Skip to main content

lean_ctx/server/
mod.rs

1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod role_guard;
5
6use rmcp::handler::server::ServerHandler;
7use rmcp::model::{
8    CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
9    InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
10};
11use rmcp::service::{RequestContext, RoleServer};
12use rmcp::ErrorData;
13
14use crate::tools::{CrpMode, LeanCtxServer};
15
16impl ServerHandler for LeanCtxServer {
17    fn get_info(&self) -> ServerInfo {
18        let capabilities = ServerCapabilities::builder().enable_tools().build();
19
20        let instructions = crate::instructions::build_instructions(CrpMode::effective());
21
22        InitializeResult::new(capabilities)
23            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
24            .with_instructions(instructions)
25    }
26
27    async fn initialize(
28        &self,
29        request: InitializeRequestParams,
30        _context: RequestContext<RoleServer>,
31    ) -> Result<InitializeResult, ErrorData> {
32        let name = request.client_info.name.clone();
33        tracing::info!("MCP client connected: {:?}", name);
34        *self.client_name.write().await = name.clone();
35
36        let derived_root = derive_project_root_from_cwd();
37        let cwd_str = std::env::current_dir()
38            .ok()
39            .map(|p| p.to_string_lossy().to_string())
40            .unwrap_or_default();
41        {
42            let mut session = self.session.write().await;
43            if !cwd_str.is_empty() {
44                session.shell_cwd = Some(cwd_str.clone());
45            }
46            if let Some(ref root) = derived_root {
47                session.project_root = Some(root.clone());
48                tracing::info!("Project root set to: {root}");
49            } else if let Some(ref root) = session.project_root {
50                let root_path = std::path::Path::new(root);
51                let root_has_marker = has_project_marker(root_path);
52                let root_str = root_path.to_string_lossy();
53                let root_suspicious = root_str.contains("/.claude")
54                    || root_str.contains("/.codex")
55                    || root_str.contains("/var/folders/")
56                    || root_str.contains("/tmp/")
57                    || root_str.contains("\\.claude")
58                    || root_str.contains("\\.codex")
59                    || root_str.contains("\\AppData\\Local\\Temp")
60                    || root_str.contains("\\Temp\\");
61                if root_suspicious && !root_has_marker {
62                    session.project_root = None;
63                }
64            }
65            let _ = session.save();
66        }
67
68        let agent_name = name.clone();
69        let agent_root = derived_root.clone().unwrap_or_default();
70        let agent_id_handle = self.agent_id.clone();
71        tokio::task::spawn_blocking(move || {
72            if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
73                return;
74            }
75
76            // Avoid startup stampedes when multiple agent sessions initialize at once.
77            // These are best-effort maintenance tasks; it's fine to skip if another
78            // lean-ctx instance is already doing them.
79            let maintenance = crate::core::startup_guard::try_acquire_lock(
80                "startup-maintenance",
81                std::time::Duration::from_secs(2),
82                std::time::Duration::from_mins(2),
83            );
84            if maintenance.is_some() {
85                if let Some(home) = dirs::home_dir() {
86                    let _ = crate::rules_inject::inject_all_rules(&home);
87                }
88                crate::hooks::refresh_installed_hooks();
89                crate::core::version_check::check_background();
90            }
91            drop(maintenance);
92
93            if !agent_root.is_empty() {
94                let heuristic_role = match agent_name.to_lowercase().as_str() {
95                    n if n.contains("cursor") => Some("coder"),
96                    n if n.contains("claude") => Some("coder"),
97                    n if n.contains("codex") => Some("coder"),
98                    n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
99                    n if n.contains("review") => Some("reviewer"),
100                    n if n.contains("test") => Some("debugger"),
101                    _ => None,
102                };
103                let env_role = std::env::var("LEAN_CTX_ROLE")
104                    .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
105                    .ok();
106                let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
107
108                let _ = crate::core::roles::set_active_role(effective_role);
109
110                let mut registry = crate::core::agents::AgentRegistry::load_or_create();
111                registry.cleanup_stale(24);
112                let id = registry.register("mcp", Some(effective_role), &agent_root);
113                let _ = registry.save();
114                if let Ok(mut guard) = agent_id_handle.try_write() {
115                    *guard = Some(id);
116                }
117            }
118        });
119
120        let instructions =
121            crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
122        let capabilities = ServerCapabilities::builder().enable_tools().build();
123
124        Ok(InitializeResult::new(capabilities)
125            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
126            .with_instructions(instructions))
127    }
128
129    async fn list_tools(
130        &self,
131        _request: Option<PaginatedRequestParams>,
132        _context: RequestContext<RoleServer>,
133    ) -> Result<ListToolsResult, ErrorData> {
134        let all_tools = if crate::tool_defs::is_full_mode() {
135            crate::tool_defs::granular_tool_defs()
136        } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
137            crate::tool_defs::unified_tool_defs()
138        } else {
139            crate::tool_defs::lazy_tool_defs()
140        };
141
142        let disabled = crate::core::config::Config::load().disabled_tools_effective();
143        let tools = if disabled.is_empty() {
144            all_tools
145        } else {
146            all_tools
147                .into_iter()
148                .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
149                .collect()
150        };
151
152        let tools = {
153            let active = self.workflow.read().await.clone();
154            if let Some(run) = active {
155                if let Some(state) = run.spec.state(&run.current) {
156                    if let Some(allowed) = &state.allowed_tools {
157                        let mut allow: std::collections::HashSet<&str> =
158                            allowed.iter().map(std::string::String::as_str).collect();
159                        allow.insert("ctx");
160                        allow.insert("ctx_workflow");
161                        return Ok(ListToolsResult {
162                            tools: tools
163                                .into_iter()
164                                .filter(|t| allow.contains(t.name.as_ref()))
165                                .collect(),
166                            ..Default::default()
167                        });
168                    }
169                }
170            }
171            tools
172        };
173
174        Ok(ListToolsResult {
175            tools,
176            ..Default::default()
177        })
178    }
179
180    async fn call_tool(
181        &self,
182        request: CallToolRequestParams,
183        _context: RequestContext<RoleServer>,
184    ) -> Result<CallToolResult, ErrorData> {
185        self.check_idle_expiry().await;
186
187        let original_name = request.name.as_ref().to_string();
188        let (resolved_name, resolved_args) = if original_name == "ctx" {
189            let sub = request
190                .arguments
191                .as_ref()
192                .and_then(|a| a.get("tool"))
193                .and_then(|v| v.as_str())
194                .map(std::string::ToString::to_string)
195                .ok_or_else(|| {
196                    ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
197                })?;
198            let tool_name = if sub.starts_with("ctx_") {
199                sub
200            } else {
201                format!("ctx_{sub}")
202            };
203            let mut args = request.arguments.unwrap_or_default();
204            args.remove("tool");
205            (tool_name, Some(args))
206        } else {
207            (original_name, request.arguments)
208        };
209        let name = resolved_name.as_str();
210        let args = resolved_args.as_ref();
211
212        let role_check = role_guard::check_tool_access(name);
213        if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
214            tracing::warn!(
215                tool = name,
216                role = %role_check.role_name,
217                "Tool blocked by role policy"
218            );
219            return Ok(denied);
220        }
221
222        if name != "ctx_workflow" {
223            let active = self.workflow.read().await.clone();
224            if let Some(run) = active {
225                if let Some(state) = run.spec.state(&run.current) {
226                    if let Some(allowed) = &state.allowed_tools {
227                        let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
228                        if !allowed_ok {
229                            let mut shown = allowed.clone();
230                            shown.sort();
231                            shown.truncate(30);
232                            return Ok(CallToolResult::success(vec![Content::text(format!(
233                                "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
234                                run.spec.name,
235                                run.current,
236                                shown.len(),
237                                shown.join(", ")
238                            ))]));
239                        }
240                    }
241                }
242            }
243        }
244
245        let auto_context = {
246            let task = {
247                let session = self.session.read().await;
248                session.task.as_ref().map(|t| t.description.clone())
249            };
250            let project_root = {
251                let session = self.session.read().await;
252                session.project_root.clone()
253            };
254            let mut cache = self.cache.write().await;
255            crate::tools::autonomy::session_lifecycle_pre_hook(
256                &self.autonomy,
257                name,
258                &mut cache,
259                task.as_deref(),
260                project_root.as_deref(),
261                CrpMode::effective(),
262            )
263        };
264
265        let throttle_result = {
266            let fp = args
267                .map(|a| {
268                    crate::core::loop_detection::LoopDetector::fingerprint(
269                        &serde_json::Value::Object(a.clone()),
270                    )
271                })
272                .unwrap_or_default();
273            let mut detector = self.loop_detector.write().await;
274
275            let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
276            let is_search_shell = name == "ctx_shell" && {
277                let cmd = args
278                    .as_ref()
279                    .and_then(|a| a.get("command"))
280                    .and_then(|v| v.as_str())
281                    .unwrap_or("");
282                crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
283            };
284
285            if is_search || is_search_shell {
286                let search_pattern = args.and_then(|a| {
287                    a.get("pattern")
288                        .or_else(|| a.get("query"))
289                        .and_then(|v| v.as_str())
290                });
291                let shell_pattern = if is_search_shell {
292                    args.and_then(|a| a.get("command"))
293                        .and_then(|v| v.as_str())
294                        .and_then(helpers::extract_search_pattern_from_command)
295                } else {
296                    None
297                };
298                let pat = search_pattern.or(shell_pattern.as_deref());
299                detector.record_search(name, &fp, pat)
300            } else {
301                detector.record_call(name, &fp)
302            }
303        };
304
305        if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
306            let msg = throttle_result.message.unwrap_or_default();
307            return Ok(CallToolResult::success(vec![Content::text(msg)]));
308        }
309
310        let throttle_warning =
311            if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
312                throttle_result.message.clone()
313            } else {
314                None
315            };
316
317        let config = crate::core::config::Config::load();
318        let minimal = config.minimal_overhead_effective();
319
320        {
321            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
322            let snap = BudgetTracker::global().check();
323            if *snap.worst_level() == BudgetLevel::Exhausted
324                && name != "ctx_session"
325                && name != "ctx_cost"
326                && name != "ctx_metrics"
327            {
328                for (dim, lvl, used, limit) in [
329                    (
330                        "tokens",
331                        &snap.tokens.level,
332                        format!("{}", snap.tokens.used),
333                        format!("{}", snap.tokens.limit),
334                    ),
335                    (
336                        "shell",
337                        &snap.shell.level,
338                        format!("{}", snap.shell.used),
339                        format!("{}", snap.shell.limit),
340                    ),
341                    (
342                        "cost",
343                        &snap.cost.level,
344                        format!("${:.2}", snap.cost.used_usd),
345                        format!("${:.2}", snap.cost.limit_usd),
346                    ),
347                ] {
348                    if *lvl == BudgetLevel::Exhausted {
349                        crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
350                    }
351                }
352                let msg = format!(
353                    "[BUDGET EXHAUSTED] {}\n\
354                     Use `ctx_session action=role` to check/switch roles, \
355                     or `ctx_session action=reset` to start fresh.",
356                    snap.format_compact()
357                );
358                tracing::warn!(tool = name, "{msg}");
359                return Ok(CallToolResult::success(vec![Content::text(msg)]));
360            }
361        }
362
363        if is_shell_tool_name(name) {
364            crate::core::budget_tracker::BudgetTracker::global().record_shell();
365        }
366
367        let tool_start = std::time::Instant::now();
368        let mut result_text = {
369            use futures::FutureExt;
370            use std::panic::AssertUnwindSafe;
371            match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
372                .catch_unwind()
373                .await
374            {
375                Ok(Ok(text)) => text,
376                Ok(Err(e)) => return Err(e),
377                Err(panic_payload) => {
378                    let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
379                        (*s).to_string()
380                    } else if let Some(s) = panic_payload.downcast_ref::<String>() {
381                        s.clone()
382                    } else {
383                        "unknown".to_string()
384                    };
385                    tracing::error!("Tool '{name}' panicked: {detail}");
386                    format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
387                             The MCP server is still running. Please retry or use a different approach.")
388                }
389            }
390        };
391
392        let output_tokens = {
393            let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
394            crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
395            tokens
396        };
397
398        crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
399        // Persist anomaly detector so dashboard state survives restarts.
400        crate::core::anomaly::save();
401
402        let budget_warning = {
403            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
404            let snap = BudgetTracker::global().check();
405            if *snap.worst_level() == BudgetLevel::Warning {
406                for (dim, lvl, used, limit, pct) in [
407                    (
408                        "tokens",
409                        &snap.tokens.level,
410                        format!("{}", snap.tokens.used),
411                        format!("{}", snap.tokens.limit),
412                        snap.tokens.percent,
413                    ),
414                    (
415                        "shell",
416                        &snap.shell.level,
417                        format!("{}", snap.shell.used),
418                        format!("{}", snap.shell.limit),
419                        snap.shell.percent,
420                    ),
421                    (
422                        "cost",
423                        &snap.cost.level,
424                        format!("${:.2}", snap.cost.used_usd),
425                        format!("${:.2}", snap.cost.limit_usd),
426                        snap.cost.percent,
427                    ),
428                ] {
429                    if *lvl == BudgetLevel::Warning {
430                        crate::core::events::emit_budget_warning(
431                            &snap.role, dim, &used, &limit, pct,
432                        );
433                    }
434                }
435                Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
436            } else {
437                None
438            }
439        };
440
441        let archive_hint = if minimal {
442            None
443        } else {
444            use crate::core::archive;
445            let archivable = matches!(
446                name,
447                "ctx_shell"
448                    | "ctx_read"
449                    | "ctx_multi_read"
450                    | "ctx_smart_read"
451                    | "ctx_execute"
452                    | "ctx_search"
453                    | "ctx_tree"
454            );
455            if archivable && archive::should_archive(&result_text) {
456                let cmd = helpers::get_str(args, "command")
457                    .or_else(|| helpers::get_str(args, "path"))
458                    .unwrap_or_default();
459                let session_id = self.session.read().await.id.clone();
460                let tokens = crate::core::tokens::count_tokens(&result_text);
461                archive::store(name, &cmd, &result_text, Some(&session_id))
462                    .map(|id| archive::format_hint(&id, result_text.len(), tokens))
463            } else {
464                None
465            }
466        };
467
468        let pre_compression = result_text.clone();
469        let density = crate::core::config::OutputDensity::effective(&config.output_density);
470        if density != crate::core::config::OutputDensity::Normal {
471            result_text = crate::core::protocol::compress_output(&result_text, &density);
472        }
473
474        {
475            let verify_cfg = crate::core::profiles::active_profile().verification;
476            let vr = crate::core::output_verification::verify_output(
477                &pre_compression,
478                &result_text,
479                &verify_cfg,
480            );
481            if !vr.warnings.is_empty() {
482                let msg = format!("[VERIFY] {}", vr.format_compact());
483                result_text = format!("{result_text}\n\n{msg}");
484            }
485        }
486
487        if let Some(hint) = archive_hint {
488            result_text = format!("{result_text}\n{hint}");
489        }
490
491        if let Some(ctx) = auto_context {
492            result_text = format!("{ctx}\n\n{result_text}");
493        }
494
495        if let Some(warning) = throttle_warning {
496            result_text = format!("{result_text}\n\n{warning}");
497        }
498
499        if let Some(bw) = budget_warning {
500            result_text = format!("{result_text}\n\n{bw}");
501        }
502
503        {
504            // Evaluate SLOs for observability (watch/dashboard), but keep tool outputs clean.
505            let _ = crate::core::slo::evaluate();
506        }
507
508        if name == "ctx_read" {
509            if minimal {
510                let mut cache = self.cache.write().await;
511                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
512            } else {
513                let read_path = self
514                    .resolve_path_or_passthrough(
515                        &helpers::get_str(args, "path").unwrap_or_default(),
516                    )
517                    .await;
518                let project_root = {
519                    let session = self.session.read().await;
520                    session.project_root.clone()
521                };
522                let mut cache = self.cache.write().await;
523                let enrich = crate::tools::autonomy::enrich_after_read(
524                    &self.autonomy,
525                    &mut cache,
526                    &read_path,
527                    project_root.as_deref(),
528                );
529                if let Some(hint) = enrich.related_hint {
530                    result_text = format!("{result_text}\n{hint}");
531                }
532                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache);
533            }
534        }
535
536        let output_token_count = crate::core::tokens::count_tokens(&result_text);
537
538        if !minimal && name == "ctx_shell" {
539            let cmd = helpers::get_str(args, "command").unwrap_or_default();
540            let calls = self.tool_calls.read().await;
541            let last_original = calls.last().map_or(0, |c| c.original_tokens);
542            drop(calls);
543            if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
544                &self.autonomy,
545                &cmd,
546                last_original,
547                output_token_count,
548            ) {
549                result_text = format!("{result_text}\n{hint}");
550            }
551        }
552
553        {
554            let input = helpers::canonical_args_string(args);
555            let input_md5 = helpers::md5_hex_fast(&input);
556            let output_md5 = helpers::md5_hex_fast(&result_text);
557            let action = helpers::get_str(args, "action");
558            let agent_id = self.agent_id.read().await.clone();
559            let client_name = self.client_name.read().await.clone();
560            let mut explicit_intent: Option<(
561                crate::core::intent_protocol::IntentRecord,
562                Option<String>,
563                String,
564            )> = None;
565
566            let pending_session_save = {
567                let empty_args = serde_json::Map::new();
568                let args_map = args.unwrap_or(&empty_args);
569                let mut session = self.session.write().await;
570                session.record_tool_receipt(
571                    name,
572                    action.as_deref(),
573                    &input_md5,
574                    &output_md5,
575                    agent_id.as_deref(),
576                    Some(&client_name),
577                );
578
579                if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
580                    name,
581                    action.as_deref(),
582                    args_map,
583                    session.project_root.as_deref(),
584                ) {
585                    let is_explicit =
586                        intent.source == crate::core::intent_protocol::IntentSource::Explicit;
587                    let root = session.project_root.clone();
588                    let sid = session.id.clone();
589                    session.record_intent(intent.clone());
590                    if is_explicit {
591                        explicit_intent = Some((intent, root, sid));
592                    }
593                }
594                if session.should_save() {
595                    session.prepare_save().ok()
596                } else {
597                    None
598                }
599            };
600
601            if let Some(prepared) = pending_session_save {
602                tokio::task::spawn_blocking(move || {
603                    let _ = prepared.write_to_disk();
604                });
605            }
606
607            if let Some((intent, root, session_id)) = explicit_intent {
608                let _ = crate::core::intent_protocol::apply_side_effects(
609                    &intent,
610                    root.as_deref(),
611                    &session_id,
612                );
613            }
614
615            if self.autonomy.is_enabled() {
616                let (calls, project_root) = {
617                    let session = self.session.read().await;
618                    (session.stats.total_tool_calls, session.project_root.clone())
619                };
620
621                if let Some(root) = project_root {
622                    if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
623                        let root_clone = root.clone();
624                        tokio::task::spawn_blocking(move || {
625                            let _ = crate::core::consolidation_engine::consolidate_latest(
626                                &root_clone,
627                                crate::core::consolidation_engine::ConsolidationBudgets::default(),
628                            );
629                        });
630                    }
631                }
632            }
633
634            let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
635            let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
636            let output_token_count_u64 = output_token_count as u64;
637            let name_owned = name.to_string();
638            tokio::task::spawn_blocking(move || {
639                let pricing = crate::core::gain::model_pricing::ModelPricing::load();
640                let quote = pricing.quote_from_env_or_agent_type(&client_name);
641                let cost_usd =
642                    quote
643                        .cost
644                        .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
645                crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
646
647                let mut store = crate::core::a2a::cost_attribution::CostStore::load();
648                store.record_tool_call(
649                    &agent_key,
650                    &client_name,
651                    &name_owned,
652                    input_token_count,
653                    output_token_count_u64,
654                );
655                let _ = store.save();
656            });
657        }
658
659        let skip_checkpoint = minimal
660            || matches!(
661                name,
662                "ctx_compress"
663                    | "ctx_metrics"
664                    | "ctx_benchmark"
665                    | "ctx_analyze"
666                    | "ctx_cache"
667                    | "ctx_discover"
668                    | "ctx_dedup"
669                    | "ctx_session"
670                    | "ctx_knowledge"
671                    | "ctx_agent"
672                    | "ctx_share"
673                    | "ctx_wrapped"
674                    | "ctx_overview"
675                    | "ctx_preload"
676                    | "ctx_cost"
677                    | "ctx_gain"
678                    | "ctx_heatmap"
679                    | "ctx_task"
680                    | "ctx_impact"
681                    | "ctx_architecture"
682                    | "ctx_workflow"
683            );
684
685        if !skip_checkpoint && self.increment_and_check() {
686            if let Some(checkpoint) = self.auto_checkpoint().await {
687                let interval = LeanCtxServer::checkpoint_interval_effective();
688                let combined = format!(
689                    "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
690                );
691                return Ok(CallToolResult::success(vec![Content::text(combined)]));
692            }
693        }
694
695        let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
696        if tool_duration_ms > 100 {
697            LeanCtxServer::append_tool_call_log(
698                name,
699                tool_duration_ms,
700                0,
701                0,
702                None,
703                &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
704            );
705        }
706
707        let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
708        if current_count > 0 && current_count.is_multiple_of(100) {
709            std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
710        }
711
712        Ok(CallToolResult::success(vec![Content::text(result_text)]))
713    }
714}
715
716pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
717    crate::instructions::build_instructions_for_test(crp_mode)
718}
719
720pub fn build_claude_code_instructions_for_test() -> String {
721    crate::instructions::claude_code_instructions()
722}
723
724const PROJECT_MARKERS: &[&str] = &[
725    ".git",
726    "Cargo.toml",
727    "package.json",
728    "go.mod",
729    "pyproject.toml",
730    "setup.py",
731    "pom.xml",
732    "build.gradle",
733    "Makefile",
734    ".lean-ctx.toml",
735];
736
737fn has_project_marker(dir: &std::path::Path) -> bool {
738    PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
739}
740
741fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
742    if let Some(home) = dirs::home_dir() {
743        if dir == home {
744            return true;
745        }
746    }
747    let dir_str = dir.to_string_lossy();
748    dir_str.ends_with("/.claude")
749        || dir_str.ends_with("/.codex")
750        || dir_str.contains("/.claude/")
751        || dir_str.contains("/.codex/")
752}
753
754fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
755    std::process::Command::new("git")
756        .args(["rev-parse", "--show-toplevel"])
757        .current_dir(dir)
758        .stdout(std::process::Stdio::piped())
759        .stderr(std::process::Stdio::null())
760        .output()
761        .ok()
762        .and_then(|o| {
763            if o.status.success() {
764                String::from_utf8(o.stdout)
765                    .ok()
766                    .map(|s| s.trim().to_string())
767            } else {
768                None
769            }
770        })
771}
772
773pub fn derive_project_root_from_cwd() -> Option<String> {
774    let cwd = std::env::current_dir().ok()?;
775    let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
776
777    if is_home_or_agent_dir(&canonical) {
778        return git_toplevel_from(&canonical);
779    }
780
781    if has_project_marker(&canonical) {
782        return Some(canonical.to_string_lossy().to_string());
783    }
784
785    if let Some(git_root) = git_toplevel_from(&canonical) {
786        return Some(git_root);
787    }
788
789    if let Some(root) = detect_multi_root_workspace(&canonical) {
790        return Some(root);
791    }
792
793    None
794}
795
796/// Detect a multi-root workspace: a directory that has no project markers
797/// itself, but contains child directories that do. In this case, use the
798/// parent as jail root and auto-allow all child projects via LEAN_CTX_ALLOW_PATH.
799fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
800    let entries = std::fs::read_dir(dir).ok()?;
801    let mut child_projects: Vec<String> = Vec::new();
802
803    for entry in entries.flatten() {
804        let path = entry.path();
805        if path.is_dir() && has_project_marker(&path) {
806            let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
807            child_projects.push(canonical.to_string_lossy().to_string());
808        }
809    }
810
811    if child_projects.len() >= 2 {
812        let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
813        let sep = if cfg!(windows) { ";" } else { ":" };
814        let merged = if existing.is_empty() {
815            child_projects.join(sep)
816        } else {
817            format!("{existing}{sep}{}", child_projects.join(sep))
818        };
819        std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
820        tracing::info!(
821            "Multi-root workspace detected at {}: auto-allowing {} child projects",
822            dir.display(),
823            child_projects.len()
824        );
825        return Some(dir.to_string_lossy().to_string());
826    }
827
828    None
829}
830
831pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
832    crate::tool_defs::list_all_tool_defs()
833        .into_iter()
834        .map(|(name, desc, _)| (name, desc))
835        .collect()
836}
837
838pub fn tool_schemas_json_for_test() -> String {
839    crate::tool_defs::list_all_tool_defs()
840        .iter()
841        .map(|(name, _, schema)| format!("{name}: {schema}"))
842        .collect::<Vec<_>>()
843        .join("\n")
844}
845
846fn is_shell_tool_name(name: &str) -> bool {
847    matches!(name, "ctx_shell" | "ctx_execute")
848}
849
850#[cfg(test)]
851mod tests {
852    use super::*;
853
854    #[test]
855    fn project_markers_detected() {
856        let tmp = tempfile::tempdir().unwrap();
857        let root = tmp.path().join("myproject");
858        std::fs::create_dir_all(&root).unwrap();
859        assert!(!has_project_marker(&root));
860
861        std::fs::create_dir(root.join(".git")).unwrap();
862        assert!(has_project_marker(&root));
863    }
864
865    #[test]
866    fn home_dir_detected_as_agent_dir() {
867        if let Some(home) = dirs::home_dir() {
868            assert!(is_home_or_agent_dir(&home));
869        }
870    }
871
872    #[test]
873    fn agent_dirs_detected() {
874        let claude = std::path::PathBuf::from("/home/user/.claude");
875        assert!(is_home_or_agent_dir(&claude));
876        let codex = std::path::PathBuf::from("/home/user/.codex");
877        assert!(is_home_or_agent_dir(&codex));
878        let project = std::path::PathBuf::from("/home/user/projects/myapp");
879        assert!(!is_home_or_agent_dir(&project));
880    }
881
882    #[test]
883    fn test_unified_tool_count() {
884        let tools = crate::tool_defs::unified_tool_defs();
885        assert_eq!(tools.len(), 5, "Expected 5 unified tools");
886    }
887
888    #[test]
889    fn test_granular_tool_count() {
890        let tools = crate::tool_defs::granular_tool_defs();
891        assert!(tools.len() >= 25, "Expected at least 25 granular tools");
892    }
893
894    #[test]
895    fn disabled_tools_filters_list() {
896        let all = crate::tool_defs::granular_tool_defs();
897        let total = all.len();
898        let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
899        let filtered: Vec<_> = all
900            .into_iter()
901            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
902            .collect();
903        assert_eq!(filtered.len(), total - 2);
904        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
905        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
906    }
907
908    #[test]
909    fn empty_disabled_tools_returns_all() {
910        let all = crate::tool_defs::granular_tool_defs();
911        let total = all.len();
912        let disabled: Vec<String> = vec![];
913        let filtered: Vec<_> = all
914            .into_iter()
915            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
916            .collect();
917        assert_eq!(filtered.len(), total);
918    }
919
920    #[test]
921    fn misspelled_disabled_tool_is_silently_ignored() {
922        let all = crate::tool_defs::granular_tool_defs();
923        let total = all.len();
924        let disabled = ["ctx_nonexistent_tool".to_string()];
925        let filtered: Vec<_> = all
926            .into_iter()
927            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
928            .collect();
929        assert_eq!(filtered.len(), total);
930    }
931
932    #[test]
933    fn detect_multi_root_workspace_with_child_projects() {
934        let tmp = tempfile::tempdir().unwrap();
935        let workspace = tmp.path().join("workspace");
936        std::fs::create_dir_all(&workspace).unwrap();
937
938        let proj_a = workspace.join("project-a");
939        let proj_b = workspace.join("project-b");
940        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
941        std::fs::create_dir_all(&proj_b).unwrap();
942        std::fs::write(proj_b.join("package.json"), "{}").unwrap();
943
944        let result = detect_multi_root_workspace(&workspace);
945        assert!(
946            result.is_some(),
947            "should detect workspace with 2 child projects"
948        );
949
950        std::env::remove_var("LEAN_CTX_ALLOW_PATH");
951    }
952
953    #[test]
954    fn detect_multi_root_workspace_returns_none_for_single_project() {
955        let tmp = tempfile::tempdir().unwrap();
956        let workspace = tmp.path().join("workspace");
957        std::fs::create_dir_all(&workspace).unwrap();
958
959        let proj_a = workspace.join("project-a");
960        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
961
962        let result = detect_multi_root_workspace(&workspace);
963        assert!(
964            result.is_none(),
965            "should not detect workspace with only 1 child project"
966        );
967    }
968}