Joelclaw restate-workflows
Compatibility alias for substrate-specific ADR-0217 runtime bridge work. For new work, load `workflow-rig` first; use this skill only when the task is explicitly about external-repo bridging, queue-family contracts, or low-level runtime submission mechanics.
git clone https://github.com/joelhooks/joelclaw
T=$(mktemp -d) && git clone --depth=1 https://github.com/joelhooks/joelclaw "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/restate-workflows" ~/.claude/skills/joelhooks-joelclaw-restate-workflows && rm -rf "$T"
skills/restate-workflows/SKILL.mdRestate Workflows
This skill is now a compatibility alias for substrate work.
For new work, load
first. Use this skill only when the real problem is the runtime bridge itself: external repo submission, queue-family contracts, or low-level ADR-0217 substrate mechanics.workflow-rig
The boundary is the
joelclaw CLI.
Do not reach into Redis directly. Do not import private joelclaw packages. Do not pretend the other repo knows internal queue schemas unless you have explicitly verified them.
The runtime shape
ADR-0217 currently reads best as:
- Redis is the pressure layer — queue admission, bursts, pause/resume, family control
- Dkron is the clock — scheduled starts
- Restate is the durable executor — workflow identity, retries, DAG progress
- Sandboxed runners are the side-effect boundary — isolated code-changing work
An external repo should integrate at the edge, not by coupling itself to the middle.
That means:
- submit saved workload artifacts through
when the work has already been shaped at the workload layerjoelclaw workload run - use
only as the low-level escape hatch for verified raw queue familiesjoelclaw queue emit - carry enough metadata for idempotency and tracing
- let joelclaw decide how that request reaches Restate or a sandbox runner
When to use
Use this skill when a user asks for any of these:
- "send work to the queue"
- "have this repo request background work"
- "bridge this repo into joelclaw"
- "submit sandboxed work"
- "emit a workflow request"
- "wrap joelclaw queue emit"
- "run this in Restate from another repo"
Non-negotiable rules
- CLI boundary only. Prefer
for approved workload artifacts; usejoelclaw workload run
only when you are intentionally working at the raw queue-family layer.joelclaw queue emit - Never talk to Redis directly from the external repo.
- Never depend on private joelclaw internals (
, Redis keys, internal TypeScript types, worker-only contracts) unless the repo itself is the joelclaw monorepo.@joelclaw/* - Keep changes inside the calling repo. Build a wrapper in that repo; do not assume you can edit joelclaw at the same time.
- Inspect live help first. The CLI contract wins over memory.
- Prefer explicit workflow families. If there is no verified family for the job, stop and document the proposed family/contract instead of guessing silently.
- Machine-readable output by default. The wrapper should return stable JSON that callers can parse.
- Support dry-run. The repo should be able to show the exact request without enqueuing it.
First steps
Run these before designing the bridge:
joelclaw workload run --help joelclaw queue --help joelclaw queue emit --help
If the target repo is supposed to monitor results too, also inspect:
joelclaw jobs status --hours 1 --count 10 joelclaw queue observe --hours 1
If you are unsure whether a workflow family already exists, search docs or ask instead of inventing one.
What to build in the external repo
The default deliverable is a thin wrapper command/module/script around
joelclaw workload run when the repo can produce a saved workload artifact. Fall back to joelclaw queue emit only when you have a verified low-level family and there is no workload artifact to bridge.
Good shapes:
scripts/request-work.tsbin/request-background-worksrc/lib/joelclaw/requestWorkflow.tssrc/cli/restate-workflow.ts
Bad shape:
- raw shell one-liners scattered across the repo with no contract doc or tests
Minimum request payload
Every request payload should include these fields unless the target family has a stricter contract:
{ "idempotencyKey": "repo-name:task-type:base-sha:input-hash", "requestId": "uuid-or-stable-derived-id", "repo": { "path": "/abs/path/or/null", "url": "git@github.com:owner/repo.git", "name": "repo-name", "baseSha": "abc123", "branch": "main" }, "task": { "kind": "sandboxed-change", "prompt": "what the runtime should do", "artifacts": ["patch", "test-report", "summary.json"] }, "caller": { "source": "external-repo-name", "requestedBy": "human-or-agent", "sessionId": "optional-session-id", "callback": { "kind": "poll", "target": "joelclaw jobs status" } }, "meta": { "dryRun": false, "createdAt": "2026-03-08T05:00:00.000Z" } }
Required semantics
must be stable for the same intended work requestidempotencyKey
must reflect the code the sandbox should start frombaseSha
must say what success looks likeprompt
must list what the caller expects backartifacts
must identify who emitted the requestcaller.source
Emission pattern
The wrapper should construct JSON, then call the CLI.
Example pattern:
joelclaw queue emit <event-family> --data '<json>'
Example Node/Bun sketch:
import { spawn } from "node:child_process"; export async function requestWorkflow( event: string, payload: unknown, dryRun = false, ) { const data = JSON.stringify(payload); if (dryRun) { return { ok: true, mode: "dry-run", event, payload, }; } return await new Promise((resolve, reject) => { const child = spawn("joelclaw", ["queue", "emit", event, "--data", data], { stdio: ["ignore", "pipe", "pipe"], }); let stdout = ""; let stderr = ""; child.stdout.on("data", (chunk) => { stdout += chunk.toString(); }); child.stderr.on("data", (chunk) => { stderr += chunk.toString(); }); child.on("close", (code) => { if (code === 0) { resolve({ ok: true, mode: "live", event, payload, stdout }); return; } reject( new Error(`joelclaw queue emit failed (${code}): ${stderr || stdout}`), ); }); }); }
Family selection
Do not hijack an unrelated proof family just because it exists.
Rules:
is a dogfood family, not a generic bucket for outside reposcontent/updated- if a verified workflow request family already exists, use it
- if no family exists, document the proposed name and payload contract in the repo instead of guessing
A good stop-and-document line is:
No canonical workflow-request family was verified in the target runtime. This repo now emits a validated payload object locally and documents the proposed
contract, but does not enqueue live requests until the runtime family is confirmed.sandbox/work.requested
That is honest. Honesty beats fake integration.
Required wrapper features
1. Dry-run mode
The command must be able to print the exact event + payload without sending it.
Dry-run output should be parseable JSON, for example:
{ "ok": true, "mode": "dry-run", "event": "sandbox/work.requested", "payload": { "...": "..." } }
2. Clear errors
Handle these explicitly:
binary missingjoelclaw- invalid JSON/payload serialization
- command non-zero exit
- caller omitted
,baseSha
, orpromptidempotencyKey
3. Machine-readable success output
Return stable JSON on success, not prose.
At minimum:
{ "ok": true, "mode": "live", "event": "sandbox/work.requested", "idempotencyKey": "...", "stdout": "raw joelclaw output" }
4. Local tests
Tests should verify:
- payload construction
- idempotency key stability
- dry-run behavior
- CLI invocation shape
- failure handling
Mock the CLI process if needed. Do not require the real runtime for unit tests.
README contract
Document these four things in the calling repo:
- what command submits work
- what event family it emits
- what payload fields are required
- how to verify the request from joelclaw surfaces
Minimum verification section:
joelclaw jobs status --hours 1 --count 10 joelclaw queue observe --hours 1
If there is a known workflow ID or downstream surface, include it.
Anti-patterns
Do not do this:
- writing directly to Redis
- importing joelclaw monorepo code into the external repo
- hiding event-family uncertainty behind vague names like
task/run - omitting
for code-changing workbaseSha - printing unstructured human-only output from the wrapper
- building a wrapper with no dry-run or no tests
- pretending Restate-native execution is already wired if the current path is still transitional
Recommended deliverables
When asked to implement this integration in another repo, deliver:
- the wrapper command/module
- payload contract documentation
- example invocation
- verification steps
- tests
Short prompt for another agent
Paste this:
Use
. Add a thin wrapper in this repo around/skill:restate-workflowsso it can submit work into joelclaw without talking to Redis or private joelclaw internals. Checkjoelclaw queue emitfirst. Emit machine-readable JSON withjoelclaw queue emit --help,requestId, repoidempotencyKey/url/branch, task prompt, expected artifacts, and caller metadata. SupportbaseSha, add a README example and tests, and if the canonical event family is not verified, stop and document the proposed family instead of guessing.--dry-run