Skip to main content

zeph_memory/semantic/
recall.rs

1// SPDX-FileCopyrightText: 2026 Andrei G <bug-ops>
2// SPDX-License-Identifier: MIT OR Apache-2.0
3
4use std::sync::Arc;
5use std::sync::atomic::{AtomicU64, Ordering};
6
7use futures::{StreamExt as _, TryStreamExt as _};
8use zeph_llm::provider::{LlmProvider as _, Message};
9
10/// Approximate characters per token (conservative estimate for mixed content).
11const CHARS_PER_TOKEN: usize = 4;
12
13/// Target chunk size in characters (~400 tokens).
14const CHUNK_CHARS: usize = 400 * CHARS_PER_TOKEN;
15
16/// Overlap between adjacent chunks in characters (~80 tokens).
17const CHUNK_OVERLAP_CHARS: usize = 80 * CHARS_PER_TOKEN;
18
19/// Split `text` into overlapping chunks suitable for embedding.
20///
21/// For text shorter than `CHUNK_CHARS`, returns a single chunk.
22/// Splits at UTF-8 character boundaries on paragraph (`\n\n`), line (`\n`),
23/// space (` `), or raw character boundaries as a last resort.
24fn chunk_text(text: &str) -> Vec<&str> {
25    if text.len() <= CHUNK_CHARS {
26        return vec![text];
27    }
28
29    let mut chunks = Vec::new();
30    let mut start = 0;
31
32    while start < text.len() {
33        let end = if start + CHUNK_CHARS >= text.len() {
34            text.len()
35        } else {
36            // Find a clean UTF-8 char boundary at or before start + CHUNK_CHARS.
37            let boundary = text.floor_char_boundary(start + CHUNK_CHARS);
38            // Prefer to split at a paragraph or line break for cleaner chunks.
39            let slice = &text[start..boundary];
40            if let Some(pos) = slice.rfind("\n\n") {
41                start + pos + 2
42            } else if let Some(pos) = slice.rfind('\n') {
43                start + pos + 1
44            } else if let Some(pos) = slice.rfind(' ') {
45                start + pos + 1
46            } else {
47                boundary
48            }
49        };
50
51        chunks.push(&text[start..end]);
52        if end >= text.len() {
53            break;
54        }
55        // Next chunk starts with overlap, but must always advance past the
56        // current position to prevent infinite loops when rfind finds a match
57        // very early in the slice (end barely advances, overlap rewinds start).
58        let next = end.saturating_sub(CHUNK_OVERLAP_CHARS);
59        let new_start = text.ceil_char_boundary(next);
60        start = if new_start > start { new_start } else { end };
61    }
62
63    chunks
64}
65
66use crate::admission::log_admission_decision;
67use crate::embedding_store::{MessageKind, SearchFilter};
68use crate::error::MemoryError;
69use crate::types::{ConversationId, MessageId};
70
71use super::SemanticMemory;
72use super::algorithms::{apply_mmr, apply_temporal_decay};
73
74/// Tool execution metadata stored as Qdrant payload fields alongside embeddings.
75///
76/// Stored as payload — NOT prepended to content — to avoid corrupting embedding vectors.
77#[derive(Debug, Clone, Default)]
78pub struct EmbedContext {
79    pub tool_name: Option<String>,
80    pub exit_code: Option<i32>,
81    pub timestamp: Option<String>,
82}
83
84#[derive(Debug)]
85pub struct RecalledMessage {
86    pub message: Message,
87    pub score: f32,
88}
89
90/// Maximum number of concurrent background embed tasks per `SemanticMemory` instance.
91const MAX_EMBED_BG_TASKS: usize = 64;
92
93/// Shared arguments for background embed tasks.
94struct EmbedBgArgs {
95    qdrant: Arc<crate::embedding_store::EmbeddingStore>,
96    embed_provider: zeph_llm::any::AnyProvider,
97    embedding_model: String,
98    message_id: MessageId,
99    conversation_id: ConversationId,
100    role: String,
101    content: String,
102    last_qdrant_warn: Arc<AtomicU64>,
103}
104
105/// Background task: embed chunks and store as regular message vectors.
106///
107/// All errors are logged as warnings; the function never panics.
108async fn embed_and_store_regular_bg(args: EmbedBgArgs) {
109    let EmbedBgArgs {
110        qdrant,
111        embed_provider,
112        embedding_model,
113        message_id,
114        conversation_id,
115        role,
116        content,
117        last_qdrant_warn,
118    } = args;
119    let chunks = chunk_text(&content);
120    let chunk_count = chunks.len();
121
122    let vectors = match embed_provider.embed_batch(&chunks).await {
123        Ok(v) => v,
124        Err(e) => {
125            tracing::warn!("bg embed_regular: failed to embed chunks for msg {message_id}: {e:#}");
126            return;
127        }
128    };
129
130    let Some(first) = vectors.first() else {
131        return;
132    };
133    let vector_size = first.len() as u64;
134    if let Err(e) = qdrant.ensure_collection(vector_size).await {
135        let now = std::time::SystemTime::now()
136            .duration_since(std::time::UNIX_EPOCH)
137            .unwrap_or_default()
138            .as_secs();
139        let last = last_qdrant_warn.load(Ordering::Relaxed);
140        if now.saturating_sub(last) >= 10 {
141            last_qdrant_warn.store(now, Ordering::Relaxed);
142            tracing::warn!("bg embed_regular: failed to ensure Qdrant collection: {e:#}");
143        } else {
144            tracing::debug!(
145                "bg embed_regular: failed to ensure Qdrant collection (suppressed): {e:#}"
146            );
147        }
148        return;
149    }
150
151    for (chunk_index, vector) in vectors.into_iter().enumerate() {
152        let chunk_index_u32 = u32::try_from(chunk_index).unwrap_or(u32::MAX);
153        if let Err(e) = qdrant
154            .store(
155                message_id,
156                conversation_id,
157                &role,
158                vector,
159                MessageKind::Regular,
160                &embedding_model,
161                chunk_index_u32,
162            )
163            .await
164        {
165            tracing::warn!(
166                "bg embed_regular: failed to store chunk {chunk_index}/{chunk_count} \
167                 for msg {message_id}: {e:#}"
168            );
169        }
170    }
171}
172
173/// Background task: embed chunks with tool context metadata and store in Qdrant.
174///
175/// All errors are logged as warnings; the function never panics.
176async fn embed_chunks_with_tool_context_bg(args: EmbedBgArgs, embed_ctx: EmbedContext) {
177    let EmbedBgArgs {
178        qdrant,
179        embed_provider,
180        embedding_model,
181        message_id,
182        conversation_id,
183        role,
184        content,
185        last_qdrant_warn,
186    } = args;
187    let chunks = chunk_text(&content);
188    let chunk_count = chunks.len();
189
190    let vectors = match embed_provider.embed_batch(&chunks).await {
191        Ok(v) => v,
192        Err(e) => {
193            tracing::warn!(
194                "bg embed_tool: failed to embed tool-output chunks for msg {message_id}: {e:#}"
195            );
196            return;
197        }
198    };
199
200    if let Some(first) = vectors.first() {
201        let vector_size = first.len() as u64;
202        if let Err(e) = qdrant.ensure_collection(vector_size).await {
203            let now = std::time::SystemTime::now()
204                .duration_since(std::time::UNIX_EPOCH)
205                .unwrap_or_default()
206                .as_secs();
207            let last = last_qdrant_warn.load(Ordering::Relaxed);
208            if now.saturating_sub(last) >= 10 {
209                last_qdrant_warn.store(now, Ordering::Relaxed);
210                tracing::warn!("bg embed_tool: failed to ensure Qdrant collection: {e:#}");
211            } else {
212                tracing::debug!(
213                    "bg embed_tool: failed to ensure Qdrant collection (suppressed): {e:#}"
214                );
215            }
216            return;
217        }
218    }
219
220    for (chunk_index, vector) in vectors.into_iter().enumerate() {
221        let chunk_index_u32 = u32::try_from(chunk_index).unwrap_or(u32::MAX);
222        let result = if let Some(ref tool_name) = embed_ctx.tool_name {
223            qdrant
224                .store_with_tool_context(
225                    message_id,
226                    conversation_id,
227                    &role,
228                    vector,
229                    MessageKind::Regular,
230                    &embedding_model,
231                    chunk_index_u32,
232                    tool_name,
233                    embed_ctx.exit_code,
234                    embed_ctx.timestamp.as_deref(),
235                )
236                .await
237                .map(|_| ())
238        } else {
239            qdrant
240                .store(
241                    message_id,
242                    conversation_id,
243                    &role,
244                    vector,
245                    MessageKind::Regular,
246                    &embedding_model,
247                    chunk_index_u32,
248                )
249                .await
250                .map(|_| ())
251        };
252        if let Err(e) = result {
253            tracing::warn!(
254                "bg embed_tool: failed to store chunk {chunk_index}/{chunk_count} \
255                 for msg {message_id}: {e:#}"
256            );
257        }
258    }
259}
260
261/// Background task: embed chunks with optional category and store in Qdrant.
262///
263/// All errors are logged as warnings; the function never panics.
264async fn embed_and_store_with_category_bg(args: EmbedBgArgs, category: Option<String>) {
265    let EmbedBgArgs {
266        qdrant,
267        embed_provider,
268        embedding_model,
269        message_id,
270        conversation_id,
271        role,
272        content,
273        last_qdrant_warn,
274    } = args;
275    let chunks = chunk_text(&content);
276    let chunk_count = chunks.len();
277
278    let vectors = match embed_provider.embed_batch(&chunks).await {
279        Ok(v) => v,
280        Err(e) => {
281            tracing::warn!(
282                "bg embed_category: failed to embed categorized chunks for msg {message_id}: {e:#}"
283            );
284            return;
285        }
286    };
287
288    let Some(first) = vectors.first() else {
289        return;
290    };
291    let vector_size = first.len() as u64;
292    if let Err(e) = qdrant.ensure_collection(vector_size).await {
293        let now = std::time::SystemTime::now()
294            .duration_since(std::time::UNIX_EPOCH)
295            .unwrap_or_default()
296            .as_secs();
297        let last = last_qdrant_warn.load(Ordering::Relaxed);
298        if now.saturating_sub(last) >= 10 {
299            last_qdrant_warn.store(now, Ordering::Relaxed);
300            tracing::warn!("bg embed_category: failed to ensure Qdrant collection: {e:#}");
301        } else {
302            tracing::debug!(
303                "bg embed_category: failed to ensure Qdrant collection (suppressed): {e:#}"
304            );
305        }
306        return;
307    }
308
309    for (chunk_index, vector) in vectors.into_iter().enumerate() {
310        let chunk_index_u32 = u32::try_from(chunk_index).unwrap_or(u32::MAX);
311        if let Err(e) = qdrant
312            .store_with_category(
313                message_id,
314                conversation_id,
315                &role,
316                vector,
317                MessageKind::Regular,
318                &embedding_model,
319                chunk_index_u32,
320                category.as_deref(),
321            )
322            .await
323        {
324            tracing::warn!(
325                "bg embed_category: failed to store chunk {chunk_index}/{chunk_count} \
326                 for msg {message_id}: {e:#}"
327            );
328        }
329    }
330}
331
332impl SemanticMemory {
333    /// Save a message to `SQLite` and optionally embed and store in Qdrant.
334    ///
335    /// Returns `Ok(Some(message_id))` when admitted and persisted.
336    /// Returns `Ok(None)` when A-MAC admission control rejects the message (not an error).
337    ///
338    /// # Errors
339    ///
340    /// Returns an error if the `SQLite` save fails. Embedding failures are logged but not
341    /// propagated.
342    #[cfg_attr(
343        feature = "profiling",
344        tracing::instrument(name = "memory.remember", skip_all, fields(content_len = %content.len()))
345    )]
346    pub async fn remember(
347        &self,
348        conversation_id: ConversationId,
349        role: &str,
350        content: &str,
351        goal_text: Option<&str>,
352    ) -> Result<Option<MessageId>, MemoryError> {
353        // A-MAC admission gate.
354        if let Some(ref admission) = self.admission_control {
355            let decision = admission
356                .evaluate(
357                    content,
358                    role,
359                    self.effective_embed_provider(),
360                    self.qdrant.as_ref(),
361                    goal_text,
362                )
363                .await;
364            let preview: String = content.chars().take(100).collect();
365            log_admission_decision(&decision, &preview, role, admission.threshold());
366            if !decision.admitted {
367                return Ok(None);
368            }
369        }
370
371        if let Some(gate) = &self.quality_gate
372            && gate
373                .evaluate(content, self.effective_embed_provider(), &[])
374                .await
375                .is_some()
376        {
377            return Ok(None);
378        }
379
380        let message_id = self
381            .sqlite
382            .save_message(conversation_id, role, content)
383            .await?;
384
385        self.embed_and_store_regular(message_id, conversation_id, role, content);
386
387        Ok(Some(message_id))
388    }
389
390    /// Save a message with pre-serialized parts JSON to `SQLite` and optionally embed in Qdrant.
391    ///
392    /// Returns `Ok((Some(message_id), embedding_stored))` when admitted and persisted.
393    /// Returns `Ok((None, false))` when A-MAC admission control rejects the message.
394    ///
395    /// # Errors
396    ///
397    /// Returns an error if the `SQLite` save fails.
398    #[cfg_attr(
399        feature = "profiling",
400        tracing::instrument(name = "memory.remember", skip_all, fields(content_len = %content.len()))
401    )]
402    pub async fn remember_with_parts(
403        &self,
404        conversation_id: ConversationId,
405        role: &str,
406        content: &str,
407        parts_json: &str,
408        goal_text: Option<&str>,
409    ) -> Result<(Option<MessageId>, bool), MemoryError> {
410        // A-MAC admission gate.
411        if let Some(ref admission) = self.admission_control {
412            let decision = admission
413                .evaluate(
414                    content,
415                    role,
416                    self.effective_embed_provider(),
417                    self.qdrant.as_ref(),
418                    goal_text,
419                )
420                .await;
421            let preview: String = content.chars().take(100).collect();
422            log_admission_decision(&decision, &preview, role, admission.threshold());
423            if !decision.admitted {
424                return Ok((None, false));
425            }
426        }
427
428        if let Some(gate) = &self.quality_gate
429            && gate
430                .evaluate(content, self.effective_embed_provider(), &[])
431                .await
432                .is_some()
433        {
434            return Ok((None, false));
435        }
436
437        let message_id = self
438            .sqlite
439            .save_message_with_parts(conversation_id, role, content, parts_json)
440            .await?;
441
442        let embedding_stored =
443            self.embed_and_store_regular(message_id, conversation_id, role, content);
444
445        Ok((Some(message_id), embedding_stored))
446    }
447
448    /// Save a tool output to `SQLite` and embed with tool metadata in Qdrant payload.
449    ///
450    /// Tool metadata (`tool_name`, `exit_code`, `timestamp`) is stored as Qdrant payload fields
451    /// so it is available for filtering without corrupting the embedding vector.
452    ///
453    /// Returns `Ok(Some(message_id))` when admitted and persisted.
454    /// Returns `Ok(None)` when A-MAC admission control rejects the message.
455    ///
456    /// # Errors
457    ///
458    /// Returns an error if the `SQLite` save fails.
459    #[cfg_attr(
460        feature = "profiling",
461        tracing::instrument(name = "memory.remember", skip_all, fields(content_len = %content.len()))
462    )]
463    pub async fn remember_tool_output(
464        &self,
465        conversation_id: ConversationId,
466        role: &str,
467        content: &str,
468        parts_json: &str,
469        embed_ctx: EmbedContext,
470    ) -> Result<(Option<MessageId>, bool), MemoryError> {
471        if let Some(ref admission) = self.admission_control {
472            let decision = admission
473                .evaluate(
474                    content,
475                    role,
476                    self.effective_embed_provider(),
477                    self.qdrant.as_ref(),
478                    None,
479                )
480                .await;
481            let preview: String = content.chars().take(100).collect();
482            log_admission_decision(&decision, &preview, role, admission.threshold());
483            if !decision.admitted {
484                return Ok((None, false));
485            }
486        }
487
488        let message_id = self
489            .sqlite
490            .save_message_with_parts(conversation_id, role, content, parts_json)
491            .await?;
492
493        let embedding_stored = self.embed_chunks_with_tool_context(
494            message_id,
495            conversation_id,
496            role,
497            content,
498            embed_ctx,
499        );
500
501        Ok((Some(message_id), embedding_stored))
502    }
503
504    /// Save a categorized message to `SQLite` and embed with category payload in Qdrant.
505    ///
506    /// The `category` is stored in both the `messages.category` column and as a Qdrant payload
507    /// field for recall filtering. Uses A-MAC admission gate.
508    ///
509    /// Returns `Ok(Some(message_id))` when admitted; `Ok(None)` when rejected.
510    ///
511    /// # Errors
512    ///
513    /// Returns an error if the `SQLite` save fails.
514    #[cfg_attr(
515        feature = "profiling",
516        tracing::instrument(name = "memory.remember", skip_all, fields(content_len = %content.len()))
517    )]
518    pub async fn remember_categorized(
519        &self,
520        conversation_id: ConversationId,
521        role: &str,
522        content: &str,
523        category: Option<&str>,
524        goal_text: Option<&str>,
525    ) -> Result<Option<MessageId>, MemoryError> {
526        if let Some(ref admission) = self.admission_control {
527            let decision = admission
528                .evaluate(
529                    content,
530                    role,
531                    self.effective_embed_provider(),
532                    self.qdrant.as_ref(),
533                    goal_text,
534                )
535                .await;
536            let preview: String = content.chars().take(100).collect();
537            log_admission_decision(&decision, &preview, role, admission.threshold());
538            if !decision.admitted {
539                return Ok(None);
540            }
541        }
542
543        let message_id = self
544            .sqlite
545            .save_message_with_category(conversation_id, role, content, category)
546            .await?;
547
548        self.embed_and_store_with_category(message_id, conversation_id, role, content, category);
549
550        Ok(Some(message_id))
551    }
552
553    /// Recall messages filtered by category.
554    ///
555    /// When `category` is `None`, behaves identically to [`Self::recall`].
556    ///
557    /// # Errors
558    ///
559    /// Returns an error if the search fails.
560    pub async fn recall_with_category(
561        &self,
562        query: &str,
563        limit: usize,
564        filter: Option<SearchFilter>,
565        category: Option<&str>,
566    ) -> Result<Vec<RecalledMessage>, MemoryError> {
567        let filter_with_category = filter.map(|mut f| {
568            f.category = category.map(str::to_owned);
569            f
570        });
571        self.recall(query, limit, filter_with_category).await
572    }
573
574    /// Reap completed background embed tasks (non-blocking).
575    ///
576    /// Call at turn boundaries to release handles for finished tasks.
577    pub fn reap_embed_tasks(&self) {
578        if let Ok(mut tasks) = self.embed_tasks.lock() {
579            while tasks.try_join_next().is_some() {}
580        }
581    }
582
583    /// Spawn `fut` as a bounded background embed task.
584    ///
585    /// If the task limit is reached, the task is dropped and a debug message is logged.
586    fn spawn_embed_bg<F>(&self, fut: F) -> bool
587    where
588        F: std::future::Future<Output = ()> + Send + 'static,
589    {
590        let Ok(mut tasks) = self.embed_tasks.lock() else {
591            return false;
592        };
593        // Reap any finished tasks before checking capacity.
594        while tasks.try_join_next().is_some() {}
595        if tasks.len() >= MAX_EMBED_BG_TASKS {
596            tracing::debug!("background embed task limit reached, skipping");
597            return false;
598        }
599        tasks.spawn(fut);
600        true
601    }
602
603    /// Embed content chunks and store each with an optional category payload field.
604    ///
605    /// Spawns a bounded background task; returns immediately.
606    fn embed_and_store_with_category(
607        &self,
608        message_id: MessageId,
609        conversation_id: ConversationId,
610        role: &str,
611        content: &str,
612        category: Option<&str>,
613    ) -> bool {
614        let Some(qdrant) = self.qdrant.clone() else {
615            return false;
616        };
617        let embed_provider = self.effective_embed_provider().clone();
618        if !embed_provider.supports_embeddings() {
619            return false;
620        }
621        self.spawn_embed_bg(embed_and_store_with_category_bg(
622            EmbedBgArgs {
623                qdrant,
624                embed_provider,
625                embedding_model: self.embedding_model.clone(),
626                message_id,
627                conversation_id,
628                role: role.to_owned(),
629                content: content.to_owned(),
630                last_qdrant_warn: Arc::clone(&self.last_qdrant_warn),
631            },
632            category.map(str::to_owned),
633        ))
634    }
635
636    /// Embed content chunks and store each as a regular (non-tool) message vector.
637    ///
638    /// Spawns a bounded background task; returns immediately.
639    fn embed_and_store_regular(
640        &self,
641        message_id: MessageId,
642        conversation_id: ConversationId,
643        role: &str,
644        content: &str,
645    ) -> bool {
646        let Some(qdrant) = self.qdrant.clone() else {
647            return false;
648        };
649        let embed_provider = self.effective_embed_provider().clone();
650        if !embed_provider.supports_embeddings() {
651            return false;
652        }
653        self.spawn_embed_bg(embed_and_store_regular_bg(EmbedBgArgs {
654            qdrant,
655            embed_provider,
656            embedding_model: self.embedding_model.clone(),
657            message_id,
658            conversation_id,
659            role: role.to_owned(),
660            content: content.to_owned(),
661            last_qdrant_warn: Arc::clone(&self.last_qdrant_warn),
662        }))
663    }
664
665    /// Embed content chunks, enriching Qdrant payload with tool metadata when present.
666    ///
667    /// Spawns a bounded background task; returns immediately.
668    fn embed_chunks_with_tool_context(
669        &self,
670        message_id: MessageId,
671        conversation_id: ConversationId,
672        role: &str,
673        content: &str,
674        embed_ctx: EmbedContext,
675    ) -> bool {
676        let Some(qdrant) = self.qdrant.clone() else {
677            return false;
678        };
679        let embed_provider = self.effective_embed_provider().clone();
680        if !embed_provider.supports_embeddings() {
681            return false;
682        }
683        self.spawn_embed_bg(embed_chunks_with_tool_context_bg(
684            EmbedBgArgs {
685                qdrant,
686                embed_provider,
687                embedding_model: self.embedding_model.clone(),
688                message_id,
689                conversation_id,
690                role: role.to_owned(),
691                content: content.to_owned(),
692                last_qdrant_warn: Arc::clone(&self.last_qdrant_warn),
693            },
694            embed_ctx,
695        ))
696    }
697
698    /// Save a message to `SQLite` without generating an embedding.
699    ///
700    /// Use this when embedding is intentionally skipped (e.g. autosave disabled for assistant).
701    ///
702    /// # Errors
703    ///
704    /// Returns an error if the `SQLite` save fails.
705    pub async fn save_only(
706        &self,
707        conversation_id: ConversationId,
708        role: &str,
709        content: &str,
710        parts_json: &str,
711    ) -> Result<MessageId, MemoryError> {
712        self.sqlite
713            .save_message_with_parts(conversation_id, role, content, parts_json)
714            .await
715    }
716
717    /// Recall relevant messages using hybrid search (vector + FTS5 keyword).
718    ///
719    /// When Qdrant is available, runs both vector and keyword searches, then merges
720    /// results using weighted scoring. When Qdrant is unavailable, falls back to
721    /// FTS5-only keyword search.
722    ///
723    /// # Errors
724    ///
725    /// Returns an error if embedding generation, Qdrant search, or FTS5 query fails.
726    #[cfg_attr(
727        feature = "profiling",
728        tracing::instrument(name = "memory.recall", skip_all, fields(query_len = %query.len(), result_count = tracing::field::Empty, top_score = tracing::field::Empty))
729    )]
730    pub async fn recall(
731        &self,
732        query: &str,
733        limit: usize,
734        filter: Option<SearchFilter>,
735    ) -> Result<Vec<RecalledMessage>, MemoryError> {
736        let conversation_id = filter.as_ref().and_then(|f| f.conversation_id);
737
738        tracing::debug!(
739            query_len = query.len(),
740            limit,
741            has_filter = filter.is_some(),
742            conversation_id = conversation_id.map(|c| c.0),
743            has_qdrant = self.qdrant.is_some(),
744            "recall: starting hybrid search"
745        );
746
747        let keyword_results = match self
748            .sqlite
749            .keyword_search(query, self.effective_depth(limit), conversation_id)
750            .await
751        {
752            Ok(results) => results,
753            Err(e) => {
754                tracing::warn!("FTS5 keyword search failed: {e:#}");
755                Vec::new()
756            }
757        };
758
759        let vector_results = if let Some(qdrant) = &self.qdrant
760            && self.effective_embed_provider().supports_embeddings()
761        {
762            let embed_input = self.apply_search_prompt(query);
763            let query_vector = match tokio::time::timeout(
764                std::time::Duration::from_secs(5),
765                self.effective_embed_provider().embed(&embed_input),
766            )
767            .await
768            {
769                Ok(Ok(v)) => v,
770                Ok(Err(e)) => return Err(e.into()),
771                Err(_) => {
772                    tracing::warn!("recall_semantic: embed timed out, returning empty results");
773                    return Ok(Vec::new());
774                }
775            };
776            let query_vector = self.apply_query_bias(query, query_vector).await;
777            let vector_size = u64::try_from(query_vector.len()).unwrap_or(896);
778            qdrant.ensure_collection(vector_size).await?;
779            qdrant
780                .search(&query_vector, self.effective_depth(limit), filter)
781                .await?
782        } else {
783            Vec::new()
784        };
785
786        let results = self
787            .recall_merge_and_rank(keyword_results, vector_results, limit)
788            .await?;
789        #[cfg(feature = "profiling")]
790        {
791            let span = tracing::Span::current();
792            span.record("result_count", results.len());
793            if let Some(top) = results.first() {
794                span.record("top_score", top.score);
795            }
796        }
797        Ok(results)
798    }
799
800    pub(super) async fn recall_fts5_raw(
801        &self,
802        query: &str,
803        limit: usize,
804        conversation_id: Option<ConversationId>,
805    ) -> Result<Vec<(MessageId, f64)>, MemoryError> {
806        self.sqlite
807            .keyword_search(query, self.effective_depth(limit), conversation_id)
808            .await
809    }
810
811    pub(super) async fn recall_vectors_raw(
812        &self,
813        query: &str,
814        limit: usize,
815        filter: Option<SearchFilter>,
816    ) -> Result<Vec<crate::embedding_store::SearchResult>, MemoryError> {
817        let Some(qdrant) = &self.qdrant else {
818            return Ok(Vec::new());
819        };
820        if !self.effective_embed_provider().supports_embeddings() {
821            return Ok(Vec::new());
822        }
823        let embed_input = self.apply_search_prompt(query);
824        let query_vector = match tokio::time::timeout(
825            std::time::Duration::from_secs(5),
826            self.effective_embed_provider().embed(&embed_input),
827        )
828        .await
829        {
830            Ok(Ok(v)) => v,
831            Ok(Err(e)) => return Err(e.into()),
832            Err(_) => {
833                tracing::warn!("recall_vectors_raw: embed timed out, returning empty results");
834                return Ok(Vec::new());
835            }
836        };
837        let query_vector = self.apply_query_bias(query, query_vector).await;
838        let vector_size = u64::try_from(query_vector.len()).unwrap_or(896);
839        qdrant.ensure_collection(vector_size).await?;
840        qdrant
841            .search(&query_vector, self.effective_depth(limit), filter)
842            .await
843    }
844
845    /// Merge raw keyword and vector results, apply weighted scoring, temporal decay, and MMR
846    /// re-ranking, then resolve to `RecalledMessage` objects.
847    ///
848    /// This is the shared post-processing step used by all recall paths.
849    ///
850    /// # Errors
851    ///
852    /// Returns an error if the `SQLite` `messages_by_ids` query fails.
853    #[allow(clippy::cast_possible_truncation, clippy::too_many_lines)]
854    pub(super) async fn recall_merge_and_rank(
855        &self,
856        keyword_results: Vec<(MessageId, f64)>,
857        vector_results: Vec<crate::embedding_store::SearchResult>,
858        limit: usize,
859    ) -> Result<Vec<RecalledMessage>, MemoryError> {
860        tracing::debug!(
861            vector_count = vector_results.len(),
862            keyword_count = keyword_results.len(),
863            limit,
864            "recall: merging search results"
865        );
866
867        let mut scores: std::collections::HashMap<MessageId, f64> =
868            std::collections::HashMap::new();
869
870        if !vector_results.is_empty() {
871            let max_vs = vector_results
872                .iter()
873                .map(|r| r.score)
874                .fold(f32::NEG_INFINITY, f32::max);
875            let norm = if max_vs > 0.0 { max_vs } else { 1.0 };
876            for r in &vector_results {
877                let normalized = f64::from(r.score / norm);
878                *scores.entry(r.message_id).or_default() += normalized * self.vector_weight;
879            }
880        }
881
882        if !keyword_results.is_empty() {
883            let max_ks = keyword_results
884                .iter()
885                .map(|r| r.1)
886                .fold(f64::NEG_INFINITY, f64::max);
887            let norm = if max_ks > 0.0 { max_ks } else { 1.0 };
888            for &(msg_id, score) in &keyword_results {
889                let normalized = score / norm;
890                *scores.entry(msg_id).or_default() += normalized * self.keyword_weight;
891            }
892        }
893
894        if scores.is_empty() {
895            tracing::debug!("recall: empty merge, no overlapping scores");
896            return Ok(Vec::new());
897        }
898
899        let mut ranked: Vec<(MessageId, f64)> = scores.into_iter().collect();
900        ranked.sort_by(|a, b| b.1.partial_cmp(&a.1).unwrap_or(std::cmp::Ordering::Equal));
901
902        tracing::debug!(
903            merged = ranked.len(),
904            top_score = ranked.first().map(|r| r.1),
905            bottom_score = ranked.last().map(|r| r.1),
906            vector_weight = %self.vector_weight,
907            keyword_weight = %self.keyword_weight,
908            "recall: weighted merge complete"
909        );
910
911        if self.temporal_decay.is_enabled() && self.temporal_decay_half_life_days > 0 {
912            let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
913            match self.sqlite.message_timestamps(&ids).await {
914                Ok(timestamps) => {
915                    apply_temporal_decay(
916                        &mut ranked,
917                        &timestamps,
918                        self.temporal_decay_half_life_days,
919                    );
920                    ranked
921                        .sort_by(|a, b| b.1.partial_cmp(&a.1).unwrap_or(std::cmp::Ordering::Equal));
922                    tracing::debug!(
923                        half_life_days = self.temporal_decay_half_life_days,
924                        top_score_after = ranked.first().map(|r| r.1),
925                        "recall: temporal decay applied"
926                    );
927                }
928                Err(e) => {
929                    tracing::warn!("temporal decay: failed to fetch timestamps: {e:#}");
930                }
931            }
932        }
933
934        if self.mmr_reranking.is_enabled() && !vector_results.is_empty() {
935            if let Some(qdrant) = &self.qdrant {
936                let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
937                match qdrant.get_vectors(&ids).await {
938                    Ok(vec_map) if !vec_map.is_empty() => {
939                        let ranked_len_before = ranked.len();
940                        ranked = apply_mmr(&ranked, &vec_map, self.mmr_lambda, limit);
941                        tracing::debug!(
942                            before = ranked_len_before,
943                            after = ranked.len(),
944                            lambda = %self.mmr_lambda,
945                            "recall: mmr re-ranked"
946                        );
947                    }
948                    Ok(_) => {
949                        ranked.truncate(limit);
950                    }
951                    Err(e) => {
952                        tracing::warn!("MMR: failed to fetch vectors: {e:#}");
953                        ranked.truncate(limit);
954                    }
955                }
956            } else {
957                ranked.truncate(limit);
958            }
959        } else {
960            ranked.truncate(limit);
961        }
962
963        if self.importance_scoring.is_enabled() && !ranked.is_empty() {
964            let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
965            match self.sqlite.fetch_importance_scores(&ids).await {
966                Ok(scores) => {
967                    for (msg_id, score) in &mut ranked {
968                        if let Some(&imp) = scores.get(msg_id) {
969                            *score += imp * self.importance_weight;
970                        }
971                    }
972                    ranked
973                        .sort_by(|a, b| b.1.partial_cmp(&a.1).unwrap_or(std::cmp::Ordering::Equal));
974                    tracing::debug!(
975                        importance_weight = %self.importance_weight,
976                        "recall: importance scores blended"
977                    );
978                }
979                Err(e) => {
980                    tracing::warn!("importance scoring: failed to fetch scores: {e:#}");
981                }
982            }
983        }
984
985        // Apply tier boost: semantic-tier messages receive an additive bonus so distilled facts
986        // rank above episodic messages with the same base score. Additive (not multiplicative)
987        // so the effect is consistent regardless of base score magnitude.
988        if (self.tier_boost_semantic - 1.0).abs() > f64::EPSILON && !ranked.is_empty() {
989            let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
990            match self.sqlite.fetch_tiers(&ids).await {
991                Ok(tiers) => {
992                    let bonus = self.tier_boost_semantic - 1.0;
993                    let mut boosted = false;
994                    for (msg_id, score) in &mut ranked {
995                        if tiers.get(msg_id).map(String::as_str) == Some("semantic") {
996                            *score += bonus;
997                            boosted = true;
998                        }
999                    }
1000                    if boosted {
1001                        ranked.sort_by(|a, b| {
1002                            b.1.partial_cmp(&a.1).unwrap_or(std::cmp::Ordering::Equal)
1003                        });
1004                        tracing::debug!(
1005                            tier_boost = %self.tier_boost_semantic,
1006                            "recall: semantic tier boost applied"
1007                        );
1008                    }
1009                }
1010                Err(e) => {
1011                    tracing::warn!("tier boost: failed to fetch tiers: {e:#}");
1012                }
1013            }
1014        }
1015
1016        let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
1017
1018        if !ids.is_empty()
1019            && let Err(e) = self.batch_increment_access_count(ids.clone()).await
1020        {
1021            tracing::warn!("recall: failed to increment access counts: {e:#}");
1022        }
1023
1024        // Update RL admission training data: mark recalled messages as positive examples.
1025        if let Err(e) = self.sqlite.mark_training_recalled(&ids).await {
1026            tracing::debug!(
1027                error = %e,
1028                "recall: failed to mark training data as recalled (non-fatal)"
1029            );
1030        }
1031
1032        let messages = self.sqlite.messages_by_ids(&ids).await?;
1033        let msg_map: std::collections::HashMap<MessageId, _> = messages.into_iter().collect();
1034
1035        let recalled: Vec<RecalledMessage> = ranked
1036            .iter()
1037            .filter_map(|(msg_id, score)| {
1038                msg_map.get(msg_id).map(|msg| RecalledMessage {
1039                    message: msg.clone(),
1040                    #[expect(clippy::cast_possible_truncation)]
1041                    score: *score as f32,
1042                })
1043            })
1044            .collect();
1045
1046        tracing::debug!(final_count = recalled.len(), "recall: final results");
1047
1048        Ok(recalled)
1049    }
1050
1051    /// Recall messages using query-aware routing.
1052    ///
1053    /// Delegates to FTS5-only, vector-only, or hybrid search based on the router decision,
1054    /// then runs the shared merge and ranking pipeline.
1055    ///
1056    /// # Errors
1057    ///
1058    /// Returns an error if any underlying search or database operation fails.
1059    #[cfg_attr(
1060        feature = "profiling",
1061        tracing::instrument(name = "memory.recall", skip_all, fields(query_len = %query.len(), result_count = tracing::field::Empty))
1062    )]
1063    pub async fn recall_routed(
1064        &self,
1065        query: &str,
1066        limit: usize,
1067        filter: Option<SearchFilter>,
1068        router: &dyn crate::router::MemoryRouter,
1069    ) -> Result<Vec<RecalledMessage>, MemoryError> {
1070        use crate::router::MemoryRoute;
1071
1072        let route = router.route(query);
1073        tracing::debug!(?route, query_len = query.len(), "memory routing decision");
1074
1075        let conversation_id = filter.as_ref().and_then(|f| f.conversation_id);
1076
1077        let (keyword_results, vector_results): (
1078            Vec<(MessageId, f64)>,
1079            Vec<crate::embedding_store::SearchResult>,
1080        ) = match route {
1081            MemoryRoute::Keyword => {
1082                let kw = self.recall_fts5_raw(query, limit, conversation_id).await?;
1083                (kw, Vec::new())
1084            }
1085            MemoryRoute::Semantic => {
1086                let vr = self.recall_vectors_raw(query, limit, filter).await?;
1087                (Vec::new(), vr)
1088            }
1089            MemoryRoute::Hybrid => {
1090                let kw = match self.recall_fts5_raw(query, limit, conversation_id).await {
1091                    Ok(r) => r,
1092                    Err(e) => {
1093                        tracing::warn!("FTS5 keyword search failed: {e:#}");
1094                        Vec::new()
1095                    }
1096                };
1097                let vr = self.recall_vectors_raw(query, limit, filter).await?;
1098                (kw, vr)
1099            }
1100            // Episodic: FTS5 keyword search with an optional timestamp-range filter.
1101            // Temporal keywords are stripped from the query before passing to FTS5 to
1102            // prevent BM25 score distortion (e.g. "yesterday" matching messages that
1103            // literally contain the word "yesterday" regardless of actual relevance).
1104            // Vector search is skipped for speed; temporal decay in recall_merge_and_rank
1105            // provides recency boosting for the FTS5 results.
1106            // Known trade-off (MVP): semantically similar but lexically different messages
1107            // may be missed. See issue #1629 for a future hybrid_temporal mode.
1108            MemoryRoute::Episodic => {
1109                let range = crate::router::resolve_temporal_range(query, chrono::Utc::now());
1110                let cleaned = crate::router::strip_temporal_keywords(query);
1111                let search_query = if cleaned.is_empty() { query } else { &cleaned };
1112                let kw = if let Some(ref r) = range {
1113                    self.sqlite
1114                        .keyword_search_with_time_range(
1115                            search_query,
1116                            limit,
1117                            conversation_id,
1118                            r.after.as_deref(),
1119                            r.before.as_deref(),
1120                        )
1121                        .await?
1122                } else {
1123                    self.recall_fts5_raw(search_query, limit, conversation_id)
1124                        .await?
1125                };
1126                tracing::debug!(
1127                    has_range = range.is_some(),
1128                    cleaned_query = %search_query,
1129                    keyword_count = kw.len(),
1130                    "recall: episodic path"
1131                );
1132                (kw, Vec::new())
1133            }
1134            // Graph routing triggers graph_recall separately in agent/context.rs.
1135            // For the message-based recall, behave like Hybrid.
1136            MemoryRoute::Graph => {
1137                let kw = match self.recall_fts5_raw(query, limit, conversation_id).await {
1138                    Ok(r) => r,
1139                    Err(e) => {
1140                        tracing::warn!("FTS5 keyword search failed (graph→hybrid fallback): {e:#}");
1141                        Vec::new()
1142                    }
1143                };
1144                let vr = self.recall_vectors_raw(query, limit, filter).await?;
1145                (kw, vr)
1146            }
1147        };
1148
1149        tracing::debug!(
1150            keyword_count = keyword_results.len(),
1151            vector_count = vector_results.len(),
1152            "recall: routed search results"
1153        );
1154
1155        self.recall_merge_and_rank(keyword_results, vector_results, limit)
1156            .await
1157    }
1158
1159    /// Async variant of [`recall_routed`](Self::recall_routed) that uses
1160    /// [`AsyncMemoryRouter::route_async`](crate::router::AsyncMemoryRouter::route_async) when
1161    /// available, enabling LLM-based routing for `LlmRouter` and `HybridRouter`.
1162    ///
1163    /// Falls back to [`recall_routed`](Self::recall_routed) for routers that only implement
1164    /// the sync `MemoryRouter` trait (e.g. `HeuristicRouter`).
1165    ///
1166    /// # Errors
1167    ///
1168    /// Returns an error if any underlying search or database operation fails.
1169    #[cfg_attr(
1170        feature = "profiling",
1171        tracing::instrument(name = "memory.recall", skip_all, fields(query_len = %query.len(), result_count = tracing::field::Empty))
1172    )]
1173    pub async fn recall_routed_async(
1174        &self,
1175        query: &str,
1176        limit: usize,
1177        filter: Option<crate::embedding_store::SearchFilter>,
1178        router: &dyn crate::router::AsyncMemoryRouter,
1179    ) -> Result<Vec<RecalledMessage>, MemoryError> {
1180        use crate::router::MemoryRoute;
1181
1182        let decision = router.route_async(query).await;
1183        let route = decision.route;
1184        tracing::debug!(
1185            ?route,
1186            confidence = decision.confidence,
1187            query_len = query.len(),
1188            "memory routing decision (async)"
1189        );
1190
1191        let conversation_id = filter.as_ref().and_then(|f| f.conversation_id);
1192
1193        let (keyword_results, vector_results): (
1194            Vec<(crate::types::MessageId, f64)>,
1195            Vec<crate::embedding_store::SearchResult>,
1196        ) = match route {
1197            MemoryRoute::Keyword => {
1198                let kw = self.recall_fts5_raw(query, limit, conversation_id).await?;
1199                (kw, Vec::new())
1200            }
1201            MemoryRoute::Semantic => {
1202                let vr = self.recall_vectors_raw(query, limit, filter).await?;
1203                (Vec::new(), vr)
1204            }
1205            MemoryRoute::Hybrid => {
1206                let kw = match self.recall_fts5_raw(query, limit, conversation_id).await {
1207                    Ok(r) => r,
1208                    Err(e) => {
1209                        tracing::warn!("FTS5 keyword search failed: {e:#}");
1210                        Vec::new()
1211                    }
1212                };
1213                let vr = self.recall_vectors_raw(query, limit, filter).await?;
1214                (kw, vr)
1215            }
1216            MemoryRoute::Episodic => {
1217                let range = crate::router::resolve_temporal_range(query, chrono::Utc::now());
1218                let cleaned = crate::router::strip_temporal_keywords(query);
1219                let search_query = if cleaned.is_empty() { query } else { &cleaned };
1220                let kw = if let Some(ref r) = range {
1221                    self.sqlite
1222                        .keyword_search_with_time_range(
1223                            search_query,
1224                            limit,
1225                            conversation_id,
1226                            r.after.as_deref(),
1227                            r.before.as_deref(),
1228                        )
1229                        .await?
1230                } else {
1231                    self.recall_fts5_raw(search_query, limit, conversation_id)
1232                        .await?
1233                };
1234                (kw, Vec::new())
1235            }
1236            MemoryRoute::Graph => {
1237                let kw = match self.recall_fts5_raw(query, limit, conversation_id).await {
1238                    Ok(r) => r,
1239                    Err(e) => {
1240                        tracing::warn!("FTS5 keyword search failed (graph→hybrid fallback): {e:#}");
1241                        Vec::new()
1242                    }
1243                };
1244                let vr = self.recall_vectors_raw(query, limit, filter).await?;
1245                (kw, vr)
1246            }
1247        };
1248
1249        tracing::debug!(
1250            keyword_count = keyword_results.len(),
1251            vector_count = vector_results.len(),
1252            "recall: routed search results (async)"
1253        );
1254
1255        self.recall_merge_and_rank(keyword_results, vector_results, limit)
1256            .await
1257    }
1258
1259    /// Retrieve graph facts relevant to `query` via BFS traversal.
1260    ///
1261    /// Returns an empty `Vec` if no `graph_store` is configured.
1262    ///
1263    /// # Parameters
1264    ///
1265    /// - `at_timestamp`: when `Some`, only edges valid at that `SQLite` datetime string are returned.
1266    ///   When `None`, only currently active edges are used.
1267    /// - `temporal_decay_rate`: non-negative decay rate (1/day). `0.0` preserves original ordering.
1268    ///
1269    /// # Errors
1270    ///
1271    /// Returns an error if the underlying graph query fails.
1272    #[cfg_attr(
1273        feature = "profiling",
1274        tracing::instrument(name = "memory.recall_graph", skip_all, fields(result_count = tracing::field::Empty))
1275    )]
1276    pub async fn recall_graph(
1277        &self,
1278        query: &str,
1279        limit: usize,
1280        max_hops: u32,
1281        at_timestamp: Option<&str>,
1282        temporal_decay_rate: f64,
1283        edge_types: &[crate::graph::EdgeType],
1284    ) -> Result<Vec<crate::graph::types::GraphFact>, MemoryError> {
1285        let Some(store) = &self.graph_store else {
1286            return Ok(Vec::new());
1287        };
1288
1289        tracing::debug!(
1290            query_len = query.len(),
1291            limit,
1292            max_hops,
1293            "graph: starting recall"
1294        );
1295
1296        let results = crate::graph::retrieval::graph_recall(
1297            store,
1298            self.qdrant.as_deref(),
1299            &self.provider,
1300            query,
1301            limit,
1302            max_hops,
1303            at_timestamp,
1304            temporal_decay_rate,
1305            edge_types,
1306            self.hebbian_reinforcement.is_enabled(),
1307            self.hebbian_lr,
1308        )
1309        .await?;
1310
1311        tracing::debug!(result_count = results.len(), "graph: recall complete");
1312        #[cfg(feature = "profiling")]
1313        tracing::Span::current().record("result_count", results.len());
1314
1315        Ok(results)
1316    }
1317
1318    /// Retrieve graph facts via SYNAPSE spreading activation.
1319    ///
1320    /// Delegates to [`crate::graph::retrieval::graph_recall_activated`].
1321    /// Used in place of [`Self::recall_graph`] when `spreading_activation.enabled = true`.
1322    ///
1323    /// # Errors
1324    ///
1325    /// Returns an error if the underlying graph query fails.
1326    #[cfg_attr(
1327        feature = "profiling",
1328        tracing::instrument(name = "memory.recall_graph", skip_all, fields(result_count = tracing::field::Empty))
1329    )]
1330    pub async fn recall_graph_activated(
1331        &self,
1332        query: &str,
1333        limit: usize,
1334        params: crate::graph::SpreadingActivationParams,
1335        edge_types: &[crate::graph::EdgeType],
1336    ) -> Result<Vec<crate::graph::activation::ActivatedFact>, MemoryError> {
1337        let Some(store) = &self.graph_store else {
1338            return Ok(Vec::new());
1339        };
1340
1341        tracing::debug!(
1342            query_len = query.len(),
1343            limit,
1344            "spreading activation: starting graph recall"
1345        );
1346
1347        let embeddings = self.qdrant.as_deref();
1348        let results = crate::graph::retrieval::graph_recall_activated(
1349            store,
1350            embeddings,
1351            &self.provider,
1352            query,
1353            limit,
1354            params,
1355            edge_types,
1356            self.hebbian_reinforcement.is_enabled(),
1357            self.hebbian_lr,
1358        )
1359        .await?;
1360
1361        tracing::debug!(
1362            result_count = results.len(),
1363            "spreading activation: graph recall complete"
1364        );
1365
1366        Ok(results)
1367    }
1368
1369    /// View-aware graph recall covering both spreading-activation and BFS code paths.
1370    ///
1371    /// - When `sa_params.is_some()`: delegates to [`Self::recall_graph_activated`],
1372    ///   mapping each `ActivatedFact` into a `RecalledFact` with `activation_score: Some(_)`.
1373    /// - When `sa_params.is_none()`: delegates to [`Self::recall_graph`],
1374    ///   mapping each `GraphFact` into a `RecalledFact` with `activation_score: None`.
1375    ///
1376    /// View enrichment runs **after** the base retrieval step on the returned set:
1377    /// - `Head`: no additional I/O; output is byte-equivalent to the legacy paths.
1378    /// - `ZoomIn`: fetches source-message snippet for provenance (bulk SQL).
1379    /// - `ZoomOut`: expands 1-hop neighbors per fact (capped at `neighbor_cap`).
1380    ///
1381    /// When `view = Head` and `sa_params = None`, this function is **byte-identical** to
1382    /// calling `recall_graph` directly and then formatting with the assembler helper.
1383    ///
1384    /// # Errors
1385    ///
1386    /// Returns [`crate::error::MemoryError`] if the base recall or any enrichment query fails.
1387    ///
1388    /// # Examples
1389    ///
1390    /// ```no_run
1391    /// use zeph_memory::{RecallView, RecalledFact};
1392    ///
1393    /// # async fn example(mem: &zeph_memory::semantic::SemanticMemory) {
1394    /// let facts = mem
1395    ///     .recall_graph_view("tell me about Rust", 5, RecallView::Head, 3, 2, 0.0, &[], None)
1396    ///     .await
1397    ///     .unwrap_or_default();
1398    /// # }
1399    /// ```
1400    #[allow(clippy::too_many_arguments, clippy::too_many_lines)] // single-pass enrichment pipeline: splitting would lose readability
1401    #[cfg_attr(
1402        feature = "profiling",
1403        tracing::instrument(
1404            name = "memory.recall.graph_view",
1405            skip_all,
1406            fields(view = ?view, result_count = tracing::field::Empty)
1407        )
1408    )]
1409    pub async fn recall_graph_view(
1410        &self,
1411        query: &str,
1412        limit: usize,
1413        view: crate::recall_view::RecallView,
1414        neighbor_cap: usize,
1415        bfs_max_hops: u32,
1416        temporal_decay_rate: f64,
1417        edge_types: &[crate::graph::EdgeType],
1418        sa_params: Option<crate::graph::SpreadingActivationParams>,
1419    ) -> Result<Vec<crate::recall_view::RecalledFact>, MemoryError> {
1420        use crate::recall_view::{RecallView, RecalledFact};
1421
1422        // Step 1: base retrieval.
1423        let mut recalled: Vec<RecalledFact> = if let Some(params) = sa_params {
1424            let activated = self
1425                .recall_graph_activated(query, limit, params, edge_types)
1426                .await?;
1427            activated
1428                .into_iter()
1429                .map(|af| {
1430                    // ActivatedFact carries an Edge with id, fact, confidence, etc.
1431                    // Build a RecalledFact preserving activation score and provenance.
1432                    let activation_score = af.activation_score;
1433                    let edge = &af.edge;
1434                    let fact = crate::graph::types::GraphFact {
1435                        entity_name: String::new(), // SA does not resolve entity names; assembler formats via `edge.fact`
1436                        relation: edge.canonical_relation.clone(),
1437                        target_name: String::new(),
1438                        fact: edge.fact.clone(),
1439                        entity_match_score: activation_score,
1440                        hop_distance: 0,
1441                        confidence: edge.confidence,
1442                        valid_from: if edge.valid_from.is_empty() {
1443                            None
1444                        } else {
1445                            Some(edge.valid_from.clone())
1446                        },
1447                        edge_type: edge.edge_type,
1448                        retrieval_count: edge.retrieval_count,
1449                        edge_id: Some(edge.id),
1450                    };
1451                    RecalledFact {
1452                        fact,
1453                        activation_score: Some(activation_score),
1454                        provenance_message_id: edge.source_message_id,
1455                        provenance_snippet: None,
1456                        neighbors: Vec::new(),
1457                    }
1458                })
1459                .collect()
1460        } else {
1461            let facts = self
1462                .recall_graph(
1463                    query,
1464                    limit,
1465                    bfs_max_hops,
1466                    None,
1467                    temporal_decay_rate,
1468                    edge_types,
1469                )
1470                .await?;
1471            facts
1472                .into_iter()
1473                .map(RecalledFact::from_graph_fact)
1474                .collect()
1475        };
1476
1477        // Step 2: Head view — no enrichment needed.
1478        if view == RecallView::Head {
1479            #[cfg(feature = "profiling")]
1480            tracing::Span::current().record("result_count", recalled.len());
1481            return Ok(recalled);
1482        }
1483
1484        // Steps 3/4: Zoom-In / Zoom-Out — fetch provenance snippets.
1485        if matches!(view, RecallView::ZoomIn | RecallView::ZoomOut) {
1486            let edge_ids: Vec<i64> = recalled.iter().filter_map(|r| r.fact.edge_id).collect();
1487
1488            if !edge_ids.is_empty()
1489                && let Some(ref store) = self.graph_store
1490            {
1491                // Bulk fetch source_message_id for all edge ids.
1492                const MAX_IDS: usize = 490;
1493                let mut edge_to_msg: std::collections::HashMap<i64, MessageId> =
1494                    std::collections::HashMap::new();
1495                for chunk in edge_ids.chunks(MAX_IDS) {
1496                    match store.source_message_ids_for_edges(chunk).await {
1497                        Ok(pairs) => {
1498                            for (eid, mid) in pairs {
1499                                edge_to_msg.insert(eid, mid);
1500                            }
1501                        }
1502                        Err(e) => {
1503                            tracing::warn!(error = %e, "recall_graph_view: provenance fetch failed");
1504                        }
1505                    }
1506                }
1507
1508                // For facts that have a source_message_id (from SA path), prefer that.
1509                for rf in &mut recalled {
1510                    if rf.provenance_message_id.is_none()
1511                        && let Some(eid) = rf.fact.edge_id
1512                    {
1513                        rf.provenance_message_id = edge_to_msg.get(&eid).copied();
1514                    }
1515                }
1516
1517                // Bulk fetch message snippets.
1518                let msg_ids: Vec<MessageId> = recalled
1519                    .iter()
1520                    .filter_map(|r| r.provenance_message_id)
1521                    .collect::<std::collections::HashSet<_>>()
1522                    .into_iter()
1523                    .collect();
1524
1525                if !msg_ids.is_empty() {
1526                    match self.sqlite.messages_by_ids(&msg_ids).await {
1527                        Ok(messages) => {
1528                            let mut mid_to_snippet: std::collections::HashMap<MessageId, String> =
1529                                messages
1530                                    .into_iter()
1531                                    .map(|(id, msg)| {
1532                                        let raw = &msg.content;
1533                                        let scrubbed: String = raw
1534                                            .chars()
1535                                            .map(|c| match c {
1536                                                '\n' | '\r' | '<' | '>' => ' ',
1537                                                other => other,
1538                                            })
1539                                            .take(200)
1540                                            .collect();
1541                                        (id, scrubbed)
1542                                    })
1543                                    .collect();
1544                            for rf in &mut recalled {
1545                                if let Some(mid) = rf.provenance_message_id {
1546                                    rf.provenance_snippet = mid_to_snippet.remove(&mid);
1547                                }
1548                            }
1549                        }
1550                        Err(e) => {
1551                            tracing::warn!(error = %e, "recall_graph_view: message snippet fetch failed");
1552                        }
1553                    }
1554                }
1555            }
1556        }
1557
1558        // Step 5: Zoom-Out — expand 1-hop neighbors.
1559        if view == RecallView::ZoomOut
1560            && let Some(ref store) = self.graph_store
1561        {
1562            // Dedup key: use the canonical fact text when entity names are absent (SA path
1563            // does not resolve entity names, leaving them as empty strings, which would cause
1564            // all SA-path facts to collide on the ("", rel, "", type) key).
1565            type DedupeKey = (String, String, String, crate::graph::EdgeType);
1566            let make_key = |f: &crate::graph::types::GraphFact| -> DedupeKey {
1567                if f.entity_name.is_empty() || f.target_name.is_empty() {
1568                    (
1569                        f.fact.clone(),
1570                        f.relation.clone(),
1571                        String::new(),
1572                        f.edge_type,
1573                    )
1574                } else {
1575                    (
1576                        f.entity_name.clone(),
1577                        f.relation.clone(),
1578                        f.target_name.clone(),
1579                        f.edge_type,
1580                    )
1581                }
1582            };
1583            let mut seen: std::collections::HashSet<DedupeKey> =
1584                recalled.iter().map(|r| make_key(&r.fact)).collect();
1585
1586            let total_neighbor_cap = limit * neighbor_cap;
1587            let mut total_neighbors = 0usize;
1588
1589            for rf in &mut recalled {
1590                if total_neighbors >= total_neighbor_cap {
1591                    break;
1592                }
1593                // Use edge_id as seed for 1-hop BFS via the source entity.
1594                // We retrieve neighbors using the graph store's BFS on the source entity.
1595                let source_entity_id = match rf.fact.edge_id {
1596                    Some(eid) => match store.source_entity_id_for_edge(eid).await {
1597                        Ok(Some(id)) => id,
1598                        _ => continue,
1599                    },
1600                    None => continue,
1601                };
1602
1603                let neighbors = match store
1604                    .bfs_edges_at_depth(source_entity_id, 1, edge_types)
1605                    .await
1606                {
1607                    Ok(edges) => edges,
1608                    Err(e) => {
1609                        tracing::warn!(error = %e, "recall_graph_view: zoom_out bfs failed");
1610                        continue;
1611                    }
1612                };
1613
1614                let mut added = 0usize;
1615                for n_edge in neighbors {
1616                    if added >= neighbor_cap || total_neighbors >= total_neighbor_cap {
1617                        break;
1618                    }
1619                    let key = make_key(&n_edge.fact);
1620                    if seen.insert(key) {
1621                        rf.neighbors.push(n_edge.fact);
1622                        added += 1;
1623                        total_neighbors += 1;
1624                    }
1625                }
1626            }
1627        }
1628
1629        #[cfg(feature = "profiling")]
1630        tracing::Span::current().record("result_count", recalled.len());
1631        Ok(recalled)
1632    }
1633
1634    /// Retrieve graph facts via A* shortest-path traversal.
1635    ///
1636    /// Delegates to [`crate::graph::retrieval_astar::graph_recall_astar`].
1637    ///
1638    /// # Errors
1639    ///
1640    /// Returns an error if the underlying graph query fails.
1641    pub async fn recall_graph_astar(
1642        &self,
1643        query: &str,
1644        limit: usize,
1645        max_hops: u32,
1646        temporal_decay_rate: f64,
1647        edge_types: &[crate::graph::EdgeType],
1648    ) -> Result<Vec<crate::graph::types::GraphFact>, MemoryError> {
1649        let Some(store) = &self.graph_store else {
1650            return Ok(Vec::new());
1651        };
1652        crate::graph::retrieval_astar::graph_recall_astar(
1653            store,
1654            self.qdrant.as_deref(),
1655            &self.provider,
1656            query,
1657            limit,
1658            max_hops,
1659            edge_types,
1660            temporal_decay_rate,
1661            self.hebbian_reinforcement.is_enabled(),
1662            self.hebbian_lr,
1663            self.query_sensitive_cost,
1664        )
1665        .await
1666    }
1667
1668    /// Retrieve graph facts via `WaterCircles` concentric BFS.
1669    ///
1670    /// Delegates to [`crate::graph::retrieval_watercircles::graph_recall_watercircles`].
1671    ///
1672    /// # Errors
1673    ///
1674    /// Returns an error if the underlying graph query fails.
1675    pub async fn recall_graph_watercircles(
1676        &self,
1677        query: &str,
1678        limit: usize,
1679        max_hops: u32,
1680        ring_limit: usize,
1681        temporal_decay_rate: f64,
1682        edge_types: &[crate::graph::EdgeType],
1683    ) -> Result<Vec<crate::graph::types::GraphFact>, MemoryError> {
1684        let Some(store) = &self.graph_store else {
1685            return Ok(Vec::new());
1686        };
1687        crate::graph::retrieval_watercircles::graph_recall_watercircles(
1688            store,
1689            self.qdrant.as_deref(),
1690            &self.provider,
1691            query,
1692            limit,
1693            max_hops,
1694            ring_limit,
1695            edge_types,
1696            temporal_decay_rate,
1697            self.hebbian_reinforcement.is_enabled(),
1698            self.hebbian_lr,
1699        )
1700        .await
1701    }
1702
1703    /// Retrieve graph facts via beam search.
1704    ///
1705    /// Delegates to [`crate::graph::retrieval_beam::graph_recall_beam`].
1706    ///
1707    /// # Errors
1708    ///
1709    /// Returns an error if the underlying graph query fails.
1710    pub async fn recall_graph_beam(
1711        &self,
1712        query: &str,
1713        limit: usize,
1714        beam_width: usize,
1715        max_hops: u32,
1716        temporal_decay_rate: f64,
1717        edge_types: &[crate::graph::EdgeType],
1718    ) -> Result<Vec<crate::graph::types::GraphFact>, MemoryError> {
1719        let Some(store) = &self.graph_store else {
1720            return Ok(Vec::new());
1721        };
1722        crate::graph::retrieval_beam::graph_recall_beam(
1723            store,
1724            self.qdrant.as_deref(),
1725            &self.provider,
1726            query,
1727            limit,
1728            beam_width,
1729            max_hops,
1730            edge_types,
1731            temporal_decay_rate,
1732            self.hebbian_reinforcement.is_enabled(),
1733            self.hebbian_lr,
1734        )
1735        .await
1736    }
1737
1738    /// Classify query intent and return the strategy name for hybrid dispatch.
1739    ///
1740    /// Returns one of: `"astar"`, `"watercircles"`, `"beam_search"`, `"synapse"`.
1741    /// Falls back to `"synapse"` on any LLM error.
1742    pub async fn classify_graph_strategy(&self, query: &str) -> String {
1743        crate::graph::strategy_classifier::classify_retrieval_strategy(&self.provider, query).await
1744    }
1745
1746    /// Retrieve graph facts via HL-F5 spreading activation from the top-1 ANN anchor (#3346).
1747    ///
1748    /// Returns an empty vec when no graph store is configured, Qdrant is unavailable,
1749    /// or `hebbian_spread.enabled = false`.  The outer 200 ms timeout ensures the
1750    /// agent loop is never blocked by a slow Qdrant response.
1751    ///
1752    /// # Errors
1753    ///
1754    /// Returns an error if the embed call or any database query fails.
1755    #[cfg_attr(
1756        feature = "profiling",
1757        tracing::instrument(
1758            name = "memory.recall_graph_hela",
1759            skip_all,
1760            fields(result_count = tracing::field::Empty)
1761        )
1762    )]
1763    pub async fn recall_graph_hela(
1764        &self,
1765        query: &str,
1766        limit: usize,
1767        params: crate::graph::HelaSpreadParams,
1768    ) -> Result<Vec<crate::graph::HelaFact>, MemoryError> {
1769        let Some(store) = &self.graph_store else {
1770            return Ok(Vec::new());
1771        };
1772        let Some(embeddings) = &self.qdrant else {
1773            return Ok(Vec::new());
1774        };
1775
1776        let store = Arc::clone(store);
1777        let embeddings = Arc::clone(embeddings);
1778        let provider = self.provider.clone();
1779        let hebbian_enabled = self.hebbian_reinforcement.is_enabled();
1780        let hebbian_lr = self.hebbian_lr;
1781
1782        let results = tokio::time::timeout(
1783            std::time::Duration::from_millis(200),
1784            crate::graph::hela_spreading_recall(
1785                &store,
1786                &embeddings,
1787                &provider,
1788                query,
1789                limit,
1790                &params,
1791                hebbian_enabled,
1792                hebbian_lr,
1793            ),
1794        )
1795        .await
1796        .unwrap_or_else(|_| {
1797            tracing::warn!("memory.recall_graph_hela: outer 200ms timeout exceeded");
1798            Ok(Vec::new())
1799        })?;
1800
1801        #[cfg(feature = "profiling")]
1802        tracing::Span::current().record("result_count", results.len());
1803
1804        Ok(results)
1805    }
1806
1807    /// Increment access count and update `last_accessed` for a batch of message IDs.
1808    ///
1809    /// Skips the update if `message_ids` is empty to avoid an invalid `IN ()` clause.
1810    ///
1811    /// # Errors
1812    ///
1813    /// Returns an error if the `SQLite` update fails.
1814    async fn batch_increment_access_count(
1815        &self,
1816        message_ids: Vec<MessageId>,
1817    ) -> Result<(), MemoryError> {
1818        if message_ids.is_empty() {
1819            return Ok(());
1820        }
1821        self.sqlite.increment_access_counts(&message_ids).await
1822    }
1823
1824    /// Check whether an embedding exists for a given message ID.
1825    ///
1826    /// # Errors
1827    ///
1828    /// Returns an error if the `SQLite` query fails.
1829    pub async fn has_embedding(&self, message_id: MessageId) -> Result<bool, MemoryError> {
1830        match &self.qdrant {
1831            Some(qdrant) => qdrant.has_embedding(message_id).await,
1832            None => Ok(false),
1833        }
1834    }
1835
1836    /// Embed all messages that do not yet have embeddings.
1837    ///
1838    /// Processes unembedded messages in micro-batches of 32, using `buffer_unordered(4)` for
1839    /// concurrent embedding within each batch. Bounded peak memory: at most 32 messages of content
1840    /// plus their embedding vectors are live at any time.
1841    ///
1842    /// When `progress_tx` is `Some`, sends `Some(BackfillProgress)` after each message and
1843    /// `None` on completion (or on timeout/error in the caller).
1844    ///
1845    /// Returns the count of successfully embedded messages.
1846    ///
1847    /// # Errors
1848    ///
1849    /// Returns an error if collection initialization or the streaming query setup fails.
1850    /// Individual embedding failures are logged but do not stop processing.
1851    pub async fn embed_missing(
1852        &self,
1853        progress_tx: Option<tokio::sync::watch::Sender<Option<super::BackfillProgress>>>,
1854    ) -> Result<usize, MemoryError> {
1855        if self.qdrant.is_none() || !self.effective_embed_provider().supports_embeddings() {
1856            return Ok(0);
1857        }
1858
1859        let total = self.sqlite.count_unembedded_messages().await?;
1860        if total == 0 {
1861            return Ok(0);
1862        }
1863
1864        if let Some(tx) = &progress_tx {
1865            let _ = tx.send(Some(super::BackfillProgress { done: 0, total }));
1866        }
1867
1868        let mut done = 0usize;
1869        let mut succeeded = 0usize;
1870
1871        loop {
1872            const BATCH_SIZE: usize = 32;
1873            const BATCH_SIZE_I64: i64 = 32;
1874            let rows: Vec<_> = self
1875                .sqlite
1876                .stream_unembedded_messages(BATCH_SIZE_I64)
1877                .try_collect()
1878                .await?;
1879
1880            if rows.is_empty() {
1881                break;
1882            }
1883
1884            let batch_len = rows.len();
1885
1886            let results: Vec<bool> = futures::stream::iter(rows)
1887                .map(|(msg_id, conv_id, role, content)| async move {
1888                    self.embed_and_store_regular(msg_id, conv_id, &role, &content)
1889                })
1890                .buffer_unordered(4)
1891                .collect()
1892                .await;
1893
1894            for ok in &results {
1895                done += 1;
1896                if *ok {
1897                    succeeded += 1;
1898                }
1899                if let Some(tx) = &progress_tx {
1900                    let _ = tx.send(Some(super::BackfillProgress { done, total }));
1901                }
1902            }
1903
1904            let batch_succeeded = results.iter().filter(|&&b| b).count();
1905            if batch_succeeded > 0 {
1906                tracing::debug!("Backfill batch: {batch_succeeded}/{batch_len} embedded");
1907            }
1908
1909            if batch_len < BATCH_SIZE {
1910                break;
1911            }
1912        }
1913
1914        if let Some(tx) = &progress_tx {
1915            let _ = tx.send(None);
1916        }
1917
1918        if done > 0 {
1919            tracing::info!("Embedded {succeeded}/{total} missing messages");
1920        }
1921        Ok(succeeded)
1922    }
1923}
1924
1925#[cfg(test)]
1926mod tests {
1927    use super::*;
1928
1929    #[test]
1930    fn embed_context_default_all_none() {
1931        let ctx = EmbedContext::default();
1932        assert!(ctx.tool_name.is_none());
1933        assert!(ctx.exit_code.is_none());
1934        assert!(ctx.timestamp.is_none());
1935    }
1936
1937    #[test]
1938    fn embed_context_fields_set_correctly() {
1939        let ctx = EmbedContext {
1940            tool_name: Some("shell".to_string()),
1941            exit_code: Some(0),
1942            timestamp: Some("2026-04-04T00:00:00Z".to_string()),
1943        };
1944        assert_eq!(ctx.tool_name.as_deref(), Some("shell"));
1945        assert_eq!(ctx.exit_code, Some(0));
1946        assert_eq!(ctx.timestamp.as_deref(), Some("2026-04-04T00:00:00Z"));
1947    }
1948
1949    #[test]
1950    fn embed_context_non_zero_exit_code() {
1951        let ctx = EmbedContext {
1952            tool_name: Some("shell".to_string()),
1953            exit_code: Some(1),
1954            timestamp: None,
1955        };
1956        assert_eq!(ctx.exit_code, Some(1));
1957        assert!(ctx.timestamp.is_none());
1958    }
1959
1960    async fn make_semantic_memory() -> crate::semantic::SemanticMemory {
1961        use std::sync::Arc;
1962        use std::sync::atomic::AtomicU64;
1963        use zeph_llm::any::AnyProvider;
1964        use zeph_llm::mock::MockProvider;
1965
1966        let provider = AnyProvider::Mock(MockProvider::default());
1967        let sqlite = crate::store::SqliteStore::new(":memory:").await.unwrap();
1968        crate::semantic::SemanticMemory {
1969            sqlite,
1970            qdrant: None,
1971            provider,
1972            embed_provider: None,
1973            embedding_model: "test-model".into(),
1974            vector_weight: 0.7,
1975            keyword_weight: 0.3,
1976            temporal_decay: crate::semantic::TemporalDecay::Disabled,
1977            temporal_decay_half_life_days: 30,
1978            mmr_reranking: crate::semantic::MmrReranking::Disabled,
1979            mmr_lambda: 0.7,
1980            importance_scoring: crate::semantic::ImportanceScoring::Disabled,
1981            importance_weight: 0.15,
1982            token_counter: Arc::new(crate::token_counter::TokenCounter::new()),
1983            graph_store: None,
1984            experience: None,
1985            community_detection_failures: Arc::new(AtomicU64::new(0)),
1986            graph_extraction_count: Arc::new(AtomicU64::new(0)),
1987            graph_extraction_failures: Arc::new(AtomicU64::new(0)),
1988            last_qdrant_warn: Arc::new(AtomicU64::new(0)),
1989            tier_boost_semantic: 1.3,
1990            admission_control: None,
1991            quality_gate: None,
1992            key_facts_dedup_threshold: 0.95,
1993            embed_tasks: std::sync::Mutex::new(tokio::task::JoinSet::new()),
1994            retrieval_depth: 0,
1995            search_prompt_template: String::new(),
1996            depth_below_limit_warned: Arc::new(std::sync::atomic::AtomicBool::new(false)),
1997            missing_placeholder_warned: Arc::new(std::sync::atomic::AtomicBool::new(false)),
1998            reasoning: None,
1999            query_bias_correction: crate::semantic::QueryBiasCorrection::Disabled,
2000            query_bias_profile_weight: 0.25,
2001            profile_centroid: tokio::sync::RwLock::new(None),
2002            profile_centroid_ttl_secs: 300,
2003            hebbian_reinforcement: crate::semantic::HebbianReinforcement::Disabled,
2004            hebbian_lr: 0.1,
2005            hebbian_spread: crate::HelaSpreadRuntime::default(),
2006            retrieval_failure_logger: None,
2007            summarization_llm_timeout_secs: 60,
2008            query_sensitive_cost: false,
2009        }
2010    }
2011
2012    #[tokio::test]
2013    async fn spawn_embed_bg_returns_true_when_capacity_available() {
2014        let memory = make_semantic_memory().await;
2015        let dispatched = memory.spawn_embed_bg(std::future::ready(()));
2016        assert!(
2017            dispatched,
2018            "spawn_embed_bg must return true when a task was successfully spawned"
2019        );
2020    }
2021
2022    #[tokio::test]
2023    async fn spawn_embed_bg_returns_false_at_capacity() {
2024        let memory = make_semantic_memory().await;
2025
2026        // Fill the JoinSet to the limit with never-completing futures.
2027        {
2028            let mut tasks = memory.embed_tasks.lock().unwrap();
2029            for _ in 0..MAX_EMBED_BG_TASKS {
2030                tasks.spawn(std::future::pending::<()>());
2031            }
2032        }
2033
2034        let dispatched = memory.spawn_embed_bg(std::future::ready(()));
2035        assert!(
2036            !dispatched,
2037            "spawn_embed_bg must return false when the task limit is reached"
2038        );
2039    }
2040
2041    #[test]
2042    fn qdrant_warn_rate_limit_suppresses_within_window() {
2043        use std::sync::Arc;
2044        use std::sync::atomic::{AtomicU64, Ordering};
2045
2046        let last_warn = Arc::new(AtomicU64::new(0));
2047        let window_secs = 10u64;
2048
2049        // Simulate first call: last=0, now=100 → should emit (diff >= 10)
2050        let now1 = 100u64;
2051        let last1 = last_warn.load(Ordering::Relaxed);
2052        let should_warn1 = now1.saturating_sub(last1) >= window_secs;
2053        assert!(should_warn1, "first call must not be suppressed");
2054        if should_warn1 {
2055            last_warn.store(now1, Ordering::Relaxed);
2056        }
2057
2058        // Simulate second call 5s later: now=105 → should be suppressed (diff < 10)
2059        let now2 = 105u64;
2060        let last2 = last_warn.load(Ordering::Relaxed);
2061        let should_warn2 = now2.saturating_sub(last2) >= window_secs;
2062        assert!(!should_warn2, "call within 10s window must be suppressed");
2063
2064        // Simulate third call 10s after first: now=110 → should emit again
2065        let now3 = 110u64;
2066        let last3 = last_warn.load(Ordering::Relaxed);
2067        let should_warn3 = now3.saturating_sub(last3) >= window_secs;
2068        assert!(
2069            should_warn3,
2070            "call after window expiry must not be suppressed"
2071        );
2072    }
2073
2074    #[test]
2075    fn qdrant_warn_rate_limit_shared_across_concurrent_sites() {
2076        use std::sync::Arc;
2077        use std::sync::atomic::{AtomicU64, Ordering};
2078
2079        // All 3 WARN sites share one Arc<AtomicU64>. Simulate site A warning at t=100,
2080        // then site B attempting at t=105 — must be suppressed.
2081        let shared = Arc::new(AtomicU64::new(0));
2082        let window_secs = 10u64;
2083
2084        let site_a = Arc::clone(&shared);
2085        let site_b = Arc::clone(&shared);
2086
2087        let now_a = 100u64;
2088        let last_a = site_a.load(Ordering::Relaxed);
2089        if now_a.saturating_sub(last_a) >= window_secs {
2090            site_a.store(now_a, Ordering::Relaxed);
2091        }
2092
2093        let now_b = 105u64;
2094        let last_b = site_b.load(Ordering::Relaxed);
2095        let warn_b = now_b.saturating_sub(last_b) >= window_secs;
2096        assert!(
2097            !warn_b,
2098            "site B must be suppressed because site A already warned within the window"
2099        );
2100    }
2101}