Skip to content

feat(crates): trios-igla-ops — O(1) operator utilities (Rust, R1)#113

Open
gHashTag wants to merge 1 commit into
mainfrom
feat/igla-ops-crate
Open

feat(crates): trios-igla-ops — O(1) operator utilities (Rust, R1)#113
gHashTag wants to merge 1 commit into
mainfrom
feat/igla-ops-crate

Conversation

@gHashTag
Copy link
Copy Markdown
Owner

@gHashTag gHashTag commented May 2, 2026

Summary

New workspace crate crates/trios-igla-ops with 3 Rust binaries replacing the ad-hoc Python / bash ops scripts the operator asked to remove. Rule R1 from trios#143: Rust-only, O(1) — every tool solves its task in a single call.

Binaries

bin purpose call cost
fleet-probe parallel auth + health for all 7 Railway accounts 7 GraphQL calls, fanned out via tokio; ~1 s wall
queue-stats mission snapshot (queue counts, running by lane, active scarabs, best-BPB leaderboard top-15) 1 Neon connection, 4 queries
queue-victory-hunt idempotent insert of 480-row victory-hunt grid (LR8 × h6 × F17..F21 × binary32/GF16) 1 Neon connection, single transaction

Modules

  • accounts.rs — canonical 7-account registry keyed by RAILWAY_TOKEN_ACC{0..6} env. Lane mapping per trios#445. SANCTIONED_SEEDS = F17..F21 matches the enforce_seed_policy() trigger in Neon.
  • neon.rsstrip_channel_binding (rustls 0.23 cannot satisfy SCRAM-PLUS, see trios-trainer-igla#84 round 3) + idempotent CryptoProvider install + connect() wrapper.

Canon enforcement

All canon_names produced follow the mandatory-format spec from trios-trainer-igla#93:

IGLA-{LANE}-{format}-h{H}-LR{LR4}-rng{SEED}-{TAG}

where {format} is drawn from the 60+ format catalog (zig-golden-float#69) and never omitted.

Verification

  • cargo test -p trios-igla-ops --lib — 3/3 GREEN (strip_channel_binding unit tests)
  • cargo build --release -p trios-igla-ops — 3 binaries clean
  • queue-stats smoke against live Neon DSN-A: 493 pending IGLA-* rows, 30 running, 9 IGLA-RAILWAY-* scarabs heart-beating

Usage

source .railway_creds.env
cargo run --release -p trios-igla-ops --bin fleet-probe
cargo run --release -p trios-igla-ops --bin queue-stats
cargo run --release -p trios-igla-ops --bin queue-victory-hunt

References

🌻 phi^2 + phi^-2 = 3 · TRINITY · NEVER STOP

Three Rust binaries replacing ad-hoc Python/shell scripts (R1: trios#143
Rust-only).

  fleet-probe         — parallel auth+health check across all 7 Railway
                        accounts in a single tokio fan-out (1 GraphQL call
                        per account, ~1 s wall clock).
  queue-stats         — single Neon connection, mission report:
                        strategy_queue counts, running-rows-by-lane,
                        active scarabs, best-BPB leaderboard top-15.
  queue-victory-hunt  — idempotent insert of the full WAVE-GF-001 victory
                        hunt grid (LR8 × hidden6 × Fibonacci F17..F21 ×
                        runnable formats binary32/GF16) = 480 canonical
                        rows. ON CONFLICT DO NOTHING.

Modules:
  accounts.rs — canonical 7-account registry (tokens via env vars
                RAILWAY_TOKEN_ACC{0..6}; never hardcoded). Lane mapping per
                trios#445. SANCTIONED_SEEDS = Fibonacci F17..F21.
  neon.rs     — strip_channel_binding helper (rustls 0.23 cannot satisfy
                SCRAM-PLUS, see trios-trainer-igla#84) + idempotent
                CryptoProvider install + connect() wrapper.

All canon_names produced by these tools follow the
trios-trainer-igla#93 spec:
  IGLA-{LANE}-{format}-h{H}-LR{LR4}-rng{SEED}-{TAG}
where {format} is mandatory and drawn from the 60+ format catalog (see
zig-golden-float#69).

Verification:
- cargo test -p trios-igla-ops --lib → 3/3 GREEN (strip_channel_binding
  unit tests).
- cargo build --release -p trios-igla-ops → all three binaries build clean.
- queue-stats smoke run against live Neon DSN-A reports 493 pending IGLA-*
  rows, 30 running, 9 IGLA-RAILWAY-* scarabs all heart-beating.

Anchor: phi^2 + phi^-2 = 3.
@gitguardian
Copy link
Copy Markdown

gitguardian Bot commented May 2, 2026

⚠️ GitGuardian has uncovered 1 secret following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secret in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
31559427 Triggered PostgreSQL Credentials 25713f6 crates/trios-igla-ops/src/neon.rs View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secret safely. Learn here the best practices.
  3. Revoke and rotate this secret.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant