mirror of
https://github.com/affaan-m/everything-claude-code.git
synced 2026-03-30 21:53:28 +08:00
feat: complete OpenCode plugin support with hooks, tools, and commands
Major OpenCode integration overhaul: - llms.txt: Comprehensive OpenCode documentation for LLMs (642 lines) - .opencode/plugins/ecc-hooks.ts: All Claude Code hooks translated to OpenCode's plugin system - .opencode/tools/*.ts: 3 custom tools (run-tests, check-coverage, security-audit) - .opencode/commands/*.md: All 24 commands in OpenCode format - .opencode/package.json: npm package structure for opencode-ecc - .opencode/index.ts: Main plugin entry point - Delete incorrect LIMITATIONS.md (hooks ARE supported via plugins) - Rewrite MIGRATION.md with correct hook event mapping - Update README.md OpenCode section to show full feature parity OpenCode has 20+ events vs Claude Code's 3 phases: - PreToolUse → tool.execute.before - PostToolUse → tool.execute.after - Stop → session.idle - SessionStart → session.created - SessionEnd → session.deleted - Plus: file.edited, file.watcher.updated, permission.asked, todo.updated - 12 agents: Full parity - 24 commands: Full parity (+1 from original 23) - 16 skills: Full parity - Hooks: OpenCode has MORE (20+ events vs 3 phases) - Custom Tools: 3 native OpenCode tools The OpenCode configuration can now be: 1. Used directly: cd everything-claude-code && opencode 2. Installed via npm: npm install opencode-ecc
This commit is contained in:
170
.opencode/tools/check-coverage.ts
Normal file
170
.opencode/tools/check-coverage.ts
Normal file
@@ -0,0 +1,170 @@
|
||||
/**
|
||||
* Check Coverage Tool
|
||||
*
|
||||
* Custom OpenCode tool to analyze test coverage and report on gaps.
|
||||
* Supports common coverage report formats.
|
||||
*/
|
||||
|
||||
import { tool } from "@opencode-ai/plugin"
|
||||
import * as path from "path"
|
||||
import * as fs from "fs"
|
||||
|
||||
export default tool({
|
||||
description:
|
||||
"Check test coverage against a threshold and identify files with low coverage. Reads coverage reports from common locations.",
|
||||
args: {
|
||||
threshold: tool.schema
|
||||
.number()
|
||||
.optional()
|
||||
.describe("Minimum coverage percentage required (default: 80)"),
|
||||
showUncovered: tool.schema
|
||||
.boolean()
|
||||
.optional()
|
||||
.describe("Show list of uncovered files (default: true)"),
|
||||
format: tool.schema
|
||||
.enum(["summary", "detailed", "json"])
|
||||
.optional()
|
||||
.describe("Output format (default: summary)"),
|
||||
},
|
||||
async execute(args, context) {
|
||||
const threshold = args.threshold ?? 80
|
||||
const showUncovered = args.showUncovered ?? true
|
||||
const format = args.format ?? "summary"
|
||||
const cwd = context.worktree || context.directory
|
||||
|
||||
// Look for coverage reports
|
||||
const coveragePaths = [
|
||||
"coverage/coverage-summary.json",
|
||||
"coverage/lcov-report/index.html",
|
||||
"coverage/coverage-final.json",
|
||||
".nyc_output/coverage.json",
|
||||
]
|
||||
|
||||
let coverageData: CoverageSummary | null = null
|
||||
let coverageFile: string | null = null
|
||||
|
||||
for (const coveragePath of coveragePaths) {
|
||||
const fullPath = path.join(cwd, coveragePath)
|
||||
if (fs.existsSync(fullPath) && coveragePath.endsWith(".json")) {
|
||||
try {
|
||||
const content = JSON.parse(fs.readFileSync(fullPath, "utf-8"))
|
||||
coverageData = parseCoverageData(content)
|
||||
coverageFile = coveragePath
|
||||
break
|
||||
} catch {
|
||||
// Continue to next file
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (!coverageData) {
|
||||
return {
|
||||
success: false,
|
||||
error: "No coverage report found",
|
||||
suggestion:
|
||||
"Run tests with coverage first: npm test -- --coverage",
|
||||
searchedPaths: coveragePaths,
|
||||
}
|
||||
}
|
||||
|
||||
const passed = coverageData.total.percentage >= threshold
|
||||
const uncoveredFiles = coverageData.files.filter(
|
||||
(f) => f.percentage < threshold
|
||||
)
|
||||
|
||||
const result: CoverageResult = {
|
||||
success: passed,
|
||||
threshold,
|
||||
coverageFile,
|
||||
total: coverageData.total,
|
||||
passed,
|
||||
}
|
||||
|
||||
if (format === "detailed" || (showUncovered && uncoveredFiles.length > 0)) {
|
||||
result.uncoveredFiles = uncoveredFiles.slice(0, 20) // Limit to 20 files
|
||||
result.uncoveredCount = uncoveredFiles.length
|
||||
}
|
||||
|
||||
if (format === "json") {
|
||||
result.rawData = coverageData
|
||||
}
|
||||
|
||||
if (!passed) {
|
||||
result.suggestion = `Coverage is ${coverageData.total.percentage.toFixed(1)}% which is below the ${threshold}% threshold. Focus on these files:\n${uncoveredFiles
|
||||
.slice(0, 5)
|
||||
.map((f) => `- ${f.file}: ${f.percentage.toFixed(1)}%`)
|
||||
.join("\n")}`
|
||||
}
|
||||
|
||||
return result
|
||||
},
|
||||
})
|
||||
|
||||
interface CoverageSummary {
|
||||
total: {
|
||||
lines: number
|
||||
covered: number
|
||||
percentage: number
|
||||
}
|
||||
files: Array<{
|
||||
file: string
|
||||
lines: number
|
||||
covered: number
|
||||
percentage: number
|
||||
}>
|
||||
}
|
||||
|
||||
interface CoverageResult {
|
||||
success: boolean
|
||||
threshold: number
|
||||
coverageFile: string | null
|
||||
total: CoverageSummary["total"]
|
||||
passed: boolean
|
||||
uncoveredFiles?: CoverageSummary["files"]
|
||||
uncoveredCount?: number
|
||||
rawData?: CoverageSummary
|
||||
suggestion?: string
|
||||
}
|
||||
|
||||
function parseCoverageData(data: unknown): CoverageSummary {
|
||||
// Handle istanbul/nyc format
|
||||
if (typeof data === "object" && data !== null && "total" in data) {
|
||||
const istanbulData = data as Record<string, unknown>
|
||||
const total = istanbulData.total as Record<string, { total: number; covered: number }>
|
||||
|
||||
const files: CoverageSummary["files"] = []
|
||||
|
||||
for (const [key, value] of Object.entries(istanbulData)) {
|
||||
if (key !== "total" && typeof value === "object" && value !== null) {
|
||||
const fileData = value as Record<string, { total: number; covered: number }>
|
||||
if (fileData.lines) {
|
||||
files.push({
|
||||
file: key,
|
||||
lines: fileData.lines.total,
|
||||
covered: fileData.lines.covered,
|
||||
percentage: fileData.lines.total > 0
|
||||
? (fileData.lines.covered / fileData.lines.total) * 100
|
||||
: 100,
|
||||
})
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return {
|
||||
total: {
|
||||
lines: total.lines?.total || 0,
|
||||
covered: total.lines?.covered || 0,
|
||||
percentage: total.lines?.total
|
||||
? (total.lines.covered / total.lines.total) * 100
|
||||
: 0,
|
||||
},
|
||||
files,
|
||||
}
|
||||
}
|
||||
|
||||
// Default empty result
|
||||
return {
|
||||
total: { lines: 0, covered: 0, percentage: 0 },
|
||||
files: [],
|
||||
}
|
||||
}
|
||||
10
.opencode/tools/index.ts
Normal file
10
.opencode/tools/index.ts
Normal file
@@ -0,0 +1,10 @@
|
||||
/**
|
||||
* ECC Custom Tools for OpenCode
|
||||
*
|
||||
* These tools extend OpenCode with additional capabilities.
|
||||
*/
|
||||
|
||||
// Re-export all tools
|
||||
export { default as runTests } from "./run-tests.js"
|
||||
export { default as checkCoverage } from "./check-coverage.js"
|
||||
export { default as securityAudit } from "./security-audit.js"
|
||||
139
.opencode/tools/run-tests.ts
Normal file
139
.opencode/tools/run-tests.ts
Normal file
@@ -0,0 +1,139 @@
|
||||
/**
|
||||
* Run Tests Tool
|
||||
*
|
||||
* Custom OpenCode tool to run test suites with various options.
|
||||
* Automatically detects the package manager and test framework.
|
||||
*/
|
||||
|
||||
import { tool } from "@opencode-ai/plugin"
|
||||
import * as path from "path"
|
||||
import * as fs from "fs"
|
||||
|
||||
export default tool({
|
||||
description:
|
||||
"Run the test suite with optional coverage, watch mode, or specific test patterns. Automatically detects package manager (npm, pnpm, yarn, bun) and test framework.",
|
||||
args: {
|
||||
pattern: tool.schema
|
||||
.string()
|
||||
.optional()
|
||||
.describe("Test file pattern or specific test name to run"),
|
||||
coverage: tool.schema
|
||||
.boolean()
|
||||
.optional()
|
||||
.describe("Run with coverage reporting (default: false)"),
|
||||
watch: tool.schema
|
||||
.boolean()
|
||||
.optional()
|
||||
.describe("Run in watch mode for continuous testing (default: false)"),
|
||||
updateSnapshots: tool.schema
|
||||
.boolean()
|
||||
.optional()
|
||||
.describe("Update Jest/Vitest snapshots (default: false)"),
|
||||
},
|
||||
async execute(args, context) {
|
||||
const { pattern, coverage, watch, updateSnapshots } = args
|
||||
const cwd = context.worktree || context.directory
|
||||
|
||||
// Detect package manager
|
||||
const packageManager = await detectPackageManager(cwd)
|
||||
|
||||
// Detect test framework
|
||||
const testFramework = await detectTestFramework(cwd)
|
||||
|
||||
// Build command
|
||||
let cmd: string[] = [packageManager]
|
||||
|
||||
if (packageManager === "npm") {
|
||||
cmd.push("run", "test")
|
||||
} else {
|
||||
cmd.push("test")
|
||||
}
|
||||
|
||||
// Add options based on framework
|
||||
const testArgs: string[] = []
|
||||
|
||||
if (coverage) {
|
||||
testArgs.push("--coverage")
|
||||
}
|
||||
|
||||
if (watch) {
|
||||
testArgs.push("--watch")
|
||||
}
|
||||
|
||||
if (updateSnapshots) {
|
||||
testArgs.push("-u")
|
||||
}
|
||||
|
||||
if (pattern) {
|
||||
if (testFramework === "jest" || testFramework === "vitest") {
|
||||
testArgs.push("--testPathPattern", pattern)
|
||||
} else {
|
||||
testArgs.push(pattern)
|
||||
}
|
||||
}
|
||||
|
||||
// Add -- separator for npm
|
||||
if (testArgs.length > 0) {
|
||||
if (packageManager === "npm") {
|
||||
cmd.push("--")
|
||||
}
|
||||
cmd.push(...testArgs)
|
||||
}
|
||||
|
||||
const command = cmd.join(" ")
|
||||
|
||||
return {
|
||||
command,
|
||||
packageManager,
|
||||
testFramework,
|
||||
options: {
|
||||
pattern: pattern || "all tests",
|
||||
coverage: coverage || false,
|
||||
watch: watch || false,
|
||||
updateSnapshots: updateSnapshots || false,
|
||||
},
|
||||
instructions: `Run this command to execute tests:\n\n${command}`,
|
||||
}
|
||||
},
|
||||
})
|
||||
|
||||
async function detectPackageManager(cwd: string): Promise<string> {
|
||||
const lockFiles: Record<string, string> = {
|
||||
"bun.lockb": "bun",
|
||||
"pnpm-lock.yaml": "pnpm",
|
||||
"yarn.lock": "yarn",
|
||||
"package-lock.json": "npm",
|
||||
}
|
||||
|
||||
for (const [lockFile, pm] of Object.entries(lockFiles)) {
|
||||
if (fs.existsSync(path.join(cwd, lockFile))) {
|
||||
return pm
|
||||
}
|
||||
}
|
||||
|
||||
return "npm"
|
||||
}
|
||||
|
||||
async function detectTestFramework(cwd: string): Promise<string> {
|
||||
const packageJsonPath = path.join(cwd, "package.json")
|
||||
|
||||
if (fs.existsSync(packageJsonPath)) {
|
||||
try {
|
||||
const packageJson = JSON.parse(fs.readFileSync(packageJsonPath, "utf-8"))
|
||||
const deps = {
|
||||
...packageJson.dependencies,
|
||||
...packageJson.devDependencies,
|
||||
}
|
||||
|
||||
if (deps.vitest) return "vitest"
|
||||
if (deps.jest) return "jest"
|
||||
if (deps.mocha) return "mocha"
|
||||
if (deps.ava) return "ava"
|
||||
if (deps.tap) return "tap"
|
||||
} catch {
|
||||
// Ignore parse errors
|
||||
}
|
||||
}
|
||||
|
||||
return "unknown"
|
||||
}
|
||||
277
.opencode/tools/security-audit.ts
Normal file
277
.opencode/tools/security-audit.ts
Normal file
@@ -0,0 +1,277 @@
|
||||
/**
|
||||
* Security Audit Tool
|
||||
*
|
||||
* Custom OpenCode tool to run security audits on dependencies and code.
|
||||
* Combines npm audit, secret scanning, and OWASP checks.
|
||||
*
|
||||
* NOTE: This tool SCANS for security anti-patterns - it does not introduce them.
|
||||
* The regex patterns below are used to DETECT potential issues in user code.
|
||||
*/
|
||||
|
||||
import { tool } from "@opencode-ai/plugin"
|
||||
import * as path from "path"
|
||||
import * as fs from "fs"
|
||||
|
||||
export default tool({
|
||||
description:
|
||||
"Run a comprehensive security audit including dependency vulnerabilities, secret scanning, and common security issues.",
|
||||
args: {
|
||||
type: tool.schema
|
||||
.enum(["all", "dependencies", "secrets", "code"])
|
||||
.optional()
|
||||
.describe("Type of audit to run (default: all)"),
|
||||
fix: tool.schema
|
||||
.boolean()
|
||||
.optional()
|
||||
.describe("Attempt to auto-fix dependency vulnerabilities (default: false)"),
|
||||
severity: tool.schema
|
||||
.enum(["low", "moderate", "high", "critical"])
|
||||
.optional()
|
||||
.describe("Minimum severity level to report (default: moderate)"),
|
||||
},
|
||||
async execute(args, context) {
|
||||
const auditType = args.type ?? "all"
|
||||
const fix = args.fix ?? false
|
||||
const severity = args.severity ?? "moderate"
|
||||
const cwd = context.worktree || context.directory
|
||||
|
||||
const results: AuditResults = {
|
||||
timestamp: new Date().toISOString(),
|
||||
directory: cwd,
|
||||
checks: [],
|
||||
summary: {
|
||||
passed: 0,
|
||||
failed: 0,
|
||||
warnings: 0,
|
||||
},
|
||||
}
|
||||
|
||||
// Check for dependencies audit
|
||||
if (auditType === "all" || auditType === "dependencies") {
|
||||
results.checks.push({
|
||||
name: "Dependency Vulnerabilities",
|
||||
description: "Check for known vulnerabilities in dependencies",
|
||||
command: fix ? "npm audit fix" : "npm audit",
|
||||
severityFilter: severity,
|
||||
status: "pending",
|
||||
})
|
||||
}
|
||||
|
||||
// Check for secrets
|
||||
if (auditType === "all" || auditType === "secrets") {
|
||||
const secretPatterns = await scanForSecrets(cwd)
|
||||
if (secretPatterns.length > 0) {
|
||||
results.checks.push({
|
||||
name: "Secret Detection",
|
||||
description: "Scan for hardcoded secrets and API keys",
|
||||
status: "failed",
|
||||
findings: secretPatterns,
|
||||
})
|
||||
results.summary.failed++
|
||||
} else {
|
||||
results.checks.push({
|
||||
name: "Secret Detection",
|
||||
description: "Scan for hardcoded secrets and API keys",
|
||||
status: "passed",
|
||||
})
|
||||
results.summary.passed++
|
||||
}
|
||||
}
|
||||
|
||||
// Check for common code security issues
|
||||
if (auditType === "all" || auditType === "code") {
|
||||
const codeIssues = await scanCodeSecurity(cwd)
|
||||
if (codeIssues.length > 0) {
|
||||
results.checks.push({
|
||||
name: "Code Security",
|
||||
description: "Check for common security anti-patterns",
|
||||
status: "warning",
|
||||
findings: codeIssues,
|
||||
})
|
||||
results.summary.warnings++
|
||||
} else {
|
||||
results.checks.push({
|
||||
name: "Code Security",
|
||||
description: "Check for common security anti-patterns",
|
||||
status: "passed",
|
||||
})
|
||||
results.summary.passed++
|
||||
}
|
||||
}
|
||||
|
||||
// Generate recommendations
|
||||
results.recommendations = generateRecommendations(results)
|
||||
|
||||
return results
|
||||
},
|
||||
})
|
||||
|
||||
interface AuditCheck {
|
||||
name: string
|
||||
description: string
|
||||
command?: string
|
||||
severityFilter?: string
|
||||
status: "pending" | "passed" | "failed" | "warning"
|
||||
findings?: Array<{ file: string; issue: string; line?: number }>
|
||||
}
|
||||
|
||||
interface AuditResults {
|
||||
timestamp: string
|
||||
directory: string
|
||||
checks: AuditCheck[]
|
||||
summary: {
|
||||
passed: number
|
||||
failed: number
|
||||
warnings: number
|
||||
}
|
||||
recommendations?: string[]
|
||||
}
|
||||
|
||||
async function scanForSecrets(
|
||||
cwd: string
|
||||
): Promise<Array<{ file: string; issue: string; line?: number }>> {
|
||||
const findings: Array<{ file: string; issue: string; line?: number }> = []
|
||||
|
||||
// Patterns to DETECT potential secrets (security scanning)
|
||||
const secretPatterns = [
|
||||
{ pattern: /api[_-]?key\s*[:=]\s*['"][^'"]{20,}['"]/gi, name: "API Key" },
|
||||
{ pattern: /password\s*[:=]\s*['"][^'"]+['"]/gi, name: "Password" },
|
||||
{ pattern: /secret\s*[:=]\s*['"][^'"]{10,}['"]/gi, name: "Secret" },
|
||||
{ pattern: /Bearer\s+[A-Za-z0-9\-_]+\.[A-Za-z0-9\-_]+/g, name: "JWT Token" },
|
||||
{ pattern: /sk-[a-zA-Z0-9]{32,}/g, name: "OpenAI API Key" },
|
||||
{ pattern: /ghp_[a-zA-Z0-9]{36}/g, name: "GitHub Token" },
|
||||
{ pattern: /aws[_-]?secret[_-]?access[_-]?key/gi, name: "AWS Secret" },
|
||||
]
|
||||
|
||||
const ignorePatterns = [
|
||||
"node_modules",
|
||||
".git",
|
||||
"dist",
|
||||
"build",
|
||||
".env.example",
|
||||
".env.template",
|
||||
]
|
||||
|
||||
const srcDir = path.join(cwd, "src")
|
||||
if (fs.existsSync(srcDir)) {
|
||||
await scanDirectory(srcDir, secretPatterns, ignorePatterns, findings)
|
||||
}
|
||||
|
||||
// Also check root config files
|
||||
const configFiles = ["config.js", "config.ts", "settings.js", "settings.ts"]
|
||||
for (const configFile of configFiles) {
|
||||
const filePath = path.join(cwd, configFile)
|
||||
if (fs.existsSync(filePath)) {
|
||||
await scanFile(filePath, secretPatterns, findings)
|
||||
}
|
||||
}
|
||||
|
||||
return findings
|
||||
}
|
||||
|
||||
async function scanDirectory(
|
||||
dir: string,
|
||||
patterns: Array<{ pattern: RegExp; name: string }>,
|
||||
ignorePatterns: string[],
|
||||
findings: Array<{ file: string; issue: string; line?: number }>
|
||||
): Promise<void> {
|
||||
if (!fs.existsSync(dir)) return
|
||||
|
||||
const entries = fs.readdirSync(dir, { withFileTypes: true })
|
||||
|
||||
for (const entry of entries) {
|
||||
const fullPath = path.join(dir, entry.name)
|
||||
|
||||
if (ignorePatterns.some((p) => fullPath.includes(p))) continue
|
||||
|
||||
if (entry.isDirectory()) {
|
||||
await scanDirectory(fullPath, patterns, ignorePatterns, findings)
|
||||
} else if (entry.isFile() && entry.name.match(/\.(ts|tsx|js|jsx|json)$/)) {
|
||||
await scanFile(fullPath, patterns, findings)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
async function scanFile(
|
||||
filePath: string,
|
||||
patterns: Array<{ pattern: RegExp; name: string }>,
|
||||
findings: Array<{ file: string; issue: string; line?: number }>
|
||||
): Promise<void> {
|
||||
try {
|
||||
const content = fs.readFileSync(filePath, "utf-8")
|
||||
const lines = content.split("\n")
|
||||
|
||||
for (let i = 0; i < lines.length; i++) {
|
||||
const line = lines[i]
|
||||
for (const { pattern, name } of patterns) {
|
||||
// Reset regex state
|
||||
pattern.lastIndex = 0
|
||||
if (pattern.test(line)) {
|
||||
findings.push({
|
||||
file: filePath,
|
||||
issue: `Potential ${name} found`,
|
||||
line: i + 1,
|
||||
})
|
||||
}
|
||||
}
|
||||
}
|
||||
} catch {
|
||||
// Ignore read errors
|
||||
}
|
||||
}
|
||||
|
||||
async function scanCodeSecurity(
|
||||
cwd: string
|
||||
): Promise<Array<{ file: string; issue: string; line?: number }>> {
|
||||
const findings: Array<{ file: string; issue: string; line?: number }> = []
|
||||
|
||||
// Patterns to DETECT security anti-patterns (this tool scans for issues)
|
||||
// These are detection patterns, not code that uses these anti-patterns
|
||||
const securityPatterns = [
|
||||
{ pattern: /\beval\s*\(/g, name: "eval() usage - potential code injection" },
|
||||
{ pattern: /innerHTML\s*=/g, name: "innerHTML assignment - potential XSS" },
|
||||
{ pattern: /dangerouslySetInnerHTML/g, name: "dangerouslySetInnerHTML - potential XSS" },
|
||||
{ pattern: /document\.write/g, name: "document.write - potential XSS" },
|
||||
{ pattern: /\$\{.*\}.*sql/gi, name: "Potential SQL injection" },
|
||||
]
|
||||
|
||||
const srcDir = path.join(cwd, "src")
|
||||
if (fs.existsSync(srcDir)) {
|
||||
await scanDirectory(srcDir, securityPatterns, ["node_modules", ".git", "dist"], findings)
|
||||
}
|
||||
|
||||
return findings
|
||||
}
|
||||
|
||||
function generateRecommendations(results: AuditResults): string[] {
|
||||
const recommendations: string[] = []
|
||||
|
||||
for (const check of results.checks) {
|
||||
if (check.status === "failed" && check.name === "Secret Detection") {
|
||||
recommendations.push(
|
||||
"CRITICAL: Remove hardcoded secrets and use environment variables instead"
|
||||
)
|
||||
recommendations.push("Add a .env file (gitignored) for local development")
|
||||
recommendations.push("Use a secrets manager for production deployments")
|
||||
}
|
||||
|
||||
if (check.status === "warning" && check.name === "Code Security") {
|
||||
recommendations.push(
|
||||
"Review flagged code patterns for potential security vulnerabilities"
|
||||
)
|
||||
recommendations.push("Consider using DOMPurify for HTML sanitization")
|
||||
recommendations.push("Use parameterized queries for database operations")
|
||||
}
|
||||
|
||||
if (check.status === "pending" && check.name === "Dependency Vulnerabilities") {
|
||||
recommendations.push("Run 'npm audit' to check for dependency vulnerabilities")
|
||||
recommendations.push("Consider using 'npm audit fix' to auto-fix issues")
|
||||
}
|
||||
}
|
||||
|
||||
if (recommendations.length === 0) {
|
||||
recommendations.push("No critical security issues found. Continue following security best practices.")
|
||||
}
|
||||
|
||||
return recommendations
|
||||
}
|
||||
Reference in New Issue
Block a user