Skip to main content

lean_ctx/server/
mod.rs

1pub mod bounded_lock;
2pub mod bypass_hint;
3pub mod compaction_sync;
4pub mod context_gate;
5mod dispatch;
6pub mod dynamic_tools;
7pub mod elicitation;
8pub(crate) mod execute;
9pub mod helpers;
10pub mod notifications;
11pub mod prompts;
12pub mod reference_store;
13pub mod registry;
14pub mod resources;
15pub mod role_guard;
16pub mod tool_trait;
17
18use rmcp::handler::server::ServerHandler;
19use rmcp::model::{
20    CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
21    InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
22};
23use rmcp::service::{RequestContext, RoleServer};
24use rmcp::ErrorData;
25
26use crate::tools::{CrpMode, LeanCtxServer};
27
28impl ServerHandler for LeanCtxServer {
29    fn get_info(&self) -> ServerInfo {
30        let capabilities = ServerCapabilities::builder()
31            .enable_tools()
32            .enable_resources()
33            .enable_resources_subscribe()
34            .enable_prompts()
35            .build();
36
37        let config = crate::core::config::Config::load();
38        let level = crate::core::config::CompressionLevel::effective(&config);
39        let _ = crate::core::terse::rules_inject::inject(&level);
40
41        let instructions = crate::instructions::build_instructions(CrpMode::effective());
42
43        InitializeResult::new(capabilities)
44            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
45            .with_instructions(instructions)
46    }
47
48    async fn initialize(
49        &self,
50        request: InitializeRequestParams,
51        context: RequestContext<RoleServer>,
52    ) -> Result<InitializeResult, ErrorData> {
53        let name = request.client_info.name.clone();
54        tracing::info!("MCP client connected: {:?}", name);
55        *self.client_name.write().await = name.clone();
56        *self.peer.write().await = Some(context.peer.clone());
57
58        if self.session_mode != crate::tools::SessionMode::Shared {
59            crate::core::budget_tracker::BudgetTracker::global().reset();
60            if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
61                let radar = data_dir.join("context_radar.jsonl");
62                if radar.exists() {
63                    let prev = data_dir.join("context_radar.prev.jsonl");
64                    let _ = std::fs::rename(&radar, &prev);
65                }
66            }
67        }
68
69        let derived_root = derive_project_root_from_cwd();
70        let cwd_str = std::env::current_dir()
71            .ok()
72            .map(|p| p.to_string_lossy().to_string())
73            .unwrap_or_default();
74        {
75            let mut session = self.session.write().await;
76            if !cwd_str.is_empty() {
77                session.shell_cwd = Some(cwd_str.clone());
78            }
79            if let Some(ref root) = derived_root {
80                session.project_root = Some(root.clone());
81                tracing::info!("Project root set to: {root}");
82            } else if let Some(ref root) = session.project_root {
83                let root_path = std::path::Path::new(root);
84                let root_has_marker = has_project_marker(root_path);
85                let root_str = root_path.to_string_lossy();
86                let root_suspicious = root_str.contains("/.claude")
87                    || root_str.contains("/.codex")
88                    || root_str.contains("/var/folders/")
89                    || root_str.contains("/tmp/")
90                    || root_str.contains("\\.claude")
91                    || root_str.contains("\\.codex")
92                    || root_str.contains("\\AppData\\Local\\Temp")
93                    || root_str.contains("\\Temp\\");
94                if root_suspicious && !root_has_marker {
95                    session.project_root = None;
96                }
97            }
98            if self.session_mode == crate::tools::SessionMode::Shared {
99                if let Some(ref root) = session.project_root {
100                    if let Some(ref rt) = self.context_os {
101                        rt.shared_sessions.persist_best_effort(
102                            root,
103                            &self.workspace_id,
104                            &self.channel_id,
105                            &session,
106                        );
107                        rt.metrics.record_session_persisted();
108                    }
109                }
110            } else {
111                let _ = session.save();
112            }
113        }
114
115        let agent_name = name.clone();
116        let agent_root = derived_root.clone().unwrap_or_default();
117        let agent_id_handle = self.agent_id.clone();
118        tokio::task::spawn_blocking(move || {
119            if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
120                return;
121            }
122
123            // Avoid startup stampedes when multiple agent sessions initialize at once.
124            // These are best-effort maintenance tasks; it's fine to skip if another
125            // lean-ctx instance is already doing them.
126            let maintenance = crate::core::startup_guard::try_acquire_lock(
127                "startup-maintenance",
128                std::time::Duration::from_secs(2),
129                std::time::Duration::from_mins(2),
130            );
131            if maintenance.is_some() {
132                if let Some(home) = dirs::home_dir() {
133                    let _ = crate::rules_inject::inject_all_rules(&home);
134                }
135                crate::hooks::refresh_installed_hooks();
136                crate::core::version_check::check_background();
137            }
138            drop(maintenance);
139
140            if !agent_root.is_empty() {
141                let heuristic_role = match agent_name.to_lowercase().as_str() {
142                    n if n.contains("cursor") => Some("coder"),
143                    n if n.contains("claude") => Some("coder"),
144                    n if n.contains("codex") => Some("coder"),
145                    n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
146                    n if n.contains("review") => Some("reviewer"),
147                    n if n.contains("test") => Some("debugger"),
148                    _ => None,
149                };
150                let env_role = std::env::var("LEAN_CTX_ROLE")
151                    .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
152                    .ok();
153                let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
154
155                let _ = crate::core::roles::set_active_role(effective_role);
156
157                let mut registry = crate::core::agents::AgentRegistry::load_or_create();
158                registry.cleanup_stale(24);
159                let id = registry.register("mcp", Some(effective_role), &agent_root);
160                let _ = registry.save();
161                if let Ok(mut guard) = agent_id_handle.try_write() {
162                    *guard = Some(id);
163                }
164            }
165        });
166
167        let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
168        tracing::info!("Client capabilities: {}", client_caps.format_summary());
169
170        {
171            let cfg = crate::core::config::Config::load();
172            let cats = cfg.default_tool_categories_effective();
173            dynamic_tools::init_from_config(&cats);
174        }
175
176        if client_caps.dynamic_tools {
177            if let Ok(mut dt) = dynamic_tools::global().lock() {
178                dt.set_supports_list_changed(true);
179            }
180        }
181        if let Some(max) = client_caps.max_tools {
182            if let Ok(mut dt) = dynamic_tools::global().lock() {
183                dt.set_supports_list_changed(true);
184                if max < 100 {
185                    dt.unload_category(dynamic_tools::ToolCategory::Debug);
186                    dt.unload_category(dynamic_tools::ToolCategory::Memory);
187                }
188            }
189        }
190
191        crate::core::client_capabilities::set_detected(&client_caps);
192
193        let instructions =
194            crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
195
196        let capabilities = match (client_caps.resources, client_caps.prompts) {
197            (true, true) => ServerCapabilities::builder()
198                .enable_tools()
199                .enable_resources()
200                .enable_resources_subscribe()
201                .enable_prompts()
202                .build(),
203            (true, false) => ServerCapabilities::builder()
204                .enable_tools()
205                .enable_resources()
206                .enable_resources_subscribe()
207                .build(),
208            (false, true) => ServerCapabilities::builder()
209                .enable_tools()
210                .enable_prompts()
211                .build(),
212            (false, false) => ServerCapabilities::builder().enable_tools().build(),
213        };
214
215        Ok(InitializeResult::new(capabilities)
216            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
217            .with_instructions(instructions))
218    }
219
220    async fn list_tools(
221        &self,
222        _request: Option<PaginatedRequestParams>,
223        _context: RequestContext<RoleServer>,
224    ) -> Result<ListToolsResult, ErrorData> {
225        let all_tools = if crate::tool_defs::is_full_mode() {
226            if let Some(ref reg) = self.registry {
227                reg.tool_defs()
228            } else {
229                crate::tool_defs::granular_tool_defs()
230            }
231        } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
232            crate::tool_defs::unified_tool_defs()
233        } else if let Some(ref reg) = self.registry {
234            let core_names = crate::tool_defs::core_tool_names();
235            reg.tool_defs()
236                .into_iter()
237                .filter(|t| core_names.contains(&t.name.as_ref()))
238                .collect()
239        } else {
240            crate::tool_defs::lazy_tool_defs()
241        };
242
243        let disabled = crate::core::config::Config::load().disabled_tools_effective();
244        let client = self.client_name.read().await.clone();
245        let is_zed = !client.is_empty() && client.to_lowercase().contains("zed");
246
247        let tools: Vec<_> = all_tools
248            .into_iter()
249            .filter(|t| {
250                let name = t.name.as_ref();
251                if !disabled.is_empty() && disabled.iter().any(|d| d.as_str() == name) {
252                    return false;
253                }
254                if is_zed && name == "ctx_edit" {
255                    return false;
256                }
257                true
258            })
259            .collect();
260
261        let tools = {
262            let Ok(dyn_state) = dynamic_tools::global().lock() else {
263                tracing::warn!("dynamic_tools mutex poisoned in list_tools; returning unfiltered");
264                return Ok(ListToolsResult {
265                    tools,
266                    ..Default::default()
267                });
268            };
269            if dyn_state.supports_list_changed() {
270                tools
271                    .into_iter()
272                    .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
273                    .collect()
274            } else {
275                tools
276            }
277        };
278
279        let tools = {
280            let active = self.workflow.read().await.clone();
281            if let Some(run) = active {
282                if run.current == "done" || is_workflow_stale(&run) {
283                    let mut wf = self.workflow.write().await;
284                    *wf = None;
285                    let _ = crate::core::workflow::clear_active();
286                } else if let Some(state) = run.spec.state(&run.current) {
287                    if let Some(allowed) = &state.allowed_tools {
288                        let mut allow: std::collections::HashSet<&str> =
289                            allowed.iter().map(std::string::String::as_str).collect();
290                        for passthrough in WORKFLOW_PASSTHROUGH_TOOLS {
291                            allow.insert(passthrough);
292                        }
293                        return Ok(ListToolsResult {
294                            tools: tools
295                                .into_iter()
296                                .filter(|t| allow.contains(t.name.as_ref()))
297                                .collect(),
298                            ..Default::default()
299                        });
300                    }
301                }
302            }
303            tools
304        };
305
306        let tools = {
307            let cfg = crate::core::config::Config::load();
308            let level = crate::core::config::CompressionLevel::effective(&cfg);
309            let mode =
310                crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
311            if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
312                tools
313            } else {
314                tools
315                    .into_iter()
316                    .map(|mut t| {
317                        let compressed = crate::core::terse::mcp_compress::compress_description(
318                            t.name.as_ref(),
319                            t.description.as_deref().unwrap_or(""),
320                            mode,
321                        );
322                        t.description = Some(compressed.into());
323                        t
324                    })
325                    .collect()
326            }
327        };
328
329        Ok(ListToolsResult {
330            tools,
331            ..Default::default()
332        })
333    }
334
335    async fn list_prompts(
336        &self,
337        _request: Option<PaginatedRequestParams>,
338        _context: RequestContext<RoleServer>,
339    ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
340        Ok(rmcp::model::ListPromptsResult::with_all_items(
341            prompts::list_prompts(),
342        ))
343    }
344
345    async fn get_prompt(
346        &self,
347        request: rmcp::model::GetPromptRequestParams,
348        _context: RequestContext<RoleServer>,
349    ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
350        let ledger = self.ledger.read().await;
351        match prompts::get_prompt(&request, &ledger) {
352            Some(result) => Ok(result),
353            None => Err(ErrorData::invalid_params(
354                format!("Unknown prompt: {}", request.name),
355                None,
356            )),
357        }
358    }
359
360    async fn list_resources(
361        &self,
362        _request: Option<PaginatedRequestParams>,
363        _context: RequestContext<RoleServer>,
364    ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
365        Ok(rmcp::model::ListResourcesResult::with_all_items(
366            resources::list_resources(),
367        ))
368    }
369
370    async fn read_resource(
371        &self,
372        request: rmcp::model::ReadResourceRequestParams,
373        _context: RequestContext<RoleServer>,
374    ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
375        let ledger = self.ledger.read().await;
376        match resources::read_resource(&request.uri, &ledger) {
377            Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
378            None => Err(rmcp::ErrorData::resource_not_found(
379                format!("Unknown resource: {}", request.uri),
380                None,
381            )),
382        }
383    }
384
385    async fn call_tool(
386        &self,
387        request: CallToolRequestParams,
388        _context: RequestContext<RoleServer>,
389    ) -> Result<CallToolResult, ErrorData> {
390        self.check_idle_expiry().await;
391        elicitation::increment_call();
392
393        let original_name = request.name.as_ref().to_string();
394        let (resolved_name, resolved_args) = if original_name == "ctx" {
395            let sub = request
396                .arguments
397                .as_ref()
398                .and_then(|a| a.get("tool"))
399                .and_then(|v| v.as_str())
400                .map(std::string::ToString::to_string)
401                .ok_or_else(|| {
402                    ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
403                })?;
404            let tool_name = if sub.starts_with("ctx_") {
405                sub
406            } else {
407                format!("ctx_{sub}")
408            };
409            let mut args = request.arguments.unwrap_or_default();
410            args.remove("tool");
411            (tool_name, Some(args))
412        } else {
413            (original_name, request.arguments)
414        };
415        let name = resolved_name.as_str();
416        let args = resolved_args.as_ref();
417
418        let role_check = role_guard::check_tool_access(name);
419        if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
420            tracing::warn!(
421                tool = name,
422                role = %role_check.role_name,
423                "Tool blocked by role policy"
424            );
425            return Ok(denied);
426        }
427
428        if name != "ctx_workflow" {
429            let active = self.workflow.read().await.clone();
430            if let Some(run) = active {
431                if run.current == "done" || is_workflow_stale(&run) {
432                    let mut wf = self.workflow.write().await;
433                    *wf = None;
434                    let _ = crate::core::workflow::clear_active();
435                } else if !WORKFLOW_PASSTHROUGH_TOOLS.contains(&name) {
436                    if let Some(state) = run.spec.state(&run.current) {
437                        if let Some(allowed) = &state.allowed_tools {
438                            let allowed_ok = allowed.iter().any(|t| t == name);
439                            if !allowed_ok {
440                                let mut shown = allowed.clone();
441                                shown.sort();
442                                shown.truncate(30);
443                                return Ok(CallToolResult::success(vec![Content::text(format!(
444                                    "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed: {}. Use ctx_workflow(action=\"stop\") to exit.",
445                                    run.spec.name,
446                                    run.current,
447                                    shown.join(", ")
448                                ))]));
449                            }
450                        }
451                    }
452                }
453            }
454        }
455
456        let auto_context = {
457            let task = {
458                let session = self.session.read().await;
459                session.task.as_ref().map(|t| t.description.clone())
460            };
461            let project_root = {
462                let session = self.session.read().await;
463                session.project_root.clone()
464            };
465            let mut cache = self.cache.write().await;
466            crate::tools::autonomy::session_lifecycle_pre_hook(
467                &self.autonomy,
468                name,
469                &mut cache,
470                task.as_deref(),
471                project_root.as_deref(),
472                CrpMode::effective(),
473            )
474        };
475
476        let throttle_result = {
477            let fp = args
478                .map(|a| {
479                    crate::core::loop_detection::LoopDetector::fingerprint(
480                        &serde_json::Value::Object(a.clone()),
481                    )
482                })
483                .unwrap_or_default();
484            let mut detector = self.loop_detector.write().await;
485
486            let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
487            let is_search_shell = name == "ctx_shell" && {
488                let cmd = args
489                    .as_ref()
490                    .and_then(|a| a.get("command"))
491                    .and_then(|v| v.as_str())
492                    .unwrap_or("");
493                crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
494            };
495
496            if is_search || is_search_shell {
497                let search_pattern = args.and_then(|a| {
498                    a.get("pattern")
499                        .or_else(|| a.get("query"))
500                        .and_then(|v| v.as_str())
501                });
502                let shell_pattern = if is_search_shell {
503                    args.and_then(|a| a.get("command"))
504                        .and_then(|v| v.as_str())
505                        .and_then(helpers::extract_search_pattern_from_command)
506                } else {
507                    None
508                };
509                let pat = search_pattern.or(shell_pattern.as_deref());
510                detector.record_search(name, &fp, pat)
511            } else {
512                detector.record_call(name, &fp)
513            }
514        };
515
516        if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
517            let msg = throttle_result.message.unwrap_or_default();
518            return Ok(CallToolResult::success(vec![Content::text(msg)]));
519        }
520
521        let throttle_warning =
522            if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
523                throttle_result.message.clone()
524            } else {
525                None
526            };
527
528        let config = crate::core::config::Config::load();
529        let minimal = config.minimal_overhead_effective();
530
531        {
532            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
533            let snap = BudgetTracker::global().check();
534            if *snap.worst_level() == BudgetLevel::Exhausted
535                && name != "ctx_session"
536                && name != "ctx_cost"
537                && name != "ctx_metrics"
538            {
539                for (dim, lvl, used, limit) in [
540                    (
541                        "tokens",
542                        &snap.tokens.level,
543                        format!("{}", snap.tokens.used),
544                        format!("{}", snap.tokens.limit),
545                    ),
546                    (
547                        "shell",
548                        &snap.shell.level,
549                        format!("{}", snap.shell.used),
550                        format!("{}", snap.shell.limit),
551                    ),
552                    (
553                        "cost",
554                        &snap.cost.level,
555                        format!("${:.2}", snap.cost.used_usd),
556                        format!("${:.2}", snap.cost.limit_usd),
557                    ),
558                ] {
559                    if *lvl == BudgetLevel::Exhausted {
560                        crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
561                    }
562                }
563                let msg = format!(
564                    "[BUDGET EXHAUSTED] {}\n\
565                     Use `ctx_session action=role` to check/switch roles, \
566                     or `ctx_session action=reset` to start fresh.",
567                    snap.format_compact()
568                );
569                tracing::warn!(tool = name, "{msg}");
570                return Ok(CallToolResult::success(vec![Content::text(msg)]));
571            }
572        }
573
574        if is_shell_tool_name(name) {
575            crate::core::budget_tracker::BudgetTracker::global().record_shell();
576        }
577
578        let tool_start = std::time::Instant::now();
579        let (mut result_text, tool_saved_tokens) = {
580            use futures::FutureExt;
581            use std::panic::AssertUnwindSafe;
582            match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
583                .catch_unwind()
584                .await
585            {
586                Ok(Ok(pair)) => pair,
587                Ok(Err(e)) => return Err(e),
588                Err(panic_payload) => {
589                    let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
590                        (*s).to_string()
591                    } else if let Some(s) = panic_payload.downcast_ref::<String>() {
592                        s.clone()
593                    } else {
594                        "unknown".to_string()
595                    };
596                    tracing::error!(tool = name, "Tool panicked: {detail}");
597                    (format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
598                             The MCP server is still running. Please retry or use a different approach."), 0)
599                }
600            }
601        };
602
603        let is_raw_shell = name == "ctx_shell" && {
604            let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
605            let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
606            arg_raw
607                || arg_bypass
608                || std::env::var("LEAN_CTX_DISABLED").is_ok()
609                || std::env::var("LEAN_CTX_RAW").is_ok()
610        };
611
612        let pre_terse_len = result_text.len();
613        let output_tokens = {
614            let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
615            crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
616            tokens
617        };
618
619        crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
620
621        // Context IR: record lineage for every tool call.
622        if let Some(ref ir) = self.context_ir {
623            let tool_duration = tool_start.elapsed();
624            let source_kind = match name {
625                n if n.contains("read") || n.contains("multi_read") || n.contains("smart_read") => {
626                    crate::core::context_ir::ContextIrSourceKindV1::Read
627                }
628                "ctx_shell" => crate::core::context_ir::ContextIrSourceKindV1::Shell,
629                "ctx_search" | "ctx_semantic_search" => {
630                    crate::core::context_ir::ContextIrSourceKindV1::Search
631                }
632                "ctx_provider" => crate::core::context_ir::ContextIrSourceKindV1::Provider,
633                _ => crate::core::context_ir::ContextIrSourceKindV1::Other,
634            };
635            let ir_path = helpers::get_str(args, "path");
636            let ir_command = helpers::get_str(args, "command");
637            let ir_mode = helpers::get_str(args, "mode");
638            let excerpt = if result_text.len() > 200 {
639                let mut end = 200;
640                while !result_text.is_char_boundary(end) && end > 0 {
641                    end -= 1;
642                }
643                &result_text[..end]
644            } else {
645                &result_text
646            };
647            let input = crate::core::context_ir::RecordIrInput {
648                kind: source_kind,
649                tool: name,
650                client_name: None,
651                agent_id: None,
652                path: ir_path.as_deref(),
653                command: ir_command.as_deref(),
654                pattern: ir_mode.as_deref(),
655                input_tokens: pre_terse_len / 4,
656                output_tokens: output_tokens as usize,
657                duration: tool_duration,
658                content_excerpt: excerpt,
659            };
660            ir.write().await.record(input);
661        }
662
663        // Correction-loop detection: track re-reads and re-runs as quality signals.
664        {
665            let mut detector = self.loop_detector.write().await;
666            if name == "ctx_read" {
667                let path = helpers::get_str(args, "path").unwrap_or_default();
668                let mode = helpers::get_str(args, "mode").unwrap_or_else(|| "auto".into());
669                let fresh = helpers::get_bool(args, "fresh").unwrap_or(false);
670                detector.record_read_for_correction(&path, &mode, fresh);
671            } else if name == "ctx_shell" {
672                let cmd = helpers::get_str(args, "command").unwrap_or_default();
673                detector.record_shell_for_correction(&cmd);
674            }
675            let correction_count = detector.correction_count();
676            if correction_count > 0 {
677                crate::core::anomaly::record_metric(
678                    "correction_loop_rate",
679                    f64::from(correction_count),
680                );
681            }
682            // Auto-degrade: reduce compression when correction rate is high
683            use crate::core::config::CompressionLevel;
684            if correction_count >= 5 {
685                CompressionLevel::set_session_degrade(&CompressionLevel::Off);
686            } else if correction_count >= 3 {
687                CompressionLevel::set_session_degrade(&CompressionLevel::Lite);
688            } else if correction_count == 0 {
689                CompressionLevel::clear_session_degrade();
690            }
691            detector.prune_corrections();
692        }
693
694        // Persist anomaly detector — debounced to reduce I/O in burst sequences.
695        crate::core::anomaly::save_debounced();
696
697        let budget_warning = {
698            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
699            let snap = BudgetTracker::global().check();
700            if *snap.worst_level() == BudgetLevel::Warning {
701                for (dim, lvl, used, limit, pct) in [
702                    (
703                        "tokens",
704                        &snap.tokens.level,
705                        format!("{}", snap.tokens.used),
706                        format!("{}", snap.tokens.limit),
707                        snap.tokens.percent,
708                    ),
709                    (
710                        "shell",
711                        &snap.shell.level,
712                        format!("{}", snap.shell.used),
713                        format!("{}", snap.shell.limit),
714                        snap.shell.percent,
715                    ),
716                    (
717                        "cost",
718                        &snap.cost.level,
719                        format!("${:.2}", snap.cost.used_usd),
720                        format!("${:.2}", snap.cost.limit_usd),
721                        snap.cost.percent,
722                    ),
723                ] {
724                    if *lvl == BudgetLevel::Warning {
725                        crate::core::events::emit_budget_warning(
726                            &snap.role, dim, &used, &limit, pct,
727                        );
728                    }
729                }
730                if crate::core::protocol::meta_visible() {
731                    Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
732                } else {
733                    None
734                }
735            } else {
736                None
737            }
738        };
739
740        let archive_hint = if minimal || is_raw_shell {
741            None
742        } else {
743            use crate::core::archive;
744            let archivable = matches!(
745                name,
746                "ctx_shell"
747                    | "ctx_read"
748                    | "ctx_multi_read"
749                    | "ctx_smart_read"
750                    | "ctx_execute"
751                    | "ctx_search"
752                    | "ctx_tree"
753            );
754            if archivable && archive::should_archive(&result_text) {
755                let cmd = helpers::get_str(args, "command")
756                    .or_else(|| helpers::get_str(args, "path"))
757                    .unwrap_or_default();
758                let session_id = self.session.read().await.id.clone();
759                let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
760                let tokens = crate::core::tokens::count_tokens(&to_store);
761                archive::store(name, &cmd, &to_store, Some(&session_id))
762                    .map(|id| archive::format_hint(&id, to_store.len(), tokens))
763            } else {
764                None
765            }
766        };
767
768        let pre_compression = result_text.clone();
769        let skip_terse = is_raw_shell
770            || tool_saved_tokens > 0
771            || (name == "ctx_shell"
772                && helpers::get_str(args, "command")
773                    .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
774        let compression = crate::core::config::CompressionLevel::effective(&config);
775        if compression.is_active() && !skip_terse {
776            let terse_result =
777                crate::core::terse::pipeline::compress(&result_text, &compression, None);
778            if terse_result.quality_passed && terse_result.savings_pct >= 3.0 {
779                result_text = terse_result.output;
780            }
781        }
782
783        let profile_hints = crate::core::profiles::active_profile().output_hints;
784
785        if !is_raw_shell && profile_hints.verify_footer() {
786            let verify_cfg = crate::core::profiles::active_profile().verification;
787            let vr = crate::core::output_verification::verify_output(
788                &pre_compression,
789                &result_text,
790                &verify_cfg,
791            );
792            if !vr.warnings.is_empty() {
793                let msg = format!("[VERIFY] {}", vr.format_compact());
794                result_text = format!("{result_text}\n\n{msg}");
795            }
796        }
797
798        if profile_hints.archive_hint() {
799            if let Some(hint) = archive_hint {
800                result_text = format!("{result_text}\n{hint}");
801            }
802        }
803
804        if !is_raw_shell {
805            if let Some(ctx) = auto_context {
806                let ctx_tokens = crate::core::tokens::count_tokens(&ctx);
807                if ctx_tokens <= 400 {
808                    result_text = format!("{ctx}\n\n{result_text}");
809                }
810            }
811        }
812
813        if let Some(warning) = throttle_warning {
814            result_text = format!("{result_text}\n\n{warning}");
815        }
816
817        if let Some(bw) = budget_warning {
818            result_text = format!("{result_text}\n\n{bw}");
819        }
820
821        if !self
822            .rules_stale_checked
823            .swap(true, std::sync::atomic::Ordering::Relaxed)
824        {
825            let client = self.client_name.read().await.clone();
826            if !client.is_empty() {
827                if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
828                    result_text = format!("{result_text}\n\n{stale_msg}");
829                }
830            }
831        }
832
833        {
834            // Evaluate SLOs for observability (watch/dashboard), but keep tool outputs clean.
835            let _ = crate::core::slo::evaluate();
836        }
837
838        if name == "ctx_read" {
839            if minimal {
840                let cache_clone = self.cache.clone();
841                let autonomy_clone = self.autonomy.clone();
842                let name_owned = name.to_string();
843                tokio::spawn(async move {
844                    let mut cache = cache_clone.write().await;
845                    crate::tools::autonomy::maybe_auto_dedup(
846                        &autonomy_clone,
847                        &mut cache,
848                        &name_owned,
849                    );
850                });
851            } else {
852                let read_path = self
853                    .resolve_path_or_passthrough(
854                        &helpers::get_str(args, "path").unwrap_or_default(),
855                    )
856                    .await;
857                let project_root = {
858                    let session = self.session.read().await;
859                    session.project_root.clone()
860                };
861
862                // Bounded cache lock for enrichment — degrade gracefully under contention
863                let enrich_timeout =
864                    tokio::time::timeout(std::time::Duration::from_secs(3), self.cache.write())
865                        .await;
866                if let Ok(mut cache) = enrich_timeout {
867                    let enrich = crate::tools::autonomy::enrich_after_read(
868                        &self.autonomy,
869                        &mut cache,
870                        &read_path,
871                        project_root.as_deref(),
872                        None,
873                        crate::tools::CrpMode::effective(),
874                        false,
875                    );
876                    if profile_hints.related_hint() {
877                        if let Some(hint) = enrich.related_hint {
878                            result_text = format!("{result_text}\n{hint}");
879                        }
880                    }
881                    crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
882                } else {
883                    tracing::warn!(
884                        "post-dispatch cache lock timeout (3s) for {read_path}, skipping enrichment"
885                    );
886                }
887
888                // Ledger update — fire-and-forget to avoid blocking concurrent reads
889                let ledger_clone = self.ledger.clone();
890                let session_clone = self.session.clone();
891                let peer_clone = self.peer.clone();
892                let read_path_owned = read_path.clone();
893                let project_root_owned = project_root.clone();
894                let mode_used =
895                    helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
896                let out_tok = output_tokens as usize;
897                let sent_tok = crate::core::tokens::count_tokens(&result_text);
898                let wants_eviction = true;
899                let wants_elicitation = profile_hints.elicitation_hint();
900                tokio::spawn(async move {
901                    let active_task = {
902                        let session = session_clone.read().await;
903                        session.task.as_ref().map(|t| t.description.clone())
904                    };
905                    let mut ledger = ledger_clone.write().await;
906                    let overlay = crate::core::context_overlay::OverlayStore::load_project(
907                        &std::path::PathBuf::from(project_root_owned.as_deref().unwrap_or(".")),
908                    );
909                    let gate_result = context_gate::post_dispatch_record_with_task(
910                        &read_path_owned,
911                        &mode_used,
912                        out_tok,
913                        sent_tok,
914                        &mut ledger,
915                        &overlay,
916                        active_task.as_deref(),
917                    );
918                    drop(ledger);
919                    if wants_eviction {
920                        if let Some(hint) = &gate_result.eviction_hint {
921                            tracing::debug!("deferred eviction hint: {hint}");
922                        }
923                    }
924                    if wants_elicitation {
925                        if let Some(hint) = &gate_result.elicitation_hint {
926                            tracing::debug!("deferred elicitation hint: {hint}");
927                        }
928                    }
929                    if gate_result.resource_changed {
930                        if let Some(peer) = peer_clone.read().await.as_ref() {
931                            notifications::send_resource_updated(
932                                peer,
933                                notifications::RESOURCE_URI_SUMMARY,
934                            )
935                            .await;
936                        }
937                    }
938                });
939            }
940        }
941
942        if !minimal && !is_raw_shell && name == "ctx_shell" {
943            let cmd = helpers::get_str(args, "command").unwrap_or_default();
944
945            if let Some(file_path) = extract_file_read_from_shell(&cmd) {
946                if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
947                    bt.next_seq();
948                    bt.record_shell_file_access(&file_path);
949                }
950            }
951
952            if profile_hints.efficiency_hint() {
953                let calls = self.tool_calls.read().await;
954                let last_original = calls.last().map_or(0, |c| c.original_tokens);
955                drop(calls);
956                let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
957                if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
958                    &self.autonomy,
959                    &cmd,
960                    last_original,
961                    pre_hint_tokens,
962                ) {
963                    result_text = format!("{result_text}\n{hint}");
964                }
965            }
966        }
967
968        if !minimal && !is_raw_shell {
969            bypass_hint::record_lctx_call();
970            if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
971                if let Some(hint) = bypass_hint::check(&data_dir) {
972                    result_text = format!("{result_text}\n{hint}");
973                }
974            }
975        }
976
977        #[allow(clippy::cast_possible_truncation)]
978        let output_token_count = if result_text.len() == pre_terse_len {
979            output_tokens as usize
980        } else {
981            crate::core::tokens::count_tokens(&result_text)
982        };
983        let action = helpers::get_str(args, "action");
984
985        // K-bounded staleness guard: warn if shared context has diverged.
986        const K_STALENESS_BOUND: i64 = 10;
987        if self.session_mode == crate::tools::SessionMode::Shared {
988            if let Some(ref rt) = self.context_os {
989                let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
990                let cursor = self
991                    .last_seen_event_id
992                    .load(std::sync::atomic::Ordering::Relaxed);
993                if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
994                    let gap = latest - cursor;
995                    result_text = format!(
996                        "[CONTEXT STALE] {gap} events happened since your last read. \
997                         Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
998                    );
999                }
1000                self.last_seen_event_id
1001                    .store(latest, std::sync::atomic::Ordering::Relaxed);
1002            }
1003        }
1004
1005        {
1006            let input = helpers::canonical_args_string(args);
1007            let input_md5 = helpers::hash_fast(&input);
1008            let output_md5 = helpers::hash_fast(&result_text);
1009            let agent_id = self.agent_id.read().await.clone();
1010            let client_name = self.client_name.read().await.clone();
1011            let mut explicit_intent: Option<(
1012                crate::core::intent_protocol::IntentRecord,
1013                Option<String>,
1014                String,
1015            )> = None;
1016
1017            let pending_session_save = {
1018                let empty_args = serde_json::Map::new();
1019                let args_map = args.unwrap_or(&empty_args);
1020                let mut session = self.session.write().await;
1021                session.record_tool_receipt(
1022                    name,
1023                    action.as_deref(),
1024                    &input_md5,
1025                    &output_md5,
1026                    agent_id.as_deref(),
1027                    Some(&client_name),
1028                );
1029
1030                if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
1031                    name,
1032                    action.as_deref(),
1033                    args_map,
1034                    session.project_root.as_deref(),
1035                ) {
1036                    let is_explicit =
1037                        intent.source == crate::core::intent_protocol::IntentSource::Explicit;
1038                    let root = session.project_root.clone();
1039                    let sid = session.id.clone();
1040                    session.record_intent(intent.clone());
1041                    if is_explicit {
1042                        explicit_intent = Some((intent, root, sid));
1043                    }
1044                }
1045                if session.should_save() {
1046                    session.prepare_save().ok()
1047                } else {
1048                    None
1049                }
1050            };
1051
1052            if let Some(prepared) = pending_session_save {
1053                let ir_clone = self.context_ir.clone();
1054                tokio::task::spawn_blocking(move || {
1055                    let _ = prepared.write_to_disk();
1056                    if let Some(ir) = ir_clone {
1057                        if let Ok(ir_guard) = ir.try_read() {
1058                            ir_guard.save();
1059                        }
1060                    }
1061                });
1062            }
1063
1064            if let Some((intent, root, session_id)) = explicit_intent {
1065                let _ = crate::core::intent_protocol::apply_side_effects(
1066                    &intent,
1067                    root.as_deref(),
1068                    &session_id,
1069                );
1070            }
1071
1072            if self.autonomy.is_enabled() {
1073                let (calls, project_root) = {
1074                    let session = self.session.read().await;
1075                    (session.stats.total_tool_calls, session.project_root.clone())
1076                };
1077
1078                if let Some(root) = project_root {
1079                    if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
1080                        let root_clone = root.clone();
1081                        tokio::task::spawn_blocking(move || {
1082                            let _ = crate::core::consolidation_engine::consolidate_latest(
1083                                &root_clone,
1084                                crate::core::consolidation_engine::ConsolidationBudgets::default(),
1085                            );
1086                        });
1087                    }
1088                }
1089            }
1090
1091            let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
1092            let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
1093            let output_token_count_u64 = output_token_count as u64;
1094            let name_owned = name.to_string();
1095            tokio::task::spawn_blocking(move || {
1096                let pricing = crate::core::gain::model_pricing::ModelPricing::load();
1097                let quote = pricing.quote_from_env_or_agent_type(&client_name);
1098                let cost_usd =
1099                    quote
1100                        .cost
1101                        .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
1102                crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
1103
1104                let mut store = crate::core::a2a::cost_attribution::CostStore::load();
1105                store.record_tool_call(
1106                    &agent_key,
1107                    &client_name,
1108                    &name_owned,
1109                    input_token_count,
1110                    output_token_count_u64,
1111                    0,
1112                );
1113                let _ = store.save();
1114            });
1115        }
1116
1117        // Context Bus: conflict detection for knowledge writes in shared mode.
1118        if self.session_mode == crate::tools::SessionMode::Shared
1119            && name == "ctx_knowledge"
1120            && action.as_deref() == Some("remember")
1121        {
1122            if let Some(ref rt) = self.context_os {
1123                let my_agent = self.agent_id.read().await.clone();
1124                let category = helpers::get_str(args, "category");
1125                let key = helpers::get_str(args, "key");
1126                if let (Some(ref cat), Some(ref k)) = (&category, &key) {
1127                    let recent = rt.bus.recent_by_kind(
1128                        &self.workspace_id,
1129                        &self.channel_id,
1130                        "knowledge_remembered",
1131                        20,
1132                    );
1133                    for ev in &recent {
1134                        let p = &ev.payload;
1135                        let ev_cat = p.get("category").and_then(|v| v.as_str());
1136                        let ev_key = p.get("key").and_then(|v| v.as_str());
1137                        let ev_actor = ev.actor.as_deref();
1138                        if ev_cat == Some(cat.as_str())
1139                            && ev_key == Some(k.as_str())
1140                            && ev_actor != my_agent.as_deref()
1141                        {
1142                            let other = ev_actor.unwrap_or("unknown");
1143                            result_text = format!(
1144                                "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
1145                                 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
1146                            );
1147                            break;
1148                        }
1149                    }
1150                }
1151            }
1152        }
1153
1154        // Context OS: persist shared session + publish events.
1155        if self.session_mode == crate::tools::SessionMode::Shared {
1156            let ws = self.workspace_id.clone();
1157            let ch = self.channel_id.clone();
1158            let rt = self.context_os.clone();
1159            let agent = self.agent_id.read().await.clone();
1160            let tool = name.to_string();
1161            let tool_action = action.clone();
1162            let tool_path = helpers::get_str(args, "path");
1163            let tool_category = helpers::get_str(args, "category");
1164            let tool_key = helpers::get_str(args, "key");
1165            let session_snapshot = self.session.read().await.clone();
1166            let session_task = session_snapshot.task.clone();
1167            tokio::task::spawn_blocking(move || {
1168                let Some(rt) = rt else {
1169                    return;
1170                };
1171                let Some(root) = session_snapshot.project_root.as_deref() else {
1172                    return;
1173                };
1174                rt.shared_sessions
1175                    .persist_best_effort(root, &ws, &ch, &session_snapshot);
1176                rt.metrics.record_session_persisted();
1177
1178                let mut base_payload = serde_json::json!({
1179                    "tool": tool,
1180                    "action": tool_action,
1181                });
1182                if let Some(ref p) = tool_path {
1183                    base_payload["path"] = serde_json::Value::String(p.clone());
1184                }
1185                if let Some(ref c) = tool_category {
1186                    base_payload["category"] = serde_json::Value::String(c.clone());
1187                }
1188                if let Some(ref k) = tool_key {
1189                    base_payload["key"] = serde_json::Value::String(k.clone());
1190                }
1191                if let Some(ref t) = session_task {
1192                    base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1193                }
1194
1195                if rt
1196                    .bus
1197                    .append(
1198                        &ws,
1199                        &ch,
1200                        &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1201                        agent.as_deref(),
1202                        base_payload.clone(),
1203                    )
1204                    .is_some()
1205                {
1206                    rt.metrics.record_event_appended();
1207                    rt.metrics.record_event_broadcast();
1208                }
1209
1210                if let Some(secondary) =
1211                    crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1212                {
1213                    if rt
1214                        .bus
1215                        .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1216                        .is_some()
1217                    {
1218                        rt.metrics.record_event_appended();
1219                        rt.metrics.record_event_broadcast();
1220                    }
1221                }
1222            });
1223        }
1224
1225        let skip_checkpoint = minimal
1226            || matches!(
1227                name,
1228                "ctx_compress"
1229                    | "ctx_metrics"
1230                    | "ctx_benchmark"
1231                    | "ctx_analyze"
1232                    | "ctx_cache"
1233                    | "ctx_discover"
1234                    | "ctx_dedup"
1235                    | "ctx_session"
1236                    | "ctx_knowledge"
1237                    | "ctx_agent"
1238                    | "ctx_share"
1239                    | "ctx_gain"
1240                    | "ctx_overview"
1241                    | "ctx_preload"
1242                    | "ctx_cost"
1243                    | "ctx_heatmap"
1244                    | "ctx_task"
1245                    | "ctx_impact"
1246                    | "ctx_architecture"
1247                    | "ctx_smells"
1248                    | "ctx_workflow"
1249            );
1250
1251        if !skip_checkpoint && self.increment_and_check() {
1252            if let Some(checkpoint) = self.auto_checkpoint().await {
1253                let interval = LeanCtxServer::checkpoint_interval_effective();
1254                let hints = crate::core::profiles::active_profile().output_hints;
1255                if hints.checkpoint_in_output() && crate::core::protocol::meta_visible() {
1256                    let combined = format!(
1257                        "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1258                    );
1259                    return Ok(CallToolResult::success(vec![Content::text(combined)]));
1260                }
1261            }
1262        }
1263
1264        let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1265        if tool_duration_ms > 100 {
1266            LeanCtxServer::append_tool_call_log(
1267                name,
1268                tool_duration_ms,
1269                0,
1270                0,
1271                None,
1272                &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1273            );
1274        }
1275
1276        let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1277        if current_count > 0 && current_count.is_multiple_of(100) {
1278            std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1279        }
1280
1281        Ok(CallToolResult::success(vec![Content::text(result_text)]))
1282    }
1283}
1284
1285pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1286    crate::instructions::build_instructions_for_test(crp_mode)
1287}
1288
1289pub fn build_claude_code_instructions_for_test() -> String {
1290    crate::instructions::claude_code_instructions()
1291}
1292
1293const PROJECT_MARKERS: &[&str] = &[
1294    ".git",
1295    "Cargo.toml",
1296    "package.json",
1297    "go.mod",
1298    "pyproject.toml",
1299    "setup.py",
1300    "pom.xml",
1301    "build.gradle",
1302    "Makefile",
1303    ".lean-ctx.toml",
1304];
1305
1306fn has_project_marker(dir: &std::path::Path) -> bool {
1307    PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1308}
1309
1310fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1311    if let Some(home) = dirs::home_dir() {
1312        if dir == home {
1313            return true;
1314        }
1315    }
1316    let dir_str = dir.to_string_lossy();
1317    dir_str.ends_with("/.claude")
1318        || dir_str.ends_with("/.codex")
1319        || dir_str.contains("/.claude/")
1320        || dir_str.contains("/.codex/")
1321}
1322
1323fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1324    std::process::Command::new("git")
1325        .args(["rev-parse", "--show-toplevel"])
1326        .current_dir(dir)
1327        .stdout(std::process::Stdio::piped())
1328        .stderr(std::process::Stdio::null())
1329        .output()
1330        .ok()
1331        .and_then(|o| {
1332            if o.status.success() {
1333                String::from_utf8(o.stdout)
1334                    .ok()
1335                    .map(|s| s.trim().to_string())
1336            } else {
1337                None
1338            }
1339        })
1340}
1341
1342pub fn derive_project_root_from_cwd() -> Option<String> {
1343    let cwd = std::env::current_dir().ok()?;
1344    let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1345
1346    if is_home_or_agent_dir(&canonical) {
1347        return git_toplevel_from(&canonical);
1348    }
1349
1350    if has_project_marker(&canonical) {
1351        return Some(canonical.to_string_lossy().to_string());
1352    }
1353
1354    if let Some(git_root) = git_toplevel_from(&canonical) {
1355        return Some(git_root);
1356    }
1357
1358    if let Some(root) = detect_multi_root_workspace(&canonical) {
1359        return Some(root);
1360    }
1361
1362    // Fallback: use CWD as project root if it's a specific, safe directory.
1363    // This ensures bare directories (no .git, no markers) still work.
1364    // Guard: reject home dir, filesystem root, and agent sandbox dirs.
1365    if !crate::core::pathutil::is_broad_or_unsafe_root(&canonical) {
1366        tracing::info!(
1367            "No project markers found — using CWD as project root: {}",
1368            canonical.display()
1369        );
1370        return Some(canonical.to_string_lossy().to_string());
1371    }
1372
1373    None
1374}
1375
1376// Delegated to crate::core::pathutil::is_broad_or_unsafe_root
1377#[cfg(test)]
1378use crate::core::pathutil::is_broad_or_unsafe_root;
1379
1380/// Detect a multi-root workspace: a directory that has no project markers
1381/// itself, but contains child directories that do. In this case, use the
1382/// parent as jail root and auto-allow all child projects via LEAN_CTX_ALLOW_PATH.
1383fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1384    let entries = std::fs::read_dir(dir).ok()?;
1385    let mut child_projects: Vec<String> = Vec::new();
1386
1387    for entry in entries.flatten() {
1388        let path = entry.path();
1389        if path.is_dir() && has_project_marker(&path) {
1390            let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1391            child_projects.push(canonical.to_string_lossy().to_string());
1392        }
1393    }
1394
1395    if child_projects.len() >= 2 {
1396        let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1397        let sep = if cfg!(windows) { ";" } else { ":" };
1398        let merged = if existing.is_empty() {
1399            child_projects.join(sep)
1400        } else {
1401            format!("{existing}{sep}{}", child_projects.join(sep))
1402        };
1403        std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1404        tracing::info!(
1405            "Multi-root workspace detected at {}: auto-allowing {} child projects",
1406            dir.display(),
1407            child_projects.len()
1408        );
1409        return Some(dir.to_string_lossy().to_string());
1410    }
1411
1412    None
1413}
1414
1415pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1416    crate::tool_defs::list_all_tool_defs()
1417        .into_iter()
1418        .map(|(name, desc, _)| (name, desc))
1419        .collect()
1420}
1421
1422pub fn tool_schemas_json_for_test() -> String {
1423    crate::tool_defs::list_all_tool_defs()
1424        .iter()
1425        .map(|(name, _, schema)| format!("{name}: {schema}"))
1426        .collect::<Vec<_>>()
1427        .join("\n")
1428}
1429
1430/// Tools that always pass through the workflow gate regardless of state.
1431/// Read-only tools should never be blocked — agents need them for context
1432/// recovery after crashes or session transitions.
1433pub const WORKFLOW_PASSTHROUGH_TOOLS: &[&str] = &[
1434    "ctx",
1435    "ctx_workflow",
1436    "ctx_read",
1437    "ctx_multi_read",
1438    "ctx_smart_read",
1439    "ctx_search",
1440    "ctx_tree",
1441    "ctx_session",
1442    "ctx_ledger",
1443];
1444
1445/// A workflow is stale if it hasn't been updated in 30 minutes.
1446/// This prevents dead workflows from blocking tools across sessions.
1447pub fn is_workflow_stale(run: &crate::core::workflow::types::WorkflowRun) -> bool {
1448    let elapsed = chrono::Utc::now()
1449        .signed_duration_since(run.updated_at)
1450        .num_minutes();
1451    elapsed > 30
1452}
1453
1454fn is_shell_tool_name(name: &str) -> bool {
1455    matches!(name, "ctx_shell" | "ctx_execute")
1456}
1457
1458fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1459    let trimmed = cmd.trim();
1460    let parts: Vec<&str> = trimmed.split_whitespace().collect();
1461    if parts.len() < 2 {
1462        return None;
1463    }
1464    let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1465    match bin {
1466        "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1467            let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1468            Some(file_arg.to_string())
1469        }
1470        _ => None,
1471    }
1472}
1473
1474#[cfg(test)]
1475mod tests {
1476    use super::*;
1477
1478    #[test]
1479    fn project_markers_detected() {
1480        let tmp = tempfile::tempdir().unwrap();
1481        let root = tmp.path().join("myproject");
1482        std::fs::create_dir_all(&root).unwrap();
1483        assert!(!has_project_marker(&root));
1484
1485        std::fs::create_dir(root.join(".git")).unwrap();
1486        assert!(has_project_marker(&root));
1487    }
1488
1489    #[test]
1490    fn home_dir_detected_as_agent_dir() {
1491        if let Some(home) = dirs::home_dir() {
1492            assert!(is_home_or_agent_dir(&home));
1493        }
1494    }
1495
1496    #[test]
1497    fn agent_dirs_detected() {
1498        let claude = std::path::PathBuf::from("/home/user/.claude");
1499        assert!(is_home_or_agent_dir(&claude));
1500        let codex = std::path::PathBuf::from("/home/user/.codex");
1501        assert!(is_home_or_agent_dir(&codex));
1502        let project = std::path::PathBuf::from("/home/user/projects/myapp");
1503        assert!(!is_home_or_agent_dir(&project));
1504    }
1505
1506    #[test]
1507    fn test_unified_tool_count() {
1508        let tools = crate::tool_defs::unified_tool_defs();
1509        assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1510    }
1511
1512    #[test]
1513    fn test_granular_tool_count() {
1514        let tools = crate::tool_defs::granular_tool_defs();
1515        assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1516    }
1517
1518    #[test]
1519    fn test_registry_tool_count_ssot() {
1520        let registry = crate::server::registry::build_registry();
1521        assert_eq!(
1522            registry.len(),
1523            62,
1524            "Registry tool count drift! Update this test AND all docs when adding/removing tools."
1525        );
1526    }
1527
1528    #[test]
1529    fn disabled_tools_filters_list() {
1530        let all = crate::tool_defs::granular_tool_defs();
1531        let total = all.len();
1532        let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1533        let filtered: Vec<_> = all
1534            .into_iter()
1535            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1536            .collect();
1537        assert_eq!(filtered.len(), total - 2);
1538        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1539        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1540    }
1541
1542    #[test]
1543    fn empty_disabled_tools_returns_all() {
1544        let all = crate::tool_defs::granular_tool_defs();
1545        let total = all.len();
1546        let disabled: Vec<String> = vec![];
1547        let filtered: Vec<_> = all
1548            .into_iter()
1549            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1550            .collect();
1551        assert_eq!(filtered.len(), total);
1552    }
1553
1554    #[test]
1555    fn misspelled_disabled_tool_is_silently_ignored() {
1556        let all = crate::tool_defs::granular_tool_defs();
1557        let total = all.len();
1558        let disabled = ["ctx_nonexistent_tool".to_string()];
1559        let filtered: Vec<_> = all
1560            .into_iter()
1561            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1562            .collect();
1563        assert_eq!(filtered.len(), total);
1564    }
1565
1566    #[test]
1567    fn detect_multi_root_workspace_with_child_projects() {
1568        let tmp = tempfile::tempdir().unwrap();
1569        let workspace = tmp.path().join("workspace");
1570        std::fs::create_dir_all(&workspace).unwrap();
1571
1572        let proj_a = workspace.join("project-a");
1573        let proj_b = workspace.join("project-b");
1574        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1575        std::fs::create_dir_all(&proj_b).unwrap();
1576        std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1577
1578        let result = detect_multi_root_workspace(&workspace);
1579        assert!(
1580            result.is_some(),
1581            "should detect workspace with 2 child projects"
1582        );
1583
1584        std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1585    }
1586
1587    #[test]
1588    fn detect_multi_root_workspace_returns_none_for_single_project() {
1589        let tmp = tempfile::tempdir().unwrap();
1590        let workspace = tmp.path().join("workspace");
1591        std::fs::create_dir_all(&workspace).unwrap();
1592
1593        let proj_a = workspace.join("project-a");
1594        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1595
1596        let result = detect_multi_root_workspace(&workspace);
1597        assert!(
1598            result.is_none(),
1599            "should not detect workspace with only 1 child project"
1600        );
1601    }
1602
1603    #[test]
1604    fn is_broad_or_unsafe_root_rejects_home() {
1605        if let Some(home) = dirs::home_dir() {
1606            assert!(is_broad_or_unsafe_root(&home));
1607        }
1608    }
1609
1610    #[test]
1611    fn is_broad_or_unsafe_root_rejects_filesystem_root() {
1612        assert!(is_broad_or_unsafe_root(std::path::Path::new("/")));
1613    }
1614
1615    #[test]
1616    fn is_broad_or_unsafe_root_rejects_agent_dirs() {
1617        assert!(is_broad_or_unsafe_root(std::path::Path::new(
1618            "/home/user/.claude"
1619        )));
1620        assert!(is_broad_or_unsafe_root(std::path::Path::new(
1621            "/home/user/.codex"
1622        )));
1623    }
1624
1625    #[test]
1626    fn is_broad_or_unsafe_root_allows_project_subdir() {
1627        let tmp = tempfile::tempdir().unwrap();
1628        let subdir = tmp.path().join("my-project");
1629        std::fs::create_dir_all(&subdir).unwrap();
1630        assert!(!is_broad_or_unsafe_root(&subdir));
1631    }
1632
1633    #[test]
1634    fn is_broad_or_unsafe_root_allows_tmp_subdirs() {
1635        assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1636            "/tmp/leanctx-test"
1637        )));
1638        assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1639            "/tmp/my-project"
1640        )));
1641    }
1642
1643    #[test]
1644    fn is_broad_or_unsafe_root_allows_home_subdirs() {
1645        if let Some(home) = dirs::home_dir() {
1646            let subdir = home.join("projects").join("my-app");
1647            assert!(!is_broad_or_unsafe_root(&subdir));
1648        }
1649    }
1650
1651    #[test]
1652    fn derive_project_root_falls_back_to_bare_cwd() {
1653        let tmp = tempfile::tempdir().unwrap();
1654        let bare = tmp.path().join("bare-dir");
1655        std::fs::create_dir_all(&bare).unwrap();
1656
1657        let original = std::env::current_dir().unwrap();
1658        std::env::set_current_dir(&bare).unwrap();
1659        let result = derive_project_root_from_cwd();
1660        std::env::set_current_dir(original).unwrap();
1661
1662        assert!(result.is_some(), "bare dir should produce a project root");
1663        let root = result.unwrap();
1664        assert!(
1665            root.contains("bare-dir"),
1666            "fallback should use the bare dir path"
1667        );
1668    }
1669}