Skip to main content

lean_ctx/server/
mod.rs

1mod dispatch;
2mod execute;
3pub mod helpers;
4pub mod pipeline_stages;
5pub mod registry;
6pub mod role_guard;
7pub mod tool_trait;
8
9use rmcp::handler::server::ServerHandler;
10use rmcp::model::{
11    CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
12    InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
13};
14use rmcp::service::{RequestContext, RoleServer};
15use rmcp::ErrorData;
16
17use crate::tools::{CrpMode, LeanCtxServer};
18
19impl ServerHandler for LeanCtxServer {
20    fn get_info(&self) -> ServerInfo {
21        let capabilities = ServerCapabilities::builder().enable_tools().build();
22
23        let instructions = crate::instructions::build_instructions(CrpMode::effective());
24
25        InitializeResult::new(capabilities)
26            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
27            .with_instructions(instructions)
28    }
29
30    async fn initialize(
31        &self,
32        request: InitializeRequestParams,
33        _context: RequestContext<RoleServer>,
34    ) -> Result<InitializeResult, ErrorData> {
35        let name = request.client_info.name.clone();
36        tracing::info!("MCP client connected: {:?}", name);
37        *self.client_name.write().await = name.clone();
38
39        let derived_root = derive_project_root_from_cwd();
40        let cwd_str = std::env::current_dir()
41            .ok()
42            .map(|p| p.to_string_lossy().to_string())
43            .unwrap_or_default();
44        {
45            let mut session = self.session.write().await;
46            if !cwd_str.is_empty() {
47                session.shell_cwd = Some(cwd_str.clone());
48            }
49            if let Some(ref root) = derived_root {
50                session.project_root = Some(root.clone());
51                tracing::info!("Project root set to: {root}");
52            } else if let Some(ref root) = session.project_root {
53                let root_path = std::path::Path::new(root);
54                let root_has_marker = has_project_marker(root_path);
55                let root_str = root_path.to_string_lossy();
56                let root_suspicious = root_str.contains("/.claude")
57                    || root_str.contains("/.codex")
58                    || root_str.contains("/var/folders/")
59                    || root_str.contains("/tmp/")
60                    || root_str.contains("\\.claude")
61                    || root_str.contains("\\.codex")
62                    || root_str.contains("\\AppData\\Local\\Temp")
63                    || root_str.contains("\\Temp\\");
64                if root_suspicious && !root_has_marker {
65                    session.project_root = None;
66                }
67            }
68            if self.session_mode == crate::tools::SessionMode::Shared {
69                if let Some(ref root) = session.project_root {
70                    if let Some(ref rt) = self.context_os {
71                        rt.shared_sessions.persist_best_effort(
72                            root,
73                            &self.workspace_id,
74                            &self.channel_id,
75                            &session,
76                        );
77                        rt.metrics.record_session_persisted();
78                    }
79                }
80            } else {
81                let _ = session.save();
82            }
83        }
84
85        let agent_name = name.clone();
86        let agent_root = derived_root.clone().unwrap_or_default();
87        let agent_id_handle = self.agent_id.clone();
88        tokio::task::spawn_blocking(move || {
89            if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
90                return;
91            }
92
93            // Avoid startup stampedes when multiple agent sessions initialize at once.
94            // These are best-effort maintenance tasks; it's fine to skip if another
95            // lean-ctx instance is already doing them.
96            let maintenance = crate::core::startup_guard::try_acquire_lock(
97                "startup-maintenance",
98                std::time::Duration::from_secs(2),
99                std::time::Duration::from_mins(2),
100            );
101            if maintenance.is_some() {
102                if let Some(home) = dirs::home_dir() {
103                    let _ = crate::rules_inject::inject_all_rules(&home);
104                }
105                crate::hooks::refresh_installed_hooks();
106                crate::core::version_check::check_background();
107            }
108            drop(maintenance);
109
110            if !agent_root.is_empty() {
111                let heuristic_role = match agent_name.to_lowercase().as_str() {
112                    n if n.contains("cursor") => Some("coder"),
113                    n if n.contains("claude") => Some("coder"),
114                    n if n.contains("codex") => Some("coder"),
115                    n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
116                    n if n.contains("review") => Some("reviewer"),
117                    n if n.contains("test") => Some("debugger"),
118                    _ => None,
119                };
120                let env_role = std::env::var("LEAN_CTX_ROLE")
121                    .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
122                    .ok();
123                let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
124
125                let _ = crate::core::roles::set_active_role(effective_role);
126
127                let mut registry = crate::core::agents::AgentRegistry::load_or_create();
128                registry.cleanup_stale(24);
129                let id = registry.register("mcp", Some(effective_role), &agent_root);
130                let _ = registry.save();
131                if let Ok(mut guard) = agent_id_handle.try_write() {
132                    *guard = Some(id);
133                }
134            }
135        });
136
137        let instructions =
138            crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
139        let capabilities = ServerCapabilities::builder().enable_tools().build();
140
141        Ok(InitializeResult::new(capabilities)
142            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
143            .with_instructions(instructions))
144    }
145
146    async fn list_tools(
147        &self,
148        _request: Option<PaginatedRequestParams>,
149        _context: RequestContext<RoleServer>,
150    ) -> Result<ListToolsResult, ErrorData> {
151        let all_tools = if crate::tool_defs::is_full_mode() {
152            crate::tool_defs::granular_tool_defs()
153        } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
154            crate::tool_defs::unified_tool_defs()
155        } else {
156            crate::tool_defs::lazy_tool_defs()
157        };
158
159        let disabled = crate::core::config::Config::load().disabled_tools_effective();
160        let tools = if disabled.is_empty() {
161            all_tools
162        } else {
163            all_tools
164                .into_iter()
165                .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
166                .collect()
167        };
168
169        let tools = {
170            let active = self.workflow.read().await.clone();
171            if let Some(run) = active {
172                if let Some(state) = run.spec.state(&run.current) {
173                    if let Some(allowed) = &state.allowed_tools {
174                        let mut allow: std::collections::HashSet<&str> =
175                            allowed.iter().map(std::string::String::as_str).collect();
176                        allow.insert("ctx");
177                        allow.insert("ctx_workflow");
178                        return Ok(ListToolsResult {
179                            tools: tools
180                                .into_iter()
181                                .filter(|t| allow.contains(t.name.as_ref()))
182                                .collect(),
183                            ..Default::default()
184                        });
185                    }
186                }
187            }
188            tools
189        };
190
191        Ok(ListToolsResult {
192            tools,
193            ..Default::default()
194        })
195    }
196
197    async fn call_tool(
198        &self,
199        request: CallToolRequestParams,
200        _context: RequestContext<RoleServer>,
201    ) -> Result<CallToolResult, ErrorData> {
202        self.check_idle_expiry().await;
203
204        let original_name = request.name.as_ref().to_string();
205        let (resolved_name, resolved_args) = if original_name == "ctx" {
206            let sub = request
207                .arguments
208                .as_ref()
209                .and_then(|a| a.get("tool"))
210                .and_then(|v| v.as_str())
211                .map(std::string::ToString::to_string)
212                .ok_or_else(|| {
213                    ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
214                })?;
215            let tool_name = if sub.starts_with("ctx_") {
216                sub
217            } else {
218                format!("ctx_{sub}")
219            };
220            let mut args = request.arguments.unwrap_or_default();
221            args.remove("tool");
222            (tool_name, Some(args))
223        } else {
224            (original_name, request.arguments)
225        };
226        let name = resolved_name.as_str();
227        let args = resolved_args.as_ref();
228
229        let role_check = role_guard::check_tool_access(name);
230        if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
231            tracing::warn!(
232                tool = name,
233                role = %role_check.role_name,
234                "Tool blocked by role policy"
235            );
236            return Ok(denied);
237        }
238
239        if name != "ctx_workflow" {
240            let active = self.workflow.read().await.clone();
241            if let Some(run) = active {
242                if let Some(state) = run.spec.state(&run.current) {
243                    if let Some(allowed) = &state.allowed_tools {
244                        let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
245                        if !allowed_ok {
246                            let mut shown = allowed.clone();
247                            shown.sort();
248                            shown.truncate(30);
249                            return Ok(CallToolResult::success(vec![Content::text(format!(
250                                "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
251                                run.spec.name,
252                                run.current,
253                                shown.len(),
254                                shown.join(", ")
255                            ))]));
256                        }
257                    }
258                }
259            }
260        }
261
262        let auto_context = {
263            let task = {
264                let session = self.session.read().await;
265                session.task.as_ref().map(|t| t.description.clone())
266            };
267            let project_root = {
268                let session = self.session.read().await;
269                session.project_root.clone()
270            };
271            let mut cache = self.cache.write().await;
272            crate::tools::autonomy::session_lifecycle_pre_hook(
273                &self.autonomy,
274                name,
275                &mut cache,
276                task.as_deref(),
277                project_root.as_deref(),
278                CrpMode::effective(),
279            )
280        };
281
282        let throttle_result = {
283            let fp = args
284                .map(|a| {
285                    crate::core::loop_detection::LoopDetector::fingerprint(
286                        &serde_json::Value::Object(a.clone()),
287                    )
288                })
289                .unwrap_or_default();
290            let mut detector = self.loop_detector.write().await;
291
292            let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
293            let is_search_shell = name == "ctx_shell" && {
294                let cmd = args
295                    .as_ref()
296                    .and_then(|a| a.get("command"))
297                    .and_then(|v| v.as_str())
298                    .unwrap_or("");
299                crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
300            };
301
302            if is_search || is_search_shell {
303                let search_pattern = args.and_then(|a| {
304                    a.get("pattern")
305                        .or_else(|| a.get("query"))
306                        .and_then(|v| v.as_str())
307                });
308                let shell_pattern = if is_search_shell {
309                    args.and_then(|a| a.get("command"))
310                        .and_then(|v| v.as_str())
311                        .and_then(helpers::extract_search_pattern_from_command)
312                } else {
313                    None
314                };
315                let pat = search_pattern.or(shell_pattern.as_deref());
316                detector.record_search(name, &fp, pat)
317            } else {
318                detector.record_call(name, &fp)
319            }
320        };
321
322        if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
323            let msg = throttle_result.message.unwrap_or_default();
324            return Ok(CallToolResult::success(vec![Content::text(msg)]));
325        }
326
327        let throttle_warning =
328            if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
329                throttle_result.message.clone()
330            } else {
331                None
332            };
333
334        let config = crate::core::config::Config::load();
335        let minimal = config.minimal_overhead_effective();
336
337        {
338            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
339            let snap = BudgetTracker::global().check();
340            if *snap.worst_level() == BudgetLevel::Exhausted
341                && name != "ctx_session"
342                && name != "ctx_cost"
343                && name != "ctx_metrics"
344            {
345                for (dim, lvl, used, limit) in [
346                    (
347                        "tokens",
348                        &snap.tokens.level,
349                        format!("{}", snap.tokens.used),
350                        format!("{}", snap.tokens.limit),
351                    ),
352                    (
353                        "shell",
354                        &snap.shell.level,
355                        format!("{}", snap.shell.used),
356                        format!("{}", snap.shell.limit),
357                    ),
358                    (
359                        "cost",
360                        &snap.cost.level,
361                        format!("${:.2}", snap.cost.used_usd),
362                        format!("${:.2}", snap.cost.limit_usd),
363                    ),
364                ] {
365                    if *lvl == BudgetLevel::Exhausted {
366                        crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
367                    }
368                }
369                let msg = format!(
370                    "[BUDGET EXHAUSTED] {}\n\
371                     Use `ctx_session action=role` to check/switch roles, \
372                     or `ctx_session action=reset` to start fresh.",
373                    snap.format_compact()
374                );
375                tracing::warn!(tool = name, "{msg}");
376                return Ok(CallToolResult::success(vec![Content::text(msg)]));
377            }
378        }
379
380        if is_shell_tool_name(name) {
381            crate::core::budget_tracker::BudgetTracker::global().record_shell();
382        }
383
384        let tool_start = std::time::Instant::now();
385        let mut result_text = {
386            use futures::FutureExt;
387            use std::panic::AssertUnwindSafe;
388            match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
389                .catch_unwind()
390                .await
391            {
392                Ok(Ok(text)) => text,
393                Ok(Err(e)) => return Err(e),
394                Err(panic_payload) => {
395                    let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
396                        (*s).to_string()
397                    } else if let Some(s) = panic_payload.downcast_ref::<String>() {
398                        s.clone()
399                    } else {
400                        "unknown".to_string()
401                    };
402                    tracing::error!("Tool '{name}' panicked: {detail}");
403                    format!("ERROR: lean-ctx internal error in tool '{name}': {detail}\n\
404                             The MCP server is still running. Please retry or use a different approach.")
405                }
406            }
407        };
408
409        let output_tokens = {
410            let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
411            crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
412            tokens
413        };
414
415        crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
416        // Persist anomaly detector so dashboard state survives restarts.
417        crate::core::anomaly::save();
418
419        let budget_warning = {
420            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
421            let snap = BudgetTracker::global().check();
422            if *snap.worst_level() == BudgetLevel::Warning {
423                for (dim, lvl, used, limit, pct) in [
424                    (
425                        "tokens",
426                        &snap.tokens.level,
427                        format!("{}", snap.tokens.used),
428                        format!("{}", snap.tokens.limit),
429                        snap.tokens.percent,
430                    ),
431                    (
432                        "shell",
433                        &snap.shell.level,
434                        format!("{}", snap.shell.used),
435                        format!("{}", snap.shell.limit),
436                        snap.shell.percent,
437                    ),
438                    (
439                        "cost",
440                        &snap.cost.level,
441                        format!("${:.2}", snap.cost.used_usd),
442                        format!("${:.2}", snap.cost.limit_usd),
443                        snap.cost.percent,
444                    ),
445                ] {
446                    if *lvl == BudgetLevel::Warning {
447                        crate::core::events::emit_budget_warning(
448                            &snap.role, dim, &used, &limit, pct,
449                        );
450                    }
451                }
452                Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
453            } else {
454                None
455            }
456        };
457
458        let archive_hint = if minimal {
459            None
460        } else {
461            use crate::core::archive;
462            let archivable = matches!(
463                name,
464                "ctx_shell"
465                    | "ctx_read"
466                    | "ctx_multi_read"
467                    | "ctx_smart_read"
468                    | "ctx_execute"
469                    | "ctx_search"
470                    | "ctx_tree"
471            );
472            if archivable && archive::should_archive(&result_text) {
473                let cmd = helpers::get_str(args, "command")
474                    .or_else(|| helpers::get_str(args, "path"))
475                    .unwrap_or_default();
476                let session_id = self.session.read().await.id.clone();
477                let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
478                let tokens = crate::core::tokens::count_tokens(&to_store);
479                archive::store(name, &cmd, &to_store, Some(&session_id))
480                    .map(|id| archive::format_hint(&id, to_store.len(), tokens))
481            } else {
482                None
483            }
484        };
485
486        let pre_compression = result_text.clone();
487        let density = crate::core::config::OutputDensity::effective(&config.output_density);
488        if density != crate::core::config::OutputDensity::Normal {
489            result_text = crate::core::protocol::compress_output(&result_text, &density);
490        }
491
492        {
493            let verify_cfg = crate::core::profiles::active_profile().verification;
494            let vr = crate::core::output_verification::verify_output(
495                &pre_compression,
496                &result_text,
497                &verify_cfg,
498            );
499            if !vr.warnings.is_empty() {
500                let msg = format!("[VERIFY] {}", vr.format_compact());
501                result_text = format!("{result_text}\n\n{msg}");
502            }
503        }
504
505        if let Some(hint) = archive_hint {
506            result_text = format!("{result_text}\n{hint}");
507        }
508
509        if let Some(ctx) = auto_context {
510            result_text = format!("{ctx}\n\n{result_text}");
511        }
512
513        if let Some(warning) = throttle_warning {
514            result_text = format!("{result_text}\n\n{warning}");
515        }
516
517        if let Some(bw) = budget_warning {
518            result_text = format!("{result_text}\n\n{bw}");
519        }
520
521        if !self
522            .rules_stale_checked
523            .swap(true, std::sync::atomic::Ordering::Relaxed)
524        {
525            let client = self.client_name.read().await.clone();
526            if !client.is_empty() {
527                if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
528                    result_text = format!("{result_text}\n\n{stale_msg}");
529                }
530            }
531        }
532
533        {
534            // Evaluate SLOs for observability (watch/dashboard), but keep tool outputs clean.
535            let _ = crate::core::slo::evaluate();
536        }
537
538        if name == "ctx_read" {
539            if minimal {
540                let mut cache = self.cache.write().await;
541                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
542            } else {
543                let read_path = self
544                    .resolve_path_or_passthrough(
545                        &helpers::get_str(args, "path").unwrap_or_default(),
546                    )
547                    .await;
548                let project_root = {
549                    let session = self.session.read().await;
550                    session.project_root.clone()
551                };
552                let mut cache = self.cache.write().await;
553                let enrich = crate::tools::autonomy::enrich_after_read(
554                    &self.autonomy,
555                    &mut cache,
556                    &read_path,
557                    project_root.as_deref(),
558                    None,
559                    crate::tools::CrpMode::effective(),
560                    false,
561                );
562                if let Some(hint) = enrich.related_hint {
563                    result_text = format!("{result_text}\n{hint}");
564                }
565                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
566            }
567        }
568
569        if !minimal && name == "ctx_shell" {
570            let cmd = helpers::get_str(args, "command").unwrap_or_default();
571            let calls = self.tool_calls.read().await;
572            let last_original = calls.last().map_or(0, |c| c.original_tokens);
573            drop(calls);
574            let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
575            if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
576                &self.autonomy,
577                &cmd,
578                last_original,
579                pre_hint_tokens,
580            ) {
581                result_text = format!("{result_text}\n{hint}");
582            }
583        }
584
585        let output_token_count = crate::core::tokens::count_tokens(&result_text);
586        let action = helpers::get_str(args, "action");
587
588        // K-bounded staleness guard: warn if shared context has diverged.
589        const K_STALENESS_BOUND: i64 = 10;
590        if self.session_mode == crate::tools::SessionMode::Shared {
591            if let Some(ref rt) = self.context_os {
592                let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
593                let cursor = self
594                    .last_seen_event_id
595                    .load(std::sync::atomic::Ordering::Relaxed);
596                if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
597                    let gap = latest - cursor;
598                    result_text = format!(
599                        "[CONTEXT STALE] {gap} events happened since your last read. \
600                         Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
601                    );
602                }
603                self.last_seen_event_id
604                    .store(latest, std::sync::atomic::Ordering::Relaxed);
605            }
606        }
607
608        {
609            let input = helpers::canonical_args_string(args);
610            let input_md5 = helpers::md5_hex_fast(&input);
611            let output_md5 = helpers::md5_hex_fast(&result_text);
612            let agent_id = self.agent_id.read().await.clone();
613            let client_name = self.client_name.read().await.clone();
614            let mut explicit_intent: Option<(
615                crate::core::intent_protocol::IntentRecord,
616                Option<String>,
617                String,
618            )> = None;
619
620            let pending_session_save = {
621                let empty_args = serde_json::Map::new();
622                let args_map = args.unwrap_or(&empty_args);
623                let mut session = self.session.write().await;
624                session.record_tool_receipt(
625                    name,
626                    action.as_deref(),
627                    &input_md5,
628                    &output_md5,
629                    agent_id.as_deref(),
630                    Some(&client_name),
631                );
632
633                if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
634                    name,
635                    action.as_deref(),
636                    args_map,
637                    session.project_root.as_deref(),
638                ) {
639                    let is_explicit =
640                        intent.source == crate::core::intent_protocol::IntentSource::Explicit;
641                    let root = session.project_root.clone();
642                    let sid = session.id.clone();
643                    session.record_intent(intent.clone());
644                    if is_explicit {
645                        explicit_intent = Some((intent, root, sid));
646                    }
647                }
648                if session.should_save() {
649                    session.prepare_save().ok()
650                } else {
651                    None
652                }
653            };
654
655            if let Some(prepared) = pending_session_save {
656                tokio::task::spawn_blocking(move || {
657                    let _ = prepared.write_to_disk();
658                });
659            }
660
661            if let Some((intent, root, session_id)) = explicit_intent {
662                let _ = crate::core::intent_protocol::apply_side_effects(
663                    &intent,
664                    root.as_deref(),
665                    &session_id,
666                );
667            }
668
669            if self.autonomy.is_enabled() {
670                let (calls, project_root) = {
671                    let session = self.session.read().await;
672                    (session.stats.total_tool_calls, session.project_root.clone())
673                };
674
675                if let Some(root) = project_root {
676                    if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
677                        let root_clone = root.clone();
678                        tokio::task::spawn_blocking(move || {
679                            let _ = crate::core::consolidation_engine::consolidate_latest(
680                                &root_clone,
681                                crate::core::consolidation_engine::ConsolidationBudgets::default(),
682                            );
683                        });
684                    }
685                }
686            }
687
688            let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
689            let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
690            let output_token_count_u64 = output_token_count as u64;
691            let name_owned = name.to_string();
692            tokio::task::spawn_blocking(move || {
693                let pricing = crate::core::gain::model_pricing::ModelPricing::load();
694                let quote = pricing.quote_from_env_or_agent_type(&client_name);
695                let cost_usd =
696                    quote
697                        .cost
698                        .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
699                crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
700
701                let mut store = crate::core::a2a::cost_attribution::CostStore::load();
702                store.record_tool_call(
703                    &agent_key,
704                    &client_name,
705                    &name_owned,
706                    input_token_count,
707                    output_token_count_u64,
708                    0,
709                );
710                let _ = store.save();
711            });
712        }
713
714        // Context Bus: conflict detection for knowledge writes in shared mode.
715        if self.session_mode == crate::tools::SessionMode::Shared
716            && name == "ctx_knowledge"
717            && action.as_deref() == Some("remember")
718        {
719            if let Some(ref rt) = self.context_os {
720                let my_agent = self.agent_id.read().await.clone();
721                let category = helpers::get_str(args, "category");
722                let key = helpers::get_str(args, "key");
723                if let (Some(ref cat), Some(ref k)) = (&category, &key) {
724                    let recent = rt.bus.recent_by_kind(
725                        &self.workspace_id,
726                        &self.channel_id,
727                        "knowledge_remembered",
728                        20,
729                    );
730                    for ev in &recent {
731                        let p = &ev.payload;
732                        let ev_cat = p.get("category").and_then(|v| v.as_str());
733                        let ev_key = p.get("key").and_then(|v| v.as_str());
734                        let ev_actor = ev.actor.as_deref();
735                        if ev_cat == Some(cat.as_str())
736                            && ev_key == Some(k.as_str())
737                            && ev_actor != my_agent.as_deref()
738                        {
739                            let other = ev_actor.unwrap_or("unknown");
740                            result_text = format!(
741                                "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
742                                 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
743                            );
744                            break;
745                        }
746                    }
747                }
748            }
749        }
750
751        // Context OS: persist shared session + publish events.
752        if self.session_mode == crate::tools::SessionMode::Shared {
753            let ws = self.workspace_id.clone();
754            let ch = self.channel_id.clone();
755            let rt = self.context_os.clone();
756            let agent = self.agent_id.read().await.clone();
757            let tool = name.to_string();
758            let tool_action = action.clone();
759            let tool_path = helpers::get_str(args, "path");
760            let tool_category = helpers::get_str(args, "category");
761            let tool_key = helpers::get_str(args, "key");
762            let session_snapshot = self.session.read().await.clone();
763            let session_task = session_snapshot.task.clone();
764            tokio::task::spawn_blocking(move || {
765                let Some(rt) = rt else {
766                    return;
767                };
768                let Some(root) = session_snapshot.project_root.as_deref() else {
769                    return;
770                };
771                rt.shared_sessions
772                    .persist_best_effort(root, &ws, &ch, &session_snapshot);
773                rt.metrics.record_session_persisted();
774
775                let mut base_payload = serde_json::json!({
776                    "tool": tool,
777                    "action": tool_action,
778                });
779                if let Some(ref p) = tool_path {
780                    base_payload["path"] = serde_json::Value::String(p.clone());
781                }
782                if let Some(ref c) = tool_category {
783                    base_payload["category"] = serde_json::Value::String(c.clone());
784                }
785                if let Some(ref k) = tool_key {
786                    base_payload["key"] = serde_json::Value::String(k.clone());
787                }
788                if let Some(ref t) = session_task {
789                    base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
790                }
791
792                if rt
793                    .bus
794                    .append(
795                        &ws,
796                        &ch,
797                        &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
798                        agent.as_deref(),
799                        base_payload.clone(),
800                    )
801                    .is_some()
802                {
803                    rt.metrics.record_event_appended();
804                    rt.metrics.record_event_broadcast();
805                }
806
807                if let Some(secondary) =
808                    crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
809                {
810                    if rt
811                        .bus
812                        .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
813                        .is_some()
814                    {
815                        rt.metrics.record_event_appended();
816                        rt.metrics.record_event_broadcast();
817                    }
818                }
819            });
820        }
821
822        let skip_checkpoint = minimal
823            || matches!(
824                name,
825                "ctx_compress"
826                    | "ctx_metrics"
827                    | "ctx_benchmark"
828                    | "ctx_analyze"
829                    | "ctx_cache"
830                    | "ctx_discover"
831                    | "ctx_dedup"
832                    | "ctx_session"
833                    | "ctx_knowledge"
834                    | "ctx_agent"
835                    | "ctx_share"
836                    | "ctx_wrapped"
837                    | "ctx_overview"
838                    | "ctx_preload"
839                    | "ctx_cost"
840                    | "ctx_gain"
841                    | "ctx_heatmap"
842                    | "ctx_task"
843                    | "ctx_impact"
844                    | "ctx_architecture"
845                    | "ctx_workflow"
846            );
847
848        if !skip_checkpoint && self.increment_and_check() {
849            if let Some(checkpoint) = self.auto_checkpoint().await {
850                let interval = LeanCtxServer::checkpoint_interval_effective();
851                let combined = format!(
852                    "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
853                );
854                return Ok(CallToolResult::success(vec![Content::text(combined)]));
855            }
856        }
857
858        let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
859        if tool_duration_ms > 100 {
860            LeanCtxServer::append_tool_call_log(
861                name,
862                tool_duration_ms,
863                0,
864                0,
865                None,
866                &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
867            );
868        }
869
870        let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
871        if current_count > 0 && current_count.is_multiple_of(100) {
872            std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
873        }
874
875        Ok(CallToolResult::success(vec![Content::text(result_text)]))
876    }
877}
878
879pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
880    crate::instructions::build_instructions_for_test(crp_mode)
881}
882
883pub fn build_claude_code_instructions_for_test() -> String {
884    crate::instructions::claude_code_instructions()
885}
886
887const PROJECT_MARKERS: &[&str] = &[
888    ".git",
889    "Cargo.toml",
890    "package.json",
891    "go.mod",
892    "pyproject.toml",
893    "setup.py",
894    "pom.xml",
895    "build.gradle",
896    "Makefile",
897    ".lean-ctx.toml",
898];
899
900fn has_project_marker(dir: &std::path::Path) -> bool {
901    PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
902}
903
904fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
905    if let Some(home) = dirs::home_dir() {
906        if dir == home {
907            return true;
908        }
909    }
910    let dir_str = dir.to_string_lossy();
911    dir_str.ends_with("/.claude")
912        || dir_str.ends_with("/.codex")
913        || dir_str.contains("/.claude/")
914        || dir_str.contains("/.codex/")
915}
916
917fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
918    std::process::Command::new("git")
919        .args(["rev-parse", "--show-toplevel"])
920        .current_dir(dir)
921        .stdout(std::process::Stdio::piped())
922        .stderr(std::process::Stdio::null())
923        .output()
924        .ok()
925        .and_then(|o| {
926            if o.status.success() {
927                String::from_utf8(o.stdout)
928                    .ok()
929                    .map(|s| s.trim().to_string())
930            } else {
931                None
932            }
933        })
934}
935
936pub fn derive_project_root_from_cwd() -> Option<String> {
937    let cwd = std::env::current_dir().ok()?;
938    let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
939
940    if is_home_or_agent_dir(&canonical) {
941        return git_toplevel_from(&canonical);
942    }
943
944    if has_project_marker(&canonical) {
945        return Some(canonical.to_string_lossy().to_string());
946    }
947
948    if let Some(git_root) = git_toplevel_from(&canonical) {
949        return Some(git_root);
950    }
951
952    if let Some(root) = detect_multi_root_workspace(&canonical) {
953        return Some(root);
954    }
955
956    None
957}
958
959/// Detect a multi-root workspace: a directory that has no project markers
960/// itself, but contains child directories that do. In this case, use the
961/// parent as jail root and auto-allow all child projects via LEAN_CTX_ALLOW_PATH.
962fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
963    let entries = std::fs::read_dir(dir).ok()?;
964    let mut child_projects: Vec<String> = Vec::new();
965
966    for entry in entries.flatten() {
967        let path = entry.path();
968        if path.is_dir() && has_project_marker(&path) {
969            let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
970            child_projects.push(canonical.to_string_lossy().to_string());
971        }
972    }
973
974    if child_projects.len() >= 2 {
975        let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
976        let sep = if cfg!(windows) { ";" } else { ":" };
977        let merged = if existing.is_empty() {
978            child_projects.join(sep)
979        } else {
980            format!("{existing}{sep}{}", child_projects.join(sep))
981        };
982        std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
983        tracing::info!(
984            "Multi-root workspace detected at {}: auto-allowing {} child projects",
985            dir.display(),
986            child_projects.len()
987        );
988        return Some(dir.to_string_lossy().to_string());
989    }
990
991    None
992}
993
994pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
995    crate::tool_defs::list_all_tool_defs()
996        .into_iter()
997        .map(|(name, desc, _)| (name, desc))
998        .collect()
999}
1000
1001pub fn tool_schemas_json_for_test() -> String {
1002    crate::tool_defs::list_all_tool_defs()
1003        .iter()
1004        .map(|(name, _, schema)| format!("{name}: {schema}"))
1005        .collect::<Vec<_>>()
1006        .join("\n")
1007}
1008
1009fn is_shell_tool_name(name: &str) -> bool {
1010    matches!(name, "ctx_shell" | "ctx_execute")
1011}
1012
1013#[cfg(test)]
1014mod tests {
1015    use super::*;
1016
1017    #[test]
1018    fn project_markers_detected() {
1019        let tmp = tempfile::tempdir().unwrap();
1020        let root = tmp.path().join("myproject");
1021        std::fs::create_dir_all(&root).unwrap();
1022        assert!(!has_project_marker(&root));
1023
1024        std::fs::create_dir(root.join(".git")).unwrap();
1025        assert!(has_project_marker(&root));
1026    }
1027
1028    #[test]
1029    fn home_dir_detected_as_agent_dir() {
1030        if let Some(home) = dirs::home_dir() {
1031            assert!(is_home_or_agent_dir(&home));
1032        }
1033    }
1034
1035    #[test]
1036    fn agent_dirs_detected() {
1037        let claude = std::path::PathBuf::from("/home/user/.claude");
1038        assert!(is_home_or_agent_dir(&claude));
1039        let codex = std::path::PathBuf::from("/home/user/.codex");
1040        assert!(is_home_or_agent_dir(&codex));
1041        let project = std::path::PathBuf::from("/home/user/projects/myapp");
1042        assert!(!is_home_or_agent_dir(&project));
1043    }
1044
1045    #[test]
1046    fn test_unified_tool_count() {
1047        let tools = crate::tool_defs::unified_tool_defs();
1048        assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1049    }
1050
1051    #[test]
1052    fn test_granular_tool_count() {
1053        let tools = crate::tool_defs::granular_tool_defs();
1054        assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1055    }
1056
1057    #[test]
1058    fn disabled_tools_filters_list() {
1059        let all = crate::tool_defs::granular_tool_defs();
1060        let total = all.len();
1061        let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1062        let filtered: Vec<_> = all
1063            .into_iter()
1064            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1065            .collect();
1066        assert_eq!(filtered.len(), total - 2);
1067        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1068        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1069    }
1070
1071    #[test]
1072    fn empty_disabled_tools_returns_all() {
1073        let all = crate::tool_defs::granular_tool_defs();
1074        let total = all.len();
1075        let disabled: Vec<String> = vec![];
1076        let filtered: Vec<_> = all
1077            .into_iter()
1078            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1079            .collect();
1080        assert_eq!(filtered.len(), total);
1081    }
1082
1083    #[test]
1084    fn misspelled_disabled_tool_is_silently_ignored() {
1085        let all = crate::tool_defs::granular_tool_defs();
1086        let total = all.len();
1087        let disabled = ["ctx_nonexistent_tool".to_string()];
1088        let filtered: Vec<_> = all
1089            .into_iter()
1090            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1091            .collect();
1092        assert_eq!(filtered.len(), total);
1093    }
1094
1095    #[test]
1096    fn detect_multi_root_workspace_with_child_projects() {
1097        let tmp = tempfile::tempdir().unwrap();
1098        let workspace = tmp.path().join("workspace");
1099        std::fs::create_dir_all(&workspace).unwrap();
1100
1101        let proj_a = workspace.join("project-a");
1102        let proj_b = workspace.join("project-b");
1103        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1104        std::fs::create_dir_all(&proj_b).unwrap();
1105        std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1106
1107        let result = detect_multi_root_workspace(&workspace);
1108        assert!(
1109            result.is_some(),
1110            "should detect workspace with 2 child projects"
1111        );
1112
1113        std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1114    }
1115
1116    #[test]
1117    fn detect_multi_root_workspace_returns_none_for_single_project() {
1118        let tmp = tempfile::tempdir().unwrap();
1119        let workspace = tmp.path().join("workspace");
1120        std::fs::create_dir_all(&workspace).unwrap();
1121
1122        let proj_a = workspace.join("project-a");
1123        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1124
1125        let result = detect_multi_root_workspace(&workspace);
1126        assert!(
1127            result.is_none(),
1128            "should not detect workspace with only 1 child project"
1129        );
1130    }
1131}