1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod role_guard;
5
6use rmcp::handler::server::ServerHandler;
7use rmcp::model::{
8 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
9 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
10};
11use rmcp::service::{RequestContext, RoleServer};
12use rmcp::ErrorData;
13
14use crate::tools::{CrpMode, LeanCtxServer};
15
16impl ServerHandler for LeanCtxServer {
17 fn get_info(&self) -> ServerInfo {
18 let capabilities = ServerCapabilities::builder().enable_tools().build();
19
20 let instructions = crate::instructions::build_instructions(CrpMode::effective());
21
22 InitializeResult::new(capabilities)
23 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
24 .with_instructions(instructions)
25 }
26
27 async fn initialize(
28 &self,
29 request: InitializeRequestParams,
30 _context: RequestContext<RoleServer>,
31 ) -> Result<InitializeResult, ErrorData> {
32 let name = request.client_info.name.clone();
33 tracing::info!("MCP client connected: {:?}", name);
34 *self.client_name.write().await = name.clone();
35
36 let derived_root = derive_project_root_from_cwd();
37 let cwd_str = std::env::current_dir()
38 .ok()
39 .map(|p| p.to_string_lossy().to_string())
40 .unwrap_or_default();
41 {
42 let mut session = self.session.write().await;
43 if !cwd_str.is_empty() {
44 session.shell_cwd = Some(cwd_str.clone());
45 }
46 if let Some(ref root) = derived_root {
47 session.project_root = Some(root.clone());
48 tracing::info!("Project root set to: {root}");
49 } else if let Some(ref root) = session.project_root {
50 let root_path = std::path::Path::new(root);
51 let root_has_marker = has_project_marker(root_path);
52 let root_str = root_path.to_string_lossy();
53 let root_suspicious = root_str.contains("/.claude")
54 || root_str.contains("/.codex")
55 || root_str.contains("/var/folders/")
56 || root_str.contains("/tmp/")
57 || root_str.contains("\\.claude")
58 || root_str.contains("\\.codex")
59 || root_str.contains("\\AppData\\Local\\Temp")
60 || root_str.contains("\\Temp\\");
61 if root_suspicious && !root_has_marker {
62 session.project_root = None;
63 }
64 }
65 let _ = session.save();
66 }
67
68 let agent_name = name.clone();
69 let agent_root = derived_root.clone().unwrap_or_default();
70 let agent_id_handle = self.agent_id.clone();
71 tokio::task::spawn_blocking(move || {
72 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
73 return;
74 }
75 if let Some(home) = dirs::home_dir() {
76 let _ = crate::rules_inject::inject_all_rules(&home);
77 }
78 crate::hooks::refresh_installed_hooks();
79 crate::core::version_check::check_background();
80
81 if !agent_root.is_empty() {
82 let heuristic_role = match agent_name.to_lowercase().as_str() {
83 n if n.contains("cursor") => Some("coder"),
84 n if n.contains("claude") => Some("coder"),
85 n if n.contains("codex") => Some("coder"),
86 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
87 n if n.contains("review") => Some("reviewer"),
88 n if n.contains("test") => Some("debugger"),
89 _ => None,
90 };
91 let env_role = std::env::var("LEAN_CTX_ROLE")
92 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
93 .ok();
94 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
95
96 let _ = crate::core::roles::set_active_role(effective_role);
97
98 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
99 registry.cleanup_stale(24);
100 let id = registry.register("mcp", Some(effective_role), &agent_root);
101 let _ = registry.save();
102 if let Ok(mut guard) = agent_id_handle.try_write() {
103 *guard = Some(id);
104 }
105 }
106 });
107
108 let instructions =
109 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
110 let capabilities = ServerCapabilities::builder().enable_tools().build();
111
112 Ok(InitializeResult::new(capabilities)
113 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
114 .with_instructions(instructions))
115 }
116
117 async fn list_tools(
118 &self,
119 _request: Option<PaginatedRequestParams>,
120 _context: RequestContext<RoleServer>,
121 ) -> Result<ListToolsResult, ErrorData> {
122 let all_tools = if crate::tool_defs::is_full_mode() {
123 crate::tool_defs::granular_tool_defs()
124 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
125 crate::tool_defs::unified_tool_defs()
126 } else {
127 crate::tool_defs::lazy_tool_defs()
128 };
129
130 let disabled = crate::core::config::Config::load().disabled_tools_effective();
131 let tools = if disabled.is_empty() {
132 all_tools
133 } else {
134 all_tools
135 .into_iter()
136 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
137 .collect()
138 };
139
140 let tools = {
141 let active = self.workflow.read().await.clone();
142 if let Some(run) = active {
143 if let Some(state) = run.spec.state(&run.current) {
144 if let Some(allowed) = &state.allowed_tools {
145 let mut allow: std::collections::HashSet<&str> =
146 allowed.iter().map(std::string::String::as_str).collect();
147 allow.insert("ctx");
148 allow.insert("ctx_workflow");
149 return Ok(ListToolsResult {
150 tools: tools
151 .into_iter()
152 .filter(|t| allow.contains(t.name.as_ref()))
153 .collect(),
154 ..Default::default()
155 });
156 }
157 }
158 }
159 tools
160 };
161
162 Ok(ListToolsResult {
163 tools,
164 ..Default::default()
165 })
166 }
167
168 async fn call_tool(
169 &self,
170 request: CallToolRequestParams,
171 _context: RequestContext<RoleServer>,
172 ) -> Result<CallToolResult, ErrorData> {
173 self.check_idle_expiry().await;
174
175 let original_name = request.name.as_ref().to_string();
176 let (resolved_name, resolved_args) = if original_name == "ctx" {
177 let sub = request
178 .arguments
179 .as_ref()
180 .and_then(|a| a.get("tool"))
181 .and_then(|v| v.as_str())
182 .map(std::string::ToString::to_string)
183 .ok_or_else(|| {
184 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
185 })?;
186 let tool_name = if sub.starts_with("ctx_") {
187 sub
188 } else {
189 format!("ctx_{sub}")
190 };
191 let mut args = request.arguments.unwrap_or_default();
192 args.remove("tool");
193 (tool_name, Some(args))
194 } else {
195 (original_name, request.arguments)
196 };
197 let name = resolved_name.as_str();
198 let args = resolved_args.as_ref();
199
200 let role_check = role_guard::check_tool_access(name);
201 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
202 tracing::warn!(
203 tool = name,
204 role = %role_check.role_name,
205 "Tool blocked by role policy"
206 );
207 return Ok(denied);
208 }
209
210 if name != "ctx_workflow" {
211 let active = self.workflow.read().await.clone();
212 if let Some(run) = active {
213 if let Some(state) = run.spec.state(&run.current) {
214 if let Some(allowed) = &state.allowed_tools {
215 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
216 if !allowed_ok {
217 let mut shown = allowed.clone();
218 shown.sort();
219 shown.truncate(30);
220 return Ok(CallToolResult::success(vec![Content::text(format!(
221 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
222 run.spec.name,
223 run.current,
224 shown.len(),
225 shown.join(", ")
226 ))]));
227 }
228 }
229 }
230 }
231 }
232
233 let auto_context = {
234 let task = {
235 let session = self.session.read().await;
236 session.task.as_ref().map(|t| t.description.clone())
237 };
238 let project_root = {
239 let session = self.session.read().await;
240 session.project_root.clone()
241 };
242 let mut cache = self.cache.write().await;
243 crate::tools::autonomy::session_lifecycle_pre_hook(
244 &self.autonomy,
245 name,
246 &mut cache,
247 task.as_deref(),
248 project_root.as_deref(),
249 CrpMode::effective(),
250 )
251 };
252
253 let throttle_result = {
254 let fp = args
255 .map(|a| {
256 crate::core::loop_detection::LoopDetector::fingerprint(
257 &serde_json::Value::Object(a.clone()),
258 )
259 })
260 .unwrap_or_default();
261 let mut detector = self.loop_detector.write().await;
262
263 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
264 let is_search_shell = name == "ctx_shell" && {
265 let cmd = args
266 .as_ref()
267 .and_then(|a| a.get("command"))
268 .and_then(|v| v.as_str())
269 .unwrap_or("");
270 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
271 };
272
273 if is_search || is_search_shell {
274 let search_pattern = args.and_then(|a| {
275 a.get("pattern")
276 .or_else(|| a.get("query"))
277 .and_then(|v| v.as_str())
278 });
279 let shell_pattern = if is_search_shell {
280 args.and_then(|a| a.get("command"))
281 .and_then(|v| v.as_str())
282 .and_then(helpers::extract_search_pattern_from_command)
283 } else {
284 None
285 };
286 let pat = search_pattern.or(shell_pattern.as_deref());
287 detector.record_search(name, &fp, pat)
288 } else {
289 detector.record_call(name, &fp)
290 }
291 };
292
293 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
294 let msg = throttle_result.message.unwrap_or_default();
295 return Ok(CallToolResult::success(vec![Content::text(msg)]));
296 }
297
298 let throttle_warning =
299 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
300 throttle_result.message.clone()
301 } else {
302 None
303 };
304
305 let config = crate::core::config::Config::load();
306 let minimal = config.minimal_overhead_effective();
307
308 {
309 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
310 let snap = BudgetTracker::global().check();
311 if *snap.worst_level() == BudgetLevel::Exhausted
312 && name != "ctx_session"
313 && name != "ctx_cost"
314 && name != "ctx_metrics"
315 {
316 for (dim, lvl, used, limit) in [
317 (
318 "tokens",
319 &snap.tokens.level,
320 format!("{}", snap.tokens.used),
321 format!("{}", snap.tokens.limit),
322 ),
323 (
324 "shell",
325 &snap.shell.level,
326 format!("{}", snap.shell.used),
327 format!("{}", snap.shell.limit),
328 ),
329 (
330 "cost",
331 &snap.cost.level,
332 format!("${:.2}", snap.cost.used_usd),
333 format!("${:.2}", snap.cost.limit_usd),
334 ),
335 ] {
336 if *lvl == BudgetLevel::Exhausted {
337 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
338 }
339 }
340 let msg = format!(
341 "[BUDGET EXHAUSTED] {}\n\
342 Use `ctx_session action=role` to check/switch roles, \
343 or `ctx_session action=reset` to start fresh.",
344 snap.format_compact()
345 );
346 tracing::warn!(tool = name, "{msg}");
347 return Ok(CallToolResult::success(vec![Content::text(msg)]));
348 }
349 }
350
351 if is_shell_tool_name(name) {
352 crate::core::budget_tracker::BudgetTracker::global().record_shell();
353 }
354
355 let tool_start = std::time::Instant::now();
356 let mut result_text = {
357 use futures::FutureExt;
358 use std::panic::AssertUnwindSafe;
359 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
360 .catch_unwind()
361 .await
362 {
363 Ok(Ok(text)) => text,
364 Ok(Err(e)) => return Err(e),
365 Err(panic_payload) => {
366 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
367 (*s).to_string()
368 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
369 s.clone()
370 } else {
371 "unknown".to_string()
372 };
373 tracing::error!("Tool '{name}' panicked: {detail}");
374 format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
375 The MCP server is still running. Please retry or use a different approach.")
376 }
377 }
378 };
379
380 {
381 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
382 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
383 }
384
385 let budget_warning = {
386 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
387 let snap = BudgetTracker::global().check();
388 if *snap.worst_level() == BudgetLevel::Warning {
389 for (dim, lvl, used, limit, pct) in [
390 (
391 "tokens",
392 &snap.tokens.level,
393 format!("{}", snap.tokens.used),
394 format!("{}", snap.tokens.limit),
395 snap.tokens.percent,
396 ),
397 (
398 "shell",
399 &snap.shell.level,
400 format!("{}", snap.shell.used),
401 format!("{}", snap.shell.limit),
402 snap.shell.percent,
403 ),
404 (
405 "cost",
406 &snap.cost.level,
407 format!("${:.2}", snap.cost.used_usd),
408 format!("${:.2}", snap.cost.limit_usd),
409 snap.cost.percent,
410 ),
411 ] {
412 if *lvl == BudgetLevel::Warning {
413 crate::core::events::emit_budget_warning(
414 &snap.role, dim, &used, &limit, pct,
415 );
416 }
417 }
418 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
419 } else {
420 None
421 }
422 };
423
424 let archive_hint = if minimal {
425 None
426 } else {
427 use crate::core::archive;
428 let archivable = matches!(
429 name,
430 "ctx_shell"
431 | "ctx_read"
432 | "ctx_multi_read"
433 | "ctx_smart_read"
434 | "ctx_execute"
435 | "ctx_search"
436 | "ctx_tree"
437 );
438 if archivable && archive::should_archive(&result_text) {
439 let cmd = helpers::get_str(args, "command")
440 .or_else(|| helpers::get_str(args, "path"))
441 .unwrap_or_default();
442 let session_id = self.session.read().await.id.clone();
443 let tokens = crate::core::tokens::count_tokens(&result_text);
444 archive::store(name, &cmd, &result_text, Some(&session_id))
445 .map(|id| archive::format_hint(&id, result_text.len(), tokens))
446 } else {
447 None
448 }
449 };
450
451 let density = crate::core::config::OutputDensity::effective(&config.output_density);
452 if density != crate::core::config::OutputDensity::Normal {
453 result_text = crate::core::protocol::compress_output(&result_text, &density);
454 }
455
456 if let Some(hint) = archive_hint {
457 result_text = format!("{result_text}\n{hint}");
458 }
459
460 if let Some(ctx) = auto_context {
461 result_text = format!("{ctx}\n\n{result_text}");
462 }
463
464 if let Some(warning) = throttle_warning {
465 result_text = format!("{result_text}\n\n{warning}");
466 }
467
468 if let Some(bw) = budget_warning {
469 result_text = format!("{result_text}\n\n{bw}");
470 }
471
472 if name == "ctx_read" {
473 if minimal {
474 let mut cache = self.cache.write().await;
475 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
476 } else {
477 let read_path = self
478 .resolve_path_or_passthrough(
479 &helpers::get_str(args, "path").unwrap_or_default(),
480 )
481 .await;
482 let project_root = {
483 let session = self.session.read().await;
484 session.project_root.clone()
485 };
486 let mut cache = self.cache.write().await;
487 let enrich = crate::tools::autonomy::enrich_after_read(
488 &self.autonomy,
489 &mut cache,
490 &read_path,
491 project_root.as_deref(),
492 );
493 if let Some(hint) = enrich.related_hint {
494 result_text = format!("{result_text}\n{hint}");
495 }
496 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
497 }
498 }
499
500 let output_token_count = crate::core::tokens::count_tokens(&result_text);
501
502 if !minimal && name == "ctx_shell" {
503 let cmd = helpers::get_str(args, "command").unwrap_or_default();
504 let calls = self.tool_calls.read().await;
505 let last_original = calls.last().map_or(0, |c| c.original_tokens);
506 drop(calls);
507 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
508 &self.autonomy,
509 &cmd,
510 last_original,
511 output_token_count,
512 ) {
513 result_text = format!("{result_text}\n{hint}");
514 }
515 }
516
517 {
518 let input = helpers::canonical_args_string(args);
519 let input_md5 = helpers::md5_hex_fast(&input);
520 let output_md5 = helpers::md5_hex_fast(&result_text);
521 let action = helpers::get_str(args, "action");
522 let agent_id = self.agent_id.read().await.clone();
523 let client_name = self.client_name.read().await.clone();
524 let mut explicit_intent: Option<(
525 crate::core::intent_protocol::IntentRecord,
526 Option<String>,
527 String,
528 )> = None;
529
530 let pending_session_save = {
531 let empty_args = serde_json::Map::new();
532 let args_map = args.unwrap_or(&empty_args);
533 let mut session = self.session.write().await;
534 session.record_tool_receipt(
535 name,
536 action.as_deref(),
537 &input_md5,
538 &output_md5,
539 agent_id.as_deref(),
540 Some(&client_name),
541 );
542
543 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
544 name,
545 action.as_deref(),
546 args_map,
547 session.project_root.as_deref(),
548 ) {
549 let is_explicit =
550 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
551 let root = session.project_root.clone();
552 let sid = session.id.clone();
553 session.record_intent(intent.clone());
554 if is_explicit {
555 explicit_intent = Some((intent, root, sid));
556 }
557 }
558 if session.should_save() {
559 session.prepare_save().ok()
560 } else {
561 None
562 }
563 };
564
565 if let Some(prepared) = pending_session_save {
566 tokio::task::spawn_blocking(move || {
567 let _ = prepared.write_to_disk();
568 });
569 }
570
571 if let Some((intent, root, session_id)) = explicit_intent {
572 crate::core::intent_protocol::apply_side_effects(
573 &intent,
574 root.as_deref(),
575 &session_id,
576 );
577 }
578
579 if self.autonomy.is_enabled() {
580 let (calls, project_root) = {
581 let session = self.session.read().await;
582 (session.stats.total_tool_calls, session.project_root.clone())
583 };
584
585 if let Some(root) = project_root {
586 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
587 let root_clone = root.clone();
588 tokio::task::spawn_blocking(move || {
589 let _ = crate::core::consolidation_engine::consolidate_latest(
590 &root_clone,
591 crate::core::consolidation_engine::ConsolidationBudgets::default(),
592 );
593 });
594 }
595 }
596 }
597
598 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
599 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
600 let output_token_count_u64 = output_token_count as u64;
601 let name_owned = name.to_string();
602 tokio::task::spawn_blocking(move || {
603 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
604 let quote = pricing.quote_from_env_or_agent_type(&client_name);
605 let cost_usd =
606 quote
607 .cost
608 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
609 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
610
611 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
612 store.record_tool_call(
613 &agent_key,
614 &client_name,
615 &name_owned,
616 input_token_count,
617 output_token_count_u64,
618 );
619 let _ = store.save();
620 });
621 }
622
623 let skip_checkpoint = minimal
624 || matches!(
625 name,
626 "ctx_compress"
627 | "ctx_metrics"
628 | "ctx_benchmark"
629 | "ctx_analyze"
630 | "ctx_cache"
631 | "ctx_discover"
632 | "ctx_dedup"
633 | "ctx_session"
634 | "ctx_knowledge"
635 | "ctx_agent"
636 | "ctx_share"
637 | "ctx_wrapped"
638 | "ctx_overview"
639 | "ctx_preload"
640 | "ctx_cost"
641 | "ctx_gain"
642 | "ctx_heatmap"
643 | "ctx_task"
644 | "ctx_impact"
645 | "ctx_architecture"
646 | "ctx_workflow"
647 );
648
649 if !skip_checkpoint && self.increment_and_check() {
650 if let Some(checkpoint) = self.auto_checkpoint().await {
651 let interval = LeanCtxServer::checkpoint_interval_effective();
652 let combined = format!(
653 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
654 );
655 return Ok(CallToolResult::success(vec![Content::text(combined)]));
656 }
657 }
658
659 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
660 if tool_duration_ms > 100 {
661 LeanCtxServer::append_tool_call_log(
662 name,
663 tool_duration_ms,
664 0,
665 0,
666 None,
667 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
668 );
669 }
670
671 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
672 if current_count > 0 && current_count.is_multiple_of(100) {
673 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
674 }
675
676 Ok(CallToolResult::success(vec![Content::text(result_text)]))
677 }
678}
679
680pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
681 crate::instructions::build_instructions(crp_mode)
682}
683
684pub fn build_claude_code_instructions_for_test() -> String {
685 crate::instructions::claude_code_instructions()
686}
687
688const PROJECT_MARKERS: &[&str] = &[
689 ".git",
690 "Cargo.toml",
691 "package.json",
692 "go.mod",
693 "pyproject.toml",
694 "setup.py",
695 "pom.xml",
696 "build.gradle",
697 "Makefile",
698 ".lean-ctx.toml",
699];
700
701fn has_project_marker(dir: &std::path::Path) -> bool {
702 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
703}
704
705fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
706 if let Some(home) = dirs::home_dir() {
707 if dir == home {
708 return true;
709 }
710 }
711 let dir_str = dir.to_string_lossy();
712 dir_str.ends_with("/.claude")
713 || dir_str.ends_with("/.codex")
714 || dir_str.contains("/.claude/")
715 || dir_str.contains("/.codex/")
716}
717
718fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
719 std::process::Command::new("git")
720 .args(["rev-parse", "--show-toplevel"])
721 .current_dir(dir)
722 .stdout(std::process::Stdio::piped())
723 .stderr(std::process::Stdio::null())
724 .output()
725 .ok()
726 .and_then(|o| {
727 if o.status.success() {
728 String::from_utf8(o.stdout)
729 .ok()
730 .map(|s| s.trim().to_string())
731 } else {
732 None
733 }
734 })
735}
736
737pub fn derive_project_root_from_cwd() -> Option<String> {
738 let cwd = std::env::current_dir().ok()?;
739 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
740
741 if is_home_or_agent_dir(&canonical) {
742 return git_toplevel_from(&canonical);
743 }
744
745 if has_project_marker(&canonical) {
746 return Some(canonical.to_string_lossy().to_string());
747 }
748
749 if let Some(git_root) = git_toplevel_from(&canonical) {
750 return Some(git_root);
751 }
752
753 if let Some(root) = detect_multi_root_workspace(&canonical) {
754 return Some(root);
755 }
756
757 None
758}
759
760fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
764 let entries = std::fs::read_dir(dir).ok()?;
765 let mut child_projects: Vec<String> = Vec::new();
766
767 for entry in entries.flatten() {
768 let path = entry.path();
769 if path.is_dir() && has_project_marker(&path) {
770 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
771 child_projects.push(canonical.to_string_lossy().to_string());
772 }
773 }
774
775 if child_projects.len() >= 2 {
776 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
777 let sep = if cfg!(windows) { ";" } else { ":" };
778 let merged = if existing.is_empty() {
779 child_projects.join(sep)
780 } else {
781 format!("{existing}{sep}{}", child_projects.join(sep))
782 };
783 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
784 tracing::info!(
785 "Multi-root workspace detected at {}: auto-allowing {} child projects",
786 dir.display(),
787 child_projects.len()
788 );
789 return Some(dir.to_string_lossy().to_string());
790 }
791
792 None
793}
794
795pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
796 crate::tool_defs::list_all_tool_defs()
797 .into_iter()
798 .map(|(name, desc, _)| (name, desc))
799 .collect()
800}
801
802pub fn tool_schemas_json_for_test() -> String {
803 crate::tool_defs::list_all_tool_defs()
804 .iter()
805 .map(|(name, _, schema)| format!("{name}: {schema}"))
806 .collect::<Vec<_>>()
807 .join("\n")
808}
809
810fn is_shell_tool_name(name: &str) -> bool {
811 matches!(name, "ctx_shell" | "ctx_execute")
812}
813
814#[cfg(test)]
815mod tests {
816 use super::*;
817
818 #[test]
819 fn project_markers_detected() {
820 let tmp = tempfile::tempdir().unwrap();
821 let root = tmp.path().join("myproject");
822 std::fs::create_dir_all(&root).unwrap();
823 assert!(!has_project_marker(&root));
824
825 std::fs::create_dir(root.join(".git")).unwrap();
826 assert!(has_project_marker(&root));
827 }
828
829 #[test]
830 fn home_dir_detected_as_agent_dir() {
831 if let Some(home) = dirs::home_dir() {
832 assert!(is_home_or_agent_dir(&home));
833 }
834 }
835
836 #[test]
837 fn agent_dirs_detected() {
838 let claude = std::path::PathBuf::from("/home/user/.claude");
839 assert!(is_home_or_agent_dir(&claude));
840 let codex = std::path::PathBuf::from("/home/user/.codex");
841 assert!(is_home_or_agent_dir(&codex));
842 let project = std::path::PathBuf::from("/home/user/projects/myapp");
843 assert!(!is_home_or_agent_dir(&project));
844 }
845
846 #[test]
847 fn test_unified_tool_count() {
848 let tools = crate::tool_defs::unified_tool_defs();
849 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
850 }
851
852 #[test]
853 fn test_granular_tool_count() {
854 let tools = crate::tool_defs::granular_tool_defs();
855 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
856 }
857
858 #[test]
859 fn disabled_tools_filters_list() {
860 let all = crate::tool_defs::granular_tool_defs();
861 let total = all.len();
862 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
863 let filtered: Vec<_> = all
864 .into_iter()
865 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
866 .collect();
867 assert_eq!(filtered.len(), total - 2);
868 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
869 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
870 }
871
872 #[test]
873 fn empty_disabled_tools_returns_all() {
874 let all = crate::tool_defs::granular_tool_defs();
875 let total = all.len();
876 let disabled: Vec<String> = vec![];
877 let filtered: Vec<_> = all
878 .into_iter()
879 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
880 .collect();
881 assert_eq!(filtered.len(), total);
882 }
883
884 #[test]
885 fn misspelled_disabled_tool_is_silently_ignored() {
886 let all = crate::tool_defs::granular_tool_defs();
887 let total = all.len();
888 let disabled = ["ctx_nonexistent_tool".to_string()];
889 let filtered: Vec<_> = all
890 .into_iter()
891 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
892 .collect();
893 assert_eq!(filtered.len(), total);
894 }
895
896 #[test]
897 fn detect_multi_root_workspace_with_child_projects() {
898 let tmp = tempfile::tempdir().unwrap();
899 let workspace = tmp.path().join("workspace");
900 std::fs::create_dir_all(&workspace).unwrap();
901
902 let proj_a = workspace.join("project-a");
903 let proj_b = workspace.join("project-b");
904 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
905 std::fs::create_dir_all(&proj_b).unwrap();
906 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
907
908 let result = detect_multi_root_workspace(&workspace);
909 assert!(
910 result.is_some(),
911 "should detect workspace with 2 child projects"
912 );
913
914 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
915 }
916
917 #[test]
918 fn detect_multi_root_workspace_returns_none_for_single_project() {
919 let tmp = tempfile::tempdir().unwrap();
920 let workspace = tmp.path().join("workspace");
921 std::fs::create_dir_all(&workspace).unwrap();
922
923 let proj_a = workspace.join("project-a");
924 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
925
926 let result = detect_multi_root_workspace(&workspace);
927 assert!(
928 result.is_none(),
929 "should not detect workspace with only 1 child project"
930 );
931 }
932}