1pub mod context_gate;
2mod dispatch;
3pub mod dynamic_tools;
4pub mod elicitation;
5pub(crate) mod execute;
6pub mod helpers;
7pub mod pipeline_stages;
8pub mod prompts;
9pub mod registry;
10pub mod resources;
11pub mod role_guard;
12pub mod tool_trait;
13
14use rmcp::handler::server::ServerHandler;
15use rmcp::model::{
16 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
17 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
18};
19use rmcp::service::{RequestContext, RoleServer};
20use rmcp::ErrorData;
21
22use crate::tools::{CrpMode, LeanCtxServer};
23
24impl ServerHandler for LeanCtxServer {
25 fn get_info(&self) -> ServerInfo {
26 let capabilities = ServerCapabilities::builder()
27 .enable_tools()
28 .enable_resources()
29 .enable_resources_subscribe()
30 .enable_prompts()
31 .build();
32
33 let config = crate::core::config::Config::load();
34 let level = crate::core::config::CompressionLevel::effective(&config);
35 let _ = crate::core::terse::rules_inject::inject(&level);
36
37 let instructions = crate::instructions::build_instructions(CrpMode::effective());
38
39 InitializeResult::new(capabilities)
40 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
41 .with_instructions(instructions)
42 }
43
44 async fn initialize(
45 &self,
46 request: InitializeRequestParams,
47 _context: RequestContext<RoleServer>,
48 ) -> Result<InitializeResult, ErrorData> {
49 let name = request.client_info.name.clone();
50 tracing::info!("MCP client connected: {:?}", name);
51 *self.client_name.write().await = name.clone();
52
53 if self.session_mode != crate::tools::SessionMode::Shared {
54 crate::core::budget_tracker::BudgetTracker::global().reset();
55 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
56 let radar = data_dir.join("context_radar.jsonl");
57 if radar.exists() {
58 let prev = data_dir.join("context_radar.prev.jsonl");
59 let _ = std::fs::rename(&radar, &prev);
60 }
61 }
62 }
63
64 let derived_root = derive_project_root_from_cwd();
65 let cwd_str = std::env::current_dir()
66 .ok()
67 .map(|p| p.to_string_lossy().to_string())
68 .unwrap_or_default();
69 {
70 let mut session = self.session.write().await;
71 if !cwd_str.is_empty() {
72 session.shell_cwd = Some(cwd_str.clone());
73 }
74 if let Some(ref root) = derived_root {
75 session.project_root = Some(root.clone());
76 tracing::info!("Project root set to: {root}");
77 } else if let Some(ref root) = session.project_root {
78 let root_path = std::path::Path::new(root);
79 let root_has_marker = has_project_marker(root_path);
80 let root_str = root_path.to_string_lossy();
81 let root_suspicious = root_str.contains("/.claude")
82 || root_str.contains("/.codex")
83 || root_str.contains("/var/folders/")
84 || root_str.contains("/tmp/")
85 || root_str.contains("\\.claude")
86 || root_str.contains("\\.codex")
87 || root_str.contains("\\AppData\\Local\\Temp")
88 || root_str.contains("\\Temp\\");
89 if root_suspicious && !root_has_marker {
90 session.project_root = None;
91 }
92 }
93 if self.session_mode == crate::tools::SessionMode::Shared {
94 if let Some(ref root) = session.project_root {
95 if let Some(ref rt) = self.context_os {
96 rt.shared_sessions.persist_best_effort(
97 root,
98 &self.workspace_id,
99 &self.channel_id,
100 &session,
101 );
102 rt.metrics.record_session_persisted();
103 }
104 }
105 } else {
106 let _ = session.save();
107 }
108 }
109
110 let agent_name = name.clone();
111 let agent_root = derived_root.clone().unwrap_or_default();
112 let agent_id_handle = self.agent_id.clone();
113 tokio::task::spawn_blocking(move || {
114 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
115 return;
116 }
117
118 let maintenance = crate::core::startup_guard::try_acquire_lock(
122 "startup-maintenance",
123 std::time::Duration::from_secs(2),
124 std::time::Duration::from_mins(2),
125 );
126 if maintenance.is_some() {
127 if let Some(home) = dirs::home_dir() {
128 let _ = crate::rules_inject::inject_all_rules(&home);
129 }
130 crate::hooks::refresh_installed_hooks();
131 crate::core::version_check::check_background();
132 }
133 drop(maintenance);
134
135 if !agent_root.is_empty() {
136 let heuristic_role = match agent_name.to_lowercase().as_str() {
137 n if n.contains("cursor") => Some("coder"),
138 n if n.contains("claude") => Some("coder"),
139 n if n.contains("codex") => Some("coder"),
140 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
141 n if n.contains("review") => Some("reviewer"),
142 n if n.contains("test") => Some("debugger"),
143 _ => None,
144 };
145 let env_role = std::env::var("LEAN_CTX_ROLE")
146 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
147 .ok();
148 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
149
150 let _ = crate::core::roles::set_active_role(effective_role);
151
152 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
153 registry.cleanup_stale(24);
154 let id = registry.register("mcp", Some(effective_role), &agent_root);
155 let _ = registry.save();
156 if let Ok(mut guard) = agent_id_handle.try_write() {
157 *guard = Some(id);
158 }
159 }
160 });
161
162 let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
163 tracing::info!("Client capabilities: {}", client_caps.format_summary());
164
165 if client_caps.dynamic_tools {
166 if let Ok(mut dt) = dynamic_tools::global().lock() {
167 dt.set_supports_list_changed(true);
168 }
169 }
170 if let Some(max) = client_caps.max_tools {
171 if let Ok(mut dt) = dynamic_tools::global().lock() {
172 dt.set_supports_list_changed(true);
173 if max < 100 {
174 dt.unload_category(dynamic_tools::ToolCategory::Debug);
175 dt.unload_category(dynamic_tools::ToolCategory::Memory);
176 }
177 }
178 }
179
180 crate::core::client_capabilities::set_detected(client_caps.clone());
181
182 let instructions =
183 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
184
185 let capabilities = match (client_caps.resources, client_caps.prompts) {
186 (true, true) => ServerCapabilities::builder()
187 .enable_tools()
188 .enable_resources()
189 .enable_resources_subscribe()
190 .enable_prompts()
191 .build(),
192 (true, false) => ServerCapabilities::builder()
193 .enable_tools()
194 .enable_resources()
195 .enable_resources_subscribe()
196 .build(),
197 (false, true) => ServerCapabilities::builder()
198 .enable_tools()
199 .enable_prompts()
200 .build(),
201 (false, false) => ServerCapabilities::builder().enable_tools().build(),
202 };
203
204 Ok(InitializeResult::new(capabilities)
205 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
206 .with_instructions(instructions))
207 }
208
209 async fn list_tools(
210 &self,
211 _request: Option<PaginatedRequestParams>,
212 _context: RequestContext<RoleServer>,
213 ) -> Result<ListToolsResult, ErrorData> {
214 let all_tools = if crate::tool_defs::is_full_mode() {
215 crate::tool_defs::granular_tool_defs()
216 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
217 crate::tool_defs::unified_tool_defs()
218 } else {
219 crate::tool_defs::lazy_tool_defs()
220 };
221
222 let disabled = crate::core::config::Config::load().disabled_tools_effective();
223 let tools = if disabled.is_empty() {
224 all_tools
225 } else {
226 all_tools
227 .into_iter()
228 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
229 .collect()
230 };
231
232 let tools = {
233 let dyn_state = dynamic_tools::global().lock().unwrap();
234 if dyn_state.supports_list_changed() {
235 tools
236 .into_iter()
237 .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
238 .collect()
239 } else {
240 tools
241 }
242 };
243
244 let tools = {
245 let active = self.workflow.read().await.clone();
246 if let Some(run) = active {
247 if let Some(state) = run.spec.state(&run.current) {
248 if let Some(allowed) = &state.allowed_tools {
249 let mut allow: std::collections::HashSet<&str> =
250 allowed.iter().map(std::string::String::as_str).collect();
251 allow.insert("ctx");
252 allow.insert("ctx_workflow");
253 return Ok(ListToolsResult {
254 tools: tools
255 .into_iter()
256 .filter(|t| allow.contains(t.name.as_ref()))
257 .collect(),
258 ..Default::default()
259 });
260 }
261 }
262 }
263 tools
264 };
265
266 let tools = {
267 let level = crate::core::config::Config::load().compression_level;
268 let mode =
269 crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
270 if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
271 tools
272 } else {
273 tools
274 .into_iter()
275 .map(|mut t| {
276 let compressed = crate::core::terse::mcp_compress::compress_description(
277 t.name.as_ref(),
278 t.description.as_deref().unwrap_or(""),
279 mode,
280 );
281 t.description = Some(compressed.into());
282 t
283 })
284 .collect()
285 }
286 };
287
288 Ok(ListToolsResult {
289 tools,
290 ..Default::default()
291 })
292 }
293
294 async fn list_prompts(
295 &self,
296 _request: Option<PaginatedRequestParams>,
297 _context: RequestContext<RoleServer>,
298 ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
299 Ok(rmcp::model::ListPromptsResult::with_all_items(
300 prompts::list_prompts(),
301 ))
302 }
303
304 async fn get_prompt(
305 &self,
306 request: rmcp::model::GetPromptRequestParams,
307 _context: RequestContext<RoleServer>,
308 ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
309 let ledger = self.ledger.read().await;
310 match prompts::get_prompt(&request, &ledger) {
311 Some(result) => Ok(result),
312 None => Err(ErrorData::invalid_params(
313 format!("Unknown prompt: {}", request.name),
314 None,
315 )),
316 }
317 }
318
319 async fn list_resources(
320 &self,
321 _request: Option<PaginatedRequestParams>,
322 _context: RequestContext<RoleServer>,
323 ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
324 Ok(rmcp::model::ListResourcesResult::with_all_items(
325 resources::list_resources(),
326 ))
327 }
328
329 async fn read_resource(
330 &self,
331 request: rmcp::model::ReadResourceRequestParams,
332 _context: RequestContext<RoleServer>,
333 ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
334 let ledger = self.ledger.read().await;
335 match resources::read_resource(&request.uri, &ledger) {
336 Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
337 None => Err(rmcp::ErrorData::resource_not_found(
338 format!("Unknown resource: {}", request.uri),
339 None,
340 )),
341 }
342 }
343
344 async fn call_tool(
345 &self,
346 request: CallToolRequestParams,
347 _context: RequestContext<RoleServer>,
348 ) -> Result<CallToolResult, ErrorData> {
349 self.check_idle_expiry().await;
350 elicitation::increment_call();
351
352 let original_name = request.name.as_ref().to_string();
353 let (resolved_name, resolved_args) = if original_name == "ctx" {
354 let sub = request
355 .arguments
356 .as_ref()
357 .and_then(|a| a.get("tool"))
358 .and_then(|v| v.as_str())
359 .map(std::string::ToString::to_string)
360 .ok_or_else(|| {
361 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
362 })?;
363 let tool_name = if sub.starts_with("ctx_") {
364 sub
365 } else {
366 format!("ctx_{sub}")
367 };
368 let mut args = request.arguments.unwrap_or_default();
369 args.remove("tool");
370 (tool_name, Some(args))
371 } else {
372 (original_name, request.arguments)
373 };
374 let name = resolved_name.as_str();
375 let args = resolved_args.as_ref();
376
377 let role_check = role_guard::check_tool_access(name);
378 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
379 tracing::warn!(
380 tool = name,
381 role = %role_check.role_name,
382 "Tool blocked by role policy"
383 );
384 return Ok(denied);
385 }
386
387 if name != "ctx_workflow" {
388 let active = self.workflow.read().await.clone();
389 if let Some(run) = active {
390 if let Some(state) = run.spec.state(&run.current) {
391 if let Some(allowed) = &state.allowed_tools {
392 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
393 if !allowed_ok {
394 let mut shown = allowed.clone();
395 shown.sort();
396 shown.truncate(30);
397 return Ok(CallToolResult::success(vec![Content::text(format!(
398 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
399 run.spec.name,
400 run.current,
401 shown.len(),
402 shown.join(", ")
403 ))]));
404 }
405 }
406 }
407 }
408 }
409
410 let auto_context = {
411 let task = {
412 let session = self.session.read().await;
413 session.task.as_ref().map(|t| t.description.clone())
414 };
415 let project_root = {
416 let session = self.session.read().await;
417 session.project_root.clone()
418 };
419 let mut cache = self.cache.write().await;
420 crate::tools::autonomy::session_lifecycle_pre_hook(
421 &self.autonomy,
422 name,
423 &mut cache,
424 task.as_deref(),
425 project_root.as_deref(),
426 CrpMode::effective(),
427 )
428 };
429
430 let throttle_result = {
431 let fp = args
432 .map(|a| {
433 crate::core::loop_detection::LoopDetector::fingerprint(
434 &serde_json::Value::Object(a.clone()),
435 )
436 })
437 .unwrap_or_default();
438 let mut detector = self.loop_detector.write().await;
439
440 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
441 let is_search_shell = name == "ctx_shell" && {
442 let cmd = args
443 .as_ref()
444 .and_then(|a| a.get("command"))
445 .and_then(|v| v.as_str())
446 .unwrap_or("");
447 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
448 };
449
450 if is_search || is_search_shell {
451 let search_pattern = args.and_then(|a| {
452 a.get("pattern")
453 .or_else(|| a.get("query"))
454 .and_then(|v| v.as_str())
455 });
456 let shell_pattern = if is_search_shell {
457 args.and_then(|a| a.get("command"))
458 .and_then(|v| v.as_str())
459 .and_then(helpers::extract_search_pattern_from_command)
460 } else {
461 None
462 };
463 let pat = search_pattern.or(shell_pattern.as_deref());
464 detector.record_search(name, &fp, pat)
465 } else {
466 detector.record_call(name, &fp)
467 }
468 };
469
470 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
471 let msg = throttle_result.message.unwrap_or_default();
472 return Ok(CallToolResult::success(vec![Content::text(msg)]));
473 }
474
475 let throttle_warning =
476 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
477 throttle_result.message.clone()
478 } else {
479 None
480 };
481
482 let config = crate::core::config::Config::load();
483 let minimal = config.minimal_overhead_effective();
484
485 {
486 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
487 let snap = BudgetTracker::global().check();
488 if *snap.worst_level() == BudgetLevel::Exhausted
489 && name != "ctx_session"
490 && name != "ctx_cost"
491 && name != "ctx_metrics"
492 {
493 for (dim, lvl, used, limit) in [
494 (
495 "tokens",
496 &snap.tokens.level,
497 format!("{}", snap.tokens.used),
498 format!("{}", snap.tokens.limit),
499 ),
500 (
501 "shell",
502 &snap.shell.level,
503 format!("{}", snap.shell.used),
504 format!("{}", snap.shell.limit),
505 ),
506 (
507 "cost",
508 &snap.cost.level,
509 format!("${:.2}", snap.cost.used_usd),
510 format!("${:.2}", snap.cost.limit_usd),
511 ),
512 ] {
513 if *lvl == BudgetLevel::Exhausted {
514 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
515 }
516 }
517 let msg = format!(
518 "[BUDGET EXHAUSTED] {}\n\
519 Use `ctx_session action=role` to check/switch roles, \
520 or `ctx_session action=reset` to start fresh.",
521 snap.format_compact()
522 );
523 tracing::warn!(tool = name, "{msg}");
524 return Ok(CallToolResult::success(vec![Content::text(msg)]));
525 }
526 }
527
528 if is_shell_tool_name(name) {
529 crate::core::budget_tracker::BudgetTracker::global().record_shell();
530 }
531
532 let tool_start = std::time::Instant::now();
533 let mut result_text = {
534 use futures::FutureExt;
535 use std::panic::AssertUnwindSafe;
536 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
537 .catch_unwind()
538 .await
539 {
540 Ok(Ok(text)) => text,
541 Ok(Err(e)) => return Err(e),
542 Err(panic_payload) => {
543 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
544 (*s).to_string()
545 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
546 s.clone()
547 } else {
548 "unknown".to_string()
549 };
550 tracing::error!(tool = name, "Tool panicked: {detail}");
551 format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
552 The MCP server is still running. Please retry or use a different approach.")
553 }
554 }
555 };
556
557 let is_raw_shell = name == "ctx_shell" && {
558 let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
559 let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
560 arg_raw
561 || arg_bypass
562 || std::env::var("LEAN_CTX_DISABLED").is_ok()
563 || std::env::var("LEAN_CTX_RAW").is_ok()
564 };
565
566 let pre_terse_len = result_text.len();
567 let output_tokens = {
568 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
569 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
570 tokens
571 };
572
573 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
574 crate::core::anomaly::save();
576
577 let budget_warning = {
578 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
579 let snap = BudgetTracker::global().check();
580 if *snap.worst_level() == BudgetLevel::Warning {
581 for (dim, lvl, used, limit, pct) in [
582 (
583 "tokens",
584 &snap.tokens.level,
585 format!("{}", snap.tokens.used),
586 format!("{}", snap.tokens.limit),
587 snap.tokens.percent,
588 ),
589 (
590 "shell",
591 &snap.shell.level,
592 format!("{}", snap.shell.used),
593 format!("{}", snap.shell.limit),
594 snap.shell.percent,
595 ),
596 (
597 "cost",
598 &snap.cost.level,
599 format!("${:.2}", snap.cost.used_usd),
600 format!("${:.2}", snap.cost.limit_usd),
601 snap.cost.percent,
602 ),
603 ] {
604 if *lvl == BudgetLevel::Warning {
605 crate::core::events::emit_budget_warning(
606 &snap.role, dim, &used, &limit, pct,
607 );
608 }
609 }
610 if crate::core::protocol::meta_visible() {
611 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
612 } else {
613 None
614 }
615 } else {
616 None
617 }
618 };
619
620 let archive_hint = if minimal || is_raw_shell {
621 None
622 } else {
623 use crate::core::archive;
624 let archivable = matches!(
625 name,
626 "ctx_shell"
627 | "ctx_read"
628 | "ctx_multi_read"
629 | "ctx_smart_read"
630 | "ctx_execute"
631 | "ctx_search"
632 | "ctx_tree"
633 );
634 if archivable && archive::should_archive(&result_text) {
635 let cmd = helpers::get_str(args, "command")
636 .or_else(|| helpers::get_str(args, "path"))
637 .unwrap_or_default();
638 let session_id = self.session.read().await.id.clone();
639 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
640 let tokens = crate::core::tokens::count_tokens(&to_store);
641 archive::store(name, &cmd, &to_store, Some(&session_id))
642 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
643 } else {
644 None
645 }
646 };
647
648 let pre_compression = result_text.clone();
649 let skip_terse = is_raw_shell
650 || (name == "ctx_shell"
651 && helpers::get_str(args, "command")
652 .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
653 let compression = crate::core::config::CompressionLevel::effective(&config);
654 if compression.is_active() && !skip_terse {
655 let terse_result =
656 crate::core::terse::pipeline::compress(&result_text, &compression, None);
657 if terse_result.quality_passed && terse_result.savings_pct >= 1.0 {
658 result_text = terse_result.output;
659 }
660 }
661
662 if !is_raw_shell {
663 let verify_cfg = crate::core::profiles::active_profile().verification;
664 let vr = crate::core::output_verification::verify_output(
665 &pre_compression,
666 &result_text,
667 &verify_cfg,
668 );
669 if !vr.warnings.is_empty() {
670 let msg = format!("[VERIFY] {}", vr.format_compact());
671 result_text = format!("{result_text}\n\n{msg}");
672 }
673 }
674
675 if let Some(hint) = archive_hint {
676 result_text = format!("{result_text}\n{hint}");
677 }
678
679 if !is_raw_shell {
680 if let Some(ctx) = auto_context {
681 if crate::core::protocol::meta_visible() {
682 result_text = format!("{ctx}\n\n{result_text}");
683 }
684 }
685 }
686
687 if let Some(warning) = throttle_warning {
688 result_text = format!("{result_text}\n\n{warning}");
689 }
690
691 if let Some(bw) = budget_warning {
692 result_text = format!("{result_text}\n\n{bw}");
693 }
694
695 if !self
696 .rules_stale_checked
697 .swap(true, std::sync::atomic::Ordering::Relaxed)
698 {
699 let client = self.client_name.read().await.clone();
700 if !client.is_empty() {
701 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
702 result_text = format!("{result_text}\n\n{stale_msg}");
703 }
704 }
705 }
706
707 {
708 let _ = crate::core::slo::evaluate();
710 }
711
712 if name == "ctx_read" {
713 if minimal {
714 let mut cache = self.cache.write().await;
715 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
716 } else {
717 let read_path = self
718 .resolve_path_or_passthrough(
719 &helpers::get_str(args, "path").unwrap_or_default(),
720 )
721 .await;
722 let project_root = {
723 let session = self.session.read().await;
724 session.project_root.clone()
725 };
726 let mut cache = self.cache.write().await;
727 let enrich = crate::tools::autonomy::enrich_after_read(
728 &self.autonomy,
729 &mut cache,
730 &read_path,
731 project_root.as_deref(),
732 None,
733 crate::tools::CrpMode::effective(),
734 false,
735 );
736 if let Some(hint) = enrich.related_hint {
737 result_text = format!("{result_text}\n{hint}");
738 }
739 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
740
741 {
742 let mut ledger = self.ledger.write().await;
743 let overlay = crate::core::context_overlay::OverlayStore::load_project(
744 &std::path::PathBuf::from(project_root.as_deref().unwrap_or(".")),
745 );
746 let mode_used =
747 helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
748 let gate_result = context_gate::post_dispatch_record(
749 &read_path,
750 &mode_used,
751 pre_terse_len,
752 output_tokens as usize,
753 &mut ledger,
754 &overlay,
755 );
756 if let Some(hint) = gate_result.eviction_hint {
757 result_text = format!("{result_text}\n{hint}");
758 }
759 if let Some(hint) = gate_result.elicitation_hint {
760 result_text = format!("{result_text}\n{hint}");
761 }
762 }
763 }
764 }
765
766 if !minimal && !is_raw_shell && name == "ctx_shell" {
767 let cmd = helpers::get_str(args, "command").unwrap_or_default();
768
769 if let Some(file_path) = extract_file_read_from_shell(&cmd) {
770 if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
771 bt.next_seq();
772 bt.record_shell_file_access(&file_path);
773 }
774 }
775
776 let calls = self.tool_calls.read().await;
777 let last_original = calls.last().map_or(0, |c| c.original_tokens);
778 drop(calls);
779 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
780 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
781 &self.autonomy,
782 &cmd,
783 last_original,
784 pre_hint_tokens,
785 ) {
786 result_text = format!("{result_text}\n{hint}");
787 }
788 }
789
790 #[allow(clippy::cast_possible_truncation)]
791 let output_token_count = if result_text.len() == pre_terse_len {
792 output_tokens as usize
793 } else {
794 crate::core::tokens::count_tokens(&result_text)
795 };
796 let action = helpers::get_str(args, "action");
797
798 const K_STALENESS_BOUND: i64 = 10;
800 if self.session_mode == crate::tools::SessionMode::Shared {
801 if let Some(ref rt) = self.context_os {
802 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
803 let cursor = self
804 .last_seen_event_id
805 .load(std::sync::atomic::Ordering::Relaxed);
806 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
807 let gap = latest - cursor;
808 result_text = format!(
809 "[CONTEXT STALE] {gap} events happened since your last read. \
810 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
811 );
812 }
813 self.last_seen_event_id
814 .store(latest, std::sync::atomic::Ordering::Relaxed);
815 }
816 }
817
818 {
819 let input = helpers::canonical_args_string(args);
820 let input_md5 = helpers::hash_fast(&input);
821 let output_md5 = helpers::hash_fast(&result_text);
822 let agent_id = self.agent_id.read().await.clone();
823 let client_name = self.client_name.read().await.clone();
824 let mut explicit_intent: Option<(
825 crate::core::intent_protocol::IntentRecord,
826 Option<String>,
827 String,
828 )> = None;
829
830 let pending_session_save = {
831 let empty_args = serde_json::Map::new();
832 let args_map = args.unwrap_or(&empty_args);
833 let mut session = self.session.write().await;
834 session.record_tool_receipt(
835 name,
836 action.as_deref(),
837 &input_md5,
838 &output_md5,
839 agent_id.as_deref(),
840 Some(&client_name),
841 );
842
843 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
844 name,
845 action.as_deref(),
846 args_map,
847 session.project_root.as_deref(),
848 ) {
849 let is_explicit =
850 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
851 let root = session.project_root.clone();
852 let sid = session.id.clone();
853 session.record_intent(intent.clone());
854 if is_explicit {
855 explicit_intent = Some((intent, root, sid));
856 }
857 }
858 if session.should_save() {
859 session.prepare_save().ok()
860 } else {
861 None
862 }
863 };
864
865 if let Some(prepared) = pending_session_save {
866 tokio::task::spawn_blocking(move || {
867 let _ = prepared.write_to_disk();
868 });
869 }
870
871 if let Some((intent, root, session_id)) = explicit_intent {
872 let _ = crate::core::intent_protocol::apply_side_effects(
873 &intent,
874 root.as_deref(),
875 &session_id,
876 );
877 }
878
879 if self.autonomy.is_enabled() {
880 let (calls, project_root) = {
881 let session = self.session.read().await;
882 (session.stats.total_tool_calls, session.project_root.clone())
883 };
884
885 if let Some(root) = project_root {
886 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
887 let root_clone = root.clone();
888 tokio::task::spawn_blocking(move || {
889 let _ = crate::core::consolidation_engine::consolidate_latest(
890 &root_clone,
891 crate::core::consolidation_engine::ConsolidationBudgets::default(),
892 );
893 });
894 }
895 }
896 }
897
898 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
899 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
900 let output_token_count_u64 = output_token_count as u64;
901 let name_owned = name.to_string();
902 tokio::task::spawn_blocking(move || {
903 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
904 let quote = pricing.quote_from_env_or_agent_type(&client_name);
905 let cost_usd =
906 quote
907 .cost
908 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
909 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
910
911 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
912 store.record_tool_call(
913 &agent_key,
914 &client_name,
915 &name_owned,
916 input_token_count,
917 output_token_count_u64,
918 0,
919 );
920 let _ = store.save();
921 });
922 }
923
924 if self.session_mode == crate::tools::SessionMode::Shared
926 && name == "ctx_knowledge"
927 && action.as_deref() == Some("remember")
928 {
929 if let Some(ref rt) = self.context_os {
930 let my_agent = self.agent_id.read().await.clone();
931 let category = helpers::get_str(args, "category");
932 let key = helpers::get_str(args, "key");
933 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
934 let recent = rt.bus.recent_by_kind(
935 &self.workspace_id,
936 &self.channel_id,
937 "knowledge_remembered",
938 20,
939 );
940 for ev in &recent {
941 let p = &ev.payload;
942 let ev_cat = p.get("category").and_then(|v| v.as_str());
943 let ev_key = p.get("key").and_then(|v| v.as_str());
944 let ev_actor = ev.actor.as_deref();
945 if ev_cat == Some(cat.as_str())
946 && ev_key == Some(k.as_str())
947 && ev_actor != my_agent.as_deref()
948 {
949 let other = ev_actor.unwrap_or("unknown");
950 result_text = format!(
951 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
952 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
953 );
954 break;
955 }
956 }
957 }
958 }
959 }
960
961 if self.session_mode == crate::tools::SessionMode::Shared {
963 let ws = self.workspace_id.clone();
964 let ch = self.channel_id.clone();
965 let rt = self.context_os.clone();
966 let agent = self.agent_id.read().await.clone();
967 let tool = name.to_string();
968 let tool_action = action.clone();
969 let tool_path = helpers::get_str(args, "path");
970 let tool_category = helpers::get_str(args, "category");
971 let tool_key = helpers::get_str(args, "key");
972 let session_snapshot = self.session.read().await.clone();
973 let session_task = session_snapshot.task.clone();
974 tokio::task::spawn_blocking(move || {
975 let Some(rt) = rt else {
976 return;
977 };
978 let Some(root) = session_snapshot.project_root.as_deref() else {
979 return;
980 };
981 rt.shared_sessions
982 .persist_best_effort(root, &ws, &ch, &session_snapshot);
983 rt.metrics.record_session_persisted();
984
985 let mut base_payload = serde_json::json!({
986 "tool": tool,
987 "action": tool_action,
988 });
989 if let Some(ref p) = tool_path {
990 base_payload["path"] = serde_json::Value::String(p.clone());
991 }
992 if let Some(ref c) = tool_category {
993 base_payload["category"] = serde_json::Value::String(c.clone());
994 }
995 if let Some(ref k) = tool_key {
996 base_payload["key"] = serde_json::Value::String(k.clone());
997 }
998 if let Some(ref t) = session_task {
999 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1000 }
1001
1002 if rt
1003 .bus
1004 .append(
1005 &ws,
1006 &ch,
1007 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1008 agent.as_deref(),
1009 base_payload.clone(),
1010 )
1011 .is_some()
1012 {
1013 rt.metrics.record_event_appended();
1014 rt.metrics.record_event_broadcast();
1015 }
1016
1017 if let Some(secondary) =
1018 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1019 {
1020 if rt
1021 .bus
1022 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1023 .is_some()
1024 {
1025 rt.metrics.record_event_appended();
1026 rt.metrics.record_event_broadcast();
1027 }
1028 }
1029 });
1030 }
1031
1032 let skip_checkpoint = minimal
1033 || matches!(
1034 name,
1035 "ctx_compress"
1036 | "ctx_metrics"
1037 | "ctx_benchmark"
1038 | "ctx_analyze"
1039 | "ctx_cache"
1040 | "ctx_discover"
1041 | "ctx_dedup"
1042 | "ctx_session"
1043 | "ctx_knowledge"
1044 | "ctx_agent"
1045 | "ctx_share"
1046 | "ctx_wrapped"
1047 | "ctx_overview"
1048 | "ctx_preload"
1049 | "ctx_cost"
1050 | "ctx_gain"
1051 | "ctx_heatmap"
1052 | "ctx_task"
1053 | "ctx_impact"
1054 | "ctx_architecture"
1055 | "ctx_smells"
1056 | "ctx_workflow"
1057 );
1058
1059 if !skip_checkpoint && self.increment_and_check() {
1060 if let Some(checkpoint) = self.auto_checkpoint().await {
1061 let interval = LeanCtxServer::checkpoint_interval_effective();
1062 if crate::core::protocol::meta_visible() {
1063 let combined = format!(
1064 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1065 );
1066 return Ok(CallToolResult::success(vec![Content::text(combined)]));
1067 }
1068 }
1069 }
1070
1071 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1072 if tool_duration_ms > 100 {
1073 LeanCtxServer::append_tool_call_log(
1074 name,
1075 tool_duration_ms,
1076 0,
1077 0,
1078 None,
1079 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1080 );
1081 }
1082
1083 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1084 if current_count > 0 && current_count.is_multiple_of(100) {
1085 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1086 }
1087
1088 Ok(CallToolResult::success(vec![Content::text(result_text)]))
1089 }
1090}
1091
1092pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1093 crate::instructions::build_instructions_for_test(crp_mode)
1094}
1095
1096pub fn build_claude_code_instructions_for_test() -> String {
1097 crate::instructions::claude_code_instructions()
1098}
1099
1100const PROJECT_MARKERS: &[&str] = &[
1101 ".git",
1102 "Cargo.toml",
1103 "package.json",
1104 "go.mod",
1105 "pyproject.toml",
1106 "setup.py",
1107 "pom.xml",
1108 "build.gradle",
1109 "Makefile",
1110 ".lean-ctx.toml",
1111];
1112
1113fn has_project_marker(dir: &std::path::Path) -> bool {
1114 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1115}
1116
1117fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1118 if let Some(home) = dirs::home_dir() {
1119 if dir == home {
1120 return true;
1121 }
1122 }
1123 let dir_str = dir.to_string_lossy();
1124 dir_str.ends_with("/.claude")
1125 || dir_str.ends_with("/.codex")
1126 || dir_str.contains("/.claude/")
1127 || dir_str.contains("/.codex/")
1128}
1129
1130fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1131 std::process::Command::new("git")
1132 .args(["rev-parse", "--show-toplevel"])
1133 .current_dir(dir)
1134 .stdout(std::process::Stdio::piped())
1135 .stderr(std::process::Stdio::null())
1136 .output()
1137 .ok()
1138 .and_then(|o| {
1139 if o.status.success() {
1140 String::from_utf8(o.stdout)
1141 .ok()
1142 .map(|s| s.trim().to_string())
1143 } else {
1144 None
1145 }
1146 })
1147}
1148
1149pub fn derive_project_root_from_cwd() -> Option<String> {
1150 let cwd = std::env::current_dir().ok()?;
1151 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1152
1153 if is_home_or_agent_dir(&canonical) {
1154 return git_toplevel_from(&canonical);
1155 }
1156
1157 if has_project_marker(&canonical) {
1158 return Some(canonical.to_string_lossy().to_string());
1159 }
1160
1161 if let Some(git_root) = git_toplevel_from(&canonical) {
1162 return Some(git_root);
1163 }
1164
1165 if let Some(root) = detect_multi_root_workspace(&canonical) {
1166 return Some(root);
1167 }
1168
1169 None
1170}
1171
1172fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1176 let entries = std::fs::read_dir(dir).ok()?;
1177 let mut child_projects: Vec<String> = Vec::new();
1178
1179 for entry in entries.flatten() {
1180 let path = entry.path();
1181 if path.is_dir() && has_project_marker(&path) {
1182 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1183 child_projects.push(canonical.to_string_lossy().to_string());
1184 }
1185 }
1186
1187 if child_projects.len() >= 2 {
1188 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1189 let sep = if cfg!(windows) { ";" } else { ":" };
1190 let merged = if existing.is_empty() {
1191 child_projects.join(sep)
1192 } else {
1193 format!("{existing}{sep}{}", child_projects.join(sep))
1194 };
1195 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1196 tracing::info!(
1197 "Multi-root workspace detected at {}: auto-allowing {} child projects",
1198 dir.display(),
1199 child_projects.len()
1200 );
1201 return Some(dir.to_string_lossy().to_string());
1202 }
1203
1204 None
1205}
1206
1207pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1208 crate::tool_defs::list_all_tool_defs()
1209 .into_iter()
1210 .map(|(name, desc, _)| (name, desc))
1211 .collect()
1212}
1213
1214pub fn tool_schemas_json_for_test() -> String {
1215 crate::tool_defs::list_all_tool_defs()
1216 .iter()
1217 .map(|(name, _, schema)| format!("{name}: {schema}"))
1218 .collect::<Vec<_>>()
1219 .join("\n")
1220}
1221
1222fn is_shell_tool_name(name: &str) -> bool {
1223 matches!(name, "ctx_shell" | "ctx_execute")
1224}
1225
1226fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1227 let trimmed = cmd.trim();
1228 let parts: Vec<&str> = trimmed.split_whitespace().collect();
1229 if parts.len() < 2 {
1230 return None;
1231 }
1232 let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1233 match bin {
1234 "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1235 let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1236 Some(file_arg.to_string())
1237 }
1238 _ => None,
1239 }
1240}
1241
1242#[cfg(test)]
1243mod tests {
1244 use super::*;
1245
1246 #[test]
1247 fn project_markers_detected() {
1248 let tmp = tempfile::tempdir().unwrap();
1249 let root = tmp.path().join("myproject");
1250 std::fs::create_dir_all(&root).unwrap();
1251 assert!(!has_project_marker(&root));
1252
1253 std::fs::create_dir(root.join(".git")).unwrap();
1254 assert!(has_project_marker(&root));
1255 }
1256
1257 #[test]
1258 fn home_dir_detected_as_agent_dir() {
1259 if let Some(home) = dirs::home_dir() {
1260 assert!(is_home_or_agent_dir(&home));
1261 }
1262 }
1263
1264 #[test]
1265 fn agent_dirs_detected() {
1266 let claude = std::path::PathBuf::from("/home/user/.claude");
1267 assert!(is_home_or_agent_dir(&claude));
1268 let codex = std::path::PathBuf::from("/home/user/.codex");
1269 assert!(is_home_or_agent_dir(&codex));
1270 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1271 assert!(!is_home_or_agent_dir(&project));
1272 }
1273
1274 #[test]
1275 fn test_unified_tool_count() {
1276 let tools = crate::tool_defs::unified_tool_defs();
1277 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1278 }
1279
1280 #[test]
1281 fn test_granular_tool_count() {
1282 let tools = crate::tool_defs::granular_tool_defs();
1283 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1284 }
1285
1286 #[test]
1287 fn disabled_tools_filters_list() {
1288 let all = crate::tool_defs::granular_tool_defs();
1289 let total = all.len();
1290 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1291 let filtered: Vec<_> = all
1292 .into_iter()
1293 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1294 .collect();
1295 assert_eq!(filtered.len(), total - 2);
1296 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1297 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1298 }
1299
1300 #[test]
1301 fn empty_disabled_tools_returns_all() {
1302 let all = crate::tool_defs::granular_tool_defs();
1303 let total = all.len();
1304 let disabled: Vec<String> = vec![];
1305 let filtered: Vec<_> = all
1306 .into_iter()
1307 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1308 .collect();
1309 assert_eq!(filtered.len(), total);
1310 }
1311
1312 #[test]
1313 fn misspelled_disabled_tool_is_silently_ignored() {
1314 let all = crate::tool_defs::granular_tool_defs();
1315 let total = all.len();
1316 let disabled = ["ctx_nonexistent_tool".to_string()];
1317 let filtered: Vec<_> = all
1318 .into_iter()
1319 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1320 .collect();
1321 assert_eq!(filtered.len(), total);
1322 }
1323
1324 #[test]
1325 fn detect_multi_root_workspace_with_child_projects() {
1326 let tmp = tempfile::tempdir().unwrap();
1327 let workspace = tmp.path().join("workspace");
1328 std::fs::create_dir_all(&workspace).unwrap();
1329
1330 let proj_a = workspace.join("project-a");
1331 let proj_b = workspace.join("project-b");
1332 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1333 std::fs::create_dir_all(&proj_b).unwrap();
1334 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1335
1336 let result = detect_multi_root_workspace(&workspace);
1337 assert!(
1338 result.is_some(),
1339 "should detect workspace with 2 child projects"
1340 );
1341
1342 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1343 }
1344
1345 #[test]
1346 fn detect_multi_root_workspace_returns_none_for_single_project() {
1347 let tmp = tempfile::tempdir().unwrap();
1348 let workspace = tmp.path().join("workspace");
1349 std::fs::create_dir_all(&workspace).unwrap();
1350
1351 let proj_a = workspace.join("project-a");
1352 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1353
1354 let result = detect_multi_root_workspace(&workspace);
1355 assert!(
1356 result.is_none(),
1357 "should not detect workspace with only 1 child project"
1358 );
1359 }
1360}