Skip to main content

lean_ctx/server/
mod.rs

1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod pipeline_stages;
5pub mod registry;
6pub mod role_guard;
7pub mod tool_trait;
8
9use rmcp::handler::server::ServerHandler;
10use rmcp::model::{
11    CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
12    InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
13};
14use rmcp::service::{RequestContext, RoleServer};
15use rmcp::ErrorData;
16
17use crate::tools::{CrpMode, LeanCtxServer};
18
19impl ServerHandler for LeanCtxServer {
20    fn get_info(&self) -> ServerInfo {
21        let capabilities = ServerCapabilities::builder().enable_tools().build();
22
23        let instructions = crate::instructions::build_instructions(CrpMode::effective());
24
25        InitializeResult::new(capabilities)
26            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
27            .with_instructions(instructions)
28    }
29
30    async fn initialize(
31        &self,
32        request: InitializeRequestParams,
33        _context: RequestContext<RoleServer>,
34    ) -> Result<InitializeResult, ErrorData> {
35        let name = request.client_info.name.clone();
36        tracing::info!("MCP client connected: {:?}", name);
37        *self.client_name.write().await = name.clone();
38
39        let derived_root = derive_project_root_from_cwd();
40        let cwd_str = std::env::current_dir()
41            .ok()
42            .map(|p| p.to_string_lossy().to_string())
43            .unwrap_or_default();
44        {
45            let mut session = self.session.write().await;
46            if !cwd_str.is_empty() {
47                session.shell_cwd = Some(cwd_str.clone());
48            }
49            if let Some(ref root) = derived_root {
50                session.project_root = Some(root.clone());
51                tracing::info!("Project root set to: {root}");
52            } else if let Some(ref root) = session.project_root {
53                let root_path = std::path::Path::new(root);
54                let root_has_marker = has_project_marker(root_path);
55                let root_str = root_path.to_string_lossy();
56                let root_suspicious = root_str.contains("/.claude")
57                    || root_str.contains("/.codex")
58                    || root_str.contains("/var/folders/")
59                    || root_str.contains("/tmp/")
60                    || root_str.contains("\\.claude")
61                    || root_str.contains("\\.codex")
62                    || root_str.contains("\\AppData\\Local\\Temp")
63                    || root_str.contains("\\Temp\\");
64                if root_suspicious && !root_has_marker {
65                    session.project_root = None;
66                }
67            }
68            if self.session_mode == crate::tools::SessionMode::Shared {
69                if let Some(ref root) = session.project_root {
70                    if let Some(ref rt) = self.context_os {
71                        rt.shared_sessions.persist_best_effort(
72                            root,
73                            &self.workspace_id,
74                            &self.channel_id,
75                            &session,
76                        );
77                    }
78                }
79            } else {
80                let _ = session.save();
81            }
82        }
83
84        let agent_name = name.clone();
85        let agent_root = derived_root.clone().unwrap_or_default();
86        let agent_id_handle = self.agent_id.clone();
87        tokio::task::spawn_blocking(move || {
88            if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
89                return;
90            }
91
92            // Avoid startup stampedes when multiple agent sessions initialize at once.
93            // These are best-effort maintenance tasks; it's fine to skip if another
94            // lean-ctx instance is already doing them.
95            let maintenance = crate::core::startup_guard::try_acquire_lock(
96                "startup-maintenance",
97                std::time::Duration::from_secs(2),
98                std::time::Duration::from_mins(2),
99            );
100            if maintenance.is_some() {
101                if let Some(home) = dirs::home_dir() {
102                    let _ = crate::rules_inject::inject_all_rules(&home);
103                }
104                crate::hooks::refresh_installed_hooks();
105                crate::core::version_check::check_background();
106            }
107            drop(maintenance);
108
109            if !agent_root.is_empty() {
110                let heuristic_role = match agent_name.to_lowercase().as_str() {
111                    n if n.contains("cursor") => Some("coder"),
112                    n if n.contains("claude") => Some("coder"),
113                    n if n.contains("codex") => Some("coder"),
114                    n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
115                    n if n.contains("review") => Some("reviewer"),
116                    n if n.contains("test") => Some("debugger"),
117                    _ => None,
118                };
119                let env_role = std::env::var("LEAN_CTX_ROLE")
120                    .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
121                    .ok();
122                let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
123
124                let _ = crate::core::roles::set_active_role(effective_role);
125
126                let mut registry = crate::core::agents::AgentRegistry::load_or_create();
127                registry.cleanup_stale(24);
128                let id = registry.register("mcp", Some(effective_role), &agent_root);
129                let _ = registry.save();
130                if let Ok(mut guard) = agent_id_handle.try_write() {
131                    *guard = Some(id);
132                }
133            }
134        });
135
136        let instructions =
137            crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
138        let capabilities = ServerCapabilities::builder().enable_tools().build();
139
140        Ok(InitializeResult::new(capabilities)
141            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
142            .with_instructions(instructions))
143    }
144
145    async fn list_tools(
146        &self,
147        _request: Option<PaginatedRequestParams>,
148        _context: RequestContext<RoleServer>,
149    ) -> Result<ListToolsResult, ErrorData> {
150        let all_tools = if crate::tool_defs::is_full_mode() {
151            crate::tool_defs::granular_tool_defs()
152        } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
153            crate::tool_defs::unified_tool_defs()
154        } else {
155            crate::tool_defs::lazy_tool_defs()
156        };
157
158        let disabled = crate::core::config::Config::load().disabled_tools_effective();
159        let tools = if disabled.is_empty() {
160            all_tools
161        } else {
162            all_tools
163                .into_iter()
164                .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
165                .collect()
166        };
167
168        let tools = {
169            let active = self.workflow.read().await.clone();
170            if let Some(run) = active {
171                if let Some(state) = run.spec.state(&run.current) {
172                    if let Some(allowed) = &state.allowed_tools {
173                        let mut allow: std::collections::HashSet<&str> =
174                            allowed.iter().map(std::string::String::as_str).collect();
175                        allow.insert("ctx");
176                        allow.insert("ctx_workflow");
177                        return Ok(ListToolsResult {
178                            tools: tools
179                                .into_iter()
180                                .filter(|t| allow.contains(t.name.as_ref()))
181                                .collect(),
182                            ..Default::default()
183                        });
184                    }
185                }
186            }
187            tools
188        };
189
190        Ok(ListToolsResult {
191            tools,
192            ..Default::default()
193        })
194    }
195
196    async fn call_tool(
197        &self,
198        request: CallToolRequestParams,
199        _context: RequestContext<RoleServer>,
200    ) -> Result<CallToolResult, ErrorData> {
201        self.check_idle_expiry().await;
202
203        let original_name = request.name.as_ref().to_string();
204        let (resolved_name, resolved_args) = if original_name == "ctx" {
205            let sub = request
206                .arguments
207                .as_ref()
208                .and_then(|a| a.get("tool"))
209                .and_then(|v| v.as_str())
210                .map(std::string::ToString::to_string)
211                .ok_or_else(|| {
212                    ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
213                })?;
214            let tool_name = if sub.starts_with("ctx_") {
215                sub
216            } else {
217                format!("ctx_{sub}")
218            };
219            let mut args = request.arguments.unwrap_or_default();
220            args.remove("tool");
221            (tool_name, Some(args))
222        } else {
223            (original_name, request.arguments)
224        };
225        let name = resolved_name.as_str();
226        let args = resolved_args.as_ref();
227
228        let role_check = role_guard::check_tool_access(name);
229        if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
230            tracing::warn!(
231                tool = name,
232                role = %role_check.role_name,
233                "Tool blocked by role policy"
234            );
235            return Ok(denied);
236        }
237
238        if name != "ctx_workflow" {
239            let active = self.workflow.read().await.clone();
240            if let Some(run) = active {
241                if let Some(state) = run.spec.state(&run.current) {
242                    if let Some(allowed) = &state.allowed_tools {
243                        let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
244                        if !allowed_ok {
245                            let mut shown = allowed.clone();
246                            shown.sort();
247                            shown.truncate(30);
248                            return Ok(CallToolResult::success(vec![Content::text(format!(
249                                "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
250                                run.spec.name,
251                                run.current,
252                                shown.len(),
253                                shown.join(", ")
254                            ))]));
255                        }
256                    }
257                }
258            }
259        }
260
261        let auto_context = {
262            let task = {
263                let session = self.session.read().await;
264                session.task.as_ref().map(|t| t.description.clone())
265            };
266            let project_root = {
267                let session = self.session.read().await;
268                session.project_root.clone()
269            };
270            let mut cache = self.cache.write().await;
271            crate::tools::autonomy::session_lifecycle_pre_hook(
272                &self.autonomy,
273                name,
274                &mut cache,
275                task.as_deref(),
276                project_root.as_deref(),
277                CrpMode::effective(),
278            )
279        };
280
281        let throttle_result = {
282            let fp = args
283                .map(|a| {
284                    crate::core::loop_detection::LoopDetector::fingerprint(
285                        &serde_json::Value::Object(a.clone()),
286                    )
287                })
288                .unwrap_or_default();
289            let mut detector = self.loop_detector.write().await;
290
291            let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
292            let is_search_shell = name == "ctx_shell" && {
293                let cmd = args
294                    .as_ref()
295                    .and_then(|a| a.get("command"))
296                    .and_then(|v| v.as_str())
297                    .unwrap_or("");
298                crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
299            };
300
301            if is_search || is_search_shell {
302                let search_pattern = args.and_then(|a| {
303                    a.get("pattern")
304                        .or_else(|| a.get("query"))
305                        .and_then(|v| v.as_str())
306                });
307                let shell_pattern = if is_search_shell {
308                    args.and_then(|a| a.get("command"))
309                        .and_then(|v| v.as_str())
310                        .and_then(helpers::extract_search_pattern_from_command)
311                } else {
312                    None
313                };
314                let pat = search_pattern.or(shell_pattern.as_deref());
315                detector.record_search(name, &fp, pat)
316            } else {
317                detector.record_call(name, &fp)
318            }
319        };
320
321        if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
322            let msg = throttle_result.message.unwrap_or_default();
323            return Ok(CallToolResult::success(vec![Content::text(msg)]));
324        }
325
326        let throttle_warning =
327            if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
328                throttle_result.message.clone()
329            } else {
330                None
331            };
332
333        let config = crate::core::config::Config::load();
334        let minimal = config.minimal_overhead_effective();
335
336        {
337            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
338            let snap = BudgetTracker::global().check();
339            if *snap.worst_level() == BudgetLevel::Exhausted
340                && name != "ctx_session"
341                && name != "ctx_cost"
342                && name != "ctx_metrics"
343            {
344                for (dim, lvl, used, limit) in [
345                    (
346                        "tokens",
347                        &snap.tokens.level,
348                        format!("{}", snap.tokens.used),
349                        format!("{}", snap.tokens.limit),
350                    ),
351                    (
352                        "shell",
353                        &snap.shell.level,
354                        format!("{}", snap.shell.used),
355                        format!("{}", snap.shell.limit),
356                    ),
357                    (
358                        "cost",
359                        &snap.cost.level,
360                        format!("${:.2}", snap.cost.used_usd),
361                        format!("${:.2}", snap.cost.limit_usd),
362                    ),
363                ] {
364                    if *lvl == BudgetLevel::Exhausted {
365                        crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
366                    }
367                }
368                let msg = format!(
369                    "[BUDGET EXHAUSTED] {}\n\
370                     Use `ctx_session action=role` to check/switch roles, \
371                     or `ctx_session action=reset` to start fresh.",
372                    snap.format_compact()
373                );
374                tracing::warn!(tool = name, "{msg}");
375                return Ok(CallToolResult::success(vec![Content::text(msg)]));
376            }
377        }
378
379        if is_shell_tool_name(name) {
380            crate::core::budget_tracker::BudgetTracker::global().record_shell();
381        }
382
383        let tool_start = std::time::Instant::now();
384        let mut result_text = {
385            use futures::FutureExt;
386            use std::panic::AssertUnwindSafe;
387            match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
388                .catch_unwind()
389                .await
390            {
391                Ok(Ok(text)) => text,
392                Ok(Err(e)) => return Err(e),
393                Err(panic_payload) => {
394                    let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
395                        (*s).to_string()
396                    } else if let Some(s) = panic_payload.downcast_ref::<String>() {
397                        s.clone()
398                    } else {
399                        "unknown".to_string()
400                    };
401                    tracing::error!("Tool '{name}' panicked: {detail}");
402                    format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
403                             The MCP server is still running. Please retry or use a different approach.")
404                }
405            }
406        };
407
408        let output_tokens = {
409            let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
410            crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
411            tokens
412        };
413
414        crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
415        // Persist anomaly detector so dashboard state survives restarts.
416        crate::core::anomaly::save();
417
418        let budget_warning = {
419            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
420            let snap = BudgetTracker::global().check();
421            if *snap.worst_level() == BudgetLevel::Warning {
422                for (dim, lvl, used, limit, pct) in [
423                    (
424                        "tokens",
425                        &snap.tokens.level,
426                        format!("{}", snap.tokens.used),
427                        format!("{}", snap.tokens.limit),
428                        snap.tokens.percent,
429                    ),
430                    (
431                        "shell",
432                        &snap.shell.level,
433                        format!("{}", snap.shell.used),
434                        format!("{}", snap.shell.limit),
435                        snap.shell.percent,
436                    ),
437                    (
438                        "cost",
439                        &snap.cost.level,
440                        format!("${:.2}", snap.cost.used_usd),
441                        format!("${:.2}", snap.cost.limit_usd),
442                        snap.cost.percent,
443                    ),
444                ] {
445                    if *lvl == BudgetLevel::Warning {
446                        crate::core::events::emit_budget_warning(
447                            &snap.role, dim, &used, &limit, pct,
448                        );
449                    }
450                }
451                Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
452            } else {
453                None
454            }
455        };
456
457        let archive_hint = if minimal {
458            None
459        } else {
460            use crate::core::archive;
461            let archivable = matches!(
462                name,
463                "ctx_shell"
464                    | "ctx_read"
465                    | "ctx_multi_read"
466                    | "ctx_smart_read"
467                    | "ctx_execute"
468                    | "ctx_search"
469                    | "ctx_tree"
470            );
471            if archivable && archive::should_archive(&result_text) {
472                let cmd = helpers::get_str(args, "command")
473                    .or_else(|| helpers::get_str(args, "path"))
474                    .unwrap_or_default();
475                let session_id = self.session.read().await.id.clone();
476                let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
477                let tokens = crate::core::tokens::count_tokens(&to_store);
478                archive::store(name, &cmd, &to_store, Some(&session_id))
479                    .map(|id| archive::format_hint(&id, to_store.len(), tokens))
480            } else {
481                None
482            }
483        };
484
485        let pre_compression = result_text.clone();
486        let density = crate::core::config::OutputDensity::effective(&config.output_density);
487        if density != crate::core::config::OutputDensity::Normal {
488            result_text = crate::core::protocol::compress_output(&result_text, &density);
489        }
490
491        {
492            let verify_cfg = crate::core::profiles::active_profile().verification;
493            let vr = crate::core::output_verification::verify_output(
494                &pre_compression,
495                &result_text,
496                &verify_cfg,
497            );
498            if !vr.warnings.is_empty() {
499                let msg = format!("[VERIFY] {}", vr.format_compact());
500                result_text = format!("{result_text}\n\n{msg}");
501            }
502        }
503
504        if let Some(hint) = archive_hint {
505            result_text = format!("{result_text}\n{hint}");
506        }
507
508        if let Some(ctx) = auto_context {
509            result_text = format!("{ctx}\n\n{result_text}");
510        }
511
512        if let Some(warning) = throttle_warning {
513            result_text = format!("{result_text}\n\n{warning}");
514        }
515
516        if let Some(bw) = budget_warning {
517            result_text = format!("{result_text}\n\n{bw}");
518        }
519
520        if !self
521            .rules_stale_checked
522            .swap(true, std::sync::atomic::Ordering::Relaxed)
523        {
524            let client = self.client_name.read().await.clone();
525            if !client.is_empty() {
526                if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
527                    result_text = format!("{result_text}\n\n{stale_msg}");
528                }
529            }
530        }
531
532        {
533            // Evaluate SLOs for observability (watch/dashboard), but keep tool outputs clean.
534            let _ = crate::core::slo::evaluate();
535        }
536
537        if name == "ctx_read" {
538            if minimal {
539                let mut cache = self.cache.write().await;
540                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
541            } else {
542                let read_path = self
543                    .resolve_path_or_passthrough(
544                        &helpers::get_str(args, "path").unwrap_or_default(),
545                    )
546                    .await;
547                let project_root = {
548                    let session = self.session.read().await;
549                    session.project_root.clone()
550                };
551                let mut cache = self.cache.write().await;
552                let enrich = crate::tools::autonomy::enrich_after_read(
553                    &self.autonomy,
554                    &mut cache,
555                    &read_path,
556                    project_root.as_deref(),
557                    None,
558                    crate::tools::CrpMode::effective(),
559                    false,
560                );
561                if let Some(hint) = enrich.related_hint {
562                    result_text = format!("{result_text}\n{hint}");
563                }
564                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
565            }
566        }
567
568        if !minimal && name == "ctx_shell" {
569            let cmd = helpers::get_str(args, "command").unwrap_or_default();
570            let calls = self.tool_calls.read().await;
571            let last_original = calls.last().map_or(0, |c| c.original_tokens);
572            drop(calls);
573            let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
574            if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
575                &self.autonomy,
576                &cmd,
577                last_original,
578                pre_hint_tokens,
579            ) {
580                result_text = format!("{result_text}\n{hint}");
581            }
582        }
583
584        let output_token_count = crate::core::tokens::count_tokens(&result_text);
585
586        {
587            let input = helpers::canonical_args_string(args);
588            let input_md5 = helpers::md5_hex_fast(&input);
589            let output_md5 = helpers::md5_hex_fast(&result_text);
590            let action = helpers::get_str(args, "action");
591            let agent_id = self.agent_id.read().await.clone();
592            let client_name = self.client_name.read().await.clone();
593            let mut explicit_intent: Option<(
594                crate::core::intent_protocol::IntentRecord,
595                Option<String>,
596                String,
597            )> = None;
598
599            let pending_session_save = {
600                let empty_args = serde_json::Map::new();
601                let args_map = args.unwrap_or(&empty_args);
602                let mut session = self.session.write().await;
603                session.record_tool_receipt(
604                    name,
605                    action.as_deref(),
606                    &input_md5,
607                    &output_md5,
608                    agent_id.as_deref(),
609                    Some(&client_name),
610                );
611
612                if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
613                    name,
614                    action.as_deref(),
615                    args_map,
616                    session.project_root.as_deref(),
617                ) {
618                    let is_explicit =
619                        intent.source == crate::core::intent_protocol::IntentSource::Explicit;
620                    let root = session.project_root.clone();
621                    let sid = session.id.clone();
622                    session.record_intent(intent.clone());
623                    if is_explicit {
624                        explicit_intent = Some((intent, root, sid));
625                    }
626                }
627                if session.should_save() {
628                    session.prepare_save().ok()
629                } else {
630                    None
631                }
632            };
633
634            if let Some(prepared) = pending_session_save {
635                tokio::task::spawn_blocking(move || {
636                    let _ = prepared.write_to_disk();
637                });
638            }
639
640            if let Some((intent, root, session_id)) = explicit_intent {
641                let _ = crate::core::intent_protocol::apply_side_effects(
642                    &intent,
643                    root.as_deref(),
644                    &session_id,
645                );
646            }
647
648            if self.autonomy.is_enabled() {
649                let (calls, project_root) = {
650                    let session = self.session.read().await;
651                    (session.stats.total_tool_calls, session.project_root.clone())
652                };
653
654                if let Some(root) = project_root {
655                    if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
656                        let root_clone = root.clone();
657                        tokio::task::spawn_blocking(move || {
658                            let _ = crate::core::consolidation_engine::consolidate_latest(
659                                &root_clone,
660                                crate::core::consolidation_engine::ConsolidationBudgets::default(),
661                            );
662                        });
663                    }
664                }
665            }
666
667            let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
668            let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
669            let output_token_count_u64 = output_token_count as u64;
670            let name_owned = name.to_string();
671            tokio::task::spawn_blocking(move || {
672                let pricing = crate::core::gain::model_pricing::ModelPricing::load();
673                let quote = pricing.quote_from_env_or_agent_type(&client_name);
674                let cost_usd =
675                    quote
676                        .cost
677                        .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
678                crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
679
680                let mut store = crate::core::a2a::cost_attribution::CostStore::load();
681                store.record_tool_call(
682                    &agent_key,
683                    &client_name,
684                    &name_owned,
685                    input_token_count,
686                    output_token_count_u64,
687                    0,
688                );
689                let _ = store.save();
690            });
691        }
692
693        // Context OS: persist shared session + publish an event (reference-only payload).
694        if self.session_mode == crate::tools::SessionMode::Shared {
695            let ws = self.workspace_id.clone();
696            let ch = self.channel_id.clone();
697            let rt = self.context_os.clone();
698            let agent = self.agent_id.read().await.clone();
699            let tool = name.to_string();
700            let session_snapshot = self.session.read().await.clone();
701            tokio::task::spawn_blocking(move || {
702                let Some(rt) = rt else {
703                    return;
704                };
705                let Some(root) = session_snapshot.project_root.as_deref() else {
706                    return;
707                };
708                rt.shared_sessions
709                    .persist_best_effort(root, &ws, &ch, &session_snapshot);
710                let _ = rt.bus.append(
711                    &ws,
712                    &ch,
713                    &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
714                    agent.as_deref(),
715                    serde_json::json!({ "tool": tool }),
716                );
717            });
718        }
719
720        let skip_checkpoint = minimal
721            || matches!(
722                name,
723                "ctx_compress"
724                    | "ctx_metrics"
725                    | "ctx_benchmark"
726                    | "ctx_analyze"
727                    | "ctx_cache"
728                    | "ctx_discover"
729                    | "ctx_dedup"
730                    | "ctx_session"
731                    | "ctx_knowledge"
732                    | "ctx_agent"
733                    | "ctx_share"
734                    | "ctx_wrapped"
735                    | "ctx_overview"
736                    | "ctx_preload"
737                    | "ctx_cost"
738                    | "ctx_gain"
739                    | "ctx_heatmap"
740                    | "ctx_task"
741                    | "ctx_impact"
742                    | "ctx_architecture"
743                    | "ctx_workflow"
744            );
745
746        if !skip_checkpoint && self.increment_and_check() {
747            if let Some(checkpoint) = self.auto_checkpoint().await {
748                let interval = LeanCtxServer::checkpoint_interval_effective();
749                let combined = format!(
750                    "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
751                );
752                return Ok(CallToolResult::success(vec![Content::text(combined)]));
753            }
754        }
755
756        let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
757        if tool_duration_ms > 100 {
758            LeanCtxServer::append_tool_call_log(
759                name,
760                tool_duration_ms,
761                0,
762                0,
763                None,
764                &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
765            );
766        }
767
768        let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
769        if current_count > 0 && current_count.is_multiple_of(100) {
770            std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
771        }
772
773        Ok(CallToolResult::success(vec![Content::text(result_text)]))
774    }
775}
776
777pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
778    crate::instructions::build_instructions_for_test(crp_mode)
779}
780
781pub fn build_claude_code_instructions_for_test() -> String {
782    crate::instructions::claude_code_instructions()
783}
784
785const PROJECT_MARKERS: &[&str] = &[
786    ".git",
787    "Cargo.toml",
788    "package.json",
789    "go.mod",
790    "pyproject.toml",
791    "setup.py",
792    "pom.xml",
793    "build.gradle",
794    "Makefile",
795    ".lean-ctx.toml",
796];
797
798fn has_project_marker(dir: &std::path::Path) -> bool {
799    PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
800}
801
802fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
803    if let Some(home) = dirs::home_dir() {
804        if dir == home {
805            return true;
806        }
807    }
808    let dir_str = dir.to_string_lossy();
809    dir_str.ends_with("/.claude")
810        || dir_str.ends_with("/.codex")
811        || dir_str.contains("/.claude/")
812        || dir_str.contains("/.codex/")
813}
814
815fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
816    std::process::Command::new("git")
817        .args(["rev-parse", "--show-toplevel"])
818        .current_dir(dir)
819        .stdout(std::process::Stdio::piped())
820        .stderr(std::process::Stdio::null())
821        .output()
822        .ok()
823        .and_then(|o| {
824            if o.status.success() {
825                String::from_utf8(o.stdout)
826                    .ok()
827                    .map(|s| s.trim().to_string())
828            } else {
829                None
830            }
831        })
832}
833
834pub fn derive_project_root_from_cwd() -> Option<String> {
835    let cwd = std::env::current_dir().ok()?;
836    let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
837
838    if is_home_or_agent_dir(&canonical) {
839        return git_toplevel_from(&canonical);
840    }
841
842    if has_project_marker(&canonical) {
843        return Some(canonical.to_string_lossy().to_string());
844    }
845
846    if let Some(git_root) = git_toplevel_from(&canonical) {
847        return Some(git_root);
848    }
849
850    if let Some(root) = detect_multi_root_workspace(&canonical) {
851        return Some(root);
852    }
853
854    None
855}
856
857/// Detect a multi-root workspace: a directory that has no project markers
858/// itself, but contains child directories that do. In this case, use the
859/// parent as jail root and auto-allow all child projects via LEAN_CTX_ALLOW_PATH.
860fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
861    let entries = std::fs::read_dir(dir).ok()?;
862    let mut child_projects: Vec<String> = Vec::new();
863
864    for entry in entries.flatten() {
865        let path = entry.path();
866        if path.is_dir() && has_project_marker(&path) {
867            let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
868            child_projects.push(canonical.to_string_lossy().to_string());
869        }
870    }
871
872    if child_projects.len() >= 2 {
873        let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
874        let sep = if cfg!(windows) { ";" } else { ":" };
875        let merged = if existing.is_empty() {
876            child_projects.join(sep)
877        } else {
878            format!("{existing}{sep}{}", child_projects.join(sep))
879        };
880        std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
881        tracing::info!(
882            "Multi-root workspace detected at {}: auto-allowing {} child projects",
883            dir.display(),
884            child_projects.len()
885        );
886        return Some(dir.to_string_lossy().to_string());
887    }
888
889    None
890}
891
892pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
893    crate::tool_defs::list_all_tool_defs()
894        .into_iter()
895        .map(|(name, desc, _)| (name, desc))
896        .collect()
897}
898
899pub fn tool_schemas_json_for_test() -> String {
900    crate::tool_defs::list_all_tool_defs()
901        .iter()
902        .map(|(name, _, schema)| format!("{name}: {schema}"))
903        .collect::<Vec<_>>()
904        .join("\n")
905}
906
907fn is_shell_tool_name(name: &str) -> bool {
908    matches!(name, "ctx_shell" | "ctx_execute")
909}
910
911#[cfg(test)]
912mod tests {
913    use super::*;
914
915    #[test]
916    fn project_markers_detected() {
917        let tmp = tempfile::tempdir().unwrap();
918        let root = tmp.path().join("myproject");
919        std::fs::create_dir_all(&root).unwrap();
920        assert!(!has_project_marker(&root));
921
922        std::fs::create_dir(root.join(".git")).unwrap();
923        assert!(has_project_marker(&root));
924    }
925
926    #[test]
927    fn home_dir_detected_as_agent_dir() {
928        if let Some(home) = dirs::home_dir() {
929            assert!(is_home_or_agent_dir(&home));
930        }
931    }
932
933    #[test]
934    fn agent_dirs_detected() {
935        let claude = std::path::PathBuf::from("/home/user/.claude");
936        assert!(is_home_or_agent_dir(&claude));
937        let codex = std::path::PathBuf::from("/home/user/.codex");
938        assert!(is_home_or_agent_dir(&codex));
939        let project = std::path::PathBuf::from("/home/user/projects/myapp");
940        assert!(!is_home_or_agent_dir(&project));
941    }
942
943    #[test]
944    fn test_unified_tool_count() {
945        let tools = crate::tool_defs::unified_tool_defs();
946        assert_eq!(tools.len(), 5, "Expected 5 unified tools");
947    }
948
949    #[test]
950    fn test_granular_tool_count() {
951        let tools = crate::tool_defs::granular_tool_defs();
952        assert!(tools.len() >= 25, "Expected at least 25 granular tools");
953    }
954
955    #[test]
956    fn disabled_tools_filters_list() {
957        let all = crate::tool_defs::granular_tool_defs();
958        let total = all.len();
959        let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
960        let filtered: Vec<_> = all
961            .into_iter()
962            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
963            .collect();
964        assert_eq!(filtered.len(), total - 2);
965        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
966        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
967    }
968
969    #[test]
970    fn empty_disabled_tools_returns_all() {
971        let all = crate::tool_defs::granular_tool_defs();
972        let total = all.len();
973        let disabled: Vec<String> = vec![];
974        let filtered: Vec<_> = all
975            .into_iter()
976            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
977            .collect();
978        assert_eq!(filtered.len(), total);
979    }
980
981    #[test]
982    fn misspelled_disabled_tool_is_silently_ignored() {
983        let all = crate::tool_defs::granular_tool_defs();
984        let total = all.len();
985        let disabled = ["ctx_nonexistent_tool".to_string()];
986        let filtered: Vec<_> = all
987            .into_iter()
988            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
989            .collect();
990        assert_eq!(filtered.len(), total);
991    }
992
993    #[test]
994    fn detect_multi_root_workspace_with_child_projects() {
995        let tmp = tempfile::tempdir().unwrap();
996        let workspace = tmp.path().join("workspace");
997        std::fs::create_dir_all(&workspace).unwrap();
998
999        let proj_a = workspace.join("project-a");
1000        let proj_b = workspace.join("project-b");
1001        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1002        std::fs::create_dir_all(&proj_b).unwrap();
1003        std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1004
1005        let result = detect_multi_root_workspace(&workspace);
1006        assert!(
1007            result.is_some(),
1008            "should detect workspace with 2 child projects"
1009        );
1010
1011        std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1012    }
1013
1014    #[test]
1015    fn detect_multi_root_workspace_returns_none_for_single_project() {
1016        let tmp = tempfile::tempdir().unwrap();
1017        let workspace = tmp.path().join("workspace");
1018        std::fs::create_dir_all(&workspace).unwrap();
1019
1020        let proj_a = workspace.join("project-a");
1021        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1022
1023        let result = detect_multi_root_workspace(&workspace);
1024        assert!(
1025            result.is_none(),
1026            "should not detect workspace with only 1 child project"
1027        );
1028    }
1029}