1pub mod bounded_lock;
2pub mod bypass_hint;
3pub mod compaction_sync;
4pub mod context_gate;
5mod dispatch;
6pub mod dynamic_tools;
7pub mod elicitation;
8pub(crate) mod execute;
9pub mod helpers;
10pub mod notifications;
11pub mod prompts;
12pub mod reference_store;
13pub mod registry;
14pub mod resources;
15pub mod role_guard;
16pub mod tool_trait;
17
18use rmcp::handler::server::ServerHandler;
19use rmcp::model::{
20 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
21 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
22};
23use rmcp::service::{RequestContext, RoleServer};
24use rmcp::ErrorData;
25
26use crate::tools::{CrpMode, LeanCtxServer};
27
28impl ServerHandler for LeanCtxServer {
29 fn get_info(&self) -> ServerInfo {
30 let capabilities = ServerCapabilities::builder()
31 .enable_tools()
32 .enable_resources()
33 .enable_resources_subscribe()
34 .enable_prompts()
35 .build();
36
37 let config = crate::core::config::Config::load();
38 let level = crate::core::config::CompressionLevel::effective(&config);
39 let _ = crate::core::terse::rules_inject::inject(&level);
40
41 let instructions = crate::instructions::build_instructions(CrpMode::effective());
42
43 InitializeResult::new(capabilities)
44 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
45 .with_instructions(instructions)
46 }
47
48 async fn initialize(
49 &self,
50 request: InitializeRequestParams,
51 context: RequestContext<RoleServer>,
52 ) -> Result<InitializeResult, ErrorData> {
53 let name = request.client_info.name.clone();
54 tracing::info!("MCP client connected: {:?}", name);
55 *self.client_name.write().await = name.clone();
56 *self.peer.write().await = Some(context.peer.clone());
57
58 if self.session_mode != crate::tools::SessionMode::Shared {
59 crate::core::budget_tracker::BudgetTracker::global().reset();
60 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
61 let radar = data_dir.join("context_radar.jsonl");
62 if radar.exists() {
63 let prev = data_dir.join("context_radar.prev.jsonl");
64 let _ = std::fs::rename(&radar, &prev);
65 }
66 }
67 }
68
69 let derived_root = derive_project_root_from_cwd();
70 let cwd_str = std::env::current_dir()
71 .ok()
72 .map(|p| p.to_string_lossy().to_string())
73 .unwrap_or_default();
74 {
75 let mut session = self.session.write().await;
76 if !cwd_str.is_empty() {
77 session.shell_cwd = Some(cwd_str.clone());
78 }
79 if let Some(ref root) = derived_root {
80 session.project_root = Some(root.clone());
81 tracing::info!("Project root set to: {root}");
82 } else if let Some(ref root) = session.project_root {
83 let root_path = std::path::Path::new(root);
84 let root_has_marker = has_project_marker(root_path);
85 let root_str = root_path.to_string_lossy();
86 let root_suspicious = root_str.contains("/.claude")
87 || root_str.contains("/.codex")
88 || root_str.contains("/var/folders/")
89 || root_str.contains("/tmp/")
90 || root_str.contains("\\.claude")
91 || root_str.contains("\\.codex")
92 || root_str.contains("\\AppData\\Local\\Temp")
93 || root_str.contains("\\Temp\\");
94 if root_suspicious && !root_has_marker {
95 session.project_root = None;
96 }
97 }
98 if self.session_mode == crate::tools::SessionMode::Shared {
99 if let Some(ref root) = session.project_root {
100 if let Some(ref rt) = self.context_os {
101 rt.shared_sessions.persist_best_effort(
102 root,
103 &self.workspace_id,
104 &self.channel_id,
105 &session,
106 );
107 rt.metrics.record_session_persisted();
108 }
109 }
110 } else {
111 let _ = session.save();
112 }
113 }
114
115 let agent_name = name.clone();
116 let agent_root = derived_root.clone().unwrap_or_default();
117 let agent_id_handle = self.agent_id.clone();
118 tokio::task::spawn_blocking(move || {
119 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
120 return;
121 }
122
123 let maintenance = crate::core::startup_guard::try_acquire_lock(
127 "startup-maintenance",
128 std::time::Duration::from_secs(2),
129 std::time::Duration::from_mins(2),
130 );
131 if maintenance.is_some() {
132 if let Some(home) = dirs::home_dir() {
133 let _ = crate::rules_inject::inject_all_rules(&home);
134 }
135 crate::hooks::refresh_installed_hooks();
136 crate::core::version_check::check_background();
137 }
138 drop(maintenance);
139
140 if !agent_root.is_empty() {
141 let heuristic_role = match agent_name.to_lowercase().as_str() {
142 n if n.contains("cursor") => Some("coder"),
143 n if n.contains("claude") => Some("coder"),
144 n if n.contains("codex") => Some("coder"),
145 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
146 n if n.contains("review") => Some("reviewer"),
147 n if n.contains("test") => Some("debugger"),
148 _ => None,
149 };
150 let env_role = std::env::var("LEAN_CTX_ROLE")
151 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
152 .ok();
153 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
154
155 let _ = crate::core::roles::set_active_role(effective_role);
156
157 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
158 registry.cleanup_stale(24);
159 let id = registry.register("mcp", Some(effective_role), &agent_root);
160 let _ = registry.save();
161 if let Ok(mut guard) = agent_id_handle.try_write() {
162 *guard = Some(id);
163 }
164 }
165 });
166
167 let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
168 tracing::info!("Client capabilities: {}", client_caps.format_summary());
169
170 if client_caps.dynamic_tools {
171 if let Ok(mut dt) = dynamic_tools::global().lock() {
172 dt.set_supports_list_changed(true);
173 }
174 }
175 if let Some(max) = client_caps.max_tools {
176 if let Ok(mut dt) = dynamic_tools::global().lock() {
177 dt.set_supports_list_changed(true);
178 if max < 100 {
179 dt.unload_category(dynamic_tools::ToolCategory::Debug);
180 dt.unload_category(dynamic_tools::ToolCategory::Memory);
181 }
182 }
183 }
184
185 crate::core::client_capabilities::set_detected(&client_caps);
186
187 let instructions =
188 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
189
190 let capabilities = match (client_caps.resources, client_caps.prompts) {
191 (true, true) => ServerCapabilities::builder()
192 .enable_tools()
193 .enable_resources()
194 .enable_resources_subscribe()
195 .enable_prompts()
196 .build(),
197 (true, false) => ServerCapabilities::builder()
198 .enable_tools()
199 .enable_resources()
200 .enable_resources_subscribe()
201 .build(),
202 (false, true) => ServerCapabilities::builder()
203 .enable_tools()
204 .enable_prompts()
205 .build(),
206 (false, false) => ServerCapabilities::builder().enable_tools().build(),
207 };
208
209 Ok(InitializeResult::new(capabilities)
210 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
211 .with_instructions(instructions))
212 }
213
214 async fn list_tools(
215 &self,
216 _request: Option<PaginatedRequestParams>,
217 _context: RequestContext<RoleServer>,
218 ) -> Result<ListToolsResult, ErrorData> {
219 let all_tools = if crate::tool_defs::is_full_mode() {
220 if let Some(ref reg) = self.registry {
221 reg.tool_defs()
222 } else {
223 crate::tool_defs::granular_tool_defs()
224 }
225 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
226 crate::tool_defs::unified_tool_defs()
227 } else if let Some(ref reg) = self.registry {
228 let core_names = crate::tool_defs::core_tool_names();
229 reg.tool_defs()
230 .into_iter()
231 .filter(|t| core_names.contains(&t.name.as_ref()))
232 .collect()
233 } else {
234 crate::tool_defs::lazy_tool_defs()
235 };
236
237 let disabled = crate::core::config::Config::load().disabled_tools_effective();
238 let client = self.client_name.read().await.clone();
239 let is_zed = !client.is_empty() && client.to_lowercase().contains("zed");
240
241 let tools: Vec<_> = all_tools
242 .into_iter()
243 .filter(|t| {
244 let name = t.name.as_ref();
245 if !disabled.is_empty() && disabled.iter().any(|d| d.as_str() == name) {
246 return false;
247 }
248 if is_zed && name == "ctx_edit" {
249 return false;
250 }
251 true
252 })
253 .collect();
254
255 let tools = {
256 let dyn_state = dynamic_tools::global().lock().unwrap();
257 if dyn_state.supports_list_changed() {
258 tools
259 .into_iter()
260 .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
261 .collect()
262 } else {
263 tools
264 }
265 };
266
267 let tools = {
268 let active = self.workflow.read().await.clone();
269 if let Some(run) = active {
270 if run.current == "done" || is_workflow_stale(&run) {
271 let mut wf = self.workflow.write().await;
272 *wf = None;
273 let _ = crate::core::workflow::clear_active();
274 } else if let Some(state) = run.spec.state(&run.current) {
275 if let Some(allowed) = &state.allowed_tools {
276 let mut allow: std::collections::HashSet<&str> =
277 allowed.iter().map(std::string::String::as_str).collect();
278 for passthrough in WORKFLOW_PASSTHROUGH_TOOLS {
279 allow.insert(passthrough);
280 }
281 return Ok(ListToolsResult {
282 tools: tools
283 .into_iter()
284 .filter(|t| allow.contains(t.name.as_ref()))
285 .collect(),
286 ..Default::default()
287 });
288 }
289 }
290 }
291 tools
292 };
293
294 let tools = {
295 let cfg = crate::core::config::Config::load();
296 let level = crate::core::config::CompressionLevel::effective(&cfg);
297 let mode =
298 crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
299 if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
300 tools
301 } else {
302 tools
303 .into_iter()
304 .map(|mut t| {
305 let compressed = crate::core::terse::mcp_compress::compress_description(
306 t.name.as_ref(),
307 t.description.as_deref().unwrap_or(""),
308 mode,
309 );
310 t.description = Some(compressed.into());
311 t
312 })
313 .collect()
314 }
315 };
316
317 Ok(ListToolsResult {
318 tools,
319 ..Default::default()
320 })
321 }
322
323 async fn list_prompts(
324 &self,
325 _request: Option<PaginatedRequestParams>,
326 _context: RequestContext<RoleServer>,
327 ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
328 Ok(rmcp::model::ListPromptsResult::with_all_items(
329 prompts::list_prompts(),
330 ))
331 }
332
333 async fn get_prompt(
334 &self,
335 request: rmcp::model::GetPromptRequestParams,
336 _context: RequestContext<RoleServer>,
337 ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
338 let ledger = self.ledger.read().await;
339 match prompts::get_prompt(&request, &ledger) {
340 Some(result) => Ok(result),
341 None => Err(ErrorData::invalid_params(
342 format!("Unknown prompt: {}", request.name),
343 None,
344 )),
345 }
346 }
347
348 async fn list_resources(
349 &self,
350 _request: Option<PaginatedRequestParams>,
351 _context: RequestContext<RoleServer>,
352 ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
353 Ok(rmcp::model::ListResourcesResult::with_all_items(
354 resources::list_resources(),
355 ))
356 }
357
358 async fn read_resource(
359 &self,
360 request: rmcp::model::ReadResourceRequestParams,
361 _context: RequestContext<RoleServer>,
362 ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
363 let ledger = self.ledger.read().await;
364 match resources::read_resource(&request.uri, &ledger) {
365 Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
366 None => Err(rmcp::ErrorData::resource_not_found(
367 format!("Unknown resource: {}", request.uri),
368 None,
369 )),
370 }
371 }
372
373 async fn call_tool(
374 &self,
375 request: CallToolRequestParams,
376 _context: RequestContext<RoleServer>,
377 ) -> Result<CallToolResult, ErrorData> {
378 self.check_idle_expiry().await;
379 elicitation::increment_call();
380
381 let original_name = request.name.as_ref().to_string();
382 let (resolved_name, resolved_args) = if original_name == "ctx" {
383 let sub = request
384 .arguments
385 .as_ref()
386 .and_then(|a| a.get("tool"))
387 .and_then(|v| v.as_str())
388 .map(std::string::ToString::to_string)
389 .ok_or_else(|| {
390 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
391 })?;
392 let tool_name = if sub.starts_with("ctx_") {
393 sub
394 } else {
395 format!("ctx_{sub}")
396 };
397 let mut args = request.arguments.unwrap_or_default();
398 args.remove("tool");
399 (tool_name, Some(args))
400 } else {
401 (original_name, request.arguments)
402 };
403 let name = resolved_name.as_str();
404 let args = resolved_args.as_ref();
405
406 let role_check = role_guard::check_tool_access(name);
407 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
408 tracing::warn!(
409 tool = name,
410 role = %role_check.role_name,
411 "Tool blocked by role policy"
412 );
413 return Ok(denied);
414 }
415
416 if name != "ctx_workflow" {
417 let active = self.workflow.read().await.clone();
418 if let Some(run) = active {
419 if run.current == "done" || is_workflow_stale(&run) {
420 let mut wf = self.workflow.write().await;
421 *wf = None;
422 let _ = crate::core::workflow::clear_active();
423 } else if !WORKFLOW_PASSTHROUGH_TOOLS.contains(&name) {
424 if let Some(state) = run.spec.state(&run.current) {
425 if let Some(allowed) = &state.allowed_tools {
426 let allowed_ok = allowed.iter().any(|t| t == name);
427 if !allowed_ok {
428 let mut shown = allowed.clone();
429 shown.sort();
430 shown.truncate(30);
431 return Ok(CallToolResult::success(vec![Content::text(format!(
432 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed: {}. Use ctx_workflow(action=\"stop\") to exit.",
433 run.spec.name,
434 run.current,
435 shown.join(", ")
436 ))]));
437 }
438 }
439 }
440 }
441 }
442 }
443
444 let auto_context = {
445 let task = {
446 let session = self.session.read().await;
447 session.task.as_ref().map(|t| t.description.clone())
448 };
449 let project_root = {
450 let session = self.session.read().await;
451 session.project_root.clone()
452 };
453 let mut cache = self.cache.write().await;
454 crate::tools::autonomy::session_lifecycle_pre_hook(
455 &self.autonomy,
456 name,
457 &mut cache,
458 task.as_deref(),
459 project_root.as_deref(),
460 CrpMode::effective(),
461 )
462 };
463
464 let throttle_result = {
465 let fp = args
466 .map(|a| {
467 crate::core::loop_detection::LoopDetector::fingerprint(
468 &serde_json::Value::Object(a.clone()),
469 )
470 })
471 .unwrap_or_default();
472 let mut detector = self.loop_detector.write().await;
473
474 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
475 let is_search_shell = name == "ctx_shell" && {
476 let cmd = args
477 .as_ref()
478 .and_then(|a| a.get("command"))
479 .and_then(|v| v.as_str())
480 .unwrap_or("");
481 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
482 };
483
484 if is_search || is_search_shell {
485 let search_pattern = args.and_then(|a| {
486 a.get("pattern")
487 .or_else(|| a.get("query"))
488 .and_then(|v| v.as_str())
489 });
490 let shell_pattern = if is_search_shell {
491 args.and_then(|a| a.get("command"))
492 .and_then(|v| v.as_str())
493 .and_then(helpers::extract_search_pattern_from_command)
494 } else {
495 None
496 };
497 let pat = search_pattern.or(shell_pattern.as_deref());
498 detector.record_search(name, &fp, pat)
499 } else {
500 detector.record_call(name, &fp)
501 }
502 };
503
504 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
505 let msg = throttle_result.message.unwrap_or_default();
506 return Ok(CallToolResult::success(vec![Content::text(msg)]));
507 }
508
509 let throttle_warning =
510 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
511 throttle_result.message.clone()
512 } else {
513 None
514 };
515
516 let config = crate::core::config::Config::load();
517 let minimal = config.minimal_overhead_effective();
518
519 {
520 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
521 let snap = BudgetTracker::global().check();
522 if *snap.worst_level() == BudgetLevel::Exhausted
523 && name != "ctx_session"
524 && name != "ctx_cost"
525 && name != "ctx_metrics"
526 {
527 for (dim, lvl, used, limit) in [
528 (
529 "tokens",
530 &snap.tokens.level,
531 format!("{}", snap.tokens.used),
532 format!("{}", snap.tokens.limit),
533 ),
534 (
535 "shell",
536 &snap.shell.level,
537 format!("{}", snap.shell.used),
538 format!("{}", snap.shell.limit),
539 ),
540 (
541 "cost",
542 &snap.cost.level,
543 format!("${:.2}", snap.cost.used_usd),
544 format!("${:.2}", snap.cost.limit_usd),
545 ),
546 ] {
547 if *lvl == BudgetLevel::Exhausted {
548 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
549 }
550 }
551 let msg = format!(
552 "[BUDGET EXHAUSTED] {}\n\
553 Use `ctx_session action=role` to check/switch roles, \
554 or `ctx_session action=reset` to start fresh.",
555 snap.format_compact()
556 );
557 tracing::warn!(tool = name, "{msg}");
558 return Ok(CallToolResult::success(vec![Content::text(msg)]));
559 }
560 }
561
562 if is_shell_tool_name(name) {
563 crate::core::budget_tracker::BudgetTracker::global().record_shell();
564 }
565
566 let tool_start = std::time::Instant::now();
567 let (mut result_text, tool_saved_tokens) = {
568 use futures::FutureExt;
569 use std::panic::AssertUnwindSafe;
570 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
571 .catch_unwind()
572 .await
573 {
574 Ok(Ok(pair)) => pair,
575 Ok(Err(e)) => return Err(e),
576 Err(panic_payload) => {
577 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
578 (*s).to_string()
579 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
580 s.clone()
581 } else {
582 "unknown".to_string()
583 };
584 tracing::error!(tool = name, "Tool panicked: {detail}");
585 (format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
586 The MCP server is still running. Please retry or use a different approach."), 0)
587 }
588 }
589 };
590
591 let is_raw_shell = name == "ctx_shell" && {
592 let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
593 let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
594 arg_raw
595 || arg_bypass
596 || std::env::var("LEAN_CTX_DISABLED").is_ok()
597 || std::env::var("LEAN_CTX_RAW").is_ok()
598 };
599
600 let pre_terse_len = result_text.len();
601 let output_tokens = {
602 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
603 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
604 tokens
605 };
606
607 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
608
609 if let Some(ref ir) = self.context_ir {
611 let tool_duration = tool_start.elapsed();
612 let source_kind = match name {
613 n if n.contains("read") || n.contains("multi_read") || n.contains("smart_read") => {
614 crate::core::context_ir::ContextIrSourceKindV1::Read
615 }
616 "ctx_shell" => crate::core::context_ir::ContextIrSourceKindV1::Shell,
617 "ctx_search" | "ctx_semantic_search" => {
618 crate::core::context_ir::ContextIrSourceKindV1::Search
619 }
620 "ctx_provider" => crate::core::context_ir::ContextIrSourceKindV1::Provider,
621 _ => crate::core::context_ir::ContextIrSourceKindV1::Other,
622 };
623 let ir_path = helpers::get_str(args, "path");
624 let ir_command = helpers::get_str(args, "command");
625 let ir_mode = helpers::get_str(args, "mode");
626 let excerpt = if result_text.len() > 200 {
627 let mut end = 200;
628 while !result_text.is_char_boundary(end) && end > 0 {
629 end -= 1;
630 }
631 &result_text[..end]
632 } else {
633 &result_text
634 };
635 let input = crate::core::context_ir::RecordIrInput {
636 kind: source_kind,
637 tool: name,
638 client_name: None,
639 agent_id: None,
640 path: ir_path.as_deref(),
641 command: ir_command.as_deref(),
642 pattern: ir_mode.as_deref(),
643 input_tokens: pre_terse_len / 4,
644 output_tokens: output_tokens as usize,
645 duration: tool_duration,
646 content_excerpt: excerpt,
647 };
648 ir.write().await.record(input);
649 }
650
651 {
653 let mut detector = self.loop_detector.write().await;
654 if name == "ctx_read" {
655 let path = helpers::get_str(args, "path").unwrap_or_default();
656 let mode = helpers::get_str(args, "mode").unwrap_or_else(|| "auto".into());
657 let fresh = helpers::get_bool(args, "fresh").unwrap_or(false);
658 detector.record_read_for_correction(&path, &mode, fresh);
659 } else if name == "ctx_shell" {
660 let cmd = helpers::get_str(args, "command").unwrap_or_default();
661 detector.record_shell_for_correction(&cmd);
662 }
663 let correction_count = detector.correction_count();
664 if correction_count > 0 {
665 crate::core::anomaly::record_metric(
666 "correction_loop_rate",
667 f64::from(correction_count),
668 );
669 }
670 use crate::core::config::CompressionLevel;
672 if correction_count >= 5 {
673 CompressionLevel::set_session_degrade(&CompressionLevel::Off);
674 } else if correction_count >= 3 {
675 CompressionLevel::set_session_degrade(&CompressionLevel::Lite);
676 } else if correction_count == 0 {
677 CompressionLevel::clear_session_degrade();
678 }
679 detector.prune_corrections();
680 }
681
682 crate::core::anomaly::save_debounced();
684
685 let budget_warning = {
686 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
687 let snap = BudgetTracker::global().check();
688 if *snap.worst_level() == BudgetLevel::Warning {
689 for (dim, lvl, used, limit, pct) in [
690 (
691 "tokens",
692 &snap.tokens.level,
693 format!("{}", snap.tokens.used),
694 format!("{}", snap.tokens.limit),
695 snap.tokens.percent,
696 ),
697 (
698 "shell",
699 &snap.shell.level,
700 format!("{}", snap.shell.used),
701 format!("{}", snap.shell.limit),
702 snap.shell.percent,
703 ),
704 (
705 "cost",
706 &snap.cost.level,
707 format!("${:.2}", snap.cost.used_usd),
708 format!("${:.2}", snap.cost.limit_usd),
709 snap.cost.percent,
710 ),
711 ] {
712 if *lvl == BudgetLevel::Warning {
713 crate::core::events::emit_budget_warning(
714 &snap.role, dim, &used, &limit, pct,
715 );
716 }
717 }
718 if crate::core::protocol::meta_visible() {
719 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
720 } else {
721 None
722 }
723 } else {
724 None
725 }
726 };
727
728 let archive_hint = if minimal || is_raw_shell {
729 None
730 } else {
731 use crate::core::archive;
732 let archivable = matches!(
733 name,
734 "ctx_shell"
735 | "ctx_read"
736 | "ctx_multi_read"
737 | "ctx_smart_read"
738 | "ctx_execute"
739 | "ctx_search"
740 | "ctx_tree"
741 );
742 if archivable && archive::should_archive(&result_text) {
743 let cmd = helpers::get_str(args, "command")
744 .or_else(|| helpers::get_str(args, "path"))
745 .unwrap_or_default();
746 let session_id = self.session.read().await.id.clone();
747 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
748 let tokens = crate::core::tokens::count_tokens(&to_store);
749 archive::store(name, &cmd, &to_store, Some(&session_id))
750 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
751 } else {
752 None
753 }
754 };
755
756 let pre_compression = result_text.clone();
757 let skip_terse = is_raw_shell
758 || tool_saved_tokens > 0
759 || (name == "ctx_shell"
760 && helpers::get_str(args, "command")
761 .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
762 let compression = crate::core::config::CompressionLevel::effective(&config);
763 if compression.is_active() && !skip_terse {
764 let terse_result =
765 crate::core::terse::pipeline::compress(&result_text, &compression, None);
766 if terse_result.quality_passed && terse_result.savings_pct >= 3.0 {
767 result_text = terse_result.output;
768 }
769 }
770
771 let profile_hints = crate::core::profiles::active_profile().output_hints;
772
773 if !is_raw_shell && profile_hints.verify_footer() {
774 let verify_cfg = crate::core::profiles::active_profile().verification;
775 let vr = crate::core::output_verification::verify_output(
776 &pre_compression,
777 &result_text,
778 &verify_cfg,
779 );
780 if !vr.warnings.is_empty() {
781 let msg = format!("[VERIFY] {}", vr.format_compact());
782 result_text = format!("{result_text}\n\n{msg}");
783 }
784 }
785
786 if profile_hints.archive_hint() {
787 if let Some(hint) = archive_hint {
788 result_text = format!("{result_text}\n{hint}");
789 }
790 }
791
792 if !is_raw_shell {
793 if let Some(ctx) = auto_context {
794 let ctx_tokens = crate::core::tokens::count_tokens(&ctx);
795 if ctx_tokens <= 400 {
796 result_text = format!("{ctx}\n\n{result_text}");
797 }
798 }
799 }
800
801 if let Some(warning) = throttle_warning {
802 result_text = format!("{result_text}\n\n{warning}");
803 }
804
805 if let Some(bw) = budget_warning {
806 result_text = format!("{result_text}\n\n{bw}");
807 }
808
809 if !self
810 .rules_stale_checked
811 .swap(true, std::sync::atomic::Ordering::Relaxed)
812 {
813 let client = self.client_name.read().await.clone();
814 if !client.is_empty() {
815 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
816 result_text = format!("{result_text}\n\n{stale_msg}");
817 }
818 }
819 }
820
821 {
822 let _ = crate::core::slo::evaluate();
824 }
825
826 if name == "ctx_read" {
827 if minimal {
828 let cache_clone = self.cache.clone();
829 let autonomy_clone = self.autonomy.clone();
830 let name_owned = name.to_string();
831 tokio::spawn(async move {
832 let mut cache = cache_clone.write().await;
833 crate::tools::autonomy::maybe_auto_dedup(
834 &autonomy_clone,
835 &mut cache,
836 &name_owned,
837 );
838 });
839 } else {
840 let read_path = self
841 .resolve_path_or_passthrough(
842 &helpers::get_str(args, "path").unwrap_or_default(),
843 )
844 .await;
845 let project_root = {
846 let session = self.session.read().await;
847 session.project_root.clone()
848 };
849
850 let enrich_timeout =
852 tokio::time::timeout(std::time::Duration::from_secs(3), self.cache.write())
853 .await;
854 if let Ok(mut cache) = enrich_timeout {
855 let enrich = crate::tools::autonomy::enrich_after_read(
856 &self.autonomy,
857 &mut cache,
858 &read_path,
859 project_root.as_deref(),
860 None,
861 crate::tools::CrpMode::effective(),
862 false,
863 );
864 if profile_hints.related_hint() {
865 if let Some(hint) = enrich.related_hint {
866 result_text = format!("{result_text}\n{hint}");
867 }
868 }
869 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
870 } else {
871 tracing::warn!(
872 "post-dispatch cache lock timeout (3s) for {read_path}, skipping enrichment"
873 );
874 }
875
876 let ledger_clone = self.ledger.clone();
878 let session_clone = self.session.clone();
879 let peer_clone = self.peer.clone();
880 let read_path_owned = read_path.clone();
881 let project_root_owned = project_root.clone();
882 let mode_used =
883 helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
884 let out_tok = output_tokens as usize;
885 let sent_tok = crate::core::tokens::count_tokens(&result_text);
886 let wants_eviction = true;
887 let wants_elicitation = profile_hints.elicitation_hint();
888 tokio::spawn(async move {
889 let active_task = {
890 let session = session_clone.read().await;
891 session.task.as_ref().map(|t| t.description.clone())
892 };
893 let mut ledger = ledger_clone.write().await;
894 let overlay = crate::core::context_overlay::OverlayStore::load_project(
895 &std::path::PathBuf::from(project_root_owned.as_deref().unwrap_or(".")),
896 );
897 let gate_result = context_gate::post_dispatch_record_with_task(
898 &read_path_owned,
899 &mode_used,
900 out_tok,
901 sent_tok,
902 &mut ledger,
903 &overlay,
904 active_task.as_deref(),
905 );
906 drop(ledger);
907 if wants_eviction {
908 if let Some(hint) = &gate_result.eviction_hint {
909 tracing::debug!("deferred eviction hint: {hint}");
910 }
911 }
912 if wants_elicitation {
913 if let Some(hint) = &gate_result.elicitation_hint {
914 tracing::debug!("deferred elicitation hint: {hint}");
915 }
916 }
917 if gate_result.resource_changed {
918 if let Some(peer) = peer_clone.read().await.as_ref() {
919 notifications::send_resource_updated(
920 peer,
921 notifications::RESOURCE_URI_SUMMARY,
922 )
923 .await;
924 }
925 }
926 });
927 }
928 }
929
930 if !minimal && !is_raw_shell && name == "ctx_shell" {
931 let cmd = helpers::get_str(args, "command").unwrap_or_default();
932
933 if let Some(file_path) = extract_file_read_from_shell(&cmd) {
934 if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
935 bt.next_seq();
936 bt.record_shell_file_access(&file_path);
937 }
938 }
939
940 if profile_hints.efficiency_hint() {
941 let calls = self.tool_calls.read().await;
942 let last_original = calls.last().map_or(0, |c| c.original_tokens);
943 drop(calls);
944 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
945 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
946 &self.autonomy,
947 &cmd,
948 last_original,
949 pre_hint_tokens,
950 ) {
951 result_text = format!("{result_text}\n{hint}");
952 }
953 }
954 }
955
956 if !minimal && !is_raw_shell {
957 bypass_hint::record_lctx_call();
958 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
959 if let Some(hint) = bypass_hint::check(&data_dir) {
960 result_text = format!("{result_text}\n{hint}");
961 }
962 }
963 }
964
965 #[allow(clippy::cast_possible_truncation)]
966 let output_token_count = if result_text.len() == pre_terse_len {
967 output_tokens as usize
968 } else {
969 crate::core::tokens::count_tokens(&result_text)
970 };
971 let action = helpers::get_str(args, "action");
972
973 const K_STALENESS_BOUND: i64 = 10;
975 if self.session_mode == crate::tools::SessionMode::Shared {
976 if let Some(ref rt) = self.context_os {
977 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
978 let cursor = self
979 .last_seen_event_id
980 .load(std::sync::atomic::Ordering::Relaxed);
981 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
982 let gap = latest - cursor;
983 result_text = format!(
984 "[CONTEXT STALE] {gap} events happened since your last read. \
985 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
986 );
987 }
988 self.last_seen_event_id
989 .store(latest, std::sync::atomic::Ordering::Relaxed);
990 }
991 }
992
993 {
994 let input = helpers::canonical_args_string(args);
995 let input_md5 = helpers::hash_fast(&input);
996 let output_md5 = helpers::hash_fast(&result_text);
997 let agent_id = self.agent_id.read().await.clone();
998 let client_name = self.client_name.read().await.clone();
999 let mut explicit_intent: Option<(
1000 crate::core::intent_protocol::IntentRecord,
1001 Option<String>,
1002 String,
1003 )> = None;
1004
1005 let pending_session_save = {
1006 let empty_args = serde_json::Map::new();
1007 let args_map = args.unwrap_or(&empty_args);
1008 let mut session = self.session.write().await;
1009 session.record_tool_receipt(
1010 name,
1011 action.as_deref(),
1012 &input_md5,
1013 &output_md5,
1014 agent_id.as_deref(),
1015 Some(&client_name),
1016 );
1017
1018 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
1019 name,
1020 action.as_deref(),
1021 args_map,
1022 session.project_root.as_deref(),
1023 ) {
1024 let is_explicit =
1025 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
1026 let root = session.project_root.clone();
1027 let sid = session.id.clone();
1028 session.record_intent(intent.clone());
1029 if is_explicit {
1030 explicit_intent = Some((intent, root, sid));
1031 }
1032 }
1033 if session.should_save() {
1034 session.prepare_save().ok()
1035 } else {
1036 None
1037 }
1038 };
1039
1040 if let Some(prepared) = pending_session_save {
1041 let ir_clone = self.context_ir.clone();
1042 tokio::task::spawn_blocking(move || {
1043 let _ = prepared.write_to_disk();
1044 if let Some(ir) = ir_clone {
1045 if let Ok(ir_guard) = ir.try_read() {
1046 ir_guard.save();
1047 }
1048 }
1049 });
1050 }
1051
1052 if let Some((intent, root, session_id)) = explicit_intent {
1053 let _ = crate::core::intent_protocol::apply_side_effects(
1054 &intent,
1055 root.as_deref(),
1056 &session_id,
1057 );
1058 }
1059
1060 if self.autonomy.is_enabled() {
1061 let (calls, project_root) = {
1062 let session = self.session.read().await;
1063 (session.stats.total_tool_calls, session.project_root.clone())
1064 };
1065
1066 if let Some(root) = project_root {
1067 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
1068 let root_clone = root.clone();
1069 tokio::task::spawn_blocking(move || {
1070 let _ = crate::core::consolidation_engine::consolidate_latest(
1071 &root_clone,
1072 crate::core::consolidation_engine::ConsolidationBudgets::default(),
1073 );
1074 });
1075 }
1076 }
1077 }
1078
1079 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
1080 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
1081 let output_token_count_u64 = output_token_count as u64;
1082 let name_owned = name.to_string();
1083 tokio::task::spawn_blocking(move || {
1084 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
1085 let quote = pricing.quote_from_env_or_agent_type(&client_name);
1086 let cost_usd =
1087 quote
1088 .cost
1089 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
1090 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
1091
1092 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
1093 store.record_tool_call(
1094 &agent_key,
1095 &client_name,
1096 &name_owned,
1097 input_token_count,
1098 output_token_count_u64,
1099 0,
1100 );
1101 let _ = store.save();
1102 });
1103 }
1104
1105 if self.session_mode == crate::tools::SessionMode::Shared
1107 && name == "ctx_knowledge"
1108 && action.as_deref() == Some("remember")
1109 {
1110 if let Some(ref rt) = self.context_os {
1111 let my_agent = self.agent_id.read().await.clone();
1112 let category = helpers::get_str(args, "category");
1113 let key = helpers::get_str(args, "key");
1114 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
1115 let recent = rt.bus.recent_by_kind(
1116 &self.workspace_id,
1117 &self.channel_id,
1118 "knowledge_remembered",
1119 20,
1120 );
1121 for ev in &recent {
1122 let p = &ev.payload;
1123 let ev_cat = p.get("category").and_then(|v| v.as_str());
1124 let ev_key = p.get("key").and_then(|v| v.as_str());
1125 let ev_actor = ev.actor.as_deref();
1126 if ev_cat == Some(cat.as_str())
1127 && ev_key == Some(k.as_str())
1128 && ev_actor != my_agent.as_deref()
1129 {
1130 let other = ev_actor.unwrap_or("unknown");
1131 result_text = format!(
1132 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
1133 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
1134 );
1135 break;
1136 }
1137 }
1138 }
1139 }
1140 }
1141
1142 if self.session_mode == crate::tools::SessionMode::Shared {
1144 let ws = self.workspace_id.clone();
1145 let ch = self.channel_id.clone();
1146 let rt = self.context_os.clone();
1147 let agent = self.agent_id.read().await.clone();
1148 let tool = name.to_string();
1149 let tool_action = action.clone();
1150 let tool_path = helpers::get_str(args, "path");
1151 let tool_category = helpers::get_str(args, "category");
1152 let tool_key = helpers::get_str(args, "key");
1153 let session_snapshot = self.session.read().await.clone();
1154 let session_task = session_snapshot.task.clone();
1155 tokio::task::spawn_blocking(move || {
1156 let Some(rt) = rt else {
1157 return;
1158 };
1159 let Some(root) = session_snapshot.project_root.as_deref() else {
1160 return;
1161 };
1162 rt.shared_sessions
1163 .persist_best_effort(root, &ws, &ch, &session_snapshot);
1164 rt.metrics.record_session_persisted();
1165
1166 let mut base_payload = serde_json::json!({
1167 "tool": tool,
1168 "action": tool_action,
1169 });
1170 if let Some(ref p) = tool_path {
1171 base_payload["path"] = serde_json::Value::String(p.clone());
1172 }
1173 if let Some(ref c) = tool_category {
1174 base_payload["category"] = serde_json::Value::String(c.clone());
1175 }
1176 if let Some(ref k) = tool_key {
1177 base_payload["key"] = serde_json::Value::String(k.clone());
1178 }
1179 if let Some(ref t) = session_task {
1180 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1181 }
1182
1183 if rt
1184 .bus
1185 .append(
1186 &ws,
1187 &ch,
1188 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1189 agent.as_deref(),
1190 base_payload.clone(),
1191 )
1192 .is_some()
1193 {
1194 rt.metrics.record_event_appended();
1195 rt.metrics.record_event_broadcast();
1196 }
1197
1198 if let Some(secondary) =
1199 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1200 {
1201 if rt
1202 .bus
1203 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1204 .is_some()
1205 {
1206 rt.metrics.record_event_appended();
1207 rt.metrics.record_event_broadcast();
1208 }
1209 }
1210 });
1211 }
1212
1213 let skip_checkpoint = minimal
1214 || matches!(
1215 name,
1216 "ctx_compress"
1217 | "ctx_metrics"
1218 | "ctx_benchmark"
1219 | "ctx_analyze"
1220 | "ctx_cache"
1221 | "ctx_discover"
1222 | "ctx_dedup"
1223 | "ctx_session"
1224 | "ctx_knowledge"
1225 | "ctx_agent"
1226 | "ctx_share"
1227 | "ctx_gain"
1228 | "ctx_overview"
1229 | "ctx_preload"
1230 | "ctx_cost"
1231 | "ctx_heatmap"
1232 | "ctx_task"
1233 | "ctx_impact"
1234 | "ctx_architecture"
1235 | "ctx_smells"
1236 | "ctx_workflow"
1237 );
1238
1239 if !skip_checkpoint && self.increment_and_check() {
1240 if let Some(checkpoint) = self.auto_checkpoint().await {
1241 let interval = LeanCtxServer::checkpoint_interval_effective();
1242 let hints = crate::core::profiles::active_profile().output_hints;
1243 if hints.checkpoint_in_output() && crate::core::protocol::meta_visible() {
1244 let combined = format!(
1245 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1246 );
1247 return Ok(CallToolResult::success(vec![Content::text(combined)]));
1248 }
1249 }
1250 }
1251
1252 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1253 if tool_duration_ms > 100 {
1254 LeanCtxServer::append_tool_call_log(
1255 name,
1256 tool_duration_ms,
1257 0,
1258 0,
1259 None,
1260 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1261 );
1262 }
1263
1264 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1265 if current_count > 0 && current_count.is_multiple_of(100) {
1266 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1267 }
1268
1269 Ok(CallToolResult::success(vec![Content::text(result_text)]))
1270 }
1271}
1272
1273pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1274 crate::instructions::build_instructions_for_test(crp_mode)
1275}
1276
1277pub fn build_claude_code_instructions_for_test() -> String {
1278 crate::instructions::claude_code_instructions()
1279}
1280
1281const PROJECT_MARKERS: &[&str] = &[
1282 ".git",
1283 "Cargo.toml",
1284 "package.json",
1285 "go.mod",
1286 "pyproject.toml",
1287 "setup.py",
1288 "pom.xml",
1289 "build.gradle",
1290 "Makefile",
1291 ".lean-ctx.toml",
1292];
1293
1294fn has_project_marker(dir: &std::path::Path) -> bool {
1295 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1296}
1297
1298fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1299 if let Some(home) = dirs::home_dir() {
1300 if dir == home {
1301 return true;
1302 }
1303 }
1304 let dir_str = dir.to_string_lossy();
1305 dir_str.ends_with("/.claude")
1306 || dir_str.ends_with("/.codex")
1307 || dir_str.contains("/.claude/")
1308 || dir_str.contains("/.codex/")
1309}
1310
1311fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1312 std::process::Command::new("git")
1313 .args(["rev-parse", "--show-toplevel"])
1314 .current_dir(dir)
1315 .stdout(std::process::Stdio::piped())
1316 .stderr(std::process::Stdio::null())
1317 .output()
1318 .ok()
1319 .and_then(|o| {
1320 if o.status.success() {
1321 String::from_utf8(o.stdout)
1322 .ok()
1323 .map(|s| s.trim().to_string())
1324 } else {
1325 None
1326 }
1327 })
1328}
1329
1330pub fn derive_project_root_from_cwd() -> Option<String> {
1331 let cwd = std::env::current_dir().ok()?;
1332 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1333
1334 if is_home_or_agent_dir(&canonical) {
1335 return git_toplevel_from(&canonical);
1336 }
1337
1338 if has_project_marker(&canonical) {
1339 return Some(canonical.to_string_lossy().to_string());
1340 }
1341
1342 if let Some(git_root) = git_toplevel_from(&canonical) {
1343 return Some(git_root);
1344 }
1345
1346 if let Some(root) = detect_multi_root_workspace(&canonical) {
1347 return Some(root);
1348 }
1349
1350 if !crate::core::pathutil::is_broad_or_unsafe_root(&canonical) {
1354 tracing::info!(
1355 "No project markers found — using CWD as project root: {}",
1356 canonical.display()
1357 );
1358 return Some(canonical.to_string_lossy().to_string());
1359 }
1360
1361 None
1362}
1363
1364#[cfg(test)]
1366use crate::core::pathutil::is_broad_or_unsafe_root;
1367
1368fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1372 let entries = std::fs::read_dir(dir).ok()?;
1373 let mut child_projects: Vec<String> = Vec::new();
1374
1375 for entry in entries.flatten() {
1376 let path = entry.path();
1377 if path.is_dir() && has_project_marker(&path) {
1378 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1379 child_projects.push(canonical.to_string_lossy().to_string());
1380 }
1381 }
1382
1383 if child_projects.len() >= 2 {
1384 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1385 let sep = if cfg!(windows) { ";" } else { ":" };
1386 let merged = if existing.is_empty() {
1387 child_projects.join(sep)
1388 } else {
1389 format!("{existing}{sep}{}", child_projects.join(sep))
1390 };
1391 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1392 tracing::info!(
1393 "Multi-root workspace detected at {}: auto-allowing {} child projects",
1394 dir.display(),
1395 child_projects.len()
1396 );
1397 return Some(dir.to_string_lossy().to_string());
1398 }
1399
1400 None
1401}
1402
1403pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1404 crate::tool_defs::list_all_tool_defs()
1405 .into_iter()
1406 .map(|(name, desc, _)| (name, desc))
1407 .collect()
1408}
1409
1410pub fn tool_schemas_json_for_test() -> String {
1411 crate::tool_defs::list_all_tool_defs()
1412 .iter()
1413 .map(|(name, _, schema)| format!("{name}: {schema}"))
1414 .collect::<Vec<_>>()
1415 .join("\n")
1416}
1417
1418pub const WORKFLOW_PASSTHROUGH_TOOLS: &[&str] = &[
1422 "ctx",
1423 "ctx_workflow",
1424 "ctx_read",
1425 "ctx_multi_read",
1426 "ctx_smart_read",
1427 "ctx_search",
1428 "ctx_tree",
1429 "ctx_session",
1430 "ctx_ledger",
1431];
1432
1433pub fn is_workflow_stale(run: &crate::core::workflow::types::WorkflowRun) -> bool {
1436 let elapsed = chrono::Utc::now()
1437 .signed_duration_since(run.updated_at)
1438 .num_minutes();
1439 elapsed > 30
1440}
1441
1442fn is_shell_tool_name(name: &str) -> bool {
1443 matches!(name, "ctx_shell" | "ctx_execute")
1444}
1445
1446fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1447 let trimmed = cmd.trim();
1448 let parts: Vec<&str> = trimmed.split_whitespace().collect();
1449 if parts.len() < 2 {
1450 return None;
1451 }
1452 let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1453 match bin {
1454 "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1455 let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1456 Some(file_arg.to_string())
1457 }
1458 _ => None,
1459 }
1460}
1461
1462#[cfg(test)]
1463mod tests {
1464 use super::*;
1465
1466 #[test]
1467 fn project_markers_detected() {
1468 let tmp = tempfile::tempdir().unwrap();
1469 let root = tmp.path().join("myproject");
1470 std::fs::create_dir_all(&root).unwrap();
1471 assert!(!has_project_marker(&root));
1472
1473 std::fs::create_dir(root.join(".git")).unwrap();
1474 assert!(has_project_marker(&root));
1475 }
1476
1477 #[test]
1478 fn home_dir_detected_as_agent_dir() {
1479 if let Some(home) = dirs::home_dir() {
1480 assert!(is_home_or_agent_dir(&home));
1481 }
1482 }
1483
1484 #[test]
1485 fn agent_dirs_detected() {
1486 let claude = std::path::PathBuf::from("/home/user/.claude");
1487 assert!(is_home_or_agent_dir(&claude));
1488 let codex = std::path::PathBuf::from("/home/user/.codex");
1489 assert!(is_home_or_agent_dir(&codex));
1490 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1491 assert!(!is_home_or_agent_dir(&project));
1492 }
1493
1494 #[test]
1495 fn test_unified_tool_count() {
1496 let tools = crate::tool_defs::unified_tool_defs();
1497 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1498 }
1499
1500 #[test]
1501 fn test_granular_tool_count() {
1502 let tools = crate::tool_defs::granular_tool_defs();
1503 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1504 }
1505
1506 #[test]
1507 fn test_registry_tool_count_ssot() {
1508 let registry = crate::server::registry::build_registry();
1509 assert_eq!(
1510 registry.len(),
1511 62,
1512 "Registry tool count drift! Update this test AND all docs when adding/removing tools."
1513 );
1514 }
1515
1516 #[test]
1517 fn disabled_tools_filters_list() {
1518 let all = crate::tool_defs::granular_tool_defs();
1519 let total = all.len();
1520 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1521 let filtered: Vec<_> = all
1522 .into_iter()
1523 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1524 .collect();
1525 assert_eq!(filtered.len(), total - 2);
1526 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1527 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1528 }
1529
1530 #[test]
1531 fn empty_disabled_tools_returns_all() {
1532 let all = crate::tool_defs::granular_tool_defs();
1533 let total = all.len();
1534 let disabled: Vec<String> = vec![];
1535 let filtered: Vec<_> = all
1536 .into_iter()
1537 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1538 .collect();
1539 assert_eq!(filtered.len(), total);
1540 }
1541
1542 #[test]
1543 fn misspelled_disabled_tool_is_silently_ignored() {
1544 let all = crate::tool_defs::granular_tool_defs();
1545 let total = all.len();
1546 let disabled = ["ctx_nonexistent_tool".to_string()];
1547 let filtered: Vec<_> = all
1548 .into_iter()
1549 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1550 .collect();
1551 assert_eq!(filtered.len(), total);
1552 }
1553
1554 #[test]
1555 fn detect_multi_root_workspace_with_child_projects() {
1556 let tmp = tempfile::tempdir().unwrap();
1557 let workspace = tmp.path().join("workspace");
1558 std::fs::create_dir_all(&workspace).unwrap();
1559
1560 let proj_a = workspace.join("project-a");
1561 let proj_b = workspace.join("project-b");
1562 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1563 std::fs::create_dir_all(&proj_b).unwrap();
1564 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1565
1566 let result = detect_multi_root_workspace(&workspace);
1567 assert!(
1568 result.is_some(),
1569 "should detect workspace with 2 child projects"
1570 );
1571
1572 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1573 }
1574
1575 #[test]
1576 fn detect_multi_root_workspace_returns_none_for_single_project() {
1577 let tmp = tempfile::tempdir().unwrap();
1578 let workspace = tmp.path().join("workspace");
1579 std::fs::create_dir_all(&workspace).unwrap();
1580
1581 let proj_a = workspace.join("project-a");
1582 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1583
1584 let result = detect_multi_root_workspace(&workspace);
1585 assert!(
1586 result.is_none(),
1587 "should not detect workspace with only 1 child project"
1588 );
1589 }
1590
1591 #[test]
1592 fn is_broad_or_unsafe_root_rejects_home() {
1593 if let Some(home) = dirs::home_dir() {
1594 assert!(is_broad_or_unsafe_root(&home));
1595 }
1596 }
1597
1598 #[test]
1599 fn is_broad_or_unsafe_root_rejects_filesystem_root() {
1600 assert!(is_broad_or_unsafe_root(std::path::Path::new("/")));
1601 }
1602
1603 #[test]
1604 fn is_broad_or_unsafe_root_rejects_agent_dirs() {
1605 assert!(is_broad_or_unsafe_root(std::path::Path::new(
1606 "/home/user/.claude"
1607 )));
1608 assert!(is_broad_or_unsafe_root(std::path::Path::new(
1609 "/home/user/.codex"
1610 )));
1611 }
1612
1613 #[test]
1614 fn is_broad_or_unsafe_root_allows_project_subdir() {
1615 let tmp = tempfile::tempdir().unwrap();
1616 let subdir = tmp.path().join("my-project");
1617 std::fs::create_dir_all(&subdir).unwrap();
1618 assert!(!is_broad_or_unsafe_root(&subdir));
1619 }
1620
1621 #[test]
1622 fn is_broad_or_unsafe_root_allows_tmp_subdirs() {
1623 assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1624 "/tmp/leanctx-test"
1625 )));
1626 assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1627 "/tmp/my-project"
1628 )));
1629 }
1630
1631 #[test]
1632 fn is_broad_or_unsafe_root_allows_home_subdirs() {
1633 if let Some(home) = dirs::home_dir() {
1634 let subdir = home.join("projects").join("my-app");
1635 assert!(!is_broad_or_unsafe_root(&subdir));
1636 }
1637 }
1638
1639 #[test]
1640 fn derive_project_root_falls_back_to_bare_cwd() {
1641 let tmp = tempfile::tempdir().unwrap();
1642 let bare = tmp.path().join("bare-dir");
1643 std::fs::create_dir_all(&bare).unwrap();
1644
1645 let original = std::env::current_dir().unwrap();
1646 std::env::set_current_dir(&bare).unwrap();
1647 let result = derive_project_root_from_cwd();
1648 std::env::set_current_dir(original).unwrap();
1649
1650 assert!(result.is_some(), "bare dir should produce a project root");
1651 let root = result.unwrap();
1652 assert!(
1653 root.contains("bare-dir"),
1654 "fallback should use the bare dir path"
1655 );
1656 }
1657}