Skip to main content

lean_ctx/server/
mod.rs

1pub mod bypass_hint;
2pub mod context_gate;
3mod dispatch;
4pub mod dynamic_tools;
5pub mod elicitation;
6pub(crate) mod execute;
7pub mod helpers;
8pub mod notifications;
9pub mod prompts;
10pub mod reference_store;
11pub mod registry;
12pub mod resources;
13pub mod role_guard;
14pub mod tool_trait;
15
16use rmcp::handler::server::ServerHandler;
17use rmcp::model::{
18    CallToolRequestParams, CallToolResult, Content, Implementation, InitializeRequestParams,
19    InitializeResult, ListToolsResult, PaginatedRequestParams, ServerCapabilities, ServerInfo,
20};
21use rmcp::service::{RequestContext, RoleServer};
22use rmcp::ErrorData;
23
24use crate::tools::{CrpMode, LeanCtxServer};
25
26impl ServerHandler for LeanCtxServer {
27    fn get_info(&self) -> ServerInfo {
28        let capabilities = ServerCapabilities::builder()
29            .enable_tools()
30            .enable_resources()
31            .enable_resources_subscribe()
32            .enable_prompts()
33            .build();
34
35        let config = crate::core::config::Config::load();
36        let level = crate::core::config::CompressionLevel::effective(&config);
37        let _ = crate::core::terse::rules_inject::inject(&level);
38
39        let instructions = crate::instructions::build_instructions(CrpMode::effective());
40
41        InitializeResult::new(capabilities)
42            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
43            .with_instructions(instructions)
44    }
45
46    async fn initialize(
47        &self,
48        request: InitializeRequestParams,
49        context: RequestContext<RoleServer>,
50    ) -> Result<InitializeResult, ErrorData> {
51        let name = request.client_info.name.clone();
52        tracing::info!("MCP client connected: {:?}", name);
53        *self.client_name.write().await = name.clone();
54        *self.peer.write().await = Some(context.peer.clone());
55
56        if self.session_mode != crate::tools::SessionMode::Shared {
57            crate::core::budget_tracker::BudgetTracker::global().reset();
58            if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
59                let radar = data_dir.join("context_radar.jsonl");
60                if radar.exists() {
61                    let prev = data_dir.join("context_radar.prev.jsonl");
62                    let _ = std::fs::rename(&radar, &prev);
63                }
64            }
65        }
66
67        let derived_root = derive_project_root_from_cwd();
68        let cwd_str = std::env::current_dir()
69            .ok()
70            .map(|p| p.to_string_lossy().to_string())
71            .unwrap_or_default();
72        {
73            let mut session = self.session.write().await;
74            if !cwd_str.is_empty() {
75                session.shell_cwd = Some(cwd_str.clone());
76            }
77            if let Some(ref root) = derived_root {
78                session.project_root = Some(root.clone());
79                tracing::info!("Project root set to: {root}");
80            } else if let Some(ref root) = session.project_root {
81                let root_path = std::path::Path::new(root);
82                let root_has_marker = has_project_marker(root_path);
83                let root_str = root_path.to_string_lossy();
84                let root_suspicious = root_str.contains("/.claude")
85                    || root_str.contains("/.codex")
86                    || root_str.contains("/var/folders/")
87                    || root_str.contains("/tmp/")
88                    || root_str.contains("\\.claude")
89                    || root_str.contains("\\.codex")
90                    || root_str.contains("\\AppData\\Local\\Temp")
91                    || root_str.contains("\\Temp\\");
92                if root_suspicious && !root_has_marker {
93                    session.project_root = None;
94                }
95            }
96            if self.session_mode == crate::tools::SessionMode::Shared {
97                if let Some(ref root) = session.project_root {
98                    if let Some(ref rt) = self.context_os {
99                        rt.shared_sessions.persist_best_effort(
100                            root,
101                            &self.workspace_id,
102                            &self.channel_id,
103                            &session,
104                        );
105                        rt.metrics.record_session_persisted();
106                    }
107                }
108            } else {
109                let _ = session.save();
110            }
111        }
112
113        let agent_name = name.clone();
114        let agent_root = derived_root.clone().unwrap_or_default();
115        let agent_id_handle = self.agent_id.clone();
116        tokio::task::spawn_blocking(move || {
117            if std::env::var("LEAN_CTX_HEADLESS").is_ok() {
118                return;
119            }
120
121            // Avoid startup stampedes when multiple agent sessions initialize at once.
122            // These are best-effort maintenance tasks; it's fine to skip if another
123            // lean-ctx instance is already doing them.
124            let maintenance = crate::core::startup_guard::try_acquire_lock(
125                "startup-maintenance",
126                std::time::Duration::from_secs(2),
127                std::time::Duration::from_mins(2),
128            );
129            if maintenance.is_some() {
130                if let Some(home) = dirs::home_dir() {
131                    let _ = crate::rules_inject::inject_all_rules(&home);
132                }
133                crate::hooks::refresh_installed_hooks();
134                crate::core::version_check::check_background();
135            }
136            drop(maintenance);
137
138            if !agent_root.is_empty() {
139                let heuristic_role = match agent_name.to_lowercase().as_str() {
140                    n if n.contains("cursor") => Some("coder"),
141                    n if n.contains("claude") => Some("coder"),
142                    n if n.contains("codex") => Some("coder"),
143                    n if n.contains("antigravity") || n.contains("gemini") => Some("coder"),
144                    n if n.contains("review") => Some("reviewer"),
145                    n if n.contains("test") => Some("debugger"),
146                    _ => None,
147                };
148                let env_role = std::env::var("LEAN_CTX_ROLE")
149                    .or_else(|_| std::env::var("LEAN_CTX_AGENT_ROLE"))
150                    .ok();
151                let effective_role = env_role.as_deref().or(heuristic_role).unwrap_or("coder");
152
153                let _ = crate::core::roles::set_active_role(effective_role);
154
155                let mut registry = crate::core::agents::AgentRegistry::load_or_create();
156                registry.cleanup_stale(24);
157                let id = registry.register("mcp", Some(effective_role), &agent_root);
158                let _ = registry.save();
159                if let Ok(mut guard) = agent_id_handle.try_write() {
160                    *guard = Some(id);
161                }
162            }
163        });
164
165        let client_caps = crate::core::client_capabilities::ClientMcpCapabilities::detect(&name);
166        tracing::info!("Client capabilities: {}", client_caps.format_summary());
167
168        if client_caps.dynamic_tools {
169            if let Ok(mut dt) = dynamic_tools::global().lock() {
170                dt.set_supports_list_changed(true);
171            }
172        }
173        if let Some(max) = client_caps.max_tools {
174            if let Ok(mut dt) = dynamic_tools::global().lock() {
175                dt.set_supports_list_changed(true);
176                if max < 100 {
177                    dt.unload_category(dynamic_tools::ToolCategory::Debug);
178                    dt.unload_category(dynamic_tools::ToolCategory::Memory);
179                }
180            }
181        }
182
183        crate::core::client_capabilities::set_detected(&client_caps);
184
185        let instructions =
186            crate::instructions::build_instructions_with_client(CrpMode::effective(), &name);
187
188        let capabilities = match (client_caps.resources, client_caps.prompts) {
189            (true, true) => ServerCapabilities::builder()
190                .enable_tools()
191                .enable_resources()
192                .enable_resources_subscribe()
193                .enable_prompts()
194                .build(),
195            (true, false) => ServerCapabilities::builder()
196                .enable_tools()
197                .enable_resources()
198                .enable_resources_subscribe()
199                .build(),
200            (false, true) => ServerCapabilities::builder()
201                .enable_tools()
202                .enable_prompts()
203                .build(),
204            (false, false) => ServerCapabilities::builder().enable_tools().build(),
205        };
206
207        Ok(InitializeResult::new(capabilities)
208            .with_server_info(Implementation::new("lean-ctx", env!("CARGO_PKG_VERSION")))
209            .with_instructions(instructions))
210    }
211
212    async fn list_tools(
213        &self,
214        _request: Option<PaginatedRequestParams>,
215        _context: RequestContext<RoleServer>,
216    ) -> Result<ListToolsResult, ErrorData> {
217        let all_tools = if crate::tool_defs::is_full_mode() {
218            crate::tool_defs::granular_tool_defs()
219        } else if std::env::var("LEAN_CTX_UNIFIED").is_ok() {
220            crate::tool_defs::unified_tool_defs()
221        } else {
222            crate::tool_defs::lazy_tool_defs()
223        };
224
225        let disabled = crate::core::config::Config::load().disabled_tools_effective();
226        let client = self.client_name.read().await.clone();
227        let is_zed = !client.is_empty() && client.to_lowercase().contains("zed");
228
229        let tools: Vec<_> = all_tools
230            .into_iter()
231            .filter(|t| {
232                let name = t.name.as_ref();
233                if !disabled.is_empty() && disabled.iter().any(|d| d.as_str() == name) {
234                    return false;
235                }
236                if is_zed && name == "ctx_edit" {
237                    return false;
238                }
239                true
240            })
241            .collect();
242
243        let tools = {
244            let dyn_state = dynamic_tools::global().lock().unwrap();
245            if dyn_state.supports_list_changed() {
246                tools
247                    .into_iter()
248                    .filter(|t| dyn_state.is_tool_active(t.name.as_ref()))
249                    .collect()
250            } else {
251                tools
252            }
253        };
254
255        let tools = {
256            let active = self.workflow.read().await.clone();
257            if let Some(run) = active {
258                // Terminal "done" state never restricts tool visibility
259                if run.current != "done" {
260                    if let Some(state) = run.spec.state(&run.current) {
261                        if let Some(allowed) = &state.allowed_tools {
262                            let mut allow: std::collections::HashSet<&str> =
263                                allowed.iter().map(std::string::String::as_str).collect();
264                            allow.insert("ctx");
265                            allow.insert("ctx_workflow");
266                            return Ok(ListToolsResult {
267                                tools: tools
268                                    .into_iter()
269                                    .filter(|t| allow.contains(t.name.as_ref()))
270                                    .collect(),
271                                ..Default::default()
272                            });
273                        }
274                    }
275                }
276            }
277            tools
278        };
279
280        let tools = {
281            let cfg = crate::core::config::Config::load();
282            let level = crate::core::config::CompressionLevel::effective(&cfg);
283            let mode =
284                crate::core::terse::mcp_compress::DescriptionMode::from_compression_level(&level);
285            if mode == crate::core::terse::mcp_compress::DescriptionMode::Full {
286                tools
287            } else {
288                tools
289                    .into_iter()
290                    .map(|mut t| {
291                        let compressed = crate::core::terse::mcp_compress::compress_description(
292                            t.name.as_ref(),
293                            t.description.as_deref().unwrap_or(""),
294                            mode,
295                        );
296                        t.description = Some(compressed.into());
297                        t
298                    })
299                    .collect()
300            }
301        };
302
303        Ok(ListToolsResult {
304            tools,
305            ..Default::default()
306        })
307    }
308
309    async fn list_prompts(
310        &self,
311        _request: Option<PaginatedRequestParams>,
312        _context: RequestContext<RoleServer>,
313    ) -> Result<rmcp::model::ListPromptsResult, ErrorData> {
314        Ok(rmcp::model::ListPromptsResult::with_all_items(
315            prompts::list_prompts(),
316        ))
317    }
318
319    async fn get_prompt(
320        &self,
321        request: rmcp::model::GetPromptRequestParams,
322        _context: RequestContext<RoleServer>,
323    ) -> Result<rmcp::model::GetPromptResult, ErrorData> {
324        let ledger = self.ledger.read().await;
325        match prompts::get_prompt(&request, &ledger) {
326            Some(result) => Ok(result),
327            None => Err(ErrorData::invalid_params(
328                format!("Unknown prompt: {}", request.name),
329                None,
330            )),
331        }
332    }
333
334    async fn list_resources(
335        &self,
336        _request: Option<PaginatedRequestParams>,
337        _context: RequestContext<RoleServer>,
338    ) -> Result<rmcp::model::ListResourcesResult, rmcp::ErrorData> {
339        Ok(rmcp::model::ListResourcesResult::with_all_items(
340            resources::list_resources(),
341        ))
342    }
343
344    async fn read_resource(
345        &self,
346        request: rmcp::model::ReadResourceRequestParams,
347        _context: RequestContext<RoleServer>,
348    ) -> Result<rmcp::model::ReadResourceResult, rmcp::ErrorData> {
349        let ledger = self.ledger.read().await;
350        match resources::read_resource(&request.uri, &ledger) {
351            Some(contents) => Ok(rmcp::model::ReadResourceResult::new(contents)),
352            None => Err(rmcp::ErrorData::resource_not_found(
353                format!("Unknown resource: {}", request.uri),
354                None,
355            )),
356        }
357    }
358
359    async fn call_tool(
360        &self,
361        request: CallToolRequestParams,
362        _context: RequestContext<RoleServer>,
363    ) -> Result<CallToolResult, ErrorData> {
364        self.check_idle_expiry().await;
365        elicitation::increment_call();
366
367        let original_name = request.name.as_ref().to_string();
368        let (resolved_name, resolved_args) = if original_name == "ctx" {
369            let sub = request
370                .arguments
371                .as_ref()
372                .and_then(|a| a.get("tool"))
373                .and_then(|v| v.as_str())
374                .map(std::string::ToString::to_string)
375                .ok_or_else(|| {
376                    ErrorData::invalid_params("'tool' is required for ctx meta-tool", None)
377                })?;
378            let tool_name = if sub.starts_with("ctx_") {
379                sub
380            } else {
381                format!("ctx_{sub}")
382            };
383            let mut args = request.arguments.unwrap_or_default();
384            args.remove("tool");
385            (tool_name, Some(args))
386        } else {
387            (original_name, request.arguments)
388        };
389        let name = resolved_name.as_str();
390        let args = resolved_args.as_ref();
391
392        let role_check = role_guard::check_tool_access(name);
393        if let Some(denied) = role_guard::into_call_tool_result(&role_check) {
394            tracing::warn!(
395                tool = name,
396                role = %role_check.role_name,
397                "Tool blocked by role policy"
398            );
399            return Ok(denied);
400        }
401
402        if name != "ctx_workflow" {
403            let active = self.workflow.read().await.clone();
404            if let Some(run) = active {
405                // Terminal state "done" should never block — auto-clear stale workflows
406                if run.current == "done" {
407                    let mut wf = self.workflow.write().await;
408                    *wf = None;
409                    let _ = crate::core::workflow::clear_active();
410                } else if let Some(state) = run.spec.state(&run.current) {
411                    if let Some(allowed) = &state.allowed_tools {
412                        let allowed_ok = allowed.iter().any(|t| t == name) || name == "ctx";
413                        if !allowed_ok {
414                            let mut shown = allowed.clone();
415                            shown.sort();
416                            shown.truncate(30);
417                            return Ok(CallToolResult::success(vec![Content::text(format!(
418                                "Tool '{name}' blocked by workflow '{}' (state: {}). Allowed ({} shown): {}",
419                                run.spec.name,
420                                run.current,
421                                shown.len(),
422                                shown.join(", ")
423                            ))]));
424                        }
425                    }
426                }
427            }
428        }
429
430        let auto_context = {
431            let task = {
432                let session = self.session.read().await;
433                session.task.as_ref().map(|t| t.description.clone())
434            };
435            let project_root = {
436                let session = self.session.read().await;
437                session.project_root.clone()
438            };
439            let mut cache = self.cache.write().await;
440            crate::tools::autonomy::session_lifecycle_pre_hook(
441                &self.autonomy,
442                name,
443                &mut cache,
444                task.as_deref(),
445                project_root.as_deref(),
446                CrpMode::effective(),
447            )
448        };
449
450        let throttle_result = {
451            let fp = args
452                .map(|a| {
453                    crate::core::loop_detection::LoopDetector::fingerprint(
454                        &serde_json::Value::Object(a.clone()),
455                    )
456                })
457                .unwrap_or_default();
458            let mut detector = self.loop_detector.write().await;
459
460            let is_search = crate::core::loop_detection::LoopDetector::is_search_tool(name);
461            let is_search_shell = name == "ctx_shell" && {
462                let cmd = args
463                    .as_ref()
464                    .and_then(|a| a.get("command"))
465                    .and_then(|v| v.as_str())
466                    .unwrap_or("");
467                crate::core::loop_detection::LoopDetector::is_search_shell_command(cmd)
468            };
469
470            if is_search || is_search_shell {
471                let search_pattern = args.and_then(|a| {
472                    a.get("pattern")
473                        .or_else(|| a.get("query"))
474                        .and_then(|v| v.as_str())
475                });
476                let shell_pattern = if is_search_shell {
477                    args.and_then(|a| a.get("command"))
478                        .and_then(|v| v.as_str())
479                        .and_then(helpers::extract_search_pattern_from_command)
480                } else {
481                    None
482                };
483                let pat = search_pattern.or(shell_pattern.as_deref());
484                detector.record_search(name, &fp, pat)
485            } else {
486                detector.record_call(name, &fp)
487            }
488        };
489
490        if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Blocked {
491            let msg = throttle_result.message.unwrap_or_default();
492            return Ok(CallToolResult::success(vec![Content::text(msg)]));
493        }
494
495        let throttle_warning =
496            if throttle_result.level == crate::core::loop_detection::ThrottleLevel::Reduced {
497                throttle_result.message.clone()
498            } else {
499                None
500            };
501
502        let config = crate::core::config::Config::load();
503        let minimal = config.minimal_overhead_effective();
504
505        {
506            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
507            let snap = BudgetTracker::global().check();
508            if *snap.worst_level() == BudgetLevel::Exhausted
509                && name != "ctx_session"
510                && name != "ctx_cost"
511                && name != "ctx_metrics"
512            {
513                for (dim, lvl, used, limit) in [
514                    (
515                        "tokens",
516                        &snap.tokens.level,
517                        format!("{}", snap.tokens.used),
518                        format!("{}", snap.tokens.limit),
519                    ),
520                    (
521                        "shell",
522                        &snap.shell.level,
523                        format!("{}", snap.shell.used),
524                        format!("{}", snap.shell.limit),
525                    ),
526                    (
527                        "cost",
528                        &snap.cost.level,
529                        format!("${:.2}", snap.cost.used_usd),
530                        format!("${:.2}", snap.cost.limit_usd),
531                    ),
532                ] {
533                    if *lvl == BudgetLevel::Exhausted {
534                        crate::core::events::emit_budget_exhausted(&snap.role, dim, &used, &limit);
535                    }
536                }
537                let msg = format!(
538                    "[BUDGET EXHAUSTED] {}\n\
539                     Use `ctx_session action=role` to check/switch roles, \
540                     or `ctx_session action=reset` to start fresh.",
541                    snap.format_compact()
542                );
543                tracing::warn!(tool = name, "{msg}");
544                return Ok(CallToolResult::success(vec![Content::text(msg)]));
545            }
546        }
547
548        if is_shell_tool_name(name) {
549            crate::core::budget_tracker::BudgetTracker::global().record_shell();
550        }
551
552        let tool_start = std::time::Instant::now();
553        let mut result_text = {
554            use futures::FutureExt;
555            use std::panic::AssertUnwindSafe;
556            match AssertUnwindSafe(self.dispatch_tool(name, args, minimal))
557                .catch_unwind()
558                .await
559            {
560                Ok(Ok(text)) => text,
561                Ok(Err(e)) => return Err(e),
562                Err(panic_payload) => {
563                    let detail = if let Some(s) = panic_payload.downcast_ref::<&str>() {
564                        (*s).to_string()
565                    } else if let Some(s) = panic_payload.downcast_ref::<String>() {
566                        s.clone()
567                    } else {
568                        "unknown".to_string()
569                    };
570                    tracing::error!(tool = name, "Tool panicked: {detail}");
571                    format!("ERROR: lean-ctx internal error in tool '{name}'.\n\
572                             The MCP server is still running. Please retry or use a different approach.")
573                }
574            }
575        };
576
577        let is_raw_shell = name == "ctx_shell" && {
578            let arg_raw = helpers::get_bool(args, "raw").unwrap_or(false);
579            let arg_bypass = helpers::get_bool(args, "bypass").unwrap_or(false);
580            arg_raw
581                || arg_bypass
582                || std::env::var("LEAN_CTX_DISABLED").is_ok()
583                || std::env::var("LEAN_CTX_RAW").is_ok()
584        };
585
586        let pre_terse_len = result_text.len();
587        let output_tokens = {
588            let tokens = crate::core::tokens::count_tokens(&result_text) as u64;
589            crate::core::budget_tracker::BudgetTracker::global().record_tokens(tokens);
590            tokens
591        };
592
593        crate::core::anomaly::record_metric("tokens_per_call", output_tokens as f64);
594        // Persist anomaly detector so dashboard state survives restarts.
595        crate::core::anomaly::save();
596
597        let budget_warning = {
598            use crate::core::budget_tracker::{BudgetLevel, BudgetTracker};
599            let snap = BudgetTracker::global().check();
600            if *snap.worst_level() == BudgetLevel::Warning {
601                for (dim, lvl, used, limit, pct) in [
602                    (
603                        "tokens",
604                        &snap.tokens.level,
605                        format!("{}", snap.tokens.used),
606                        format!("{}", snap.tokens.limit),
607                        snap.tokens.percent,
608                    ),
609                    (
610                        "shell",
611                        &snap.shell.level,
612                        format!("{}", snap.shell.used),
613                        format!("{}", snap.shell.limit),
614                        snap.shell.percent,
615                    ),
616                    (
617                        "cost",
618                        &snap.cost.level,
619                        format!("${:.2}", snap.cost.used_usd),
620                        format!("${:.2}", snap.cost.limit_usd),
621                        snap.cost.percent,
622                    ),
623                ] {
624                    if *lvl == BudgetLevel::Warning {
625                        crate::core::events::emit_budget_warning(
626                            &snap.role, dim, &used, &limit, pct,
627                        );
628                    }
629                }
630                if crate::core::protocol::meta_visible() {
631                    Some(format!("[BUDGET WARNING] {}", snap.format_compact()))
632                } else {
633                    None
634                }
635            } else {
636                None
637            }
638        };
639
640        let archive_hint = if minimal || is_raw_shell {
641            None
642        } else {
643            use crate::core::archive;
644            let archivable = matches!(
645                name,
646                "ctx_shell"
647                    | "ctx_read"
648                    | "ctx_multi_read"
649                    | "ctx_smart_read"
650                    | "ctx_execute"
651                    | "ctx_search"
652                    | "ctx_tree"
653            );
654            if archivable && archive::should_archive(&result_text) {
655                let cmd = helpers::get_str(args, "command")
656                    .or_else(|| helpers::get_str(args, "path"))
657                    .unwrap_or_default();
658                let session_id = self.session.read().await.id.clone();
659                let to_store = crate::core::redaction::redact_text_if_enabled(&result_text);
660                let tokens = crate::core::tokens::count_tokens(&to_store);
661                archive::store(name, &cmd, &to_store, Some(&session_id))
662                    .map(|id| archive::format_hint(&id, to_store.len(), tokens))
663            } else {
664                None
665            }
666        };
667
668        let pre_compression = result_text.clone();
669        let skip_terse = is_raw_shell
670            || (name == "ctx_shell"
671                && helpers::get_str(args, "command")
672                    .is_some_and(|c| crate::shell::compress::has_structural_output(&c)));
673        let compression = crate::core::config::CompressionLevel::effective(&config);
674        if compression.is_active() && !skip_terse {
675            let terse_result =
676                crate::core::terse::pipeline::compress(&result_text, &compression, None);
677            if terse_result.quality_passed && terse_result.savings_pct >= 3.0 {
678                result_text = terse_result.output;
679            }
680        }
681
682        let profile_hints = crate::core::profiles::active_profile().output_hints;
683
684        if !is_raw_shell && profile_hints.verify_footer() {
685            let verify_cfg = crate::core::profiles::active_profile().verification;
686            let vr = crate::core::output_verification::verify_output(
687                &pre_compression,
688                &result_text,
689                &verify_cfg,
690            );
691            if !vr.warnings.is_empty() {
692                let msg = format!("[VERIFY] {}", vr.format_compact());
693                result_text = format!("{result_text}\n\n{msg}");
694            }
695        }
696
697        if profile_hints.archive_hint() {
698            if let Some(hint) = archive_hint {
699                result_text = format!("{result_text}\n{hint}");
700            }
701        }
702
703        if !is_raw_shell {
704            if let Some(ctx) = auto_context {
705                if crate::core::protocol::meta_visible() {
706                    result_text = format!("{ctx}\n\n{result_text}");
707                }
708            }
709        }
710
711        if let Some(warning) = throttle_warning {
712            result_text = format!("{result_text}\n\n{warning}");
713        }
714
715        if let Some(bw) = budget_warning {
716            result_text = format!("{result_text}\n\n{bw}");
717        }
718
719        if !self
720            .rules_stale_checked
721            .swap(true, std::sync::atomic::Ordering::Relaxed)
722        {
723            let client = self.client_name.read().await.clone();
724            if !client.is_empty() {
725                if let Some(stale_msg) = crate::rules_inject::check_rules_freshness(&client) {
726                    result_text = format!("{result_text}\n\n{stale_msg}");
727                }
728            }
729        }
730
731        {
732            // Evaluate SLOs for observability (watch/dashboard), but keep tool outputs clean.
733            let _ = crate::core::slo::evaluate();
734        }
735
736        if name == "ctx_read" {
737            if minimal {
738                let mut cache = self.cache.write().await;
739                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
740            } else {
741                let read_path = self
742                    .resolve_path_or_passthrough(
743                        &helpers::get_str(args, "path").unwrap_or_default(),
744                    )
745                    .await;
746                let project_root = {
747                    let session = self.session.read().await;
748                    session.project_root.clone()
749                };
750                let mut cache = self.cache.write().await;
751                let enrich = crate::tools::autonomy::enrich_after_read(
752                    &self.autonomy,
753                    &mut cache,
754                    &read_path,
755                    project_root.as_deref(),
756                    None,
757                    crate::tools::CrpMode::effective(),
758                    false,
759                );
760                if profile_hints.related_hint() {
761                    if let Some(hint) = enrich.related_hint {
762                        result_text = format!("{result_text}\n{hint}");
763                    }
764                }
765                crate::tools::autonomy::maybe_auto_dedup(&self.autonomy, &mut cache, name);
766
767                {
768                    let active_task = {
769                        let session = self.session.read().await;
770                        session.task.as_ref().map(|t| t.description.clone())
771                    };
772                    let mut ledger = self.ledger.write().await;
773                    let overlay = crate::core::context_overlay::OverlayStore::load_project(
774                        &std::path::PathBuf::from(project_root.as_deref().unwrap_or(".")),
775                    );
776                    let mode_used =
777                        helpers::get_str(args, "mode").unwrap_or_else(|| "auto".to_string());
778                    let gate_result = context_gate::post_dispatch_record_with_task(
779                        &read_path,
780                        &mode_used,
781                        pre_terse_len,
782                        output_tokens as usize,
783                        &mut ledger,
784                        &overlay,
785                        active_task.as_deref(),
786                    );
787                    if let Some(hint) = gate_result.eviction_hint {
788                        result_text = format!("{result_text}\n{hint}");
789                    }
790                    if profile_hints.elicitation_hint() {
791                        if let Some(hint) = gate_result.elicitation_hint {
792                            result_text = format!("{result_text}\n{hint}");
793                        }
794                    }
795                    if gate_result.resource_changed {
796                        if let Some(peer) = self.peer.read().await.as_ref() {
797                            notifications::send_resource_updated(
798                                peer,
799                                notifications::RESOURCE_URI_SUMMARY,
800                            )
801                            .await;
802                        }
803                    }
804                }
805            }
806        }
807
808        if !minimal && !is_raw_shell && name == "ctx_shell" {
809            let cmd = helpers::get_str(args, "command").unwrap_or_default();
810
811            if let Some(file_path) = extract_file_read_from_shell(&cmd) {
812                if let Ok(mut bt) = crate::core::bounce_tracker::global().lock() {
813                    bt.next_seq();
814                    bt.record_shell_file_access(&file_path);
815                }
816            }
817
818            if profile_hints.efficiency_hint() {
819                let calls = self.tool_calls.read().await;
820                let last_original = calls.last().map_or(0, |c| c.original_tokens);
821                drop(calls);
822                let pre_hint_tokens = crate::core::tokens::count_tokens(&result_text);
823                if let Some(hint) = crate::tools::autonomy::shell_efficiency_hint(
824                    &self.autonomy,
825                    &cmd,
826                    last_original,
827                    pre_hint_tokens,
828                ) {
829                    result_text = format!("{result_text}\n{hint}");
830                }
831            }
832        }
833
834        if !minimal && !is_raw_shell {
835            bypass_hint::record_lctx_call();
836            if let Ok(data_dir) = crate::core::data_dir::lean_ctx_data_dir() {
837                if let Some(hint) = bypass_hint::check(&data_dir) {
838                    result_text = format!("{result_text}\n{hint}");
839                }
840            }
841        }
842
843        #[allow(clippy::cast_possible_truncation)]
844        let output_token_count = if result_text.len() == pre_terse_len {
845            output_tokens as usize
846        } else {
847            crate::core::tokens::count_tokens(&result_text)
848        };
849        let action = helpers::get_str(args, "action");
850
851        // K-bounded staleness guard: warn if shared context has diverged.
852        const K_STALENESS_BOUND: i64 = 10;
853        if self.session_mode == crate::tools::SessionMode::Shared {
854            if let Some(ref rt) = self.context_os {
855                let latest = rt.bus.latest_id(&self.workspace_id, &self.channel_id);
856                let cursor = self
857                    .last_seen_event_id
858                    .load(std::sync::atomic::Ordering::Relaxed);
859                if cursor > 0 && latest - cursor > K_STALENESS_BOUND {
860                    let gap = latest - cursor;
861                    result_text = format!(
862                        "[CONTEXT STALE] {gap} events happened since your last read. \
863                         Use ctx_session(action=\"status\") to sync.\n\n{result_text}"
864                    );
865                }
866                self.last_seen_event_id
867                    .store(latest, std::sync::atomic::Ordering::Relaxed);
868            }
869        }
870
871        {
872            let input = helpers::canonical_args_string(args);
873            let input_md5 = helpers::hash_fast(&input);
874            let output_md5 = helpers::hash_fast(&result_text);
875            let agent_id = self.agent_id.read().await.clone();
876            let client_name = self.client_name.read().await.clone();
877            let mut explicit_intent: Option<(
878                crate::core::intent_protocol::IntentRecord,
879                Option<String>,
880                String,
881            )> = None;
882
883            let pending_session_save = {
884                let empty_args = serde_json::Map::new();
885                let args_map = args.unwrap_or(&empty_args);
886                let mut session = self.session.write().await;
887                session.record_tool_receipt(
888                    name,
889                    action.as_deref(),
890                    &input_md5,
891                    &output_md5,
892                    agent_id.as_deref(),
893                    Some(&client_name),
894                );
895
896                if let Some(intent) = crate::core::intent_protocol::infer_from_tool_call(
897                    name,
898                    action.as_deref(),
899                    args_map,
900                    session.project_root.as_deref(),
901                ) {
902                    let is_explicit =
903                        intent.source == crate::core::intent_protocol::IntentSource::Explicit;
904                    let root = session.project_root.clone();
905                    let sid = session.id.clone();
906                    session.record_intent(intent.clone());
907                    if is_explicit {
908                        explicit_intent = Some((intent, root, sid));
909                    }
910                }
911                if session.should_save() {
912                    session.prepare_save().ok()
913                } else {
914                    None
915                }
916            };
917
918            if let Some(prepared) = pending_session_save {
919                tokio::task::spawn_blocking(move || {
920                    let _ = prepared.write_to_disk();
921                });
922            }
923
924            if let Some((intent, root, session_id)) = explicit_intent {
925                let _ = crate::core::intent_protocol::apply_side_effects(
926                    &intent,
927                    root.as_deref(),
928                    &session_id,
929                );
930            }
931
932            if self.autonomy.is_enabled() {
933                let (calls, project_root) = {
934                    let session = self.session.read().await;
935                    (session.stats.total_tool_calls, session.project_root.clone())
936                };
937
938                if let Some(root) = project_root {
939                    if crate::tools::autonomy::should_auto_consolidate(&self.autonomy, calls) {
940                        let root_clone = root.clone();
941                        tokio::task::spawn_blocking(move || {
942                            let _ = crate::core::consolidation_engine::consolidate_latest(
943                                &root_clone,
944                                crate::core::consolidation_engine::ConsolidationBudgets::default(),
945                            );
946                        });
947                    }
948                }
949            }
950
951            let agent_key = agent_id.unwrap_or_else(|| "unknown".to_string());
952            let input_token_count = crate::core::tokens::count_tokens(&input) as u64;
953            let output_token_count_u64 = output_token_count as u64;
954            let name_owned = name.to_string();
955            tokio::task::spawn_blocking(move || {
956                let pricing = crate::core::gain::model_pricing::ModelPricing::load();
957                let quote = pricing.quote_from_env_or_agent_type(&client_name);
958                let cost_usd =
959                    quote
960                        .cost
961                        .estimate_usd(input_token_count, output_token_count_u64, 0, 0);
962                crate::core::budget_tracker::BudgetTracker::global().record_cost_usd(cost_usd);
963
964                let mut store = crate::core::a2a::cost_attribution::CostStore::load();
965                store.record_tool_call(
966                    &agent_key,
967                    &client_name,
968                    &name_owned,
969                    input_token_count,
970                    output_token_count_u64,
971                    0,
972                );
973                let _ = store.save();
974            });
975        }
976
977        // Context Bus: conflict detection for knowledge writes in shared mode.
978        if self.session_mode == crate::tools::SessionMode::Shared
979            && name == "ctx_knowledge"
980            && action.as_deref() == Some("remember")
981        {
982            if let Some(ref rt) = self.context_os {
983                let my_agent = self.agent_id.read().await.clone();
984                let category = helpers::get_str(args, "category");
985                let key = helpers::get_str(args, "key");
986                if let (Some(ref cat), Some(ref k)) = (&category, &key) {
987                    let recent = rt.bus.recent_by_kind(
988                        &self.workspace_id,
989                        &self.channel_id,
990                        "knowledge_remembered",
991                        20,
992                    );
993                    for ev in &recent {
994                        let p = &ev.payload;
995                        let ev_cat = p.get("category").and_then(|v| v.as_str());
996                        let ev_key = p.get("key").and_then(|v| v.as_str());
997                        let ev_actor = ev.actor.as_deref();
998                        if ev_cat == Some(cat.as_str())
999                            && ev_key == Some(k.as_str())
1000                            && ev_actor != my_agent.as_deref()
1001                        {
1002                            let other = ev_actor.unwrap_or("unknown");
1003                            result_text = format!(
1004                                "[CONFLICT] Agent '{other}' recently wrote to the same knowledge key \
1005                                 '{cat}/{k}'. Review before proceeding.\n\n{result_text}"
1006                            );
1007                            break;
1008                        }
1009                    }
1010                }
1011            }
1012        }
1013
1014        // Context OS: persist shared session + publish events.
1015        if self.session_mode == crate::tools::SessionMode::Shared {
1016            let ws = self.workspace_id.clone();
1017            let ch = self.channel_id.clone();
1018            let rt = self.context_os.clone();
1019            let agent = self.agent_id.read().await.clone();
1020            let tool = name.to_string();
1021            let tool_action = action.clone();
1022            let tool_path = helpers::get_str(args, "path");
1023            let tool_category = helpers::get_str(args, "category");
1024            let tool_key = helpers::get_str(args, "key");
1025            let session_snapshot = self.session.read().await.clone();
1026            let session_task = session_snapshot.task.clone();
1027            tokio::task::spawn_blocking(move || {
1028                let Some(rt) = rt else {
1029                    return;
1030                };
1031                let Some(root) = session_snapshot.project_root.as_deref() else {
1032                    return;
1033                };
1034                rt.shared_sessions
1035                    .persist_best_effort(root, &ws, &ch, &session_snapshot);
1036                rt.metrics.record_session_persisted();
1037
1038                let mut base_payload = serde_json::json!({
1039                    "tool": tool,
1040                    "action": tool_action,
1041                });
1042                if let Some(ref p) = tool_path {
1043                    base_payload["path"] = serde_json::Value::String(p.clone());
1044                }
1045                if let Some(ref c) = tool_category {
1046                    base_payload["category"] = serde_json::Value::String(c.clone());
1047                }
1048                if let Some(ref k) = tool_key {
1049                    base_payload["key"] = serde_json::Value::String(k.clone());
1050                }
1051                if let Some(ref t) = session_task {
1052                    base_payload["reasoning"] = serde_json::Value::String(t.description.clone());
1053                }
1054
1055                if rt
1056                    .bus
1057                    .append(
1058                        &ws,
1059                        &ch,
1060                        &crate::core::context_os::ContextEventKindV1::ToolCallRecorded,
1061                        agent.as_deref(),
1062                        base_payload.clone(),
1063                    )
1064                    .is_some()
1065                {
1066                    rt.metrics.record_event_appended();
1067                    rt.metrics.record_event_broadcast();
1068                }
1069
1070                if let Some(secondary) =
1071                    crate::core::context_os::secondary_event_kind(&tool, tool_action.as_deref())
1072                {
1073                    if rt
1074                        .bus
1075                        .append(&ws, &ch, &secondary, agent.as_deref(), base_payload)
1076                        .is_some()
1077                    {
1078                        rt.metrics.record_event_appended();
1079                        rt.metrics.record_event_broadcast();
1080                    }
1081                }
1082            });
1083        }
1084
1085        let skip_checkpoint = minimal
1086            || matches!(
1087                name,
1088                "ctx_compress"
1089                    | "ctx_metrics"
1090                    | "ctx_benchmark"
1091                    | "ctx_analyze"
1092                    | "ctx_cache"
1093                    | "ctx_discover"
1094                    | "ctx_dedup"
1095                    | "ctx_session"
1096                    | "ctx_knowledge"
1097                    | "ctx_agent"
1098                    | "ctx_share"
1099                    | "ctx_gain"
1100                    | "ctx_overview"
1101                    | "ctx_preload"
1102                    | "ctx_cost"
1103                    | "ctx_heatmap"
1104                    | "ctx_task"
1105                    | "ctx_impact"
1106                    | "ctx_architecture"
1107                    | "ctx_smells"
1108                    | "ctx_workflow"
1109            );
1110
1111        if !skip_checkpoint && self.increment_and_check() {
1112            if let Some(checkpoint) = self.auto_checkpoint().await {
1113                let interval = LeanCtxServer::checkpoint_interval_effective();
1114                let hints = crate::core::profiles::active_profile().output_hints;
1115                if hints.checkpoint_in_output() && crate::core::protocol::meta_visible() {
1116                    let combined = format!(
1117                        "{result_text}\n\n--- AUTO CHECKPOINT (every {interval} calls) ---\n{checkpoint}"
1118                    );
1119                    return Ok(CallToolResult::success(vec![Content::text(combined)]));
1120                }
1121            }
1122        }
1123
1124        let tool_duration_ms = tool_start.elapsed().as_millis() as u64;
1125        if tool_duration_ms > 100 {
1126            LeanCtxServer::append_tool_call_log(
1127                name,
1128                tool_duration_ms,
1129                0,
1130                0,
1131                None,
1132                &chrono::Local::now().format("%Y-%m-%d %H:%M:%S").to_string(),
1133            );
1134        }
1135
1136        let current_count = self.call_count.load(std::sync::atomic::Ordering::Relaxed);
1137        if current_count > 0 && current_count.is_multiple_of(100) {
1138            std::thread::spawn(crate::cloud_sync::cloud_background_tasks);
1139        }
1140
1141        Ok(CallToolResult::success(vec![Content::text(result_text)]))
1142    }
1143}
1144
1145pub fn build_instructions_for_test(crp_mode: CrpMode) -> String {
1146    crate::instructions::build_instructions_for_test(crp_mode)
1147}
1148
1149pub fn build_claude_code_instructions_for_test() -> String {
1150    crate::instructions::claude_code_instructions()
1151}
1152
1153const PROJECT_MARKERS: &[&str] = &[
1154    ".git",
1155    "Cargo.toml",
1156    "package.json",
1157    "go.mod",
1158    "pyproject.toml",
1159    "setup.py",
1160    "pom.xml",
1161    "build.gradle",
1162    "Makefile",
1163    ".lean-ctx.toml",
1164];
1165
1166fn has_project_marker(dir: &std::path::Path) -> bool {
1167    PROJECT_MARKERS.iter().any(|m| dir.join(m).exists())
1168}
1169
1170fn is_home_or_agent_dir(dir: &std::path::Path) -> bool {
1171    if let Some(home) = dirs::home_dir() {
1172        if dir == home {
1173            return true;
1174        }
1175    }
1176    let dir_str = dir.to_string_lossy();
1177    dir_str.ends_with("/.claude")
1178        || dir_str.ends_with("/.codex")
1179        || dir_str.contains("/.claude/")
1180        || dir_str.contains("/.codex/")
1181}
1182
1183fn git_toplevel_from(dir: &std::path::Path) -> Option<String> {
1184    std::process::Command::new("git")
1185        .args(["rev-parse", "--show-toplevel"])
1186        .current_dir(dir)
1187        .stdout(std::process::Stdio::piped())
1188        .stderr(std::process::Stdio::null())
1189        .output()
1190        .ok()
1191        .and_then(|o| {
1192            if o.status.success() {
1193                String::from_utf8(o.stdout)
1194                    .ok()
1195                    .map(|s| s.trim().to_string())
1196            } else {
1197                None
1198            }
1199        })
1200}
1201
1202pub fn derive_project_root_from_cwd() -> Option<String> {
1203    let cwd = std::env::current_dir().ok()?;
1204    let canonical = crate::core::pathutil::safe_canonicalize_or_self(&cwd);
1205
1206    if is_home_or_agent_dir(&canonical) {
1207        return git_toplevel_from(&canonical);
1208    }
1209
1210    if has_project_marker(&canonical) {
1211        return Some(canonical.to_string_lossy().to_string());
1212    }
1213
1214    if let Some(git_root) = git_toplevel_from(&canonical) {
1215        return Some(git_root);
1216    }
1217
1218    if let Some(root) = detect_multi_root_workspace(&canonical) {
1219        return Some(root);
1220    }
1221
1222    // Fallback: use CWD as project root if it's a specific, safe directory.
1223    // This ensures bare directories (no .git, no markers) still work.
1224    // Guard: reject home dir, filesystem root, and agent sandbox dirs.
1225    if !is_broad_or_unsafe_root(&canonical) {
1226        tracing::info!(
1227            "No project markers found — using CWD as project root: {}",
1228            canonical.display()
1229        );
1230        return Some(canonical.to_string_lossy().to_string());
1231    }
1232
1233    None
1234}
1235
1236/// Returns true if a directory is too broad/unsafe to serve as a jail root.
1237/// Rejects: home directory, filesystem root, agent sandbox dirs.
1238/// Does NOT reject specific subdirectories like /tmp/my-project or /home/user/data.
1239fn is_broad_or_unsafe_root(dir: &std::path::Path) -> bool {
1240    if let Some(home) = dirs::home_dir() {
1241        if dir == home {
1242            return true;
1243        }
1244    }
1245    let s = dir.to_string_lossy();
1246    if s == "/" || s == "\\" || s == "." {
1247        return true;
1248    }
1249    // Agent sandbox directories
1250    s.ends_with("/.claude")
1251        || s.ends_with("/.codex")
1252        || s.contains("/.claude/")
1253        || s.contains("/.codex/")
1254}
1255
1256/// Detect a multi-root workspace: a directory that has no project markers
1257/// itself, but contains child directories that do. In this case, use the
1258/// parent as jail root and auto-allow all child projects via LEAN_CTX_ALLOW_PATH.
1259fn detect_multi_root_workspace(dir: &std::path::Path) -> Option<String> {
1260    let entries = std::fs::read_dir(dir).ok()?;
1261    let mut child_projects: Vec<String> = Vec::new();
1262
1263    for entry in entries.flatten() {
1264        let path = entry.path();
1265        if path.is_dir() && has_project_marker(&path) {
1266            let canonical = crate::core::pathutil::safe_canonicalize_or_self(&path);
1267            child_projects.push(canonical.to_string_lossy().to_string());
1268        }
1269    }
1270
1271    if child_projects.len() >= 2 {
1272        let existing = std::env::var("LEAN_CTX_ALLOW_PATH").unwrap_or_default();
1273        let sep = if cfg!(windows) { ";" } else { ":" };
1274        let merged = if existing.is_empty() {
1275            child_projects.join(sep)
1276        } else {
1277            format!("{existing}{sep}{}", child_projects.join(sep))
1278        };
1279        std::env::set_var("LEAN_CTX_ALLOW_PATH", &merged);
1280        tracing::info!(
1281            "Multi-root workspace detected at {}: auto-allowing {} child projects",
1282            dir.display(),
1283            child_projects.len()
1284        );
1285        return Some(dir.to_string_lossy().to_string());
1286    }
1287
1288    None
1289}
1290
1291pub fn tool_descriptions_for_test() -> Vec<(&'static str, &'static str)> {
1292    crate::tool_defs::list_all_tool_defs()
1293        .into_iter()
1294        .map(|(name, desc, _)| (name, desc))
1295        .collect()
1296}
1297
1298pub fn tool_schemas_json_for_test() -> String {
1299    crate::tool_defs::list_all_tool_defs()
1300        .iter()
1301        .map(|(name, _, schema)| format!("{name}: {schema}"))
1302        .collect::<Vec<_>>()
1303        .join("\n")
1304}
1305
1306fn is_shell_tool_name(name: &str) -> bool {
1307    matches!(name, "ctx_shell" | "ctx_execute")
1308}
1309
1310fn extract_file_read_from_shell(cmd: &str) -> Option<String> {
1311    let trimmed = cmd.trim();
1312    let parts: Vec<&str> = trimmed.split_whitespace().collect();
1313    if parts.len() < 2 {
1314        return None;
1315    }
1316    let bin = parts[0].rsplit('/').next().unwrap_or(parts[0]);
1317    match bin {
1318        "cat" | "head" | "tail" | "less" | "more" | "bat" | "batcat" => {
1319            let file_arg = parts.iter().skip(1).find(|a| !a.starts_with('-'))?;
1320            Some(file_arg.to_string())
1321        }
1322        _ => None,
1323    }
1324}
1325
1326#[cfg(test)]
1327mod tests {
1328    use super::*;
1329
1330    #[test]
1331    fn project_markers_detected() {
1332        let tmp = tempfile::tempdir().unwrap();
1333        let root = tmp.path().join("myproject");
1334        std::fs::create_dir_all(&root).unwrap();
1335        assert!(!has_project_marker(&root));
1336
1337        std::fs::create_dir(root.join(".git")).unwrap();
1338        assert!(has_project_marker(&root));
1339    }
1340
1341    #[test]
1342    fn home_dir_detected_as_agent_dir() {
1343        if let Some(home) = dirs::home_dir() {
1344            assert!(is_home_or_agent_dir(&home));
1345        }
1346    }
1347
1348    #[test]
1349    fn agent_dirs_detected() {
1350        let claude = std::path::PathBuf::from("/home/user/.claude");
1351        assert!(is_home_or_agent_dir(&claude));
1352        let codex = std::path::PathBuf::from("/home/user/.codex");
1353        assert!(is_home_or_agent_dir(&codex));
1354        let project = std::path::PathBuf::from("/home/user/projects/myapp");
1355        assert!(!is_home_or_agent_dir(&project));
1356    }
1357
1358    #[test]
1359    fn test_unified_tool_count() {
1360        let tools = crate::tool_defs::unified_tool_defs();
1361        assert_eq!(tools.len(), 5, "Expected 5 unified tools");
1362    }
1363
1364    #[test]
1365    fn test_granular_tool_count() {
1366        let tools = crate::tool_defs::granular_tool_defs();
1367        assert!(tools.len() >= 25, "Expected at least 25 granular tools");
1368    }
1369
1370    #[test]
1371    fn disabled_tools_filters_list() {
1372        let all = crate::tool_defs::granular_tool_defs();
1373        let total = all.len();
1374        let disabled = ["ctx_graph".to_string(), "ctx_agent".to_string()];
1375        let filtered: Vec<_> = all
1376            .into_iter()
1377            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1378            .collect();
1379        assert_eq!(filtered.len(), total - 2);
1380        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_graph"));
1381        assert!(!filtered.iter().any(|t| t.name.as_ref() == "ctx_agent"));
1382    }
1383
1384    #[test]
1385    fn empty_disabled_tools_returns_all() {
1386        let all = crate::tool_defs::granular_tool_defs();
1387        let total = all.len();
1388        let disabled: Vec<String> = vec![];
1389        let filtered: Vec<_> = all
1390            .into_iter()
1391            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1392            .collect();
1393        assert_eq!(filtered.len(), total);
1394    }
1395
1396    #[test]
1397    fn misspelled_disabled_tool_is_silently_ignored() {
1398        let all = crate::tool_defs::granular_tool_defs();
1399        let total = all.len();
1400        let disabled = ["ctx_nonexistent_tool".to_string()];
1401        let filtered: Vec<_> = all
1402            .into_iter()
1403            .filter(|t| !disabled.iter().any(|d| t.name.as_ref() == d.as_str()))
1404            .collect();
1405        assert_eq!(filtered.len(), total);
1406    }
1407
1408    #[test]
1409    fn detect_multi_root_workspace_with_child_projects() {
1410        let tmp = tempfile::tempdir().unwrap();
1411        let workspace = tmp.path().join("workspace");
1412        std::fs::create_dir_all(&workspace).unwrap();
1413
1414        let proj_a = workspace.join("project-a");
1415        let proj_b = workspace.join("project-b");
1416        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1417        std::fs::create_dir_all(&proj_b).unwrap();
1418        std::fs::write(proj_b.join("package.json"), "{}").unwrap();
1419
1420        let result = detect_multi_root_workspace(&workspace);
1421        assert!(
1422            result.is_some(),
1423            "should detect workspace with 2 child projects"
1424        );
1425
1426        std::env::remove_var("LEAN_CTX_ALLOW_PATH");
1427    }
1428
1429    #[test]
1430    fn detect_multi_root_workspace_returns_none_for_single_project() {
1431        let tmp = tempfile::tempdir().unwrap();
1432        let workspace = tmp.path().join("workspace");
1433        std::fs::create_dir_all(&workspace).unwrap();
1434
1435        let proj_a = workspace.join("project-a");
1436        std::fs::create_dir_all(proj_a.join(".git")).unwrap();
1437
1438        let result = detect_multi_root_workspace(&workspace);
1439        assert!(
1440            result.is_none(),
1441            "should not detect workspace with only 1 child project"
1442        );
1443    }
1444
1445    #[test]
1446    fn is_broad_or_unsafe_root_rejects_home() {
1447        if let Some(home) = dirs::home_dir() {
1448            assert!(is_broad_or_unsafe_root(&home));
1449        }
1450    }
1451
1452    #[test]
1453    fn is_broad_or_unsafe_root_rejects_filesystem_root() {
1454        assert!(is_broad_or_unsafe_root(std::path::Path::new("/")));
1455    }
1456
1457    #[test]
1458    fn is_broad_or_unsafe_root_rejects_agent_dirs() {
1459        assert!(is_broad_or_unsafe_root(std::path::Path::new(
1460            "/home/user/.claude"
1461        )));
1462        assert!(is_broad_or_unsafe_root(std::path::Path::new(
1463            "/home/user/.codex"
1464        )));
1465    }
1466
1467    #[test]
1468    fn is_broad_or_unsafe_root_allows_project_subdir() {
1469        let tmp = tempfile::tempdir().unwrap();
1470        let subdir = tmp.path().join("my-project");
1471        std::fs::create_dir_all(&subdir).unwrap();
1472        assert!(!is_broad_or_unsafe_root(&subdir));
1473    }
1474
1475    #[test]
1476    fn is_broad_or_unsafe_root_allows_tmp_subdirs() {
1477        assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1478            "/tmp/leanctx-test"
1479        )));
1480        assert!(!is_broad_or_unsafe_root(std::path::Path::new(
1481            "/tmp/my-project"
1482        )));
1483    }
1484
1485    #[test]
1486    fn is_broad_or_unsafe_root_allows_home_subdirs() {
1487        if let Some(home) = dirs::home_dir() {
1488            let subdir = home.join("projects").join("my-app");
1489            assert!(!is_broad_or_unsafe_root(&subdir));
1490        }
1491    }
1492
1493    #[test]
1494    fn derive_project_root_falls_back_to_bare_cwd() {
1495        let tmp = tempfile::tempdir().unwrap();
1496        let bare = tmp.path().join("bare-dir");
1497        std::fs::create_dir_all(&bare).unwrap();
1498
1499        let original = std::env::current_dir().unwrap();
1500        std::env::set_current_dir(&bare).unwrap();
1501        let result = derive_project_root_from_cwd();
1502        std::env::set_current_dir(original).unwrap();
1503
1504        assert!(result.is_some(), "bare dir should produce a project root");
1505        let root = result.unwrap();
1506        assert!(
1507            root.contains("bare-dir"),
1508            "fallback should use the bare dir path"
1509        );
1510    }
1511}