1pub mod context_gate;
2mod dispatch;
3pub mod dynamic_tools;
4pub mod elicitation;
5pub(crate) mod execute;
6pub mod helpers;
7pub mod notifications;
8pub mod prompts;
9pub mod registry;
10pub mod resources;
11pub mod role_guard;
12pub mod tool_trait;
13
14use rmcp::handler::server::ServerHandler;
15use rmcp::model::{
16 CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
17 InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
18};
19use rmcp::service::{RequestContext, RoleServer};
20use rmcp::ErrorData;
21
22use crate::tools::{CrpMode, LeanCtxServer};
23
24impl ServerHandler for LeanCtxServer {
25 fn get_info(&self) -> ServerInfo {
26 let capabilities = ServerCapabilities::builder()
27 .enable_tools()
28 .enable_resources()
29 .enable_resources_subscribe()
30 .enable_prompts()
31 .build();
32
33 let config = crate::core::config::Config::load();
34 let level = crate::core::config::CompressionLevel::effective(&config);
35 let _ = crate::core::terse::rules_inject::inject(&level);
36
37 let instructions = crate::instructions::build_instructions(CrpMode::effective());
38
39 InitializeResult::new(capabilities)
40 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
41 .with_instructions(instructions)
42 }
43
44 async fn initialize(
45 &self,
46 request: InitializeRequestParams,
47 context: RequestContext<RoleServer>,
48 ) -> Result<InitializeResult, ErrorData> {
49 let name = request.client_info.name.clone();
50 tracing::info!("MCP client connected: {:?}", name);
51 *self.client_name.write().await = name.clone();
52 *self.peer.write().await = Some(context.peer.clone());
53
54 if self.session_mode != crate::tools::SessionMode::Shared {
55 crate::core::budget_tracker::BudgetTracker::global().reset();
56 if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
57 let radar = data_dir.join("context_radar.jsonl");
58 if radar.exists() {
59 let prev = data_dir.join("context_radar.prev.jsonl");
60 let _ = std::fs::rename(&radar, &prev);
61 }
62 }
63 }
64
65 let derived_root = derive_project_root_from_cwd();
66 let cwd_str = std::env::current_dir()
67 .ok()
68 .map(|p| p.to_string_lossy().to_string())
69 .unwrap_or_default();
70 {
71 let mut session = self.session.write().await;
72 if !cwd_str.is_empty() {
73 session.shell_cwd = Some(cwd_str.clone());
74 }
75 if let Some(ref root) = derived_root {
76 session.project_root = Some(root.clone());
77 tracing::info!("Project root set to: {root}");
78 } else if let Some(ref root) = session.project_root {
79 let root_path = std::path::Path::new(root);
80 let root_has_marker = has_project_marker(root_path);
81 let root_str = root_path.to_string_lossy();
82 let root_suspicious = root_str.contains("/.claude")
83 || root_str.contains("/.codex")
84 || root_str.contains("/var/folders/")
85 || root_str.contains("/tmp/")
86 || root_str.contains("\\.claude")
87 || root_str.contains("\\.codex")
88 || root_str.contains("\\AppData\\Local\\Temp")
89 || root_str.contains("\\Temp\\");
90 if root_suspicious && !root_has_marker {
91 session.project_root = None;
92 }
93 }
94 if self.session_mode == crate::tools::SessionMode::Shared {
95 if let Some(ref root) = session.project_root {
96 if let Some(ref rt) = self.context_os {
97 rt.shared_sessions.persist_best_effort(
98 root,
99 &self.workspace_id,
100 &self.channel_id,
101 &session,
102 );
103 rt.metrics.record_session_persisted();
104 }
105 }
106 } else {
107 let _ = session.save();
108 }
109 }
110
111 let agent_name = name.clone();
112 let agent_root = derived_root.clone().unwrap_or_default();
113 let agent_id_handle = self.agent_id.clone();
114 tokio::task::spawn_blocking(move || {
115 if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
116 return;
117 }
118
119 let maintenance = crate::core::startup_guard::try_acquire_lock(
123 "startup-maintenance",
124 std::time::Duration::from_secs(2),
125 std::time::Duration::from_mins(2),
126 );
127 if maintenance.is_some() {
128 if let Some(home) = dirs::home_dir() {
129 let _ = crate::rules_inject::inject_all_rules(&home);
130 }
131 crate::hooks::refresh_installed_hooks();
132 crate::core::version_check::check_background();
133 }
134 drop(maintenance);
135
136 if !agent_root.is_empty() {
137 let heuristic_role = match agent_name.to_lowercase().as_str() {
138 n if n.contains("cursor") => Some("coder"),
139 n if n.contains("claude") => Some("coder"),
140 n if n.contains("codex") => Some("coder"),
141 n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
142 n if n.contains("review") => Some("reviewer"),
143 n if n.contains("test") => Some("debugger"),
144 _ => None,
145 };
146 let env_role = std::env::var("LEAN_CTX_ROLE")
147 .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
148 .ok();
149 let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
150
151 let _ = crate::core::roles::set_active_role(effective_role);
152
153 let mut registry = crate::core::agents::AgentRegistry::load_or_create();
154 registry.cleanup_stale(24);
155 let id = registry.register("mcp", Some(effective_role), &agent_root);
156 let _ = registry.save();
157 if let Ok(mut guard) = agent_id_handle.try_write() {
158 *guard = Some(id);
159 }
160 }
161 });
162
163 let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
164 tracing::info!("Client capabilities: {}", client_caps.format_summary());
165
166 if client_caps.dynamic_tools {
167 if let Ok(mut dt) = dynamic_tools::global().lock() {
168 dt.set_supports_list_changed(true);
169 }
170 }
171 if let Some(max) = client_caps.max_tools {
172 if let Ok(mut dt) = dynamic_tools::global().lock() {
173 dt.set_supports_list_changed(true);
174 if max < 100 {
175 dt.unload_category(dynamic_tools::ToolCategory::Debug);
176 dt.unload_category(dynamic_tools::ToolCategory::Memory);
177 }
178 }
179 }
180
181 crate::core::client_capabilities::set_detected(&client_caps);
182
183 let instructions =
184 crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
185
186 let capabilities = match (client_caps.resources, client_caps.prompts) {
187 (true, true) => ServerCapabilities::builder()
188 .enable_tools()
189 .enable_resources()
190 .enable_resources_subscribe()
191 .enable_prompts()
192 .build(),
193 (true, false) => ServerCapabilities::builder()
194 .enable_tools()
195 .enable_resources()
196 .enable_resources_subscribe()
197 .build(),
198 (false, true) => ServerCapabilities::builder()
199 .enable_tools()
200 .enable_prompts()
201 .build(),
202 (false, false) => ServerCapabilities::builder().enable_tools().build(),
203 };
204
205 Ok(InitializeResult::new(capabilities)
206 .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
207 .with_instructions(instructions))
208 }
209
210 async fn list_tools(
211 &self,
212 _request: Option<PaginatedRequestParams>,
213 _context: RequestContext<RoleServer>,
214 ) -> Result<ListToolsResult, ErrorData> {
215 let all_tools = if crate::tool_defs::is_full_mode() {
216 crate::tool_defs::granular_tool_defs()
217 } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
218 crate::tool_defs::unified_tool_defs()
219 } else {
220 crate::tool_defs::lazy_tool_defs()
221 };
222
223 let disabled = crate::core::config::Config::load().disabled_tools_effective();
224 let client = self.client_name.read().await.clone();
225 let is_zed = !client.is_empty() && client.to_lowercase().contains("zed");
226
227 let tools: Vec<_> = all_tools
228 .into_iter()
229 .filter(|t| {
230 let name = t.name.as_ref();
231 if !disabled.is_empty() && disabled.iter().any(|d| d.as_str() == name) {
232 return false;
233 }
234 if is_zed && name == "ctx_edit" {
235 return false;
236 }
237 true
238 })
239 .collect();
240
241 let tools = {
242 let dyn_state = dynamic_tools::global().lock().unwrap();
243 if dyn_state.supports_list_changed() {
244 tools
245 .into_iter()
246 .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
247 .collect()
248 } else {
249 tools
250 }
251 };
252
253 let tools = {
254 let active = self.workflow.read().await.clone();
255 if let Some(run) = active {
256 if let Some(state) = run.spec.state(&run.current) {
257 if let Some(allowed) = &state.allowed_tools {
258 let mut allow: std::collections::HashSet<&str> =
259 allowed.iter().map(std::string::String::as_str).collect();
260 allow.insert("ctx");
261 allow.insert("ctx_workflow");
262 return Ok(ListToolsResult {
263 tools: tools
264 .into_iter()
265 .filter(|t| allow.contains(t.name.as_ref()))
266 .collect(),
267 ..Default::default()
268 });
269 }
270 }
271 }
272 tools
273 };
274
275 let tools = {
276 let cfg = crate::core::config::Config::load();
277 let level = crate::core::config::CompressionLevel::effective(&cfg);
278 let mode =
279 crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
280 if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
281 tools
282 } else {
283 tools
284 .into_iter()
285 .map(|mut t| {
286 let compressed = crate::core::terse::mcp_compress::compress_description(
287 t.name.as_ref(),
288 t.description.as_deref().unwrap_or(""),
289 mode,
290 );
291 t.description = Some(compressed.into());
292 t
293 })
294 .collect()
295 }
296 };
297
298 Ok(ListToolsResult {
299 tools,
300 ..Default::default()
301 })
302 }
303
304 async fn list_prompts(
305 &self,
306 _request: Option<PaginatedRequestParams>,
307 _context: RequestContext<RoleServer>,
308 ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
309 Ok(rmcp::model::ListPromptsResult::with_all_items(
310 prompts::list_prompts(),
311 ))
312 }
313
314 async fn get_prompt(
315 &self,
316 request: rmcp::model::GetPromptRequestParams,
317 _context: RequestContext<RoleServer>,
318 ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
319 let ledger = self.ledger.read().await;
320 match prompts::get_prompt(&request, &ledger) {
321 Some(result) => Ok(result),
322 None => Err(ErrorData::invalid_params(
323 format!("Unknown prompt: {}", request.name),
324 None,
325 )),
326 }
327 }
328
329 async fn list_resources(
330 &self,
331 _request: Option<PaginatedRequestParams>,
332 _context: RequestContext<RoleServer>,
333 ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
334 Ok(rmcp::model::ListResourcesResult::with_all_items(
335 resources::list_resources(),
336 ))
337 }
338
339 async fn read_resource(
340 &self,
341 request: rmcp::model::ReadResourceRequestParams,
342 _context: RequestContext<RoleServer>,
343 ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
344 let ledger = self.ledger.read().await;
345 match resources::read_resource(&request.uri, &ledger) {
346 Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
347 None => Err(rmcp::ErrorData::resource_not_found(
348 format!("Unknown resource: {}", request.uri),
349 None,
350 )),
351 }
352 }
353
354 async fn call_tool(
355 &self,
356 request: CallToolRequestParams,
357 _context: RequestContext<RoleServer>,
358 ) -> Result<CallToolResult, ErrorData> {
359 self.check_idle_expiry().await;
360 elicitation::increment_call();
361
362 let original_name = request.name.as_ref().to_string();
363 let (resolved_name, resolved_args) = if original_name == "ctx" {
364 let sub = request
365 .arguments
366 .as_ref()
367 .and_then(|a| a.get("tool"))
368 .and_then(|v| v.as_str())
369 .map(std::string::ToString::to_string)
370 .ok_or_else(|| {
371 ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
372 })?;
373 let tool_name = if sub.starts_with("ctx_") {
374 sub
375 } else {
376 format!("ctx_{sub}")
377 };
378 let mut args = request.arguments.unwrap_or_default();
379 args.remove("tool");
380 (tool_name, Some(args))
381 } else {
382 (original_name, request.arguments)
383 };
384 let name = resolved_name.as_str();
385 let args = resolved_args.as_ref();
386
387 let role_check = role_guard::check_tool_access(name);
388 if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
389 tracing::warn!(
390 tool = name,
391 role = %role_check.role_name,
392 "Tool blocked by role policy"
393 );
394 return Ok(denied);
395 }
396
397 if name != "ctx_workflow" {
398 let active = self.workflow.read().await.clone();
399 if let Some(run) = active {
400 if let Some(state) = run.spec.state(&run.current) {
401 if let Some(allowed) = &state.allowed_tools {
402 let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
403 if !allowed_ok {
404 let mut shown = allowed.clone();
405 shown.sort();
406 shown.truncate(30);
407 return Ok(CallToolResult::success(vec![Content::text(format!(
408 "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
409 run.spec.name,
410 run.current,
411 shown.len(),
412 shown.join(", ")
413 ))]));
414 }
415 }
416 }
417 }
418 }
419
420 let auto_context = {
421 let task = {
422 let session = self.session.read().await;
423 session.task.as_ref().map(|t| t.description.clone())
424 };
425 let project_root = {
426 let session = self.session.read().await;
427 session.project_root.clone()
428 };
429 let mut cache = self.cache.write().await;
430 crate::tools::autonomy::session_lifecycle_pre_hook(
431 &self.autonomy,
432 name,
433 &mut cache,
434 task.as_deref(),
435 project_root.as_deref(),
436 CrpMode::effective(),
437 )
438 };
439
440 let throttle_result = {
441 let fp = args
442 .map(|a| {
443 crate::core::loop_detection::LoopDetector::fingerprint(
444 &serde_json::Value::Object(a.clone()),
445 )
446 })
447 .unwrap_or_default();
448 let mut detector = self.loop_detector.write().await;
449
450 let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
451 let is_search_shell = name == "ctx_shell" && {
452 let cmd = args
453 .as_ref()
454 .and_then(|a| a.get("command"))
455 .and_then(|v| v.as_str())
456 .unwrap_or("");
457 crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
458 };
459
460 if is_search || is_search_shell {
461 let search_pattern = args.and_then(|a| {
462 a.get("pattern")
463 .or_else(|| a.get("query"))
464 .and_then(|v| v.as_str())
465 });
466 let shell_pattern = if is_search_shell {
467 args.and_then(|a| a.get("command"))
468 .and_then(|v| v.as_str())
469 .and_then(helpers::extract_search_pattern_from_command)
470 } else {
471 None
472 };
473 let pat = search_pattern.or(shell_pattern.as_deref());
474 detector.record_search(name, &fp, pat)
475 } else {
476 detector.record_call(name, &fp)
477 }
478 };
479
480 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
481 let msg = throttle_result.message.unwrap_or_default();
482 return Ok(CallToolResult::success(vec![Content::text(msg)]));
483 }
484
485 let throttle_warning =
486 if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
487 throttle_result.message.clone()
488 } else {
489 None
490 };
491
492 let config = crate::core::config::Config::load();
493 let minimal = config.minimal_overhead_effective();
494
495 {
496 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
497 let snap = BudgetTracker::global().check();
498 if *snap.worst_level() == BudgetLevel::Exhausted
499 && name != "ctx_session"
500 && name != "ctx_cost"
501 && name != "ctx_metrics"
502 {
503 for (dim, lvl, used, limit) in [
504 (
505 "tokens",
506 &snap.tokens.level,
507 format!("{}", snap.tokens.used),
508 format!("{}", snap.tokens.limit),
509 ),
510 (
511 "shell",
512 &snap.shell.level,
513 format!("{}", snap.shell.used),
514 format!("{}", snap.shell.limit),
515 ),
516 (
517 "cost",
518 &snap.cost.level,
519 format!("${:.2}", snap.cost.used_usd),
520 format!("${:.2}", snap.cost.limit_usd),
521 ),
522 ] {
523 if *lvl == BudgetLevel::Exhausted {
524 crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
525 }
526 }
527 let msg = format!(
528 "[BUDGET EXHAUSTED] {}\n\
529 Use `ctx_session action=role` to check/switch roles, \
530 or `ctx_session action=reset` to start fresh.",
531 snap.format_compact()
532 );
533 tracing::warn!(tool = name, "{msg}");
534 return Ok(CallToolResult::success(vec![Content::text(msg)]));
535 }
536 }
537
538 if is_shell_tool_name(name) {
539 crate::core::budget_tracker::BudgetTracker::global().record_shell();
540 }
541
542 let tool_start = std::time::Instant::now();
543 let mut result_text = {
544 use futures::FutureExt;
545 use std::panic::AssertUnwindSafe;
546 match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
547 .catch_unwind()
548 .await
549 {
550 Ok(Ok(text)) => text,
551 Ok(Err(e)) => return Err(e),
552 Err(panic_payload) => {
553 let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
554 (*s).to_string()
555 } else if let Some(s) = panic_payload.downcast_ref::<String>() {
556 s.clone()
557 } else {
558 "unknown".to_string()
559 };
560 tracing::error!(tool = name, "Tool panicked: {detail}");
561 format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
562 The MCP server is still running. Please retry or use a different approach.")
563 }
564 }
565 };
566
567 let is_raw_shell = name == "ctx_shell" && {
568 let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
569 let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
570 arg_raw
571 || arg_bypass
572 || std::env::var("LEAN_CTX_DISABLED").is_ok()
573 || std::env::var("LEAN_CTX_RAW").is_ok()
574 };
575
576 let pre_terse_len = result_text.len();
577 let output_tokens = {
578 let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
579 crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
580 tokens
581 };
582
583 crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
584 crate::core::anomaly::save();
586
587 let budget_warning = {
588 use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
589 let snap = BudgetTracker::global().check();
590 if *snap.worst_level() == BudgetLevel::Warning {
591 for (dim, lvl, used, limit, pct) in [
592 (
593 "tokens",
594 &snap.tokens.level,
595 format!("{}", snap.tokens.used),
596 format!("{}", snap.tokens.limit),
597 snap.tokens.percent,
598 ),
599 (
600 "shell",
601 &snap.shell.level,
602 format!("{}", snap.shell.used),
603 format!("{}", snap.shell.limit),
604 snap.shell.percent,
605 ),
606 (
607 "cost",
608 &snap.cost.level,
609 format!("${:.2}", snap.cost.used_usd),
610 format!("${:.2}", snap.cost.limit_usd),
611 snap.cost.percent,
612 ),
613 ] {
614 if *lvl == BudgetLevel::Warning {
615 crate::core::events::emit_budget_warning(
616 &snap.role, dim, &used, &limit, pct,
617 );
618 }
619 }
620 if crate::core::protocol::meta_visible() {
621 Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
622 } else {
623 None
624 }
625 } else {
626 None
627 }
628 };
629
630 let archive_hint = if minimal || is_raw_shell {
631 None
632 } else {
633 use crate::core::archive;
634 let archivable = matches!(
635 name,
636 "ctx_shell"
637 | "ctx_read"
638 | "ctx_multi_read"
639 | "ctx_smart_read"
640 | "ctx_execute"
641 | "ctx_search"
642 | "ctx_tree"
643 );
644 if archivable && archive::should_archive(&result_text) {
645 let cmd = helpers::get_str(args, "command")
646 .or_else(|| helpers::get_str(args, "path"))
647 .unwrap_or_default();
648 let session_id = self.session.read().await.id.clone();
649 let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
650 let tokens = crate::core::tokens::count_tokens(&to_store);
651 archive::store(name, &cmd, &to_store, Some(&session_id))
652 .map(|id| archive::format_hint(&id, to_store.len(), tokens))
653 } else {
654 None
655 }
656 };
657
658 let pre_compression = result_text.clone();
659 let skip_terse = is_raw_shell
660 || (name == "ctx_shell"
661 && helpers::get_str(args, "command")
662 .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
663 let compression = crate::core::config::CompressionLevel::effective(&config);
664 if compression.is_active() && !skip_terse {
665 let terse_result =
666 crate::core::terse::pipeline::compress(&result_text, &compression, None);
667 if terse_result.quality_passed && terse_result.savings_pct >= 3.0 {
668 result_text = terse_result.output;
669 }
670 }
671
672 let profile_hints = crate::core::profiles::active_profile().output_hints;
673
674 if !is_raw_shell && profile_hints.verify_footer() {
675 let verify_cfg = crate::core::profiles::active_profile().verification;
676 let vr = crate::core::output_verification::verify_output(
677 &pre_compression,
678 &result_text,
679 &verify_cfg,
680 );
681 if !vr.warnings.is_empty() {
682 let msg = format!("[VERIFY] {}", vr.format_compact());
683 result_text = format!("{result_text}\n\n{msg}");
684 }
685 }
686
687 if profile_hints.archive_hint() {
688 if let Some(hint) = archive_hint {
689 result_text = format!("{result_text}\n{hint}");
690 }
691 }
692
693 if !is_raw_shell {
694 if let Some(ctx) = auto_context {
695 if crate::core::protocol::meta_visible() {
696 result_text = format!("{ctx}\n\n{result_text}");
697 }
698 }
699 }
700
701 if let Some(warning) = throttle_warning {
702 result_text = format!("{result_text}\n\n{warning}");
703 }
704
705 if let Some(bw) = budget_warning {
706 result_text = format!("{result_text}\n\n{bw}");
707 }
708
709 if !self
710 .rules_stale_checked
711 .swap(true, std::sync::atomic::Ordering::Relaxed)
712 {
713 let client = self.client_name.read().await.clone();
714 if !client.is_empty() {
715 if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
716 result_text = format!("{result_text}\n\n{stale_msg}");
717 }
718 }
719 }
720
721 {
722 let _ = crate::core::slo::evaluate();
724 }
725
726 if name == "ctx_read" {
727 if minimal {
728 let mut cache = self.cache.write().await;
729 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
730 } else {
731 let read_path = self
732 .resolve_path_or_passthrough(
733 &helpers::get_str(args, "path").unwrap_or_default(),
734 )
735 .await;
736 let project_root = {
737 let session = self.session.read().await;
738 session.project_root.clone()
739 };
740 let mut cache = self.cache.write().await;
741 let enrich = crate::tools::autonomy::enrich_after_read(
742 &self.autonomy,
743 &mut cache,
744 &read_path,
745 project_root.as_deref(),
746 None,
747 crate::tools::CrpMode::effective(),
748 false,
749 );
750 if profile_hints.related_hint() {
751 if let Some(hint) = enrich.related_hint {
752 result_text = format!("{result_text}\n{hint}");
753 }
754 }
755 crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
756
757 {
758 let active_task = {
759 let session = self.session.read().await;
760 session.task.as_ref().map(|t| t.description.clone())
761 };
762 let mut ledger = self.ledger.write().await;
763 let overlay = crate::core::context_overlay::OverlayStore::load_project(
764 &std::path::PathBuf::from(project_root.as_deref().unwrap_or(".")),
765 );
766 let mode_used =
767 helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
768 let gate_result = context_gate::post_dispatch_record_with_task(
769 &read_path,
770 &mode_used,
771 pre_terse_len,
772 output_tokens as usize,
773 &mut ledger,
774 &overlay,
775 active_task.as_deref(),
776 );
777 if let Some(hint) = gate_result.eviction_hint {
778 result_text = format!("{result_text}\n{hint}");
779 }
780 if profile_hints.elicitation_hint() {
781 if let Some(hint) = gate_result.elicitation_hint {
782 result_text = format!("{result_text}\n{hint}");
783 }
784 }
785 if gate_result.resource_changed {
786 if let Some(peer) = self.peer.read().await.as_ref() {
787 notifications::send_resource_updated(
788 peer,
789 notifications::RESOURCE_URI_SUMMARY,
790 )
791 .await;
792 }
793 }
794 }
795 }
796 }
797
798 if !minimal && !is_raw_shell && name == "ctx_shell" {
799 let cmd = helpers::get_str(args, "command").unwrap_or_default();
800
801 if let Some(file_path) = extract_file_read_from_shell(&cmd) {
802 if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
803 bt.next_seq();
804 bt.record_shell_file_access(&file_path);
805 }
806 }
807
808 if profile_hints.efficiency_hint() {
809 let calls = self.tool_calls.read().await;
810 let last_original = calls.last().map_or(0, |c| c.original_tokens);
811 drop(calls);
812 let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
813 if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
814 &self.autonomy,
815 &cmd,
816 last_original,
817 pre_hint_tokens,
818 ) {
819 result_text = format!("{result_text}\n{hint}");
820 }
821 }
822 }
823
824 #[allow(clippy::cast_possible_truncation)]
825 let output_token_count = if result_text.len() == pre_terse_len {
826 output_tokens as usize
827 } else {
828 crate::core::tokens::count_tokens(&result_text)
829 };
830 let action = helpers::get_str(args, "action");
831
832 const K_STALENESS_BOUND: i64 = 10;
834 if self.session_mode == crate::tools::SessionMode::Shared {
835 if let Some(ref rt) = self.context_os {
836 let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
837 let cursor = self
838 .last_seen_event_id
839 .load(std::sync::atomic::Ordering::Relaxed);
840 if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
841 let gap = latest - cursor;
842 result_text = format!(
843 "[CONTEXT STALE] {gap} events happened since your last read. \
844 Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
845 );
846 }
847 self.last_seen_event_id
848 .store(latest, std::sync::atomic::Ordering::Relaxed);
849 }
850 }
851
852 {
853 let input = helpers::canonical_args_string(args);
854 let input_md5 = helpers::hash_fast(&input);
855 let output_md5 = helpers::hash_fast(&result_text);
856 let agent_id = self.agent_id.read().await.clone();
857 let client_name = self.client_name.read().await.clone();
858 let mut explicit_intent: Option<(
859 crate::core::intent_protocol::IntentRecord,
860 Option<String>,
861 String,
862 )> = None;
863
864 let pending_session_save = {
865 let empty_args = serde_json::Map::new();
866 let args_map = args.unwrap_or(&empty_args);
867 let mut session = self.session.write().await;
868 session.record_tool_receipt(
869 name,
870 action.as_deref(),
871 &input_md5,
872 &output_md5,
873 agent_id.as_deref(),
874 Some(&client_name),
875 );
876
877 if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
878 name,
879 action.as_deref(),
880 args_map,
881 session.project_root.as_deref(),
882 ) {
883 let is_explicit =
884 intent.source == crate::core::intent_protocol::IntentSource::Explicit;
885 let root = session.project_root.clone();
886 let sid = session.id.clone();
887 session.record_intent(intent.clone());
888 if is_explicit {
889 explicit_intent = Some((intent, root, sid));
890 }
891 }
892 if session.should_save() {
893 session.prepare_save().ok()
894 } else {
895 None
896 }
897 };
898
899 if let Some(prepared) = pending_session_save {
900 tokio::task::spawn_blocking(move || {
901 let _ = prepared.write_to_disk();
902 });
903 }
904
905 if let Some((intent, root, session_id)) = explicit_intent {
906 let _ = crate::core::intent_protocol::apply_side_effects(
907 &intent,
908 root.as_deref(),
909 &session_id,
910 );
911 }
912
913 if self.autonomy.is_enabled() {
914 let (calls, project_root) = {
915 let session = self.session.read().await;
916 (session.stats.total_tool_calls, session.project_root.clone())
917 };
918
919 if let Some(root) = project_root {
920 if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
921 let root_clone = root.clone();
922 tokio::task::spawn_blocking(move || {
923 let _ = crate::core::consolidation_engine::consolidate_latest(
924 &root_clone,
925 crate::core::consolidation_engine::ConsolidationBudgets::default(),
926 );
927 });
928 }
929 }
930 }
931
932 let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
933 let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
934 let output_token_count_u64 = output_token_count as u64;
935 let name_owned = name.to_string();
936 tokio::task::spawn_blocking(move || {
937 let pricing = crate::core::gain::model_pricing::ModelPricing::load();
938 let quote = pricing.quote_from_env_or_agent_type(&client_name);
939 let cost_usd =
940 quote
941 .cost
942 .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
943 crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
944
945 let mut store = crate::core::a2a::cost_attribution::CostStore::load();
946 store.record_tool_call(
947 &agent_key,
948 &client_name,
949 &name_owned,
950 input_token_count,
951 output_token_count_u64,
952 0,
953 );
954 let _ = store.save();
955 });
956 }
957
958 if self.session_mode == crate::tools::SessionMode::Shared
960 && name == "ctx_knowledge"
961 && action.as_deref() == Some("remember")
962 {
963 if let Some(ref rt) = self.context_os {
964 let my_agent = self.agent_id.read().await.clone();
965 let category = helpers::get_str(args, "category");
966 let key = helpers::get_str(args, "key");
967 if let (Some(ref cat), Some(ref k)) = (&category, &key) {
968 let recent = rt.bus.recent_by_kind(
969 &self.workspace_id,
970 &self.channel_id,
971 "knowledge_remembered",
972 20,
973 );
974 for ev in &recent {
975 let p = &ev.payload;
976 let ev_cat = p.get("category").and_then(|v| v.as_str());
977 let ev_key = p.get("key").and_then(|v| v.as_str());
978 let ev_actor = ev.actor.as_deref();
979 if ev_cat == Some(cat.as_str())
980 && ev_key == Some(k.as_str())
981 && ev_actor != my_agent.as_deref()
982 {
983 let other = ev_actor.unwrap_or("unknown");
984 result_text = format!(
985 "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
986 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
987 );
988 break;
989 }
990 }
991 }
992 }
993 }
994
995 if self.session_mode == crate::tools::SessionMode::Shared {
997 let ws = self.workspace_id.clone();
998 let ch = self.channel_id.clone();
999 let rt = self.context_os.clone();
1000 let agent = self.agent_id.read().await.clone();
1001 let tool = name.to_string();
1002 let tool_action = action.clone();
1003 let tool_path = helpers::get_str(args, "path");
1004 let tool_category = helpers::get_str(args, "category");
1005 let tool_key = helpers::get_str(args, "key");
1006 let session_snapshot = self.session.read().await.clone();
1007 let session_task = session_snapshot.task.clone();
1008 tokio::task::spawn_blocking(move || {
1009 let Some(rt) = rt else {
1010 return;
1011 };
1012 let Some(root) = session_snapshot.project_root.as_deref() else {
1013 return;
1014 };
1015 rt.shared_sessions
1016 .persist_best_effort(root, &ws, &ch, &session_snapshot);
1017 rt.metrics.record_session_persisted();
1018
1019 let mut base_payload = serde_json::json!({
1020 "tool": tool,
1021 "action": tool_action,
1022 });
1023 if let Some(ref p) = tool_path {
1024 base_payload["path"] = serde_json::Value::String(p.clone());
1025 }
1026 if let Some(ref c) = tool_category {
1027 base_payload["category"] = serde_json::Value::String(c.clone());
1028 }
1029 if let Some(ref k) = tool_key {
1030 base_payload["key"] = serde_json::Value::String(k.clone());
1031 }
1032 if let Some(ref t) = session_task {
1033 base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1034 }
1035
1036 if rt
1037 .bus
1038 .append(
1039 &ws,
1040 &ch,
1041 &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1042 agent.as_deref(),
1043 base_payload.clone(),
1044 )
1045 .is_some()
1046 {
1047 rt.metrics.record_event_appended();
1048 rt.metrics.record_event_broadcast();
1049 }
1050
1051 if let Some(secondary) =
1052 crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1053 {
1054 if rt
1055 .bus
1056 .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1057 .is_some()
1058 {
1059 rt.metrics.record_event_appended();
1060 rt.metrics.record_event_broadcast();
1061 }
1062 }
1063 });
1064 }
1065
1066 let skip_checkpoint = minimal
1067 || matches!(
1068 name,
1069 "ctx_compress"
1070 | "ctx_metrics"
1071 | "ctx_benchmark"
1072 | "ctx_analyze"
1073 | "ctx_cache"
1074 | "ctx_discover"
1075 | "ctx_dedup"
1076 | "ctx_session"
1077 | "ctx_knowledge"
1078 | "ctx_agent"
1079 | "ctx_share"
1080 | "ctx_gain"
1081 | "ctx_overview"
1082 | "ctx_preload"
1083 | "ctx_cost"
1084 | "ctx_heatmap"
1085 | "ctx_task"
1086 | "ctx_impact"
1087 | "ctx_architecture"
1088 | "ctx_smells"
1089 | "ctx_workflow"
1090 );
1091
1092 if !skip_checkpoint && self.increment_and_check() {
1093 if let Some(checkpoint) = self.auto_checkpoint().await {
1094 let interval = LeanCtxServer::checkpoint_interval_effective();
1095 let hints = crate::core::profiles::active_profile().output_hints;
1096 if hints.checkpoint_in_output() && crate::core::protocol::meta_visible() {
1097 let combined = format!(
1098 "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1099 );
1100 return Ok(CallToolResult::success(vec![Content::text(combined)]));
1101 }
1102 }
1103 }
1104
1105 let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1106 if tool_duration_ms > 100 {
1107 LeanCtxServer::append_tool_call_log(
1108 name,
1109 tool_duration_ms,
1110 0,
1111 0,
1112 None,
1113 &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1114 );
1115 }
1116
1117 let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1118 if current_count > 0 && current_count.is_multiple_of(100) {
1119 std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1120 }
1121
1122 Ok(CallToolResult::success(vec![Content::text(result_text)]))
1123 }
1124}
1125
1126pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1127 crate::instructions::build_instructions_for_test(crp_mode)
1128}
1129
1130pub fn build_claude_code_instructions_for_test() -> String {
1131 crate::instructions::claude_code_instructions()
1132}
1133
1134const PROJECT_MARKERS: &[&str] = &[
1135 ".git",
1136 "Cargo.toml",
1137 "package.json",
1138 "go.mod",
1139 "pyproject.toml",
1140 "setup.py",
1141 "pom.xml",
1142 "build.gradle",
1143 "Makefile",
1144 ".lean-ctx.toml",
1145];
1146
1147fn has_project_marker(dir: &std::path::Path) -> bool {
1148 PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1149}
1150
1151fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1152 if let Some(home) = dirs::home_dir() {
1153 if dir == home {
1154 return true;
1155 }
1156 }
1157 let dir_str = dir.to_string_lossy();
1158 dir_str.ends_with("/.claude")
1159 || dir_str.ends_with("/.codex")
1160 || dir_str.contains("/.claude/")
1161 || dir_str.contains("/.codex/")
1162}
1163
1164fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1165 std::process::Command::new("git")
1166 .args(["rev-parse", "--show-toplevel"])
1167 .current_dir(dir)
1168 .stdout(std::process::Stdio::piped())
1169 .stderr(std::process::Stdio::null())
1170 .output()
1171 .ok()
1172 .and_then(|o| {
1173 if o.status.success() {
1174 String::from_utf8(o.stdout)
1175 .ok()
1176 .map(|s| s.trim().to_string())
1177 } else {
1178 None
1179 }
1180 })
1181}
1182
1183pub fn derive_project_root_from_cwd() -> Option<String> {
1184 let cwd = std::env::current_dir().ok()?;
1185 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1186
1187 if is_home_or_agent_dir(&canonical) {
1188 return git_toplevel_from(&canonical);
1189 }
1190
1191 if has_project_marker(&canonical) {
1192 return Some(canonical.to_string_lossy().to_string());
1193 }
1194
1195 if let Some(git_root) = git_toplevel_from(&canonical) {
1196 return Some(git_root);
1197 }
1198
1199 if let Some(root) = detect_multi_root_workspace(&canonical) {
1200 return Some(root);
1201 }
1202
1203 None
1204}
1205
1206fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1210 let entries = std::fs::read_dir(dir).ok()?;
1211 let mut child_projects: Vec<String> = Vec::new();
1212
1213 for entry in entries.flatten() {
1214 let path = entry.path();
1215 if path.is_dir() && has_project_marker(&path) {
1216 let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1217 child_projects.push(canonical.to_string_lossy().to_string());
1218 }
1219 }
1220
1221 if child_projects.len() >= 2 {
1222 let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1223 let sep = if cfg!(windows) { ";" } else { ":" };
1224 let merged = if existing.is_empty() {
1225 child_projects.join(sep)
1226 } else {
1227 format!("{existing}{sep}{}", child_projects.join(sep))
1228 };
1229 std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1230 tracing::info!(
1231 "Multi-root workspace detected at {}: auto-allowing {} child projects",
1232 dir.display(),
1233 child_projects.len()
1234 );
1235 return Some(dir.to_string_lossy().to_string());
1236 }
1237
1238 None
1239}
1240
1241pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1242 crate::tool_defs::list_all_tool_defs()
1243 .into_iter()
1244 .map(|(name, desc, _)| (name, desc))
1245 .collect()
1246}
1247
1248pub fn tool_schemas_json_for_test() -> String {
1249 crate::tool_defs::list_all_tool_defs()
1250 .iter()
1251 .map(|(name, _, schema)| format!("{name}: {schema}"))
1252 .collect::<Vec<_>>()
1253 .join("\n")
1254}
1255
1256fn is_shell_tool_name(name: &str) -> bool {
1257 matches!(name, "ctx_shell" | "ctx_execute")
1258}
1259
1260fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1261 let trimmed = cmd.trim();
1262 let parts: Vec<&str> = trimmed.split_whitespace().collect();
1263 if parts.len() < 2 {
1264 return None;
1265 }
1266 let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1267 match bin {
1268 "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1269 let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1270 Some(file_arg.to_string())
1271 }
1272 _ => None,
1273 }
1274}
1275
1276#[cfg(test)]
1277mod tests {
1278 use super::*;
1279
1280 #[test]
1281 fn project_markers_detected() {
1282 let tmp = tempfile::tempdir().unwrap();
1283 let root = tmp.path().join("myproject");
1284 std::fs::create_dir_all(&root).unwrap();
1285 assert!(!has_project_marker(&root));
1286
1287 std::fs::create_dir(root.join(".git")).unwrap();
1288 assert!(has_project_marker(&root));
1289 }
1290
1291 #[test]
1292 fn home_dir_detected_as_agent_dir() {
1293 if let Some(home) = dirs::home_dir() {
1294 assert!(is_home_or_agent_dir(&home));
1295 }
1296 }
1297
1298 #[test]
1299 fn agent_dirs_detected() {
1300 let claude = std::path::PathBuf::from("/home/user/.claude");
1301 assert!(is_home_or_agent_dir(&claude));
1302 let codex = std::path::PathBuf::from("/home/user/.codex");
1303 assert!(is_home_or_agent_dir(&codex));
1304 let project = std::path::PathBuf::from("/home/user/projects/myapp");
1305 assert!(!is_home_or_agent_dir(&project));
1306 }
1307
1308 #[test]
1309 fn test_unified_tool_count() {
1310 let tools = crate::tool_defs::unified_tool_defs();
1311 assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1312 }
1313
1314 #[test]
1315 fn test_granular_tool_count() {
1316 let tools = crate::tool_defs::granular_tool_defs();
1317 assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1318 }
1319
1320 #[test]
1321 fn disabled_tools_filters_list() {
1322 let all = crate::tool_defs::granular_tool_defs();
1323 let total = all.len();
1324 let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1325 let filtered: Vec<_> = all
1326 .into_iter()
1327 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1328 .collect();
1329 assert_eq!(filtered.len(), total - 2);
1330 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1331 assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1332 }
1333
1334 #[test]
1335 fn empty_disabled_tools_returns_all() {
1336 let all = crate::tool_defs::granular_tool_defs();
1337 let total = all.len();
1338 let disabled: Vec<String> = vec![];
1339 let filtered: Vec<_> = all
1340 .into_iter()
1341 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1342 .collect();
1343 assert_eq!(filtered.len(), total);
1344 }
1345
1346 #[test]
1347 fn misspelled_disabled_tool_is_silently_ignored() {
1348 let all = crate::tool_defs::granular_tool_defs();
1349 let total = all.len();
1350 let disabled = ["ctx_nonexistent_tool".to_string()];
1351 let filtered: Vec<_> = all
1352 .into_iter()
1353 .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1354 .collect();
1355 assert_eq!(filtered.len(), total);
1356 }
1357
1358 #[test]
1359 fn detect_multi_root_workspace_with_child_projects() {
1360 let tmp = tempfile::tempdir().unwrap();
1361 let workspace = tmp.path().join("workspace");
1362 std::fs::create_dir_all(&workspace).unwrap();
1363
1364 let proj_a = workspace.join("project-a");
1365 let proj_b = workspace.join("project-b");
1366 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1367 std::fs::create_dir_all(&proj_b).unwrap();
1368 std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1369
1370 let result = detect_multi_root_workspace(&workspace);
1371 assert!(
1372 result.is_some(),
1373 "should detect workspace with 2 child projects"
1374 );
1375
1376 std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1377 }
1378
1379 #[test]
1380 fn detect_multi_root_workspace_returns_none_for_single_project() {
1381 let tmp = tempfile::tempdir().unwrap();
1382 let workspace = tmp.path().join("workspace");
1383 std::fs::create_dir_all(&workspace).unwrap();
1384
1385 let proj_a = workspace.join("project-a");
1386 std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1387
1388 let result = detect_multi_root_workspace(&workspace);
1389 assert!(
1390 result.is_none(),
1391 "should not detect workspace with only 1 child project"
1392 );
1393 }
1394}