1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod role_guard;
5
6use rmcp::handler::server::ServerHandler;
7use rmcp::model::{
8 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
9 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
10};
11use rmcp::service::{RequestContext, RoleServer};
12use rmcp::ErrorData;
13
14use crate::tools::{CrpMode, LeanCtxServer};
15
16impl ServerHandler for LeanCtxServer {
17 fn get_info(&self) -> ServerInfo {
18 let capabilities = ServerCapabilities::builder().enable_tools().build();
19
20 let instructions = crate::instructions::build_instructions(CrpMode::effective());
21
22 InitializeResult::new(capabilities)
23 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
24 .with_instructions(instructions)
25 }
26
27 async fn initialize(
28 &self,
29 request: InitializeRequestParams,
30 _context: RequestContext<RoleServer>,
31 ) -> Result<InitializeResult, ErrorData> {
32 let name = request.client_info.name.clone();
33 tracing::info!("MCP client connected: {:?}", name);
34 *self.client_name.write().await = name.clone();
35
36 let derived_root = derive_project_root_from_cwd();
37 let cwd_str = std::env::current_dir()
38 .ok()
39 .map(|p| p.to_string_lossy().to_string())
40 .unwrap_or_default();
41 {
42 let mut session = self.session.write().await;
43 if !cwd_str.is_empty() {
44 session.shell_cwd = Some(cwd_str.clone());
45 }
46 if let Some(ref root) = derived_root {
47 session.project_root = Some(root.clone());
48 tracing::info!("Project root set to: {root}");
49 } else if let Some(ref root) = session.project_root {
50 let root_path = std::path::Path::new(root);
51 let root_has_marker = has_project_marker(root_path);
52 let root_str = root_path.to_string_lossy();
53 let root_suspicious = root_str.contains("/.claude")
54 || root_str.contains("/.codex")
55 || root_str.contains("/var/folders/")
56 || root_str.contains("/tmp/")
57 || root_str.contains("\\.claude")
58 || root_str.contains("\\.codex")
59 || root_str.contains("\\AppData\\Local\\Temp")
60 || root_str.contains("\\Temp\\");
61 if root_suspicious && !root_has_marker {
62 session.project_root = None;
63 }
64 }
65 let _ = session.save();
66 }
67
68 let agent_name = name.clone();
69 let agent_root = derived_root.clone().unwrap_or_default();
70 let agent_id_handle = self.agent_id.clone();
71 tokio::task::spawn_blocking(move || {
72 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
73 return;
74 }
75
76 let maintenance = crate::core::startup_guard::try_acquire_lock(
80 "startup-maintenance",
81 std::time::Duration::from_secs(2),
82 std::time::Duration::from_secs(120),
83 );
84 if maintenance.is_some() {
85 if let Some(home) = dirs::home_dir() {
86 let _ = crate::rules_inject::inject_all_rules(&home);
87 }
88 crate::hooks::refresh_installed_hooks();
89 crate::core::version_check::check_background();
90 }
91 drop(maintenance);
92
93 if !agent_root.is_empty() {
94 let heuristic_role = match agent_name.to_lowercase().as_str() {
95 n if n.contains("cursor") => Some("coder"),
96 n if n.contains("claude") => Some("coder"),
97 n if n.contains("codex") => Some("coder"),
98 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
99 n if n.contains("review") => Some("reviewer"),
100 n if n.contains("test") => Some("debugger"),
101 _ => None,
102 };
103 let env_role = std::env::var("LEAN_CTX_ROLE")
104 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
105 .ok();
106 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
107
108 let _ = crate::core::roles::set_active_role(effective_role);
109
110 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
111 registry.cleanup_stale(24);
112 let id = registry.register("mcp", Some(effective_role), &agent_root);
113 let _ = registry.save();
114 if let Ok(mut guard) = agent_id_handle.try_write() {
115 *guard = Some(id);
116 }
117 }
118 });
119
120 let instructions =
121 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
122 let capabilities = ServerCapabilities::builder().enable_tools().build();
123
124 Ok(InitializeResult::new(capabilities)
125 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
126 .with_instructions(instructions))
127 }
128
129 async fn list_tools(
130 &self,
131 _request: Option<PaginatedRequestParams>,
132 _context: RequestContext<RoleServer>,
133 ) -> Result<ListToolsResult, ErrorData> {
134 let all_tools = if crate::tool_defs::is_full_mode() {
135 crate::tool_defs::granular_tool_defs()
136 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
137 crate::tool_defs::unified_tool_defs()
138 } else {
139 crate::tool_defs::lazy_tool_defs()
140 };
141
142 let disabled = crate::core::config::Config::load().disabled_tools_effective();
143 let tools = if disabled.is_empty() {
144 all_tools
145 } else {
146 all_tools
147 .into_iter()
148 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
149 .collect()
150 };
151
152 let tools = {
153 let active = self.workflow.read().await.clone();
154 if let Some(run) = active {
155 if let Some(state) = run.spec.state(&run.current) {
156 if let Some(allowed) = &state.allowed_tools {
157 let mut allow: std::collections::HashSet<&str> =
158 allowed.iter().map(std::string::String::as_str).collect();
159 allow.insert("ctx");
160 allow.insert("ctx_workflow");
161 return Ok(ListToolsResult {
162 tools: tools
163 .into_iter()
164 .filter(|t| allow.contains(t.name.as_ref()))
165 .collect(),
166 ..Default::default()
167 });
168 }
169 }
170 }
171 tools
172 };
173
174 Ok(ListToolsResult {
175 tools,
176 ..Default::default()
177 })
178 }
179
180 async fn call_tool(
181 &self,
182 request: CallToolRequestParams,
183 _context: RequestContext<RoleServer>,
184 ) -> Result<CallToolResult, ErrorData> {
185 self.check_idle_expiry().await;
186
187 let original_name = request.name.as_ref().to_string();
188 let (resolved_name, resolved_args) = if original_name == "ctx" {
189 let sub = request
190 .arguments
191 .as_ref()
192 .and_then(|a| a.get("tool"))
193 .and_then(|v| v.as_str())
194 .map(std::string::ToString::to_string)
195 .ok_or_else(|| {
196 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
197 })?;
198 let tool_name = if sub.starts_with("ctx_") {
199 sub
200 } else {
201 format!("ctx_{sub}")
202 };
203 let mut args = request.arguments.unwrap_or_default();
204 args.remove("tool");
205 (tool_name, Some(args))
206 } else {
207 (original_name, request.arguments)
208 };
209 let name = resolved_name.as_str();
210 let args = resolved_args.as_ref();
211
212 let role_check = role_guard::check_tool_access(name);
213 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
214 tracing::warn!(
215 tool = name,
216 role = %role_check.role_name,
217 "Tool blocked by role policy"
218 );
219 return Ok(denied);
220 }
221
222 if name != "ctx_workflow" {
223 let active = self.workflow.read().await.clone();
224 if let Some(run) = active {
225 if let Some(state) = run.spec.state(&run.current) {
226 if let Some(allowed) = &state.allowed_tools {
227 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
228 if !allowed_ok {
229 let mut shown = allowed.clone();
230 shown.sort();
231 shown.truncate(30);
232 return Ok(CallToolResult::success(vec![Content::text(format!(
233 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
234 run.spec.name,
235 run.current,
236 shown.len(),
237 shown.join(", ")
238 ))]));
239 }
240 }
241 }
242 }
243 }
244
245 let auto_context = {
246 let task = {
247 let session = self.session.read().await;
248 session.task.as_ref().map(|t| t.description.clone())
249 };
250 let project_root = {
251 let session = self.session.read().await;
252 session.project_root.clone()
253 };
254 let mut cache = self.cache.write().await;
255 crate::tools::autonomy::session_lifecycle_pre_hook(
256 &self.autonomy,
257 name,
258 &mut cache,
259 task.as_deref(),
260 project_root.as_deref(),
261 CrpMode::effective(),
262 )
263 };
264
265 let throttle_result = {
266 let fp = args
267 .map(|a| {
268 crate::core::loop_detection::LoopDetector::fingerprint(
269 &serde_json::Value::Object(a.clone()),
270 )
271 })
272 .unwrap_or_default();
273 let mut detector = self.loop_detector.write().await;
274
275 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
276 let is_search_shell = name == "ctx_shell" && {
277 let cmd = args
278 .as_ref()
279 .and_then(|a| a.get("command"))
280 .and_then(|v| v.as_str())
281 .unwrap_or("");
282 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
283 };
284
285 if is_search || is_search_shell {
286 let search_pattern = args.and_then(|a| {
287 a.get("pattern")
288 .or_else(|| a.get("query"))
289 .and_then(|v| v.as_str())
290 });
291 let shell_pattern = if is_search_shell {
292 args.and_then(|a| a.get("command"))
293 .and_then(|v| v.as_str())
294 .and_then(helpers::extract_search_pattern_from_command)
295 } else {
296 None
297 };
298 let pat = search_pattern.or(shell_pattern.as_deref());
299 detector.record_search(name, &fp, pat)
300 } else {
301 detector.record_call(name, &fp)
302 }
303 };
304
305 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
306 let msg = throttle_result.message.unwrap_or_default();
307 return Ok(CallToolResult::success(vec![Content::text(msg)]));
308 }
309
310 let throttle_warning =
311 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
312 throttle_result.message.clone()
313 } else {
314 None
315 };
316
317 let config = crate::core::config::Config::load();
318 let minimal = config.minimal_overhead_effective();
319
320 {
321 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
322 let snap = BudgetTracker::global().check();
323 if *snap.worst_level() == BudgetLevel::Exhausted
324 && name != "ctx_session"
325 && name != "ctx_cost"
326 && name != "ctx_metrics"
327 {
328 for (dim, lvl, used, limit) in [
329 (
330 "tokens",
331 &snap.tokens.level,
332 format!("{}", snap.tokens.used),
333 format!("{}", snap.tokens.limit),
334 ),
335 (
336 "shell",
337 &snap.shell.level,
338 format!("{}", snap.shell.used),
339 format!("{}", snap.shell.limit),
340 ),
341 (
342 "cost",
343 &snap.cost.level,
344 format!("${:.2}", snap.cost.used_usd),
345 format!("${:.2}", snap.cost.limit_usd),
346 ),
347 ] {
348 if *lvl == BudgetLevel::Exhausted {
349 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
350 }
351 }
352 let msg = format!(
353 "[BUDGET EXHAUSTED] {}\n\
354 Use `ctx_session action=role` to check/switch roles, \
355 or `ctx_session action=reset` to start fresh.",
356 snap.format_compact()
357 );
358 tracing::warn!(tool = name, "{msg}");
359 return Ok(CallToolResult::success(vec![Content::text(msg)]));
360 }
361 }
362
363 if is_shell_tool_name(name) {
364 crate::core::budget_tracker::BudgetTracker::global().record_shell();
365 }
366
367 let tool_start = std::time::Instant::now();
368 let mut result_text = {
369 use futures::FutureExt;
370 use std::panic::AssertUnwindSafe;
371 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
372 .catch_unwind()
373 .await
374 {
375 Ok(Ok(text)) => text,
376 Ok(Err(e)) => return Err(e),
377 Err(panic_payload) => {
378 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
379 (*s).to_string()
380 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
381 s.clone()
382 } else {
383 "unknown".to_string()
384 };
385 tracing::error!("Tool '{name}' panicked: {detail}");
386 format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
387 The MCP server is still running. Please retry or use a different approach.")
388 }
389 }
390 };
391
392 let output_tokens = {
393 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
394 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
395 tokens
396 };
397
398 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
399 crate::core::anomaly::save();
401
402 let budget_warning = {
403 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
404 let snap = BudgetTracker::global().check();
405 if *snap.worst_level() == BudgetLevel::Warning {
406 for (dim, lvl, used, limit, pct) in [
407 (
408 "tokens",
409 &snap.tokens.level,
410 format!("{}", snap.tokens.used),
411 format!("{}", snap.tokens.limit),
412 snap.tokens.percent,
413 ),
414 (
415 "shell",
416 &snap.shell.level,
417 format!("{}", snap.shell.used),
418 format!("{}", snap.shell.limit),
419 snap.shell.percent,
420 ),
421 (
422 "cost",
423 &snap.cost.level,
424 format!("${:.2}", snap.cost.used_usd),
425 format!("${:.2}", snap.cost.limit_usd),
426 snap.cost.percent,
427 ),
428 ] {
429 if *lvl == BudgetLevel::Warning {
430 crate::core::events::emit_budget_warning(
431 &snap.role, dim, &used, &limit, pct,
432 );
433 }
434 }
435 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
436 } else {
437 None
438 }
439 };
440
441 let archive_hint = if minimal {
442 None
443 } else {
444 use crate::core::archive;
445 let archivable = matches!(
446 name,
447 "ctx_shell"
448 | "ctx_read"
449 | "ctx_multi_read"
450 | "ctx_smart_read"
451 | "ctx_execute"
452 | "ctx_search"
453 | "ctx_tree"
454 );
455 if archivable && archive::should_archive(&result_text) {
456 let cmd = helpers::get_str(args, "command")
457 .or_else(|| helpers::get_str(args, "path"))
458 .unwrap_or_default();
459 let session_id = self.session.read().await.id.clone();
460 let tokens = crate::core::tokens::count_tokens(&result_text);
461 archive::store(name, &cmd, &result_text, Some(&session_id))
462 .map(|id| archive::format_hint(&id, result_text.len(), tokens))
463 } else {
464 None
465 }
466 };
467
468 let pre_compression = result_text.clone();
469 let density = crate::core::config::OutputDensity::effective(&config.output_density);
470 if density != crate::core::config::OutputDensity::Normal {
471 result_text = crate::core::protocol::compress_output(&result_text, &density);
472 }
473
474 {
475 let verify_cfg = crate::core::profiles::active_profile().verification;
476 let vr = crate::core::output_verification::verify_output(
477 &pre_compression,
478 &result_text,
479 &verify_cfg,
480 );
481 if !vr.warnings.is_empty() {
482 let msg = format!("[VERIFY] {}", vr.format_compact());
483 result_text = format!("{result_text}\n\n{msg}");
484 }
485 }
486
487 if let Some(hint) = archive_hint {
488 result_text = format!("{result_text}\n{hint}");
489 }
490
491 if let Some(ctx) = auto_context {
492 result_text = format!("{ctx}\n\n{result_text}");
493 }
494
495 if let Some(warning) = throttle_warning {
496 result_text = format!("{result_text}\n\n{warning}");
497 }
498
499 if let Some(bw) = budget_warning {
500 result_text = format!("{result_text}\n\n{bw}");
501 }
502
503 {
504 let slo_snap = crate::core::slo::evaluate();
505 if !slo_snap.violations.is_empty() {
506 let slo_msg = format!("[SLO] {}", slo_snap.format_compact());
507 result_text = format!("{result_text}\n\n{slo_msg}");
508 }
509 }
510
511 if name == "ctx_read" {
512 if minimal {
513 let mut cache = self.cache.write().await;
514 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
515 } else {
516 let read_path = self
517 .resolve_path_or_passthrough(
518 &helpers::get_str(args, "path").unwrap_or_default(),
519 )
520 .await;
521 let project_root = {
522 let session = self.session.read().await;
523 session.project_root.clone()
524 };
525 let mut cache = self.cache.write().await;
526 let enrich = crate::tools::autonomy::enrich_after_read(
527 &self.autonomy,
528 &mut cache,
529 &read_path,
530 project_root.as_deref(),
531 );
532 if let Some(hint) = enrich.related_hint {
533 result_text = format!("{result_text}\n{hint}");
534 }
535 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
536 }
537 }
538
539 let output_token_count = crate::core::tokens::count_tokens(&result_text);
540
541 if !minimal && name == "ctx_shell" {
542 let cmd = helpers::get_str(args, "command").unwrap_or_default();
543 let calls = self.tool_calls.read().await;
544 let last_original = calls.last().map_or(0, |c| c.original_tokens);
545 drop(calls);
546 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
547 &self.autonomy,
548 &cmd,
549 last_original,
550 output_token_count,
551 ) {
552 result_text = format!("{result_text}\n{hint}");
553 }
554 }
555
556 {
557 let input = helpers::canonical_args_string(args);
558 let input_md5 = helpers::md5_hex_fast(&input);
559 let output_md5 = helpers::md5_hex_fast(&result_text);
560 let action = helpers::get_str(args, "action");
561 let agent_id = self.agent_id.read().await.clone();
562 let client_name = self.client_name.read().await.clone();
563 let mut explicit_intent: Option<(
564 crate::core::intent_protocol::IntentRecord,
565 Option<String>,
566 String,
567 )> = None;
568
569 let pending_session_save = {
570 let empty_args = serde_json::Map::new();
571 let args_map = args.unwrap_or(&empty_args);
572 let mut session = self.session.write().await;
573 session.record_tool_receipt(
574 name,
575 action.as_deref(),
576 &input_md5,
577 &output_md5,
578 agent_id.as_deref(),
579 Some(&client_name),
580 );
581
582 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
583 name,
584 action.as_deref(),
585 args_map,
586 session.project_root.as_deref(),
587 ) {
588 let is_explicit =
589 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
590 let root = session.project_root.clone();
591 let sid = session.id.clone();
592 session.record_intent(intent.clone());
593 if is_explicit {
594 explicit_intent = Some((intent, root, sid));
595 }
596 }
597 if session.should_save() {
598 session.prepare_save().ok()
599 } else {
600 None
601 }
602 };
603
604 if let Some(prepared) = pending_session_save {
605 tokio::task::spawn_blocking(move || {
606 let _ = prepared.write_to_disk();
607 });
608 }
609
610 if let Some((intent, root, session_id)) = explicit_intent {
611 let _ = crate::core::intent_protocol::apply_side_effects(
612 &intent,
613 root.as_deref(),
614 &session_id,
615 );
616 }
617
618 if self.autonomy.is_enabled() {
619 let (calls, project_root) = {
620 let session = self.session.read().await;
621 (session.stats.total_tool_calls, session.project_root.clone())
622 };
623
624 if let Some(root) = project_root {
625 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
626 let root_clone = root.clone();
627 tokio::task::spawn_blocking(move || {
628 let _ = crate::core::consolidation_engine::consolidate_latest(
629 &root_clone,
630 crate::core::consolidation_engine::ConsolidationBudgets::default(),
631 );
632 });
633 }
634 }
635 }
636
637 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
638 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
639 let output_token_count_u64 = output_token_count as u64;
640 let name_owned = name.to_string();
641 tokio::task::spawn_blocking(move || {
642 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
643 let quote = pricing.quote_from_env_or_agent_type(&client_name);
644 let cost_usd =
645 quote
646 .cost
647 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
648 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
649
650 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
651 store.record_tool_call(
652 &agent_key,
653 &client_name,
654 &name_owned,
655 input_token_count,
656 output_token_count_u64,
657 );
658 let _ = store.save();
659 });
660 }
661
662 let skip_checkpoint = minimal
663 || matches!(
664 name,
665 "ctx_compress"
666 | "ctx_metrics"
667 | "ctx_benchmark"
668 | "ctx_analyze"
669 | "ctx_cache"
670 | "ctx_discover"
671 | "ctx_dedup"
672 | "ctx_session"
673 | "ctx_knowledge"
674 | "ctx_agent"
675 | "ctx_share"
676 | "ctx_wrapped"
677 | "ctx_overview"
678 | "ctx_preload"
679 | "ctx_cost"
680 | "ctx_gain"
681 | "ctx_heatmap"
682 | "ctx_task"
683 | "ctx_impact"
684 | "ctx_architecture"
685 | "ctx_workflow"
686 );
687
688 if !skip_checkpoint && self.increment_and_check() {
689 if let Some(checkpoint) = self.auto_checkpoint().await {
690 let interval = LeanCtxServer::checkpoint_interval_effective();
691 let combined = format!(
692 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
693 );
694 return Ok(CallToolResult::success(vec![Content::text(combined)]));
695 }
696 }
697
698 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
699 if tool_duration_ms > 100 {
700 LeanCtxServer::append_tool_call_log(
701 name,
702 tool_duration_ms,
703 0,
704 0,
705 None,
706 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
707 );
708 }
709
710 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
711 if current_count > 0 && current_count.is_multiple_of(100) {
712 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
713 }
714
715 Ok(CallToolResult::success(vec![Content::text(result_text)]))
716 }
717}
718
719pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
720 crate::instructions::build_instructions(crp_mode)
721}
722
723pub fn build_claude_code_instructions_for_test() -> String {
724 crate::instructions::claude_code_instructions()
725}
726
727const PROJECT_MARKERS: &[&str] = &[
728 ".git",
729 "Cargo.toml",
730 "package.json",
731 "go.mod",
732 "pyproject.toml",
733 "setup.py",
734 "pom.xml",
735 "build.gradle",
736 "Makefile",
737 ".lean-ctx.toml",
738];
739
740fn has_project_marker(dir: &std::path::Path) -> bool {
741 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
742}
743
744fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
745 if let Some(home) = dirs::home_dir() {
746 if dir == home {
747 return true;
748 }
749 }
750 let dir_str = dir.to_string_lossy();
751 dir_str.ends_with("/.claude")
752 || dir_str.ends_with("/.codex")
753 || dir_str.contains("/.claude/")
754 || dir_str.contains("/.codex/")
755}
756
757fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
758 std::process::Command::new("git")
759 .args(["rev-parse", "--show-toplevel"])
760 .current_dir(dir)
761 .stdout(std::process::Stdio::piped())
762 .stderr(std::process::Stdio::null())
763 .output()
764 .ok()
765 .and_then(|o| {
766 if o.status.success() {
767 String::from_utf8(o.stdout)
768 .ok()
769 .map(|s| s.trim().to_string())
770 } else {
771 None
772 }
773 })
774}
775
776pub fn derive_project_root_from_cwd() -> Option<String> {
777 let cwd = std::env::current_dir().ok()?;
778 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
779
780 if is_home_or_agent_dir(&canonical) {
781 return git_toplevel_from(&canonical);
782 }
783
784 if has_project_marker(&canonical) {
785 return Some(canonical.to_string_lossy().to_string());
786 }
787
788 if let Some(git_root) = git_toplevel_from(&canonical) {
789 return Some(git_root);
790 }
791
792 if let Some(root) = detect_multi_root_workspace(&canonical) {
793 return Some(root);
794 }
795
796 None
797}
798
799fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
803 let entries = std::fs::read_dir(dir).ok()?;
804 let mut child_projects: Vec<String> = Vec::new();
805
806 for entry in entries.flatten() {
807 let path = entry.path();
808 if path.is_dir() && has_project_marker(&path) {
809 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
810 child_projects.push(canonical.to_string_lossy().to_string());
811 }
812 }
813
814 if child_projects.len() >= 2 {
815 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
816 let sep = if cfg!(windows) { ";" } else { ":" };
817 let merged = if existing.is_empty() {
818 child_projects.join(sep)
819 } else {
820 format!("{existing}{sep}{}", child_projects.join(sep))
821 };
822 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
823 tracing::info!(
824 "Multi-root workspace detected at {}: auto-allowing {} child projects",
825 dir.display(),
826 child_projects.len()
827 );
828 return Some(dir.to_string_lossy().to_string());
829 }
830
831 None
832}
833
834pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
835 crate::tool_defs::list_all_tool_defs()
836 .into_iter()
837 .map(|(name, desc, _)| (name, desc))
838 .collect()
839}
840
841pub fn tool_schemas_json_for_test() -> String {
842 crate::tool_defs::list_all_tool_defs()
843 .iter()
844 .map(|(name, _, schema)| format!("{name}: {schema}"))
845 .collect::<Vec<_>>()
846 .join("\n")
847}
848
849fn is_shell_tool_name(name: &str) -> bool {
850 matches!(name, "ctx_shell" | "ctx_execute")
851}
852
853#[cfg(test)]
854mod tests {
855 use super::*;
856
857 #[test]
858 fn project_markers_detected() {
859 let tmp = tempfile::tempdir().unwrap();
860 let root = tmp.path().join("myproject");
861 std::fs::create_dir_all(&root).unwrap();
862 assert!(!has_project_marker(&root));
863
864 std::fs::create_dir(root.join(".git")).unwrap();
865 assert!(has_project_marker(&root));
866 }
867
868 #[test]
869 fn home_dir_detected_as_agent_dir() {
870 if let Some(home) = dirs::home_dir() {
871 assert!(is_home_or_agent_dir(&home));
872 }
873 }
874
875 #[test]
876 fn agent_dirs_detected() {
877 let claude = std::path::PathBuf::from("/home/user/.claude");
878 assert!(is_home_or_agent_dir(&claude));
879 let codex = std::path::PathBuf::from("/home/user/.codex");
880 assert!(is_home_or_agent_dir(&codex));
881 let project = std::path::PathBuf::from("/home/user/projects/myapp");
882 assert!(!is_home_or_agent_dir(&project));
883 }
884
885 #[test]
886 fn test_unified_tool_count() {
887 let tools = crate::tool_defs::unified_tool_defs();
888 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
889 }
890
891 #[test]
892 fn test_granular_tool_count() {
893 let tools = crate::tool_defs::granular_tool_defs();
894 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
895 }
896
897 #[test]
898 fn disabled_tools_filters_list() {
899 let all = crate::tool_defs::granular_tool_defs();
900 let total = all.len();
901 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
902 let filtered: Vec<_> = all
903 .into_iter()
904 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
905 .collect();
906 assert_eq!(filtered.len(), total - 2);
907 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
908 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
909 }
910
911 #[test]
912 fn empty_disabled_tools_returns_all() {
913 let all = crate::tool_defs::granular_tool_defs();
914 let total = all.len();
915 let disabled: Vec<String> = vec![];
916 let filtered: Vec<_> = all
917 .into_iter()
918 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
919 .collect();
920 assert_eq!(filtered.len(), total);
921 }
922
923 #[test]
924 fn misspelled_disabled_tool_is_silently_ignored() {
925 let all = crate::tool_defs::granular_tool_defs();
926 let total = all.len();
927 let disabled = ["ctx_nonexistent_tool".to_string()];
928 let filtered: Vec<_> = all
929 .into_iter()
930 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
931 .collect();
932 assert_eq!(filtered.len(), total);
933 }
934
935 #[test]
936 fn detect_multi_root_workspace_with_child_projects() {
937 let tmp = tempfile::tempdir().unwrap();
938 let workspace = tmp.path().join("workspace");
939 std::fs::create_dir_all(&workspace).unwrap();
940
941 let proj_a = workspace.join("project-a");
942 let proj_b = workspace.join("project-b");
943 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
944 std::fs::create_dir_all(&proj_b).unwrap();
945 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
946
947 let result = detect_multi_root_workspace(&workspace);
948 assert!(
949 result.is_some(),
950 "should detect workspace with 2 child projects"
951 );
952
953 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
954 }
955
956 #[test]
957 fn detect_multi_root_workspace_returns_none_for_single_project() {
958 let tmp = tempfile::tempdir().unwrap();
959 let workspace = tmp.path().join("workspace");
960 std::fs::create_dir_all(&workspace).unwrap();
961
962 let proj_a = workspace.join("project-a");
963 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
964
965 let result = detect_multi_root_workspace(&workspace);
966 assert!(
967 result.is_none(),
968 "should not detect workspace with only 1 child project"
969 );
970 }
971}