1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod pipeline_stages;
5pub mod registry;
6pub mod role_guard;
7pub mod tool_trait;
8
9use rmcp::handler::server::ServerHandler;
10use rmcp::model::{
11 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
12 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
13};
14use rmcp::service::{RequestContext, RoleServer};
15use rmcp::ErrorData;
16
17use crate::tools::{CrpMode, LeanCtxServer};
18
19impl ServerHandler for LeanCtxServer {
20 fn get_info(&self) -> ServerInfo {
21 let capabilities = ServerCapabilities::builder().enable_tools().build();
22
23 let instructions = crate::instructions::build_instructions(CrpMode::effective());
24
25 InitializeResult::new(capabilities)
26 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
27 .with_instructions(instructions)
28 }
29
30 async fn initialize(
31 &self,
32 request: InitializeRequestParams,
33 _context: RequestContext<RoleServer>,
34 ) -> Result<InitializeResult, ErrorData> {
35 let name = request.client_info.name.clone();
36 tracing::info!("MCP client connected: {:?}", name);
37 *self.client_name.write().await = name.clone();
38
39 let derived_root = derive_project_root_from_cwd();
40 let cwd_str = std::env::current_dir()
41 .ok()
42 .map(|p| p.to_string_lossy().to_string())
43 .unwrap_or_default();
44 {
45 let mut session = self.session.write().await;
46 if !cwd_str.is_empty() {
47 session.shell_cwd = Some(cwd_str.clone());
48 }
49 if let Some(ref root) = derived_root {
50 session.project_root = Some(root.clone());
51 tracing::info!("Project root set to: {root}");
52 } else if let Some(ref root) = session.project_root {
53 let root_path = std::path::Path::new(root);
54 let root_has_marker = has_project_marker(root_path);
55 let root_str = root_path.to_string_lossy();
56 let root_suspicious = root_str.contains("/.claude")
57 || root_str.contains("/.codex")
58 || root_str.contains("/var/folders/")
59 || root_str.contains("/tmp/")
60 || root_str.contains("\\.claude")
61 || root_str.contains("\\.codex")
62 || root_str.contains("\\AppData\\Local\\Temp")
63 || root_str.contains("\\Temp\\");
64 if root_suspicious && !root_has_marker {
65 session.project_root = None;
66 }
67 }
68 if self.session_mode == crate::tools::SessionMode::Shared {
69 if let Some(ref root) = session.project_root {
70 if let Some(ref rt) = self.context_os {
71 rt.shared_sessions.persist_best_effort(
72 root,
73 &self.workspace_id,
74 &self.channel_id,
75 &session,
76 );
77 rt.metrics.record_session_persisted();
78 }
79 }
80 } else {
81 let _ = session.save();
82 }
83 }
84
85 let agent_name = name.clone();
86 let agent_root = derived_root.clone().unwrap_or_default();
87 let agent_id_handle = self.agent_id.clone();
88 tokio::task::spawn_blocking(move || {
89 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
90 return;
91 }
92
93 let maintenance = crate::core::startup_guard::try_acquire_lock(
97 "startup-maintenance",
98 std::time::Duration::from_secs(2),
99 std::time::Duration::from_mins(2),
100 );
101 if maintenance.is_some() {
102 if let Some(home) = dirs::home_dir() {
103 let _ = crate::rules_inject::inject_all_rules(&home);
104 }
105 crate::hooks::refresh_installed_hooks();
106 crate::core::version_check::check_background();
107 }
108 drop(maintenance);
109
110 if !agent_root.is_empty() {
111 let heuristic_role = match agent_name.to_lowercase().as_str() {
112 n if n.contains("cursor") => Some("coder"),
113 n if n.contains("claude") => Some("coder"),
114 n if n.contains("codex") => Some("coder"),
115 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
116 n if n.contains("review") => Some("reviewer"),
117 n if n.contains("test") => Some("debugger"),
118 _ => None,
119 };
120 let env_role = std::env::var("LEAN_CTX_ROLE")
121 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
122 .ok();
123 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
124
125 let _ = crate::core::roles::set_active_role(effective_role);
126
127 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
128 registry.cleanup_stale(24);
129 let id = registry.register("mcp", Some(effective_role), &agent_root);
130 let _ = registry.save();
131 if let Ok(mut guard) = agent_id_handle.try_write() {
132 *guard = Some(id);
133 }
134 }
135 });
136
137 let instructions =
138 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
139 let capabilities = ServerCapabilities::builder().enable_tools().build();
140
141 Ok(InitializeResult::new(capabilities)
142 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
143 .with_instructions(instructions))
144 }
145
146 async fn list_tools(
147 &self,
148 _request: Option<PaginatedRequestParams>,
149 _context: RequestContext<RoleServer>,
150 ) -> Result<ListToolsResult, ErrorData> {
151 let all_tools = if crate::tool_defs::is_full_mode() {
152 crate::tool_defs::granular_tool_defs()
153 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
154 crate::tool_defs::unified_tool_defs()
155 } else {
156 crate::tool_defs::lazy_tool_defs()
157 };
158
159 let disabled = crate::core::config::Config::load().disabled_tools_effective();
160 let tools = if disabled.is_empty() {
161 all_tools
162 } else {
163 all_tools
164 .into_iter()
165 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
166 .collect()
167 };
168
169 let tools = {
170 let active = self.workflow.read().await.clone();
171 if let Some(run) = active {
172 if let Some(state) = run.spec.state(&run.current) {
173 if let Some(allowed) = &state.allowed_tools {
174 let mut allow: std::collections::HashSet<&str> =
175 allowed.iter().map(std::string::String::as_str).collect();
176 allow.insert("ctx");
177 allow.insert("ctx_workflow");
178 return Ok(ListToolsResult {
179 tools: tools
180 .into_iter()
181 .filter(|t| allow.contains(t.name.as_ref()))
182 .collect(),
183 ..Default::default()
184 });
185 }
186 }
187 }
188 tools
189 };
190
191 Ok(ListToolsResult {
192 tools,
193 ..Default::default()
194 })
195 }
196
197 async fn call_tool(
198 &self,
199 request: CallToolRequestParams,
200 _context: RequestContext<RoleServer>,
201 ) -> Result<CallToolResult, ErrorData> {
202 self.check_idle_expiry().await;
203
204 let original_name = request.name.as_ref().to_string();
205 let (resolved_name, resolved_args) = if original_name == "ctx" {
206 let sub = request
207 .arguments
208 .as_ref()
209 .and_then(|a| a.get("tool"))
210 .and_then(|v| v.as_str())
211 .map(std::string::ToString::to_string)
212 .ok_or_else(|| {
213 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
214 })?;
215 let tool_name = if sub.starts_with("ctx_") {
216 sub
217 } else {
218 format!("ctx_{sub}")
219 };
220 let mut args = request.arguments.unwrap_or_default();
221 args.remove("tool");
222 (tool_name, Some(args))
223 } else {
224 (original_name, request.arguments)
225 };
226 let name = resolved_name.as_str();
227 let args = resolved_args.as_ref();
228
229 let role_check = role_guard::check_tool_access(name);
230 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
231 tracing::warn!(
232 tool = name,
233 role = %role_check.role_name,
234 "Tool blocked by role policy"
235 );
236 return Ok(denied);
237 }
238
239 if name != "ctx_workflow" {
240 let active = self.workflow.read().await.clone();
241 if let Some(run) = active {
242 if let Some(state) = run.spec.state(&run.current) {
243 if let Some(allowed) = &state.allowed_tools {
244 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
245 if !allowed_ok {
246 let mut shown = allowed.clone();
247 shown.sort();
248 shown.truncate(30);
249 return Ok(CallToolResult::success(vec![Content::text(format!(
250 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
251 run.spec.name,
252 run.current,
253 shown.len(),
254 shown.join(", ")
255 ))]));
256 }
257 }
258 }
259 }
260 }
261
262 let auto_context = {
263 let task = {
264 let session = self.session.read().await;
265 session.task.as_ref().map(|t| t.description.clone())
266 };
267 let project_root = {
268 let session = self.session.read().await;
269 session.project_root.clone()
270 };
271 let mut cache = self.cache.write().await;
272 crate::tools::autonomy::session_lifecycle_pre_hook(
273 &self.autonomy,
274 name,
275 &mut cache,
276 task.as_deref(),
277 project_root.as_deref(),
278 CrpMode::effective(),
279 )
280 };
281
282 let throttle_result = {
283 let fp = args
284 .map(|a| {
285 crate::core::loop_detection::LoopDetector::fingerprint(
286 &serde_json::Value::Object(a.clone()),
287 )
288 })
289 .unwrap_or_default();
290 let mut detector = self.loop_detector.write().await;
291
292 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
293 let is_search_shell = name == "ctx_shell" && {
294 let cmd = args
295 .as_ref()
296 .and_then(|a| a.get("command"))
297 .and_then(|v| v.as_str())
298 .unwrap_or("");
299 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
300 };
301
302 if is_search || is_search_shell {
303 let search_pattern = args.and_then(|a| {
304 a.get("pattern")
305 .or_else(|| a.get("query"))
306 .and_then(|v| v.as_str())
307 });
308 let shell_pattern = if is_search_shell {
309 args.and_then(|a| a.get("command"))
310 .and_then(|v| v.as_str())
311 .and_then(helpers::extract_search_pattern_from_command)
312 } else {
313 None
314 };
315 let pat = search_pattern.or(shell_pattern.as_deref());
316 detector.record_search(name, &fp, pat)
317 } else {
318 detector.record_call(name, &fp)
319 }
320 };
321
322 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
323 let msg = throttle_result.message.unwrap_or_default();
324 return Ok(CallToolResult::success(vec![Content::text(msg)]));
325 }
326
327 let throttle_warning =
328 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
329 throttle_result.message.clone()
330 } else {
331 None
332 };
333
334 let config = crate::core::config::Config::load();
335 let minimal = config.minimal_overhead_effective();
336
337 {
338 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
339 let snap = BudgetTracker::global().check();
340 if *snap.worst_level() == BudgetLevel::Exhausted
341 && name != "ctx_session"
342 && name != "ctx_cost"
343 && name != "ctx_metrics"
344 {
345 for (dim, lvl, used, limit) in [
346 (
347 "tokens",
348 &snap.tokens.level,
349 format!("{}", snap.tokens.used),
350 format!("{}", snap.tokens.limit),
351 ),
352 (
353 "shell",
354 &snap.shell.level,
355 format!("{}", snap.shell.used),
356 format!("{}", snap.shell.limit),
357 ),
358 (
359 "cost",
360 &snap.cost.level,
361 format!("${:.2}", snap.cost.used_usd),
362 format!("${:.2}", snap.cost.limit_usd),
363 ),
364 ] {
365 if *lvl == BudgetLevel::Exhausted {
366 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
367 }
368 }
369 let msg = format!(
370 "[BUDGET EXHAUSTED] {}\n\
371 Use `ctx_session action=role` to check/switch roles, \
372 or `ctx_session action=reset` to start fresh.",
373 snap.format_compact()
374 );
375 tracing::warn!(tool = name, "{msg}");
376 return Ok(CallToolResult::success(vec![Content::text(msg)]));
377 }
378 }
379
380 if is_shell_tool_name(name) {
381 crate::core::budget_tracker::BudgetTracker::global().record_shell();
382 }
383
384 let tool_start = std::time::Instant::now();
385 let mut result_text = {
386 use futures::FutureExt;
387 use std::panic::AssertUnwindSafe;
388 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
389 .catch_unwind()
390 .await
391 {
392 Ok(Ok(text)) => text,
393 Ok(Err(e)) => return Err(e),
394 Err(panic_payload) => {
395 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
396 (*s).to_string()
397 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
398 s.clone()
399 } else {
400 "unknown".to_string()
401 };
402 tracing::error!("Tool '{name}' panicked: {detail}");
403 format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
404 The MCP server is still running. Please retry or use a different approach.")
405 }
406 }
407 };
408
409 let output_tokens = {
410 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
411 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
412 tokens
413 };
414
415 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
416 crate::core::anomaly::save();
418
419 let budget_warning = {
420 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
421 let snap = BudgetTracker::global().check();
422 if *snap.worst_level() == BudgetLevel::Warning {
423 for (dim, lvl, used, limit, pct) in [
424 (
425 "tokens",
426 &snap.tokens.level,
427 format!("{}", snap.tokens.used),
428 format!("{}", snap.tokens.limit),
429 snap.tokens.percent,
430 ),
431 (
432 "shell",
433 &snap.shell.level,
434 format!("{}", snap.shell.used),
435 format!("{}", snap.shell.limit),
436 snap.shell.percent,
437 ),
438 (
439 "cost",
440 &snap.cost.level,
441 format!("${:.2}", snap.cost.used_usd),
442 format!("${:.2}", snap.cost.limit_usd),
443 snap.cost.percent,
444 ),
445 ] {
446 if *lvl == BudgetLevel::Warning {
447 crate::core::events::emit_budget_warning(
448 &snap.role, dim, &used, &limit, pct,
449 );
450 }
451 }
452 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
453 } else {
454 None
455 }
456 };
457
458 let archive_hint = if minimal {
459 None
460 } else {
461 use crate::core::archive;
462 let archivable = matches!(
463 name,
464 "ctx_shell"
465 | "ctx_read"
466 | "ctx_multi_read"
467 | "ctx_smart_read"
468 | "ctx_execute"
469 | "ctx_search"
470 | "ctx_tree"
471 );
472 if archivable && archive::should_archive(&result_text) {
473 let cmd = helpers::get_str(args, "command")
474 .or_else(|| helpers::get_str(args, "path"))
475 .unwrap_or_default();
476 let session_id = self.session.read().await.id.clone();
477 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
478 let tokens = crate::core::tokens::count_tokens(&to_store);
479 archive::store(name, &cmd, &to_store, Some(&session_id))
480 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
481 } else {
482 None
483 }
484 };
485
486 let pre_compression = result_text.clone();
487 let density = crate::core::config::OutputDensity::effective(&config.output_density);
488 if density != crate::core::config::OutputDensity::Normal {
489 result_text = crate::core::protocol::compress_output(&result_text, &density);
490 }
491
492 {
493 let verify_cfg = crate::core::profiles::active_profile().verification;
494 let vr = crate::core::output_verification::verify_output(
495 &pre_compression,
496 &result_text,
497 &verify_cfg,
498 );
499 if !vr.warnings.is_empty() {
500 let msg = format!("[VERIFY] {}", vr.format_compact());
501 result_text = format!("{result_text}\n\n{msg}");
502 }
503 }
504
505 if let Some(hint) = archive_hint {
506 result_text = format!("{result_text}\n{hint}");
507 }
508
509 if let Some(ctx) = auto_context {
510 result_text = format!("{ctx}\n\n{result_text}");
511 }
512
513 if let Some(warning) = throttle_warning {
514 result_text = format!("{result_text}\n\n{warning}");
515 }
516
517 if let Some(bw) = budget_warning {
518 result_text = format!("{result_text}\n\n{bw}");
519 }
520
521 if !self
522 .rules_stale_checked
523 .swap(true, std::sync::atomic::Ordering::Relaxed)
524 {
525 let client = self.client_name.read().await.clone();
526 if !client.is_empty() {
527 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
528 result_text = format!("{result_text}\n\n{stale_msg}");
529 }
530 }
531 }
532
533 {
534 let _ = crate::core::slo::evaluate();
536 }
537
538 if name == "ctx_read" {
539 if minimal {
540 let mut cache = self.cache.write().await;
541 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
542 } else {
543 let read_path = self
544 .resolve_path_or_passthrough(
545 &helpers::get_str(args, "path").unwrap_or_default(),
546 )
547 .await;
548 let project_root = {
549 let session = self.session.read().await;
550 session.project_root.clone()
551 };
552 let mut cache = self.cache.write().await;
553 let enrich = crate::tools::autonomy::enrich_after_read(
554 &self.autonomy,
555 &mut cache,
556 &read_path,
557 project_root.as_deref(),
558 None,
559 crate::tools::CrpMode::effective(),
560 false,
561 );
562 if let Some(hint) = enrich.related_hint {
563 result_text = format!("{result_text}\n{hint}");
564 }
565 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
566 }
567 }
568
569 if !minimal && name == "ctx_shell" {
570 let cmd = helpers::get_str(args, "command").unwrap_or_default();
571 let calls = self.tool_calls.read().await;
572 let last_original = calls.last().map_or(0, |c| c.original_tokens);
573 drop(calls);
574 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
575 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
576 &self.autonomy,
577 &cmd,
578 last_original,
579 pre_hint_tokens,
580 ) {
581 result_text = format!("{result_text}\n{hint}");
582 }
583 }
584
585 let output_token_count = crate::core::tokens::count_tokens(&result_text);
586 let action = helpers::get_str(args, "action");
587
588 const K_STALENESS_BOUND: i64 = 10;
590 if self.session_mode == crate::tools::SessionMode::Shared {
591 if let Some(ref rt) = self.context_os {
592 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
593 let cursor = self
594 .last_seen_event_id
595 .load(std::sync::atomic::Ordering::Relaxed);
596 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
597 let gap = latest - cursor;
598 result_text = format!(
599 "[CONTEXT STALE] {gap} events happened since your last read. \
600 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
601 );
602 }
603 self.last_seen_event_id
604 .store(latest, std::sync::atomic::Ordering::Relaxed);
605 }
606 }
607
608 {
609 let input = helpers::canonical_args_string(args);
610 let input_md5 = helpers::md5_hex_fast(&input);
611 let output_md5 = helpers::md5_hex_fast(&result_text);
612 let agent_id = self.agent_id.read().await.clone();
613 let client_name = self.client_name.read().await.clone();
614 let mut explicit_intent: Option<(
615 crate::core::intent_protocol::IntentRecord,
616 Option<String>,
617 String,
618 )> = None;
619
620 let pending_session_save = {
621 let empty_args = serde_json::Map::new();
622 let args_map = args.unwrap_or(&empty_args);
623 let mut session = self.session.write().await;
624 session.record_tool_receipt(
625 name,
626 action.as_deref(),
627 &input_md5,
628 &output_md5,
629 agent_id.as_deref(),
630 Some(&client_name),
631 );
632
633 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
634 name,
635 action.as_deref(),
636 args_map,
637 session.project_root.as_deref(),
638 ) {
639 let is_explicit =
640 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
641 let root = session.project_root.clone();
642 let sid = session.id.clone();
643 session.record_intent(intent.clone());
644 if is_explicit {
645 explicit_intent = Some((intent, root, sid));
646 }
647 }
648 if session.should_save() {
649 session.prepare_save().ok()
650 } else {
651 None
652 }
653 };
654
655 if let Some(prepared) = pending_session_save {
656 tokio::task::spawn_blocking(move || {
657 let _ = prepared.write_to_disk();
658 });
659 }
660
661 if let Some((intent, root, session_id)) = explicit_intent {
662 let _ = crate::core::intent_protocol::apply_side_effects(
663 &intent,
664 root.as_deref(),
665 &session_id,
666 );
667 }
668
669 if self.autonomy.is_enabled() {
670 let (calls, project_root) = {
671 let session = self.session.read().await;
672 (session.stats.total_tool_calls, session.project_root.clone())
673 };
674
675 if let Some(root) = project_root {
676 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
677 let root_clone = root.clone();
678 tokio::task::spawn_blocking(move || {
679 let _ = crate::core::consolidation_engine::consolidate_latest(
680 &root_clone,
681 crate::core::consolidation_engine::ConsolidationBudgets::default(),
682 );
683 });
684 }
685 }
686 }
687
688 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
689 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
690 let output_token_count_u64 = output_token_count as u64;
691 let name_owned = name.to_string();
692 tokio::task::spawn_blocking(move || {
693 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
694 let quote = pricing.quote_from_env_or_agent_type(&client_name);
695 let cost_usd =
696 quote
697 .cost
698 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
699 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
700
701 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
702 store.record_tool_call(
703 &agent_key,
704 &client_name,
705 &name_owned,
706 input_token_count,
707 output_token_count_u64,
708 0,
709 );
710 let _ = store.save();
711 });
712 }
713
714 if self.session_mode == crate::tools::SessionMode::Shared
716 && name == "ctx_knowledge"
717 && action.as_deref() == Some("remember")
718 {
719 if let Some(ref rt) = self.context_os {
720 let my_agent = self.agent_id.read().await.clone();
721 let category = helpers::get_str(args, "category");
722 let key = helpers::get_str(args, "key");
723 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
724 let recent = rt.bus.recent_by_kind(
725 &self.workspace_id,
726 &self.channel_id,
727 "knowledge_remembered",
728 20,
729 );
730 for ev in &recent {
731 let p = &ev.payload;
732 let ev_cat = p.get("category").and_then(|v| v.as_str());
733 let ev_key = p.get("key").and_then(|v| v.as_str());
734 let ev_actor = ev.actor.as_deref();
735 if ev_cat == Some(cat.as_str())
736 && ev_key == Some(k.as_str())
737 && ev_actor != my_agent.as_deref()
738 {
739 let other = ev_actor.unwrap_or("unknown");
740 result_text = format!(
741 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
742 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
743 );
744 break;
745 }
746 }
747 }
748 }
749 }
750
751 if self.session_mode == crate::tools::SessionMode::Shared {
753 let ws = self.workspace_id.clone();
754 let ch = self.channel_id.clone();
755 let rt = self.context_os.clone();
756 let agent = self.agent_id.read().await.clone();
757 let tool = name.to_string();
758 let tool_action = action.clone();
759 let tool_path = helpers::get_str(args, "path");
760 let tool_category = helpers::get_str(args, "category");
761 let tool_key = helpers::get_str(args, "key");
762 let session_snapshot = self.session.read().await.clone();
763 let session_task = session_snapshot.task.clone();
764 tokio::task::spawn_blocking(move || {
765 let Some(rt) = rt else {
766 return;
767 };
768 let Some(root) = session_snapshot.project_root.as_deref() else {
769 return;
770 };
771 rt.shared_sessions
772 .persist_best_effort(root, &ws, &ch, &session_snapshot);
773 rt.metrics.record_session_persisted();
774
775 let mut base_payload = serde_json::json!({
776 "tool": tool,
777 "action": tool_action,
778 });
779 if let Some(ref p) = tool_path {
780 base_payload["path"] = serde_json::Value::String(p.clone());
781 }
782 if let Some(ref c) = tool_category {
783 base_payload["category"] = serde_json::Value::String(c.clone());
784 }
785 if let Some(ref k) = tool_key {
786 base_payload["key"] = serde_json::Value::String(k.clone());
787 }
788 if let Some(ref t) = session_task {
789 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
790 }
791
792 if rt
793 .bus
794 .append(
795 &ws,
796 &ch,
797 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
798 agent.as_deref(),
799 base_payload.clone(),
800 )
801 .is_some()
802 {
803 rt.metrics.record_event_appended();
804 rt.metrics.record_event_broadcast();
805 }
806
807 if let Some(secondary) =
808 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
809 {
810 if rt
811 .bus
812 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
813 .is_some()
814 {
815 rt.metrics.record_event_appended();
816 rt.metrics.record_event_broadcast();
817 }
818 }
819 });
820 }
821
822 let skip_checkpoint = minimal
823 || matches!(
824 name,
825 "ctx_compress"
826 | "ctx_metrics"
827 | "ctx_benchmark"
828 | "ctx_analyze"
829 | "ctx_cache"
830 | "ctx_discover"
831 | "ctx_dedup"
832 | "ctx_session"
833 | "ctx_knowledge"
834 | "ctx_agent"
835 | "ctx_share"
836 | "ctx_wrapped"
837 | "ctx_overview"
838 | "ctx_preload"
839 | "ctx_cost"
840 | "ctx_gain"
841 | "ctx_heatmap"
842 | "ctx_task"
843 | "ctx_impact"
844 | "ctx_architecture"
845 | "ctx_workflow"
846 );
847
848 if !skip_checkpoint && self.increment_and_check() {
849 if let Some(checkpoint) = self.auto_checkpoint().await {
850 let interval = LeanCtxServer::checkpoint_interval_effective();
851 let combined = format!(
852 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
853 );
854 return Ok(CallToolResult::success(vec![Content::text(combined)]));
855 }
856 }
857
858 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
859 if tool_duration_ms > 100 {
860 LeanCtxServer::append_tool_call_log(
861 name,
862 tool_duration_ms,
863 0,
864 0,
865 None,
866 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
867 );
868 }
869
870 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
871 if current_count > 0 && current_count.is_multiple_of(100) {
872 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
873 }
874
875 Ok(CallToolResult::success(vec![Content::text(result_text)]))
876 }
877}
878
879pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
880 crate::instructions::build_instructions_for_test(crp_mode)
881}
882
883pub fn build_claude_code_instructions_for_test() -> String {
884 crate::instructions::claude_code_instructions()
885}
886
887const PROJECT_MARKERS: &[&str] = &[
888 ".git",
889 "Cargo.toml",
890 "package.json",
891 "go.mod",
892 "pyproject.toml",
893 "setup.py",
894 "pom.xml",
895 "build.gradle",
896 "Makefile",
897 ".lean-ctx.toml",
898];
899
900fn has_project_marker(dir: &std::path::Path) -> bool {
901 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
902}
903
904fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
905 if let Some(home) = dirs::home_dir() {
906 if dir == home {
907 return true;
908 }
909 }
910 let dir_str = dir.to_string_lossy();
911 dir_str.ends_with("/.claude")
912 || dir_str.ends_with("/.codex")
913 || dir_str.contains("/.claude/")
914 || dir_str.contains("/.codex/")
915}
916
917fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
918 std::process::Command::new("git")
919 .args(["rev-parse", "--show-toplevel"])
920 .current_dir(dir)
921 .stdout(std::process::Stdio::piped())
922 .stderr(std::process::Stdio::null())
923 .output()
924 .ok()
925 .and_then(|o| {
926 if o.status.success() {
927 String::from_utf8(o.stdout)
928 .ok()
929 .map(|s| s.trim().to_string())
930 } else {
931 None
932 }
933 })
934}
935
936pub fn derive_project_root_from_cwd() -> Option<String> {
937 let cwd = std::env::current_dir().ok()?;
938 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
939
940 if is_home_or_agent_dir(&canonical) {
941 return git_toplevel_from(&canonical);
942 }
943
944 if has_project_marker(&canonical) {
945 return Some(canonical.to_string_lossy().to_string());
946 }
947
948 if let Some(git_root) = git_toplevel_from(&canonical) {
949 return Some(git_root);
950 }
951
952 if let Some(root) = detect_multi_root_workspace(&canonical) {
953 return Some(root);
954 }
955
956 None
957}
958
959fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
963 let entries = std::fs::read_dir(dir).ok()?;
964 let mut child_projects: Vec<String> = Vec::new();
965
966 for entry in entries.flatten() {
967 let path = entry.path();
968 if path.is_dir() && has_project_marker(&path) {
969 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
970 child_projects.push(canonical.to_string_lossy().to_string());
971 }
972 }
973
974 if child_projects.len() >= 2 {
975 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
976 let sep = if cfg!(windows) { ";" } else { ":" };
977 let merged = if existing.is_empty() {
978 child_projects.join(sep)
979 } else {
980 format!("{existing}{sep}{}", child_projects.join(sep))
981 };
982 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
983 tracing::info!(
984 "Multi-root workspace detected at {}: auto-allowing {} child projects",
985 dir.display(),
986 child_projects.len()
987 );
988 return Some(dir.to_string_lossy().to_string());
989 }
990
991 None
992}
993
994pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
995 crate::tool_defs::list_all_tool_defs()
996 .into_iter()
997 .map(|(name, desc, _)| (name, desc))
998 .collect()
999}
1000
1001pub fn tool_schemas_json_for_test() -> String {
1002 crate::tool_defs::list_all_tool_defs()
1003 .iter()
1004 .map(|(name, _, schema)| format!("{name}: {schema}"))
1005 .collect::<Vec<_>>()
1006 .join("\n")
1007}
1008
1009fn is_shell_tool_name(name: &str) -> bool {
1010 matches!(name, "ctx_shell" | "ctx_execute")
1011}
1012
1013#[cfg(test)]
1014mod tests {
1015 use super::*;
1016
1017 #[test]
1018 fn project_markers_detected() {
1019 let tmp = tempfile::tempdir().unwrap();
1020 let root = tmp.path().join("myproject");
1021 std::fs::create_dir_all(&root).unwrap();
1022 assert!(!has_project_marker(&root));
1023
1024 std::fs::create_dir(root.join(".git")).unwrap();
1025 assert!(has_project_marker(&root));
1026 }
1027
1028 #[test]
1029 fn home_dir_detected_as_agent_dir() {
1030 if let Some(home) = dirs::home_dir() {
1031 assert!(is_home_or_agent_dir(&home));
1032 }
1033 }
1034
1035 #[test]
1036 fn agent_dirs_detected() {
1037 let claude = std::path::PathBuf::from("/home/user/.claude");
1038 assert!(is_home_or_agent_dir(&claude));
1039 let codex = std::path::PathBuf::from("/home/user/.codex");
1040 assert!(is_home_or_agent_dir(&codex));
1041 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1042 assert!(!is_home_or_agent_dir(&project));
1043 }
1044
1045 #[test]
1046 fn test_unified_tool_count() {
1047 let tools = crate::tool_defs::unified_tool_defs();
1048 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1049 }
1050
1051 #[test]
1052 fn test_granular_tool_count() {
1053 let tools = crate::tool_defs::granular_tool_defs();
1054 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1055 }
1056
1057 #[test]
1058 fn disabled_tools_filters_list() {
1059 let all = crate::tool_defs::granular_tool_defs();
1060 let total = all.len();
1061 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1062 let filtered: Vec<_> = all
1063 .into_iter()
1064 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1065 .collect();
1066 assert_eq!(filtered.len(), total - 2);
1067 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1068 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1069 }
1070
1071 #[test]
1072 fn empty_disabled_tools_returns_all() {
1073 let all = crate::tool_defs::granular_tool_defs();
1074 let total = all.len();
1075 let disabled: Vec<String> = vec![];
1076 let filtered: Vec<_> = all
1077 .into_iter()
1078 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1079 .collect();
1080 assert_eq!(filtered.len(), total);
1081 }
1082
1083 #[test]
1084 fn misspelled_disabled_tool_is_silently_ignored() {
1085 let all = crate::tool_defs::granular_tool_defs();
1086 let total = all.len();
1087 let disabled = ["ctx_nonexistent_tool".to_string()];
1088 let filtered: Vec<_> = all
1089 .into_iter()
1090 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1091 .collect();
1092 assert_eq!(filtered.len(), total);
1093 }
1094
1095 #[test]
1096 fn detect_multi_root_workspace_with_child_projects() {
1097 let tmp = tempfile::tempdir().unwrap();
1098 let workspace = tmp.path().join("workspace");
1099 std::fs::create_dir_all(&workspace).unwrap();
1100
1101 let proj_a = workspace.join("project-a");
1102 let proj_b = workspace.join("project-b");
1103 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1104 std::fs::create_dir_all(&proj_b).unwrap();
1105 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1106
1107 let result = detect_multi_root_workspace(&workspace);
1108 assert!(
1109 result.is_some(),
1110 "should detect workspace with 2 child projects"
1111 );
1112
1113 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1114 }
1115
1116 #[test]
1117 fn detect_multi_root_workspace_returns_none_for_single_project() {
1118 let tmp = tempfile::tempdir().unwrap();
1119 let workspace = tmp.path().join("workspace");
1120 std::fs::create_dir_all(&workspace).unwrap();
1121
1122 let proj_a = workspace.join("project-a");
1123 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1124
1125 let result = detect_multi_root_workspace(&workspace);
1126 assert!(
1127 result.is_none(),
1128 "should not detect workspace with only 1 child project"
1129 );
1130 }
1131}