| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
|
| use crate::http::ServerState; |
| use serde::{Deserialize, Serialize}; |
| use serde_json::Value; |
| use std::sync::Arc; |
| use std::time::{Duration, Instant}; |
|
|
| |
| |
| |
|
|
| pub const GATE_BLOCKED: &str = "blocked"; |
| pub const GATE_ALLOWED: &str = "ok"; |
| pub const GATE_BUSY: &str = "busy"; |
|
|
| const LOCK_TIMEOUT: Duration = Duration::from_secs(5); |
| const LOCK_RETRY_INTERVAL_MS: u64 = 50; |
|
|
| |
| |
| |
|
|
| #[derive(Debug, Clone, Serialize, Deserialize)] |
| pub enum Source { |
| Stdio, |
| Http, |
| Mesh { peer_key: String }, |
| Transformer { role: String, model_id: String }, |
| Pipeline { stream_id: String, peer_key: String }, |
| } |
|
|
| #[derive(Debug, Clone, Serialize, Deserialize)] |
| pub struct ToolRequest { |
| pub source: Source, |
| pub tool: String, |
| pub args: Value, |
| pub timestamp: String, |
| } |
|
|
| #[derive(Debug, Clone, Serialize, Deserialize)] |
| pub struct ToolResponse { |
| pub tool: String, |
| pub result: Value, |
| pub duration_ms: u64, |
| pub status: String, |
| } |
|
|
| |
| |
| |
|
|
| pub trait DispatchListener: Send + Sync { |
| fn on_request(&self, req: &ToolRequest); |
| fn on_response(&self, req: &ToolRequest, resp: &ToolResponse, blocked: bool); |
| } |
|
|
| |
| |
| |
|
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| pub fn call(state: &Arc<ServerState>, source: Source, tool: &str, args: &Value) -> ToolResponse { |
| let start = Instant::now(); |
| let timestamp = chrono::Utc::now().to_rfc3339(); |
|
|
| let request = ToolRequest { |
| source, |
| tool: tool.to_string(), |
| args: args.clone(), |
| timestamp, |
| }; |
|
|
| |
| for listener in &state.listeners { |
| if let Err(e) = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| { |
| listener.on_request(&request); |
| })) { |
| eprintln!("[SPF-DISPATCH] Listener panic on_request for {}: {:?}", tool, e); |
| } |
| } |
|
|
| |
| |
| |
| let flint_ctx = crate::flint_memory::flint_intercept(tool, args); |
|
|
| |
| |
| |
| |
| |
| let session_lock = match &request.source { |
| Source::Stdio => { |
| |
| match state.session.lock() { |
| Ok(guard) => Some(guard), |
| Err(poisoned) => { |
| eprintln!("[SPF-DISPATCH] Session mutex poisoned — recovering for {}", tool); |
| Some(poisoned.into_inner()) |
| } |
| } |
| } |
| _ => { |
| |
| let mut acquired = None; |
| let lock_start = Instant::now(); |
| loop { |
| match state.session.try_lock() { |
| Ok(guard) => { acquired = Some(guard); break; } |
| Err(std::sync::TryLockError::Poisoned(poisoned)) => { |
| eprintln!("[SPF-DISPATCH] Session mutex poisoned — recovering for {}", tool); |
| acquired = Some(poisoned.into_inner()); |
| break; |
| } |
| Err(std::sync::TryLockError::WouldBlock) => { |
| if lock_start.elapsed() >= LOCK_TIMEOUT { break; } |
| std::thread::sleep(Duration::from_millis(LOCK_RETRY_INTERVAL_MS)); |
| } |
| } |
| } |
| let wait_ms = lock_start.elapsed().as_millis(); |
| if wait_ms > 100 { |
| eprintln!("[SPF-DISPATCH] Session lock contention — {} waited {}ms", tool, wait_ms); |
| } |
| acquired |
| } |
| }; |
|
|
| |
| let mut session = match session_lock { |
| Some(guard) => guard, |
| None => { |
| let elapsed = start.elapsed().as_millis() as u64; |
| eprintln!("[SPF-DISPATCH] SESSION_BUSY — {} timed out after {}ms", tool, elapsed); |
| let response = ToolResponse { |
| tool: tool.to_string(), |
| result: serde_json::json!({ |
| "type": "text", |
| "text": "SERVER_BUSY: Session locked by another transport. Try again." |
| }), |
| duration_ms: elapsed, |
| status: GATE_BUSY.to_string(), |
| }; |
| for listener in &state.listeners { |
| if let Err(e) = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| { |
| listener.on_response(&request, &response, false); |
| })) { |
| eprintln!("[SPF-DISPATCH] Listener panic on_response for {}: {:?}", tool, e); |
| } |
| } |
| return response; |
| } |
| }; |
|
|
| |
| let entry_params = crate::mcp::extract_gate_params(args); |
| let gate_decision = crate::gate::process( |
| tool, &entry_params, &state.config, &*session, &request.source |
| ); |
|
|
| let result = if !gate_decision.allowed { |
| |
| session.record_manifest(tool, gate_decision.complexity.c, "BLOCKED", |
| gate_decision.errors.first().map(|s| s.as_str())); |
| let _ = state.storage.save_session(&session); |
| serde_json::json!({ |
| "type": "text", |
| "text": gate_decision.message, |
| "_blocked": true |
| }) |
| } else { |
| |
| crate::mcp::handle_tool_call( |
| tool, args, request.source.clone(), &gate_decision, |
| &state.config, &mut session, &state.storage, |
| &state.config_db, &state.tmp_db, |
| &state.fs_db, &state.agent_db, |
| &state.pub_key_hex, &state.mesh_tx, |
| &state.peers, |
| &state.transformer, &state.transformer_config, |
| &state.network_config, &state.pool_state, |
| &state.pipeline, |
| &state.browser, &state.ws_browser_channels, state.http_port, |
| &state.tracked_peers, &state.orchestrator_state, |
| &state.endpoint, &state.tokio_handle, |
| ) |
| }; |
|
|
| drop(session); |
|
|
| |
| |
| |
| let result = crate::flint_memory::flint_process_result( |
| tool, &result, &flint_ctx, &state.agent_db |
| ); |
|
|
| let duration_ms = start.elapsed().as_millis() as u64; |
| let blocked = result.get("_blocked").and_then(|v| v.as_bool()).unwrap_or(false); |
| let status = if blocked { GATE_BLOCKED } else { GATE_ALLOWED }; |
|
|
| let response = ToolResponse { |
| tool: tool.to_string(), |
| result, |
| duration_ms, |
| status: status.to_string(), |
| }; |
|
|
| |
| for listener in &state.listeners { |
| if let Err(e) = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| { |
| listener.on_response(&request, &response, blocked); |
| })) { |
| eprintln!("[SPF-DISPATCH] Listener panic on_response for {}: {:?}", tool, e); |
| } |
| } |
|
|
| response |
| } |
|
|
| |
| |
| |
|
|
| #[cfg(test)] |
| mod tests { |
| use super::*; |
|
|
| #[test] |
| fn lock_constants_valid() { |
| assert!(LOCK_TIMEOUT.as_secs() > 0, "LOCK_TIMEOUT must be positive"); |
| assert!(LOCK_RETRY_INTERVAL_MS > 0, "LOCK_RETRY_INTERVAL_MS must be positive"); |
| let attempts = LOCK_TIMEOUT.as_millis() / LOCK_RETRY_INTERVAL_MS as u128; |
| assert!(attempts >= 10, "Should attempt at least 10 retries, got {}", attempts); |
| assert!(attempts <= 500, "Should not exceed 500 retries, got {}", attempts); |
| } |
|
|
| #[test] |
| fn busy_response_structure() { |
| let response = ToolResponse { |
| tool: "spf_read".to_string(), |
| result: serde_json::json!({ |
| "type": "text", |
| "text": "SERVER_BUSY: Session locked by another transport. Try again." |
| }), |
| duration_ms: 5001, |
| status: "busy".to_string(), |
| }; |
| assert_eq!(response.status, "busy"); |
| assert_eq!(response.tool, "spf_read"); |
| let text = response.result["text"].as_str().unwrap(); |
| assert!(text.starts_with("SERVER_BUSY:")); |
| } |
|
|
| #[test] |
| fn source_variants_serialize() { |
| let stdio = Source::Stdio; |
| let json = serde_json::to_string(&stdio).unwrap(); |
| assert!(json.contains("Stdio")); |
|
|
| let http = Source::Http; |
| let json = serde_json::to_string(&http).unwrap(); |
| assert!(json.contains("Http")); |
|
|
| let mesh = Source::Mesh { peer_key: "abc123".to_string() }; |
| let json = serde_json::to_string(&mesh).unwrap(); |
| assert!(json.contains("abc123")); |
|
|
| let transformer = Source::Transformer { |
| role: "writer".to_string(), |
| model_id: "spf_writer_v1".to_string(), |
| }; |
| let json = serde_json::to_string(&transformer).unwrap(); |
| assert!(json.contains("writer")); |
| assert!(json.contains("spf_writer_v1")); |
|
|
| let pipeline = Source::Pipeline { |
| stream_id: "stream_001".to_string(), |
| peer_key: "peer_abc".to_string(), |
| }; |
| let json = serde_json::to_string(&pipeline).unwrap(); |
| assert!(json.contains("stream_001")); |
| assert!(json.contains("peer_abc")); |
| } |
|
|
| #[test] |
| fn source_variants_deserialize_roundtrip() { |
| let transformer = Source::Transformer { |
| role: "researcher".to_string(), |
| model_id: "spf_researcher_v1".to_string(), |
| }; |
| let json = serde_json::to_string(&transformer).unwrap(); |
| let back: Source = serde_json::from_str(&json).unwrap(); |
| match back { |
| Source::Transformer { role, model_id } => { |
| assert_eq!(role, "researcher"); |
| assert_eq!(model_id, "spf_researcher_v1"); |
| } |
| _ => panic!("Expected Source::Transformer"), |
| } |
|
|
| let pipeline = Source::Pipeline { |
| stream_id: "s42".to_string(), |
| peer_key: "pk99".to_string(), |
| }; |
| let json = serde_json::to_string(&pipeline).unwrap(); |
| let back: Source = serde_json::from_str(&json).unwrap(); |
| match back { |
| Source::Pipeline { stream_id, peer_key } => { |
| assert_eq!(stream_id, "s42"); |
| assert_eq!(peer_key, "pk99"); |
| } |
| _ => panic!("Expected Source::Pipeline"), |
| } |
| } |
|
|
| #[test] |
| fn original_variants_unchanged() { |
| let sources = vec![ |
| Source::Stdio, |
| Source::Http, |
| Source::Mesh { peer_key: "key".to_string() }, |
| ]; |
| for src in sources { |
| let json = serde_json::to_string(&src).unwrap(); |
| let _back: Source = serde_json::from_str(&json).unwrap(); |
| |
| } |
| } |
|
|
| #[test] |
| fn tool_request_with_new_sources() { |
| let req = ToolRequest { |
| source: Source::Transformer { |
| role: "writer".to_string(), |
| model_id: "v1".to_string(), |
| }, |
| tool: "spf_read".to_string(), |
| args: serde_json::json!({"file_path": "/test"}), |
| timestamp: "2026-02-28T00:00:00Z".to_string(), |
| }; |
| let json = serde_json::to_string(&req).unwrap(); |
| let back: ToolRequest = serde_json::from_str(&json).unwrap(); |
| assert_eq!(back.tool, "spf_read"); |
| match back.source { |
| Source::Transformer { role, .. } => assert_eq!(role, "writer"), |
| _ => panic!("Wrong source variant"), |
| } |
| } |
|
|
| |
|
|
| use std::sync::atomic::{AtomicBool, AtomicU32, Ordering}; |
|
|
| struct MockListener { |
| request_count: AtomicU32, |
| response_count: AtomicU32, |
| last_blocked: AtomicBool, |
| } |
|
|
| impl MockListener { |
| fn new() -> Self { |
| Self { |
| request_count: AtomicU32::new(0), |
| response_count: AtomicU32::new(0), |
| last_blocked: AtomicBool::new(false), |
| } |
| } |
| } |
|
|
| impl DispatchListener for MockListener { |
| fn on_request(&self, _req: &ToolRequest) { |
| self.request_count.fetch_add(1, Ordering::SeqCst); |
| } |
| fn on_response(&self, _req: &ToolRequest, _resp: &ToolResponse, blocked: bool) { |
| self.response_count.fetch_add(1, Ordering::SeqCst); |
| self.last_blocked.store(blocked, Ordering::SeqCst); |
| } |
| } |
|
|
| struct PanicListener; |
|
|
| impl DispatchListener for PanicListener { |
| fn on_request(&self, _req: &ToolRequest) { |
| panic!("PanicListener intentional panic on request"); |
| } |
| fn on_response(&self, _req: &ToolRequest, _resp: &ToolResponse, _blocked: bool) { |
| panic!("PanicListener intentional panic on response"); |
| } |
| } |
|
|
| #[test] |
| fn listener_receives_pre_and_post() { |
| let listener = MockListener::new(); |
| let req = ToolRequest { |
| source: Source::Stdio, |
| tool: "spf_read".to_string(), |
| args: serde_json::json!({}), |
| timestamp: "2026-02-28T00:00:00Z".to_string(), |
| }; |
| let resp = ToolResponse { |
| tool: "spf_read".to_string(), |
| result: serde_json::json!({"type": "text", "text": "ok"}), |
| duration_ms: 10, |
| status: GATE_ALLOWED.to_string(), |
| }; |
|
|
| |
| listener.on_request(&req); |
| listener.on_response(&req, &resp, false); |
|
|
| assert_eq!(listener.request_count.load(Ordering::SeqCst), 1); |
| assert_eq!(listener.response_count.load(Ordering::SeqCst), 1); |
| assert!(!listener.last_blocked.load(Ordering::SeqCst)); |
| } |
|
|
| #[test] |
| fn listener_panic_does_not_crash() { |
| let listener = PanicListener; |
| let req = ToolRequest { |
| source: Source::Stdio, |
| tool: "spf_read".to_string(), |
| args: serde_json::json!({}), |
| timestamp: "2026-02-28T00:00:00Z".to_string(), |
| }; |
| let resp = ToolResponse { |
| tool: "spf_read".to_string(), |
| result: serde_json::json!({"type": "text", "text": "ok"}), |
| duration_ms: 10, |
| status: GATE_ALLOWED.to_string(), |
| }; |
|
|
| |
| let result = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| { |
| listener.on_request(&req); |
| })); |
| assert!(result.is_err(), "Panic should be caught on request"); |
|
|
| let result = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| { |
| listener.on_response(&req, &resp, false); |
| })); |
| assert!(result.is_err(), "Panic should be caught on response"); |
| |
| } |
|
|
| #[test] |
| fn listener_receives_blocked_status() { |
| let listener = MockListener::new(); |
| let req = ToolRequest { |
| source: Source::Http, |
| tool: "spf_write".to_string(), |
| args: serde_json::json!({"file_path": "/etc/passwd"}), |
| timestamp: "2026-02-28T00:00:00Z".to_string(), |
| }; |
|
|
| |
| let blocked_resp = ToolResponse { |
| tool: "spf_write".to_string(), |
| result: serde_json::json!({"type": "text", "text": "BLOCKED: path not allowed", "_blocked": true}), |
| duration_ms: 5, |
| status: GATE_BLOCKED.to_string(), |
| }; |
| listener.on_response(&req, &blocked_resp, true); |
| assert!(listener.last_blocked.load(Ordering::SeqCst), "Listener should receive blocked=true"); |
|
|
| |
| let allowed_resp = ToolResponse { |
| tool: "spf_read".to_string(), |
| result: serde_json::json!({"type": "text", "text": "file contents"}), |
| duration_ms: 12, |
| status: GATE_ALLOWED.to_string(), |
| }; |
| listener.on_response(&req, &allowed_resp, false); |
| assert!(!listener.last_blocked.load(Ordering::SeqCst), "Listener should receive blocked=false"); |
| } |
| } |
|
|