1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod pipeline_stages;
5pub mod registry;
6pub mod role_guard;
7pub mod tool_trait;
8
9use rmcp::handler::server::ServerHandler;
10use rmcp::model::{
11 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
12 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
13};
14use rmcp::service::{RequestContext, RoleServer};
15use rmcp::ErrorData;
16
17use crate::tools::{CrpMode, LeanCtxServer};
18
19impl ServerHandler for LeanCtxServer {
20 fn get_info(&self) -> ServerInfo {
21 let capabilities = ServerCapabilities::builder().enable_tools().build();
22
23 let config = crate::core::config::Config::load();
24 let level = crate::core::config::CompressionLevel::effective(&config);
25 let _ = crate::core::terse::rules_inject::inject(&level);
26
27 let instructions = crate::instructions::build_instructions(CrpMode::effective());
28
29 InitializeResult::new(capabilities)
30 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
31 .with_instructions(instructions)
32 }
33
34 async fn initialize(
35 &self,
36 request: InitializeRequestParams,
37 _context: RequestContext<RoleServer>,
38 ) -> Result<InitializeResult, ErrorData> {
39 let name = request.client_info.name.clone();
40 tracing::info!("MCP client connected: {:?}", name);
41 *self.client_name.write().await = name.clone();
42
43 let derived_root = derive_project_root_from_cwd();
44 let cwd_str = std::env::current_dir()
45 .ok()
46 .map(|p| p.to_string_lossy().to_string())
47 .unwrap_or_default();
48 {
49 let mut session = self.session.write().await;
50 if !cwd_str.is_empty() {
51 session.shell_cwd = Some(cwd_str.clone());
52 }
53 if let Some(ref root) = derived_root {
54 session.project_root = Some(root.clone());
55 tracing::info!("Project root set to: {root}");
56 } else if let Some(ref root) = session.project_root {
57 let root_path = std::path::Path::new(root);
58 let root_has_marker = has_project_marker(root_path);
59 let root_str = root_path.to_string_lossy();
60 let root_suspicious = root_str.contains("/.claude")
61 || root_str.contains("/.codex")
62 || root_str.contains("/var/folders/")
63 || root_str.contains("/tmp/")
64 || root_str.contains("\\.claude")
65 || root_str.contains("\\.codex")
66 || root_str.contains("\\AppData\\Local\\Temp")
67 || root_str.contains("\\Temp\\");
68 if root_suspicious && !root_has_marker {
69 session.project_root = None;
70 }
71 }
72 if self.session_mode == crate::tools::SessionMode::Shared {
73 if let Some(ref root) = session.project_root {
74 if let Some(ref rt) = self.context_os {
75 rt.shared_sessions.persist_best_effort(
76 root,
77 &self.workspace_id,
78 &self.channel_id,
79 &session,
80 );
81 rt.metrics.record_session_persisted();
82 }
83 }
84 } else {
85 let _ = session.save();
86 }
87 }
88
89 let agent_name = name.clone();
90 let agent_root = derived_root.clone().unwrap_or_default();
91 let agent_id_handle = self.agent_id.clone();
92 tokio::task::spawn_blocking(move || {
93 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
94 return;
95 }
96
97 let maintenance = crate::core::startup_guard::try_acquire_lock(
101 "startup-maintenance",
102 std::time::Duration::from_secs(2),
103 std::time::Duration::from_mins(2),
104 );
105 if maintenance.is_some() {
106 if let Some(home) = dirs::home_dir() {
107 let _ = crate::rules_inject::inject_all_rules(&home);
108 }
109 crate::hooks::refresh_installed_hooks();
110 crate::core::version_check::check_background();
111 }
112 drop(maintenance);
113
114 if !agent_root.is_empty() {
115 let heuristic_role = match agent_name.to_lowercase().as_str() {
116 n if n.contains("cursor") => Some("coder"),
117 n if n.contains("claude") => Some("coder"),
118 n if n.contains("codex") => Some("coder"),
119 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
120 n if n.contains("review") => Some("reviewer"),
121 n if n.contains("test") => Some("debugger"),
122 _ => None,
123 };
124 let env_role = std::env::var("LEAN_CTX_ROLE")
125 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
126 .ok();
127 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
128
129 let _ = crate::core::roles::set_active_role(effective_role);
130
131 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
132 registry.cleanup_stale(24);
133 let id = registry.register("mcp", Some(effective_role), &agent_root);
134 let _ = registry.save();
135 if let Ok(mut guard) = agent_id_handle.try_write() {
136 *guard = Some(id);
137 }
138 }
139 });
140
141 let instructions =
142 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
143 let capabilities = ServerCapabilities::builder().enable_tools().build();
144
145 Ok(InitializeResult::new(capabilities)
146 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
147 .with_instructions(instructions))
148 }
149
150 async fn list_tools(
151 &self,
152 _request: Option<PaginatedRequestParams>,
153 _context: RequestContext<RoleServer>,
154 ) -> Result<ListToolsResult, ErrorData> {
155 let all_tools = if crate::tool_defs::is_full_mode() {
156 crate::tool_defs::granular_tool_defs()
157 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
158 crate::tool_defs::unified_tool_defs()
159 } else {
160 crate::tool_defs::lazy_tool_defs()
161 };
162
163 let disabled = crate::core::config::Config::load().disabled_tools_effective();
164 let tools = if disabled.is_empty() {
165 all_tools
166 } else {
167 all_tools
168 .into_iter()
169 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
170 .collect()
171 };
172
173 let tools = {
174 let active = self.workflow.read().await.clone();
175 if let Some(run) = active {
176 if let Some(state) = run.spec.state(&run.current) {
177 if let Some(allowed) = &state.allowed_tools {
178 let mut allow: std::collections::HashSet<&str> =
179 allowed.iter().map(std::string::String::as_str).collect();
180 allow.insert("ctx");
181 allow.insert("ctx_workflow");
182 return Ok(ListToolsResult {
183 tools: tools
184 .into_iter()
185 .filter(|t| allow.contains(t.name.as_ref()))
186 .collect(),
187 ..Default::default()
188 });
189 }
190 }
191 }
192 tools
193 };
194
195 Ok(ListToolsResult {
196 tools,
197 ..Default::default()
198 })
199 }
200
201 async fn call_tool(
202 &self,
203 request: CallToolRequestParams,
204 _context: RequestContext<RoleServer>,
205 ) -> Result<CallToolResult, ErrorData> {
206 self.check_idle_expiry().await;
207
208 let original_name = request.name.as_ref().to_string();
209 let (resolved_name, resolved_args) = if original_name == "ctx" {
210 let sub = request
211 .arguments
212 .as_ref()
213 .and_then(|a| a.get("tool"))
214 .and_then(|v| v.as_str())
215 .map(std::string::ToString::to_string)
216 .ok_or_else(|| {
217 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
218 })?;
219 let tool_name = if sub.starts_with("ctx_") {
220 sub
221 } else {
222 format!("ctx_{sub}")
223 };
224 let mut args = request.arguments.unwrap_or_default();
225 args.remove("tool");
226 (tool_name, Some(args))
227 } else {
228 (original_name, request.arguments)
229 };
230 let name = resolved_name.as_str();
231 let args = resolved_args.as_ref();
232
233 let role_check = role_guard::check_tool_access(name);
234 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
235 tracing::warn!(
236 tool = name,
237 role = %role_check.role_name,
238 "Tool blocked by role policy"
239 );
240 return Ok(denied);
241 }
242
243 if name != "ctx_workflow" {
244 let active = self.workflow.read().await.clone();
245 if let Some(run) = active {
246 if let Some(state) = run.spec.state(&run.current) {
247 if let Some(allowed) = &state.allowed_tools {
248 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
249 if !allowed_ok {
250 let mut shown = allowed.clone();
251 shown.sort();
252 shown.truncate(30);
253 return Ok(CallToolResult::success(vec![Content::text(format!(
254 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
255 run.spec.name,
256 run.current,
257 shown.len(),
258 shown.join(", ")
259 ))]));
260 }
261 }
262 }
263 }
264 }
265
266 let auto_context = {
267 let task = {
268 let session = self.session.read().await;
269 session.task.as_ref().map(|t| t.description.clone())
270 };
271 let project_root = {
272 let session = self.session.read().await;
273 session.project_root.clone()
274 };
275 let mut cache = self.cache.write().await;
276 crate::tools::autonomy::session_lifecycle_pre_hook(
277 &self.autonomy,
278 name,
279 &mut cache,
280 task.as_deref(),
281 project_root.as_deref(),
282 CrpMode::effective(),
283 )
284 };
285
286 let throttle_result = {
287 let fp = args
288 .map(|a| {
289 crate::core::loop_detection::LoopDetector::fingerprint(
290 &serde_json::Value::Object(a.clone()),
291 )
292 })
293 .unwrap_or_default();
294 let mut detector = self.loop_detector.write().await;
295
296 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
297 let is_search_shell = name == "ctx_shell" && {
298 let cmd = args
299 .as_ref()
300 .and_then(|a| a.get("command"))
301 .and_then(|v| v.as_str())
302 .unwrap_or("");
303 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
304 };
305
306 if is_search || is_search_shell {
307 let search_pattern = args.and_then(|a| {
308 a.get("pattern")
309 .or_else(|| a.get("query"))
310 .and_then(|v| v.as_str())
311 });
312 let shell_pattern = if is_search_shell {
313 args.and_then(|a| a.get("command"))
314 .and_then(|v| v.as_str())
315 .and_then(helpers::extract_search_pattern_from_command)
316 } else {
317 None
318 };
319 let pat = search_pattern.or(shell_pattern.as_deref());
320 detector.record_search(name, &fp, pat)
321 } else {
322 detector.record_call(name, &fp)
323 }
324 };
325
326 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
327 let msg = throttle_result.message.unwrap_or_default();
328 return Ok(CallToolResult::success(vec![Content::text(msg)]));
329 }
330
331 let throttle_warning =
332 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
333 throttle_result.message.clone()
334 } else {
335 None
336 };
337
338 let config = crate::core::config::Config::load();
339 let minimal = config.minimal_overhead_effective();
340
341 {
342 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
343 let snap = BudgetTracker::global().check();
344 if *snap.worst_level() == BudgetLevel::Exhausted
345 && name != "ctx_session"
346 && name != "ctx_cost"
347 && name != "ctx_metrics"
348 {
349 for (dim, lvl, used, limit) in [
350 (
351 "tokens",
352 &snap.tokens.level,
353 format!("{}", snap.tokens.used),
354 format!("{}", snap.tokens.limit),
355 ),
356 (
357 "shell",
358 &snap.shell.level,
359 format!("{}", snap.shell.used),
360 format!("{}", snap.shell.limit),
361 ),
362 (
363 "cost",
364 &snap.cost.level,
365 format!("${:.2}", snap.cost.used_usd),
366 format!("${:.2}", snap.cost.limit_usd),
367 ),
368 ] {
369 if *lvl == BudgetLevel::Exhausted {
370 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
371 }
372 }
373 let msg = format!(
374 "[BUDGET EXHAUSTED] {}\n\
375 Use `ctx_session action=role` to check/switch roles, \
376 or `ctx_session action=reset` to start fresh.",
377 snap.format_compact()
378 );
379 tracing::warn!(tool = name, "{msg}");
380 return Ok(CallToolResult::success(vec![Content::text(msg)]));
381 }
382 }
383
384 if is_shell_tool_name(name) {
385 crate::core::budget_tracker::BudgetTracker::global().record_shell();
386 }
387
388 let tool_start = std::time::Instant::now();
389 let mut result_text = {
390 use futures::FutureExt;
391 use std::panic::AssertUnwindSafe;
392 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
393 .catch_unwind()
394 .await
395 {
396 Ok(Ok(text)) => text,
397 Ok(Err(e)) => return Err(e),
398 Err(panic_payload) => {
399 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
400 (*s).to_string()
401 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
402 s.clone()
403 } else {
404 "unknown".to_string()
405 };
406 tracing::error!("Tool '{name}' panicked: {detail}");
407 format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
408 The MCP server is still running. Please retry or use a different approach.")
409 }
410 }
411 };
412
413 let output_tokens = {
414 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
415 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
416 tokens
417 };
418
419 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
420 crate::core::anomaly::save();
422
423 let budget_warning = {
424 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
425 let snap = BudgetTracker::global().check();
426 if *snap.worst_level() == BudgetLevel::Warning {
427 for (dim, lvl, used, limit, pct) in [
428 (
429 "tokens",
430 &snap.tokens.level,
431 format!("{}", snap.tokens.used),
432 format!("{}", snap.tokens.limit),
433 snap.tokens.percent,
434 ),
435 (
436 "shell",
437 &snap.shell.level,
438 format!("{}", snap.shell.used),
439 format!("{}", snap.shell.limit),
440 snap.shell.percent,
441 ),
442 (
443 "cost",
444 &snap.cost.level,
445 format!("${:.2}", snap.cost.used_usd),
446 format!("${:.2}", snap.cost.limit_usd),
447 snap.cost.percent,
448 ),
449 ] {
450 if *lvl == BudgetLevel::Warning {
451 crate::core::events::emit_budget_warning(
452 &snap.role, dim, &used, &limit, pct,
453 );
454 }
455 }
456 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
457 } else {
458 None
459 }
460 };
461
462 let archive_hint = if minimal {
463 None
464 } else {
465 use crate::core::archive;
466 let archivable = matches!(
467 name,
468 "ctx_shell"
469 | "ctx_read"
470 | "ctx_multi_read"
471 | "ctx_smart_read"
472 | "ctx_execute"
473 | "ctx_search"
474 | "ctx_tree"
475 );
476 if archivable && archive::should_archive(&result_text) {
477 let cmd = helpers::get_str(args, "command")
478 .or_else(|| helpers::get_str(args, "path"))
479 .unwrap_or_default();
480 let session_id = self.session.read().await.id.clone();
481 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
482 let tokens = crate::core::tokens::count_tokens(&to_store);
483 archive::store(name, &cmd, &to_store, Some(&session_id))
484 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
485 } else {
486 None
487 }
488 };
489
490 let pre_compression = result_text.clone();
491 let compression = crate::core::config::CompressionLevel::effective(&config);
492 if compression.is_active() {
493 let terse_result =
494 crate::core::terse::pipeline::compress(&result_text, &compression, None);
495 if terse_result.quality_passed && terse_result.savings_pct >= 1.0 {
496 result_text = terse_result.output;
497 }
498 }
499
500 {
501 let verify_cfg = crate::core::profiles::active_profile().verification;
502 let vr = crate::core::output_verification::verify_output(
503 &pre_compression,
504 &result_text,
505 &verify_cfg,
506 );
507 if !vr.warnings.is_empty() {
508 let msg = format!("[VERIFY] {}", vr.format_compact());
509 result_text = format!("{result_text}\n\n{msg}");
510 }
511 }
512
513 if let Some(hint) = archive_hint {
514 result_text = format!("{result_text}\n{hint}");
515 }
516
517 if let Some(ctx) = auto_context {
518 result_text = format!("{ctx}\n\n{result_text}");
519 }
520
521 if let Some(warning) = throttle_warning {
522 result_text = format!("{result_text}\n\n{warning}");
523 }
524
525 if let Some(bw) = budget_warning {
526 result_text = format!("{result_text}\n\n{bw}");
527 }
528
529 if !self
530 .rules_stale_checked
531 .swap(true, std::sync::atomic::Ordering::Relaxed)
532 {
533 let client = self.client_name.read().await.clone();
534 if !client.is_empty() {
535 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
536 result_text = format!("{result_text}\n\n{stale_msg}");
537 }
538 }
539 }
540
541 {
542 let _ = crate::core::slo::evaluate();
544 }
545
546 if name == "ctx_read" {
547 if minimal {
548 let mut cache = self.cache.write().await;
549 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
550 } else {
551 let read_path = self
552 .resolve_path_or_passthrough(
553 &helpers::get_str(args, "path").unwrap_or_default(),
554 )
555 .await;
556 let project_root = {
557 let session = self.session.read().await;
558 session.project_root.clone()
559 };
560 let mut cache = self.cache.write().await;
561 let enrich = crate::tools::autonomy::enrich_after_read(
562 &self.autonomy,
563 &mut cache,
564 &read_path,
565 project_root.as_deref(),
566 None,
567 crate::tools::CrpMode::effective(),
568 false,
569 );
570 if let Some(hint) = enrich.related_hint {
571 result_text = format!("{result_text}\n{hint}");
572 }
573 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
574 }
575 }
576
577 if !minimal && name == "ctx_shell" {
578 let cmd = helpers::get_str(args, "command").unwrap_or_default();
579 let calls = self.tool_calls.read().await;
580 let last_original = calls.last().map_or(0, |c| c.original_tokens);
581 drop(calls);
582 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
583 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
584 &self.autonomy,
585 &cmd,
586 last_original,
587 pre_hint_tokens,
588 ) {
589 result_text = format!("{result_text}\n{hint}");
590 }
591 }
592
593 let output_token_count = crate::core::tokens::count_tokens(&result_text);
594 let action = helpers::get_str(args, "action");
595
596 const K_STALENESS_BOUND: i64 = 10;
598 if self.session_mode == crate::tools::SessionMode::Shared {
599 if let Some(ref rt) = self.context_os {
600 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
601 let cursor = self
602 .last_seen_event_id
603 .load(std::sync::atomic::Ordering::Relaxed);
604 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
605 let gap = latest - cursor;
606 result_text = format!(
607 "[CONTEXT STALE] {gap} events happened since your last read. \
608 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
609 );
610 }
611 self.last_seen_event_id
612 .store(latest, std::sync::atomic::Ordering::Relaxed);
613 }
614 }
615
616 {
617 let input = helpers::canonical_args_string(args);
618 let input_md5 = helpers::md5_hex_fast(&input);
619 let output_md5 = helpers::md5_hex_fast(&result_text);
620 let agent_id = self.agent_id.read().await.clone();
621 let client_name = self.client_name.read().await.clone();
622 let mut explicit_intent: Option<(
623 crate::core::intent_protocol::IntentRecord,
624 Option<String>,
625 String,
626 )> = None;
627
628 let pending_session_save = {
629 let empty_args = serde_json::Map::new();
630 let args_map = args.unwrap_or(&empty_args);
631 let mut session = self.session.write().await;
632 session.record_tool_receipt(
633 name,
634 action.as_deref(),
635 &input_md5,
636 &output_md5,
637 agent_id.as_deref(),
638 Some(&client_name),
639 );
640
641 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
642 name,
643 action.as_deref(),
644 args_map,
645 session.project_root.as_deref(),
646 ) {
647 let is_explicit =
648 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
649 let root = session.project_root.clone();
650 let sid = session.id.clone();
651 session.record_intent(intent.clone());
652 if is_explicit {
653 explicit_intent = Some((intent, root, sid));
654 }
655 }
656 if session.should_save() {
657 session.prepare_save().ok()
658 } else {
659 None
660 }
661 };
662
663 if let Some(prepared) = pending_session_save {
664 tokio::task::spawn_blocking(move || {
665 let _ = prepared.write_to_disk();
666 });
667 }
668
669 if let Some((intent, root, session_id)) = explicit_intent {
670 let _ = crate::core::intent_protocol::apply_side_effects(
671 &intent,
672 root.as_deref(),
673 &session_id,
674 );
675 }
676
677 if self.autonomy.is_enabled() {
678 let (calls, project_root) = {
679 let session = self.session.read().await;
680 (session.stats.total_tool_calls, session.project_root.clone())
681 };
682
683 if let Some(root) = project_root {
684 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
685 let root_clone = root.clone();
686 tokio::task::spawn_blocking(move || {
687 let _ = crate::core::consolidation_engine::consolidate_latest(
688 &root_clone,
689 crate::core::consolidation_engine::ConsolidationBudgets::default(),
690 );
691 });
692 }
693 }
694 }
695
696 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
697 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
698 let output_token_count_u64 = output_token_count as u64;
699 let name_owned = name.to_string();
700 tokio::task::spawn_blocking(move || {
701 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
702 let quote = pricing.quote_from_env_or_agent_type(&client_name);
703 let cost_usd =
704 quote
705 .cost
706 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
707 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
708
709 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
710 store.record_tool_call(
711 &agent_key,
712 &client_name,
713 &name_owned,
714 input_token_count,
715 output_token_count_u64,
716 0,
717 );
718 let _ = store.save();
719 });
720 }
721
722 if self.session_mode == crate::tools::SessionMode::Shared
724 && name == "ctx_knowledge"
725 && action.as_deref() == Some("remember")
726 {
727 if let Some(ref rt) = self.context_os {
728 let my_agent = self.agent_id.read().await.clone();
729 let category = helpers::get_str(args, "category");
730 let key = helpers::get_str(args, "key");
731 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
732 let recent = rt.bus.recent_by_kind(
733 &self.workspace_id,
734 &self.channel_id,
735 "knowledge_remembered",
736 20,
737 );
738 for ev in &recent {
739 let p = &ev.payload;
740 let ev_cat = p.get("category").and_then(|v| v.as_str());
741 let ev_key = p.get("key").and_then(|v| v.as_str());
742 let ev_actor = ev.actor.as_deref();
743 if ev_cat == Some(cat.as_str())
744 && ev_key == Some(k.as_str())
745 && ev_actor != my_agent.as_deref()
746 {
747 let other = ev_actor.unwrap_or("unknown");
748 result_text = format!(
749 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
750 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
751 );
752 break;
753 }
754 }
755 }
756 }
757 }
758
759 if self.session_mode == crate::tools::SessionMode::Shared {
761 let ws = self.workspace_id.clone();
762 let ch = self.channel_id.clone();
763 let rt = self.context_os.clone();
764 let agent = self.agent_id.read().await.clone();
765 let tool = name.to_string();
766 let tool_action = action.clone();
767 let tool_path = helpers::get_str(args, "path");
768 let tool_category = helpers::get_str(args, "category");
769 let tool_key = helpers::get_str(args, "key");
770 let session_snapshot = self.session.read().await.clone();
771 let session_task = session_snapshot.task.clone();
772 tokio::task::spawn_blocking(move || {
773 let Some(rt) = rt else {
774 return;
775 };
776 let Some(root) = session_snapshot.project_root.as_deref() else {
777 return;
778 };
779 rt.shared_sessions
780 .persist_best_effort(root, &ws, &ch, &session_snapshot);
781 rt.metrics.record_session_persisted();
782
783 let mut base_payload = serde_json::json!({
784 "tool": tool,
785 "action": tool_action,
786 });
787 if let Some(ref p) = tool_path {
788 base_payload["path"] = serde_json::Value::String(p.clone());
789 }
790 if let Some(ref c) = tool_category {
791 base_payload["category"] = serde_json::Value::String(c.clone());
792 }
793 if let Some(ref k) = tool_key {
794 base_payload["key"] = serde_json::Value::String(k.clone());
795 }
796 if let Some(ref t) = session_task {
797 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
798 }
799
800 if rt
801 .bus
802 .append(
803 &ws,
804 &ch,
805 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
806 agent.as_deref(),
807 base_payload.clone(),
808 )
809 .is_some()
810 {
811 rt.metrics.record_event_appended();
812 rt.metrics.record_event_broadcast();
813 }
814
815 if let Some(secondary) =
816 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
817 {
818 if rt
819 .bus
820 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
821 .is_some()
822 {
823 rt.metrics.record_event_appended();
824 rt.metrics.record_event_broadcast();
825 }
826 }
827 });
828 }
829
830 let skip_checkpoint = minimal
831 || matches!(
832 name,
833 "ctx_compress"
834 | "ctx_metrics"
835 | "ctx_benchmark"
836 | "ctx_analyze"
837 | "ctx_cache"
838 | "ctx_discover"
839 | "ctx_dedup"
840 | "ctx_session"
841 | "ctx_knowledge"
842 | "ctx_agent"
843 | "ctx_share"
844 | "ctx_wrapped"
845 | "ctx_overview"
846 | "ctx_preload"
847 | "ctx_cost"
848 | "ctx_gain"
849 | "ctx_heatmap"
850 | "ctx_task"
851 | "ctx_impact"
852 | "ctx_architecture"
853 | "ctx_workflow"
854 );
855
856 if !skip_checkpoint && self.increment_and_check() {
857 if let Some(checkpoint) = self.auto_checkpoint().await {
858 let interval = LeanCtxServer::checkpoint_interval_effective();
859 let combined = format!(
860 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
861 );
862 return Ok(CallToolResult::success(vec![Content::text(combined)]));
863 }
864 }
865
866 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
867 if tool_duration_ms > 100 {
868 LeanCtxServer::append_tool_call_log(
869 name,
870 tool_duration_ms,
871 0,
872 0,
873 None,
874 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
875 );
876 }
877
878 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
879 if current_count > 0 && current_count.is_multiple_of(100) {
880 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
881 }
882
883 Ok(CallToolResult::success(vec![Content::text(result_text)]))
884 }
885}
886
887pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
888 crate::instructions::build_instructions_for_test(crp_mode)
889}
890
891pub fn build_claude_code_instructions_for_test() -> String {
892 crate::instructions::claude_code_instructions()
893}
894
895const PROJECT_MARKERS: &[&str] = &[
896 ".git",
897 "Cargo.toml",
898 "package.json",
899 "go.mod",
900 "pyproject.toml",
901 "setup.py",
902 "pom.xml",
903 "build.gradle",
904 "Makefile",
905 ".lean-ctx.toml",
906];
907
908fn has_project_marker(dir: &std::path::Path) -> bool {
909 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
910}
911
912fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
913 if let Some(home) = dirs::home_dir() {
914 if dir == home {
915 return true;
916 }
917 }
918 let dir_str = dir.to_string_lossy();
919 dir_str.ends_with("/.claude")
920 || dir_str.ends_with("/.codex")
921 || dir_str.contains("/.claude/")
922 || dir_str.contains("/.codex/")
923}
924
925fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
926 std::process::Command::new("git")
927 .args(["rev-parse", "--show-toplevel"])
928 .current_dir(dir)
929 .stdout(std::process::Stdio::piped())
930 .stderr(std::process::Stdio::null())
931 .output()
932 .ok()
933 .and_then(|o| {
934 if o.status.success() {
935 String::from_utf8(o.stdout)
936 .ok()
937 .map(|s| s.trim().to_string())
938 } else {
939 None
940 }
941 })
942}
943
944pub fn derive_project_root_from_cwd() -> Option<String> {
945 let cwd = std::env::current_dir().ok()?;
946 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
947
948 if is_home_or_agent_dir(&canonical) {
949 return git_toplevel_from(&canonical);
950 }
951
952 if has_project_marker(&canonical) {
953 return Some(canonical.to_string_lossy().to_string());
954 }
955
956 if let Some(git_root) = git_toplevel_from(&canonical) {
957 return Some(git_root);
958 }
959
960 if let Some(root) = detect_multi_root_workspace(&canonical) {
961 return Some(root);
962 }
963
964 None
965}
966
967fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
971 let entries = std::fs::read_dir(dir).ok()?;
972 let mut child_projects: Vec<String> = Vec::new();
973
974 for entry in entries.flatten() {
975 let path = entry.path();
976 if path.is_dir() && has_project_marker(&path) {
977 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
978 child_projects.push(canonical.to_string_lossy().to_string());
979 }
980 }
981
982 if child_projects.len() >= 2 {
983 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
984 let sep = if cfg!(windows) { ";" } else { ":" };
985 let merged = if existing.is_empty() {
986 child_projects.join(sep)
987 } else {
988 format!("{existing}{sep}{}", child_projects.join(sep))
989 };
990 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
991 tracing::info!(
992 "Multi-root workspace detected at {}: auto-allowing {} child projects",
993 dir.display(),
994 child_projects.len()
995 );
996 return Some(dir.to_string_lossy().to_string());
997 }
998
999 None
1000}
1001
1002pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1003 crate::tool_defs::list_all_tool_defs()
1004 .into_iter()
1005 .map(|(name, desc, _)| (name, desc))
1006 .collect()
1007}
1008
1009pub fn tool_schemas_json_for_test() -> String {
1010 crate::tool_defs::list_all_tool_defs()
1011 .iter()
1012 .map(|(name, _, schema)| format!("{name}: {schema}"))
1013 .collect::<Vec<_>>()
1014 .join("\n")
1015}
1016
1017fn is_shell_tool_name(name: &str) -> bool {
1018 matches!(name, "ctx_shell" | "ctx_execute")
1019}
1020
1021#[cfg(test)]
1022mod tests {
1023 use super::*;
1024
1025 #[test]
1026 fn project_markers_detected() {
1027 let tmp = tempfile::tempdir().unwrap();
1028 let root = tmp.path().join("myproject");
1029 std::fs::create_dir_all(&root).unwrap();
1030 assert!(!has_project_marker(&root));
1031
1032 std::fs::create_dir(root.join(".git")).unwrap();
1033 assert!(has_project_marker(&root));
1034 }
1035
1036 #[test]
1037 fn home_dir_detected_as_agent_dir() {
1038 if let Some(home) = dirs::home_dir() {
1039 assert!(is_home_or_agent_dir(&home));
1040 }
1041 }
1042
1043 #[test]
1044 fn agent_dirs_detected() {
1045 let claude = std::path::PathBuf::from("/home/user/.claude");
1046 assert!(is_home_or_agent_dir(&claude));
1047 let codex = std::path::PathBuf::from("/home/user/.codex");
1048 assert!(is_home_or_agent_dir(&codex));
1049 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1050 assert!(!is_home_or_agent_dir(&project));
1051 }
1052
1053 #[test]
1054 fn test_unified_tool_count() {
1055 let tools = crate::tool_defs::unified_tool_defs();
1056 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1057 }
1058
1059 #[test]
1060 fn test_granular_tool_count() {
1061 let tools = crate::tool_defs::granular_tool_defs();
1062 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1063 }
1064
1065 #[test]
1066 fn disabled_tools_filters_list() {
1067 let all = crate::tool_defs::granular_tool_defs();
1068 let total = all.len();
1069 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1070 let filtered: Vec<_> = all
1071 .into_iter()
1072 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1073 .collect();
1074 assert_eq!(filtered.len(), total - 2);
1075 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1076 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1077 }
1078
1079 #[test]
1080 fn empty_disabled_tools_returns_all() {
1081 let all = crate::tool_defs::granular_tool_defs();
1082 let total = all.len();
1083 let disabled: Vec<String> = vec![];
1084 let filtered: Vec<_> = all
1085 .into_iter()
1086 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1087 .collect();
1088 assert_eq!(filtered.len(), total);
1089 }
1090
1091 #[test]
1092 fn misspelled_disabled_tool_is_silently_ignored() {
1093 let all = crate::tool_defs::granular_tool_defs();
1094 let total = all.len();
1095 let disabled = ["ctx_nonexistent_tool".to_string()];
1096 let filtered: Vec<_> = all
1097 .into_iter()
1098 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1099 .collect();
1100 assert_eq!(filtered.len(), total);
1101 }
1102
1103 #[test]
1104 fn detect_multi_root_workspace_with_child_projects() {
1105 let tmp = tempfile::tempdir().unwrap();
1106 let workspace = tmp.path().join("workspace");
1107 std::fs::create_dir_all(&workspace).unwrap();
1108
1109 let proj_a = workspace.join("project-a");
1110 let proj_b = workspace.join("project-b");
1111 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1112 std::fs::create_dir_all(&proj_b).unwrap();
1113 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1114
1115 let result = detect_multi_root_workspace(&workspace);
1116 assert!(
1117 result.is_some(),
1118 "should detect workspace with 2 child projects"
1119 );
1120
1121 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1122 }
1123
1124 #[test]
1125 fn detect_multi_root_workspace_returns_none_for_single_project() {
1126 let tmp = tempfile::tempdir().unwrap();
1127 let workspace = tmp.path().join("workspace");
1128 std::fs::create_dir_all(&workspace).unwrap();
1129
1130 let proj_a = workspace.join("project-a");
1131 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1132
1133 let result = detect_multi_root_workspace(&workspace);
1134 assert!(
1135 result.is_none(),
1136 "should not detect workspace with only 1 child project"
1137 );
1138 }
1139}