Skip to main content

lean_ctx/server/
mod.rs

1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod pipeline_stages;
5pub mod registry;
6pub mod role_guard;
7pub mod tool_trait;
8
9use rmcp::handler::server::ServerHandler;
10use rmcp::model::{
11    CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
12    InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
13};
14use rmcp::service::{RequestContext, RoleServer};
15use rmcp::ErrorData;
16
17use crate::tools::{CrpMode, LeanCtxServer};
18
19impl ServerHandler for LeanCtxServer {
20    fn get_info(&self) -> ServerInfo {
21        let capabilities = ServerCapabilities::builder().enable_tools().build();
22
23        let config = crate::core::config::Config::load();
24        let level = crate::core::config::CompressionLevel::effective(&config);
25        let _ = crate::core::terse::rules_inject::inject(&level);
26
27        let instructions = crate::instructions::build_instructions(CrpMode::effective());
28
29        InitializeResult::new(capabilities)
30            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
31            .with_instructions(instructions)
32    }
33
34    async fn initialize(
35        &self,
36        request: InitializeRequestParams,
37        _context: RequestContext<RoleServer>,
38    ) -> Result<InitializeResult, ErrorData> {
39        let name = request.client_info.name.clone();
40        tracing::info!("MCP client connected: {:?}", name);
41        *self.client_name.write().await = name.clone();
42
43        let derived_root = derive_project_root_from_cwd();
44        let cwd_str = std::env::current_dir()
45            .ok()
46            .map(|p| p.to_string_lossy().to_string())
47            .unwrap_or_default();
48        {
49            let mut session = self.session.write().await;
50            if !cwd_str.is_empty() {
51                session.shell_cwd = Some(cwd_str.clone());
52            }
53            if let Some(ref root) = derived_root {
54                session.project_root = Some(root.clone());
55                tracing::info!("Project root set to: {root}");
56            } else if let Some(ref root) = session.project_root {
57                let root_path = std::path::Path::new(root);
58                let root_has_marker = has_project_marker(root_path);
59                let root_str = root_path.to_string_lossy();
60                let root_suspicious = root_str.contains("/.claude")
61                    || root_str.contains("/.codex")
62                    || root_str.contains("/var/folders/")
63                    || root_str.contains("/tmp/")
64                    || root_str.contains("\\.claude")
65                    || root_str.contains("\\.codex")
66                    || root_str.contains("\\AppData\\Local\\Temp")
67                    || root_str.contains("\\Temp\\");
68                if root_suspicious && !root_has_marker {
69                    session.project_root = None;
70                }
71            }
72            if self.session_mode == crate::tools::SessionMode::Shared {
73                if let Some(ref root) = session.project_root {
74                    if let Some(ref rt) = self.context_os {
75                        rt.shared_sessions.persist_best_effort(
76                            root,
77                            &self.workspace_id,
78                            &self.channel_id,
79                            &session,
80                        );
81                        rt.metrics.record_session_persisted();
82                    }
83                }
84            } else {
85                let _ = session.save();
86            }
87        }
88
89        let agent_name = name.clone();
90        let agent_root = derived_root.clone().unwrap_or_default();
91        let agent_id_handle = self.agent_id.clone();
92        tokio::task::spawn_blocking(move || {
93            if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
94                return;
95            }
96
97            // Avoid startup stampedes when multiple agent sessions initialize at once.
98            // These are best-effort maintenance tasks; it's fine to skip if another
99            // lean-ctx instance is already doing them.
100            let maintenance = crate::core::startup_guard::try_acquire_lock(
101                "startup-maintenance",
102                std::time::Duration::from_secs(2),
103                std::time::Duration::from_mins(2),
104            );
105            if maintenance.is_some() {
106                if let Some(home) = dirs::home_dir() {
107                    let _ = crate::rules_inject::inject_all_rules(&home);
108                }
109                crate::hooks::refresh_installed_hooks();
110                crate::core::version_check::check_background();
111            }
112            drop(maintenance);
113
114            if !agent_root.is_empty() {
115                let heuristic_role = match agent_name.to_lowercase().as_str() {
116                    n if n.contains("cursor") => Some("coder"),
117                    n if n.contains("claude") => Some("coder"),
118                    n if n.contains("codex") => Some("coder"),
119                    n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
120                    n if n.contains("review") => Some("reviewer"),
121                    n if n.contains("test") => Some("debugger"),
122                    _ => None,
123                };
124                let env_role = std::env::var("LEAN_CTX_ROLE")
125                    .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
126                    .ok();
127                let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
128
129                let _ = crate::core::roles::set_active_role(effective_role);
130
131                let mut registry = crate::core::agents::AgentRegistry::load_or_create();
132                registry.cleanup_stale(24);
133                let id = registry.register("mcp", Some(effective_role), &agent_root);
134                let _ = registry.save();
135                if let Ok(mut guard) = agent_id_handle.try_write() {
136                    *guard = Some(id);
137                }
138            }
139        });
140
141        let instructions =
142            crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
143        let capabilities = ServerCapabilities::builder().enable_tools().build();
144
145        Ok(InitializeResult::new(capabilities)
146            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
147            .with_instructions(instructions))
148    }
149
150    async fn list_tools(
151        &self,
152        _request: Option<PaginatedRequestParams>,
153        _context: RequestContext<RoleServer>,
154    ) -> Result<ListToolsResult, ErrorData> {
155        let all_tools = if crate::tool_defs::is_full_mode() {
156            crate::tool_defs::granular_tool_defs()
157        } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
158            crate::tool_defs::unified_tool_defs()
159        } else {
160            crate::tool_defs::lazy_tool_defs()
161        };
162
163        let disabled = crate::core::config::Config::load().disabled_tools_effective();
164        let tools = if disabled.is_empty() {
165            all_tools
166        } else {
167            all_tools
168                .into_iter()
169                .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
170                .collect()
171        };
172
173        let tools = {
174            let active = self.workflow.read().await.clone();
175            if let Some(run) = active {
176                if let Some(state) = run.spec.state(&run.current) {
177                    if let Some(allowed) = &state.allowed_tools {
178                        let mut allow: std::collections::HashSet<&str> =
179                            allowed.iter().map(std::string::String::as_str).collect();
180                        allow.insert("ctx");
181                        allow.insert("ctx_workflow");
182                        return Ok(ListToolsResult {
183                            tools: tools
184                                .into_iter()
185                                .filter(|t| allow.contains(t.name.as_ref()))
186                                .collect(),
187                            ..Default::default()
188                        });
189                    }
190                }
191            }
192            tools
193        };
194
195        Ok(ListToolsResult {
196            tools,
197            ..Default::default()
198        })
199    }
200
201    async fn call_tool(
202        &self,
203        request: CallToolRequestParams,
204        _context: RequestContext<RoleServer>,
205    ) -> Result<CallToolResult, ErrorData> {
206        self.check_idle_expiry().await;
207
208        let original_name = request.name.as_ref().to_string();
209        let (resolved_name, resolved_args) = if original_name == "ctx" {
210            let sub = request
211                .arguments
212                .as_ref()
213                .and_then(|a| a.get("tool"))
214                .and_then(|v| v.as_str())
215                .map(std::string::ToString::to_string)
216                .ok_or_else(|| {
217                    ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
218                })?;
219            let tool_name = if sub.starts_with("ctx_") {
220                sub
221            } else {
222                format!("ctx_{sub}")
223            };
224            let mut args = request.arguments.unwrap_or_default();
225            args.remove("tool");
226            (tool_name, Some(args))
227        } else {
228            (original_name, request.arguments)
229        };
230        let name = resolved_name.as_str();
231        let args = resolved_args.as_ref();
232
233        let role_check = role_guard::check_tool_access(name);
234        if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
235            tracing::warn!(
236                tool = name,
237                role = %role_check.role_name,
238                "Tool blocked by role policy"
239            );
240            return Ok(denied);
241        }
242
243        if name != "ctx_workflow" {
244            let active = self.workflow.read().await.clone();
245            if let Some(run) = active {
246                if let Some(state) = run.spec.state(&run.current) {
247                    if let Some(allowed) = &state.allowed_tools {
248                        let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
249                        if !allowed_ok {
250                            let mut shown = allowed.clone();
251                            shown.sort();
252                            shown.truncate(30);
253                            return Ok(CallToolResult::success(vec![Content::text(format!(
254                                "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
255                                run.spec.name,
256                                run.current,
257                                shown.len(),
258                                shown.join(", ")
259                            ))]));
260                        }
261                    }
262                }
263            }
264        }
265
266        let auto_context = {
267            let task = {
268                let session = self.session.read().await;
269                session.task.as_ref().map(|t| t.description.clone())
270            };
271            let project_root = {
272                let session = self.session.read().await;
273                session.project_root.clone()
274            };
275            let mut cache = self.cache.write().await;
276            crate::tools::autonomy::session_lifecycle_pre_hook(
277                &self.autonomy,
278                name,
279                &mut cache,
280                task.as_deref(),
281                project_root.as_deref(),
282                CrpMode::effective(),
283            )
284        };
285
286        let throttle_result = {
287            let fp = args
288                .map(|a| {
289                    crate::core::loop_detection::LoopDetector::fingerprint(
290                        &serde_json::Value::Object(a.clone()),
291                    )
292                })
293                .unwrap_or_default();
294            let mut detector = self.loop_detector.write().await;
295
296            let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
297            let is_search_shell = name == "ctx_shell" && {
298                let cmd = args
299                    .as_ref()
300                    .and_then(|a| a.get("command"))
301                    .and_then(|v| v.as_str())
302                    .unwrap_or("");
303                crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
304            };
305
306            if is_search || is_search_shell {
307                let search_pattern = args.and_then(|a| {
308                    a.get("pattern")
309                        .or_else(|| a.get("query"))
310                        .and_then(|v| v.as_str())
311                });
312                let shell_pattern = if is_search_shell {
313                    args.and_then(|a| a.get("command"))
314                        .and_then(|v| v.as_str())
315                        .and_then(helpers::extract_search_pattern_from_command)
316                } else {
317                    None
318                };
319                let pat = search_pattern.or(shell_pattern.as_deref());
320                detector.record_search(name, &fp, pat)
321            } else {
322                detector.record_call(name, &fp)
323            }
324        };
325
326        if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
327            let msg = throttle_result.message.unwrap_or_default();
328            return Ok(CallToolResult::success(vec![Content::text(msg)]));
329        }
330
331        let throttle_warning =
332            if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
333                throttle_result.message.clone()
334            } else {
335                None
336            };
337
338        let config = crate::core::config::Config::load();
339        let minimal = config.minimal_overhead_effective();
340
341        {
342            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
343            let snap = BudgetTracker::global().check();
344            if *snap.worst_level() == BudgetLevel::Exhausted
345                && name != "ctx_session"
346                && name != "ctx_cost"
347                && name != "ctx_metrics"
348            {
349                for (dim, lvl, used, limit) in [
350                    (
351                        "tokens",
352                        &snap.tokens.level,
353                        format!("{}", snap.tokens.used),
354                        format!("{}", snap.tokens.limit),
355                    ),
356                    (
357                        "shell",
358                        &snap.shell.level,
359                        format!("{}", snap.shell.used),
360                        format!("{}", snap.shell.limit),
361                    ),
362                    (
363                        "cost",
364                        &snap.cost.level,
365                        format!("${:.2}", snap.cost.used_usd),
366                        format!("${:.2}", snap.cost.limit_usd),
367                    ),
368                ] {
369                    if *lvl == BudgetLevel::Exhausted {
370                        crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
371                    }
372                }
373                let msg = format!(
374                    "[BUDGET EXHAUSTED] {}\n\
375                     Use `ctx_session action=role` to check/switch roles, \
376                     or `ctx_session action=reset` to start fresh.",
377                    snap.format_compact()
378                );
379                tracing::warn!(tool = name, "{msg}");
380                return Ok(CallToolResult::success(vec![Content::text(msg)]));
381            }
382        }
383
384        if is_shell_tool_name(name) {
385            crate::core::budget_tracker::BudgetTracker::global().record_shell();
386        }
387
388        let tool_start = std::time::Instant::now();
389        let mut result_text = {
390            use futures::FutureExt;
391            use std::panic::AssertUnwindSafe;
392            match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
393                .catch_unwind()
394                .await
395            {
396                Ok(Ok(text)) => text,
397                Ok(Err(e)) => return Err(e),
398                Err(panic_payload) => {
399                    let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
400                        (*s).to_string()
401                    } else if let Some(s) = panic_payload.downcast_ref::<String>() {
402                        s.clone()
403                    } else {
404                        "unknown".to_string()
405                    };
406                    tracing::error!("Tool '{name}' panicked: {detail}");
407                    format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
408                             The MCP server is still running. Please retry or use a different approach.")
409                }
410            }
411        };
412
413        let output_tokens = {
414            let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
415            crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
416            tokens
417        };
418
419        crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
420        // Persist anomaly detector so dashboard state survives restarts.
421        crate::core::anomaly::save();
422
423        let budget_warning = {
424            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
425            let snap = BudgetTracker::global().check();
426            if *snap.worst_level() == BudgetLevel::Warning {
427                for (dim, lvl, used, limit, pct) in [
428                    (
429                        "tokens",
430                        &snap.tokens.level,
431                        format!("{}", snap.tokens.used),
432                        format!("{}", snap.tokens.limit),
433                        snap.tokens.percent,
434                    ),
435                    (
436                        "shell",
437                        &snap.shell.level,
438                        format!("{}", snap.shell.used),
439                        format!("{}", snap.shell.limit),
440                        snap.shell.percent,
441                    ),
442                    (
443                        "cost",
444                        &snap.cost.level,
445                        format!("${:.2}", snap.cost.used_usd),
446                        format!("${:.2}", snap.cost.limit_usd),
447                        snap.cost.percent,
448                    ),
449                ] {
450                    if *lvl == BudgetLevel::Warning {
451                        crate::core::events::emit_budget_warning(
452                            &snap.role, dim, &used, &limit, pct,
453                        );
454                    }
455                }
456                Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
457            } else {
458                None
459            }
460        };
461
462        let archive_hint = if minimal {
463            None
464        } else {
465            use crate::core::archive;
466            let archivable = matches!(
467                name,
468                "ctx_shell"
469                    | "ctx_read"
470                    | "ctx_multi_read"
471                    | "ctx_smart_read"
472                    | "ctx_execute"
473                    | "ctx_search"
474                    | "ctx_tree"
475            );
476            if archivable && archive::should_archive(&result_text) {
477                let cmd = helpers::get_str(args, "command")
478                    .or_else(|| helpers::get_str(args, "path"))
479                    .unwrap_or_default();
480                let session_id = self.session.read().await.id.clone();
481                let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
482                let tokens = crate::core::tokens::count_tokens(&to_store);
483                archive::store(name, &cmd, &to_store, Some(&session_id))
484                    .map(|id| archive::format_hint(&id, to_store.len(), tokens))
485            } else {
486                None
487            }
488        };
489
490        let pre_compression = result_text.clone();
491        let compression = crate::core::config::CompressionLevel::effective(&config);
492        if compression.is_active() {
493            let terse_result =
494                crate::core::terse::pipeline::compress(&result_text, &compression, None);
495            if terse_result.quality_passed && terse_result.savings_pct >= 1.0 {
496                result_text = terse_result.output;
497            }
498        }
499
500        {
501            let verify_cfg = crate::core::profiles::active_profile().verification;
502            let vr = crate::core::output_verification::verify_output(
503                &pre_compression,
504                &result_text,
505                &verify_cfg,
506            );
507            if !vr.warnings.is_empty() {
508                let msg = format!("[VERIFY] {}", vr.format_compact());
509                result_text = format!("{result_text}\n\n{msg}");
510            }
511        }
512
513        if let Some(hint) = archive_hint {
514            result_text = format!("{result_text}\n{hint}");
515        }
516
517        if let Some(ctx) = auto_context {
518            result_text = format!("{ctx}\n\n{result_text}");
519        }
520
521        if let Some(warning) = throttle_warning {
522            result_text = format!("{result_text}\n\n{warning}");
523        }
524
525        if let Some(bw) = budget_warning {
526            result_text = format!("{result_text}\n\n{bw}");
527        }
528
529        if !self
530            .rules_stale_checked
531            .swap(true, std::sync::atomic::Ordering::Relaxed)
532        {
533            let client = self.client_name.read().await.clone();
534            if !client.is_empty() {
535                if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
536                    result_text = format!("{result_text}\n\n{stale_msg}");
537                }
538            }
539        }
540
541        {
542            // Evaluate SLOs for observability (watch/dashboard), but keep tool outputs clean.
543            let _ = crate::core::slo::evaluate();
544        }
545
546        if name == "ctx_read" {
547            if minimal {
548                let mut cache = self.cache.write().await;
549                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
550            } else {
551                let read_path = self
552                    .resolve_path_or_passthrough(
553                        &helpers::get_str(args, "path").unwrap_or_default(),
554                    )
555                    .await;
556                let project_root = {
557                    let session = self.session.read().await;
558                    session.project_root.clone()
559                };
560                let mut cache = self.cache.write().await;
561                let enrich = crate::tools::autonomy::enrich_after_read(
562                    &self.autonomy,
563                    &mut cache,
564                    &read_path,
565                    project_root.as_deref(),
566                    None,
567                    crate::tools::CrpMode::effective(),
568                    false,
569                );
570                if let Some(hint) = enrich.related_hint {
571                    result_text = format!("{result_text}\n{hint}");
572                }
573                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
574            }
575        }
576
577        if !minimal && name == "ctx_shell" {
578            let cmd = helpers::get_str(args, "command").unwrap_or_default();
579            let calls = self.tool_calls.read().await;
580            let last_original = calls.last().map_or(0, |c| c.original_tokens);
581            drop(calls);
582            let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
583            if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
584                &self.autonomy,
585                &cmd,
586                last_original,
587                pre_hint_tokens,
588            ) {
589                result_text = format!("{result_text}\n{hint}");
590            }
591        }
592
593        let output_token_count = crate::core::tokens::count_tokens(&result_text);
594        let action = helpers::get_str(args, "action");
595
596        // K-bounded staleness guard: warn if shared context has diverged.
597        const K_STALENESS_BOUND: i64 = 10;
598        if self.session_mode == crate::tools::SessionMode::Shared {
599            if let Some(ref rt) = self.context_os {
600                let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
601                let cursor = self
602                    .last_seen_event_id
603                    .load(std::sync::atomic::Ordering::Relaxed);
604                if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
605                    let gap = latest - cursor;
606                    result_text = format!(
607                        "[CONTEXT STALE] {gap} events happened since your last read. \
608                         Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
609                    );
610                }
611                self.last_seen_event_id
612                    .store(latest, std::sync::atomic::Ordering::Relaxed);
613            }
614        }
615
616        {
617            let input = helpers::canonical_args_string(args);
618            let input_md5 = helpers::md5_hex_fast(&input);
619            let output_md5 = helpers::md5_hex_fast(&result_text);
620            let agent_id = self.agent_id.read().await.clone();
621            let client_name = self.client_name.read().await.clone();
622            let mut explicit_intent: Option<(
623                crate::core::intent_protocol::IntentRecord,
624                Option<String>,
625                String,
626            )> = None;
627
628            let pending_session_save = {
629                let empty_args = serde_json::Map::new();
630                let args_map = args.unwrap_or(&empty_args);
631                let mut session = self.session.write().await;
632                session.record_tool_receipt(
633                    name,
634                    action.as_deref(),
635                    &input_md5,
636                    &output_md5,
637                    agent_id.as_deref(),
638                    Some(&client_name),
639                );
640
641                if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
642                    name,
643                    action.as_deref(),
644                    args_map,
645                    session.project_root.as_deref(),
646                ) {
647                    let is_explicit =
648                        intent.source == crate::core::intent_protocol::IntentSource::Explicit;
649                    let root = session.project_root.clone();
650                    let sid = session.id.clone();
651                    session.record_intent(intent.clone());
652                    if is_explicit {
653                        explicit_intent = Some((intent, root, sid));
654                    }
655                }
656                if session.should_save() {
657                    session.prepare_save().ok()
658                } else {
659                    None
660                }
661            };
662
663            if let Some(prepared) = pending_session_save {
664                tokio::task::spawn_blocking(move || {
665                    let _ = prepared.write_to_disk();
666                });
667            }
668
669            if let Some((intent, root, session_id)) = explicit_intent {
670                let _ = crate::core::intent_protocol::apply_side_effects(
671                    &intent,
672                    root.as_deref(),
673                    &session_id,
674                );
675            }
676
677            if self.autonomy.is_enabled() {
678                let (calls, project_root) = {
679                    let session = self.session.read().await;
680                    (session.stats.total_tool_calls, session.project_root.clone())
681                };
682
683                if let Some(root) = project_root {
684                    if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
685                        let root_clone = root.clone();
686                        tokio::task::spawn_blocking(move || {
687                            let _ = crate::core::consolidation_engine::consolidate_latest(
688                                &root_clone,
689                                crate::core::consolidation_engine::ConsolidationBudgets::default(),
690                            );
691                        });
692                    }
693                }
694            }
695
696            let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
697            let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
698            let output_token_count_u64 = output_token_count as u64;
699            let name_owned = name.to_string();
700            tokio::task::spawn_blocking(move || {
701                let pricing = crate::core::gain::model_pricing::ModelPricing::load();
702                let quote = pricing.quote_from_env_or_agent_type(&client_name);
703                let cost_usd =
704                    quote
705                        .cost
706                        .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
707                crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
708
709                let mut store = crate::core::a2a::cost_attribution::CostStore::load();
710                store.record_tool_call(
711                    &agent_key,
712                    &client_name,
713                    &name_owned,
714                    input_token_count,
715                    output_token_count_u64,
716                    0,
717                );
718                let _ = store.save();
719            });
720        }
721
722        // Context Bus: conflict detection for knowledge writes in shared mode.
723        if self.session_mode == crate::tools::SessionMode::Shared
724            && name == "ctx_knowledge"
725            && action.as_deref() == Some("remember")
726        {
727            if let Some(ref rt) = self.context_os {
728                let my_agent = self.agent_id.read().await.clone();
729                let category = helpers::get_str(args, "category");
730                let key = helpers::get_str(args, "key");
731                if let (Some(ref cat), Some(ref k)) = (&category, &key) {
732                    let recent = rt.bus.recent_by_kind(
733                        &self.workspace_id,
734                        &self.channel_id,
735                        "knowledge_remembered",
736                        20,
737                    );
738                    for ev in &recent {
739                        let p = &ev.payload;
740                        let ev_cat = p.get("category").and_then(|v| v.as_str());
741                        let ev_key = p.get("key").and_then(|v| v.as_str());
742                        let ev_actor = ev.actor.as_deref();
743                        if ev_cat == Some(cat.as_str())
744                            && ev_key == Some(k.as_str())
745                            && ev_actor != my_agent.as_deref()
746                        {
747                            let other = ev_actor.unwrap_or("unknown");
748                            result_text = format!(
749                                "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
750                                 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
751                            );
752                            break;
753                        }
754                    }
755                }
756            }
757        }
758
759        // Context OS: persist shared session + publish events.
760        if self.session_mode == crate::tools::SessionMode::Shared {
761            let ws = self.workspace_id.clone();
762            let ch = self.channel_id.clone();
763            let rt = self.context_os.clone();
764            let agent = self.agent_id.read().await.clone();
765            let tool = name.to_string();
766            let tool_action = action.clone();
767            let tool_path = helpers::get_str(args, "path");
768            let tool_category = helpers::get_str(args, "category");
769            let tool_key = helpers::get_str(args, "key");
770            let session_snapshot = self.session.read().await.clone();
771            let session_task = session_snapshot.task.clone();
772            tokio::task::spawn_blocking(move || {
773                let Some(rt) = rt else {
774                    return;
775                };
776                let Some(root) = session_snapshot.project_root.as_deref() else {
777                    return;
778                };
779                rt.shared_sessions
780                    .persist_best_effort(root, &ws, &ch, &session_snapshot);
781                rt.metrics.record_session_persisted();
782
783                let mut base_payload = serde_json::json!({
784                    "tool": tool,
785                    "action": tool_action,
786                });
787                if let Some(ref p) = tool_path {
788                    base_payload["path"] = serde_json::Value::String(p.clone());
789                }
790                if let Some(ref c) = tool_category {
791                    base_payload["category"] = serde_json::Value::String(c.clone());
792                }
793                if let Some(ref k) = tool_key {
794                    base_payload["key"] = serde_json::Value::String(k.clone());
795                }
796                if let Some(ref t) = session_task {
797                    base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
798                }
799
800                if rt
801                    .bus
802                    .append(
803                        &ws,
804                        &ch,
805                        &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
806                        agent.as_deref(),
807                        base_payload.clone(),
808                    )
809                    .is_some()
810                {
811                    rt.metrics.record_event_appended();
812                    rt.metrics.record_event_broadcast();
813                }
814
815                if let Some(secondary) =
816                    crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
817                {
818                    if rt
819                        .bus
820                        .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
821                        .is_some()
822                    {
823                        rt.metrics.record_event_appended();
824                        rt.metrics.record_event_broadcast();
825                    }
826                }
827            });
828        }
829
830        let skip_checkpoint = minimal
831            || matches!(
832                name,
833                "ctx_compress"
834                    | "ctx_metrics"
835                    | "ctx_benchmark"
836                    | "ctx_analyze"
837                    | "ctx_cache"
838                    | "ctx_discover"
839                    | "ctx_dedup"
840                    | "ctx_session"
841                    | "ctx_knowledge"
842                    | "ctx_agent"
843                    | "ctx_share"
844                    | "ctx_wrapped"
845                    | "ctx_overview"
846                    | "ctx_preload"
847                    | "ctx_cost"
848                    | "ctx_gain"
849                    | "ctx_heatmap"
850                    | "ctx_task"
851                    | "ctx_impact"
852                    | "ctx_architecture"
853                    | "ctx_workflow"
854            );
855
856        if !skip_checkpoint && self.increment_and_check() {
857            if let Some(checkpoint) = self.auto_checkpoint().await {
858                let interval = LeanCtxServer::checkpoint_interval_effective();
859                let combined = format!(
860                    "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
861                );
862                return Ok(CallToolResult::success(vec![Content::text(combined)]));
863            }
864        }
865
866        let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
867        if tool_duration_ms > 100 {
868            LeanCtxServer::append_tool_call_log(
869                name,
870                tool_duration_ms,
871                0,
872                0,
873                None,
874                &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
875            );
876        }
877
878        let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
879        if current_count > 0 && current_count.is_multiple_of(100) {
880            std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
881        }
882
883        Ok(CallToolResult::success(vec![Content::text(result_text)]))
884    }
885}
886
887pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
888    crate::instructions::build_instructions_for_test(crp_mode)
889}
890
891pub fn build_claude_code_instructions_for_test() -> String {
892    crate::instructions::claude_code_instructions()
893}
894
895const PROJECT_MARKERS: &[&str] = &[
896    ".git",
897    "Cargo.toml",
898    "package.json",
899    "go.mod",
900    "pyproject.toml",
901    "setup.py",
902    "pom.xml",
903    "build.gradle",
904    "Makefile",
905    ".lean-ctx.toml",
906];
907
908fn has_project_marker(dir: &std::path::Path) -> bool {
909    PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
910}
911
912fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
913    if let Some(home) = dirs::home_dir() {
914        if dir == home {
915            return true;
916        }
917    }
918    let dir_str = dir.to_string_lossy();
919    dir_str.ends_with("/.claude")
920        || dir_str.ends_with("/.codex")
921        || dir_str.contains("/.claude/")
922        || dir_str.contains("/.codex/")
923}
924
925fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
926    std::process::Command::new("git")
927        .args(["rev-parse", "--show-toplevel"])
928        .current_dir(dir)
929        .stdout(std::process::Stdio::piped())
930        .stderr(std::process::Stdio::null())
931        .output()
932        .ok()
933        .and_then(|o| {
934            if o.status.success() {
935                String::from_utf8(o.stdout)
936                    .ok()
937                    .map(|s| s.trim().to_string())
938            } else {
939                None
940            }
941        })
942}
943
944pub fn derive_project_root_from_cwd() -> Option<String> {
945    let cwd = std::env::current_dir().ok()?;
946    let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
947
948    if is_home_or_agent_dir(&canonical) {
949        return git_toplevel_from(&canonical);
950    }
951
952    if has_project_marker(&canonical) {
953        return Some(canonical.to_string_lossy().to_string());
954    }
955
956    if let Some(git_root) = git_toplevel_from(&canonical) {
957        return Some(git_root);
958    }
959
960    if let Some(root) = detect_multi_root_workspace(&canonical) {
961        return Some(root);
962    }
963
964    None
965}
966
967/// Detect a multi-root workspace: a directory that has no project markers
968/// itself, but contains child directories that do. In this case, use the
969/// parent as jail root and auto-allow all child projects via LEAN_CTX_ALLOW_PATH.
970fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
971    let entries = std::fs::read_dir(dir).ok()?;
972    let mut child_projects: Vec<String> = Vec::new();
973
974    for entry in entries.flatten() {
975        let path = entry.path();
976        if path.is_dir() && has_project_marker(&path) {
977            let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
978            child_projects.push(canonical.to_string_lossy().to_string());
979        }
980    }
981
982    if child_projects.len() >= 2 {
983        let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
984        let sep = if cfg!(windows) { ";" } else { ":" };
985        let merged = if existing.is_empty() {
986            child_projects.join(sep)
987        } else {
988            format!("{existing}{sep}{}", child_projects.join(sep))
989        };
990        std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
991        tracing::info!(
992            "Multi-root workspace detected at {}: auto-allowing {} child projects",
993            dir.display(),
994            child_projects.len()
995        );
996        return Some(dir.to_string_lossy().to_string());
997    }
998
999    None
1000}
1001
1002pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1003    crate::tool_defs::list_all_tool_defs()
1004        .into_iter()
1005        .map(|(name, desc, _)| (name, desc))
1006        .collect()
1007}
1008
1009pub fn tool_schemas_json_for_test() -> String {
1010    crate::tool_defs::list_all_tool_defs()
1011        .iter()
1012        .map(|(name, _, schema)| format!("{name}: {schema}"))
1013        .collect::<Vec<_>>()
1014        .join("\n")
1015}
1016
1017fn is_shell_tool_name(name: &str) -> bool {
1018    matches!(name, "ctx_shell" | "ctx_execute")
1019}
1020
1021#[cfg(test)]
1022mod tests {
1023    use super::*;
1024
1025    #[test]
1026    fn project_markers_detected() {
1027        let tmp = tempfile::tempdir().unwrap();
1028        let root = tmp.path().join("myproject");
1029        std::fs::create_dir_all(&root).unwrap();
1030        assert!(!has_project_marker(&root));
1031
1032        std::fs::create_dir(root.join(".git")).unwrap();
1033        assert!(has_project_marker(&root));
1034    }
1035
1036    #[test]
1037    fn home_dir_detected_as_agent_dir() {
1038        if let Some(home) = dirs::home_dir() {
1039            assert!(is_home_or_agent_dir(&home));
1040        }
1041    }
1042
1043    #[test]
1044    fn agent_dirs_detected() {
1045        let claude = std::path::PathBuf::from("/home/user/.claude");
1046        assert!(is_home_or_agent_dir(&claude));
1047        let codex = std::path::PathBuf::from("/home/user/.codex");
1048        assert!(is_home_or_agent_dir(&codex));
1049        let project = std::path::PathBuf::from("/home/user/projects/myapp");
1050        assert!(!is_home_or_agent_dir(&project));
1051    }
1052
1053    #[test]
1054    fn test_unified_tool_count() {
1055        let tools = crate::tool_defs::unified_tool_defs();
1056        assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1057    }
1058
1059    #[test]
1060    fn test_granular_tool_count() {
1061        let tools = crate::tool_defs::granular_tool_defs();
1062        assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1063    }
1064
1065    #[test]
1066    fn disabled_tools_filters_list() {
1067        let all = crate::tool_defs::granular_tool_defs();
1068        let total = all.len();
1069        let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1070        let filtered: Vec<_> = all
1071            .into_iter()
1072            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1073            .collect();
1074        assert_eq!(filtered.len(), total - 2);
1075        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1076        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1077    }
1078
1079    #[test]
1080    fn empty_disabled_tools_returns_all() {
1081        let all = crate::tool_defs::granular_tool_defs();
1082        let total = all.len();
1083        let disabled: Vec<String> = vec![];
1084        let filtered: Vec<_> = all
1085            .into_iter()
1086            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1087            .collect();
1088        assert_eq!(filtered.len(), total);
1089    }
1090
1091    #[test]
1092    fn misspelled_disabled_tool_is_silently_ignored() {
1093        let all = crate::tool_defs::granular_tool_defs();
1094        let total = all.len();
1095        let disabled = ["ctx_nonexistent_tool".to_string()];
1096        let filtered: Vec<_> = all
1097            .into_iter()
1098            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1099            .collect();
1100        assert_eq!(filtered.len(), total);
1101    }
1102
1103    #[test]
1104    fn detect_multi_root_workspace_with_child_projects() {
1105        let tmp = tempfile::tempdir().unwrap();
1106        let workspace = tmp.path().join("workspace");
1107        std::fs::create_dir_all(&workspace).unwrap();
1108
1109        let proj_a = workspace.join("project-a");
1110        let proj_b = workspace.join("project-b");
1111        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1112        std::fs::create_dir_all(&proj_b).unwrap();
1113        std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1114
1115        let result = detect_multi_root_workspace(&workspace);
1116        assert!(
1117            result.is_some(),
1118            "should detect workspace with 2 child projects"
1119        );
1120
1121        std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1122    }
1123
1124    #[test]
1125    fn detect_multi_root_workspace_returns_none_for_single_project() {
1126        let tmp = tempfile::tempdir().unwrap();
1127        let workspace = tmp.path().join("workspace");
1128        std::fs::create_dir_all(&workspace).unwrap();
1129
1130        let proj_a = workspace.join("project-a");
1131        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1132
1133        let result = detect_multi_root_workspace(&workspace);
1134        assert!(
1135            result.is_none(),
1136            "should not detect workspace with only 1 child project"
1137        );
1138    }
1139}