize, Serialize};
5
6use crate::llm::vm_value_to_json;
7use crate::value::{VmError, VmValue};
8
9pub(crate) fn now_rfc3339() -> String {
10    use std::time::{SystemTime, UNIX_EPOCH};
11    let ts = SystemTime::now()
12        .duration_since(UNIX_EPOCH)
13        .unwrap_or_default()
14        .as_secs();
15    format!("{ts}")
16}
17
18pub(crate) fn new_id(prefix: &str) -> String {
19    format!("{prefix}_{}", uuid::Uuid::now_v7())
20}
21
22pub(crate) fn default_run_dir() -> PathBuf {
23    let base = std::env::current_dir().unwrap_or_else(|_| PathBuf::from("."));
24    crate::runtime_paths::run_root(&base)
25}
26
27mod hooks;
28pub use hooks::*;
29
30mod command_policy;
31pub use command_policy::*;
32
33mod compaction;
34pub use compaction::*;
35
36mod artifacts;
37pub use artifacts::*;
38
39mod assemble;
40pub use assemble::*;
41
42mod handoffs;
43pub use handoffs::*;
44
45mod friction;
46pub use friction::*;
47
48mod crystallize;
49pub use crystallize::*;
50
51mod release_fixture;
52pub use release_fixture::*;
53
54mod replay_oracle;
55pub use replay_oracle::*;
56
57mod policy;
58pub use policy::*;
59
60mod stage_options;
61pub use stage_options::*;
62
63mod workflow;
64pub use workflow::*;
65
66mod workflow_bundle;
67pub use workflow_bundle::*;
68
69mod records;
70pub use records::*;
71
72mod merge_captain_audit;
73pub use merge_captain_audit::*;
74
75mod merge_captain_driver;
76pub use merge_captain_driver::*;
77
78mod merge_captain_ladder;
79pub use merge_captain_ladder::*;
80
81mod merge_captain_iteration;
82pub use merge_captain_iteration::*;
83
84pub mod playground;
85
86thread_local! {
87    static CURRENT_MUTATION_SESSION: RefCell<Option<MutationSessionRecord>> = const { RefCell::new(None) };
88    /// Workflow-level skill context, installed by `workflow_execute` so
89    /// every per-node agent loop constructed inside `execute_stage_node`
90    /// can pick up the same `skills:` / `skill_match:` registry without
91    /// threading a new parameter through every helper. Cleared on
92    /// workflow exit (success or error) by `WorkflowSkillContextGuard`.
93    static CURRENT_WORKFLOW_SKILL_CONTEXT: RefCell<Option<WorkflowSkillContext>> = const { RefCell::new(None) };
94}
95
96/// Skill wiring threaded from `workflow_execute` into the per-stage
97/// agent loops via thread-local context. `VmValue` wraps `Rc` and is
98/// not `Send`, so we store it in a thread-local rather than a mutex —
99/// the workflow runner pins itself to one task via `LocalSet`, so
100/// every stage observes the same context.
101#[derive(Clone, Default)]
102pub struct WorkflowSkillContext {
103    pub registry: Option<VmValue>,
104    pub match_config: Option<VmValue>,
105}
106
107pub fn install_workflow_skill_context(context: Option<WorkflowSkillContext>) {
108    CURRENT_WORKFLOW_SKILL_CONTEXT.with(|slot| {
109        *slot.borrow_mut() = context;
110    });
111}
112
113pub fn current_workflow_skill_context() -> Option<WorkflowSkillContext> {
114    CURRENT_WORKFLOW_SKILL_CONTEXT.with(|slot| slot.borrow().clone())
115}
116
117/// RAII guard that clears the workflow skill context on drop. Paired
118/// with `install_workflow_skill_context` at the top of `execute_workflow`
119/// so the context never leaks past a workflow's scope.
120pub struct WorkflowSkillContextGuard;
121
122impl Drop for WorkflowSkillContextGuard {
123    fn drop(&mut self) {
124        install_workflow_skill_context(None);
125    }
126}
127
128#[derive(Clone, Debug, Default, Serialize, Deserialize, PartialEq, Eq)]
129#[serde(default)]
130pub struct MutationSessionRecord {
131    pub session_id: String,
132    pub parent_session_id: Option<String>,
133    pub run_id: Option<String>,
134    pub worker_id: Option<String>,
135    pub execution_kind: Option<String>,
136    pub mutation_scope: String,
137    /// Declarative per-tool approval policy for this session. When `None`,
138    /// no policy-driven approval is requested; the session update stream
139    /// remains the only host-observable surface for tool dispatch.
140    pub approval_policy: Option<ToolApprovalPolicy>,
141}
142
143impl MutationSessionRecord {
144    pub fn normalize(mut self) -> Self {
145        if self.session_id.is_empty() {
146            self.session_id = new_id("session");
147        }
148        if self.mutation_scope.is_empty() {
149            self.mutation_scope = "read_only".to_string();
150        }
151        self
152    }
153}
154
155pub fn install_current_mutation_session(session: Option<MutationSessionRecord>) {
156    CURRENT_MUTATION_SESSION.with(|slot| {
157        *slot.borrow_mut() = session.map(MutationSessionRecord::normalize);
158    });
159}
160
161pub fn current_mutation_session() -> Option<MutationSessionRecord> {
162    CURRENT_MUTATION_SESSION.with(|slot| slot.borrow().clone())
163}
164pub(crate) fn parse_json_payload<T: for<'de> Deserialize<'de>>(
165    json: serde_json::Value,
166    label: &str,
167) -> Result<T, VmError> {
168    let payload = json.to_string();
169    let mut deserializer = serde_json::Deserializer::from_str(&payload);
170    let mut tracker = serde_path_to_error::Track::new();
171    let path_deserializer = serde_path_to_error::Deserializer::new(&mut deserializer, &mut tracker);
172    T::deserialize(path_deserializer).map_err(|error| {
173        let snippet = if payload.len() > 600 {
174            format!("{}...", &payload[..600])
175        } else {
176            payload.clone()
177        };
178        VmError::Runtime(format!(
179            "{label} parse error at {}: {} | payload={}",
180            tracker.path(),
181            error,
182            snippet
183        ))
184    })
185}
186
187pub(crate) fn parse_json_value<T: for<'de> Deserialize<'de>>(
188    value: &VmValue,
189) -> Result<T, VmError> {
190    parse_json_payload(vm_value_to_json(value), "orchestration")
191}
192
193#[cfg(test)]
194mod tests;