1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod pipeline_stages;
5pub mod registry;
6pub mod role_guard;
7pub mod tool_trait;
8
9use rmcp::handler::server::ServerHandler;
10use rmcp::model::{
11 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
12 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
13};
14use rmcp::service::{RequestContext, RoleServer};
15use rmcp::ErrorData;
16
17use crate::tools::{CrpMode, LeanCtxServer};
18
19impl ServerHandler for LeanCtxServer {
20 fn get_info(&self) -> ServerInfo {
21 let capabilities = ServerCapabilities::builder().enable_tools().build();
22
23 let instructions = crate::instructions::build_instructions(CrpMode::effective());
24
25 InitializeResult::new(capabilities)
26 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
27 .with_instructions(instructions)
28 }
29
30 async fn initialize(
31 &self,
32 request: InitializeRequestParams,
33 _context: RequestContext<RoleServer>,
34 ) -> Result<InitializeResult, ErrorData> {
35 let name = request.client_info.name.clone();
36 tracing::info!("MCP client connected: {:?}", name);
37 *self.client_name.write().await = name.clone();
38
39 let derived_root = derive_project_root_from_cwd();
40 let cwd_str = std::env::current_dir()
41 .ok()
42 .map(|p| p.to_string_lossy().to_string())
43 .unwrap_or_default();
44 {
45 let mut session = self.session.write().await;
46 if !cwd_str.is_empty() {
47 session.shell_cwd = Some(cwd_str.clone());
48 }
49 if let Some(ref root) = derived_root {
50 session.project_root = Some(root.clone());
51 tracing::info!("Project root set to: {root}");
52 } else if let Some(ref root) = session.project_root {
53 let root_path = std::path::Path::new(root);
54 let root_has_marker = has_project_marker(root_path);
55 let root_str = root_path.to_string_lossy();
56 let root_suspicious = root_str.contains("/.claude")
57 || root_str.contains("/.codex")
58 || root_str.contains("/var/folders/")
59 || root_str.contains("/tmp/")
60 || root_str.contains("\\.claude")
61 || root_str.contains("\\.codex")
62 || root_str.contains("\\AppData\\Local\\Temp")
63 || root_str.contains("\\Temp\\");
64 if root_suspicious && !root_has_marker {
65 session.project_root = None;
66 }
67 }
68 if self.session_mode == crate::tools::SessionMode::Shared {
69 if let Some(ref root) = session.project_root {
70 if let Some(ref rt) = self.context_os {
71 rt.shared_sessions.persist_best_effort(
72 root,
73 &self.workspace_id,
74 &self.channel_id,
75 &session,
76 );
77 }
78 }
79 } else {
80 let _ = session.save();
81 }
82 }
83
84 let agent_name = name.clone();
85 let agent_root = derived_root.clone().unwrap_or_default();
86 let agent_id_handle = self.agent_id.clone();
87 tokio::task::spawn_blocking(move || {
88 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
89 return;
90 }
91
92 let maintenance = crate::core::startup_guard::try_acquire_lock(
96 "startup-maintenance",
97 std::time::Duration::from_secs(2),
98 std::time::Duration::from_mins(2),
99 );
100 if maintenance.is_some() {
101 if let Some(home) = dirs::home_dir() {
102 let _ = crate::rules_inject::inject_all_rules(&home);
103 }
104 crate::hooks::refresh_installed_hooks();
105 crate::core::version_check::check_background();
106 }
107 drop(maintenance);
108
109 if !agent_root.is_empty() {
110 let heuristic_role = match agent_name.to_lowercase().as_str() {
111 n if n.contains("cursor") => Some("coder"),
112 n if n.contains("claude") => Some("coder"),
113 n if n.contains("codex") => Some("coder"),
114 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
115 n if n.contains("review") => Some("reviewer"),
116 n if n.contains("test") => Some("debugger"),
117 _ => None,
118 };
119 let env_role = std::env::var("LEAN_CTX_ROLE")
120 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
121 .ok();
122 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
123
124 let _ = crate::core::roles::set_active_role(effective_role);
125
126 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
127 registry.cleanup_stale(24);
128 let id = registry.register("mcp", Some(effective_role), &agent_root);
129 let _ = registry.save();
130 if let Ok(mut guard) = agent_id_handle.try_write() {
131 *guard = Some(id);
132 }
133 }
134 });
135
136 let instructions =
137 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
138 let capabilities = ServerCapabilities::builder().enable_tools().build();
139
140 Ok(InitializeResult::new(capabilities)
141 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
142 .with_instructions(instructions))
143 }
144
145 async fn list_tools(
146 &self,
147 _request: Option<PaginatedRequestParams>,
148 _context: RequestContext<RoleServer>,
149 ) -> Result<ListToolsResult, ErrorData> {
150 let all_tools = if crate::tool_defs::is_full_mode() {
151 crate::tool_defs::granular_tool_defs()
152 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
153 crate::tool_defs::unified_tool_defs()
154 } else {
155 crate::tool_defs::lazy_tool_defs()
156 };
157
158 let disabled = crate::core::config::Config::load().disabled_tools_effective();
159 let tools = if disabled.is_empty() {
160 all_tools
161 } else {
162 all_tools
163 .into_iter()
164 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
165 .collect()
166 };
167
168 let tools = {
169 let active = self.workflow.read().await.clone();
170 if let Some(run) = active {
171 if let Some(state) = run.spec.state(&run.current) {
172 if let Some(allowed) = &state.allowed_tools {
173 let mut allow: std::collections::HashSet<&str> =
174 allowed.iter().map(std::string::String::as_str).collect();
175 allow.insert("ctx");
176 allow.insert("ctx_workflow");
177 return Ok(ListToolsResult {
178 tools: tools
179 .into_iter()
180 .filter(|t| allow.contains(t.name.as_ref()))
181 .collect(),
182 ..Default::default()
183 });
184 }
185 }
186 }
187 tools
188 };
189
190 Ok(ListToolsResult {
191 tools,
192 ..Default::default()
193 })
194 }
195
196 async fn call_tool(
197 &self,
198 request: CallToolRequestParams,
199 _context: RequestContext<RoleServer>,
200 ) -> Result<CallToolResult, ErrorData> {
201 self.check_idle_expiry().await;
202
203 let original_name = request.name.as_ref().to_string();
204 let (resolved_name, resolved_args) = if original_name == "ctx" {
205 let sub = request
206 .arguments
207 .as_ref()
208 .and_then(|a| a.get("tool"))
209 .and_then(|v| v.as_str())
210 .map(std::string::ToString::to_string)
211 .ok_or_else(|| {
212 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
213 })?;
214 let tool_name = if sub.starts_with("ctx_") {
215 sub
216 } else {
217 format!("ctx_{sub}")
218 };
219 let mut args = request.arguments.unwrap_or_default();
220 args.remove("tool");
221 (tool_name, Some(args))
222 } else {
223 (original_name, request.arguments)
224 };
225 let name = resolved_name.as_str();
226 let args = resolved_args.as_ref();
227
228 let role_check = role_guard::check_tool_access(name);
229 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
230 tracing::warn!(
231 tool = name,
232 role = %role_check.role_name,
233 "Tool blocked by role policy"
234 );
235 return Ok(denied);
236 }
237
238 if name != "ctx_workflow" {
239 let active = self.workflow.read().await.clone();
240 if let Some(run) = active {
241 if let Some(state) = run.spec.state(&run.current) {
242 if let Some(allowed) = &state.allowed_tools {
243 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
244 if !allowed_ok {
245 let mut shown = allowed.clone();
246 shown.sort();
247 shown.truncate(30);
248 return Ok(CallToolResult::success(vec![Content::text(format!(
249 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
250 run.spec.name,
251 run.current,
252 shown.len(),
253 shown.join(", ")
254 ))]));
255 }
256 }
257 }
258 }
259 }
260
261 let auto_context = {
262 let task = {
263 let session = self.session.read().await;
264 session.task.as_ref().map(|t| t.description.clone())
265 };
266 let project_root = {
267 let session = self.session.read().await;
268 session.project_root.clone()
269 };
270 let mut cache = self.cache.write().await;
271 crate::tools::autonomy::session_lifecycle_pre_hook(
272 &self.autonomy,
273 name,
274 &mut cache,
275 task.as_deref(),
276 project_root.as_deref(),
277 CrpMode::effective(),
278 )
279 };
280
281 let throttle_result = {
282 let fp = args
283 .map(|a| {
284 crate::core::loop_detection::LoopDetector::fingerprint(
285 &serde_json::Value::Object(a.clone()),
286 )
287 })
288 .unwrap_or_default();
289 let mut detector = self.loop_detector.write().await;
290
291 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
292 let is_search_shell = name == "ctx_shell" && {
293 let cmd = args
294 .as_ref()
295 .and_then(|a| a.get("command"))
296 .and_then(|v| v.as_str())
297 .unwrap_or("");
298 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
299 };
300
301 if is_search || is_search_shell {
302 let search_pattern = args.and_then(|a| {
303 a.get("pattern")
304 .or_else(|| a.get("query"))
305 .and_then(|v| v.as_str())
306 });
307 let shell_pattern = if is_search_shell {
308 args.and_then(|a| a.get("command"))
309 .and_then(|v| v.as_str())
310 .and_then(helpers::extract_search_pattern_from_command)
311 } else {
312 None
313 };
314 let pat = search_pattern.or(shell_pattern.as_deref());
315 detector.record_search(name, &fp, pat)
316 } else {
317 detector.record_call(name, &fp)
318 }
319 };
320
321 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
322 let msg = throttle_result.message.unwrap_or_default();
323 return Ok(CallToolResult::success(vec![Content::text(msg)]));
324 }
325
326 let throttle_warning =
327 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
328 throttle_result.message.clone()
329 } else {
330 None
331 };
332
333 let config = crate::core::config::Config::load();
334 let minimal = config.minimal_overhead_effective();
335
336 {
337 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
338 let snap = BudgetTracker::global().check();
339 if *snap.worst_level() == BudgetLevel::Exhausted
340 && name != "ctx_session"
341 && name != "ctx_cost"
342 && name != "ctx_metrics"
343 {
344 for (dim, lvl, used, limit) in [
345 (
346 "tokens",
347 &snap.tokens.level,
348 format!("{}", snap.tokens.used),
349 format!("{}", snap.tokens.limit),
350 ),
351 (
352 "shell",
353 &snap.shell.level,
354 format!("{}", snap.shell.used),
355 format!("{}", snap.shell.limit),
356 ),
357 (
358 "cost",
359 &snap.cost.level,
360 format!("${:.2}", snap.cost.used_usd),
361 format!("${:.2}", snap.cost.limit_usd),
362 ),
363 ] {
364 if *lvl == BudgetLevel::Exhausted {
365 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
366 }
367 }
368 let msg = format!(
369 "[BUDGET EXHAUSTED] {}\n\
370 Use `ctx_session action=role` to check/switch roles, \
371 or `ctx_session action=reset` to start fresh.",
372 snap.format_compact()
373 );
374 tracing::warn!(tool = name, "{msg}");
375 return Ok(CallToolResult::success(vec![Content::text(msg)]));
376 }
377 }
378
379 if is_shell_tool_name(name) {
380 crate::core::budget_tracker::BudgetTracker::global().record_shell();
381 }
382
383 let tool_start = std::time::Instant::now();
384 let mut result_text = {
385 use futures::FutureExt;
386 use std::panic::AssertUnwindSafe;
387 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
388 .catch_unwind()
389 .await
390 {
391 Ok(Ok(text)) => text,
392 Ok(Err(e)) => return Err(e),
393 Err(panic_payload) => {
394 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
395 (*s).to_string()
396 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
397 s.clone()
398 } else {
399 "unknown".to_string()
400 };
401 tracing::error!("Tool '{name}' panicked: {detail}");
402 format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
403 The MCP server is still running. Please retry or use a different approach.")
404 }
405 }
406 };
407
408 let output_tokens = {
409 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
410 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
411 tokens
412 };
413
414 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
415 crate::core::anomaly::save();
417
418 let budget_warning = {
419 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
420 let snap = BudgetTracker::global().check();
421 if *snap.worst_level() == BudgetLevel::Warning {
422 for (dim, lvl, used, limit, pct) in [
423 (
424 "tokens",
425 &snap.tokens.level,
426 format!("{}", snap.tokens.used),
427 format!("{}", snap.tokens.limit),
428 snap.tokens.percent,
429 ),
430 (
431 "shell",
432 &snap.shell.level,
433 format!("{}", snap.shell.used),
434 format!("{}", snap.shell.limit),
435 snap.shell.percent,
436 ),
437 (
438 "cost",
439 &snap.cost.level,
440 format!("${:.2}", snap.cost.used_usd),
441 format!("${:.2}", snap.cost.limit_usd),
442 snap.cost.percent,
443 ),
444 ] {
445 if *lvl == BudgetLevel::Warning {
446 crate::core::events::emit_budget_warning(
447 &snap.role, dim, &used, &limit, pct,
448 );
449 }
450 }
451 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
452 } else {
453 None
454 }
455 };
456
457 let archive_hint = if minimal {
458 None
459 } else {
460 use crate::core::archive;
461 let archivable = matches!(
462 name,
463 "ctx_shell"
464 | "ctx_read"
465 | "ctx_multi_read"
466 | "ctx_smart_read"
467 | "ctx_execute"
468 | "ctx_search"
469 | "ctx_tree"
470 );
471 if archivable && archive::should_archive(&result_text) {
472 let cmd = helpers::get_str(args, "command")
473 .or_else(|| helpers::get_str(args, "path"))
474 .unwrap_or_default();
475 let session_id = self.session.read().await.id.clone();
476 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
477 let tokens = crate::core::tokens::count_tokens(&to_store);
478 archive::store(name, &cmd, &to_store, Some(&session_id))
479 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
480 } else {
481 None
482 }
483 };
484
485 let pre_compression = result_text.clone();
486 let density = crate::core::config::OutputDensity::effective(&config.output_density);
487 if density != crate::core::config::OutputDensity::Normal {
488 result_text = crate::core::protocol::compress_output(&result_text, &density);
489 }
490
491 {
492 let verify_cfg = crate::core::profiles::active_profile().verification;
493 let vr = crate::core::output_verification::verify_output(
494 &pre_compression,
495 &result_text,
496 &verify_cfg,
497 );
498 if !vr.warnings.is_empty() {
499 let msg = format!("[VERIFY] {}", vr.format_compact());
500 result_text = format!("{result_text}\n\n{msg}");
501 }
502 }
503
504 if let Some(hint) = archive_hint {
505 result_text = format!("{result_text}\n{hint}");
506 }
507
508 if let Some(ctx) = auto_context {
509 result_text = format!("{ctx}\n\n{result_text}");
510 }
511
512 if let Some(warning) = throttle_warning {
513 result_text = format!("{result_text}\n\n{warning}");
514 }
515
516 if let Some(bw) = budget_warning {
517 result_text = format!("{result_text}\n\n{bw}");
518 }
519
520 {
521 let _ = crate::core::slo::evaluate();
523 }
524
525 if name == "ctx_read" {
526 if minimal {
527 let mut cache = self.cache.write().await;
528 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
529 } else {
530 let read_path = self
531 .resolve_path_or_passthrough(
532 &helpers::get_str(args, "path").unwrap_or_default(),
533 )
534 .await;
535 let project_root = {
536 let session = self.session.read().await;
537 session.project_root.clone()
538 };
539 let mut cache = self.cache.write().await;
540 let enrich = crate::tools::autonomy::enrich_after_read(
541 &self.autonomy,
542 &mut cache,
543 &read_path,
544 project_root.as_deref(),
545 None,
546 crate::tools::CrpMode::effective(),
547 false,
548 );
549 if let Some(hint) = enrich.related_hint {
550 result_text = format!("{result_text}\n{hint}");
551 }
552 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
553 }
554 }
555
556 if !minimal && name == "ctx_shell" {
557 let cmd = helpers::get_str(args, "command").unwrap_or_default();
558 let calls = self.tool_calls.read().await;
559 let last_original = calls.last().map_or(0, |c| c.original_tokens);
560 drop(calls);
561 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
562 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
563 &self.autonomy,
564 &cmd,
565 last_original,
566 pre_hint_tokens,
567 ) {
568 result_text = format!("{result_text}\n{hint}");
569 }
570 }
571
572 let output_token_count = crate::core::tokens::count_tokens(&result_text);
573
574 {
575 let input = helpers::canonical_args_string(args);
576 let input_md5 = helpers::md5_hex_fast(&input);
577 let output_md5 = helpers::md5_hex_fast(&result_text);
578 let action = helpers::get_str(args, "action");
579 let agent_id = self.agent_id.read().await.clone();
580 let client_name = self.client_name.read().await.clone();
581 let mut explicit_intent: Option<(
582 crate::core::intent_protocol::IntentRecord,
583 Option<String>,
584 String,
585 )> = None;
586
587 let pending_session_save = {
588 let empty_args = serde_json::Map::new();
589 let args_map = args.unwrap_or(&empty_args);
590 let mut session = self.session.write().await;
591 session.record_tool_receipt(
592 name,
593 action.as_deref(),
594 &input_md5,
595 &output_md5,
596 agent_id.as_deref(),
597 Some(&client_name),
598 );
599
600 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
601 name,
602 action.as_deref(),
603 args_map,
604 session.project_root.as_deref(),
605 ) {
606 let is_explicit =
607 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
608 let root = session.project_root.clone();
609 let sid = session.id.clone();
610 session.record_intent(intent.clone());
611 if is_explicit {
612 explicit_intent = Some((intent, root, sid));
613 }
614 }
615 if session.should_save() {
616 session.prepare_save().ok()
617 } else {
618 None
619 }
620 };
621
622 if let Some(prepared) = pending_session_save {
623 tokio::task::spawn_blocking(move || {
624 let _ = prepared.write_to_disk();
625 });
626 }
627
628 if let Some((intent, root, session_id)) = explicit_intent {
629 let _ = crate::core::intent_protocol::apply_side_effects(
630 &intent,
631 root.as_deref(),
632 &session_id,
633 );
634 }
635
636 if self.autonomy.is_enabled() {
637 let (calls, project_root) = {
638 let session = self.session.read().await;
639 (session.stats.total_tool_calls, session.project_root.clone())
640 };
641
642 if let Some(root) = project_root {
643 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
644 let root_clone = root.clone();
645 tokio::task::spawn_blocking(move || {
646 let _ = crate::core::consolidation_engine::consolidate_latest(
647 &root_clone,
648 crate::core::consolidation_engine::ConsolidationBudgets::default(),
649 );
650 });
651 }
652 }
653 }
654
655 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
656 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
657 let output_token_count_u64 = output_token_count as u64;
658 let name_owned = name.to_string();
659 tokio::task::spawn_blocking(move || {
660 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
661 let quote = pricing.quote_from_env_or_agent_type(&client_name);
662 let cost_usd =
663 quote
664 .cost
665 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
666 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
667
668 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
669 store.record_tool_call(
670 &agent_key,
671 &client_name,
672 &name_owned,
673 input_token_count,
674 output_token_count_u64,
675 0,
676 );
677 let _ = store.save();
678 });
679 }
680
681 if self.session_mode == crate::tools::SessionMode::Shared {
683 let ws = self.workspace_id.clone();
684 let ch = self.channel_id.clone();
685 let rt = self.context_os.clone();
686 let agent = self.agent_id.read().await.clone();
687 let tool = name.to_string();
688 let session_snapshot = self.session.read().await.clone();
689 tokio::task::spawn_blocking(move || {
690 let Some(rt) = rt else {
691 return;
692 };
693 let Some(root) = session_snapshot.project_root.as_deref() else {
694 return;
695 };
696 rt.shared_sessions
697 .persist_best_effort(root, &ws, &ch, &session_snapshot);
698 let _ = rt.bus.append(
699 &ws,
700 &ch,
701 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
702 agent.as_deref(),
703 serde_json::json!({ "tool": tool }),
704 );
705 });
706 }
707
708 let skip_checkpoint = minimal
709 || matches!(
710 name,
711 "ctx_compress"
712 | "ctx_metrics"
713 | "ctx_benchmark"
714 | "ctx_analyze"
715 | "ctx_cache"
716 | "ctx_discover"
717 | "ctx_dedup"
718 | "ctx_session"
719 | "ctx_knowledge"
720 | "ctx_agent"
721 | "ctx_share"
722 | "ctx_wrapped"
723 | "ctx_overview"
724 | "ctx_preload"
725 | "ctx_cost"
726 | "ctx_gain"
727 | "ctx_heatmap"
728 | "ctx_task"
729 | "ctx_impact"
730 | "ctx_architecture"
731 | "ctx_workflow"
732 );
733
734 if !skip_checkpoint && self.increment_and_check() {
735 if let Some(checkpoint) = self.auto_checkpoint().await {
736 let interval = LeanCtxServer::checkpoint_interval_effective();
737 let combined = format!(
738 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
739 );
740 return Ok(CallToolResult::success(vec![Content::text(combined)]));
741 }
742 }
743
744 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
745 if tool_duration_ms > 100 {
746 LeanCtxServer::append_tool_call_log(
747 name,
748 tool_duration_ms,
749 0,
750 0,
751 None,
752 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
753 );
754 }
755
756 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
757 if current_count > 0 && current_count.is_multiple_of(100) {
758 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
759 }
760
761 Ok(CallToolResult::success(vec![Content::text(result_text)]))
762 }
763}
764
765pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
766 crate::instructions::build_instructions_for_test(crp_mode)
767}
768
769pub fn build_claude_code_instructions_for_test() -> String {
770 crate::instructions::claude_code_instructions()
771}
772
773const PROJECT_MARKERS: &[&str] = &[
774 ".git",
775 "Cargo.toml",
776 "package.json",
777 "go.mod",
778 "pyproject.toml",
779 "setup.py",
780 "pom.xml",
781 "build.gradle",
782 "Makefile",
783 ".lean-ctx.toml",
784];
785
786fn has_project_marker(dir: &std::path::Path) -> bool {
787 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
788}
789
790fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
791 if let Some(home) = dirs::home_dir() {
792 if dir == home {
793 return true;
794 }
795 }
796 let dir_str = dir.to_string_lossy();
797 dir_str.ends_with("/.claude")
798 || dir_str.ends_with("/.codex")
799 || dir_str.contains("/.claude/")
800 || dir_str.contains("/.codex/")
801}
802
803fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
804 std::process::Command::new("git")
805 .args(["rev-parse", "--show-toplevel"])
806 .current_dir(dir)
807 .stdout(std::process::Stdio::piped())
808 .stderr(std::process::Stdio::null())
809 .output()
810 .ok()
811 .and_then(|o| {
812 if o.status.success() {
813 String::from_utf8(o.stdout)
814 .ok()
815 .map(|s| s.trim().to_string())
816 } else {
817 None
818 }
819 })
820}
821
822pub fn derive_project_root_from_cwd() -> Option<String> {
823 let cwd = std::env::current_dir().ok()?;
824 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
825
826 if is_home_or_agent_dir(&canonical) {
827 return git_toplevel_from(&canonical);
828 }
829
830 if has_project_marker(&canonical) {
831 return Some(canonical.to_string_lossy().to_string());
832 }
833
834 if let Some(git_root) = git_toplevel_from(&canonical) {
835 return Some(git_root);
836 }
837
838 if let Some(root) = detect_multi_root_workspace(&canonical) {
839 return Some(root);
840 }
841
842 None
843}
844
845fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
849 let entries = std::fs::read_dir(dir).ok()?;
850 let mut child_projects: Vec<String> = Vec::new();
851
852 for entry in entries.flatten() {
853 let path = entry.path();
854 if path.is_dir() && has_project_marker(&path) {
855 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
856 child_projects.push(canonical.to_string_lossy().to_string());
857 }
858 }
859
860 if child_projects.len() >= 2 {
861 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
862 let sep = if cfg!(windows) { ";" } else { ":" };
863 let merged = if existing.is_empty() {
864 child_projects.join(sep)
865 } else {
866 format!("{existing}{sep}{}", child_projects.join(sep))
867 };
868 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
869 tracing::info!(
870 "Multi-root workspace detected at {}: auto-allowing {} child projects",
871 dir.display(),
872 child_projects.len()
873 );
874 return Some(dir.to_string_lossy().to_string());
875 }
876
877 None
878}
879
880pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
881 crate::tool_defs::list_all_tool_defs()
882 .into_iter()
883 .map(|(name, desc, _)| (name, desc))
884 .collect()
885}
886
887pub fn tool_schemas_json_for_test() -> String {
888 crate::tool_defs::list_all_tool_defs()
889 .iter()
890 .map(|(name, _, schema)| format!("{name}: {schema}"))
891 .collect::<Vec<_>>()
892 .join("\n")
893}
894
895fn is_shell_tool_name(name: &str) -> bool {
896 matches!(name, "ctx_shell" | "ctx_execute")
897}
898
899#[cfg(test)]
900mod tests {
901 use super::*;
902
903 #[test]
904 fn project_markers_detected() {
905 let tmp = tempfile::tempdir().unwrap();
906 let root = tmp.path().join("myproject");
907 std::fs::create_dir_all(&root).unwrap();
908 assert!(!has_project_marker(&root));
909
910 std::fs::create_dir(root.join(".git")).unwrap();
911 assert!(has_project_marker(&root));
912 }
913
914 #[test]
915 fn home_dir_detected_as_agent_dir() {
916 if let Some(home) = dirs::home_dir() {
917 assert!(is_home_or_agent_dir(&home));
918 }
919 }
920
921 #[test]
922 fn agent_dirs_detected() {
923 let claude = std::path::PathBuf::from("/home/user/.claude");
924 assert!(is_home_or_agent_dir(&claude));
925 let codex = std::path::PathBuf::from("/home/user/.codex");
926 assert!(is_home_or_agent_dir(&codex));
927 let project = std::path::PathBuf::from("/home/user/projects/myapp");
928 assert!(!is_home_or_agent_dir(&project));
929 }
930
931 #[test]
932 fn test_unified_tool_count() {
933 let tools = crate::tool_defs::unified_tool_defs();
934 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
935 }
936
937 #[test]
938 fn test_granular_tool_count() {
939 let tools = crate::tool_defs::granular_tool_defs();
940 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
941 }
942
943 #[test]
944 fn disabled_tools_filters_list() {
945 let all = crate::tool_defs::granular_tool_defs();
946 let total = all.len();
947 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
948 let filtered: Vec<_> = all
949 .into_iter()
950 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
951 .collect();
952 assert_eq!(filtered.len(), total - 2);
953 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
954 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
955 }
956
957 #[test]
958 fn empty_disabled_tools_returns_all() {
959 let all = crate::tool_defs::granular_tool_defs();
960 let total = all.len();
961 let disabled: Vec<String> = vec![];
962 let filtered: Vec<_> = all
963 .into_iter()
964 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
965 .collect();
966 assert_eq!(filtered.len(), total);
967 }
968
969 #[test]
970 fn misspelled_disabled_tool_is_silently_ignored() {
971 let all = crate::tool_defs::granular_tool_defs();
972 let total = all.len();
973 let disabled = ["ctx_nonexistent_tool".to_string()];
974 let filtered: Vec<_> = all
975 .into_iter()
976 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
977 .collect();
978 assert_eq!(filtered.len(), total);
979 }
980
981 #[test]
982 fn detect_multi_root_workspace_with_child_projects() {
983 let tmp = tempfile::tempdir().unwrap();
984 let workspace = tmp.path().join("workspace");
985 std::fs::create_dir_all(&workspace).unwrap();
986
987 let proj_a = workspace.join("project-a");
988 let proj_b = workspace.join("project-b");
989 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
990 std::fs::create_dir_all(&proj_b).unwrap();
991 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
992
993 let result = detect_multi_root_workspace(&workspace);
994 assert!(
995 result.is_some(),
996 "should detect workspace with 2 child projects"
997 );
998
999 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1000 }
1001
1002 #[test]
1003 fn detect_multi_root_workspace_returns_none_for_single_project() {
1004 let tmp = tempfile::tempdir().unwrap();
1005 let workspace = tmp.path().join("workspace");
1006 std::fs::create_dir_all(&workspace).unwrap();
1007
1008 let proj_a = workspace.join("project-a");
1009 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1010
1011 let result = detect_multi_root_workspace(&workspace);
1012 assert!(
1013 result.is_none(),
1014 "should not detect workspace with only 1 child project"
1015 );
1016 }
1017}