1pub mod bounded_lock;
2pub mod bypass_hint;
3pub mod compaction_sync;
4pub mod context_gate;
5mod dispatch;
6pub mod dynamic_tools;
7pub mod elicitation;
8pub(crate) mod execute;
9pub mod helpers;
10pub mod notifications;
11pub mod prompts;
12pub mod reference_store;
13pub mod registry;
14pub mod resources;
15pub mod role_guard;
16pub mod tool_trait;
17
18use rmcp::handler::server::ServerHandler;
19use rmcp::model::{
20 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
21 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
22};
23use rmcp::service::{RequestContext, RoleServer};
24use rmcp::ErrorData;
25
26use crate::tools::{CrpMode, LeanCtxServer};
27
28impl ServerHandler for LeanCtxServer {
29 fn get_info(&self) -> ServerInfo {
30 let capabilities = ServerCapabilities::builder()
31 .enable_tools()
32 .enable_resources()
33 .enable_resources_subscribe()
34 .enable_prompts()
35 .build();
36
37 let config = crate::core::config::Config::load();
38 let level = crate::core::config::CompressionLevel::effective(&config);
39 let _ = crate::core::terse::rules_inject::inject(&level);
40
41 let instructions = crate::instructions::build_instructions(CrpMode::effective());
42
43 InitializeResult::new(capabilities)
44 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
45 .with_instructions(instructions)
46 }
47
48 async fn initialize(
49 &self,
50 request: InitializeRequestParams,
51 context: RequestContext<RoleServer>,
52 ) -> Result<InitializeResult, ErrorData> {
53 let name = request.client_info.name.clone();
54 tracing::info!("MCP client connected: {:?}", name);
55 *self.client_name.write().await = name.clone();
56 *self.peer.write().await = Some(context.peer.clone());
57
58 if self.session_mode != crate::tools::SessionMode::Shared {
59 crate::core::budget_tracker::BudgetTracker::global().reset();
60 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
61 let radar = data_dir.join("context_radar.jsonl");
62 if radar.exists() {
63 let prev = data_dir.join("context_radar.prev.jsonl");
64 let _ = std::fs::rename(&radar, &prev);
65 }
66 }
67 }
68
69 let derived_root = derive_project_root_from_cwd();
70 let cwd_str = std::env::current_dir()
71 .ok()
72 .map(|p| p.to_string_lossy().to_string())
73 .unwrap_or_default();
74 {
75 let mut session = self.session.write().await;
76 if !cwd_str.is_empty() {
77 session.shell_cwd = Some(cwd_str.clone());
78 }
79 if let Some(ref root) = derived_root {
80 session.project_root = Some(root.clone());
81 tracing::info!("Project root set to: {root}");
82 } else if let Some(ref root) = session.project_root {
83 let root_path = std::path::Path::new(root);
84 let root_has_marker = has_project_marker(root_path);
85 let root_str = root_path.to_string_lossy();
86 let root_suspicious = root_str.contains("/.claude")
87 || root_str.contains("/.codex")
88 || root_str.contains("/var/folders/")
89 || root_str.contains("/tmp/")
90 || root_str.contains("\\.claude")
91 || root_str.contains("\\.codex")
92 || root_str.contains("\\AppData\\Local\\Temp")
93 || root_str.contains("\\Temp\\");
94 if root_suspicious && !root_has_marker {
95 session.project_root = None;
96 }
97 }
98 if self.session_mode == crate::tools::SessionMode::Shared {
99 if let Some(ref root) = session.project_root {
100 if let Some(ref rt) = self.context_os {
101 rt.shared_sessions.persist_best_effort(
102 root,
103 &self.workspace_id,
104 &self.channel_id,
105 &session,
106 );
107 rt.metrics.record_session_persisted();
108 }
109 }
110 } else {
111 let _ = session.save();
112 }
113 }
114
115 let agent_name = name.clone();
116 let agent_root = derived_root.clone().unwrap_or_default();
117 let agent_id_handle = self.agent_id.clone();
118 tokio::task::spawn_blocking(move || {
119 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
120 return;
121 }
122
123 let maintenance = crate::core::startup_guard::try_acquire_lock(
127 "startup-maintenance",
128 std::time::Duration::from_secs(2),
129 std::time::Duration::from_mins(2),
130 );
131 if maintenance.is_some() {
132 if let Some(home) = dirs::home_dir() {
133 let _ = crate::rules_inject::inject_all_rules(&home);
134 }
135 crate::hooks::refresh_installed_hooks();
136 crate::core::version_check::check_background();
137 }
138 drop(maintenance);
139
140 if !agent_root.is_empty() {
141 let heuristic_role = match agent_name.to_lowercase().as_str() {
142 n if n.contains("cursor") => Some("coder"),
143 n if n.contains("claude") => Some("coder"),
144 n if n.contains("codex") => Some("coder"),
145 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
146 n if n.contains("review") => Some("reviewer"),
147 n if n.contains("test") => Some("debugger"),
148 _ => None,
149 };
150 let env_role = std::env::var("LEAN_CTX_ROLE")
151 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
152 .ok();
153 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
154
155 let _ = crate::core::roles::set_active_role(effective_role);
156
157 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
158 registry.cleanup_stale(24);
159 let id = registry.register("mcp", Some(effective_role), &agent_root);
160 let _ = registry.save();
161 if let Ok(mut guard) = agent_id_handle.try_write() {
162 *guard = Some(id);
163 }
164 }
165 });
166
167 let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
168 tracing::info!("Client capabilities: {}", client_caps.format_summary());
169
170 if client_caps.dynamic_tools {
171 if let Ok(mut dt) = dynamic_tools::global().lock() {
172 dt.set_supports_list_changed(true);
173 }
174 }
175 if let Some(max) = client_caps.max_tools {
176 if let Ok(mut dt) = dynamic_tools::global().lock() {
177 dt.set_supports_list_changed(true);
178 if max < 100 {
179 dt.unload_category(dynamic_tools::ToolCategory::Debug);
180 dt.unload_category(dynamic_tools::ToolCategory::Memory);
181 }
182 }
183 }
184
185 crate::core::client_capabilities::set_detected(&client_caps);
186
187 let instructions =
188 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
189
190 let capabilities = match (client_caps.resources, client_caps.prompts) {
191 (true, true) => ServerCapabilities::builder()
192 .enable_tools()
193 .enable_resources()
194 .enable_resources_subscribe()
195 .enable_prompts()
196 .build(),
197 (true, false) => ServerCapabilities::builder()
198 .enable_tools()
199 .enable_resources()
200 .enable_resources_subscribe()
201 .build(),
202 (false, true) => ServerCapabilities::builder()
203 .enable_tools()
204 .enable_prompts()
205 .build(),
206 (false, false) => ServerCapabilities::builder().enable_tools().build(),
207 };
208
209 Ok(InitializeResult::new(capabilities)
210 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
211 .with_instructions(instructions))
212 }
213
214 async fn list_tools(
215 &self,
216 _request: Option<PaginatedRequestParams>,
217 _context: RequestContext<RoleServer>,
218 ) -> Result<ListToolsResult, ErrorData> {
219 let all_tools = if crate::tool_defs::is_full_mode() {
220 if let Some(ref reg) = self.registry {
221 reg.tool_defs()
222 } else {
223 crate::tool_defs::granular_tool_defs()
224 }
225 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
226 crate::tool_defs::unified_tool_defs()
227 } else if let Some(ref reg) = self.registry {
228 let core_names = crate::tool_defs::core_tool_names();
229 reg.tool_defs()
230 .into_iter()
231 .filter(|t| core_names.contains(&t.name.as_ref()))
232 .collect()
233 } else {
234 crate::tool_defs::lazy_tool_defs()
235 };
236
237 let disabled = crate::core::config::Config::load().disabled_tools_effective();
238 let client = self.client_name.read().await.clone();
239 let is_zed = !client.is_empty() && client.to_lowercase().contains("zed");
240
241 let tools: Vec<_> = all_tools
242 .into_iter()
243 .filter(|t| {
244 let name = t.name.as_ref();
245 if !disabled.is_empty() && disabled.iter().any(|d| d.as_str() == name) {
246 return false;
247 }
248 if is_zed && name == "ctx_edit" {
249 return false;
250 }
251 true
252 })
253 .collect();
254
255 let tools = {
256 let dyn_state = dynamic_tools::global().lock().unwrap();
257 if dyn_state.supports_list_changed() {
258 tools
259 .into_iter()
260 .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
261 .collect()
262 } else {
263 tools
264 }
265 };
266
267 let tools = {
268 let active = self.workflow.read().await.clone();
269 if let Some(run) = active {
270 if run.current == "done" || is_workflow_stale(&run) {
271 let mut wf = self.workflow.write().await;
272 *wf = None;
273 let _ = crate::core::workflow::clear_active();
274 } else if let Some(state) = run.spec.state(&run.current) {
275 if let Some(allowed) = &state.allowed_tools {
276 let mut allow: std::collections::HashSet<&str> =
277 allowed.iter().map(std::string::String::as_str).collect();
278 for passthrough in WORKFLOW_PASSTHROUGH_TOOLS {
279 allow.insert(passthrough);
280 }
281 return Ok(ListToolsResult {
282 tools: tools
283 .into_iter()
284 .filter(|t| allow.contains(t.name.as_ref()))
285 .collect(),
286 ..Default::default()
287 });
288 }
289 }
290 }
291 tools
292 };
293
294 let tools = {
295 let cfg = crate::core::config::Config::load();
296 let level = crate::core::config::CompressionLevel::effective(&cfg);
297 let mode =
298 crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
299 if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
300 tools
301 } else {
302 tools
303 .into_iter()
304 .map(|mut t| {
305 let compressed = crate::core::terse::mcp_compress::compress_description(
306 t.name.as_ref(),
307 t.description.as_deref().unwrap_or(""),
308 mode,
309 );
310 t.description = Some(compressed.into());
311 t
312 })
313 .collect()
314 }
315 };
316
317 Ok(ListToolsResult {
318 tools,
319 ..Default::default()
320 })
321 }
322
323 async fn list_prompts(
324 &self,
325 _request: Option<PaginatedRequestParams>,
326 _context: RequestContext<RoleServer>,
327 ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
328 Ok(rmcp::model::ListPromptsResult::with_all_items(
329 prompts::list_prompts(),
330 ))
331 }
332
333 async fn get_prompt(
334 &self,
335 request: rmcp::model::GetPromptRequestParams,
336 _context: RequestContext<RoleServer>,
337 ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
338 let ledger = self.ledger.read().await;
339 match prompts::get_prompt(&request, &ledger) {
340 Some(result) => Ok(result),
341 None => Err(ErrorData::invalid_params(
342 format!("Unknown prompt: {}", request.name),
343 None,
344 )),
345 }
346 }
347
348 async fn list_resources(
349 &self,
350 _request: Option<PaginatedRequestParams>,
351 _context: RequestContext<RoleServer>,
352 ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
353 Ok(rmcp::model::ListResourcesResult::with_all_items(
354 resources::list_resources(),
355 ))
356 }
357
358 async fn read_resource(
359 &self,
360 request: rmcp::model::ReadResourceRequestParams,
361 _context: RequestContext<RoleServer>,
362 ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
363 let ledger = self.ledger.read().await;
364 match resources::read_resource(&request.uri, &ledger) {
365 Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
366 None => Err(rmcp::ErrorData::resource_not_found(
367 format!("Unknown resource: {}", request.uri),
368 None,
369 )),
370 }
371 }
372
373 async fn call_tool(
374 &self,
375 request: CallToolRequestParams,
376 _context: RequestContext<RoleServer>,
377 ) -> Result<CallToolResult, ErrorData> {
378 self.check_idle_expiry().await;
379 elicitation::increment_call();
380
381 let original_name = request.name.as_ref().to_string();
382 let (resolved_name, resolved_args) = if original_name == "ctx" {
383 let sub = request
384 .arguments
385 .as_ref()
386 .and_then(|a| a.get("tool"))
387 .and_then(|v| v.as_str())
388 .map(std::string::ToString::to_string)
389 .ok_or_else(|| {
390 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
391 })?;
392 let tool_name = if sub.starts_with("ctx_") {
393 sub
394 } else {
395 format!("ctx_{sub}")
396 };
397 let mut args = request.arguments.unwrap_or_default();
398 args.remove("tool");
399 (tool_name, Some(args))
400 } else {
401 (original_name, request.arguments)
402 };
403 let name = resolved_name.as_str();
404 let args = resolved_args.as_ref();
405
406 let role_check = role_guard::check_tool_access(name);
407 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
408 tracing::warn!(
409 tool = name,
410 role = %role_check.role_name,
411 "Tool blocked by role policy"
412 );
413 return Ok(denied);
414 }
415
416 if name != "ctx_workflow" {
417 let active = self.workflow.read().await.clone();
418 if let Some(run) = active {
419 if run.current == "done" || is_workflow_stale(&run) {
420 let mut wf = self.workflow.write().await;
421 *wf = None;
422 let _ = crate::core::workflow::clear_active();
423 } else if !WORKFLOW_PASSTHROUGH_TOOLS.contains(&name) {
424 if let Some(state) = run.spec.state(&run.current) {
425 if let Some(allowed) = &state.allowed_tools {
426 let allowed_ok = allowed.iter().any(|t| t == name);
427 if !allowed_ok {
428 let mut shown = allowed.clone();
429 shown.sort();
430 shown.truncate(30);
431 return Ok(CallToolResult::success(vec![Content::text(format!(
432 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed: {}. Use ctx_workflow(action=\"stop\") to exit.",
433 run.spec.name,
434 run.current,
435 shown.join(", ")
436 ))]));
437 }
438 }
439 }
440 }
441 }
442 }
443
444 let auto_context = {
445 let task = {
446 let session = self.session.read().await;
447 session.task.as_ref().map(|t| t.description.clone())
448 };
449 let project_root = {
450 let session = self.session.read().await;
451 session.project_root.clone()
452 };
453 let mut cache = self.cache.write().await;
454 crate::tools::autonomy::session_lifecycle_pre_hook(
455 &self.autonomy,
456 name,
457 &mut cache,
458 task.as_deref(),
459 project_root.as_deref(),
460 CrpMode::effective(),
461 )
462 };
463
464 let throttle_result = {
465 let fp = args
466 .map(|a| {
467 crate::core::loop_detection::LoopDetector::fingerprint(
468 &serde_json::Value::Object(a.clone()),
469 )
470 })
471 .unwrap_or_default();
472 let mut detector = self.loop_detector.write().await;
473
474 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
475 let is_search_shell = name == "ctx_shell" && {
476 let cmd = args
477 .as_ref()
478 .and_then(|a| a.get("command"))
479 .and_then(|v| v.as_str())
480 .unwrap_or("");
481 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
482 };
483
484 if is_search || is_search_shell {
485 let search_pattern = args.and_then(|a| {
486 a.get("pattern")
487 .or_else(|| a.get("query"))
488 .and_then(|v| v.as_str())
489 });
490 let shell_pattern = if is_search_shell {
491 args.and_then(|a| a.get("command"))
492 .and_then(|v| v.as_str())
493 .and_then(helpers::extract_search_pattern_from_command)
494 } else {
495 None
496 };
497 let pat = search_pattern.or(shell_pattern.as_deref());
498 detector.record_search(name, &fp, pat)
499 } else {
500 detector.record_call(name, &fp)
501 }
502 };
503
504 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
505 let msg = throttle_result.message.unwrap_or_default();
506 return Ok(CallToolResult::success(vec![Content::text(msg)]));
507 }
508
509 let throttle_warning =
510 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
511 throttle_result.message.clone()
512 } else {
513 None
514 };
515
516 let config = crate::core::config::Config::load();
517 let minimal = config.minimal_overhead_effective();
518
519 {
520 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
521 let snap = BudgetTracker::global().check();
522 if *snap.worst_level() == BudgetLevel::Exhausted
523 && name != "ctx_session"
524 && name != "ctx_cost"
525 && name != "ctx_metrics"
526 {
527 for (dim, lvl, used, limit) in [
528 (
529 "tokens",
530 &snap.tokens.level,
531 format!("{}", snap.tokens.used),
532 format!("{}", snap.tokens.limit),
533 ),
534 (
535 "shell",
536 &snap.shell.level,
537 format!("{}", snap.shell.used),
538 format!("{}", snap.shell.limit),
539 ),
540 (
541 "cost",
542 &snap.cost.level,
543 format!("${:.2}", snap.cost.used_usd),
544 format!("${:.2}", snap.cost.limit_usd),
545 ),
546 ] {
547 if *lvl == BudgetLevel::Exhausted {
548 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
549 }
550 }
551 let msg = format!(
552 "[BUDGET EXHAUSTED] {}\n\
553 Use `ctx_session action=role` to check/switch roles, \
554 or `ctx_session action=reset` to start fresh.",
555 snap.format_compact()
556 );
557 tracing::warn!(tool = name, "{msg}");
558 return Ok(CallToolResult::success(vec![Content::text(msg)]));
559 }
560 }
561
562 if is_shell_tool_name(name) {
563 crate::core::budget_tracker::BudgetTracker::global().record_shell();
564 }
565
566 let tool_start = std::time::Instant::now();
567 let (mut result_text, tool_saved_tokens) = {
568 use futures::FutureExt;
569 use std::panic::AssertUnwindSafe;
570 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
571 .catch_unwind()
572 .await
573 {
574 Ok(Ok(pair)) => pair,
575 Ok(Err(e)) => return Err(e),
576 Err(panic_payload) => {
577 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
578 (*s).to_string()
579 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
580 s.clone()
581 } else {
582 "unknown".to_string()
583 };
584 tracing::error!(tool = name, "Tool panicked: {detail}");
585 (format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
586 The MCP server is still running. Please retry or use a different approach."), 0)
587 }
588 }
589 };
590
591 let is_raw_shell = name == "ctx_shell" && {
592 let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
593 let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
594 arg_raw
595 || arg_bypass
596 || std::env::var("LEAN_CTX_DISABLED").is_ok()
597 || std::env::var("LEAN_CTX_RAW").is_ok()
598 };
599
600 let pre_terse_len = result_text.len();
601 let output_tokens = {
602 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
603 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
604 tokens
605 };
606
607 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
608
609 if let Some(ref ir) = self.context_ir {
611 let tool_duration = tool_start.elapsed();
612 let source_kind = match name {
613 n if n.contains("read") || n.contains("multi_read") || n.contains("smart_read") => {
614 crate::core::context_ir::ContextIrSourceKindV1::Read
615 }
616 "ctx_shell" => crate::core::context_ir::ContextIrSourceKindV1::Shell,
617 "ctx_search" | "ctx_semantic_search" => {
618 crate::core::context_ir::ContextIrSourceKindV1::Search
619 }
620 "ctx_provider" => crate::core::context_ir::ContextIrSourceKindV1::Provider,
621 _ => crate::core::context_ir::ContextIrSourceKindV1::Other,
622 };
623 let ir_path = helpers::get_str(args, "path");
624 let ir_command = helpers::get_str(args, "command");
625 let ir_mode = helpers::get_str(args, "mode");
626 let excerpt = if result_text.len() > 200 {
627 &result_text[..200]
628 } else {
629 &result_text
630 };
631 let input = crate::core::context_ir::RecordIrInput {
632 kind: source_kind,
633 tool: name,
634 client_name: None,
635 agent_id: None,
636 path: ir_path.as_deref(),
637 command: ir_command.as_deref(),
638 pattern: ir_mode.as_deref(),
639 input_tokens: pre_terse_len / 4,
640 output_tokens: output_tokens as usize,
641 duration: tool_duration,
642 content_excerpt: excerpt,
643 };
644 ir.write().await.record(input);
645 }
646
647 {
649 let mut detector = self.loop_detector.write().await;
650 if name == "ctx_read" {
651 let path = helpers::get_str(args, "path").unwrap_or_default();
652 let mode = helpers::get_str(args, "mode").unwrap_or_else(|| "auto".into());
653 let fresh = helpers::get_bool(args, "fresh").unwrap_or(false);
654 detector.record_read_for_correction(&path, &mode, fresh);
655 } else if name == "ctx_shell" {
656 let cmd = helpers::get_str(args, "command").unwrap_or_default();
657 detector.record_shell_for_correction(&cmd);
658 }
659 let correction_count = detector.correction_count();
660 if correction_count > 0 {
661 crate::core::anomaly::record_metric(
662 "correction_loop_rate",
663 f64::from(correction_count),
664 );
665 }
666 use crate::core::config::CompressionLevel;
668 if correction_count >= 5 {
669 CompressionLevel::set_session_degrade(&CompressionLevel::Off);
670 } else if correction_count >= 3 {
671 CompressionLevel::set_session_degrade(&CompressionLevel::Lite);
672 } else if correction_count == 0 {
673 CompressionLevel::clear_session_degrade();
674 }
675 detector.prune_corrections();
676 }
677
678 crate::core::anomaly::save_debounced();
680
681 let budget_warning = {
682 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
683 let snap = BudgetTracker::global().check();
684 if *snap.worst_level() == BudgetLevel::Warning {
685 for (dim, lvl, used, limit, pct) in [
686 (
687 "tokens",
688 &snap.tokens.level,
689 format!("{}", snap.tokens.used),
690 format!("{}", snap.tokens.limit),
691 snap.tokens.percent,
692 ),
693 (
694 "shell",
695 &snap.shell.level,
696 format!("{}", snap.shell.used),
697 format!("{}", snap.shell.limit),
698 snap.shell.percent,
699 ),
700 (
701 "cost",
702 &snap.cost.level,
703 format!("${:.2}", snap.cost.used_usd),
704 format!("${:.2}", snap.cost.limit_usd),
705 snap.cost.percent,
706 ),
707 ] {
708 if *lvl == BudgetLevel::Warning {
709 crate::core::events::emit_budget_warning(
710 &snap.role, dim, &used, &limit, pct,
711 );
712 }
713 }
714 if crate::core::protocol::meta_visible() {
715 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
716 } else {
717 None
718 }
719 } else {
720 None
721 }
722 };
723
724 let archive_hint = if minimal || is_raw_shell {
725 None
726 } else {
727 use crate::core::archive;
728 let archivable = matches!(
729 name,
730 "ctx_shell"
731 | "ctx_read"
732 | "ctx_multi_read"
733 | "ctx_smart_read"
734 | "ctx_execute"
735 | "ctx_search"
736 | "ctx_tree"
737 );
738 if archivable && archive::should_archive(&result_text) {
739 let cmd = helpers::get_str(args, "command")
740 .or_else(|| helpers::get_str(args, "path"))
741 .unwrap_or_default();
742 let session_id = self.session.read().await.id.clone();
743 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
744 let tokens = crate::core::tokens::count_tokens(&to_store);
745 archive::store(name, &cmd, &to_store, Some(&session_id))
746 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
747 } else {
748 None
749 }
750 };
751
752 let pre_compression = result_text.clone();
753 let skip_terse = is_raw_shell
754 || tool_saved_tokens > 0
755 || (name == "ctx_shell"
756 && helpers::get_str(args, "command")
757 .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
758 let compression = crate::core::config::CompressionLevel::effective(&config);
759 if compression.is_active() && !skip_terse {
760 let terse_result =
761 crate::core::terse::pipeline::compress(&result_text, &compression, None);
762 if terse_result.quality_passed && terse_result.savings_pct >= 3.0 {
763 result_text = terse_result.output;
764 }
765 }
766
767 let profile_hints = crate::core::profiles::active_profile().output_hints;
768
769 if !is_raw_shell && profile_hints.verify_footer() {
770 let verify_cfg = crate::core::profiles::active_profile().verification;
771 let vr = crate::core::output_verification::verify_output(
772 &pre_compression,
773 &result_text,
774 &verify_cfg,
775 );
776 if !vr.warnings.is_empty() {
777 let msg = format!("[VERIFY] {}", vr.format_compact());
778 result_text = format!("{result_text}\n\n{msg}");
779 }
780 }
781
782 if profile_hints.archive_hint() {
783 if let Some(hint) = archive_hint {
784 result_text = format!("{result_text}\n{hint}");
785 }
786 }
787
788 if !is_raw_shell {
789 if let Some(ctx) = auto_context {
790 let ctx_tokens = crate::core::tokens::count_tokens(&ctx);
791 if ctx_tokens <= 400 {
792 result_text = format!("{ctx}\n\n{result_text}");
793 }
794 }
795 }
796
797 if let Some(warning) = throttle_warning {
798 result_text = format!("{result_text}\n\n{warning}");
799 }
800
801 if let Some(bw) = budget_warning {
802 result_text = format!("{result_text}\n\n{bw}");
803 }
804
805 if !self
806 .rules_stale_checked
807 .swap(true, std::sync::atomic::Ordering::Relaxed)
808 {
809 let client = self.client_name.read().await.clone();
810 if !client.is_empty() {
811 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
812 result_text = format!("{result_text}\n\n{stale_msg}");
813 }
814 }
815 }
816
817 {
818 let _ = crate::core::slo::evaluate();
820 }
821
822 if name == "ctx_read" {
823 if minimal {
824 let mut cache = self.cache.write().await;
825 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
826 } else {
827 let read_path = self
828 .resolve_path_or_passthrough(
829 &helpers::get_str(args, "path").unwrap_or_default(),
830 )
831 .await;
832 let project_root = {
833 let session = self.session.read().await;
834 session.project_root.clone()
835 };
836 let mut cache = self.cache.write().await;
837 let enrich = crate::tools::autonomy::enrich_after_read(
838 &self.autonomy,
839 &mut cache,
840 &read_path,
841 project_root.as_deref(),
842 None,
843 crate::tools::CrpMode::effective(),
844 false,
845 );
846 if profile_hints.related_hint() {
847 if let Some(hint) = enrich.related_hint {
848 result_text = format!("{result_text}\n{hint}");
849 }
850 }
851 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
852
853 {
854 let active_task = {
855 let session = self.session.read().await;
856 session.task.as_ref().map(|t| t.description.clone())
857 };
858 let mut ledger = self.ledger.write().await;
859 let overlay = crate::core::context_overlay::OverlayStore::load_project(
860 &std::path::PathBuf::from(project_root.as_deref().unwrap_or(".")),
861 );
862 let mode_used =
863 helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
864 let sent_tokens_final = crate::core::tokens::count_tokens(&result_text);
865 let gate_result = context_gate::post_dispatch_record_with_task(
866 &read_path,
867 &mode_used,
868 output_tokens as usize,
869 sent_tokens_final,
870 &mut ledger,
871 &overlay,
872 active_task.as_deref(),
873 );
874 if let Some(hint) = gate_result.eviction_hint {
875 result_text = format!("{result_text}\n{hint}");
876 }
877 if profile_hints.elicitation_hint() {
878 if let Some(hint) = gate_result.elicitation_hint {
879 result_text = format!("{result_text}\n{hint}");
880 }
881 }
882 if gate_result.resource_changed {
883 if let Some(peer) = self.peer.read().await.as_ref() {
884 notifications::send_resource_updated(
885 peer,
886 notifications::RESOURCE_URI_SUMMARY,
887 )
888 .await;
889 }
890 }
891 }
892 }
893 }
894
895 if !minimal && !is_raw_shell && name == "ctx_shell" {
896 let cmd = helpers::get_str(args, "command").unwrap_or_default();
897
898 if let Some(file_path) = extract_file_read_from_shell(&cmd) {
899 if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
900 bt.next_seq();
901 bt.record_shell_file_access(&file_path);
902 }
903 }
904
905 if profile_hints.efficiency_hint() {
906 let calls = self.tool_calls.read().await;
907 let last_original = calls.last().map_or(0, |c| c.original_tokens);
908 drop(calls);
909 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
910 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
911 &self.autonomy,
912 &cmd,
913 last_original,
914 pre_hint_tokens,
915 ) {
916 result_text = format!("{result_text}\n{hint}");
917 }
918 }
919 }
920
921 if !minimal && !is_raw_shell {
922 bypass_hint::record_lctx_call();
923 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
924 if let Some(hint) = bypass_hint::check(&data_dir) {
925 result_text = format!("{result_text}\n{hint}");
926 }
927 }
928 }
929
930 #[allow(clippy::cast_possible_truncation)]
931 let output_token_count = if result_text.len() == pre_terse_len {
932 output_tokens as usize
933 } else {
934 crate::core::tokens::count_tokens(&result_text)
935 };
936 let action = helpers::get_str(args, "action");
937
938 const K_STALENESS_BOUND: i64 = 10;
940 if self.session_mode == crate::tools::SessionMode::Shared {
941 if let Some(ref rt) = self.context_os {
942 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
943 let cursor = self
944 .last_seen_event_id
945 .load(std::sync::atomic::Ordering::Relaxed);
946 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
947 let gap = latest - cursor;
948 result_text = format!(
949 "[CONTEXT STALE] {gap} events happened since your last read. \
950 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
951 );
952 }
953 self.last_seen_event_id
954 .store(latest, std::sync::atomic::Ordering::Relaxed);
955 }
956 }
957
958 {
959 let input = helpers::canonical_args_string(args);
960 let input_md5 = helpers::hash_fast(&input);
961 let output_md5 = helpers::hash_fast(&result_text);
962 let agent_id = self.agent_id.read().await.clone();
963 let client_name = self.client_name.read().await.clone();
964 let mut explicit_intent: Option<(
965 crate::core::intent_protocol::IntentRecord,
966 Option<String>,
967 String,
968 )> = None;
969
970 let pending_session_save = {
971 let empty_args = serde_json::Map::new();
972 let args_map = args.unwrap_or(&empty_args);
973 let mut session = self.session.write().await;
974 session.record_tool_receipt(
975 name,
976 action.as_deref(),
977 &input_md5,
978 &output_md5,
979 agent_id.as_deref(),
980 Some(&client_name),
981 );
982
983 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
984 name,
985 action.as_deref(),
986 args_map,
987 session.project_root.as_deref(),
988 ) {
989 let is_explicit =
990 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
991 let root = session.project_root.clone();
992 let sid = session.id.clone();
993 session.record_intent(intent.clone());
994 if is_explicit {
995 explicit_intent = Some((intent, root, sid));
996 }
997 }
998 if session.should_save() {
999 session.prepare_save().ok()
1000 } else {
1001 None
1002 }
1003 };
1004
1005 if let Some(prepared) = pending_session_save {
1006 let ir_clone = self.context_ir.clone();
1007 tokio::task::spawn_blocking(move || {
1008 let _ = prepared.write_to_disk();
1009 if let Some(ir) = ir_clone {
1010 if let Ok(ir_guard) = ir.try_read() {
1011 ir_guard.save();
1012 }
1013 }
1014 });
1015 }
1016
1017 if let Some((intent, root, session_id)) = explicit_intent {
1018 let _ = crate::core::intent_protocol::apply_side_effects(
1019 &intent,
1020 root.as_deref(),
1021 &session_id,
1022 );
1023 }
1024
1025 if self.autonomy.is_enabled() {
1026 let (calls, project_root) = {
1027 let session = self.session.read().await;
1028 (session.stats.total_tool_calls, session.project_root.clone())
1029 };
1030
1031 if let Some(root) = project_root {
1032 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
1033 let root_clone = root.clone();
1034 tokio::task::spawn_blocking(move || {
1035 let _ = crate::core::consolidation_engine::consolidate_latest(
1036 &root_clone,
1037 crate::core::consolidation_engine::ConsolidationBudgets::default(),
1038 );
1039 });
1040 }
1041 }
1042 }
1043
1044 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
1045 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
1046 let output_token_count_u64 = output_token_count as u64;
1047 let name_owned = name.to_string();
1048 tokio::task::spawn_blocking(move || {
1049 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
1050 let quote = pricing.quote_from_env_or_agent_type(&client_name);
1051 let cost_usd =
1052 quote
1053 .cost
1054 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
1055 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
1056
1057 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
1058 store.record_tool_call(
1059 &agent_key,
1060 &client_name,
1061 &name_owned,
1062 input_token_count,
1063 output_token_count_u64,
1064 0,
1065 );
1066 let _ = store.save();
1067 });
1068 }
1069
1070 if self.session_mode == crate::tools::SessionMode::Shared
1072 && name == "ctx_knowledge"
1073 && action.as_deref() == Some("remember")
1074 {
1075 if let Some(ref rt) = self.context_os {
1076 let my_agent = self.agent_id.read().await.clone();
1077 let category = helpers::get_str(args, "category");
1078 let key = helpers::get_str(args, "key");
1079 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
1080 let recent = rt.bus.recent_by_kind(
1081 &self.workspace_id,
1082 &self.channel_id,
1083 "knowledge_remembered",
1084 20,
1085 );
1086 for ev in &recent {
1087 let p = &ev.payload;
1088 let ev_cat = p.get("category").and_then(|v| v.as_str());
1089 let ev_key = p.get("key").and_then(|v| v.as_str());
1090 let ev_actor = ev.actor.as_deref();
1091 if ev_cat == Some(cat.as_str())
1092 && ev_key == Some(k.as_str())
1093 && ev_actor != my_agent.as_deref()
1094 {
1095 let other = ev_actor.unwrap_or("unknown");
1096 result_text = format!(
1097 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
1098 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
1099 );
1100 break;
1101 }
1102 }
1103 }
1104 }
1105 }
1106
1107 if self.session_mode == crate::tools::SessionMode::Shared {
1109 let ws = self.workspace_id.clone();
1110 let ch = self.channel_id.clone();
1111 let rt = self.context_os.clone();
1112 let agent = self.agent_id.read().await.clone();
1113 let tool = name.to_string();
1114 let tool_action = action.clone();
1115 let tool_path = helpers::get_str(args, "path");
1116 let tool_category = helpers::get_str(args, "category");
1117 let tool_key = helpers::get_str(args, "key");
1118 let session_snapshot = self.session.read().await.clone();
1119 let session_task = session_snapshot.task.clone();
1120 tokio::task::spawn_blocking(move || {
1121 let Some(rt) = rt else {
1122 return;
1123 };
1124 let Some(root) = session_snapshot.project_root.as_deref() else {
1125 return;
1126 };
1127 rt.shared_sessions
1128 .persist_best_effort(root, &ws, &ch, &session_snapshot);
1129 rt.metrics.record_session_persisted();
1130
1131 let mut base_payload = serde_json::json!({
1132 "tool": tool,
1133 "action": tool_action,
1134 });
1135 if let Some(ref p) = tool_path {
1136 base_payload["path"] = serde_json::Value::String(p.clone());
1137 }
1138 if let Some(ref c) = tool_category {
1139 base_payload["category"] = serde_json::Value::String(c.clone());
1140 }
1141 if let Some(ref k) = tool_key {
1142 base_payload["key"] = serde_json::Value::String(k.clone());
1143 }
1144 if let Some(ref t) = session_task {
1145 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1146 }
1147
1148 if rt
1149 .bus
1150 .append(
1151 &ws,
1152 &ch,
1153 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1154 agent.as_deref(),
1155 base_payload.clone(),
1156 )
1157 .is_some()
1158 {
1159 rt.metrics.record_event_appended();
1160 rt.metrics.record_event_broadcast();
1161 }
1162
1163 if let Some(secondary) =
1164 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1165 {
1166 if rt
1167 .bus
1168 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1169 .is_some()
1170 {
1171 rt.metrics.record_event_appended();
1172 rt.metrics.record_event_broadcast();
1173 }
1174 }
1175 });
1176 }
1177
1178 let skip_checkpoint = minimal
1179 || matches!(
1180 name,
1181 "ctx_compress"
1182 | "ctx_metrics"
1183 | "ctx_benchmark"
1184 | "ctx_analyze"
1185 | "ctx_cache"
1186 | "ctx_discover"
1187 | "ctx_dedup"
1188 | "ctx_session"
1189 | "ctx_knowledge"
1190 | "ctx_agent"
1191 | "ctx_share"
1192 | "ctx_gain"
1193 | "ctx_overview"
1194 | "ctx_preload"
1195 | "ctx_cost"
1196 | "ctx_heatmap"
1197 | "ctx_task"
1198 | "ctx_impact"
1199 | "ctx_architecture"
1200 | "ctx_smells"
1201 | "ctx_workflow"
1202 );
1203
1204 if !skip_checkpoint && self.increment_and_check() {
1205 if let Some(checkpoint) = self.auto_checkpoint().await {
1206 let interval = LeanCtxServer::checkpoint_interval_effective();
1207 let hints = crate::core::profiles::active_profile().output_hints;
1208 if hints.checkpoint_in_output() && crate::core::protocol::meta_visible() {
1209 let combined = format!(
1210 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1211 );
1212 return Ok(CallToolResult::success(vec![Content::text(combined)]));
1213 }
1214 }
1215 }
1216
1217 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1218 if tool_duration_ms > 100 {
1219 LeanCtxServer::append_tool_call_log(
1220 name,
1221 tool_duration_ms,
1222 0,
1223 0,
1224 None,
1225 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1226 );
1227 }
1228
1229 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1230 if current_count > 0 && current_count.is_multiple_of(100) {
1231 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1232 }
1233
1234 Ok(CallToolResult::success(vec![Content::text(result_text)]))
1235 }
1236}
1237
1238pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1239 crate::instructions::build_instructions_for_test(crp_mode)
1240}
1241
1242pub fn build_claude_code_instructions_for_test() -> String {
1243 crate::instructions::claude_code_instructions()
1244}
1245
1246const PROJECT_MARKERS: &[&str] = &[
1247 ".git",
1248 "Cargo.toml",
1249 "package.json",
1250 "go.mod",
1251 "pyproject.toml",
1252 "setup.py",
1253 "pom.xml",
1254 "build.gradle",
1255 "Makefile",
1256 ".lean-ctx.toml",
1257];
1258
1259fn has_project_marker(dir: &std::path::Path) -> bool {
1260 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1261}
1262
1263fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1264 if let Some(home) = dirs::home_dir() {
1265 if dir == home {
1266 return true;
1267 }
1268 }
1269 let dir_str = dir.to_string_lossy();
1270 dir_str.ends_with("/.claude")
1271 || dir_str.ends_with("/.codex")
1272 || dir_str.contains("/.claude/")
1273 || dir_str.contains("/.codex/")
1274}
1275
1276fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1277 std::process::Command::new("git")
1278 .args(["rev-parse", "--show-toplevel"])
1279 .current_dir(dir)
1280 .stdout(std::process::Stdio::piped())
1281 .stderr(std::process::Stdio::null())
1282 .output()
1283 .ok()
1284 .and_then(|o| {
1285 if o.status.success() {
1286 String::from_utf8(o.stdout)
1287 .ok()
1288 .map(|s| s.trim().to_string())
1289 } else {
1290 None
1291 }
1292 })
1293}
1294
1295pub fn derive_project_root_from_cwd() -> Option<String> {
1296 let cwd = std::env::current_dir().ok()?;
1297 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1298
1299 if is_home_or_agent_dir(&canonical) {
1300 return git_toplevel_from(&canonical);
1301 }
1302
1303 if has_project_marker(&canonical) {
1304 return Some(canonical.to_string_lossy().to_string());
1305 }
1306
1307 if let Some(git_root) = git_toplevel_from(&canonical) {
1308 return Some(git_root);
1309 }
1310
1311 if let Some(root) = detect_multi_root_workspace(&canonical) {
1312 return Some(root);
1313 }
1314
1315 if !crate::core::pathutil::is_broad_or_unsafe_root(&canonical) {
1319 tracing::info!(
1320 "No project markers found — using CWD as project root: {}",
1321 canonical.display()
1322 );
1323 return Some(canonical.to_string_lossy().to_string());
1324 }
1325
1326 None
1327}
1328
1329#[cfg(test)]
1331use crate::core::pathutil::is_broad_or_unsafe_root;
1332
1333fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1337 let entries = std::fs::read_dir(dir).ok()?;
1338 let mut child_projects: Vec<String> = Vec::new();
1339
1340 for entry in entries.flatten() {
1341 let path = entry.path();
1342 if path.is_dir() && has_project_marker(&path) {
1343 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1344 child_projects.push(canonical.to_string_lossy().to_string());
1345 }
1346 }
1347
1348 if child_projects.len() >= 2 {
1349 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1350 let sep = if cfg!(windows) { ";" } else { ":" };
1351 let merged = if existing.is_empty() {
1352 child_projects.join(sep)
1353 } else {
1354 format!("{existing}{sep}{}", child_projects.join(sep))
1355 };
1356 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1357 tracing::info!(
1358 "Multi-root workspace detected at {}: auto-allowing {} child projects",
1359 dir.display(),
1360 child_projects.len()
1361 );
1362 return Some(dir.to_string_lossy().to_string());
1363 }
1364
1365 None
1366}
1367
1368pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1369 crate::tool_defs::list_all_tool_defs()
1370 .into_iter()
1371 .map(|(name, desc, _)| (name, desc))
1372 .collect()
1373}
1374
1375pub fn tool_schemas_json_for_test() -> String {
1376 crate::tool_defs::list_all_tool_defs()
1377 .iter()
1378 .map(|(name, _, schema)| format!("{name}: {schema}"))
1379 .collect::<Vec<_>>()
1380 .join("\n")
1381}
1382
1383pub const WORKFLOW_PASSTHROUGH_TOOLS: &[&str] = &[
1387 "ctx",
1388 "ctx_workflow",
1389 "ctx_read",
1390 "ctx_multi_read",
1391 "ctx_smart_read",
1392 "ctx_search",
1393 "ctx_tree",
1394 "ctx_session",
1395 "ctx_ledger",
1396];
1397
1398pub fn is_workflow_stale(run: &crate::core::workflow::types::WorkflowRun) -> bool {
1401 let elapsed = chrono::Utc::now()
1402 .signed_duration_since(run.updated_at)
1403 .num_minutes();
1404 elapsed > 30
1405}
1406
1407fn is_shell_tool_name(name: &str) -> bool {
1408 matches!(name, "ctx_shell" | "ctx_execute")
1409}
1410
1411fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1412 let trimmed = cmd.trim();
1413 let parts: Vec<&str> = trimmed.split_whitespace().collect();
1414 if parts.len() < 2 {
1415 return None;
1416 }
1417 let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1418 match bin {
1419 "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1420 let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1421 Some(file_arg.to_string())
1422 }
1423 _ => None,
1424 }
1425}
1426
1427#[cfg(test)]
1428mod tests {
1429 use super::*;
1430
1431 #[test]
1432 fn project_markers_detected() {
1433 let tmp = tempfile::tempdir().unwrap();
1434 let root = tmp.path().join("myproject");
1435 std::fs::create_dir_all(&root).unwrap();
1436 assert!(!has_project_marker(&root));
1437
1438 std::fs::create_dir(root.join(".git")).unwrap();
1439 assert!(has_project_marker(&root));
1440 }
1441
1442 #[test]
1443 fn home_dir_detected_as_agent_dir() {
1444 if let Some(home) = dirs::home_dir() {
1445 assert!(is_home_or_agent_dir(&home));
1446 }
1447 }
1448
1449 #[test]
1450 fn agent_dirs_detected() {
1451 let claude = std::path::PathBuf::from("/home/user/.claude");
1452 assert!(is_home_or_agent_dir(&claude));
1453 let codex = std::path::PathBuf::from("/home/user/.codex");
1454 assert!(is_home_or_agent_dir(&codex));
1455 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1456 assert!(!is_home_or_agent_dir(&project));
1457 }
1458
1459 #[test]
1460 fn test_unified_tool_count() {
1461 let tools = crate::tool_defs::unified_tool_defs();
1462 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1463 }
1464
1465 #[test]
1466 fn test_granular_tool_count() {
1467 let tools = crate::tool_defs::granular_tool_defs();
1468 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1469 }
1470
1471 #[test]
1472 fn test_registry_tool_count_ssot() {
1473 let registry = crate::server::registry::build_registry();
1474 assert_eq!(
1475 registry.len(),
1476 62,
1477 "Registry tool count drift! Update this test AND all docs when adding/removing tools."
1478 );
1479 }
1480
1481 #[test]
1482 fn disabled_tools_filters_list() {
1483 let all = crate::tool_defs::granular_tool_defs();
1484 let total = all.len();
1485 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1486 let filtered: Vec<_> = all
1487 .into_iter()
1488 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1489 .collect();
1490 assert_eq!(filtered.len(), total - 2);
1491 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1492 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1493 }
1494
1495 #[test]
1496 fn empty_disabled_tools_returns_all() {
1497 let all = crate::tool_defs::granular_tool_defs();
1498 let total = all.len();
1499 let disabled: Vec<String> = vec![];
1500 let filtered: Vec<_> = all
1501 .into_iter()
1502 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1503 .collect();
1504 assert_eq!(filtered.len(), total);
1505 }
1506
1507 #[test]
1508 fn misspelled_disabled_tool_is_silently_ignored() {
1509 let all = crate::tool_defs::granular_tool_defs();
1510 let total = all.len();
1511 let disabled = ["ctx_nonexistent_tool".to_string()];
1512 let filtered: Vec<_> = all
1513 .into_iter()
1514 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1515 .collect();
1516 assert_eq!(filtered.len(), total);
1517 }
1518
1519 #[test]
1520 fn detect_multi_root_workspace_with_child_projects() {
1521 let tmp = tempfile::tempdir().unwrap();
1522 let workspace = tmp.path().join("workspace");
1523 std::fs::create_dir_all(&workspace).unwrap();
1524
1525 let proj_a = workspace.join("project-a");
1526 let proj_b = workspace.join("project-b");
1527 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1528 std::fs::create_dir_all(&proj_b).unwrap();
1529 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1530
1531 let result = detect_multi_root_workspace(&workspace);
1532 assert!(
1533 result.is_some(),
1534 "should detect workspace with 2 child projects"
1535 );
1536
1537 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1538 }
1539
1540 #[test]
1541 fn detect_multi_root_workspace_returns_none_for_single_project() {
1542 let tmp = tempfile::tempdir().unwrap();
1543 let workspace = tmp.path().join("workspace");
1544 std::fs::create_dir_all(&workspace).unwrap();
1545
1546 let proj_a = workspace.join("project-a");
1547 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1548
1549 let result = detect_multi_root_workspace(&workspace);
1550 assert!(
1551 result.is_none(),
1552 "should not detect workspace with only 1 child project"
1553 );
1554 }
1555
1556 #[test]
1557 fn is_broad_or_unsafe_root_rejects_home() {
1558 if let Some(home) = dirs::home_dir() {
1559 assert!(is_broad_or_unsafe_root(&home));
1560 }
1561 }
1562
1563 #[test]
1564 fn is_broad_or_unsafe_root_rejects_filesystem_root() {
1565 assert!(is_broad_or_unsafe_root(std::path::Path::new("/")));
1566 }
1567
1568 #[test]
1569 fn is_broad_or_unsafe_root_rejects_agent_dirs() {
1570 assert!(is_broad_or_unsafe_root(std::path::Path::new(
1571 "/home/user/.claude"
1572 )));
1573 assert!(is_broad_or_unsafe_root(std::path::Path::new(
1574 "/home/user/.codex"
1575 )));
1576 }
1577
1578 #[test]
1579 fn is_broad_or_unsafe_root_allows_project_subdir() {
1580 let tmp = tempfile::tempdir().unwrap();
1581 let subdir = tmp.path().join("my-project");
1582 std::fs::create_dir_all(&subdir).unwrap();
1583 assert!(!is_broad_or_unsafe_root(&subdir));
1584 }
1585
1586 #[test]
1587 fn is_broad_or_unsafe_root_allows_tmp_subdirs() {
1588 assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1589 "/tmp/leanctx-test"
1590 )));
1591 assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1592 "/tmp/my-project"
1593 )));
1594 }
1595
1596 #[test]
1597 fn is_broad_or_unsafe_root_allows_home_subdirs() {
1598 if let Some(home) = dirs::home_dir() {
1599 let subdir = home.join("projects").join("my-app");
1600 assert!(!is_broad_or_unsafe_root(&subdir));
1601 }
1602 }
1603
1604 #[test]
1605 fn derive_project_root_falls_back_to_bare_cwd() {
1606 let tmp = tempfile::tempdir().unwrap();
1607 let bare = tmp.path().join("bare-dir");
1608 std::fs::create_dir_all(&bare).unwrap();
1609
1610 let original = std::env::current_dir().unwrap();
1611 std::env::set_current_dir(&bare).unwrap();
1612 let result = derive_project_root_from_cwd();
1613 std::env::set_current_dir(original).unwrap();
1614
1615 assert!(result.is_some(), "bare dir should produce a project root");
1616 let root = result.unwrap();
1617 assert!(
1618 root.contains("bare-dir"),
1619 "fallback should use the bare dir path"
1620 );
1621 }
1622}