1mod dispatch;
2mod execute;
3pub mod helpers;
4
5use rmcp::handler::server::ServerHandler;
6use rmcp::model::*;
7use rmcp::service::{RequestContext, RoleServer};
8use rmcp::ErrorData;
9
10use crate::tools::{CrpMode, LeanCtxServer};
11
12impl ServerHandler for LeanCtxServer {
13 fn get_info(&self) -> ServerInfo {
14 let capabilities = ServerCapabilities::builder().enable_tools().build();
15
16 let instructions = crate::instructions::build_instructions(self.crp_mode);
17
18 InitializeResult::new(capabilities)
19 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
20 .with_instructions(instructions)
21 }
22
23 async fn initialize(
24 &self,
25 request: InitializeRequestParams,
26 _context: RequestContext<RoleServer>,
27 ) -> Result<InitializeResult, ErrorData> {
28 let name = request.client_info.name.clone();
29 tracing::info!("MCP client connected: {:?}", name);
30 *self.client_name.write().await = name.clone();
31
32 let derived_root = derive_project_root_from_cwd();
33 let cwd_str = std::env::current_dir()
34 .ok()
35 .map(|p| p.to_string_lossy().to_string())
36 .unwrap_or_default();
37 {
38 let mut session = self.session.write().await;
39 if !cwd_str.is_empty() {
40 session.shell_cwd = Some(cwd_str.clone());
41 }
42 if let Some(ref root) = derived_root {
43 session.project_root = Some(root.clone());
44 tracing::info!("Project root set to: {root}");
45 } else if let Some(ref root) = session.project_root {
46 let root_path = std::path::Path::new(root);
47 let root_has_marker = has_project_marker(root_path);
48 let root_str = root_path.to_string_lossy();
49 let root_suspicious = root_str.contains("/.claude")
50 || root_str.contains("/.codex")
51 || root_str.contains("/var/folders/")
52 || root_str.contains("/tmp/")
53 || root_str.contains("\\.claude")
54 || root_str.contains("\\.codex")
55 || root_str.contains("\\AppData\\Local\\Temp")
56 || root_str.contains("\\Temp\\");
57 if root_suspicious && !root_has_marker {
58 session.project_root = None;
59 }
60 }
61 let _ = session.save();
62 }
63
64 let agent_name = name.clone();
65 let agent_root = derived_root.clone().unwrap_or_default();
66 let agent_id_handle = self.agent_id.clone();
67 tokio::task::spawn_blocking(move || {
68 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
69 return;
70 }
71 if let Some(home) = dirs::home_dir() {
72 let _ = crate::rules_inject::inject_all_rules(&home);
73 }
74 crate::hooks::refresh_installed_hooks();
75 crate::core::version_check::check_background();
76
77 if !agent_root.is_empty() {
78 let role = match agent_name.to_lowercase().as_str() {
79 n if n.contains("cursor") => Some("coder"),
80 n if n.contains("claude") => Some("coder"),
81 n if n.contains("codex") => Some("coder"),
82 n if n.contains("antigravity") || n.contains("gemini") => Some("explorer"),
83 n if n.contains("review") => Some("reviewer"),
84 n if n.contains("test") => Some("tester"),
85 _ => None,
86 };
87 let env_role = std::env::var("LEAN_CTX_AGENT_ROLE").ok();
88 let effective_role = env_role.as_deref().or(role);
89 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
90 registry.cleanup_stale(24);
91 let id = registry.register("mcp", effective_role, &agent_root);
92 let _ = registry.save();
93 if let Ok(mut guard) = agent_id_handle.try_write() {
94 *guard = Some(id);
95 }
96 }
97 });
98
99 let instructions =
100 crate::instructions::build_instructions_with_client(self.crp_mode, &name);
101 let capabilities = ServerCapabilities::builder().enable_tools().build();
102
103 Ok(InitializeResult::new(capabilities)
104 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
105 .with_instructions(instructions))
106 }
107
108 async fn list_tools(
109 &self,
110 _request: Option<PaginatedRequestParams>,
111 _context: RequestContext<RoleServer>,
112 ) -> Result<ListToolsResult, ErrorData> {
113 let all_tools = if crate::tool_defs::is_full_mode() {
114 crate::tool_defs::granular_tool_defs()
115 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
116 crate::tool_defs::unified_tool_defs()
117 } else {
118 crate::tool_defs::lazy_tool_defs()
119 };
120
121 let disabled = crate::core::config::Config::load().disabled_tools_effective();
122 let tools = if disabled.is_empty() {
123 all_tools
124 } else {
125 all_tools
126 .into_iter()
127 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
128 .collect()
129 };
130
131 let tools = {
132 let active = self.workflow.read().await.clone();
133 if let Some(run) = active {
134 if let Some(state) = run.spec.state(&run.current) {
135 if let Some(allowed) = &state.allowed_tools {
136 let mut allow: std::collections::HashSet<&str> =
137 allowed.iter().map(|s| s.as_str()).collect();
138 allow.insert("ctx");
139 allow.insert("ctx_workflow");
140 return Ok(ListToolsResult {
141 tools: tools
142 .into_iter()
143 .filter(|t| allow.contains(t.name.as_ref()))
144 .collect(),
145 ..Default::default()
146 });
147 }
148 }
149 }
150 tools
151 };
152
153 Ok(ListToolsResult {
154 tools,
155 ..Default::default()
156 })
157 }
158
159 async fn call_tool(
160 &self,
161 request: CallToolRequestParams,
162 _context: RequestContext<RoleServer>,
163 ) -> Result<CallToolResult, ErrorData> {
164 self.check_idle_expiry().await;
165
166 let original_name = request.name.as_ref().to_string();
167 let (resolved_name, resolved_args) = if original_name == "ctx" {
168 let sub = request
169 .arguments
170 .as_ref()
171 .and_then(|a| a.get("tool"))
172 .and_then(|v| v.as_str())
173 .map(|s| s.to_string())
174 .ok_or_else(|| {
175 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
176 })?;
177 let tool_name = if sub.starts_with("ctx_") {
178 sub
179 } else {
180 format!("ctx_{sub}")
181 };
182 let mut args = request.arguments.unwrap_or_default();
183 args.remove("tool");
184 (tool_name, Some(args))
185 } else {
186 (original_name, request.arguments)
187 };
188 let name = resolved_name.as_str();
189 let args = &resolved_args;
190
191 if name != "ctx_workflow" {
192 let active = self.workflow.read().await.clone();
193 if let Some(run) = active {
194 if let Some(state) = run.spec.state(&run.current) {
195 if let Some(allowed) = &state.allowed_tools {
196 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
197 if !allowed_ok {
198 let mut shown = allowed.clone();
199 shown.sort();
200 shown.truncate(30);
201 return Ok(CallToolResult::success(vec![Content::text(format!(
202 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
203 run.spec.name,
204 run.current,
205 shown.len(),
206 shown.join(", ")
207 ))]));
208 }
209 }
210 }
211 }
212 }
213
214 let auto_context = {
215 let task = {
216 let session = self.session.read().await;
217 session.task.as_ref().map(|t| t.description.clone())
218 };
219 let project_root = {
220 let session = self.session.read().await;
221 session.project_root.clone()
222 };
223 let mut cache = self.cache.write().await;
224 crate::tools::autonomy::session_lifecycle_pre_hook(
225 &self.autonomy,
226 name,
227 &mut cache,
228 task.as_deref(),
229 project_root.as_deref(),
230 self.crp_mode,
231 )
232 };
233
234 let throttle_result = {
235 let fp = args
236 .as_ref()
237 .map(|a| {
238 crate::core::loop_detection::LoopDetector::fingerprint(
239 &serde_json::Value::Object(a.clone()),
240 )
241 })
242 .unwrap_or_default();
243 let mut detector = self.loop_detector.write().await;
244
245 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
246 let is_search_shell = name == "ctx_shell" && {
247 let cmd = args
248 .as_ref()
249 .and_then(|a| a.get("command"))
250 .and_then(|v| v.as_str())
251 .unwrap_or("");
252 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
253 };
254
255 if is_search || is_search_shell {
256 let search_pattern = args.as_ref().and_then(|a| {
257 a.get("pattern")
258 .or_else(|| a.get("query"))
259 .and_then(|v| v.as_str())
260 });
261 let shell_pattern = if is_search_shell {
262 args.as_ref()
263 .and_then(|a| a.get("command"))
264 .and_then(|v| v.as_str())
265 .and_then(helpers::extract_search_pattern_from_command)
266 } else {
267 None
268 };
269 let pat = search_pattern.or(shell_pattern.as_deref());
270 detector.record_search(name, &fp, pat)
271 } else {
272 detector.record_call(name, &fp)
273 }
274 };
275
276 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
277 let msg = throttle_result.message.unwrap_or_default();
278 return Ok(CallToolResult::success(vec![Content::text(msg)]));
279 }
280
281 let throttle_warning =
282 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
283 throttle_result.message.clone()
284 } else {
285 None
286 };
287
288 let tool_start = std::time::Instant::now();
289 let result_text = self.dispatch_tool(name, args).await?;
290
291 let mut result_text = result_text;
292
293 let archive_hint = {
295 use crate::core::archive;
296 let archivable = matches!(
297 name,
298 "ctx_shell"
299 | "ctx_read"
300 | "ctx_multi_read"
301 | "ctx_smart_read"
302 | "ctx_execute"
303 | "ctx_search"
304 | "ctx_tree"
305 );
306 if archivable && archive::should_archive(&result_text) {
307 let cmd = helpers::get_str(args, "command")
308 .or_else(|| helpers::get_str(args, "path"))
309 .unwrap_or_default();
310 let session_id = self.session.read().await.id.clone();
311 let tokens = crate::core::tokens::count_tokens(&result_text);
312 archive::store(name, &cmd, &result_text, Some(&session_id))
313 .map(|id| archive::format_hint(&id, result_text.len(), tokens))
314 } else {
315 None
316 }
317 };
318
319 {
320 let config = crate::core::config::Config::load();
321 let density = crate::core::config::OutputDensity::effective(&config.output_density);
322 result_text = crate::core::protocol::compress_output(&result_text, &density);
323 }
324
325 if let Some(hint) = archive_hint {
326 result_text = format!("{result_text}\n{hint}");
327 }
328
329 if let Some(ctx) = auto_context {
330 result_text = format!("{ctx}\n\n{result_text}");
331 }
332
333 if let Some(warning) = throttle_warning {
334 result_text = format!("{result_text}\n\n{warning}");
335 }
336
337 if name == "ctx_read" {
338 let read_path = self
339 .resolve_path_or_passthrough(&helpers::get_str(args, "path").unwrap_or_default())
340 .await;
341 let project_root = {
342 let session = self.session.read().await;
343 session.project_root.clone()
344 };
345 let mut cache = self.cache.write().await;
346 let enrich = crate::tools::autonomy::enrich_after_read(
347 &self.autonomy,
348 &mut cache,
349 &read_path,
350 project_root.as_deref(),
351 );
352 if let Some(hint) = enrich.related_hint {
353 result_text = format!("{result_text}\n{hint}");
354 }
355
356 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
357 }
358
359 if name == "ctx_shell" {
360 let cmd = helpers::get_str(args, "command").unwrap_or_default();
361 let output_tokens = crate::core::tokens::count_tokens(&result_text);
362 let calls = self.tool_calls.read().await;
363 let last_original = calls.last().map(|c| c.original_tokens).unwrap_or(0);
364 drop(calls);
365 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
366 &self.autonomy,
367 &cmd,
368 last_original,
369 output_tokens,
370 ) {
371 result_text = format!("{result_text}\n{hint}");
372 }
373 }
374
375 {
376 let input = helpers::canonical_args_string(args);
377 let input_md5 = helpers::md5_hex(&input);
378 let output_md5 = helpers::md5_hex(&result_text);
379 let action = helpers::get_str(args, "action");
380 let agent_id = self.agent_id.read().await.clone();
381 let client_name = self.client_name.read().await.clone();
382 let mut explicit_intent: Option<(
383 crate::core::intent_protocol::IntentRecord,
384 Option<String>,
385 String,
386 )> = None;
387
388 {
389 let empty_args = serde_json::Map::new();
390 let args_map = args.as_ref().unwrap_or(&empty_args);
391 let mut session = self.session.write().await;
392 session.record_tool_receipt(
393 name,
394 action.as_deref(),
395 &input_md5,
396 &output_md5,
397 agent_id.as_deref(),
398 Some(&client_name),
399 );
400
401 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
402 name,
403 action.as_deref(),
404 args_map,
405 session.project_root.as_deref(),
406 ) {
407 let is_explicit =
408 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
409 let root = session.project_root.clone();
410 let sid = session.id.clone();
411 session.record_intent(intent.clone());
412 if is_explicit {
413 explicit_intent = Some((intent, root, sid));
414 }
415 }
416 if session.should_save() {
417 let _ = session.save();
418 }
419 }
420
421 if let Some((intent, root, session_id)) = explicit_intent {
422 crate::core::intent_protocol::apply_side_effects(
423 &intent,
424 root.as_deref(),
425 &session_id,
426 );
427 }
428
429 if self.autonomy.is_enabled() {
431 let (calls, project_root) = {
432 let session = self.session.read().await;
433 (session.stats.total_tool_calls, session.project_root.clone())
434 };
435
436 if let Some(root) = project_root {
437 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
438 let root_clone = root.clone();
439 tokio::task::spawn_blocking(move || {
440 let _ = crate::core::consolidation_engine::consolidate_latest(
441 &root_clone,
442 crate::core::consolidation_engine::ConsolidationBudgets::default(),
443 );
444 });
445 }
446 }
447 }
448
449 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
450 let input_tokens = crate::core::tokens::count_tokens(&input) as u64;
451 let output_tokens = crate::core::tokens::count_tokens(&result_text) as u64;
452 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
453 store.record_tool_call(&agent_key, &client_name, name, input_tokens, output_tokens);
454 let _ = store.save();
455 }
456
457 let skip_checkpoint = matches!(
458 name,
459 "ctx_compress"
460 | "ctx_metrics"
461 | "ctx_benchmark"
462 | "ctx_analyze"
463 | "ctx_cache"
464 | "ctx_discover"
465 | "ctx_dedup"
466 | "ctx_session"
467 | "ctx_knowledge"
468 | "ctx_agent"
469 | "ctx_share"
470 | "ctx_wrapped"
471 | "ctx_overview"
472 | "ctx_preload"
473 | "ctx_cost"
474 | "ctx_gain"
475 | "ctx_heatmap"
476 | "ctx_task"
477 | "ctx_impact"
478 | "ctx_architecture"
479 | "ctx_workflow"
480 );
481
482 if !skip_checkpoint && self.increment_and_check() {
483 if let Some(checkpoint) = self.auto_checkpoint().await {
484 let combined = format!(
485 "{result_text}\n\n--- AUTO CHECKPOINT (every {} calls) ---\n{checkpoint}",
486 self.checkpoint_interval
487 );
488 return Ok(CallToolResult::success(vec![Content::text(combined)]));
489 }
490 }
491
492 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
493 if tool_duration_ms > 100 {
494 LeanCtxServer::append_tool_call_log(
495 name,
496 tool_duration_ms,
497 0,
498 0,
499 None,
500 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
501 );
502 }
503
504 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
505 if current_count > 0 && current_count.is_multiple_of(100) {
506 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
507 }
508
509 Ok(CallToolResult::success(vec![Content::text(result_text)]))
510 }
511}
512
513pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
514 crate::instructions::build_instructions(crp_mode)
515}
516
517pub fn build_claude_code_instructions_for_test() -> String {
518 crate::instructions::claude_code_instructions()
519}
520
521const PROJECT_MARKERS: &[&str] = &[
522 ".git",
523 "Cargo.toml",
524 "package.json",
525 "go.mod",
526 "pyproject.toml",
527 "setup.py",
528 "pom.xml",
529 "build.gradle",
530 "Makefile",
531 ".lean-ctx.toml",
532];
533
534fn has_project_marker(dir: &std::path::Path) -> bool {
535 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
536}
537
538fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
539 if let Some(home) = dirs::home_dir() {
540 if dir == home {
541 return true;
542 }
543 }
544 let dir_str = dir.to_string_lossy();
545 dir_str.ends_with("/.claude")
546 || dir_str.ends_with("/.codex")
547 || dir_str.contains("/.claude/")
548 || dir_str.contains("/.codex/")
549}
550
551fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
552 std::process::Command::new("git")
553 .args(["rev-parse", "--show-toplevel"])
554 .current_dir(dir)
555 .stdout(std::process::Stdio::piped())
556 .stderr(std::process::Stdio::null())
557 .output()
558 .ok()
559 .and_then(|o| {
560 if o.status.success() {
561 String::from_utf8(o.stdout)
562 .ok()
563 .map(|s| s.trim().to_string())
564 } else {
565 None
566 }
567 })
568}
569
570pub fn derive_project_root_from_cwd() -> Option<String> {
571 let cwd = std::env::current_dir().ok()?;
572 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
573
574 if is_home_or_agent_dir(&canonical) {
575 return git_toplevel_from(&canonical);
576 }
577
578 if has_project_marker(&canonical) {
579 return Some(canonical.to_string_lossy().to_string());
580 }
581
582 if let Some(git_root) = git_toplevel_from(&canonical) {
583 return Some(git_root);
584 }
585
586 if let Some(root) = detect_multi_root_workspace(&canonical) {
587 return Some(root);
588 }
589
590 None
591}
592
593fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
597 let entries = std::fs::read_dir(dir).ok()?;
598 let mut child_projects: Vec<String> = Vec::new();
599
600 for entry in entries.flatten() {
601 let path = entry.path();
602 if path.is_dir() && has_project_marker(&path) {
603 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
604 child_projects.push(canonical.to_string_lossy().to_string());
605 }
606 }
607
608 if child_projects.len() >= 2 {
609 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
610 let sep = if cfg!(windows) { ";" } else { ":" };
611 let merged = if existing.is_empty() {
612 child_projects.join(sep)
613 } else {
614 format!("{existing}{sep}{}", child_projects.join(sep))
615 };
616 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
617 tracing::info!(
618 "Multi-root workspace detected at {}: auto-allowing {} child projects",
619 dir.display(),
620 child_projects.len()
621 );
622 return Some(dir.to_string_lossy().to_string());
623 }
624
625 None
626}
627
628pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
629 crate::tool_defs::list_all_tool_defs()
630 .into_iter()
631 .map(|(name, desc, _)| (name, desc))
632 .collect()
633}
634
635pub fn tool_schemas_json_for_test() -> String {
636 crate::tool_defs::list_all_tool_defs()
637 .iter()
638 .map(|(name, _, schema)| format!("{}: {}", name, schema))
639 .collect::<Vec<_>>()
640 .join("\n")
641}
642
643#[cfg(test)]
644mod tests {
645 use super::*;
646
647 #[test]
648 fn project_markers_detected() {
649 let tmp = tempfile::tempdir().unwrap();
650 let root = tmp.path().join("myproject");
651 std::fs::create_dir_all(&root).unwrap();
652 assert!(!has_project_marker(&root));
653
654 std::fs::create_dir(root.join(".git")).unwrap();
655 assert!(has_project_marker(&root));
656 }
657
658 #[test]
659 fn home_dir_detected_as_agent_dir() {
660 if let Some(home) = dirs::home_dir() {
661 assert!(is_home_or_agent_dir(&home));
662 }
663 }
664
665 #[test]
666 fn agent_dirs_detected() {
667 let claude = std::path::PathBuf::from("/home/user/.claude");
668 assert!(is_home_or_agent_dir(&claude));
669 let codex = std::path::PathBuf::from("/home/user/.codex");
670 assert!(is_home_or_agent_dir(&codex));
671 let project = std::path::PathBuf::from("/home/user/projects/myapp");
672 assert!(!is_home_or_agent_dir(&project));
673 }
674
675 #[test]
676 fn test_unified_tool_count() {
677 let tools = crate::tool_defs::unified_tool_defs();
678 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
679 }
680
681 #[test]
682 fn test_granular_tool_count() {
683 let tools = crate::tool_defs::granular_tool_defs();
684 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
685 }
686
687 #[test]
688 fn disabled_tools_filters_list() {
689 let all = crate::tool_defs::granular_tool_defs();
690 let total = all.len();
691 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
692 let filtered: Vec<_> = all
693 .into_iter()
694 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
695 .collect();
696 assert_eq!(filtered.len(), total - 2);
697 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
698 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
699 }
700
701 #[test]
702 fn empty_disabled_tools_returns_all() {
703 let all = crate::tool_defs::granular_tool_defs();
704 let total = all.len();
705 let disabled: Vec<String> = vec![];
706 let filtered: Vec<_> = all
707 .into_iter()
708 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
709 .collect();
710 assert_eq!(filtered.len(), total);
711 }
712
713 #[test]
714 fn misspelled_disabled_tool_is_silently_ignored() {
715 let all = crate::tool_defs::granular_tool_defs();
716 let total = all.len();
717 let disabled = ["ctx_nonexistent_tool".to_string()];
718 let filtered: Vec<_> = all
719 .into_iter()
720 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
721 .collect();
722 assert_eq!(filtered.len(), total);
723 }
724
725 #[test]
726 fn detect_multi_root_workspace_with_child_projects() {
727 let tmp = tempfile::tempdir().unwrap();
728 let workspace = tmp.path().join("workspace");
729 std::fs::create_dir_all(&workspace).unwrap();
730
731 let proj_a = workspace.join("project-a");
732 let proj_b = workspace.join("project-b");
733 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
734 std::fs::create_dir_all(&proj_b).unwrap();
735 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
736
737 let result = detect_multi_root_workspace(&workspace);
738 assert!(
739 result.is_some(),
740 "should detect workspace with 2 child projects"
741 );
742
743 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
744 }
745
746 #[test]
747 fn detect_multi_root_workspace_returns_none_for_single_project() {
748 let tmp = tempfile::tempdir().unwrap();
749 let workspace = tmp.path().join("workspace");
750 std::fs::create_dir_all(&workspace).unwrap();
751
752 let proj_a = workspace.join("project-a");
753 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
754
755 let result = detect_multi_root_workspace(&workspace);
756 assert!(
757 result.is_none(),
758 "should not detect workspace with only 1 child project"
759 );
760 }
761}