1pub mod context_gate;
2mod dispatch;
3pub mod dynamic_tools;
4pub mod elicitation;
5pub(crate) mod execute;
6pub mod helpers;
7pub mod notifications;
8pub mod prompts;
9pub mod reference_store;
10pub mod registry;
11pub mod resources;
12pub mod role_guard;
13pub mod tool_trait;
14
15use rmcp::handler::server::ServerHandler;
16use rmcp::model::{
17 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
18 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
19};
20use rmcp::service::{RequestContext, RoleServer};
21use rmcp::ErrorData;
22
23use crate::tools::{CrpMode, LeanCtxServer};
24
25impl ServerHandler for LeanCtxServer {
26 fn get_info(&self) -> ServerInfo {
27 let capabilities = ServerCapabilities::builder()
28 .enable_tools()
29 .enable_resources()
30 .enable_resources_subscribe()
31 .enable_prompts()
32 .build();
33
34 let config = crate::core::config::Config::load();
35 let level = crate::core::config::CompressionLevel::effective(&config);
36 let _ = crate::core::terse::rules_inject::inject(&level);
37
38 let instructions = crate::instructions::build_instructions(CrpMode::effective());
39
40 InitializeResult::new(capabilities)
41 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
42 .with_instructions(instructions)
43 }
44
45 async fn initialize(
46 &self,
47 request: InitializeRequestParams,
48 context: RequestContext<RoleServer>,
49 ) -> Result<InitializeResult, ErrorData> {
50 let name = request.client_info.name.clone();
51 tracing::info!("MCP client connected: {:?}", name);
52 *self.client_name.write().await = name.clone();
53 *self.peer.write().await = Some(context.peer.clone());
54
55 if self.session_mode != crate::tools::SessionMode::Shared {
56 crate::core::budget_tracker::BudgetTracker::global().reset();
57 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
58 let radar = data_dir.join("context_radar.jsonl");
59 if radar.exists() {
60 let prev = data_dir.join("context_radar.prev.jsonl");
61 let _ = std::fs::rename(&radar, &prev);
62 }
63 }
64 }
65
66 let derived_root = derive_project_root_from_cwd();
67 let cwd_str = std::env::current_dir()
68 .ok()
69 .map(|p| p.to_string_lossy().to_string())
70 .unwrap_or_default();
71 {
72 let mut session = self.session.write().await;
73 if !cwd_str.is_empty() {
74 session.shell_cwd = Some(cwd_str.clone());
75 }
76 if let Some(ref root) = derived_root {
77 session.project_root = Some(root.clone());
78 tracing::info!("Project root set to: {root}");
79 } else if let Some(ref root) = session.project_root {
80 let root_path = std::path::Path::new(root);
81 let root_has_marker = has_project_marker(root_path);
82 let root_str = root_path.to_string_lossy();
83 let root_suspicious = root_str.contains("/.claude")
84 || root_str.contains("/.codex")
85 || root_str.contains("/var/folders/")
86 || root_str.contains("/tmp/")
87 || root_str.contains("\\.claude")
88 || root_str.contains("\\.codex")
89 || root_str.contains("\\AppData\\Local\\Temp")
90 || root_str.contains("\\Temp\\");
91 if root_suspicious && !root_has_marker {
92 session.project_root = None;
93 }
94 }
95 if self.session_mode == crate::tools::SessionMode::Shared {
96 if let Some(ref root) = session.project_root {
97 if let Some(ref rt) = self.context_os {
98 rt.shared_sessions.persist_best_effort(
99 root,
100 &self.workspace_id,
101 &self.channel_id,
102 &session,
103 );
104 rt.metrics.record_session_persisted();
105 }
106 }
107 } else {
108 let _ = session.save();
109 }
110 }
111
112 let agent_name = name.clone();
113 let agent_root = derived_root.clone().unwrap_or_default();
114 let agent_id_handle = self.agent_id.clone();
115 tokio::task::spawn_blocking(move || {
116 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
117 return;
118 }
119
120 let maintenance = crate::core::startup_guard::try_acquire_lock(
124 "startup-maintenance",
125 std::time::Duration::from_secs(2),
126 std::time::Duration::from_mins(2),
127 );
128 if maintenance.is_some() {
129 if let Some(home) = dirs::home_dir() {
130 let _ = crate::rules_inject::inject_all_rules(&home);
131 }
132 crate::hooks::refresh_installed_hooks();
133 crate::core::version_check::check_background();
134 }
135 drop(maintenance);
136
137 if !agent_root.is_empty() {
138 let heuristic_role = match agent_name.to_lowercase().as_str() {
139 n if n.contains("cursor") => Some("coder"),
140 n if n.contains("claude") => Some("coder"),
141 n if n.contains("codex") => Some("coder"),
142 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
143 n if n.contains("review") => Some("reviewer"),
144 n if n.contains("test") => Some("debugger"),
145 _ => None,
146 };
147 let env_role = std::env::var("LEAN_CTX_ROLE")
148 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
149 .ok();
150 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
151
152 let _ = crate::core::roles::set_active_role(effective_role);
153
154 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
155 registry.cleanup_stale(24);
156 let id = registry.register("mcp", Some(effective_role), &agent_root);
157 let _ = registry.save();
158 if let Ok(mut guard) = agent_id_handle.try_write() {
159 *guard = Some(id);
160 }
161 }
162 });
163
164 let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
165 tracing::info!("Client capabilities: {}", client_caps.format_summary());
166
167 if client_caps.dynamic_tools {
168 if let Ok(mut dt) = dynamic_tools::global().lock() {
169 dt.set_supports_list_changed(true);
170 }
171 }
172 if let Some(max) = client_caps.max_tools {
173 if let Ok(mut dt) = dynamic_tools::global().lock() {
174 dt.set_supports_list_changed(true);
175 if max < 100 {
176 dt.unload_category(dynamic_tools::ToolCategory::Debug);
177 dt.unload_category(dynamic_tools::ToolCategory::Memory);
178 }
179 }
180 }
181
182 crate::core::client_capabilities::set_detected(&client_caps);
183
184 let instructions =
185 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
186
187 let capabilities = match (client_caps.resources, client_caps.prompts) {
188 (true, true) => ServerCapabilities::builder()
189 .enable_tools()
190 .enable_resources()
191 .enable_resources_subscribe()
192 .enable_prompts()
193 .build(),
194 (true, false) => ServerCapabilities::builder()
195 .enable_tools()
196 .enable_resources()
197 .enable_resources_subscribe()
198 .build(),
199 (false, true) => ServerCapabilities::builder()
200 .enable_tools()
201 .enable_prompts()
202 .build(),
203 (false, false) => ServerCapabilities::builder().enable_tools().build(),
204 };
205
206 Ok(InitializeResult::new(capabilities)
207 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
208 .with_instructions(instructions))
209 }
210
211 async fn list_tools(
212 &self,
213 _request: Option<PaginatedRequestParams>,
214 _context: RequestContext<RoleServer>,
215 ) -> Result<ListToolsResult, ErrorData> {
216 let all_tools = if crate::tool_defs::is_full_mode() {
217 crate::tool_defs::granular_tool_defs()
218 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
219 crate::tool_defs::unified_tool_defs()
220 } else {
221 crate::tool_defs::lazy_tool_defs()
222 };
223
224 let disabled = crate::core::config::Config::load().disabled_tools_effective();
225 let client = self.client_name.read().await.clone();
226 let is_zed = !client.is_empty() && client.to_lowercase().contains("zed");
227
228 let tools: Vec<_> = all_tools
229 .into_iter()
230 .filter(|t| {
231 let name = t.name.as_ref();
232 if !disabled.is_empty() && disabled.iter().any(|d| d.as_str() == name) {
233 return false;
234 }
235 if is_zed && name == "ctx_edit" {
236 return false;
237 }
238 true
239 })
240 .collect();
241
242 let tools = {
243 let dyn_state = dynamic_tools::global().lock().unwrap();
244 if dyn_state.supports_list_changed() {
245 tools
246 .into_iter()
247 .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
248 .collect()
249 } else {
250 tools
251 }
252 };
253
254 let tools = {
255 let active = self.workflow.read().await.clone();
256 if let Some(run) = active {
257 if let Some(state) = run.spec.state(&run.current) {
258 if let Some(allowed) = &state.allowed_tools {
259 let mut allow: std::collections::HashSet<&str> =
260 allowed.iter().map(std::string::String::as_str).collect();
261 allow.insert("ctx");
262 allow.insert("ctx_workflow");
263 return Ok(ListToolsResult {
264 tools: tools
265 .into_iter()
266 .filter(|t| allow.contains(t.name.as_ref()))
267 .collect(),
268 ..Default::default()
269 });
270 }
271 }
272 }
273 tools
274 };
275
276 let tools = {
277 let cfg = crate::core::config::Config::load();
278 let level = crate::core::config::CompressionLevel::effective(&cfg);
279 let mode =
280 crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
281 if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
282 tools
283 } else {
284 tools
285 .into_iter()
286 .map(|mut t| {
287 let compressed = crate::core::terse::mcp_compress::compress_description(
288 t.name.as_ref(),
289 t.description.as_deref().unwrap_or(""),
290 mode,
291 );
292 t.description = Some(compressed.into());
293 t
294 })
295 .collect()
296 }
297 };
298
299 Ok(ListToolsResult {
300 tools,
301 ..Default::default()
302 })
303 }
304
305 async fn list_prompts(
306 &self,
307 _request: Option<PaginatedRequestParams>,
308 _context: RequestContext<RoleServer>,
309 ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
310 Ok(rmcp::model::ListPromptsResult::with_all_items(
311 prompts::list_prompts(),
312 ))
313 }
314
315 async fn get_prompt(
316 &self,
317 request: rmcp::model::GetPromptRequestParams,
318 _context: RequestContext<RoleServer>,
319 ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
320 let ledger = self.ledger.read().await;
321 match prompts::get_prompt(&request, &ledger) {
322 Some(result) => Ok(result),
323 None => Err(ErrorData::invalid_params(
324 format!("Unknown prompt: {}", request.name),
325 None,
326 )),
327 }
328 }
329
330 async fn list_resources(
331 &self,
332 _request: Option<PaginatedRequestParams>,
333 _context: RequestContext<RoleServer>,
334 ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
335 Ok(rmcp::model::ListResourcesResult::with_all_items(
336 resources::list_resources(),
337 ))
338 }
339
340 async fn read_resource(
341 &self,
342 request: rmcp::model::ReadResourceRequestParams,
343 _context: RequestContext<RoleServer>,
344 ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
345 let ledger = self.ledger.read().await;
346 match resources::read_resource(&request.uri, &ledger) {
347 Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
348 None => Err(rmcp::ErrorData::resource_not_found(
349 format!("Unknown resource: {}", request.uri),
350 None,
351 )),
352 }
353 }
354
355 async fn call_tool(
356 &self,
357 request: CallToolRequestParams,
358 _context: RequestContext<RoleServer>,
359 ) -> Result<CallToolResult, ErrorData> {
360 self.check_idle_expiry().await;
361 elicitation::increment_call();
362
363 let original_name = request.name.as_ref().to_string();
364 let (resolved_name, resolved_args) = if original_name == "ctx" {
365 let sub = request
366 .arguments
367 .as_ref()
368 .and_then(|a| a.get("tool"))
369 .and_then(|v| v.as_str())
370 .map(std::string::ToString::to_string)
371 .ok_or_else(|| {
372 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
373 })?;
374 let tool_name = if sub.starts_with("ctx_") {
375 sub
376 } else {
377 format!("ctx_{sub}")
378 };
379 let mut args = request.arguments.unwrap_or_default();
380 args.remove("tool");
381 (tool_name, Some(args))
382 } else {
383 (original_name, request.arguments)
384 };
385 let name = resolved_name.as_str();
386 let args = resolved_args.as_ref();
387
388 let role_check = role_guard::check_tool_access(name);
389 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
390 tracing::warn!(
391 tool = name,
392 role = %role_check.role_name,
393 "Tool blocked by role policy"
394 );
395 return Ok(denied);
396 }
397
398 if name != "ctx_workflow" {
399 let active = self.workflow.read().await.clone();
400 if let Some(run) = active {
401 if let Some(state) = run.spec.state(&run.current) {
402 if let Some(allowed) = &state.allowed_tools {
403 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
404 if !allowed_ok {
405 let mut shown = allowed.clone();
406 shown.sort();
407 shown.truncate(30);
408 return Ok(CallToolResult::success(vec![Content::text(format!(
409 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
410 run.spec.name,
411 run.current,
412 shown.len(),
413 shown.join(", ")
414 ))]));
415 }
416 }
417 }
418 }
419 }
420
421 let auto_context = {
422 let task = {
423 let session = self.session.read().await;
424 session.task.as_ref().map(|t| t.description.clone())
425 };
426 let project_root = {
427 let session = self.session.read().await;
428 session.project_root.clone()
429 };
430 let mut cache = self.cache.write().await;
431 crate::tools::autonomy::session_lifecycle_pre_hook(
432 &self.autonomy,
433 name,
434 &mut cache,
435 task.as_deref(),
436 project_root.as_deref(),
437 CrpMode::effective(),
438 )
439 };
440
441 let throttle_result = {
442 let fp = args
443 .map(|a| {
444 crate::core::loop_detection::LoopDetector::fingerprint(
445 &serde_json::Value::Object(a.clone()),
446 )
447 })
448 .unwrap_or_default();
449 let mut detector = self.loop_detector.write().await;
450
451 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
452 let is_search_shell = name == "ctx_shell" && {
453 let cmd = args
454 .as_ref()
455 .and_then(|a| a.get("command"))
456 .and_then(|v| v.as_str())
457 .unwrap_or("");
458 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
459 };
460
461 if is_search || is_search_shell {
462 let search_pattern = args.and_then(|a| {
463 a.get("pattern")
464 .or_else(|| a.get("query"))
465 .and_then(|v| v.as_str())
466 });
467 let shell_pattern = if is_search_shell {
468 args.and_then(|a| a.get("command"))
469 .and_then(|v| v.as_str())
470 .and_then(helpers::extract_search_pattern_from_command)
471 } else {
472 None
473 };
474 let pat = search_pattern.or(shell_pattern.as_deref());
475 detector.record_search(name, &fp, pat)
476 } else {
477 detector.record_call(name, &fp)
478 }
479 };
480
481 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
482 let msg = throttle_result.message.unwrap_or_default();
483 return Ok(CallToolResult::success(vec![Content::text(msg)]));
484 }
485
486 let throttle_warning =
487 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
488 throttle_result.message.clone()
489 } else {
490 None
491 };
492
493 let config = crate::core::config::Config::load();
494 let minimal = config.minimal_overhead_effective();
495
496 {
497 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
498 let snap = BudgetTracker::global().check();
499 if *snap.worst_level() == BudgetLevel::Exhausted
500 && name != "ctx_session"
501 && name != "ctx_cost"
502 && name != "ctx_metrics"
503 {
504 for (dim, lvl, used, limit) in [
505 (
506 "tokens",
507 &snap.tokens.level,
508 format!("{}", snap.tokens.used),
509 format!("{}", snap.tokens.limit),
510 ),
511 (
512 "shell",
513 &snap.shell.level,
514 format!("{}", snap.shell.used),
515 format!("{}", snap.shell.limit),
516 ),
517 (
518 "cost",
519 &snap.cost.level,
520 format!("${:.2}", snap.cost.used_usd),
521 format!("${:.2}", snap.cost.limit_usd),
522 ),
523 ] {
524 if *lvl == BudgetLevel::Exhausted {
525 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
526 }
527 }
528 let msg = format!(
529 "[BUDGET EXHAUSTED] {}\n\
530 Use `ctx_session action=role` to check/switch roles, \
531 or `ctx_session action=reset` to start fresh.",
532 snap.format_compact()
533 );
534 tracing::warn!(tool = name, "{msg}");
535 return Ok(CallToolResult::success(vec![Content::text(msg)]));
536 }
537 }
538
539 if is_shell_tool_name(name) {
540 crate::core::budget_tracker::BudgetTracker::global().record_shell();
541 }
542
543 let tool_start = std::time::Instant::now();
544 let mut result_text = {
545 use futures::FutureExt;
546 use std::panic::AssertUnwindSafe;
547 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
548 .catch_unwind()
549 .await
550 {
551 Ok(Ok(text)) => text,
552 Ok(Err(e)) => return Err(e),
553 Err(panic_payload) => {
554 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
555 (*s).to_string()
556 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
557 s.clone()
558 } else {
559 "unknown".to_string()
560 };
561 tracing::error!(tool = name, "Tool panicked: {detail}");
562 format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
563 The MCP server is still running. Please retry or use a different approach.")
564 }
565 }
566 };
567
568 let is_raw_shell = name == "ctx_shell" && {
569 let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
570 let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
571 arg_raw
572 || arg_bypass
573 || std::env::var("LEAN_CTX_DISABLED").is_ok()
574 || std::env::var("LEAN_CTX_RAW").is_ok()
575 };
576
577 let pre_terse_len = result_text.len();
578 let output_tokens = {
579 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
580 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
581 tokens
582 };
583
584 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
585 crate::core::anomaly::save();
587
588 let budget_warning = {
589 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
590 let snap = BudgetTracker::global().check();
591 if *snap.worst_level() == BudgetLevel::Warning {
592 for (dim, lvl, used, limit, pct) in [
593 (
594 "tokens",
595 &snap.tokens.level,
596 format!("{}", snap.tokens.used),
597 format!("{}", snap.tokens.limit),
598 snap.tokens.percent,
599 ),
600 (
601 "shell",
602 &snap.shell.level,
603 format!("{}", snap.shell.used),
604 format!("{}", snap.shell.limit),
605 snap.shell.percent,
606 ),
607 (
608 "cost",
609 &snap.cost.level,
610 format!("${:.2}", snap.cost.used_usd),
611 format!("${:.2}", snap.cost.limit_usd),
612 snap.cost.percent,
613 ),
614 ] {
615 if *lvl == BudgetLevel::Warning {
616 crate::core::events::emit_budget_warning(
617 &snap.role, dim, &used, &limit, pct,
618 );
619 }
620 }
621 if crate::core::protocol::meta_visible() {
622 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
623 } else {
624 None
625 }
626 } else {
627 None
628 }
629 };
630
631 let archive_hint = if minimal || is_raw_shell {
632 None
633 } else {
634 use crate::core::archive;
635 let archivable = matches!(
636 name,
637 "ctx_shell"
638 | "ctx_read"
639 | "ctx_multi_read"
640 | "ctx_smart_read"
641 | "ctx_execute"
642 | "ctx_search"
643 | "ctx_tree"
644 );
645 if archivable && archive::should_archive(&result_text) {
646 let cmd = helpers::get_str(args, "command")
647 .or_else(|| helpers::get_str(args, "path"))
648 .unwrap_or_default();
649 let session_id = self.session.read().await.id.clone();
650 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
651 let tokens = crate::core::tokens::count_tokens(&to_store);
652 archive::store(name, &cmd, &to_store, Some(&session_id))
653 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
654 } else {
655 None
656 }
657 };
658
659 let pre_compression = result_text.clone();
660 let skip_terse = is_raw_shell
661 || (name == "ctx_shell"
662 && helpers::get_str(args, "command")
663 .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
664 let compression = crate::core::config::CompressionLevel::effective(&config);
665 if compression.is_active() && !skip_terse {
666 let terse_result =
667 crate::core::terse::pipeline::compress(&result_text, &compression, None);
668 if terse_result.quality_passed && terse_result.savings_pct >= 3.0 {
669 result_text = terse_result.output;
670 }
671 }
672
673 let profile_hints = crate::core::profiles::active_profile().output_hints;
674
675 if !is_raw_shell && profile_hints.verify_footer() {
676 let verify_cfg = crate::core::profiles::active_profile().verification;
677 let vr = crate::core::output_verification::verify_output(
678 &pre_compression,
679 &result_text,
680 &verify_cfg,
681 );
682 if !vr.warnings.is_empty() {
683 let msg = format!("[VERIFY] {}", vr.format_compact());
684 result_text = format!("{result_text}\n\n{msg}");
685 }
686 }
687
688 if profile_hints.archive_hint() {
689 if let Some(hint) = archive_hint {
690 result_text = format!("{result_text}\n{hint}");
691 }
692 }
693
694 if !is_raw_shell {
695 if let Some(ctx) = auto_context {
696 if crate::core::protocol::meta_visible() {
697 result_text = format!("{ctx}\n\n{result_text}");
698 }
699 }
700 }
701
702 if let Some(warning) = throttle_warning {
703 result_text = format!("{result_text}\n\n{warning}");
704 }
705
706 if let Some(bw) = budget_warning {
707 result_text = format!("{result_text}\n\n{bw}");
708 }
709
710 if !self
711 .rules_stale_checked
712 .swap(true, std::sync::atomic::Ordering::Relaxed)
713 {
714 let client = self.client_name.read().await.clone();
715 if !client.is_empty() {
716 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
717 result_text = format!("{result_text}\n\n{stale_msg}");
718 }
719 }
720 }
721
722 {
723 let _ = crate::core::slo::evaluate();
725 }
726
727 if name == "ctx_read" {
728 if minimal {
729 let mut cache = self.cache.write().await;
730 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
731 } else {
732 let read_path = self
733 .resolve_path_or_passthrough(
734 &helpers::get_str(args, "path").unwrap_or_default(),
735 )
736 .await;
737 let project_root = {
738 let session = self.session.read().await;
739 session.project_root.clone()
740 };
741 let mut cache = self.cache.write().await;
742 let enrich = crate::tools::autonomy::enrich_after_read(
743 &self.autonomy,
744 &mut cache,
745 &read_path,
746 project_root.as_deref(),
747 None,
748 crate::tools::CrpMode::effective(),
749 false,
750 );
751 if profile_hints.related_hint() {
752 if let Some(hint) = enrich.related_hint {
753 result_text = format!("{result_text}\n{hint}");
754 }
755 }
756 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
757
758 {
759 let active_task = {
760 let session = self.session.read().await;
761 session.task.as_ref().map(|t| t.description.clone())
762 };
763 let mut ledger = self.ledger.write().await;
764 let overlay = crate::core::context_overlay::OverlayStore::load_project(
765 &std::path::PathBuf::from(project_root.as_deref().unwrap_or(".")),
766 );
767 let mode_used =
768 helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
769 let gate_result = context_gate::post_dispatch_record_with_task(
770 &read_path,
771 &mode_used,
772 pre_terse_len,
773 output_tokens as usize,
774 &mut ledger,
775 &overlay,
776 active_task.as_deref(),
777 );
778 if let Some(hint) = gate_result.eviction_hint {
779 result_text = format!("{result_text}\n{hint}");
780 }
781 if profile_hints.elicitation_hint() {
782 if let Some(hint) = gate_result.elicitation_hint {
783 result_text = format!("{result_text}\n{hint}");
784 }
785 }
786 if gate_result.resource_changed {
787 if let Some(peer) = self.peer.read().await.as_ref() {
788 notifications::send_resource_updated(
789 peer,
790 notifications::RESOURCE_URI_SUMMARY,
791 )
792 .await;
793 }
794 }
795 }
796 }
797 }
798
799 if !minimal && !is_raw_shell && name == "ctx_shell" {
800 let cmd = helpers::get_str(args, "command").unwrap_or_default();
801
802 if let Some(file_path) = extract_file_read_from_shell(&cmd) {
803 if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
804 bt.next_seq();
805 bt.record_shell_file_access(&file_path);
806 }
807 }
808
809 if profile_hints.efficiency_hint() {
810 let calls = self.tool_calls.read().await;
811 let last_original = calls.last().map_or(0, |c| c.original_tokens);
812 drop(calls);
813 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
814 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
815 &self.autonomy,
816 &cmd,
817 last_original,
818 pre_hint_tokens,
819 ) {
820 result_text = format!("{result_text}\n{hint}");
821 }
822 }
823 }
824
825 #[allow(clippy::cast_possible_truncation)]
826 let output_token_count = if result_text.len() == pre_terse_len {
827 output_tokens as usize
828 } else {
829 crate::core::tokens::count_tokens(&result_text)
830 };
831 let action = helpers::get_str(args, "action");
832
833 const K_STALENESS_BOUND: i64 = 10;
835 if self.session_mode == crate::tools::SessionMode::Shared {
836 if let Some(ref rt) = self.context_os {
837 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
838 let cursor = self
839 .last_seen_event_id
840 .load(std::sync::atomic::Ordering::Relaxed);
841 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
842 let gap = latest - cursor;
843 result_text = format!(
844 "[CONTEXT STALE] {gap} events happened since your last read. \
845 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
846 );
847 }
848 self.last_seen_event_id
849 .store(latest, std::sync::atomic::Ordering::Relaxed);
850 }
851 }
852
853 {
854 let input = helpers::canonical_args_string(args);
855 let input_md5 = helpers::hash_fast(&input);
856 let output_md5 = helpers::hash_fast(&result_text);
857 let agent_id = self.agent_id.read().await.clone();
858 let client_name = self.client_name.read().await.clone();
859 let mut explicit_intent: Option<(
860 crate::core::intent_protocol::IntentRecord,
861 Option<String>,
862 String,
863 )> = None;
864
865 let pending_session_save = {
866 let empty_args = serde_json::Map::new();
867 let args_map = args.unwrap_or(&empty_args);
868 let mut session = self.session.write().await;
869 session.record_tool_receipt(
870 name,
871 action.as_deref(),
872 &input_md5,
873 &output_md5,
874 agent_id.as_deref(),
875 Some(&client_name),
876 );
877
878 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
879 name,
880 action.as_deref(),
881 args_map,
882 session.project_root.as_deref(),
883 ) {
884 let is_explicit =
885 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
886 let root = session.project_root.clone();
887 let sid = session.id.clone();
888 session.record_intent(intent.clone());
889 if is_explicit {
890 explicit_intent = Some((intent, root, sid));
891 }
892 }
893 if session.should_save() {
894 session.prepare_save().ok()
895 } else {
896 None
897 }
898 };
899
900 if let Some(prepared) = pending_session_save {
901 tokio::task::spawn_blocking(move || {
902 let _ = prepared.write_to_disk();
903 });
904 }
905
906 if let Some((intent, root, session_id)) = explicit_intent {
907 let _ = crate::core::intent_protocol::apply_side_effects(
908 &intent,
909 root.as_deref(),
910 &session_id,
911 );
912 }
913
914 if self.autonomy.is_enabled() {
915 let (calls, project_root) = {
916 let session = self.session.read().await;
917 (session.stats.total_tool_calls, session.project_root.clone())
918 };
919
920 if let Some(root) = project_root {
921 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
922 let root_clone = root.clone();
923 tokio::task::spawn_blocking(move || {
924 let _ = crate::core::consolidation_engine::consolidate_latest(
925 &root_clone,
926 crate::core::consolidation_engine::ConsolidationBudgets::default(),
927 );
928 });
929 }
930 }
931 }
932
933 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
934 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
935 let output_token_count_u64 = output_token_count as u64;
936 let name_owned = name.to_string();
937 tokio::task::spawn_blocking(move || {
938 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
939 let quote = pricing.quote_from_env_or_agent_type(&client_name);
940 let cost_usd =
941 quote
942 .cost
943 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
944 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
945
946 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
947 store.record_tool_call(
948 &agent_key,
949 &client_name,
950 &name_owned,
951 input_token_count,
952 output_token_count_u64,
953 0,
954 );
955 let _ = store.save();
956 });
957 }
958
959 if self.session_mode == crate::tools::SessionMode::Shared
961 && name == "ctx_knowledge"
962 && action.as_deref() == Some("remember")
963 {
964 if let Some(ref rt) = self.context_os {
965 let my_agent = self.agent_id.read().await.clone();
966 let category = helpers::get_str(args, "category");
967 let key = helpers::get_str(args, "key");
968 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
969 let recent = rt.bus.recent_by_kind(
970 &self.workspace_id,
971 &self.channel_id,
972 "knowledge_remembered",
973 20,
974 );
975 for ev in &recent {
976 let p = &ev.payload;
977 let ev_cat = p.get("category").and_then(|v| v.as_str());
978 let ev_key = p.get("key").and_then(|v| v.as_str());
979 let ev_actor = ev.actor.as_deref();
980 if ev_cat == Some(cat.as_str())
981 && ev_key == Some(k.as_str())
982 && ev_actor != my_agent.as_deref()
983 {
984 let other = ev_actor.unwrap_or("unknown");
985 result_text = format!(
986 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
987 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
988 );
989 break;
990 }
991 }
992 }
993 }
994 }
995
996 if self.session_mode == crate::tools::SessionMode::Shared {
998 let ws = self.workspace_id.clone();
999 let ch = self.channel_id.clone();
1000 let rt = self.context_os.clone();
1001 let agent = self.agent_id.read().await.clone();
1002 let tool = name.to_string();
1003 let tool_action = action.clone();
1004 let tool_path = helpers::get_str(args, "path");
1005 let tool_category = helpers::get_str(args, "category");
1006 let tool_key = helpers::get_str(args, "key");
1007 let session_snapshot = self.session.read().await.clone();
1008 let session_task = session_snapshot.task.clone();
1009 tokio::task::spawn_blocking(move || {
1010 let Some(rt) = rt else {
1011 return;
1012 };
1013 let Some(root) = session_snapshot.project_root.as_deref() else {
1014 return;
1015 };
1016 rt.shared_sessions
1017 .persist_best_effort(root, &ws, &ch, &session_snapshot);
1018 rt.metrics.record_session_persisted();
1019
1020 let mut base_payload = serde_json::json!({
1021 "tool": tool,
1022 "action": tool_action,
1023 });
1024 if let Some(ref p) = tool_path {
1025 base_payload["path"] = serde_json::Value::String(p.clone());
1026 }
1027 if let Some(ref c) = tool_category {
1028 base_payload["category"] = serde_json::Value::String(c.clone());
1029 }
1030 if let Some(ref k) = tool_key {
1031 base_payload["key"] = serde_json::Value::String(k.clone());
1032 }
1033 if let Some(ref t) = session_task {
1034 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1035 }
1036
1037 if rt
1038 .bus
1039 .append(
1040 &ws,
1041 &ch,
1042 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1043 agent.as_deref(),
1044 base_payload.clone(),
1045 )
1046 .is_some()
1047 {
1048 rt.metrics.record_event_appended();
1049 rt.metrics.record_event_broadcast();
1050 }
1051
1052 if let Some(secondary) =
1053 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1054 {
1055 if rt
1056 .bus
1057 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1058 .is_some()
1059 {
1060 rt.metrics.record_event_appended();
1061 rt.metrics.record_event_broadcast();
1062 }
1063 }
1064 });
1065 }
1066
1067 let skip_checkpoint = minimal
1068 || matches!(
1069 name,
1070 "ctx_compress"
1071 | "ctx_metrics"
1072 | "ctx_benchmark"
1073 | "ctx_analyze"
1074 | "ctx_cache"
1075 | "ctx_discover"
1076 | "ctx_dedup"
1077 | "ctx_session"
1078 | "ctx_knowledge"
1079 | "ctx_agent"
1080 | "ctx_share"
1081 | "ctx_gain"
1082 | "ctx_overview"
1083 | "ctx_preload"
1084 | "ctx_cost"
1085 | "ctx_heatmap"
1086 | "ctx_task"
1087 | "ctx_impact"
1088 | "ctx_architecture"
1089 | "ctx_smells"
1090 | "ctx_workflow"
1091 );
1092
1093 if !skip_checkpoint && self.increment_and_check() {
1094 if let Some(checkpoint) = self.auto_checkpoint().await {
1095 let interval = LeanCtxServer::checkpoint_interval_effective();
1096 let hints = crate::core::profiles::active_profile().output_hints;
1097 if hints.checkpoint_in_output() && crate::core::protocol::meta_visible() {
1098 let combined = format!(
1099 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1100 );
1101 return Ok(CallToolResult::success(vec![Content::text(combined)]));
1102 }
1103 }
1104 }
1105
1106 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1107 if tool_duration_ms > 100 {
1108 LeanCtxServer::append_tool_call_log(
1109 name,
1110 tool_duration_ms,
1111 0,
1112 0,
1113 None,
1114 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1115 );
1116 }
1117
1118 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1119 if current_count > 0 && current_count.is_multiple_of(100) {
1120 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1121 }
1122
1123 Ok(CallToolResult::success(vec![Content::text(result_text)]))
1124 }
1125}
1126
1127pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1128 crate::instructions::build_instructions_for_test(crp_mode)
1129}
1130
1131pub fn build_claude_code_instructions_for_test() -> String {
1132 crate::instructions::claude_code_instructions()
1133}
1134
1135const PROJECT_MARKERS: &[&str] = &[
1136 ".git",
1137 "Cargo.toml",
1138 "package.json",
1139 "go.mod",
1140 "pyproject.toml",
1141 "setup.py",
1142 "pom.xml",
1143 "build.gradle",
1144 "Makefile",
1145 ".lean-ctx.toml",
1146];
1147
1148fn has_project_marker(dir: &std::path::Path) -> bool {
1149 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1150}
1151
1152fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1153 if let Some(home) = dirs::home_dir() {
1154 if dir == home {
1155 return true;
1156 }
1157 }
1158 let dir_str = dir.to_string_lossy();
1159 dir_str.ends_with("/.claude")
1160 || dir_str.ends_with("/.codex")
1161 || dir_str.contains("/.claude/")
1162 || dir_str.contains("/.codex/")
1163}
1164
1165fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1166 std::process::Command::new("git")
1167 .args(["rev-parse", "--show-toplevel"])
1168 .current_dir(dir)
1169 .stdout(std::process::Stdio::piped())
1170 .stderr(std::process::Stdio::null())
1171 .output()
1172 .ok()
1173 .and_then(|o| {
1174 if o.status.success() {
1175 String::from_utf8(o.stdout)
1176 .ok()
1177 .map(|s| s.trim().to_string())
1178 } else {
1179 None
1180 }
1181 })
1182}
1183
1184pub fn derive_project_root_from_cwd() -> Option<String> {
1185 let cwd = std::env::current_dir().ok()?;
1186 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1187
1188 if is_home_or_agent_dir(&canonical) {
1189 return git_toplevel_from(&canonical);
1190 }
1191
1192 if has_project_marker(&canonical) {
1193 return Some(canonical.to_string_lossy().to_string());
1194 }
1195
1196 if let Some(git_root) = git_toplevel_from(&canonical) {
1197 return Some(git_root);
1198 }
1199
1200 if let Some(root) = detect_multi_root_workspace(&canonical) {
1201 return Some(root);
1202 }
1203
1204 None
1205}
1206
1207fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1211 let entries = std::fs::read_dir(dir).ok()?;
1212 let mut child_projects: Vec<String> = Vec::new();
1213
1214 for entry in entries.flatten() {
1215 let path = entry.path();
1216 if path.is_dir() && has_project_marker(&path) {
1217 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1218 child_projects.push(canonical.to_string_lossy().to_string());
1219 }
1220 }
1221
1222 if child_projects.len() >= 2 {
1223 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1224 let sep = if cfg!(windows) { ";" } else { ":" };
1225 let merged = if existing.is_empty() {
1226 child_projects.join(sep)
1227 } else {
1228 format!("{existing}{sep}{}", child_projects.join(sep))
1229 };
1230 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1231 tracing::info!(
1232 "Multi-root workspace detected at {}: auto-allowing {} child projects",
1233 dir.display(),
1234 child_projects.len()
1235 );
1236 return Some(dir.to_string_lossy().to_string());
1237 }
1238
1239 None
1240}
1241
1242pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1243 crate::tool_defs::list_all_tool_defs()
1244 .into_iter()
1245 .map(|(name, desc, _)| (name, desc))
1246 .collect()
1247}
1248
1249pub fn tool_schemas_json_for_test() -> String {
1250 crate::tool_defs::list_all_tool_defs()
1251 .iter()
1252 .map(|(name, _, schema)| format!("{name}: {schema}"))
1253 .collect::<Vec<_>>()
1254 .join("\n")
1255}
1256
1257fn is_shell_tool_name(name: &str) -> bool {
1258 matches!(name, "ctx_shell" | "ctx_execute")
1259}
1260
1261fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1262 let trimmed = cmd.trim();
1263 let parts: Vec<&str> = trimmed.split_whitespace().collect();
1264 if parts.len() < 2 {
1265 return None;
1266 }
1267 let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1268 match bin {
1269 "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1270 let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1271 Some(file_arg.to_string())
1272 }
1273 _ => None,
1274 }
1275}
1276
1277#[cfg(test)]
1278mod tests {
1279 use super::*;
1280
1281 #[test]
1282 fn project_markers_detected() {
1283 let tmp = tempfile::tempdir().unwrap();
1284 let root = tmp.path().join("myproject");
1285 std::fs::create_dir_all(&root).unwrap();
1286 assert!(!has_project_marker(&root));
1287
1288 std::fs::create_dir(root.join(".git")).unwrap();
1289 assert!(has_project_marker(&root));
1290 }
1291
1292 #[test]
1293 fn home_dir_detected_as_agent_dir() {
1294 if let Some(home) = dirs::home_dir() {
1295 assert!(is_home_or_agent_dir(&home));
1296 }
1297 }
1298
1299 #[test]
1300 fn agent_dirs_detected() {
1301 let claude = std::path::PathBuf::from("/home/user/.claude");
1302 assert!(is_home_or_agent_dir(&claude));
1303 let codex = std::path::PathBuf::from("/home/user/.codex");
1304 assert!(is_home_or_agent_dir(&codex));
1305 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1306 assert!(!is_home_or_agent_dir(&project));
1307 }
1308
1309 #[test]
1310 fn test_unified_tool_count() {
1311 let tools = crate::tool_defs::unified_tool_defs();
1312 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1313 }
1314
1315 #[test]
1316 fn test_granular_tool_count() {
1317 let tools = crate::tool_defs::granular_tool_defs();
1318 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1319 }
1320
1321 #[test]
1322 fn disabled_tools_filters_list() {
1323 let all = crate::tool_defs::granular_tool_defs();
1324 let total = all.len();
1325 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1326 let filtered: Vec<_> = all
1327 .into_iter()
1328 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1329 .collect();
1330 assert_eq!(filtered.len(), total - 2);
1331 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1332 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1333 }
1334
1335 #[test]
1336 fn empty_disabled_tools_returns_all() {
1337 let all = crate::tool_defs::granular_tool_defs();
1338 let total = all.len();
1339 let disabled: Vec<String> = vec![];
1340 let filtered: Vec<_> = all
1341 .into_iter()
1342 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1343 .collect();
1344 assert_eq!(filtered.len(), total);
1345 }
1346
1347 #[test]
1348 fn misspelled_disabled_tool_is_silently_ignored() {
1349 let all = crate::tool_defs::granular_tool_defs();
1350 let total = all.len();
1351 let disabled = ["ctx_nonexistent_tool".to_string()];
1352 let filtered: Vec<_> = all
1353 .into_iter()
1354 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1355 .collect();
1356 assert_eq!(filtered.len(), total);
1357 }
1358
1359 #[test]
1360 fn detect_multi_root_workspace_with_child_projects() {
1361 let tmp = tempfile::tempdir().unwrap();
1362 let workspace = tmp.path().join("workspace");
1363 std::fs::create_dir_all(&workspace).unwrap();
1364
1365 let proj_a = workspace.join("project-a");
1366 let proj_b = workspace.join("project-b");
1367 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1368 std::fs::create_dir_all(&proj_b).unwrap();
1369 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1370
1371 let result = detect_multi_root_workspace(&workspace);
1372 assert!(
1373 result.is_some(),
1374 "should detect workspace with 2 child projects"
1375 );
1376
1377 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1378 }
1379
1380 #[test]
1381 fn detect_multi_root_workspace_returns_none_for_single_project() {
1382 let tmp = tempfile::tempdir().unwrap();
1383 let workspace = tmp.path().join("workspace");
1384 std::fs::create_dir_all(&workspace).unwrap();
1385
1386 let proj_a = workspace.join("project-a");
1387 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1388
1389 let result = detect_multi_root_workspace(&workspace);
1390 assert!(
1391 result.is_none(),
1392 "should not detect workspace with only 1 child project"
1393 );
1394 }
1395}