1use std::sync::Arc;
5use std::sync::atomic::{AtomicU64, Ordering};
6
7use futures::{StreamExt as _, TryStreamExt as _};
8use zeph_llm::provider::{LlmProvider as _, Message};
9
10const CHARS_PER_TOKEN: usize = 4;
12
13const CHUNK_CHARS: usize = 400 * CHARS_PER_TOKEN;
15
16const CHUNK_OVERLAP_CHARS: usize = 80 * CHARS_PER_TOKEN;
18
19fn chunk_text(text: &str) -> Vec<&str> {
25 if text.len() <= CHUNK_CHARS {
26 return vec![text];
27 }
28
29 let mut chunks = Vec::new();
30 let mut start = 0;
31
32 while start < text.len() {
33 let end = if start + CHUNK_CHARS >= text.len() {
34 text.len()
35 } else {
36 let boundary = text.floor_char_boundary(start + CHUNK_CHARS);
38 let slice = &text[start..boundary];
40 if let Some(pos) = slice.rfind("\n\n") {
41 start + pos + 2
42 } else if let Some(pos) = slice.rfind('\n') {
43 start + pos + 1
44 } else if let Some(pos) = slice.rfind(' ') {
45 start + pos + 1
46 } else {
47 boundary
48 }
49 };
50
51 chunks.push(&text[start..end]);
52 if end >= text.len() {
53 break;
54 }
55 let next = end.saturating_sub(CHUNK_OVERLAP_CHARS);
59 let new_start = text.ceil_char_boundary(next);
60 start = if new_start > start { new_start } else { end };
61 }
62
63 chunks
64}
65
66use crate::admission::log_admission_decision;
67use crate::embedding_store::{MessageKind, SearchFilter};
68use crate::error::MemoryError;
69use crate::types::{ConversationId, MessageId};
70
71use super::SemanticMemory;
72use super::algorithms::{apply_mmr, apply_temporal_decay};
73
74#[derive(Debug, Clone, Default)]
78pub struct EmbedContext {
79 pub tool_name: Option<String>,
80 pub exit_code: Option<i32>,
81 pub timestamp: Option<String>,
82}
83
84#[derive(Debug)]
85pub struct RecalledMessage {
86 pub message: Message,
87 pub score: f32,
88}
89
90const MAX_EMBED_BG_TASKS: usize = 64;
92
93struct EmbedBgArgs {
95 qdrant: Arc<crate::embedding_store::EmbeddingStore>,
96 embed_provider: zeph_llm::any::AnyProvider,
97 embedding_model: String,
98 message_id: MessageId,
99 conversation_id: ConversationId,
100 role: String,
101 content: String,
102 last_qdrant_warn: Arc<AtomicU64>,
103}
104
105async fn embed_and_store_regular_bg(args: EmbedBgArgs) {
109 let EmbedBgArgs {
110 qdrant,
111 embed_provider,
112 embedding_model,
113 message_id,
114 conversation_id,
115 role,
116 content,
117 last_qdrant_warn,
118 } = args;
119 let chunks = chunk_text(&content);
120 let chunk_count = chunks.len();
121
122 let vectors = match embed_provider.embed_batch(&chunks).await {
123 Ok(v) => v,
124 Err(e) => {
125 tracing::warn!("bg embed_regular: failed to embed chunks for msg {message_id}: {e:#}");
126 return;
127 }
128 };
129
130 let Some(first) = vectors.first() else {
131 return;
132 };
133 let vector_size = first.len() as u64;
134 if let Err(e) = qdrant.ensure_collection(vector_size).await {
135 let now = std::time::SystemTime::now()
136 .duration_since(std::time::UNIX_EPOCH)
137 .unwrap_or_default()
138 .as_secs();
139 let last = last_qdrant_warn.load(Ordering::Relaxed);
140 if now.saturating_sub(last) >= 10 {
141 last_qdrant_warn.store(now, Ordering::Relaxed);
142 tracing::warn!("bg embed_regular: failed to ensure Qdrant collection: {e:#}");
143 } else {
144 tracing::debug!(
145 "bg embed_regular: failed to ensure Qdrant collection (suppressed): {e:#}"
146 );
147 }
148 return;
149 }
150
151 for (chunk_index, vector) in vectors.into_iter().enumerate() {
152 let chunk_index_u32 = u32::try_from(chunk_index).unwrap_or(u32::MAX);
153 if let Err(e) = qdrant
154 .store(
155 message_id,
156 conversation_id,
157 &role,
158 vector,
159 MessageKind::Regular,
160 &embedding_model,
161 chunk_index_u32,
162 )
163 .await
164 {
165 tracing::warn!(
166 "bg embed_regular: failed to store chunk {chunk_index}/{chunk_count} \
167 for msg {message_id}: {e:#}"
168 );
169 }
170 }
171}
172
173async fn embed_chunks_with_tool_context_bg(args: EmbedBgArgs, embed_ctx: EmbedContext) {
177 let EmbedBgArgs {
178 qdrant,
179 embed_provider,
180 embedding_model,
181 message_id,
182 conversation_id,
183 role,
184 content,
185 last_qdrant_warn,
186 } = args;
187 let chunks = chunk_text(&content);
188 let chunk_count = chunks.len();
189
190 let vectors = match embed_provider.embed_batch(&chunks).await {
191 Ok(v) => v,
192 Err(e) => {
193 tracing::warn!(
194 "bg embed_tool: failed to embed tool-output chunks for msg {message_id}: {e:#}"
195 );
196 return;
197 }
198 };
199
200 if let Some(first) = vectors.first() {
201 let vector_size = first.len() as u64;
202 if let Err(e) = qdrant.ensure_collection(vector_size).await {
203 let now = std::time::SystemTime::now()
204 .duration_since(std::time::UNIX_EPOCH)
205 .unwrap_or_default()
206 .as_secs();
207 let last = last_qdrant_warn.load(Ordering::Relaxed);
208 if now.saturating_sub(last) >= 10 {
209 last_qdrant_warn.store(now, Ordering::Relaxed);
210 tracing::warn!("bg embed_tool: failed to ensure Qdrant collection: {e:#}");
211 } else {
212 tracing::debug!(
213 "bg embed_tool: failed to ensure Qdrant collection (suppressed): {e:#}"
214 );
215 }
216 return;
217 }
218 }
219
220 for (chunk_index, vector) in vectors.into_iter().enumerate() {
221 let chunk_index_u32 = u32::try_from(chunk_index).unwrap_or(u32::MAX);
222 let result = if let Some(ref tool_name) = embed_ctx.tool_name {
223 qdrant
224 .store_with_tool_context(
225 message_id,
226 conversation_id,
227 &role,
228 vector,
229 MessageKind::Regular,
230 &embedding_model,
231 chunk_index_u32,
232 tool_name,
233 embed_ctx.exit_code,
234 embed_ctx.timestamp.as_deref(),
235 )
236 .await
237 .map(|_| ())
238 } else {
239 qdrant
240 .store(
241 message_id,
242 conversation_id,
243 &role,
244 vector,
245 MessageKind::Regular,
246 &embedding_model,
247 chunk_index_u32,
248 )
249 .await
250 .map(|_| ())
251 };
252 if let Err(e) = result {
253 tracing::warn!(
254 "bg embed_tool: failed to store chunk {chunk_index}/{chunk_count} \
255 for msg {message_id}: {e:#}"
256 );
257 }
258 }
259}
260
261async fn embed_and_store_with_category_bg(args: EmbedBgArgs, category: Option<String>) {
265 let EmbedBgArgs {
266 qdrant,
267 embed_provider,
268 embedding_model,
269 message_id,
270 conversation_id,
271 role,
272 content,
273 last_qdrant_warn,
274 } = args;
275 let chunks = chunk_text(&content);
276 let chunk_count = chunks.len();
277
278 let vectors = match embed_provider.embed_batch(&chunks).await {
279 Ok(v) => v,
280 Err(e) => {
281 tracing::warn!(
282 "bg embed_category: failed to embed categorized chunks for msg {message_id}: {e:#}"
283 );
284 return;
285 }
286 };
287
288 let Some(first) = vectors.first() else {
289 return;
290 };
291 let vector_size = first.len() as u64;
292 if let Err(e) = qdrant.ensure_collection(vector_size).await {
293 let now = std::time::SystemTime::now()
294 .duration_since(std::time::UNIX_EPOCH)
295 .unwrap_or_default()
296 .as_secs();
297 let last = last_qdrant_warn.load(Ordering::Relaxed);
298 if now.saturating_sub(last) >= 10 {
299 last_qdrant_warn.store(now, Ordering::Relaxed);
300 tracing::warn!("bg embed_category: failed to ensure Qdrant collection: {e:#}");
301 } else {
302 tracing::debug!(
303 "bg embed_category: failed to ensure Qdrant collection (suppressed): {e:#}"
304 );
305 }
306 return;
307 }
308
309 for (chunk_index, vector) in vectors.into_iter().enumerate() {
310 let chunk_index_u32 = u32::try_from(chunk_index).unwrap_or(u32::MAX);
311 if let Err(e) = qdrant
312 .store_with_category(
313 message_id,
314 conversation_id,
315 &role,
316 vector,
317 MessageKind::Regular,
318 &embedding_model,
319 chunk_index_u32,
320 category.as_deref(),
321 )
322 .await
323 {
324 tracing::warn!(
325 "bg embed_category: failed to store chunk {chunk_index}/{chunk_count} \
326 for msg {message_id}: {e:#}"
327 );
328 }
329 }
330}
331
332impl SemanticMemory {
333 #[cfg_attr(
343 feature = "profiling",
344 tracing::instrument(name = "memory.remember", skip_all, fields(content_len = %content.len()))
345 )]
346 pub async fn remember(
347 &self,
348 conversation_id: ConversationId,
349 role: &str,
350 content: &str,
351 goal_text: Option<&str>,
352 ) -> Result<Option<MessageId>, MemoryError> {
353 if let Some(ref admission) = self.admission_control {
355 let decision = admission
356 .evaluate(
357 content,
358 role,
359 self.effective_embed_provider(),
360 self.qdrant.as_ref(),
361 goal_text,
362 )
363 .await;
364 let preview: String = content.chars().take(100).collect();
365 log_admission_decision(&decision, &preview, role, admission.threshold());
366 if !decision.admitted {
367 return Ok(None);
368 }
369 }
370
371 if let Some(gate) = &self.quality_gate
372 && gate
373 .evaluate(content, self.effective_embed_provider(), &[])
374 .await
375 .is_some()
376 {
377 return Ok(None);
378 }
379
380 let message_id = self
381 .sqlite
382 .save_message(conversation_id, role, content)
383 .await?;
384
385 self.embed_and_store_regular(message_id, conversation_id, role, content);
386
387 Ok(Some(message_id))
388 }
389
390 #[cfg_attr(
399 feature = "profiling",
400 tracing::instrument(name = "memory.remember", skip_all, fields(content_len = %content.len()))
401 )]
402 pub async fn remember_with_parts(
403 &self,
404 conversation_id: ConversationId,
405 role: &str,
406 content: &str,
407 parts_json: &str,
408 goal_text: Option<&str>,
409 ) -> Result<(Option<MessageId>, bool), MemoryError> {
410 if let Some(ref admission) = self.admission_control {
412 let decision = admission
413 .evaluate(
414 content,
415 role,
416 self.effective_embed_provider(),
417 self.qdrant.as_ref(),
418 goal_text,
419 )
420 .await;
421 let preview: String = content.chars().take(100).collect();
422 log_admission_decision(&decision, &preview, role, admission.threshold());
423 if !decision.admitted {
424 return Ok((None, false));
425 }
426 }
427
428 if let Some(gate) = &self.quality_gate
429 && gate
430 .evaluate(content, self.effective_embed_provider(), &[])
431 .await
432 .is_some()
433 {
434 return Ok((None, false));
435 }
436
437 let message_id = self
438 .sqlite
439 .save_message_with_parts(conversation_id, role, content, parts_json)
440 .await?;
441
442 let embedding_stored =
443 self.embed_and_store_regular(message_id, conversation_id, role, content);
444
445 Ok((Some(message_id), embedding_stored))
446 }
447
448 #[cfg_attr(
460 feature = "profiling",
461 tracing::instrument(name = "memory.remember", skip_all, fields(content_len = %content.len()))
462 )]
463 pub async fn remember_tool_output(
464 &self,
465 conversation_id: ConversationId,
466 role: &str,
467 content: &str,
468 parts_json: &str,
469 embed_ctx: EmbedContext,
470 ) -> Result<(Option<MessageId>, bool), MemoryError> {
471 if let Some(ref admission) = self.admission_control {
472 let decision = admission
473 .evaluate(
474 content,
475 role,
476 self.effective_embed_provider(),
477 self.qdrant.as_ref(),
478 None,
479 )
480 .await;
481 let preview: String = content.chars().take(100).collect();
482 log_admission_decision(&decision, &preview, role, admission.threshold());
483 if !decision.admitted {
484 return Ok((None, false));
485 }
486 }
487
488 let message_id = self
489 .sqlite
490 .save_message_with_parts(conversation_id, role, content, parts_json)
491 .await?;
492
493 let embedding_stored = self.embed_chunks_with_tool_context(
494 message_id,
495 conversation_id,
496 role,
497 content,
498 embed_ctx,
499 );
500
501 Ok((Some(message_id), embedding_stored))
502 }
503
504 #[cfg_attr(
515 feature = "profiling",
516 tracing::instrument(name = "memory.remember", skip_all, fields(content_len = %content.len()))
517 )]
518 pub async fn remember_categorized(
519 &self,
520 conversation_id: ConversationId,
521 role: &str,
522 content: &str,
523 category: Option<&str>,
524 goal_text: Option<&str>,
525 ) -> Result<Option<MessageId>, MemoryError> {
526 if let Some(ref admission) = self.admission_control {
527 let decision = admission
528 .evaluate(
529 content,
530 role,
531 self.effective_embed_provider(),
532 self.qdrant.as_ref(),
533 goal_text,
534 )
535 .await;
536 let preview: String = content.chars().take(100).collect();
537 log_admission_decision(&decision, &preview, role, admission.threshold());
538 if !decision.admitted {
539 return Ok(None);
540 }
541 }
542
543 let message_id = self
544 .sqlite
545 .save_message_with_category(conversation_id, role, content, category)
546 .await?;
547
548 self.embed_and_store_with_category(message_id, conversation_id, role, content, category);
549
550 Ok(Some(message_id))
551 }
552
553 pub async fn recall_with_category(
561 &self,
562 query: &str,
563 limit: usize,
564 filter: Option<SearchFilter>,
565 category: Option<&str>,
566 ) -> Result<Vec<RecalledMessage>, MemoryError> {
567 let filter_with_category = filter.map(|mut f| {
568 f.category = category.map(str::to_owned);
569 f
570 });
571 self.recall(query, limit, filter_with_category).await
572 }
573
574 pub fn reap_embed_tasks(&self) {
578 if let Ok(mut tasks) = self.embed_tasks.lock() {
579 while tasks.try_join_next().is_some() {}
580 }
581 }
582
583 fn spawn_embed_bg<F>(&self, fut: F) -> bool
587 where
588 F: std::future::Future<Output = ()> + Send + 'static,
589 {
590 let Ok(mut tasks) = self.embed_tasks.lock() else {
591 return false;
592 };
593 while tasks.try_join_next().is_some() {}
595 if tasks.len() >= MAX_EMBED_BG_TASKS {
596 tracing::debug!("background embed task limit reached, skipping");
597 return false;
598 }
599 tasks.spawn(fut);
600 true
601 }
602
603 fn embed_and_store_with_category(
607 &self,
608 message_id: MessageId,
609 conversation_id: ConversationId,
610 role: &str,
611 content: &str,
612 category: Option<&str>,
613 ) -> bool {
614 let Some(qdrant) = self.qdrant.clone() else {
615 return false;
616 };
617 let embed_provider = self.effective_embed_provider().clone();
618 if !embed_provider.supports_embeddings() {
619 return false;
620 }
621 self.spawn_embed_bg(embed_and_store_with_category_bg(
622 EmbedBgArgs {
623 qdrant,
624 embed_provider,
625 embedding_model: self.embedding_model.clone(),
626 message_id,
627 conversation_id,
628 role: role.to_owned(),
629 content: content.to_owned(),
630 last_qdrant_warn: Arc::clone(&self.last_qdrant_warn),
631 },
632 category.map(str::to_owned),
633 ))
634 }
635
636 fn embed_and_store_regular(
640 &self,
641 message_id: MessageId,
642 conversation_id: ConversationId,
643 role: &str,
644 content: &str,
645 ) -> bool {
646 let Some(qdrant) = self.qdrant.clone() else {
647 return false;
648 };
649 let embed_provider = self.effective_embed_provider().clone();
650 if !embed_provider.supports_embeddings() {
651 return false;
652 }
653 self.spawn_embed_bg(embed_and_store_regular_bg(EmbedBgArgs {
654 qdrant,
655 embed_provider,
656 embedding_model: self.embedding_model.clone(),
657 message_id,
658 conversation_id,
659 role: role.to_owned(),
660 content: content.to_owned(),
661 last_qdrant_warn: Arc::clone(&self.last_qdrant_warn),
662 }))
663 }
664
665 fn embed_chunks_with_tool_context(
669 &self,
670 message_id: MessageId,
671 conversation_id: ConversationId,
672 role: &str,
673 content: &str,
674 embed_ctx: EmbedContext,
675 ) -> bool {
676 let Some(qdrant) = self.qdrant.clone() else {
677 return false;
678 };
679 let embed_provider = self.effective_embed_provider().clone();
680 if !embed_provider.supports_embeddings() {
681 return false;
682 }
683 self.spawn_embed_bg(embed_chunks_with_tool_context_bg(
684 EmbedBgArgs {
685 qdrant,
686 embed_provider,
687 embedding_model: self.embedding_model.clone(),
688 message_id,
689 conversation_id,
690 role: role.to_owned(),
691 content: content.to_owned(),
692 last_qdrant_warn: Arc::clone(&self.last_qdrant_warn),
693 },
694 embed_ctx,
695 ))
696 }
697
698 pub async fn save_only(
706 &self,
707 conversation_id: ConversationId,
708 role: &str,
709 content: &str,
710 parts_json: &str,
711 ) -> Result<MessageId, MemoryError> {
712 self.sqlite
713 .save_message_with_parts(conversation_id, role, content, parts_json)
714 .await
715 }
716
717 #[cfg_attr(
727 feature = "profiling",
728 tracing::instrument(name = "memory.recall", skip_all, fields(query_len = %query.len(), result_count = tracing::field::Empty, top_score = tracing::field::Empty))
729 )]
730 pub async fn recall(
731 &self,
732 query: &str,
733 limit: usize,
734 filter: Option<SearchFilter>,
735 ) -> Result<Vec<RecalledMessage>, MemoryError> {
736 let conversation_id = filter.as_ref().and_then(|f| f.conversation_id);
737
738 tracing::debug!(
739 query_len = query.len(),
740 limit,
741 has_filter = filter.is_some(),
742 conversation_id = conversation_id.map(|c| c.0),
743 has_qdrant = self.qdrant.is_some(),
744 "recall: starting hybrid search"
745 );
746
747 let keyword_results = match self
748 .sqlite
749 .keyword_search(query, self.effective_depth(limit), conversation_id)
750 .await
751 {
752 Ok(results) => results,
753 Err(e) => {
754 tracing::warn!("FTS5 keyword search failed: {e:#}");
755 Vec::new()
756 }
757 };
758
759 let vector_results = if let Some(qdrant) = &self.qdrant
760 && self.effective_embed_provider().supports_embeddings()
761 {
762 let embed_input = self.apply_search_prompt(query);
763 let query_vector = match tokio::time::timeout(
764 std::time::Duration::from_secs(5),
765 self.effective_embed_provider().embed(&embed_input),
766 )
767 .await
768 {
769 Ok(Ok(v)) => v,
770 Ok(Err(e)) => return Err(e.into()),
771 Err(_) => {
772 tracing::warn!("recall_semantic: embed timed out, returning empty results");
773 return Ok(Vec::new());
774 }
775 };
776 let query_vector = self.apply_query_bias(query, query_vector).await;
777 let vector_size = u64::try_from(query_vector.len()).unwrap_or(896);
778 qdrant.ensure_collection(vector_size).await?;
779 qdrant
780 .search(&query_vector, self.effective_depth(limit), filter)
781 .await?
782 } else {
783 Vec::new()
784 };
785
786 let results = self
787 .recall_merge_and_rank(keyword_results, vector_results, limit)
788 .await?;
789 #[cfg(feature = "profiling")]
790 {
791 let span = tracing::Span::current();
792 span.record("result_count", results.len());
793 if let Some(top) = results.first() {
794 span.record("top_score", top.score);
795 }
796 }
797 Ok(results)
798 }
799
800 pub(super) async fn recall_fts5_raw(
801 &self,
802 query: &str,
803 limit: usize,
804 conversation_id: Option<ConversationId>,
805 ) -> Result<Vec<(MessageId, f64)>, MemoryError> {
806 self.sqlite
807 .keyword_search(query, self.effective_depth(limit), conversation_id)
808 .await
809 }
810
811 pub(super) async fn recall_vectors_raw(
812 &self,
813 query: &str,
814 limit: usize,
815 filter: Option<SearchFilter>,
816 ) -> Result<Vec<crate::embedding_store::SearchResult>, MemoryError> {
817 let Some(qdrant) = &self.qdrant else {
818 return Ok(Vec::new());
819 };
820 if !self.effective_embed_provider().supports_embeddings() {
821 return Ok(Vec::new());
822 }
823 let embed_input = self.apply_search_prompt(query);
824 let query_vector = match tokio::time::timeout(
825 std::time::Duration::from_secs(5),
826 self.effective_embed_provider().embed(&embed_input),
827 )
828 .await
829 {
830 Ok(Ok(v)) => v,
831 Ok(Err(e)) => return Err(e.into()),
832 Err(_) => {
833 tracing::warn!("recall_vectors_raw: embed timed out, returning empty results");
834 return Ok(Vec::new());
835 }
836 };
837 let query_vector = self.apply_query_bias(query, query_vector).await;
838 let vector_size = u64::try_from(query_vector.len()).unwrap_or(896);
839 qdrant.ensure_collection(vector_size).await?;
840 qdrant
841 .search(&query_vector, self.effective_depth(limit), filter)
842 .await
843 }
844
845 #[allow(clippy::cast_possible_truncation, clippy::too_many_lines)]
854 pub(super) async fn recall_merge_and_rank(
855 &self,
856 keyword_results: Vec<(MessageId, f64)>,
857 vector_results: Vec<crate::embedding_store::SearchResult>,
858 limit: usize,
859 ) -> Result<Vec<RecalledMessage>, MemoryError> {
860 tracing::debug!(
861 vector_count = vector_results.len(),
862 keyword_count = keyword_results.len(),
863 limit,
864 "recall: merging search results"
865 );
866
867 let mut scores: std::collections::HashMap<MessageId, f64> =
868 std::collections::HashMap::new();
869
870 if !vector_results.is_empty() {
871 let max_vs = vector_results
872 .iter()
873 .map(|r| r.score)
874 .fold(f32::NEG_INFINITY, f32::max);
875 let norm = if max_vs > 0.0 { max_vs } else { 1.0 };
876 for r in &vector_results {
877 let normalized = f64::from(r.score / norm);
878 *scores.entry(r.message_id).or_default() += normalized * self.vector_weight;
879 }
880 }
881
882 if !keyword_results.is_empty() {
883 let max_ks = keyword_results
884 .iter()
885 .map(|r| r.1)
886 .fold(f64::NEG_INFINITY, f64::max);
887 let norm = if max_ks > 0.0 { max_ks } else { 1.0 };
888 for &(msg_id, score) in &keyword_results {
889 let normalized = score / norm;
890 *scores.entry(msg_id).or_default() += normalized * self.keyword_weight;
891 }
892 }
893
894 if scores.is_empty() {
895 tracing::debug!("recall: empty merge, no overlapping scores");
896 return Ok(Vec::new());
897 }
898
899 let mut ranked: Vec<(MessageId, f64)> = scores.into_iter().collect();
900 ranked.sort_by(|a, b| b.1.partial_cmp(&a.1).unwrap_or(std::cmp::Ordering::Equal));
901
902 tracing::debug!(
903 merged = ranked.len(),
904 top_score = ranked.first().map(|r| r.1),
905 bottom_score = ranked.last().map(|r| r.1),
906 vector_weight = %self.vector_weight,
907 keyword_weight = %self.keyword_weight,
908 "recall: weighted merge complete"
909 );
910
911 if self.temporal_decay.is_enabled() && self.temporal_decay_half_life_days > 0 {
912 let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
913 match self.sqlite.message_timestamps(&ids).await {
914 Ok(timestamps) => {
915 apply_temporal_decay(
916 &mut ranked,
917 ×tamps,
918 self.temporal_decay_half_life_days,
919 );
920 ranked
921 .sort_by(|a, b| b.1.partial_cmp(&a.1).unwrap_or(std::cmp::Ordering::Equal));
922 tracing::debug!(
923 half_life_days = self.temporal_decay_half_life_days,
924 top_score_after = ranked.first().map(|r| r.1),
925 "recall: temporal decay applied"
926 );
927 }
928 Err(e) => {
929 tracing::warn!("temporal decay: failed to fetch timestamps: {e:#}");
930 }
931 }
932 }
933
934 if self.mmr_reranking.is_enabled() && !vector_results.is_empty() {
935 if let Some(qdrant) = &self.qdrant {
936 let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
937 match qdrant.get_vectors(&ids).await {
938 Ok(vec_map) if !vec_map.is_empty() => {
939 let ranked_len_before = ranked.len();
940 ranked = apply_mmr(&ranked, &vec_map, self.mmr_lambda, limit);
941 tracing::debug!(
942 before = ranked_len_before,
943 after = ranked.len(),
944 lambda = %self.mmr_lambda,
945 "recall: mmr re-ranked"
946 );
947 }
948 Ok(_) => {
949 ranked.truncate(limit);
950 }
951 Err(e) => {
952 tracing::warn!("MMR: failed to fetch vectors: {e:#}");
953 ranked.truncate(limit);
954 }
955 }
956 } else {
957 ranked.truncate(limit);
958 }
959 } else {
960 ranked.truncate(limit);
961 }
962
963 if self.importance_scoring.is_enabled() && !ranked.is_empty() {
964 let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
965 match self.sqlite.fetch_importance_scores(&ids).await {
966 Ok(scores) => {
967 for (msg_id, score) in &mut ranked {
968 if let Some(&imp) = scores.get(msg_id) {
969 *score += imp * self.importance_weight;
970 }
971 }
972 ranked
973 .sort_by(|a, b| b.1.partial_cmp(&a.1).unwrap_or(std::cmp::Ordering::Equal));
974 tracing::debug!(
975 importance_weight = %self.importance_weight,
976 "recall: importance scores blended"
977 );
978 }
979 Err(e) => {
980 tracing::warn!("importance scoring: failed to fetch scores: {e:#}");
981 }
982 }
983 }
984
985 if (self.tier_boost_semantic - 1.0).abs() > f64::EPSILON && !ranked.is_empty() {
989 let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
990 match self.sqlite.fetch_tiers(&ids).await {
991 Ok(tiers) => {
992 let bonus = self.tier_boost_semantic - 1.0;
993 let mut boosted = false;
994 for (msg_id, score) in &mut ranked {
995 if tiers.get(msg_id).map(String::as_str) == Some("semantic") {
996 *score += bonus;
997 boosted = true;
998 }
999 }
1000 if boosted {
1001 ranked.sort_by(|a, b| {
1002 b.1.partial_cmp(&a.1).unwrap_or(std::cmp::Ordering::Equal)
1003 });
1004 tracing::debug!(
1005 tier_boost = %self.tier_boost_semantic,
1006 "recall: semantic tier boost applied"
1007 );
1008 }
1009 }
1010 Err(e) => {
1011 tracing::warn!("tier boost: failed to fetch tiers: {e:#}");
1012 }
1013 }
1014 }
1015
1016 let ids: Vec<MessageId> = ranked.iter().map(|r| r.0).collect();
1017
1018 if !ids.is_empty()
1019 && let Err(e) = self.batch_increment_access_count(ids.clone()).await
1020 {
1021 tracing::warn!("recall: failed to increment access counts: {e:#}");
1022 }
1023
1024 if let Err(e) = self.sqlite.mark_training_recalled(&ids).await {
1026 tracing::debug!(
1027 error = %e,
1028 "recall: failed to mark training data as recalled (non-fatal)"
1029 );
1030 }
1031
1032 let messages = self.sqlite.messages_by_ids(&ids).await?;
1033 let msg_map: std::collections::HashMap<MessageId, _> = messages.into_iter().collect();
1034
1035 let recalled: Vec<RecalledMessage> = ranked
1036 .iter()
1037 .filter_map(|(msg_id, score)| {
1038 msg_map.get(msg_id).map(|msg| RecalledMessage {
1039 message: msg.clone(),
1040 #[expect(clippy::cast_possible_truncation)]
1041 score: *score as f32,
1042 })
1043 })
1044 .collect();
1045
1046 tracing::debug!(final_count = recalled.len(), "recall: final results");
1047
1048 Ok(recalled)
1049 }
1050
1051 #[cfg_attr(
1060 feature = "profiling",
1061 tracing::instrument(name = "memory.recall", skip_all, fields(query_len = %query.len(), result_count = tracing::field::Empty))
1062 )]
1063 pub async fn recall_routed(
1064 &self,
1065 query: &str,
1066 limit: usize,
1067 filter: Option<SearchFilter>,
1068 router: &dyn crate::router::MemoryRouter,
1069 ) -> Result<Vec<RecalledMessage>, MemoryError> {
1070 use crate::router::MemoryRoute;
1071
1072 let route = router.route(query);
1073 tracing::debug!(?route, query_len = query.len(), "memory routing decision");
1074
1075 let conversation_id = filter.as_ref().and_then(|f| f.conversation_id);
1076
1077 let (keyword_results, vector_results): (
1078 Vec<(MessageId, f64)>,
1079 Vec<crate::embedding_store::SearchResult>,
1080 ) = match route {
1081 MemoryRoute::Keyword => {
1082 let kw = self.recall_fts5_raw(query, limit, conversation_id).await?;
1083 (kw, Vec::new())
1084 }
1085 MemoryRoute::Semantic => {
1086 let vr = self.recall_vectors_raw(query, limit, filter).await?;
1087 (Vec::new(), vr)
1088 }
1089 MemoryRoute::Hybrid => {
1090 let kw = match self.recall_fts5_raw(query, limit, conversation_id).await {
1091 Ok(r) => r,
1092 Err(e) => {
1093 tracing::warn!("FTS5 keyword search failed: {e:#}");
1094 Vec::new()
1095 }
1096 };
1097 let vr = self.recall_vectors_raw(query, limit, filter).await?;
1098 (kw, vr)
1099 }
1100 MemoryRoute::Episodic => {
1109 let range = crate::router::resolve_temporal_range(query, chrono::Utc::now());
1110 let cleaned = crate::router::strip_temporal_keywords(query);
1111 let search_query = if cleaned.is_empty() { query } else { &cleaned };
1112 let kw = if let Some(ref r) = range {
1113 self.sqlite
1114 .keyword_search_with_time_range(
1115 search_query,
1116 limit,
1117 conversation_id,
1118 r.after.as_deref(),
1119 r.before.as_deref(),
1120 )
1121 .await?
1122 } else {
1123 self.recall_fts5_raw(search_query, limit, conversation_id)
1124 .await?
1125 };
1126 tracing::debug!(
1127 has_range = range.is_some(),
1128 cleaned_query = %search_query,
1129 keyword_count = kw.len(),
1130 "recall: episodic path"
1131 );
1132 (kw, Vec::new())
1133 }
1134 MemoryRoute::Graph => {
1137 let kw = match self.recall_fts5_raw(query, limit, conversation_id).await {
1138 Ok(r) => r,
1139 Err(e) => {
1140 tracing::warn!("FTS5 keyword search failed (graph→hybrid fallback): {e:#}");
1141 Vec::new()
1142 }
1143 };
1144 let vr = self.recall_vectors_raw(query, limit, filter).await?;
1145 (kw, vr)
1146 }
1147 };
1148
1149 tracing::debug!(
1150 keyword_count = keyword_results.len(),
1151 vector_count = vector_results.len(),
1152 "recall: routed search results"
1153 );
1154
1155 self.recall_merge_and_rank(keyword_results, vector_results, limit)
1156 .await
1157 }
1158
1159 #[cfg_attr(
1170 feature = "profiling",
1171 tracing::instrument(name = "memory.recall", skip_all, fields(query_len = %query.len(), result_count = tracing::field::Empty))
1172 )]
1173 pub async fn recall_routed_async(
1174 &self,
1175 query: &str,
1176 limit: usize,
1177 filter: Option<crate::embedding_store::SearchFilter>,
1178 router: &dyn crate::router::AsyncMemoryRouter,
1179 ) -> Result<Vec<RecalledMessage>, MemoryError> {
1180 use crate::router::MemoryRoute;
1181
1182 let decision = router.route_async(query).await;
1183 let route = decision.route;
1184 tracing::debug!(
1185 ?route,
1186 confidence = decision.confidence,
1187 query_len = query.len(),
1188 "memory routing decision (async)"
1189 );
1190
1191 let conversation_id = filter.as_ref().and_then(|f| f.conversation_id);
1192
1193 let (keyword_results, vector_results): (
1194 Vec<(crate::types::MessageId, f64)>,
1195 Vec<crate::embedding_store::SearchResult>,
1196 ) = match route {
1197 MemoryRoute::Keyword => {
1198 let kw = self.recall_fts5_raw(query, limit, conversation_id).await?;
1199 (kw, Vec::new())
1200 }
1201 MemoryRoute::Semantic => {
1202 let vr = self.recall_vectors_raw(query, limit, filter).await?;
1203 (Vec::new(), vr)
1204 }
1205 MemoryRoute::Hybrid => {
1206 let kw = match self.recall_fts5_raw(query, limit, conversation_id).await {
1207 Ok(r) => r,
1208 Err(e) => {
1209 tracing::warn!("FTS5 keyword search failed: {e:#}");
1210 Vec::new()
1211 }
1212 };
1213 let vr = self.recall_vectors_raw(query, limit, filter).await?;
1214 (kw, vr)
1215 }
1216 MemoryRoute::Episodic => {
1217 let range = crate::router::resolve_temporal_range(query, chrono::Utc::now());
1218 let cleaned = crate::router::strip_temporal_keywords(query);
1219 let search_query = if cleaned.is_empty() { query } else { &cleaned };
1220 let kw = if let Some(ref r) = range {
1221 self.sqlite
1222 .keyword_search_with_time_range(
1223 search_query,
1224 limit,
1225 conversation_id,
1226 r.after.as_deref(),
1227 r.before.as_deref(),
1228 )
1229 .await?
1230 } else {
1231 self.recall_fts5_raw(search_query, limit, conversation_id)
1232 .await?
1233 };
1234 (kw, Vec::new())
1235 }
1236 MemoryRoute::Graph => {
1237 let kw = match self.recall_fts5_raw(query, limit, conversation_id).await {
1238 Ok(r) => r,
1239 Err(e) => {
1240 tracing::warn!("FTS5 keyword search failed (graph→hybrid fallback): {e:#}");
1241 Vec::new()
1242 }
1243 };
1244 let vr = self.recall_vectors_raw(query, limit, filter).await?;
1245 (kw, vr)
1246 }
1247 };
1248
1249 tracing::debug!(
1250 keyword_count = keyword_results.len(),
1251 vector_count = vector_results.len(),
1252 "recall: routed search results (async)"
1253 );
1254
1255 self.recall_merge_and_rank(keyword_results, vector_results, limit)
1256 .await
1257 }
1258
1259 #[cfg_attr(
1273 feature = "profiling",
1274 tracing::instrument(name = "memory.recall_graph", skip_all, fields(result_count = tracing::field::Empty))
1275 )]
1276 pub async fn recall_graph(
1277 &self,
1278 query: &str,
1279 limit: usize,
1280 max_hops: u32,
1281 at_timestamp: Option<&str>,
1282 temporal_decay_rate: f64,
1283 edge_types: &[crate::graph::EdgeType],
1284 ) -> Result<Vec<crate::graph::types::GraphFact>, MemoryError> {
1285 let Some(store) = &self.graph_store else {
1286 return Ok(Vec::new());
1287 };
1288
1289 tracing::debug!(
1290 query_len = query.len(),
1291 limit,
1292 max_hops,
1293 "graph: starting recall"
1294 );
1295
1296 let results = crate::graph::retrieval::graph_recall(
1297 store,
1298 self.qdrant.as_deref(),
1299 &self.provider,
1300 query,
1301 limit,
1302 max_hops,
1303 at_timestamp,
1304 temporal_decay_rate,
1305 edge_types,
1306 self.hebbian_reinforcement.is_enabled(),
1307 self.hebbian_lr,
1308 )
1309 .await?;
1310
1311 tracing::debug!(result_count = results.len(), "graph: recall complete");
1312 #[cfg(feature = "profiling")]
1313 tracing::Span::current().record("result_count", results.len());
1314
1315 Ok(results)
1316 }
1317
1318 #[cfg_attr(
1327 feature = "profiling",
1328 tracing::instrument(name = "memory.recall_graph", skip_all, fields(result_count = tracing::field::Empty))
1329 )]
1330 pub async fn recall_graph_activated(
1331 &self,
1332 query: &str,
1333 limit: usize,
1334 params: crate::graph::SpreadingActivationParams,
1335 edge_types: &[crate::graph::EdgeType],
1336 ) -> Result<Vec<crate::graph::activation::ActivatedFact>, MemoryError> {
1337 let Some(store) = &self.graph_store else {
1338 return Ok(Vec::new());
1339 };
1340
1341 tracing::debug!(
1342 query_len = query.len(),
1343 limit,
1344 "spreading activation: starting graph recall"
1345 );
1346
1347 let embeddings = self.qdrant.as_deref();
1348 let results = crate::graph::retrieval::graph_recall_activated(
1349 store,
1350 embeddings,
1351 &self.provider,
1352 query,
1353 limit,
1354 params,
1355 edge_types,
1356 self.hebbian_reinforcement.is_enabled(),
1357 self.hebbian_lr,
1358 )
1359 .await?;
1360
1361 tracing::debug!(
1362 result_count = results.len(),
1363 "spreading activation: graph recall complete"
1364 );
1365
1366 Ok(results)
1367 }
1368
1369 #[allow(clippy::too_many_arguments, clippy::too_many_lines)] #[cfg_attr(
1402 feature = "profiling",
1403 tracing::instrument(
1404 name = "memory.recall.graph_view",
1405 skip_all,
1406 fields(view = ?view, result_count = tracing::field::Empty)
1407 )
1408 )]
1409 pub async fn recall_graph_view(
1410 &self,
1411 query: &str,
1412 limit: usize,
1413 view: crate::recall_view::RecallView,
1414 neighbor_cap: usize,
1415 bfs_max_hops: u32,
1416 temporal_decay_rate: f64,
1417 edge_types: &[crate::graph::EdgeType],
1418 sa_params: Option<crate::graph::SpreadingActivationParams>,
1419 ) -> Result<Vec<crate::recall_view::RecalledFact>, MemoryError> {
1420 use crate::recall_view::{RecallView, RecalledFact};
1421
1422 let mut recalled: Vec<RecalledFact> = if let Some(params) = sa_params {
1424 let activated = self
1425 .recall_graph_activated(query, limit, params, edge_types)
1426 .await?;
1427 activated
1428 .into_iter()
1429 .map(|af| {
1430 let activation_score = af.activation_score;
1433 let edge = &af.edge;
1434 let fact = crate::graph::types::GraphFact {
1435 entity_name: String::new(), relation: edge.canonical_relation.clone(),
1437 target_name: String::new(),
1438 fact: edge.fact.clone(),
1439 entity_match_score: activation_score,
1440 hop_distance: 0,
1441 confidence: edge.confidence,
1442 valid_from: if edge.valid_from.is_empty() {
1443 None
1444 } else {
1445 Some(edge.valid_from.clone())
1446 },
1447 edge_type: edge.edge_type,
1448 retrieval_count: edge.retrieval_count,
1449 edge_id: Some(edge.id),
1450 };
1451 RecalledFact {
1452 fact,
1453 activation_score: Some(activation_score),
1454 provenance_message_id: edge.source_message_id,
1455 provenance_snippet: None,
1456 neighbors: Vec::new(),
1457 }
1458 })
1459 .collect()
1460 } else {
1461 let facts = self
1462 .recall_graph(
1463 query,
1464 limit,
1465 bfs_max_hops,
1466 None,
1467 temporal_decay_rate,
1468 edge_types,
1469 )
1470 .await?;
1471 facts
1472 .into_iter()
1473 .map(RecalledFact::from_graph_fact)
1474 .collect()
1475 };
1476
1477 if view == RecallView::Head {
1479 #[cfg(feature = "profiling")]
1480 tracing::Span::current().record("result_count", recalled.len());
1481 return Ok(recalled);
1482 }
1483
1484 if matches!(view, RecallView::ZoomIn | RecallView::ZoomOut) {
1486 let edge_ids: Vec<i64> = recalled.iter().filter_map(|r| r.fact.edge_id).collect();
1487
1488 if !edge_ids.is_empty()
1489 && let Some(ref store) = self.graph_store
1490 {
1491 const MAX_IDS: usize = 490;
1493 let mut edge_to_msg: std::collections::HashMap<i64, MessageId> =
1494 std::collections::HashMap::new();
1495 for chunk in edge_ids.chunks(MAX_IDS) {
1496 match store.source_message_ids_for_edges(chunk).await {
1497 Ok(pairs) => {
1498 for (eid, mid) in pairs {
1499 edge_to_msg.insert(eid, mid);
1500 }
1501 }
1502 Err(e) => {
1503 tracing::warn!(error = %e, "recall_graph_view: provenance fetch failed");
1504 }
1505 }
1506 }
1507
1508 for rf in &mut recalled {
1510 if rf.provenance_message_id.is_none()
1511 && let Some(eid) = rf.fact.edge_id
1512 {
1513 rf.provenance_message_id = edge_to_msg.get(&eid).copied();
1514 }
1515 }
1516
1517 let msg_ids: Vec<MessageId> = recalled
1519 .iter()
1520 .filter_map(|r| r.provenance_message_id)
1521 .collect::<std::collections::HashSet<_>>()
1522 .into_iter()
1523 .collect();
1524
1525 if !msg_ids.is_empty() {
1526 match self.sqlite.messages_by_ids(&msg_ids).await {
1527 Ok(messages) => {
1528 let mut mid_to_snippet: std::collections::HashMap<MessageId, String> =
1529 messages
1530 .into_iter()
1531 .map(|(id, msg)| {
1532 let raw = &msg.content;
1533 let scrubbed: String = raw
1534 .chars()
1535 .map(|c| match c {
1536 '\n' | '\r' | '<' | '>' => ' ',
1537 other => other,
1538 })
1539 .take(200)
1540 .collect();
1541 (id, scrubbed)
1542 })
1543 .collect();
1544 for rf in &mut recalled {
1545 if let Some(mid) = rf.provenance_message_id {
1546 rf.provenance_snippet = mid_to_snippet.remove(&mid);
1547 }
1548 }
1549 }
1550 Err(e) => {
1551 tracing::warn!(error = %e, "recall_graph_view: message snippet fetch failed");
1552 }
1553 }
1554 }
1555 }
1556 }
1557
1558 if view == RecallView::ZoomOut
1560 && let Some(ref store) = self.graph_store
1561 {
1562 type DedupeKey = (String, String, String, crate::graph::EdgeType);
1566 let make_key = |f: &crate::graph::types::GraphFact| -> DedupeKey {
1567 if f.entity_name.is_empty() || f.target_name.is_empty() {
1568 (
1569 f.fact.clone(),
1570 f.relation.clone(),
1571 String::new(),
1572 f.edge_type,
1573 )
1574 } else {
1575 (
1576 f.entity_name.clone(),
1577 f.relation.clone(),
1578 f.target_name.clone(),
1579 f.edge_type,
1580 )
1581 }
1582 };
1583 let mut seen: std::collections::HashSet<DedupeKey> =
1584 recalled.iter().map(|r| make_key(&r.fact)).collect();
1585
1586 let total_neighbor_cap = limit * neighbor_cap;
1587 let mut total_neighbors = 0usize;
1588
1589 for rf in &mut recalled {
1590 if total_neighbors >= total_neighbor_cap {
1591 break;
1592 }
1593 let source_entity_id = match rf.fact.edge_id {
1596 Some(eid) => match store.source_entity_id_for_edge(eid).await {
1597 Ok(Some(id)) => id,
1598 _ => continue,
1599 },
1600 None => continue,
1601 };
1602
1603 let neighbors = match store
1604 .bfs_edges_at_depth(source_entity_id, 1, edge_types)
1605 .await
1606 {
1607 Ok(edges) => edges,
1608 Err(e) => {
1609 tracing::warn!(error = %e, "recall_graph_view: zoom_out bfs failed");
1610 continue;
1611 }
1612 };
1613
1614 let mut added = 0usize;
1615 for n_edge in neighbors {
1616 if added >= neighbor_cap || total_neighbors >= total_neighbor_cap {
1617 break;
1618 }
1619 let key = make_key(&n_edge.fact);
1620 if seen.insert(key) {
1621 rf.neighbors.push(n_edge.fact);
1622 added += 1;
1623 total_neighbors += 1;
1624 }
1625 }
1626 }
1627 }
1628
1629 #[cfg(feature = "profiling")]
1630 tracing::Span::current().record("result_count", recalled.len());
1631 Ok(recalled)
1632 }
1633
1634 pub async fn recall_graph_astar(
1642 &self,
1643 query: &str,
1644 limit: usize,
1645 max_hops: u32,
1646 temporal_decay_rate: f64,
1647 edge_types: &[crate::graph::EdgeType],
1648 ) -> Result<Vec<crate::graph::types::GraphFact>, MemoryError> {
1649 let Some(store) = &self.graph_store else {
1650 return Ok(Vec::new());
1651 };
1652 crate::graph::retrieval_astar::graph_recall_astar(
1653 store,
1654 self.qdrant.as_deref(),
1655 &self.provider,
1656 query,
1657 limit,
1658 max_hops,
1659 edge_types,
1660 temporal_decay_rate,
1661 self.hebbian_reinforcement.is_enabled(),
1662 self.hebbian_lr,
1663 self.query_sensitive_cost,
1664 )
1665 .await
1666 }
1667
1668 pub async fn recall_graph_watercircles(
1676 &self,
1677 query: &str,
1678 limit: usize,
1679 max_hops: u32,
1680 ring_limit: usize,
1681 temporal_decay_rate: f64,
1682 edge_types: &[crate::graph::EdgeType],
1683 ) -> Result<Vec<crate::graph::types::GraphFact>, MemoryError> {
1684 let Some(store) = &self.graph_store else {
1685 return Ok(Vec::new());
1686 };
1687 crate::graph::retrieval_watercircles::graph_recall_watercircles(
1688 store,
1689 self.qdrant.as_deref(),
1690 &self.provider,
1691 query,
1692 limit,
1693 max_hops,
1694 ring_limit,
1695 edge_types,
1696 temporal_decay_rate,
1697 self.hebbian_reinforcement.is_enabled(),
1698 self.hebbian_lr,
1699 )
1700 .await
1701 }
1702
1703 pub async fn recall_graph_beam(
1711 &self,
1712 query: &str,
1713 limit: usize,
1714 beam_width: usize,
1715 max_hops: u32,
1716 temporal_decay_rate: f64,
1717 edge_types: &[crate::graph::EdgeType],
1718 ) -> Result<Vec<crate::graph::types::GraphFact>, MemoryError> {
1719 let Some(store) = &self.graph_store else {
1720 return Ok(Vec::new());
1721 };
1722 crate::graph::retrieval_beam::graph_recall_beam(
1723 store,
1724 self.qdrant.as_deref(),
1725 &self.provider,
1726 query,
1727 limit,
1728 beam_width,
1729 max_hops,
1730 edge_types,
1731 temporal_decay_rate,
1732 self.hebbian_reinforcement.is_enabled(),
1733 self.hebbian_lr,
1734 )
1735 .await
1736 }
1737
1738 pub async fn classify_graph_strategy(&self, query: &str) -> String {
1743 crate::graph::strategy_classifier::classify_retrieval_strategy(&self.provider, query).await
1744 }
1745
1746 #[cfg_attr(
1756 feature = "profiling",
1757 tracing::instrument(
1758 name = "memory.recall_graph_hela",
1759 skip_all,
1760 fields(result_count = tracing::field::Empty)
1761 )
1762 )]
1763 pub async fn recall_graph_hela(
1764 &self,
1765 query: &str,
1766 limit: usize,
1767 params: crate::graph::HelaSpreadParams,
1768 ) -> Result<Vec<crate::graph::HelaFact>, MemoryError> {
1769 let Some(store) = &self.graph_store else {
1770 return Ok(Vec::new());
1771 };
1772 let Some(embeddings) = &self.qdrant else {
1773 return Ok(Vec::new());
1774 };
1775
1776 let store = Arc::clone(store);
1777 let embeddings = Arc::clone(embeddings);
1778 let provider = self.provider.clone();
1779 let hebbian_enabled = self.hebbian_reinforcement.is_enabled();
1780 let hebbian_lr = self.hebbian_lr;
1781
1782 let results = tokio::time::timeout(
1783 std::time::Duration::from_millis(200),
1784 crate::graph::hela_spreading_recall(
1785 &store,
1786 &embeddings,
1787 &provider,
1788 query,
1789 limit,
1790 ¶ms,
1791 hebbian_enabled,
1792 hebbian_lr,
1793 ),
1794 )
1795 .await
1796 .unwrap_or_else(|_| {
1797 tracing::warn!("memory.recall_graph_hela: outer 200ms timeout exceeded");
1798 Ok(Vec::new())
1799 })?;
1800
1801 #[cfg(feature = "profiling")]
1802 tracing::Span::current().record("result_count", results.len());
1803
1804 Ok(results)
1805 }
1806
1807 async fn batch_increment_access_count(
1815 &self,
1816 message_ids: Vec<MessageId>,
1817 ) -> Result<(), MemoryError> {
1818 if message_ids.is_empty() {
1819 return Ok(());
1820 }
1821 self.sqlite.increment_access_counts(&message_ids).await
1822 }
1823
1824 pub async fn has_embedding(&self, message_id: MessageId) -> Result<bool, MemoryError> {
1830 match &self.qdrant {
1831 Some(qdrant) => qdrant.has_embedding(message_id).await,
1832 None => Ok(false),
1833 }
1834 }
1835
1836 pub async fn embed_missing(
1852 &self,
1853 progress_tx: Option<tokio::sync::watch::Sender<Option<super::BackfillProgress>>>,
1854 ) -> Result<usize, MemoryError> {
1855 if self.qdrant.is_none() || !self.effective_embed_provider().supports_embeddings() {
1856 return Ok(0);
1857 }
1858
1859 let total = self.sqlite.count_unembedded_messages().await?;
1860 if total == 0 {
1861 return Ok(0);
1862 }
1863
1864 if let Some(tx) = &progress_tx {
1865 let _ = tx.send(Some(super::BackfillProgress { done: 0, total }));
1866 }
1867
1868 let mut done = 0usize;
1869 let mut succeeded = 0usize;
1870
1871 loop {
1872 const BATCH_SIZE: usize = 32;
1873 const BATCH_SIZE_I64: i64 = 32;
1874 let rows: Vec<_> = self
1875 .sqlite
1876 .stream_unembedded_messages(BATCH_SIZE_I64)
1877 .try_collect()
1878 .await?;
1879
1880 if rows.is_empty() {
1881 break;
1882 }
1883
1884 let batch_len = rows.len();
1885
1886 let results: Vec<bool> = futures::stream::iter(rows)
1887 .map(|(msg_id, conv_id, role, content)| async move {
1888 self.embed_and_store_regular(msg_id, conv_id, &role, &content)
1889 })
1890 .buffer_unordered(4)
1891 .collect()
1892 .await;
1893
1894 for ok in &results {
1895 done += 1;
1896 if *ok {
1897 succeeded += 1;
1898 }
1899 if let Some(tx) = &progress_tx {
1900 let _ = tx.send(Some(super::BackfillProgress { done, total }));
1901 }
1902 }
1903
1904 let batch_succeeded = results.iter().filter(|&&b| b).count();
1905 if batch_succeeded > 0 {
1906 tracing::debug!("Backfill batch: {batch_succeeded}/{batch_len} embedded");
1907 }
1908
1909 if batch_len < BATCH_SIZE {
1910 break;
1911 }
1912 }
1913
1914 if let Some(tx) = &progress_tx {
1915 let _ = tx.send(None);
1916 }
1917
1918 if done > 0 {
1919 tracing::info!("Embedded {succeeded}/{total} missing messages");
1920 }
1921 Ok(succeeded)
1922 }
1923}
1924
1925#[cfg(test)]
1926mod tests {
1927 use super::*;
1928
1929 #[test]
1930 fn embed_context_default_all_none() {
1931 let ctx = EmbedContext::default();
1932 assert!(ctx.tool_name.is_none());
1933 assert!(ctx.exit_code.is_none());
1934 assert!(ctx.timestamp.is_none());
1935 }
1936
1937 #[test]
1938 fn embed_context_fields_set_correctly() {
1939 let ctx = EmbedContext {
1940 tool_name: Some("shell".to_string()),
1941 exit_code: Some(0),
1942 timestamp: Some("2026-04-04T00:00:00Z".to_string()),
1943 };
1944 assert_eq!(ctx.tool_name.as_deref(), Some("shell"));
1945 assert_eq!(ctx.exit_code, Some(0));
1946 assert_eq!(ctx.timestamp.as_deref(), Some("2026-04-04T00:00:00Z"));
1947 }
1948
1949 #[test]
1950 fn embed_context_non_zero_exit_code() {
1951 let ctx = EmbedContext {
1952 tool_name: Some("shell".to_string()),
1953 exit_code: Some(1),
1954 timestamp: None,
1955 };
1956 assert_eq!(ctx.exit_code, Some(1));
1957 assert!(ctx.timestamp.is_none());
1958 }
1959
1960 async fn make_semantic_memory() -> crate::semantic::SemanticMemory {
1961 use std::sync::Arc;
1962 use std::sync::atomic::AtomicU64;
1963 use zeph_llm::any::AnyProvider;
1964 use zeph_llm::mock::MockProvider;
1965
1966 let provider = AnyProvider::Mock(MockProvider::default());
1967 let sqlite = crate::store::SqliteStore::new(":memory:").await.unwrap();
1968 crate::semantic::SemanticMemory {
1969 sqlite,
1970 qdrant: None,
1971 provider,
1972 embed_provider: None,
1973 embedding_model: "test-model".into(),
1974 vector_weight: 0.7,
1975 keyword_weight: 0.3,
1976 temporal_decay: crate::semantic::TemporalDecay::Disabled,
1977 temporal_decay_half_life_days: 30,
1978 mmr_reranking: crate::semantic::MmrReranking::Disabled,
1979 mmr_lambda: 0.7,
1980 importance_scoring: crate::semantic::ImportanceScoring::Disabled,
1981 importance_weight: 0.15,
1982 token_counter: Arc::new(crate::token_counter::TokenCounter::new()),
1983 graph_store: None,
1984 experience: None,
1985 community_detection_failures: Arc::new(AtomicU64::new(0)),
1986 graph_extraction_count: Arc::new(AtomicU64::new(0)),
1987 graph_extraction_failures: Arc::new(AtomicU64::new(0)),
1988 last_qdrant_warn: Arc::new(AtomicU64::new(0)),
1989 tier_boost_semantic: 1.3,
1990 admission_control: None,
1991 quality_gate: None,
1992 key_facts_dedup_threshold: 0.95,
1993 embed_tasks: std::sync::Mutex::new(tokio::task::JoinSet::new()),
1994 retrieval_depth: 0,
1995 search_prompt_template: String::new(),
1996 depth_below_limit_warned: Arc::new(std::sync::atomic::AtomicBool::new(false)),
1997 missing_placeholder_warned: Arc::new(std::sync::atomic::AtomicBool::new(false)),
1998 reasoning: None,
1999 query_bias_correction: crate::semantic::QueryBiasCorrection::Disabled,
2000 query_bias_profile_weight: 0.25,
2001 profile_centroid: tokio::sync::RwLock::new(None),
2002 profile_centroid_ttl_secs: 300,
2003 hebbian_reinforcement: crate::semantic::HebbianReinforcement::Disabled,
2004 hebbian_lr: 0.1,
2005 hebbian_spread: crate::HelaSpreadRuntime::default(),
2006 retrieval_failure_logger: None,
2007 summarization_llm_timeout_secs: 60,
2008 query_sensitive_cost: false,
2009 }
2010 }
2011
2012 #[tokio::test]
2013 async fn spawn_embed_bg_returns_true_when_capacity_available() {
2014 let memory = make_semantic_memory().await;
2015 let dispatched = memory.spawn_embed_bg(std::future::ready(()));
2016 assert!(
2017 dispatched,
2018 "spawn_embed_bg must return true when a task was successfully spawned"
2019 );
2020 }
2021
2022 #[tokio::test]
2023 async fn spawn_embed_bg_returns_false_at_capacity() {
2024 let memory = make_semantic_memory().await;
2025
2026 {
2028 let mut tasks = memory.embed_tasks.lock().unwrap();
2029 for _ in 0..MAX_EMBED_BG_TASKS {
2030 tasks.spawn(std::future::pending::<()>());
2031 }
2032 }
2033
2034 let dispatched = memory.spawn_embed_bg(std::future::ready(()));
2035 assert!(
2036 !dispatched,
2037 "spawn_embed_bg must return false when the task limit is reached"
2038 );
2039 }
2040
2041 #[test]
2042 fn qdrant_warn_rate_limit_suppresses_within_window() {
2043 use std::sync::Arc;
2044 use std::sync::atomic::{AtomicU64, Ordering};
2045
2046 let last_warn = Arc::new(AtomicU64::new(0));
2047 let window_secs = 10u64;
2048
2049 let now1 = 100u64;
2051 let last1 = last_warn.load(Ordering::Relaxed);
2052 let should_warn1 = now1.saturating_sub(last1) >= window_secs;
2053 assert!(should_warn1, "first call must not be suppressed");
2054 if should_warn1 {
2055 last_warn.store(now1, Ordering::Relaxed);
2056 }
2057
2058 let now2 = 105u64;
2060 let last2 = last_warn.load(Ordering::Relaxed);
2061 let should_warn2 = now2.saturating_sub(last2) >= window_secs;
2062 assert!(!should_warn2, "call within 10s window must be suppressed");
2063
2064 let now3 = 110u64;
2066 let last3 = last_warn.load(Ordering::Relaxed);
2067 let should_warn3 = now3.saturating_sub(last3) >= window_secs;
2068 assert!(
2069 should_warn3,
2070 "call after window expiry must not be suppressed"
2071 );
2072 }
2073
2074 #[test]
2075 fn qdrant_warn_rate_limit_shared_across_concurrent_sites() {
2076 use std::sync::Arc;
2077 use std::sync::atomic::{AtomicU64, Ordering};
2078
2079 let shared = Arc::new(AtomicU64::new(0));
2082 let window_secs = 10u64;
2083
2084 let site_a = Arc::clone(&shared);
2085 let site_b = Arc::clone(&shared);
2086
2087 let now_a = 100u64;
2088 let last_a = site_a.load(Ordering::Relaxed);
2089 if now_a.saturating_sub(last_a) >= window_secs {
2090 site_a.store(now_a, Ordering::Relaxed);
2091 }
2092
2093 let now_b = 105u64;
2094 let last_b = site_b.load(Ordering::Relaxed);
2095 let warn_b = now_b.saturating_sub(last_b) >= window_secs;
2096 assert!(
2097 !warn_b,
2098 "site B must be suppressed because site A already warned within the window"
2099 );
2100 }
2101}