1mod dispatch;
2mod execute;
3pub mod helpers;
4
5use rmcp::handler::server::ServerHandler;
6use rmcp::model::{
7 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
8 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
9};
10use rmcp::service::{RequestContext, RoleServer};
11use rmcp::ErrorData;
12
13use crate::tools::{CrpMode, LeanCtxServer};
14
15impl ServerHandler for LeanCtxServer {
16 fn get_info(&self) -> ServerInfo {
17 let capabilities = ServerCapabilities::builder().enable_tools().build();
18
19 let instructions = crate::instructions::build_instructions(self.crp_mode);
20
21 InitializeResult::new(capabilities)
22 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
23 .with_instructions(instructions)
24 }
25
26 async fn initialize(
27 &self,
28 request: InitializeRequestParams,
29 _context: RequestContext<RoleServer>,
30 ) -> Result<InitializeResult, ErrorData> {
31 let name = request.client_info.name.clone();
32 tracing::info!("MCP client connected: {:?}", name);
33 *self.client_name.write().await = name.clone();
34
35 let derived_root = derive_project_root_from_cwd();
36 let cwd_str = std::env::current_dir()
37 .ok()
38 .map(|p| p.to_string_lossy().to_string())
39 .unwrap_or_default();
40 {
41 let mut session = self.session.write().await;
42 if !cwd_str.is_empty() {
43 session.shell_cwd = Some(cwd_str.clone());
44 }
45 if let Some(ref root) = derived_root {
46 session.project_root = Some(root.clone());
47 tracing::info!("Project root set to: {root}");
48 } else if let Some(ref root) = session.project_root {
49 let root_path = std::path::Path::new(root);
50 let root_has_marker = has_project_marker(root_path);
51 let root_str = root_path.to_string_lossy();
52 let root_suspicious = root_str.contains("/.claude")
53 || root_str.contains("/.codex")
54 || root_str.contains("/var/folders/")
55 || root_str.contains("/tmp/")
56 || root_str.contains("\\.claude")
57 || root_str.contains("\\.codex")
58 || root_str.contains("\\AppData\\Local\\Temp")
59 || root_str.contains("\\Temp\\");
60 if root_suspicious && !root_has_marker {
61 session.project_root = None;
62 }
63 }
64 let _ = session.save();
65 }
66
67 let agent_name = name.clone();
68 let agent_root = derived_root.clone().unwrap_or_default();
69 let agent_id_handle = self.agent_id.clone();
70 tokio::task::spawn_blocking(move || {
71 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
72 return;
73 }
74 if let Some(home) = dirs::home_dir() {
75 let _ = crate::rules_inject::inject_all_rules(&home);
76 }
77 crate::hooks::refresh_installed_hooks();
78 crate::core::version_check::check_background();
79
80 if !agent_root.is_empty() {
81 let role = match agent_name.to_lowercase().as_str() {
82 n if n.contains("cursor") => Some("coder"),
83 n if n.contains("claude") => Some("coder"),
84 n if n.contains("codex") => Some("coder"),
85 n if n.contains("antigravity") || n.contains("gemini") => Some("explorer"),
86 n if n.contains("review") => Some("reviewer"),
87 n if n.contains("test") => Some("tester"),
88 _ => None,
89 };
90 let env_role = std::env::var("LEAN_CTX_AGENT_ROLE").ok();
91 let effective_role = env_role.as_deref().or(role);
92 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
93 registry.cleanup_stale(24);
94 let id = registry.register("mcp", effective_role, &agent_root);
95 let _ = registry.save();
96 if let Ok(mut guard) = agent_id_handle.try_write() {
97 *guard = Some(id);
98 }
99 }
100 });
101
102 let instructions =
103 crate::instructions::build_instructions_with_client(self.crp_mode, &name);
104 let capabilities = ServerCapabilities::builder().enable_tools().build();
105
106 Ok(InitializeResult::new(capabilities)
107 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
108 .with_instructions(instructions))
109 }
110
111 async fn list_tools(
112 &self,
113 _request: Option<PaginatedRequestParams>,
114 _context: RequestContext<RoleServer>,
115 ) -> Result<ListToolsResult, ErrorData> {
116 let all_tools = if crate::tool_defs::is_full_mode() {
117 crate::tool_defs::granular_tool_defs()
118 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
119 crate::tool_defs::unified_tool_defs()
120 } else {
121 crate::tool_defs::lazy_tool_defs()
122 };
123
124 let disabled = crate::core::config::Config::load().disabled_tools_effective();
125 let tools = if disabled.is_empty() {
126 all_tools
127 } else {
128 all_tools
129 .into_iter()
130 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
131 .collect()
132 };
133
134 let tools = {
135 let active = self.workflow.read().await.clone();
136 if let Some(run) = active {
137 if let Some(state) = run.spec.state(&run.current) {
138 if let Some(allowed) = &state.allowed_tools {
139 let mut allow: std::collections::HashSet<&str> =
140 allowed.iter().map(std::string::String::as_str).collect();
141 allow.insert("ctx");
142 allow.insert("ctx_workflow");
143 return Ok(ListToolsResult {
144 tools: tools
145 .into_iter()
146 .filter(|t| allow.contains(t.name.as_ref()))
147 .collect(),
148 ..Default::default()
149 });
150 }
151 }
152 }
153 tools
154 };
155
156 Ok(ListToolsResult {
157 tools,
158 ..Default::default()
159 })
160 }
161
162 async fn call_tool(
163 &self,
164 request: CallToolRequestParams,
165 _context: RequestContext<RoleServer>,
166 ) -> Result<CallToolResult, ErrorData> {
167 self.check_idle_expiry().await;
168
169 let original_name = request.name.as_ref().to_string();
170 let (resolved_name, resolved_args) = if original_name == "ctx" {
171 let sub = request
172 .arguments
173 .as_ref()
174 .and_then(|a| a.get("tool"))
175 .and_then(|v| v.as_str())
176 .map(std::string::ToString::to_string)
177 .ok_or_else(|| {
178 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
179 })?;
180 let tool_name = if sub.starts_with("ctx_") {
181 sub
182 } else {
183 format!("ctx_{sub}")
184 };
185 let mut args = request.arguments.unwrap_or_default();
186 args.remove("tool");
187 (tool_name, Some(args))
188 } else {
189 (original_name, request.arguments)
190 };
191 let name = resolved_name.as_str();
192 let args = resolved_args.as_ref();
193
194 if name != "ctx_workflow" {
195 let active = self.workflow.read().await.clone();
196 if let Some(run) = active {
197 if let Some(state) = run.spec.state(&run.current) {
198 if let Some(allowed) = &state.allowed_tools {
199 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
200 if !allowed_ok {
201 let mut shown = allowed.clone();
202 shown.sort();
203 shown.truncate(30);
204 return Ok(CallToolResult::success(vec![Content::text(format!(
205 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
206 run.spec.name,
207 run.current,
208 shown.len(),
209 shown.join(", ")
210 ))]));
211 }
212 }
213 }
214 }
215 }
216
217 let auto_context = {
218 let task = {
219 let session = self.session.read().await;
220 session.task.as_ref().map(|t| t.description.clone())
221 };
222 let project_root = {
223 let session = self.session.read().await;
224 session.project_root.clone()
225 };
226 let mut cache = self.cache.write().await;
227 crate::tools::autonomy::session_lifecycle_pre_hook(
228 &self.autonomy,
229 name,
230 &mut cache,
231 task.as_deref(),
232 project_root.as_deref(),
233 self.crp_mode,
234 )
235 };
236
237 let throttle_result = {
238 let fp = args
239 .map(|a| {
240 crate::core::loop_detection::LoopDetector::fingerprint(
241 &serde_json::Value::Object(a.clone()),
242 )
243 })
244 .unwrap_or_default();
245 let mut detector = self.loop_detector.write().await;
246
247 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
248 let is_search_shell = name == "ctx_shell" && {
249 let cmd = args
250 .as_ref()
251 .and_then(|a| a.get("command"))
252 .and_then(|v| v.as_str())
253 .unwrap_or("");
254 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
255 };
256
257 if is_search || is_search_shell {
258 let search_pattern = args.and_then(|a| {
259 a.get("pattern")
260 .or_else(|| a.get("query"))
261 .and_then(|v| v.as_str())
262 });
263 let shell_pattern = if is_search_shell {
264 args.and_then(|a| a.get("command"))
265 .and_then(|v| v.as_str())
266 .and_then(helpers::extract_search_pattern_from_command)
267 } else {
268 None
269 };
270 let pat = search_pattern.or(shell_pattern.as_deref());
271 detector.record_search(name, &fp, pat)
272 } else {
273 detector.record_call(name, &fp)
274 }
275 };
276
277 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
278 let msg = throttle_result.message.unwrap_or_default();
279 return Ok(CallToolResult::success(vec![Content::text(msg)]));
280 }
281
282 let throttle_warning =
283 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
284 throttle_result.message.clone()
285 } else {
286 None
287 };
288
289 let config = crate::core::config::Config::load();
290 let minimal = config.minimal_overhead_effective();
291
292 let tool_start = std::time::Instant::now();
293 let result_text = self.dispatch_tool(name, args, minimal).await?;
294
295 let mut result_text = result_text;
296
297 let archive_hint = if minimal {
298 None
299 } else {
300 use crate::core::archive;
301 let archivable = matches!(
302 name,
303 "ctx_shell"
304 | "ctx_read"
305 | "ctx_multi_read"
306 | "ctx_smart_read"
307 | "ctx_execute"
308 | "ctx_search"
309 | "ctx_tree"
310 );
311 if archivable && archive::should_archive(&result_text) {
312 let cmd = helpers::get_str(args, "command")
313 .or_else(|| helpers::get_str(args, "path"))
314 .unwrap_or_default();
315 let session_id = self.session.read().await.id.clone();
316 let tokens = crate::core::tokens::count_tokens(&result_text);
317 archive::store(name, &cmd, &result_text, Some(&session_id))
318 .map(|id| archive::format_hint(&id, result_text.len(), tokens))
319 } else {
320 None
321 }
322 };
323
324 let density = crate::core::config::OutputDensity::effective(&config.output_density);
325 if density != crate::core::config::OutputDensity::Normal {
326 result_text = crate::core::protocol::compress_output(&result_text, &density);
327 }
328
329 if let Some(hint) = archive_hint {
330 result_text = format!("{result_text}\n{hint}");
331 }
332
333 if let Some(ctx) = auto_context {
334 result_text = format!("{ctx}\n\n{result_text}");
335 }
336
337 if let Some(warning) = throttle_warning {
338 result_text = format!("{result_text}\n\n{warning}");
339 }
340
341 if name == "ctx_read" {
342 if minimal {
343 let mut cache = self.cache.write().await;
344 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
345 } else {
346 let read_path = self
347 .resolve_path_or_passthrough(
348 &helpers::get_str(args, "path").unwrap_or_default(),
349 )
350 .await;
351 let project_root = {
352 let session = self.session.read().await;
353 session.project_root.clone()
354 };
355 let mut cache = self.cache.write().await;
356 let enrich = crate::tools::autonomy::enrich_after_read(
357 &self.autonomy,
358 &mut cache,
359 &read_path,
360 project_root.as_deref(),
361 );
362 if let Some(hint) = enrich.related_hint {
363 result_text = format!("{result_text}\n{hint}");
364 }
365 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
366 }
367 }
368
369 let output_token_count = crate::core::tokens::count_tokens(&result_text);
370
371 if !minimal && name == "ctx_shell" {
372 let cmd = helpers::get_str(args, "command").unwrap_or_default();
373 let calls = self.tool_calls.read().await;
374 let last_original = calls.last().map_or(0, |c| c.original_tokens);
375 drop(calls);
376 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
377 &self.autonomy,
378 &cmd,
379 last_original,
380 output_token_count,
381 ) {
382 result_text = format!("{result_text}\n{hint}");
383 }
384 }
385
386 {
387 let input = helpers::canonical_args_string(args);
388 let input_md5 = helpers::md5_hex_fast(&input);
389 let output_md5 = helpers::md5_hex_fast(&result_text);
390 let action = helpers::get_str(args, "action");
391 let agent_id = self.agent_id.read().await.clone();
392 let client_name = self.client_name.read().await.clone();
393 let mut explicit_intent: Option<(
394 crate::core::intent_protocol::IntentRecord,
395 Option<String>,
396 String,
397 )> = None;
398
399 let pending_session_save = {
400 let empty_args = serde_json::Map::new();
401 let args_map = args.unwrap_or(&empty_args);
402 let mut session = self.session.write().await;
403 session.record_tool_receipt(
404 name,
405 action.as_deref(),
406 &input_md5,
407 &output_md5,
408 agent_id.as_deref(),
409 Some(&client_name),
410 );
411
412 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
413 name,
414 action.as_deref(),
415 args_map,
416 session.project_root.as_deref(),
417 ) {
418 let is_explicit =
419 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
420 let root = session.project_root.clone();
421 let sid = session.id.clone();
422 session.record_intent(intent.clone());
423 if is_explicit {
424 explicit_intent = Some((intent, root, sid));
425 }
426 }
427 if session.should_save() {
428 session.prepare_save().ok()
429 } else {
430 None
431 }
432 };
433
434 if let Some(prepared) = pending_session_save {
435 tokio::task::spawn_blocking(move || {
436 let _ = prepared.write_to_disk();
437 });
438 }
439
440 if let Some((intent, root, session_id)) = explicit_intent {
441 crate::core::intent_protocol::apply_side_effects(
442 &intent,
443 root.as_deref(),
444 &session_id,
445 );
446 }
447
448 if self.autonomy.is_enabled() {
449 let (calls, project_root) = {
450 let session = self.session.read().await;
451 (session.stats.total_tool_calls, session.project_root.clone())
452 };
453
454 if let Some(root) = project_root {
455 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
456 let root_clone = root.clone();
457 tokio::task::spawn_blocking(move || {
458 let _ = crate::core::consolidation_engine::consolidate_latest(
459 &root_clone,
460 crate::core::consolidation_engine::ConsolidationBudgets::default(),
461 );
462 });
463 }
464 }
465 }
466
467 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
468 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
469 let output_token_count_u64 = output_token_count as u64;
470 let name_owned = name.to_string();
471 tokio::task::spawn_blocking(move || {
472 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
473 store.record_tool_call(
474 &agent_key,
475 &client_name,
476 &name_owned,
477 input_token_count,
478 output_token_count_u64,
479 );
480 let _ = store.save();
481 });
482 }
483
484 let skip_checkpoint = minimal
485 || matches!(
486 name,
487 "ctx_compress"
488 | "ctx_metrics"
489 | "ctx_benchmark"
490 | "ctx_analyze"
491 | "ctx_cache"
492 | "ctx_discover"
493 | "ctx_dedup"
494 | "ctx_session"
495 | "ctx_knowledge"
496 | "ctx_agent"
497 | "ctx_share"
498 | "ctx_wrapped"
499 | "ctx_overview"
500 | "ctx_preload"
501 | "ctx_cost"
502 | "ctx_gain"
503 | "ctx_heatmap"
504 | "ctx_task"
505 | "ctx_impact"
506 | "ctx_architecture"
507 | "ctx_workflow"
508 );
509
510 if !skip_checkpoint && self.increment_and_check() {
511 if let Some(checkpoint) = self.auto_checkpoint().await {
512 let combined = format!(
513 "{result_text}\n\n--- AUTO CHECKPOINT (every {} calls) ---\n{checkpoint}",
514 self.checkpoint_interval
515 );
516 return Ok(CallToolResult::success(vec![Content::text(combined)]));
517 }
518 }
519
520 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
521 if tool_duration_ms > 100 {
522 LeanCtxServer::append_tool_call_log(
523 name,
524 tool_duration_ms,
525 0,
526 0,
527 None,
528 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
529 );
530 }
531
532 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
533 if current_count > 0 && current_count.is_multiple_of(100) {
534 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
535 }
536
537 Ok(CallToolResult::success(vec![Content::text(result_text)]))
538 }
539}
540
541pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
542 crate::instructions::build_instructions(crp_mode)
543}
544
545pub fn build_claude_code_instructions_for_test() -> String {
546 crate::instructions::claude_code_instructions()
547}
548
549const PROJECT_MARKERS: &[&str] = &[
550 ".git",
551 "Cargo.toml",
552 "package.json",
553 "go.mod",
554 "pyproject.toml",
555 "setup.py",
556 "pom.xml",
557 "build.gradle",
558 "Makefile",
559 ".lean-ctx.toml",
560];
561
562fn has_project_marker(dir: &std::path::Path) -> bool {
563 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
564}
565
566fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
567 if let Some(home) = dirs::home_dir() {
568 if dir == home {
569 return true;
570 }
571 }
572 let dir_str = dir.to_string_lossy();
573 dir_str.ends_with("/.claude")
574 || dir_str.ends_with("/.codex")
575 || dir_str.contains("/.claude/")
576 || dir_str.contains("/.codex/")
577}
578
579fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
580 std::process::Command::new("git")
581 .args(["rev-parse", "--show-toplevel"])
582 .current_dir(dir)
583 .stdout(std::process::Stdio::piped())
584 .stderr(std::process::Stdio::null())
585 .output()
586 .ok()
587 .and_then(|o| {
588 if o.status.success() {
589 String::from_utf8(o.stdout)
590 .ok()
591 .map(|s| s.trim().to_string())
592 } else {
593 None
594 }
595 })
596}
597
598pub fn derive_project_root_from_cwd() -> Option<String> {
599 let cwd = std::env::current_dir().ok()?;
600 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
601
602 if is_home_or_agent_dir(&canonical) {
603 return git_toplevel_from(&canonical);
604 }
605
606 if has_project_marker(&canonical) {
607 return Some(canonical.to_string_lossy().to_string());
608 }
609
610 if let Some(git_root) = git_toplevel_from(&canonical) {
611 return Some(git_root);
612 }
613
614 if let Some(root) = detect_multi_root_workspace(&canonical) {
615 return Some(root);
616 }
617
618 None
619}
620
621fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
625 let entries = std::fs::read_dir(dir).ok()?;
626 let mut child_projects: Vec<String> = Vec::new();
627
628 for entry in entries.flatten() {
629 let path = entry.path();
630 if path.is_dir() && has_project_marker(&path) {
631 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
632 child_projects.push(canonical.to_string_lossy().to_string());
633 }
634 }
635
636 if child_projects.len() >= 2 {
637 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
638 let sep = if cfg!(windows) { ";" } else { ":" };
639 let merged = if existing.is_empty() {
640 child_projects.join(sep)
641 } else {
642 format!("{existing}{sep}{}", child_projects.join(sep))
643 };
644 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
645 tracing::info!(
646 "Multi-root workspace detected at {}: auto-allowing {} child projects",
647 dir.display(),
648 child_projects.len()
649 );
650 return Some(dir.to_string_lossy().to_string());
651 }
652
653 None
654}
655
656pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
657 crate::tool_defs::list_all_tool_defs()
658 .into_iter()
659 .map(|(name, desc, _)| (name, desc))
660 .collect()
661}
662
663pub fn tool_schemas_json_for_test() -> String {
664 crate::tool_defs::list_all_tool_defs()
665 .iter()
666 .map(|(name, _, schema)| format!("{name}: {schema}"))
667 .collect::<Vec<_>>()
668 .join("\n")
669}
670
671#[cfg(test)]
672mod tests {
673 use super::*;
674
675 #[test]
676 fn project_markers_detected() {
677 let tmp = tempfile::tempdir().unwrap();
678 let root = tmp.path().join("myproject");
679 std::fs::create_dir_all(&root).unwrap();
680 assert!(!has_project_marker(&root));
681
682 std::fs::create_dir(root.join(".git")).unwrap();
683 assert!(has_project_marker(&root));
684 }
685
686 #[test]
687 fn home_dir_detected_as_agent_dir() {
688 if let Some(home) = dirs::home_dir() {
689 assert!(is_home_or_agent_dir(&home));
690 }
691 }
692
693 #[test]
694 fn agent_dirs_detected() {
695 let claude = std::path::PathBuf::from("/home/user/.claude");
696 assert!(is_home_or_agent_dir(&claude));
697 let codex = std::path::PathBuf::from("/home/user/.codex");
698 assert!(is_home_or_agent_dir(&codex));
699 let project = std::path::PathBuf::from("/home/user/projects/myapp");
700 assert!(!is_home_or_agent_dir(&project));
701 }
702
703 #[test]
704 fn test_unified_tool_count() {
705 let tools = crate::tool_defs::unified_tool_defs();
706 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
707 }
708
709 #[test]
710 fn test_granular_tool_count() {
711 let tools = crate::tool_defs::granular_tool_defs();
712 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
713 }
714
715 #[test]
716 fn disabled_tools_filters_list() {
717 let all = crate::tool_defs::granular_tool_defs();
718 let total = all.len();
719 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
720 let filtered: Vec<_> = all
721 .into_iter()
722 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
723 .collect();
724 assert_eq!(filtered.len(), total - 2);
725 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
726 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
727 }
728
729 #[test]
730 fn empty_disabled_tools_returns_all() {
731 let all = crate::tool_defs::granular_tool_defs();
732 let total = all.len();
733 let disabled: Vec<String> = vec![];
734 let filtered: Vec<_> = all
735 .into_iter()
736 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
737 .collect();
738 assert_eq!(filtered.len(), total);
739 }
740
741 #[test]
742 fn misspelled_disabled_tool_is_silently_ignored() {
743 let all = crate::tool_defs::granular_tool_defs();
744 let total = all.len();
745 let disabled = ["ctx_nonexistent_tool".to_string()];
746 let filtered: Vec<_> = all
747 .into_iter()
748 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
749 .collect();
750 assert_eq!(filtered.len(), total);
751 }
752
753 #[test]
754 fn detect_multi_root_workspace_with_child_projects() {
755 let tmp = tempfile::tempdir().unwrap();
756 let workspace = tmp.path().join("workspace");
757 std::fs::create_dir_all(&workspace).unwrap();
758
759 let proj_a = workspace.join("project-a");
760 let proj_b = workspace.join("project-b");
761 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
762 std::fs::create_dir_all(&proj_b).unwrap();
763 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
764
765 let result = detect_multi_root_workspace(&workspace);
766 assert!(
767 result.is_some(),
768 "should detect workspace with 2 child projects"
769 );
770
771 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
772 }
773
774 #[test]
775 fn detect_multi_root_workspace_returns_none_for_single_project() {
776 let tmp = tempfile::tempdir().unwrap();
777 let workspace = tmp.path().join("workspace");
778 std::fs::create_dir_all(&workspace).unwrap();
779
780 let proj_a = workspace.join("project-a");
781 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
782
783 let result = detect_multi_root_workspace(&workspace);
784 assert!(
785 result.is_none(),
786 "should not detect workspace with only 1 child project"
787 );
788 }
789}