1pub mod bounded_lock;
2pub mod bypass_hint;
3pub mod compaction_sync;
4pub mod context_gate;
5mod dispatch;
6pub mod dynamic_tools;
7pub mod elicitation;
8pub(crate) mod execute;
9pub mod helpers;
10pub mod notifications;
11pub mod prompts;
12pub mod reference_store;
13pub mod registry;
14pub mod resources;
15pub mod role_guard;
16pub mod tool_trait;
17
18use rmcp::handler::server::ServerHandler;
19use rmcp::model::{
20 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
21 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
22};
23use rmcp::service::{RequestContext, RoleServer};
24use rmcp::ErrorData;
25
26use crate::tools::{CrpMode, LeanCtxServer};
27
28impl ServerHandler for LeanCtxServer {
29 fn get_info(&self) -> ServerInfo {
30 let capabilities = ServerCapabilities::builder()
31 .enable_tools()
32 .enable_resources()
33 .enable_resources_subscribe()
34 .enable_prompts()
35 .build();
36
37 let config = crate::core::config::Config::load();
38 let level = crate::core::config::CompressionLevel::effective(&config);
39 let _ = crate::core::terse::rules_inject::inject(&level);
40
41 let instructions = crate::instructions::build_instructions(CrpMode::effective());
42
43 InitializeResult::new(capabilities)
44 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
45 .with_instructions(instructions)
46 }
47
48 async fn initialize(
49 &self,
50 request: InitializeRequestParams,
51 context: RequestContext<RoleServer>,
52 ) -> Result<InitializeResult, ErrorData> {
53 let name = request.client_info.name.clone();
54 tracing::info!("MCP client connected: {:?}", name);
55 *self.client_name.write().await = name.clone();
56 *self.peer.write().await = Some(context.peer.clone());
57
58 if self.session_mode != crate::tools::SessionMode::Shared {
59 crate::core::budget_tracker::BudgetTracker::global().reset();
60 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
61 let radar = data_dir.join("context_radar.jsonl");
62 if radar.exists() {
63 let prev = data_dir.join("context_radar.prev.jsonl");
64 let _ = std::fs::rename(&radar, &prev);
65 }
66 }
67 }
68
69 let derived_root = derive_project_root_from_cwd();
70 let cwd_str = std::env::current_dir()
71 .ok()
72 .map(|p| p.to_string_lossy().to_string())
73 .unwrap_or_default();
74 {
75 let mut session = self.session.write().await;
76 if !cwd_str.is_empty() {
77 session.shell_cwd = Some(cwd_str.clone());
78 }
79 if let Some(ref root) = derived_root {
80 session.project_root = Some(root.clone());
81 tracing::info!("Project root set to: {root}");
82 } else if let Some(ref root) = session.project_root {
83 let root_path = std::path::Path::new(root);
84 let root_has_marker = has_project_marker(root_path);
85 let root_str = root_path.to_string_lossy();
86 let root_suspicious = root_str.contains("/.claude")
87 || root_str.contains("/.codex")
88 || root_str.contains("/var/folders/")
89 || root_str.contains("/tmp/")
90 || root_str.contains("\\.claude")
91 || root_str.contains("\\.codex")
92 || root_str.contains("\\AppData\\Local\\Temp")
93 || root_str.contains("\\Temp\\");
94 if root_suspicious && !root_has_marker {
95 session.project_root = None;
96 }
97 }
98 if self.session_mode == crate::tools::SessionMode::Shared {
99 if let Some(ref root) = session.project_root {
100 if let Some(ref rt) = self.context_os {
101 rt.shared_sessions.persist_best_effort(
102 root,
103 &self.workspace_id,
104 &self.channel_id,
105 &session,
106 );
107 rt.metrics.record_session_persisted();
108 }
109 }
110 } else {
111 let _ = session.save();
112 }
113 }
114
115 let agent_name = name.clone();
116 let agent_root = derived_root.clone().unwrap_or_default();
117 let agent_id_handle = self.agent_id.clone();
118 tokio::task::spawn_blocking(move || {
119 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
120 return;
121 }
122
123 let maintenance = crate::core::startup_guard::try_acquire_lock(
127 "startup-maintenance",
128 std::time::Duration::from_secs(2),
129 std::time::Duration::from_mins(2),
130 );
131 if maintenance.is_some() {
132 if let Some(home) = dirs::home_dir() {
133 let _ = crate::rules_inject::inject_all_rules(&home);
134 }
135 crate::hooks::refresh_installed_hooks();
136 crate::core::version_check::check_background();
137 }
138 drop(maintenance);
139
140 if !agent_root.is_empty() {
141 let heuristic_role = match agent_name.to_lowercase().as_str() {
142 n if n.contains("cursor") => Some("coder"),
143 n if n.contains("claude") => Some("coder"),
144 n if n.contains("codex") => Some("coder"),
145 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
146 n if n.contains("review") => Some("reviewer"),
147 n if n.contains("test") => Some("debugger"),
148 _ => None,
149 };
150 let env_role = std::env::var("LEAN_CTX_ROLE")
151 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
152 .ok();
153 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
154
155 let _ = crate::core::roles::set_active_role(effective_role);
156
157 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
158 registry.cleanup_stale(24);
159 let id = registry.register("mcp", Some(effective_role), &agent_root);
160 let _ = registry.save();
161 if let Ok(mut guard) = agent_id_handle.try_write() {
162 *guard = Some(id);
163 }
164 }
165 });
166
167 let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
168 tracing::info!("Client capabilities: {}", client_caps.format_summary());
169
170 {
171 let cfg = crate::core::config::Config::load();
172 let cats = cfg.default_tool_categories_effective();
173 dynamic_tools::init_from_config(&cats);
174 }
175
176 if client_caps.dynamic_tools {
177 if let Ok(mut dt) = dynamic_tools::global().lock() {
178 dt.set_supports_list_changed(true);
179 }
180 }
181 if let Some(max) = client_caps.max_tools {
182 if let Ok(mut dt) = dynamic_tools::global().lock() {
183 dt.set_supports_list_changed(true);
184 if max < 100 {
185 dt.unload_category(dynamic_tools::ToolCategory::Debug);
186 dt.unload_category(dynamic_tools::ToolCategory::Memory);
187 }
188 }
189 }
190
191 crate::core::client_capabilities::set_detected(&client_caps);
192
193 let instructions =
194 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
195
196 let capabilities = match (client_caps.resources, client_caps.prompts) {
197 (true, true) => ServerCapabilities::builder()
198 .enable_tools()
199 .enable_resources()
200 .enable_resources_subscribe()
201 .enable_prompts()
202 .build(),
203 (true, false) => ServerCapabilities::builder()
204 .enable_tools()
205 .enable_resources()
206 .enable_resources_subscribe()
207 .build(),
208 (false, true) => ServerCapabilities::builder()
209 .enable_tools()
210 .enable_prompts()
211 .build(),
212 (false, false) => ServerCapabilities::builder().enable_tools().build(),
213 };
214
215 Ok(InitializeResult::new(capabilities)
216 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
217 .with_instructions(instructions))
218 }
219
220 async fn list_tools(
221 &self,
222 _request: Option<PaginatedRequestParams>,
223 _context: RequestContext<RoleServer>,
224 ) -> Result<ListToolsResult, ErrorData> {
225 let all_tools = if crate::tool_defs::is_full_mode() {
226 if let Some(ref reg) = self.registry {
227 reg.tool_defs()
228 } else {
229 crate::tool_defs::granular_tool_defs()
230 }
231 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
232 crate::tool_defs::unified_tool_defs()
233 } else if let Some(ref reg) = self.registry {
234 let core_names = crate::tool_defs::core_tool_names();
235 reg.tool_defs()
236 .into_iter()
237 .filter(|t| core_names.contains(&t.name.as_ref()))
238 .collect()
239 } else {
240 crate::tool_defs::lazy_tool_defs()
241 };
242
243 let disabled = crate::core::config::Config::load().disabled_tools_effective();
244 let client = self.client_name.read().await.clone();
245 let is_zed = !client.is_empty() && client.to_lowercase().contains("zed");
246
247 let tools: Vec<_> = all_tools
248 .into_iter()
249 .filter(|t| {
250 let name = t.name.as_ref();
251 if !disabled.is_empty() && disabled.iter().any(|d| d.as_str() == name) {
252 return false;
253 }
254 if is_zed && name == "ctx_edit" {
255 return false;
256 }
257 true
258 })
259 .collect();
260
261 let tools = {
262 let Ok(dyn_state) = dynamic_tools::global().lock() else {
263 tracing::warn!("dynamic_tools mutex poisoned in list_tools; returning unfiltered");
264 return Ok(ListToolsResult {
265 tools,
266 ..Default::default()
267 });
268 };
269 if dyn_state.supports_list_changed() {
270 tools
271 .into_iter()
272 .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
273 .collect()
274 } else {
275 tools
276 }
277 };
278
279 let tools = {
280 let active = self.workflow.read().await.clone();
281 if let Some(run) = active {
282 if run.current == "done" || is_workflow_stale(&run) {
283 let mut wf = self.workflow.write().await;
284 *wf = None;
285 let _ = crate::core::workflow::clear_active();
286 } else if let Some(state) = run.spec.state(&run.current) {
287 if let Some(allowed) = &state.allowed_tools {
288 let mut allow: std::collections::HashSet<&str> =
289 allowed.iter().map(std::string::String::as_str).collect();
290 for passthrough in WORKFLOW_PASSTHROUGH_TOOLS {
291 allow.insert(passthrough);
292 }
293 return Ok(ListToolsResult {
294 tools: tools
295 .into_iter()
296 .filter(|t| allow.contains(t.name.as_ref()))
297 .collect(),
298 ..Default::default()
299 });
300 }
301 }
302 }
303 tools
304 };
305
306 let tools = {
307 let cfg = crate::core::config::Config::load();
308 let level = crate::core::config::CompressionLevel::effective(&cfg);
309 let mode =
310 crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
311 if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
312 tools
313 } else {
314 tools
315 .into_iter()
316 .map(|mut t| {
317 let compressed = crate::core::terse::mcp_compress::compress_description(
318 t.name.as_ref(),
319 t.description.as_deref().unwrap_or(""),
320 mode,
321 );
322 t.description = Some(compressed.into());
323 t
324 })
325 .collect()
326 }
327 };
328
329 Ok(ListToolsResult {
330 tools,
331 ..Default::default()
332 })
333 }
334
335 async fn list_prompts(
336 &self,
337 _request: Option<PaginatedRequestParams>,
338 _context: RequestContext<RoleServer>,
339 ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
340 Ok(rmcp::model::ListPromptsResult::with_all_items(
341 prompts::list_prompts(),
342 ))
343 }
344
345 async fn get_prompt(
346 &self,
347 request: rmcp::model::GetPromptRequestParams,
348 _context: RequestContext<RoleServer>,
349 ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
350 let ledger = self.ledger.read().await;
351 match prompts::get_prompt(&request, &ledger) {
352 Some(result) => Ok(result),
353 None => Err(ErrorData::invalid_params(
354 format!("Unknown prompt: {}", request.name),
355 None,
356 )),
357 }
358 }
359
360 async fn list_resources(
361 &self,
362 _request: Option<PaginatedRequestParams>,
363 _context: RequestContext<RoleServer>,
364 ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
365 Ok(rmcp::model::ListResourcesResult::with_all_items(
366 resources::list_resources(),
367 ))
368 }
369
370 async fn read_resource(
371 &self,
372 request: rmcp::model::ReadResourceRequestParams,
373 _context: RequestContext<RoleServer>,
374 ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
375 let ledger = self.ledger.read().await;
376 match resources::read_resource(&request.uri, &ledger) {
377 Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
378 None => Err(rmcp::ErrorData::resource_not_found(
379 format!("Unknown resource: {}", request.uri),
380 None,
381 )),
382 }
383 }
384
385 async fn call_tool(
386 &self,
387 request: CallToolRequestParams,
388 _context: RequestContext<RoleServer>,
389 ) -> Result<CallToolResult, ErrorData> {
390 self.check_idle_expiry().await;
391 elicitation::increment_call();
392
393 let original_name = request.name.as_ref().to_string();
394 let (resolved_name, resolved_args) = if original_name == "ctx" {
395 let sub = request
396 .arguments
397 .as_ref()
398 .and_then(|a| a.get("tool"))
399 .and_then(|v| v.as_str())
400 .map(std::string::ToString::to_string)
401 .ok_or_else(|| {
402 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
403 })?;
404 let tool_name = if sub.starts_with("ctx_") {
405 sub
406 } else {
407 format!("ctx_{sub}")
408 };
409 let mut args = request.arguments.unwrap_or_default();
410 args.remove("tool");
411 (tool_name, Some(args))
412 } else {
413 (original_name, request.arguments)
414 };
415 let name = resolved_name.as_str();
416 let args = resolved_args.as_ref();
417
418 let role_check = role_guard::check_tool_access(name);
419 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
420 tracing::warn!(
421 tool = name,
422 role = %role_check.role_name,
423 "Tool blocked by role policy"
424 );
425 return Ok(denied);
426 }
427
428 if name != "ctx_workflow" {
429 let active = self.workflow.read().await.clone();
430 if let Some(run) = active {
431 if run.current == "done" || is_workflow_stale(&run) {
432 let mut wf = self.workflow.write().await;
433 *wf = None;
434 let _ = crate::core::workflow::clear_active();
435 } else if !WORKFLOW_PASSTHROUGH_TOOLS.contains(&name) {
436 if let Some(state) = run.spec.state(&run.current) {
437 if let Some(allowed) = &state.allowed_tools {
438 let allowed_ok = allowed.iter().any(|t| t == name);
439 if !allowed_ok {
440 let mut shown = allowed.clone();
441 shown.sort();
442 shown.truncate(30);
443 return Ok(CallToolResult::success(vec![Content::text(format!(
444 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed: {}. Use ctx_workflow(action=\"stop\") to exit.",
445 run.spec.name,
446 run.current,
447 shown.join(", ")
448 ))]));
449 }
450 }
451 }
452 }
453 }
454 }
455
456 let auto_context = {
457 let task = {
458 let session = self.session.read().await;
459 session.task.as_ref().map(|t| t.description.clone())
460 };
461 let project_root = {
462 let session = self.session.read().await;
463 session.project_root.clone()
464 };
465 let mut cache = self.cache.write().await;
466 crate::tools::autonomy::session_lifecycle_pre_hook(
467 &self.autonomy,
468 name,
469 &mut cache,
470 task.as_deref(),
471 project_root.as_deref(),
472 CrpMode::effective(),
473 )
474 };
475
476 let throttle_result = {
477 let fp = args
478 .map(|a| {
479 crate::core::loop_detection::LoopDetector::fingerprint(
480 &serde_json::Value::Object(a.clone()),
481 )
482 })
483 .unwrap_or_default();
484 let mut detector = self.loop_detector.write().await;
485
486 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
487 let is_search_shell = name == "ctx_shell" && {
488 let cmd = args
489 .as_ref()
490 .and_then(|a| a.get("command"))
491 .and_then(|v| v.as_str())
492 .unwrap_or("");
493 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
494 };
495
496 if is_search || is_search_shell {
497 let search_pattern = args.and_then(|a| {
498 a.get("pattern")
499 .or_else(|| a.get("query"))
500 .and_then(|v| v.as_str())
501 });
502 let shell_pattern = if is_search_shell {
503 args.and_then(|a| a.get("command"))
504 .and_then(|v| v.as_str())
505 .and_then(helpers::extract_search_pattern_from_command)
506 } else {
507 None
508 };
509 let pat = search_pattern.or(shell_pattern.as_deref());
510 detector.record_search(name, &fp, pat)
511 } else {
512 detector.record_call(name, &fp)
513 }
514 };
515
516 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
517 let msg = throttle_result.message.unwrap_or_default();
518 return Ok(CallToolResult::success(vec![Content::text(msg)]));
519 }
520
521 let throttle_warning =
522 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
523 throttle_result.message.clone()
524 } else {
525 None
526 };
527
528 let config = crate::core::config::Config::load();
529 let minimal = config.minimal_overhead_effective();
530
531 {
532 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
533 let snap = BudgetTracker::global().check();
534 if *snap.worst_level() == BudgetLevel::Exhausted
535 && name != "ctx_session"
536 && name != "ctx_cost"
537 && name != "ctx_metrics"
538 {
539 for (dim, lvl, used, limit) in [
540 (
541 "tokens",
542 &snap.tokens.level,
543 format!("{}", snap.tokens.used),
544 format!("{}", snap.tokens.limit),
545 ),
546 (
547 "shell",
548 &snap.shell.level,
549 format!("{}", snap.shell.used),
550 format!("{}", snap.shell.limit),
551 ),
552 (
553 "cost",
554 &snap.cost.level,
555 format!("${:.2}", snap.cost.used_usd),
556 format!("${:.2}", snap.cost.limit_usd),
557 ),
558 ] {
559 if *lvl == BudgetLevel::Exhausted {
560 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
561 }
562 }
563 let msg = format!(
564 "[BUDGET EXHAUSTED] {}\n\
565 Use `ctx_session action=role` to check/switch roles, \
566 or `ctx_session action=reset` to start fresh.",
567 snap.format_compact()
568 );
569 tracing::warn!(tool = name, "{msg}");
570 return Ok(CallToolResult::success(vec![Content::text(msg)]));
571 }
572 }
573
574 if is_shell_tool_name(name) {
575 crate::core::budget_tracker::BudgetTracker::global().record_shell();
576 }
577
578 let tool_start = std::time::Instant::now();
579 let (mut result_text, tool_saved_tokens) = {
580 use futures::FutureExt;
581 use std::panic::AssertUnwindSafe;
582 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
583 .catch_unwind()
584 .await
585 {
586 Ok(Ok(pair)) => pair,
587 Ok(Err(e)) => return Err(e),
588 Err(panic_payload) => {
589 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
590 (*s).to_string()
591 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
592 s.clone()
593 } else {
594 "unknown".to_string()
595 };
596 tracing::error!(tool = name, "Tool panicked: {detail}");
597 (format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
598 The MCP server is still running. Please retry or use a different approach."), 0)
599 }
600 }
601 };
602
603 let is_raw_shell = name == "ctx_shell" && {
604 let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
605 let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
606 arg_raw
607 || arg_bypass
608 || std::env::var("LEAN_CTX_DISABLED").is_ok()
609 || std::env::var("LEAN_CTX_RAW").is_ok()
610 };
611
612 let pre_terse_len = result_text.len();
613 let output_tokens = {
614 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
615 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
616 tokens
617 };
618
619 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
620
621 if let Some(ref ir) = self.context_ir {
623 let tool_duration = tool_start.elapsed();
624 let source_kind = match name {
625 n if n.contains("read") || n.contains("multi_read") || n.contains("smart_read") => {
626 crate::core::context_ir::ContextIrSourceKindV1::Read
627 }
628 "ctx_shell" => crate::core::context_ir::ContextIrSourceKindV1::Shell,
629 "ctx_search" | "ctx_semantic_search" => {
630 crate::core::context_ir::ContextIrSourceKindV1::Search
631 }
632 "ctx_provider" => crate::core::context_ir::ContextIrSourceKindV1::Provider,
633 _ => crate::core::context_ir::ContextIrSourceKindV1::Other,
634 };
635 let ir_path = helpers::get_str(args, "path");
636 let ir_command = helpers::get_str(args, "command");
637 let ir_mode = helpers::get_str(args, "mode");
638 let excerpt = if result_text.len() > 200 {
639 let mut end = 200;
640 while !result_text.is_char_boundary(end) && end > 0 {
641 end -= 1;
642 }
643 &result_text[..end]
644 } else {
645 &result_text
646 };
647 let input = crate::core::context_ir::RecordIrInput {
648 kind: source_kind,
649 tool: name,
650 client_name: None,
651 agent_id: None,
652 path: ir_path.as_deref(),
653 command: ir_command.as_deref(),
654 pattern: ir_mode.as_deref(),
655 input_tokens: pre_terse_len / 4,
656 output_tokens: output_tokens as usize,
657 duration: tool_duration,
658 content_excerpt: excerpt,
659 };
660 ir.write().await.record(input);
661 }
662
663 {
665 let mut detector = self.loop_detector.write().await;
666 if name == "ctx_read" {
667 let path = helpers::get_str(args, "path").unwrap_or_default();
668 let mode = helpers::get_str(args, "mode").unwrap_or_else(|| "auto".into());
669 let fresh = helpers::get_bool(args, "fresh").unwrap_or(false);
670 detector.record_read_for_correction(&path, &mode, fresh);
671 } else if name == "ctx_shell" {
672 let cmd = helpers::get_str(args, "command").unwrap_or_default();
673 detector.record_shell_for_correction(&cmd);
674 }
675 let correction_count = detector.correction_count();
676 if correction_count > 0 {
677 crate::core::anomaly::record_metric(
678 "correction_loop_rate",
679 f64::from(correction_count),
680 );
681 }
682 use crate::core::config::CompressionLevel;
684 if correction_count >= 5 {
685 CompressionLevel::set_session_degrade(&CompressionLevel::Off);
686 } else if correction_count >= 3 {
687 CompressionLevel::set_session_degrade(&CompressionLevel::Lite);
688 } else if correction_count == 0 {
689 CompressionLevel::clear_session_degrade();
690 }
691 detector.prune_corrections();
692 }
693
694 crate::core::anomaly::save_debounced();
696
697 let budget_warning = {
698 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
699 let snap = BudgetTracker::global().check();
700 if *snap.worst_level() == BudgetLevel::Warning {
701 for (dim, lvl, used, limit, pct) in [
702 (
703 "tokens",
704 &snap.tokens.level,
705 format!("{}", snap.tokens.used),
706 format!("{}", snap.tokens.limit),
707 snap.tokens.percent,
708 ),
709 (
710 "shell",
711 &snap.shell.level,
712 format!("{}", snap.shell.used),
713 format!("{}", snap.shell.limit),
714 snap.shell.percent,
715 ),
716 (
717 "cost",
718 &snap.cost.level,
719 format!("${:.2}", snap.cost.used_usd),
720 format!("${:.2}", snap.cost.limit_usd),
721 snap.cost.percent,
722 ),
723 ] {
724 if *lvl == BudgetLevel::Warning {
725 crate::core::events::emit_budget_warning(
726 &snap.role, dim, &used, &limit, pct,
727 );
728 }
729 }
730 if crate::core::protocol::meta_visible() {
731 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
732 } else {
733 None
734 }
735 } else {
736 None
737 }
738 };
739
740 let archive_hint = if minimal || is_raw_shell {
741 None
742 } else {
743 use crate::core::archive;
744 let archivable = matches!(
745 name,
746 "ctx_shell"
747 | "ctx_read"
748 | "ctx_multi_read"
749 | "ctx_smart_read"
750 | "ctx_execute"
751 | "ctx_search"
752 | "ctx_tree"
753 );
754 if archivable && archive::should_archive(&result_text) {
755 let cmd = helpers::get_str(args, "command")
756 .or_else(|| helpers::get_str(args, "path"))
757 .unwrap_or_default();
758 let session_id = self.session.read().await.id.clone();
759 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
760 let tokens = crate::core::tokens::count_tokens(&to_store);
761 archive::store(name, &cmd, &to_store, Some(&session_id))
762 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
763 } else {
764 None
765 }
766 };
767
768 let pre_compression = result_text.clone();
769 let skip_terse = is_raw_shell
770 || tool_saved_tokens > 0
771 || (name == "ctx_shell"
772 && helpers::get_str(args, "command")
773 .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
774 let compression = crate::core::config::CompressionLevel::effective(&config);
775 if compression.is_active() && !skip_terse {
776 let terse_result =
777 crate::core::terse::pipeline::compress(&result_text, &compression, None);
778 if terse_result.quality_passed && terse_result.savings_pct >= 3.0 {
779 result_text = terse_result.output;
780 }
781 }
782
783 let profile_hints = crate::core::profiles::active_profile().output_hints;
784
785 if !is_raw_shell && profile_hints.verify_footer() {
786 let verify_cfg = crate::core::profiles::active_profile().verification;
787 let vr = crate::core::output_verification::verify_output(
788 &pre_compression,
789 &result_text,
790 &verify_cfg,
791 );
792 if !vr.warnings.is_empty() {
793 let msg = format!("[VERIFY] {}", vr.format_compact());
794 result_text = format!("{result_text}\n\n{msg}");
795 }
796 }
797
798 if profile_hints.archive_hint() {
799 if let Some(hint) = archive_hint {
800 result_text = format!("{result_text}\n{hint}");
801 }
802 }
803
804 if !is_raw_shell {
805 if let Some(ctx) = auto_context {
806 let ctx_tokens = crate::core::tokens::count_tokens(&ctx);
807 if ctx_tokens <= 400 {
808 result_text = format!("{ctx}\n\n{result_text}");
809 }
810 }
811 }
812
813 if let Some(warning) = throttle_warning {
814 result_text = format!("{result_text}\n\n{warning}");
815 }
816
817 if let Some(bw) = budget_warning {
818 result_text = format!("{result_text}\n\n{bw}");
819 }
820
821 if !self
822 .rules_stale_checked
823 .swap(true, std::sync::atomic::Ordering::Relaxed)
824 {
825 let client = self.client_name.read().await.clone();
826 if !client.is_empty() {
827 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
828 result_text = format!("{result_text}\n\n{stale_msg}");
829 }
830 }
831 }
832
833 {
834 let _ = crate::core::slo::evaluate();
836 }
837
838 if name == "ctx_read" {
839 if minimal {
840 let cache_clone = self.cache.clone();
841 let autonomy_clone = self.autonomy.clone();
842 let name_owned = name.to_string();
843 tokio::spawn(async move {
844 let mut cache = cache_clone.write().await;
845 crate::tools::autonomy::maybe_auto_dedup(
846 &autonomy_clone,
847 &mut cache,
848 &name_owned,
849 );
850 });
851 } else {
852 let read_path = self
853 .resolve_path_or_passthrough(
854 &helpers::get_str(args, "path").unwrap_or_default(),
855 )
856 .await;
857 let project_root = {
858 let session = self.session.read().await;
859 session.project_root.clone()
860 };
861
862 let enrich_timeout =
864 tokio::time::timeout(std::time::Duration::from_secs(3), self.cache.write())
865 .await;
866 if let Ok(mut cache) = enrich_timeout {
867 let enrich = crate::tools::autonomy::enrich_after_read(
868 &self.autonomy,
869 &mut cache,
870 &read_path,
871 project_root.as_deref(),
872 None,
873 crate::tools::CrpMode::effective(),
874 false,
875 );
876 if profile_hints.related_hint() {
877 if let Some(hint) = enrich.related_hint {
878 result_text = format!("{result_text}\n{hint}");
879 }
880 }
881 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
882 } else {
883 tracing::warn!(
884 "post-dispatch cache lock timeout (3s) for {read_path}, skipping enrichment"
885 );
886 }
887
888 let ledger_clone = self.ledger.clone();
890 let session_clone = self.session.clone();
891 let peer_clone = self.peer.clone();
892 let read_path_owned = read_path.clone();
893 let project_root_owned = project_root.clone();
894 let mode_used =
895 helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
896 let out_tok = output_tokens as usize;
897 let sent_tok = crate::core::tokens::count_tokens(&result_text);
898 let wants_eviction = true;
899 let wants_elicitation = profile_hints.elicitation_hint();
900 tokio::spawn(async move {
901 let active_task = {
902 let session = session_clone.read().await;
903 session.task.as_ref().map(|t| t.description.clone())
904 };
905 let mut ledger = ledger_clone.write().await;
906 let overlay = crate::core::context_overlay::OverlayStore::load_project(
907 &std::path::PathBuf::from(project_root_owned.as_deref().unwrap_or(".")),
908 );
909 let gate_result = context_gate::post_dispatch_record_with_task(
910 &read_path_owned,
911 &mode_used,
912 out_tok,
913 sent_tok,
914 &mut ledger,
915 &overlay,
916 active_task.as_deref(),
917 );
918 drop(ledger);
919 if wants_eviction {
920 if let Some(hint) = &gate_result.eviction_hint {
921 tracing::debug!("deferred eviction hint: {hint}");
922 }
923 }
924 if wants_elicitation {
925 if let Some(hint) = &gate_result.elicitation_hint {
926 tracing::debug!("deferred elicitation hint: {hint}");
927 }
928 }
929 if gate_result.resource_changed {
930 if let Some(peer) = peer_clone.read().await.as_ref() {
931 notifications::send_resource_updated(
932 peer,
933 notifications::RESOURCE_URI_SUMMARY,
934 )
935 .await;
936 }
937 }
938 });
939 }
940 }
941
942 if !minimal && !is_raw_shell && name == "ctx_shell" {
943 let cmd = helpers::get_str(args, "command").unwrap_or_default();
944
945 if let Some(file_path) = extract_file_read_from_shell(&cmd) {
946 if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
947 bt.next_seq();
948 bt.record_shell_file_access(&file_path);
949 }
950 }
951
952 if profile_hints.efficiency_hint() {
953 let calls = self.tool_calls.read().await;
954 let last_original = calls.last().map_or(0, |c| c.original_tokens);
955 drop(calls);
956 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
957 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
958 &self.autonomy,
959 &cmd,
960 last_original,
961 pre_hint_tokens,
962 ) {
963 result_text = format!("{result_text}\n{hint}");
964 }
965 }
966 }
967
968 if !minimal && !is_raw_shell {
969 bypass_hint::record_lctx_call();
970 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
971 if let Some(hint) = bypass_hint::check(&data_dir) {
972 result_text = format!("{result_text}\n{hint}");
973 }
974 }
975 }
976
977 #[allow(clippy::cast_possible_truncation)]
978 let output_token_count = if result_text.len() == pre_terse_len {
979 output_tokens as usize
980 } else {
981 crate::core::tokens::count_tokens(&result_text)
982 };
983 let action = helpers::get_str(args, "action");
984
985 const K_STALENESS_BOUND: i64 = 10;
987 if self.session_mode == crate::tools::SessionMode::Shared {
988 if let Some(ref rt) = self.context_os {
989 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
990 let cursor = self
991 .last_seen_event_id
992 .load(std::sync::atomic::Ordering::Relaxed);
993 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
994 let gap = latest - cursor;
995 result_text = format!(
996 "[CONTEXT STALE] {gap} events happened since your last read. \
997 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
998 );
999 }
1000 self.last_seen_event_id
1001 .store(latest, std::sync::atomic::Ordering::Relaxed);
1002 }
1003 }
1004
1005 {
1006 let input = helpers::canonical_args_string(args);
1007 let input_md5 = helpers::hash_fast(&input);
1008 let output_md5 = helpers::hash_fast(&result_text);
1009 let agent_id = self.agent_id.read().await.clone();
1010 let client_name = self.client_name.read().await.clone();
1011 let mut explicit_intent: Option<(
1012 crate::core::intent_protocol::IntentRecord,
1013 Option<String>,
1014 String,
1015 )> = None;
1016
1017 let pending_session_save = {
1018 let empty_args = serde_json::Map::new();
1019 let args_map = args.unwrap_or(&empty_args);
1020 let mut session = self.session.write().await;
1021 session.record_tool_receipt(
1022 name,
1023 action.as_deref(),
1024 &input_md5,
1025 &output_md5,
1026 agent_id.as_deref(),
1027 Some(&client_name),
1028 );
1029
1030 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
1031 name,
1032 action.as_deref(),
1033 args_map,
1034 session.project_root.as_deref(),
1035 ) {
1036 let is_explicit =
1037 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
1038 let root = session.project_root.clone();
1039 let sid = session.id.clone();
1040 session.record_intent(intent.clone());
1041 if is_explicit {
1042 explicit_intent = Some((intent, root, sid));
1043 }
1044 }
1045 if session.should_save() {
1046 session.prepare_save().ok()
1047 } else {
1048 None
1049 }
1050 };
1051
1052 if let Some(prepared) = pending_session_save {
1053 let ir_clone = self.context_ir.clone();
1054 tokio::task::spawn_blocking(move || {
1055 let _ = prepared.write_to_disk();
1056 if let Some(ir) = ir_clone {
1057 if let Ok(ir_guard) = ir.try_read() {
1058 ir_guard.save();
1059 }
1060 }
1061 });
1062 }
1063
1064 if let Some((intent, root, session_id)) = explicit_intent {
1065 let _ = crate::core::intent_protocol::apply_side_effects(
1066 &intent,
1067 root.as_deref(),
1068 &session_id,
1069 );
1070 }
1071
1072 if self.autonomy.is_enabled() {
1073 let (calls, project_root) = {
1074 let session = self.session.read().await;
1075 (session.stats.total_tool_calls, session.project_root.clone())
1076 };
1077
1078 if let Some(root) = project_root {
1079 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
1080 let root_clone = root.clone();
1081 tokio::task::spawn_blocking(move || {
1082 let _ = crate::core::consolidation_engine::consolidate_latest(
1083 &root_clone,
1084 crate::core::consolidation_engine::ConsolidationBudgets::default(),
1085 );
1086 });
1087 }
1088 }
1089 }
1090
1091 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
1092 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
1093 let output_token_count_u64 = output_token_count as u64;
1094 let name_owned = name.to_string();
1095 tokio::task::spawn_blocking(move || {
1096 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
1097 let quote = pricing.quote_from_env_or_agent_type(&client_name);
1098 let cost_usd =
1099 quote
1100 .cost
1101 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
1102 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
1103
1104 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
1105 store.record_tool_call(
1106 &agent_key,
1107 &client_name,
1108 &name_owned,
1109 input_token_count,
1110 output_token_count_u64,
1111 0,
1112 );
1113 let _ = store.save();
1114 });
1115 }
1116
1117 if self.session_mode == crate::tools::SessionMode::Shared
1119 && name == "ctx_knowledge"
1120 && action.as_deref() == Some("remember")
1121 {
1122 if let Some(ref rt) = self.context_os {
1123 let my_agent = self.agent_id.read().await.clone();
1124 let category = helpers::get_str(args, "category");
1125 let key = helpers::get_str(args, "key");
1126 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
1127 let recent = rt.bus.recent_by_kind(
1128 &self.workspace_id,
1129 &self.channel_id,
1130 "knowledge_remembered",
1131 20,
1132 );
1133 for ev in &recent {
1134 let p = &ev.payload;
1135 let ev_cat = p.get("category").and_then(|v| v.as_str());
1136 let ev_key = p.get("key").and_then(|v| v.as_str());
1137 let ev_actor = ev.actor.as_deref();
1138 if ev_cat == Some(cat.as_str())
1139 && ev_key == Some(k.as_str())
1140 && ev_actor != my_agent.as_deref()
1141 {
1142 let other = ev_actor.unwrap_or("unknown");
1143 result_text = format!(
1144 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
1145 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
1146 );
1147 break;
1148 }
1149 }
1150 }
1151 }
1152 }
1153
1154 if self.session_mode == crate::tools::SessionMode::Shared {
1156 let ws = self.workspace_id.clone();
1157 let ch = self.channel_id.clone();
1158 let rt = self.context_os.clone();
1159 let agent = self.agent_id.read().await.clone();
1160 let tool = name.to_string();
1161 let tool_action = action.clone();
1162 let tool_path = helpers::get_str(args, "path");
1163 let tool_category = helpers::get_str(args, "category");
1164 let tool_key = helpers::get_str(args, "key");
1165 let session_snapshot = self.session.read().await.clone();
1166 let session_task = session_snapshot.task.clone();
1167 tokio::task::spawn_blocking(move || {
1168 let Some(rt) = rt else {
1169 return;
1170 };
1171 let Some(root) = session_snapshot.project_root.as_deref() else {
1172 return;
1173 };
1174 rt.shared_sessions
1175 .persist_best_effort(root, &ws, &ch, &session_snapshot);
1176 rt.metrics.record_session_persisted();
1177
1178 let mut base_payload = serde_json::json!({
1179 "tool": tool,
1180 "action": tool_action,
1181 });
1182 if let Some(ref p) = tool_path {
1183 base_payload["path"] = serde_json::Value::String(p.clone());
1184 }
1185 if let Some(ref c) = tool_category {
1186 base_payload["category"] = serde_json::Value::String(c.clone());
1187 }
1188 if let Some(ref k) = tool_key {
1189 base_payload["key"] = serde_json::Value::String(k.clone());
1190 }
1191 if let Some(ref t) = session_task {
1192 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1193 }
1194
1195 if rt
1196 .bus
1197 .append(
1198 &ws,
1199 &ch,
1200 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1201 agent.as_deref(),
1202 base_payload.clone(),
1203 )
1204 .is_some()
1205 {
1206 rt.metrics.record_event_appended();
1207 rt.metrics.record_event_broadcast();
1208 }
1209
1210 if let Some(secondary) =
1211 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1212 {
1213 if rt
1214 .bus
1215 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1216 .is_some()
1217 {
1218 rt.metrics.record_event_appended();
1219 rt.metrics.record_event_broadcast();
1220 }
1221 }
1222 });
1223 }
1224
1225 let skip_checkpoint = minimal
1226 || matches!(
1227 name,
1228 "ctx_compress"
1229 | "ctx_metrics"
1230 | "ctx_benchmark"
1231 | "ctx_analyze"
1232 | "ctx_cache"
1233 | "ctx_discover"
1234 | "ctx_dedup"
1235 | "ctx_session"
1236 | "ctx_knowledge"
1237 | "ctx_agent"
1238 | "ctx_share"
1239 | "ctx_gain"
1240 | "ctx_overview"
1241 | "ctx_preload"
1242 | "ctx_cost"
1243 | "ctx_heatmap"
1244 | "ctx_task"
1245 | "ctx_impact"
1246 | "ctx_architecture"
1247 | "ctx_smells"
1248 | "ctx_workflow"
1249 );
1250
1251 if !skip_checkpoint && self.increment_and_check() {
1252 if let Some(checkpoint) = self.auto_checkpoint().await {
1253 let interval = LeanCtxServer::checkpoint_interval_effective();
1254 let hints = crate::core::profiles::active_profile().output_hints;
1255 if hints.checkpoint_in_output() && crate::core::protocol::meta_visible() {
1256 let combined = format!(
1257 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1258 );
1259 return Ok(CallToolResult::success(vec![Content::text(combined)]));
1260 }
1261 }
1262 }
1263
1264 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1265 if tool_duration_ms > 100 {
1266 LeanCtxServer::append_tool_call_log(
1267 name,
1268 tool_duration_ms,
1269 0,
1270 0,
1271 None,
1272 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1273 );
1274 }
1275
1276 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1277 if current_count > 0 && current_count.is_multiple_of(100) {
1278 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1279 }
1280
1281 Ok(CallToolResult::success(vec![Content::text(result_text)]))
1282 }
1283}
1284
1285pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1286 crate::instructions::build_instructions_for_test(crp_mode)
1287}
1288
1289pub fn build_claude_code_instructions_for_test() -> String {
1290 crate::instructions::claude_code_instructions()
1291}
1292
1293const PROJECT_MARKERS: &[&str] = &[
1294 ".git",
1295 "Cargo.toml",
1296 "package.json",
1297 "go.mod",
1298 "pyproject.toml",
1299 "setup.py",
1300 "pom.xml",
1301 "build.gradle",
1302 "Makefile",
1303 ".lean-ctx.toml",
1304];
1305
1306fn has_project_marker(dir: &std::path::Path) -> bool {
1307 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1308}
1309
1310fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1311 if let Some(home) = dirs::home_dir() {
1312 if dir == home {
1313 return true;
1314 }
1315 }
1316 let dir_str = dir.to_string_lossy();
1317 dir_str.ends_with("/.claude")
1318 || dir_str.ends_with("/.codex")
1319 || dir_str.contains("/.claude/")
1320 || dir_str.contains("/.codex/")
1321}
1322
1323fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1324 std::process::Command::new("git")
1325 .args(["rev-parse", "--show-toplevel"])
1326 .current_dir(dir)
1327 .stdout(std::process::Stdio::piped())
1328 .stderr(std::process::Stdio::null())
1329 .output()
1330 .ok()
1331 .and_then(|o| {
1332 if o.status.success() {
1333 String::from_utf8(o.stdout)
1334 .ok()
1335 .map(|s| s.trim().to_string())
1336 } else {
1337 None
1338 }
1339 })
1340}
1341
1342pub fn derive_project_root_from_cwd() -> Option<String> {
1343 let cwd = std::env::current_dir().ok()?;
1344 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1345
1346 if is_home_or_agent_dir(&canonical) {
1347 return git_toplevel_from(&canonical);
1348 }
1349
1350 if has_project_marker(&canonical) {
1351 return Some(canonical.to_string_lossy().to_string());
1352 }
1353
1354 if let Some(git_root) = git_toplevel_from(&canonical) {
1355 return Some(git_root);
1356 }
1357
1358 if let Some(root) = detect_multi_root_workspace(&canonical) {
1359 return Some(root);
1360 }
1361
1362 if !crate::core::pathutil::is_broad_or_unsafe_root(&canonical) {
1366 tracing::info!(
1367 "No project markers found — using CWD as project root: {}",
1368 canonical.display()
1369 );
1370 return Some(canonical.to_string_lossy().to_string());
1371 }
1372
1373 None
1374}
1375
1376#[cfg(test)]
1378use crate::core::pathutil::is_broad_or_unsafe_root;
1379
1380fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1384 let entries = std::fs::read_dir(dir).ok()?;
1385 let mut child_projects: Vec<String> = Vec::new();
1386
1387 for entry in entries.flatten() {
1388 let path = entry.path();
1389 if path.is_dir() && has_project_marker(&path) {
1390 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1391 child_projects.push(canonical.to_string_lossy().to_string());
1392 }
1393 }
1394
1395 if child_projects.len() >= 2 {
1396 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1397 let sep = if cfg!(windows) { ";" } else { ":" };
1398 let merged = if existing.is_empty() {
1399 child_projects.join(sep)
1400 } else {
1401 format!("{existing}{sep}{}", child_projects.join(sep))
1402 };
1403 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1404 tracing::info!(
1405 "Multi-root workspace detected at {}: auto-allowing {} child projects",
1406 dir.display(),
1407 child_projects.len()
1408 );
1409 return Some(dir.to_string_lossy().to_string());
1410 }
1411
1412 None
1413}
1414
1415pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1416 crate::tool_defs::list_all_tool_defs()
1417 .into_iter()
1418 .map(|(name, desc, _)| (name, desc))
1419 .collect()
1420}
1421
1422pub fn tool_schemas_json_for_test() -> String {
1423 crate::tool_defs::list_all_tool_defs()
1424 .iter()
1425 .map(|(name, _, schema)| format!("{name}: {schema}"))
1426 .collect::<Vec<_>>()
1427 .join("\n")
1428}
1429
1430pub const WORKFLOW_PASSTHROUGH_TOOLS: &[&str] = &[
1434 "ctx",
1435 "ctx_workflow",
1436 "ctx_read",
1437 "ctx_multi_read",
1438 "ctx_smart_read",
1439 "ctx_search",
1440 "ctx_tree",
1441 "ctx_session",
1442 "ctx_ledger",
1443];
1444
1445pub fn is_workflow_stale(run: &crate::core::workflow::types::WorkflowRun) -> bool {
1448 let elapsed = chrono::Utc::now()
1449 .signed_duration_since(run.updated_at)
1450 .num_minutes();
1451 elapsed > 30
1452}
1453
1454fn is_shell_tool_name(name: &str) -> bool {
1455 matches!(name, "ctx_shell" | "ctx_execute")
1456}
1457
1458fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1459 let trimmed = cmd.trim();
1460 let parts: Vec<&str> = trimmed.split_whitespace().collect();
1461 if parts.len() < 2 {
1462 return None;
1463 }
1464 let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1465 match bin {
1466 "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1467 let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1468 Some(file_arg.to_string())
1469 }
1470 _ => None,
1471 }
1472}
1473
1474#[cfg(test)]
1475mod tests {
1476 use super::*;
1477
1478 #[test]
1479 fn project_markers_detected() {
1480 let tmp = tempfile::tempdir().unwrap();
1481 let root = tmp.path().join("myproject");
1482 std::fs::create_dir_all(&root).unwrap();
1483 assert!(!has_project_marker(&root));
1484
1485 std::fs::create_dir(root.join(".git")).unwrap();
1486 assert!(has_project_marker(&root));
1487 }
1488
1489 #[test]
1490 fn home_dir_detected_as_agent_dir() {
1491 if let Some(home) = dirs::home_dir() {
1492 assert!(is_home_or_agent_dir(&home));
1493 }
1494 }
1495
1496 #[test]
1497 fn agent_dirs_detected() {
1498 let claude = std::path::PathBuf::from("/home/user/.claude");
1499 assert!(is_home_or_agent_dir(&claude));
1500 let codex = std::path::PathBuf::from("/home/user/.codex");
1501 assert!(is_home_or_agent_dir(&codex));
1502 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1503 assert!(!is_home_or_agent_dir(&project));
1504 }
1505
1506 #[test]
1507 fn test_unified_tool_count() {
1508 let tools = crate::tool_defs::unified_tool_defs();
1509 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1510 }
1511
1512 #[test]
1513 fn test_granular_tool_count() {
1514 let tools = crate::tool_defs::granular_tool_defs();
1515 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1516 }
1517
1518 #[test]
1519 fn test_registry_tool_count_ssot() {
1520 let registry = crate::server::registry::build_registry();
1521 assert_eq!(
1522 registry.len(),
1523 62,
1524 "Registry tool count drift! Update this test AND all docs when adding/removing tools."
1525 );
1526 }
1527
1528 #[test]
1529 fn disabled_tools_filters_list() {
1530 let all = crate::tool_defs::granular_tool_defs();
1531 let total = all.len();
1532 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1533 let filtered: Vec<_> = all
1534 .into_iter()
1535 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1536 .collect();
1537 assert_eq!(filtered.len(), total - 2);
1538 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1539 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1540 }
1541
1542 #[test]
1543 fn empty_disabled_tools_returns_all() {
1544 let all = crate::tool_defs::granular_tool_defs();
1545 let total = all.len();
1546 let disabled: Vec<String> = vec![];
1547 let filtered: Vec<_> = all
1548 .into_iter()
1549 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1550 .collect();
1551 assert_eq!(filtered.len(), total);
1552 }
1553
1554 #[test]
1555 fn misspelled_disabled_tool_is_silently_ignored() {
1556 let all = crate::tool_defs::granular_tool_defs();
1557 let total = all.len();
1558 let disabled = ["ctx_nonexistent_tool".to_string()];
1559 let filtered: Vec<_> = all
1560 .into_iter()
1561 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1562 .collect();
1563 assert_eq!(filtered.len(), total);
1564 }
1565
1566 #[test]
1567 fn detect_multi_root_workspace_with_child_projects() {
1568 let tmp = tempfile::tempdir().unwrap();
1569 let workspace = tmp.path().join("workspace");
1570 std::fs::create_dir_all(&workspace).unwrap();
1571
1572 let proj_a = workspace.join("project-a");
1573 let proj_b = workspace.join("project-b");
1574 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1575 std::fs::create_dir_all(&proj_b).unwrap();
1576 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1577
1578 let result = detect_multi_root_workspace(&workspace);
1579 assert!(
1580 result.is_some(),
1581 "should detect workspace with 2 child projects"
1582 );
1583
1584 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1585 }
1586
1587 #[test]
1588 fn detect_multi_root_workspace_returns_none_for_single_project() {
1589 let tmp = tempfile::tempdir().unwrap();
1590 let workspace = tmp.path().join("workspace");
1591 std::fs::create_dir_all(&workspace).unwrap();
1592
1593 let proj_a = workspace.join("project-a");
1594 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1595
1596 let result = detect_multi_root_workspace(&workspace);
1597 assert!(
1598 result.is_none(),
1599 "should not detect workspace with only 1 child project"
1600 );
1601 }
1602
1603 #[test]
1604 fn is_broad_or_unsafe_root_rejects_home() {
1605 if let Some(home) = dirs::home_dir() {
1606 assert!(is_broad_or_unsafe_root(&home));
1607 }
1608 }
1609
1610 #[test]
1611 fn is_broad_or_unsafe_root_rejects_filesystem_root() {
1612 assert!(is_broad_or_unsafe_root(std::path::Path::new("/")));
1613 }
1614
1615 #[test]
1616 fn is_broad_or_unsafe_root_rejects_agent_dirs() {
1617 assert!(is_broad_or_unsafe_root(std::path::Path::new(
1618 "/home/user/.claude"
1619 )));
1620 assert!(is_broad_or_unsafe_root(std::path::Path::new(
1621 "/home/user/.codex"
1622 )));
1623 }
1624
1625 #[test]
1626 fn is_broad_or_unsafe_root_allows_project_subdir() {
1627 let tmp = tempfile::tempdir().unwrap();
1628 let subdir = tmp.path().join("my-project");
1629 std::fs::create_dir_all(&subdir).unwrap();
1630 assert!(!is_broad_or_unsafe_root(&subdir));
1631 }
1632
1633 #[test]
1634 fn is_broad_or_unsafe_root_allows_tmp_subdirs() {
1635 assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1636 "/tmp/leanctx-test"
1637 )));
1638 assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1639 "/tmp/my-project"
1640 )));
1641 }
1642
1643 #[test]
1644 fn is_broad_or_unsafe_root_allows_home_subdirs() {
1645 if let Some(home) = dirs::home_dir() {
1646 let subdir = home.join("projects").join("my-app");
1647 assert!(!is_broad_or_unsafe_root(&subdir));
1648 }
1649 }
1650
1651 #[test]
1652 fn derive_project_root_falls_back_to_bare_cwd() {
1653 let tmp = tempfile::tempdir().unwrap();
1654 let bare = tmp.path().join("bare-dir");
1655 std::fs::create_dir_all(&bare).unwrap();
1656
1657 let original = std::env::current_dir().unwrap();
1658 std::env::set_current_dir(&bare).unwrap();
1659 let result = derive_project_root_from_cwd();
1660 std::env::set_current_dir(original).unwrap();
1661
1662 assert!(result.is_some(), "bare dir should produce a project root");
1663 let root = result.unwrap();
1664 assert!(
1665 root.contains("bare-dir"),
1666 "fallback should use the bare dir path"
1667 );
1668 }
1669}