1pub mod bypass_hint;
2pub mod context_gate;
3mod dispatch;
4pub mod dynamic_tools;
5pub mod elicitation;
6pub(crate) mod execute;
7pub mod helpers;
8pub mod notifications;
9pub mod prompts;
10pub mod reference_store;
11pub mod registry;
12pub mod resources;
13pub mod role_guard;
14pub mod tool_trait;
15
16use rmcp::handler::server::ServerHandler;
17use rmcp::model::{
18 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
19 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
20};
21use rmcp::service::{RequestContext, RoleServer};
22use rmcp::ErrorData;
23
24use crate::tools::{CrpMode, LeanCtxServer};
25
26impl ServerHandler for LeanCtxServer {
27 fn get_info(&self) -> ServerInfo {
28 let capabilities = ServerCapabilities::builder()
29 .enable_tools()
30 .enable_resources()
31 .enable_resources_subscribe()
32 .enable_prompts()
33 .build();
34
35 let config = crate::core::config::Config::load();
36 let level = crate::core::config::CompressionLevel::effective(&config);
37 let _ = crate::core::terse::rules_inject::inject(&level);
38
39 let instructions = crate::instructions::build_instructions(CrpMode::effective());
40
41 InitializeResult::new(capabilities)
42 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
43 .with_instructions(instructions)
44 }
45
46 async fn initialize(
47 &self,
48 request: InitializeRequestParams,
49 context: RequestContext<RoleServer>,
50 ) -> Result<InitializeResult, ErrorData> {
51 let name = request.client_info.name.clone();
52 tracing::info!("MCP client connected: {:?}", name);
53 *self.client_name.write().await = name.clone();
54 *self.peer.write().await = Some(context.peer.clone());
55
56 if self.session_mode != crate::tools::SessionMode::Shared {
57 crate::core::budget_tracker::BudgetTracker::global().reset();
58 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
59 let radar = data_dir.join("context_radar.jsonl");
60 if radar.exists() {
61 let prev = data_dir.join("context_radar.prev.jsonl");
62 let _ = std::fs::rename(&radar, &prev);
63 }
64 }
65 }
66
67 let derived_root = derive_project_root_from_cwd();
68 let cwd_str = std::env::current_dir()
69 .ok()
70 .map(|p| p.to_string_lossy().to_string())
71 .unwrap_or_default();
72 {
73 let mut session = self.session.write().await;
74 if !cwd_str.is_empty() {
75 session.shell_cwd = Some(cwd_str.clone());
76 }
77 if let Some(ref root) = derived_root {
78 session.project_root = Some(root.clone());
79 tracing::info!("Project root set to: {root}");
80 } else if let Some(ref root) = session.project_root {
81 let root_path = std::path::Path::new(root);
82 let root_has_marker = has_project_marker(root_path);
83 let root_str = root_path.to_string_lossy();
84 let root_suspicious = root_str.contains("/.claude")
85 || root_str.contains("/.codex")
86 || root_str.contains("/var/folders/")
87 || root_str.contains("/tmp/")
88 || root_str.contains("\\.claude")
89 || root_str.contains("\\.codex")
90 || root_str.contains("\\AppData\\Local\\Temp")
91 || root_str.contains("\\Temp\\");
92 if root_suspicious && !root_has_marker {
93 session.project_root = None;
94 }
95 }
96 if self.session_mode == crate::tools::SessionMode::Shared {
97 if let Some(ref root) = session.project_root {
98 if let Some(ref rt) = self.context_os {
99 rt.shared_sessions.persist_best_effort(
100 root,
101 &self.workspace_id,
102 &self.channel_id,
103 &session,
104 );
105 rt.metrics.record_session_persisted();
106 }
107 }
108 } else {
109 let _ = session.save();
110 }
111 }
112
113 let agent_name = name.clone();
114 let agent_root = derived_root.clone().unwrap_or_default();
115 let agent_id_handle = self.agent_id.clone();
116 tokio::task::spawn_blocking(move || {
117 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
118 return;
119 }
120
121 let maintenance = crate::core::startup_guard::try_acquire_lock(
125 "startup-maintenance",
126 std::time::Duration::from_secs(2),
127 std::time::Duration::from_mins(2),
128 );
129 if maintenance.is_some() {
130 if let Some(home) = dirs::home_dir() {
131 let _ = crate::rules_inject::inject_all_rules(&home);
132 }
133 crate::hooks::refresh_installed_hooks();
134 crate::core::version_check::check_background();
135 }
136 drop(maintenance);
137
138 if !agent_root.is_empty() {
139 let heuristic_role = match agent_name.to_lowercase().as_str() {
140 n if n.contains("cursor") => Some("coder"),
141 n if n.contains("claude") => Some("coder"),
142 n if n.contains("codex") => Some("coder"),
143 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
144 n if n.contains("review") => Some("reviewer"),
145 n if n.contains("test") => Some("debugger"),
146 _ => None,
147 };
148 let env_role = std::env::var("LEAN_CTX_ROLE")
149 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
150 .ok();
151 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
152
153 let _ = crate::core::roles::set_active_role(effective_role);
154
155 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
156 registry.cleanup_stale(24);
157 let id = registry.register("mcp", Some(effective_role), &agent_root);
158 let _ = registry.save();
159 if let Ok(mut guard) = agent_id_handle.try_write() {
160 *guard = Some(id);
161 }
162 }
163 });
164
165 let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
166 tracing::info!("Client capabilities: {}", client_caps.format_summary());
167
168 if client_caps.dynamic_tools {
169 if let Ok(mut dt) = dynamic_tools::global().lock() {
170 dt.set_supports_list_changed(true);
171 }
172 }
173 if let Some(max) = client_caps.max_tools {
174 if let Ok(mut dt) = dynamic_tools::global().lock() {
175 dt.set_supports_list_changed(true);
176 if max < 100 {
177 dt.unload_category(dynamic_tools::ToolCategory::Debug);
178 dt.unload_category(dynamic_tools::ToolCategory::Memory);
179 }
180 }
181 }
182
183 crate::core::client_capabilities::set_detected(&client_caps);
184
185 let instructions =
186 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
187
188 let capabilities = match (client_caps.resources, client_caps.prompts) {
189 (true, true) => ServerCapabilities::builder()
190 .enable_tools()
191 .enable_resources()
192 .enable_resources_subscribe()
193 .enable_prompts()
194 .build(),
195 (true, false) => ServerCapabilities::builder()
196 .enable_tools()
197 .enable_resources()
198 .enable_resources_subscribe()
199 .build(),
200 (false, true) => ServerCapabilities::builder()
201 .enable_tools()
202 .enable_prompts()
203 .build(),
204 (false, false) => ServerCapabilities::builder().enable_tools().build(),
205 };
206
207 Ok(InitializeResult::new(capabilities)
208 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
209 .with_instructions(instructions))
210 }
211
212 async fn list_tools(
213 &self,
214 _request: Option<PaginatedRequestParams>,
215 _context: RequestContext<RoleServer>,
216 ) -> Result<ListToolsResult, ErrorData> {
217 let all_tools = if crate::tool_defs::is_full_mode() {
218 crate::tool_defs::granular_tool_defs()
219 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
220 crate::tool_defs::unified_tool_defs()
221 } else {
222 crate::tool_defs::lazy_tool_defs()
223 };
224
225 let disabled = crate::core::config::Config::load().disabled_tools_effective();
226 let client = self.client_name.read().await.clone();
227 let is_zed = !client.is_empty() && client.to_lowercase().contains("zed");
228
229 let tools: Vec<_> = all_tools
230 .into_iter()
231 .filter(|t| {
232 let name = t.name.as_ref();
233 if !disabled.is_empty() && disabled.iter().any(|d| d.as_str() == name) {
234 return false;
235 }
236 if is_zed && name == "ctx_edit" {
237 return false;
238 }
239 true
240 })
241 .collect();
242
243 let tools = {
244 let dyn_state = dynamic_tools::global().lock().unwrap();
245 if dyn_state.supports_list_changed() {
246 tools
247 .into_iter()
248 .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
249 .collect()
250 } else {
251 tools
252 }
253 };
254
255 let tools = {
256 let active = self.workflow.read().await.clone();
257 if let Some(run) = active {
258 if run.current != "done" {
260 if let Some(state) = run.spec.state(&run.current) {
261 if let Some(allowed) = &state.allowed_tools {
262 let mut allow: std::collections::HashSet<&str> =
263 allowed.iter().map(std::string::String::as_str).collect();
264 allow.insert("ctx");
265 allow.insert("ctx_workflow");
266 return Ok(ListToolsResult {
267 tools: tools
268 .into_iter()
269 .filter(|t| allow.contains(t.name.as_ref()))
270 .collect(),
271 ..Default::default()
272 });
273 }
274 }
275 }
276 }
277 tools
278 };
279
280 let tools = {
281 let cfg = crate::core::config::Config::load();
282 let level = crate::core::config::CompressionLevel::effective(&cfg);
283 let mode =
284 crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
285 if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
286 tools
287 } else {
288 tools
289 .into_iter()
290 .map(|mut t| {
291 let compressed = crate::core::terse::mcp_compress::compress_description(
292 t.name.as_ref(),
293 t.description.as_deref().unwrap_or(""),
294 mode,
295 );
296 t.description = Some(compressed.into());
297 t
298 })
299 .collect()
300 }
301 };
302
303 Ok(ListToolsResult {
304 tools,
305 ..Default::default()
306 })
307 }
308
309 async fn list_prompts(
310 &self,
311 _request: Option<PaginatedRequestParams>,
312 _context: RequestContext<RoleServer>,
313 ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
314 Ok(rmcp::model::ListPromptsResult::with_all_items(
315 prompts::list_prompts(),
316 ))
317 }
318
319 async fn get_prompt(
320 &self,
321 request: rmcp::model::GetPromptRequestParams,
322 _context: RequestContext<RoleServer>,
323 ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
324 let ledger = self.ledger.read().await;
325 match prompts::get_prompt(&request, &ledger) {
326 Some(result) => Ok(result),
327 None => Err(ErrorData::invalid_params(
328 format!("Unknown prompt: {}", request.name),
329 None,
330 )),
331 }
332 }
333
334 async fn list_resources(
335 &self,
336 _request: Option<PaginatedRequestParams>,
337 _context: RequestContext<RoleServer>,
338 ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
339 Ok(rmcp::model::ListResourcesResult::with_all_items(
340 resources::list_resources(),
341 ))
342 }
343
344 async fn read_resource(
345 &self,
346 request: rmcp::model::ReadResourceRequestParams,
347 _context: RequestContext<RoleServer>,
348 ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
349 let ledger = self.ledger.read().await;
350 match resources::read_resource(&request.uri, &ledger) {
351 Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
352 None => Err(rmcp::ErrorData::resource_not_found(
353 format!("Unknown resource: {}", request.uri),
354 None,
355 )),
356 }
357 }
358
359 async fn call_tool(
360 &self,
361 request: CallToolRequestParams,
362 _context: RequestContext<RoleServer>,
363 ) -> Result<CallToolResult, ErrorData> {
364 self.check_idle_expiry().await;
365 elicitation::increment_call();
366
367 let original_name = request.name.as_ref().to_string();
368 let (resolved_name, resolved_args) = if original_name == "ctx" {
369 let sub = request
370 .arguments
371 .as_ref()
372 .and_then(|a| a.get("tool"))
373 .and_then(|v| v.as_str())
374 .map(std::string::ToString::to_string)
375 .ok_or_else(|| {
376 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
377 })?;
378 let tool_name = if sub.starts_with("ctx_") {
379 sub
380 } else {
381 format!("ctx_{sub}")
382 };
383 let mut args = request.arguments.unwrap_or_default();
384 args.remove("tool");
385 (tool_name, Some(args))
386 } else {
387 (original_name, request.arguments)
388 };
389 let name = resolved_name.as_str();
390 let args = resolved_args.as_ref();
391
392 let role_check = role_guard::check_tool_access(name);
393 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
394 tracing::warn!(
395 tool = name,
396 role = %role_check.role_name,
397 "Tool blocked by role policy"
398 );
399 return Ok(denied);
400 }
401
402 if name != "ctx_workflow" {
403 let active = self.workflow.read().await.clone();
404 if let Some(run) = active {
405 if run.current == "done" {
407 let mut wf = self.workflow.write().await;
408 *wf = None;
409 let _ = crate::core::workflow::clear_active();
410 } else if let Some(state) = run.spec.state(&run.current) {
411 if let Some(allowed) = &state.allowed_tools {
412 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
413 if !allowed_ok {
414 let mut shown = allowed.clone();
415 shown.sort();
416 shown.truncate(30);
417 return Ok(CallToolResult::success(vec![Content::text(format!(
418 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
419 run.spec.name,
420 run.current,
421 shown.len(),
422 shown.join(", ")
423 ))]));
424 }
425 }
426 }
427 }
428 }
429
430 let auto_context = {
431 let task = {
432 let session = self.session.read().await;
433 session.task.as_ref().map(|t| t.description.clone())
434 };
435 let project_root = {
436 let session = self.session.read().await;
437 session.project_root.clone()
438 };
439 let mut cache = self.cache.write().await;
440 crate::tools::autonomy::session_lifecycle_pre_hook(
441 &self.autonomy,
442 name,
443 &mut cache,
444 task.as_deref(),
445 project_root.as_deref(),
446 CrpMode::effective(),
447 )
448 };
449
450 let throttle_result = {
451 let fp = args
452 .map(|a| {
453 crate::core::loop_detection::LoopDetector::fingerprint(
454 &serde_json::Value::Object(a.clone()),
455 )
456 })
457 .unwrap_or_default();
458 let mut detector = self.loop_detector.write().await;
459
460 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
461 let is_search_shell = name == "ctx_shell" && {
462 let cmd = args
463 .as_ref()
464 .and_then(|a| a.get("command"))
465 .and_then(|v| v.as_str())
466 .unwrap_or("");
467 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
468 };
469
470 if is_search || is_search_shell {
471 let search_pattern = args.and_then(|a| {
472 a.get("pattern")
473 .or_else(|| a.get("query"))
474 .and_then(|v| v.as_str())
475 });
476 let shell_pattern = if is_search_shell {
477 args.and_then(|a| a.get("command"))
478 .and_then(|v| v.as_str())
479 .and_then(helpers::extract_search_pattern_from_command)
480 } else {
481 None
482 };
483 let pat = search_pattern.or(shell_pattern.as_deref());
484 detector.record_search(name, &fp, pat)
485 } else {
486 detector.record_call(name, &fp)
487 }
488 };
489
490 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
491 let msg = throttle_result.message.unwrap_or_default();
492 return Ok(CallToolResult::success(vec![Content::text(msg)]));
493 }
494
495 let throttle_warning =
496 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
497 throttle_result.message.clone()
498 } else {
499 None
500 };
501
502 let config = crate::core::config::Config::load();
503 let minimal = config.minimal_overhead_effective();
504
505 {
506 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
507 let snap = BudgetTracker::global().check();
508 if *snap.worst_level() == BudgetLevel::Exhausted
509 && name != "ctx_session"
510 && name != "ctx_cost"
511 && name != "ctx_metrics"
512 {
513 for (dim, lvl, used, limit) in [
514 (
515 "tokens",
516 &snap.tokens.level,
517 format!("{}", snap.tokens.used),
518 format!("{}", snap.tokens.limit),
519 ),
520 (
521 "shell",
522 &snap.shell.level,
523 format!("{}", snap.shell.used),
524 format!("{}", snap.shell.limit),
525 ),
526 (
527 "cost",
528 &snap.cost.level,
529 format!("${:.2}", snap.cost.used_usd),
530 format!("${:.2}", snap.cost.limit_usd),
531 ),
532 ] {
533 if *lvl == BudgetLevel::Exhausted {
534 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
535 }
536 }
537 let msg = format!(
538 "[BUDGET EXHAUSTED] {}\n\
539 Use `ctx_session action=role` to check/switch roles, \
540 or `ctx_session action=reset` to start fresh.",
541 snap.format_compact()
542 );
543 tracing::warn!(tool = name, "{msg}");
544 return Ok(CallToolResult::success(vec![Content::text(msg)]));
545 }
546 }
547
548 if is_shell_tool_name(name) {
549 crate::core::budget_tracker::BudgetTracker::global().record_shell();
550 }
551
552 let tool_start = std::time::Instant::now();
553 let mut result_text = {
554 use futures::FutureExt;
555 use std::panic::AssertUnwindSafe;
556 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
557 .catch_unwind()
558 .await
559 {
560 Ok(Ok(text)) => text,
561 Ok(Err(e)) => return Err(e),
562 Err(panic_payload) => {
563 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
564 (*s).to_string()
565 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
566 s.clone()
567 } else {
568 "unknown".to_string()
569 };
570 tracing::error!(tool = name, "Tool panicked: {detail}");
571 format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
572 The MCP server is still running. Please retry or use a different approach.")
573 }
574 }
575 };
576
577 let is_raw_shell = name == "ctx_shell" && {
578 let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
579 let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
580 arg_raw
581 || arg_bypass
582 || std::env::var("LEAN_CTX_DISABLED").is_ok()
583 || std::env::var("LEAN_CTX_RAW").is_ok()
584 };
585
586 let pre_terse_len = result_text.len();
587 let output_tokens = {
588 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
589 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
590 tokens
591 };
592
593 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
594 crate::core::anomaly::save();
596
597 let budget_warning = {
598 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
599 let snap = BudgetTracker::global().check();
600 if *snap.worst_level() == BudgetLevel::Warning {
601 for (dim, lvl, used, limit, pct) in [
602 (
603 "tokens",
604 &snap.tokens.level,
605 format!("{}", snap.tokens.used),
606 format!("{}", snap.tokens.limit),
607 snap.tokens.percent,
608 ),
609 (
610 "shell",
611 &snap.shell.level,
612 format!("{}", snap.shell.used),
613 format!("{}", snap.shell.limit),
614 snap.shell.percent,
615 ),
616 (
617 "cost",
618 &snap.cost.level,
619 format!("${:.2}", snap.cost.used_usd),
620 format!("${:.2}", snap.cost.limit_usd),
621 snap.cost.percent,
622 ),
623 ] {
624 if *lvl == BudgetLevel::Warning {
625 crate::core::events::emit_budget_warning(
626 &snap.role, dim, &used, &limit, pct,
627 );
628 }
629 }
630 if crate::core::protocol::meta_visible() {
631 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
632 } else {
633 None
634 }
635 } else {
636 None
637 }
638 };
639
640 let archive_hint = if minimal || is_raw_shell {
641 None
642 } else {
643 use crate::core::archive;
644 let archivable = matches!(
645 name,
646 "ctx_shell"
647 | "ctx_read"
648 | "ctx_multi_read"
649 | "ctx_smart_read"
650 | "ctx_execute"
651 | "ctx_search"
652 | "ctx_tree"
653 );
654 if archivable && archive::should_archive(&result_text) {
655 let cmd = helpers::get_str(args, "command")
656 .or_else(|| helpers::get_str(args, "path"))
657 .unwrap_or_default();
658 let session_id = self.session.read().await.id.clone();
659 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
660 let tokens = crate::core::tokens::count_tokens(&to_store);
661 archive::store(name, &cmd, &to_store, Some(&session_id))
662 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
663 } else {
664 None
665 }
666 };
667
668 let pre_compression = result_text.clone();
669 let skip_terse = is_raw_shell
670 || (name == "ctx_shell"
671 && helpers::get_str(args, "command")
672 .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
673 let compression = crate::core::config::CompressionLevel::effective(&config);
674 if compression.is_active() && !skip_terse {
675 let terse_result =
676 crate::core::terse::pipeline::compress(&result_text, &compression, None);
677 if terse_result.quality_passed && terse_result.savings_pct >= 3.0 {
678 result_text = terse_result.output;
679 }
680 }
681
682 let profile_hints = crate::core::profiles::active_profile().output_hints;
683
684 if !is_raw_shell && profile_hints.verify_footer() {
685 let verify_cfg = crate::core::profiles::active_profile().verification;
686 let vr = crate::core::output_verification::verify_output(
687 &pre_compression,
688 &result_text,
689 &verify_cfg,
690 );
691 if !vr.warnings.is_empty() {
692 let msg = format!("[VERIFY] {}", vr.format_compact());
693 result_text = format!("{result_text}\n\n{msg}");
694 }
695 }
696
697 if profile_hints.archive_hint() {
698 if let Some(hint) = archive_hint {
699 result_text = format!("{result_text}\n{hint}");
700 }
701 }
702
703 if !is_raw_shell {
704 if let Some(ctx) = auto_context {
705 if crate::core::protocol::meta_visible() {
706 result_text = format!("{ctx}\n\n{result_text}");
707 }
708 }
709 }
710
711 if let Some(warning) = throttle_warning {
712 result_text = format!("{result_text}\n\n{warning}");
713 }
714
715 if let Some(bw) = budget_warning {
716 result_text = format!("{result_text}\n\n{bw}");
717 }
718
719 if !self
720 .rules_stale_checked
721 .swap(true, std::sync::atomic::Ordering::Relaxed)
722 {
723 let client = self.client_name.read().await.clone();
724 if !client.is_empty() {
725 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
726 result_text = format!("{result_text}\n\n{stale_msg}");
727 }
728 }
729 }
730
731 {
732 let _ = crate::core::slo::evaluate();
734 }
735
736 if name == "ctx_read" {
737 if minimal {
738 let mut cache = self.cache.write().await;
739 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
740 } else {
741 let read_path = self
742 .resolve_path_or_passthrough(
743 &helpers::get_str(args, "path").unwrap_or_default(),
744 )
745 .await;
746 let project_root = {
747 let session = self.session.read().await;
748 session.project_root.clone()
749 };
750 let mut cache = self.cache.write().await;
751 let enrich = crate::tools::autonomy::enrich_after_read(
752 &self.autonomy,
753 &mut cache,
754 &read_path,
755 project_root.as_deref(),
756 None,
757 crate::tools::CrpMode::effective(),
758 false,
759 );
760 if profile_hints.related_hint() {
761 if let Some(hint) = enrich.related_hint {
762 result_text = format!("{result_text}\n{hint}");
763 }
764 }
765 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
766
767 {
768 let active_task = {
769 let session = self.session.read().await;
770 session.task.as_ref().map(|t| t.description.clone())
771 };
772 let mut ledger = self.ledger.write().await;
773 let overlay = crate::core::context_overlay::OverlayStore::load_project(
774 &std::path::PathBuf::from(project_root.as_deref().unwrap_or(".")),
775 );
776 let mode_used =
777 helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
778 let gate_result = context_gate::post_dispatch_record_with_task(
779 &read_path,
780 &mode_used,
781 pre_terse_len,
782 output_tokens as usize,
783 &mut ledger,
784 &overlay,
785 active_task.as_deref(),
786 );
787 if let Some(hint) = gate_result.eviction_hint {
788 result_text = format!("{result_text}\n{hint}");
789 }
790 if profile_hints.elicitation_hint() {
791 if let Some(hint) = gate_result.elicitation_hint {
792 result_text = format!("{result_text}\n{hint}");
793 }
794 }
795 if gate_result.resource_changed {
796 if let Some(peer) = self.peer.read().await.as_ref() {
797 notifications::send_resource_updated(
798 peer,
799 notifications::RESOURCE_URI_SUMMARY,
800 )
801 .await;
802 }
803 }
804 }
805 }
806 }
807
808 if !minimal && !is_raw_shell && name == "ctx_shell" {
809 let cmd = helpers::get_str(args, "command").unwrap_or_default();
810
811 if let Some(file_path) = extract_file_read_from_shell(&cmd) {
812 if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
813 bt.next_seq();
814 bt.record_shell_file_access(&file_path);
815 }
816 }
817
818 if profile_hints.efficiency_hint() {
819 let calls = self.tool_calls.read().await;
820 let last_original = calls.last().map_or(0, |c| c.original_tokens);
821 drop(calls);
822 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
823 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
824 &self.autonomy,
825 &cmd,
826 last_original,
827 pre_hint_tokens,
828 ) {
829 result_text = format!("{result_text}\n{hint}");
830 }
831 }
832 }
833
834 if !minimal && !is_raw_shell {
835 bypass_hint::record_lctx_call();
836 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
837 if let Some(hint) = bypass_hint::check(&data_dir) {
838 result_text = format!("{result_text}\n{hint}");
839 }
840 }
841 }
842
843 #[allow(clippy::cast_possible_truncation)]
844 let output_token_count = if result_text.len() == pre_terse_len {
845 output_tokens as usize
846 } else {
847 crate::core::tokens::count_tokens(&result_text)
848 };
849 let action = helpers::get_str(args, "action");
850
851 const K_STALENESS_BOUND: i64 = 10;
853 if self.session_mode == crate::tools::SessionMode::Shared {
854 if let Some(ref rt) = self.context_os {
855 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
856 let cursor = self
857 .last_seen_event_id
858 .load(std::sync::atomic::Ordering::Relaxed);
859 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
860 let gap = latest - cursor;
861 result_text = format!(
862 "[CONTEXT STALE] {gap} events happened since your last read. \
863 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
864 );
865 }
866 self.last_seen_event_id
867 .store(latest, std::sync::atomic::Ordering::Relaxed);
868 }
869 }
870
871 {
872 let input = helpers::canonical_args_string(args);
873 let input_md5 = helpers::hash_fast(&input);
874 let output_md5 = helpers::hash_fast(&result_text);
875 let agent_id = self.agent_id.read().await.clone();
876 let client_name = self.client_name.read().await.clone();
877 let mut explicit_intent: Option<(
878 crate::core::intent_protocol::IntentRecord,
879 Option<String>,
880 String,
881 )> = None;
882
883 let pending_session_save = {
884 let empty_args = serde_json::Map::new();
885 let args_map = args.unwrap_or(&empty_args);
886 let mut session = self.session.write().await;
887 session.record_tool_receipt(
888 name,
889 action.as_deref(),
890 &input_md5,
891 &output_md5,
892 agent_id.as_deref(),
893 Some(&client_name),
894 );
895
896 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
897 name,
898 action.as_deref(),
899 args_map,
900 session.project_root.as_deref(),
901 ) {
902 let is_explicit =
903 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
904 let root = session.project_root.clone();
905 let sid = session.id.clone();
906 session.record_intent(intent.clone());
907 if is_explicit {
908 explicit_intent = Some((intent, root, sid));
909 }
910 }
911 if session.should_save() {
912 session.prepare_save().ok()
913 } else {
914 None
915 }
916 };
917
918 if let Some(prepared) = pending_session_save {
919 tokio::task::spawn_blocking(move || {
920 let _ = prepared.write_to_disk();
921 });
922 }
923
924 if let Some((intent, root, session_id)) = explicit_intent {
925 let _ = crate::core::intent_protocol::apply_side_effects(
926 &intent,
927 root.as_deref(),
928 &session_id,
929 );
930 }
931
932 if self.autonomy.is_enabled() {
933 let (calls, project_root) = {
934 let session = self.session.read().await;
935 (session.stats.total_tool_calls, session.project_root.clone())
936 };
937
938 if let Some(root) = project_root {
939 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
940 let root_clone = root.clone();
941 tokio::task::spawn_blocking(move || {
942 let _ = crate::core::consolidation_engine::consolidate_latest(
943 &root_clone,
944 crate::core::consolidation_engine::ConsolidationBudgets::default(),
945 );
946 });
947 }
948 }
949 }
950
951 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
952 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
953 let output_token_count_u64 = output_token_count as u64;
954 let name_owned = name.to_string();
955 tokio::task::spawn_blocking(move || {
956 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
957 let quote = pricing.quote_from_env_or_agent_type(&client_name);
958 let cost_usd =
959 quote
960 .cost
961 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
962 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
963
964 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
965 store.record_tool_call(
966 &agent_key,
967 &client_name,
968 &name_owned,
969 input_token_count,
970 output_token_count_u64,
971 0,
972 );
973 let _ = store.save();
974 });
975 }
976
977 if self.session_mode == crate::tools::SessionMode::Shared
979 && name == "ctx_knowledge"
980 && action.as_deref() == Some("remember")
981 {
982 if let Some(ref rt) = self.context_os {
983 let my_agent = self.agent_id.read().await.clone();
984 let category = helpers::get_str(args, "category");
985 let key = helpers::get_str(args, "key");
986 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
987 let recent = rt.bus.recent_by_kind(
988 &self.workspace_id,
989 &self.channel_id,
990 "knowledge_remembered",
991 20,
992 );
993 for ev in &recent {
994 let p = &ev.payload;
995 let ev_cat = p.get("category").and_then(|v| v.as_str());
996 let ev_key = p.get("key").and_then(|v| v.as_str());
997 let ev_actor = ev.actor.as_deref();
998 if ev_cat == Some(cat.as_str())
999 && ev_key == Some(k.as_str())
1000 && ev_actor != my_agent.as_deref()
1001 {
1002 let other = ev_actor.unwrap_or("unknown");
1003 result_text = format!(
1004 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
1005 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
1006 );
1007 break;
1008 }
1009 }
1010 }
1011 }
1012 }
1013
1014 if self.session_mode == crate::tools::SessionMode::Shared {
1016 let ws = self.workspace_id.clone();
1017 let ch = self.channel_id.clone();
1018 let rt = self.context_os.clone();
1019 let agent = self.agent_id.read().await.clone();
1020 let tool = name.to_string();
1021 let tool_action = action.clone();
1022 let tool_path = helpers::get_str(args, "path");
1023 let tool_category = helpers::get_str(args, "category");
1024 let tool_key = helpers::get_str(args, "key");
1025 let session_snapshot = self.session.read().await.clone();
1026 let session_task = session_snapshot.task.clone();
1027 tokio::task::spawn_blocking(move || {
1028 let Some(rt) = rt else {
1029 return;
1030 };
1031 let Some(root) = session_snapshot.project_root.as_deref() else {
1032 return;
1033 };
1034 rt.shared_sessions
1035 .persist_best_effort(root, &ws, &ch, &session_snapshot);
1036 rt.metrics.record_session_persisted();
1037
1038 let mut base_payload = serde_json::json!({
1039 "tool": tool,
1040 "action": tool_action,
1041 });
1042 if let Some(ref p) = tool_path {
1043 base_payload["path"] = serde_json::Value::String(p.clone());
1044 }
1045 if let Some(ref c) = tool_category {
1046 base_payload["category"] = serde_json::Value::String(c.clone());
1047 }
1048 if let Some(ref k) = tool_key {
1049 base_payload["key"] = serde_json::Value::String(k.clone());
1050 }
1051 if let Some(ref t) = session_task {
1052 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1053 }
1054
1055 if rt
1056 .bus
1057 .append(
1058 &ws,
1059 &ch,
1060 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1061 agent.as_deref(),
1062 base_payload.clone(),
1063 )
1064 .is_some()
1065 {
1066 rt.metrics.record_event_appended();
1067 rt.metrics.record_event_broadcast();
1068 }
1069
1070 if let Some(secondary) =
1071 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1072 {
1073 if rt
1074 .bus
1075 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1076 .is_some()
1077 {
1078 rt.metrics.record_event_appended();
1079 rt.metrics.record_event_broadcast();
1080 }
1081 }
1082 });
1083 }
1084
1085 let skip_checkpoint = minimal
1086 || matches!(
1087 name,
1088 "ctx_compress"
1089 | "ctx_metrics"
1090 | "ctx_benchmark"
1091 | "ctx_analyze"
1092 | "ctx_cache"
1093 | "ctx_discover"
1094 | "ctx_dedup"
1095 | "ctx_session"
1096 | "ctx_knowledge"
1097 | "ctx_agent"
1098 | "ctx_share"
1099 | "ctx_gain"
1100 | "ctx_overview"
1101 | "ctx_preload"
1102 | "ctx_cost"
1103 | "ctx_heatmap"
1104 | "ctx_task"
1105 | "ctx_impact"
1106 | "ctx_architecture"
1107 | "ctx_smells"
1108 | "ctx_workflow"
1109 );
1110
1111 if !skip_checkpoint && self.increment_and_check() {
1112 if let Some(checkpoint) = self.auto_checkpoint().await {
1113 let interval = LeanCtxServer::checkpoint_interval_effective();
1114 let hints = crate::core::profiles::active_profile().output_hints;
1115 if hints.checkpoint_in_output() && crate::core::protocol::meta_visible() {
1116 let combined = format!(
1117 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1118 );
1119 return Ok(CallToolResult::success(vec![Content::text(combined)]));
1120 }
1121 }
1122 }
1123
1124 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1125 if tool_duration_ms > 100 {
1126 LeanCtxServer::append_tool_call_log(
1127 name,
1128 tool_duration_ms,
1129 0,
1130 0,
1131 None,
1132 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1133 );
1134 }
1135
1136 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1137 if current_count > 0 && current_count.is_multiple_of(100) {
1138 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1139 }
1140
1141 Ok(CallToolResult::success(vec![Content::text(result_text)]))
1142 }
1143}
1144
1145pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1146 crate::instructions::build_instructions_for_test(crp_mode)
1147}
1148
1149pub fn build_claude_code_instructions_for_test() -> String {
1150 crate::instructions::claude_code_instructions()
1151}
1152
1153const PROJECT_MARKERS: &[&str] = &[
1154 ".git",
1155 "Cargo.toml",
1156 "package.json",
1157 "go.mod",
1158 "pyproject.toml",
1159 "setup.py",
1160 "pom.xml",
1161 "build.gradle",
1162 "Makefile",
1163 ".lean-ctx.toml",
1164];
1165
1166fn has_project_marker(dir: &std::path::Path) -> bool {
1167 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1168}
1169
1170fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1171 if let Some(home) = dirs::home_dir() {
1172 if dir == home {
1173 return true;
1174 }
1175 }
1176 let dir_str = dir.to_string_lossy();
1177 dir_str.ends_with("/.claude")
1178 || dir_str.ends_with("/.codex")
1179 || dir_str.contains("/.claude/")
1180 || dir_str.contains("/.codex/")
1181}
1182
1183fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1184 std::process::Command::new("git")
1185 .args(["rev-parse", "--show-toplevel"])
1186 .current_dir(dir)
1187 .stdout(std::process::Stdio::piped())
1188 .stderr(std::process::Stdio::null())
1189 .output()
1190 .ok()
1191 .and_then(|o| {
1192 if o.status.success() {
1193 String::from_utf8(o.stdout)
1194 .ok()
1195 .map(|s| s.trim().to_string())
1196 } else {
1197 None
1198 }
1199 })
1200}
1201
1202pub fn derive_project_root_from_cwd() -> Option<String> {
1203 let cwd = std::env::current_dir().ok()?;
1204 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1205
1206 if is_home_or_agent_dir(&canonical) {
1207 return git_toplevel_from(&canonical);
1208 }
1209
1210 if has_project_marker(&canonical) {
1211 return Some(canonical.to_string_lossy().to_string());
1212 }
1213
1214 if let Some(git_root) = git_toplevel_from(&canonical) {
1215 return Some(git_root);
1216 }
1217
1218 if let Some(root) = detect_multi_root_workspace(&canonical) {
1219 return Some(root);
1220 }
1221
1222 if !is_broad_or_unsafe_root(&canonical) {
1226 tracing::info!(
1227 "No project markers found — using CWD as project root: {}",
1228 canonical.display()
1229 );
1230 return Some(canonical.to_string_lossy().to_string());
1231 }
1232
1233 None
1234}
1235
1236fn is_broad_or_unsafe_root(dir: &std::path::Path) -> bool {
1240 if let Some(home) = dirs::home_dir() {
1241 if dir == home {
1242 return true;
1243 }
1244 }
1245 let s = dir.to_string_lossy();
1246 if s == "/" || s == "\\" || s == "." {
1247 return true;
1248 }
1249 s.ends_with("/.claude")
1251 || s.ends_with("/.codex")
1252 || s.contains("/.claude/")
1253 || s.contains("/.codex/")
1254}
1255
1256fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1260 let entries = std::fs::read_dir(dir).ok()?;
1261 let mut child_projects: Vec<String> = Vec::new();
1262
1263 for entry in entries.flatten() {
1264 let path = entry.path();
1265 if path.is_dir() && has_project_marker(&path) {
1266 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1267 child_projects.push(canonical.to_string_lossy().to_string());
1268 }
1269 }
1270
1271 if child_projects.len() >= 2 {
1272 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1273 let sep = if cfg!(windows) { ";" } else { ":" };
1274 let merged = if existing.is_empty() {
1275 child_projects.join(sep)
1276 } else {
1277 format!("{existing}{sep}{}", child_projects.join(sep))
1278 };
1279 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1280 tracing::info!(
1281 "Multi-root workspace detected at {}: auto-allowing {} child projects",
1282 dir.display(),
1283 child_projects.len()
1284 );
1285 return Some(dir.to_string_lossy().to_string());
1286 }
1287
1288 None
1289}
1290
1291pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1292 crate::tool_defs::list_all_tool_defs()
1293 .into_iter()
1294 .map(|(name, desc, _)| (name, desc))
1295 .collect()
1296}
1297
1298pub fn tool_schemas_json_for_test() -> String {
1299 crate::tool_defs::list_all_tool_defs()
1300 .iter()
1301 .map(|(name, _, schema)| format!("{name}: {schema}"))
1302 .collect::<Vec<_>>()
1303 .join("\n")
1304}
1305
1306fn is_shell_tool_name(name: &str) -> bool {
1307 matches!(name, "ctx_shell" | "ctx_execute")
1308}
1309
1310fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1311 let trimmed = cmd.trim();
1312 let parts: Vec<&str> = trimmed.split_whitespace().collect();
1313 if parts.len() < 2 {
1314 return None;
1315 }
1316 let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1317 match bin {
1318 "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1319 let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1320 Some(file_arg.to_string())
1321 }
1322 _ => None,
1323 }
1324}
1325
1326#[cfg(test)]
1327mod tests {
1328 use super::*;
1329
1330 #[test]
1331 fn project_markers_detected() {
1332 let tmp = tempfile::tempdir().unwrap();
1333 let root = tmp.path().join("myproject");
1334 std::fs::create_dir_all(&root).unwrap();
1335 assert!(!has_project_marker(&root));
1336
1337 std::fs::create_dir(root.join(".git")).unwrap();
1338 assert!(has_project_marker(&root));
1339 }
1340
1341 #[test]
1342 fn home_dir_detected_as_agent_dir() {
1343 if let Some(home) = dirs::home_dir() {
1344 assert!(is_home_or_agent_dir(&home));
1345 }
1346 }
1347
1348 #[test]
1349 fn agent_dirs_detected() {
1350 let claude = std::path::PathBuf::from("/home/user/.claude");
1351 assert!(is_home_or_agent_dir(&claude));
1352 let codex = std::path::PathBuf::from("/home/user/.codex");
1353 assert!(is_home_or_agent_dir(&codex));
1354 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1355 assert!(!is_home_or_agent_dir(&project));
1356 }
1357
1358 #[test]
1359 fn test_unified_tool_count() {
1360 let tools = crate::tool_defs::unified_tool_defs();
1361 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1362 }
1363
1364 #[test]
1365 fn test_granular_tool_count() {
1366 let tools = crate::tool_defs::granular_tool_defs();
1367 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1368 }
1369
1370 #[test]
1371 fn disabled_tools_filters_list() {
1372 let all = crate::tool_defs::granular_tool_defs();
1373 let total = all.len();
1374 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1375 let filtered: Vec<_> = all
1376 .into_iter()
1377 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1378 .collect();
1379 assert_eq!(filtered.len(), total - 2);
1380 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1381 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1382 }
1383
1384 #[test]
1385 fn empty_disabled_tools_returns_all() {
1386 let all = crate::tool_defs::granular_tool_defs();
1387 let total = all.len();
1388 let disabled: Vec<String> = vec![];
1389 let filtered: Vec<_> = all
1390 .into_iter()
1391 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1392 .collect();
1393 assert_eq!(filtered.len(), total);
1394 }
1395
1396 #[test]
1397 fn misspelled_disabled_tool_is_silently_ignored() {
1398 let all = crate::tool_defs::granular_tool_defs();
1399 let total = all.len();
1400 let disabled = ["ctx_nonexistent_tool".to_string()];
1401 let filtered: Vec<_> = all
1402 .into_iter()
1403 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1404 .collect();
1405 assert_eq!(filtered.len(), total);
1406 }
1407
1408 #[test]
1409 fn detect_multi_root_workspace_with_child_projects() {
1410 let tmp = tempfile::tempdir().unwrap();
1411 let workspace = tmp.path().join("workspace");
1412 std::fs::create_dir_all(&workspace).unwrap();
1413
1414 let proj_a = workspace.join("project-a");
1415 let proj_b = workspace.join("project-b");
1416 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1417 std::fs::create_dir_all(&proj_b).unwrap();
1418 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1419
1420 let result = detect_multi_root_workspace(&workspace);
1421 assert!(
1422 result.is_some(),
1423 "should detect workspace with 2 child projects"
1424 );
1425
1426 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1427 }
1428
1429 #[test]
1430 fn detect_multi_root_workspace_returns_none_for_single_project() {
1431 let tmp = tempfile::tempdir().unwrap();
1432 let workspace = tmp.path().join("workspace");
1433 std::fs::create_dir_all(&workspace).unwrap();
1434
1435 let proj_a = workspace.join("project-a");
1436 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1437
1438 let result = detect_multi_root_workspace(&workspace);
1439 assert!(
1440 result.is_none(),
1441 "should not detect workspace with only 1 child project"
1442 );
1443 }
1444
1445 #[test]
1446 fn is_broad_or_unsafe_root_rejects_home() {
1447 if let Some(home) = dirs::home_dir() {
1448 assert!(is_broad_or_unsafe_root(&home));
1449 }
1450 }
1451
1452 #[test]
1453 fn is_broad_or_unsafe_root_rejects_filesystem_root() {
1454 assert!(is_broad_or_unsafe_root(std::path::Path::new("/")));
1455 }
1456
1457 #[test]
1458 fn is_broad_or_unsafe_root_rejects_agent_dirs() {
1459 assert!(is_broad_or_unsafe_root(std::path::Path::new(
1460 "/home/user/.claude"
1461 )));
1462 assert!(is_broad_or_unsafe_root(std::path::Path::new(
1463 "/home/user/.codex"
1464 )));
1465 }
1466
1467 #[test]
1468 fn is_broad_or_unsafe_root_allows_project_subdir() {
1469 let tmp = tempfile::tempdir().unwrap();
1470 let subdir = tmp.path().join("my-project");
1471 std::fs::create_dir_all(&subdir).unwrap();
1472 assert!(!is_broad_or_unsafe_root(&subdir));
1473 }
1474
1475 #[test]
1476 fn is_broad_or_unsafe_root_allows_tmp_subdirs() {
1477 assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1478 "/tmp/leanctx-test"
1479 )));
1480 assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1481 "/tmp/my-project"
1482 )));
1483 }
1484
1485 #[test]
1486 fn is_broad_or_unsafe_root_allows_home_subdirs() {
1487 if let Some(home) = dirs::home_dir() {
1488 let subdir = home.join("projects").join("my-app");
1489 assert!(!is_broad_or_unsafe_root(&subdir));
1490 }
1491 }
1492
1493 #[test]
1494 fn derive_project_root_falls_back_to_bare_cwd() {
1495 let tmp = tempfile::tempdir().unwrap();
1496 let bare = tmp.path().join("bare-dir");
1497 std::fs::create_dir_all(&bare).unwrap();
1498
1499 let original = std::env::current_dir().unwrap();
1500 std::env::set_current_dir(&bare).unwrap();
1501 let result = derive_project_root_from_cwd();
1502 std::env::set_current_dir(original).unwrap();
1503
1504 assert!(result.is_some(), "bare dir should produce a project root");
1505 let root = result.unwrap();
1506 assert!(
1507 root.contains("bare-dir"),
1508 "fallback should use the bare dir path"
1509 );
1510 }
1511}