mirror of
https://github.com/catlog22/Claude-Code-Workflow.git
synced 2026-03-01 15:03:57 +08:00
* feat(security): Secure dashboard server by default ## Solution Summary - Solution-ID: SOL-DSC-002-1 - Issue-ID: DSC-002 ## Tasks Completed - [T1] JWT token manager (24h expiry, persisted secret/token) - [T2] API auth middleware + localhost token endpoint - [T3] Default bind 127.0.0.1, add --host with warning - [T4] Localhost-only CORS with credentials + Vary - [T5] SECURITY.md documentation + README link ## Verification - npm run build - npm test -- ccw/tests/token-manager.test.ts ccw/tests/middleware.test.ts ccw/tests/server-auth.integration.test.ts ccw/tests/server.test.ts ccw/tests/cors.test.ts * fix(security): Prevent command injection in Windows spawn() ## Solution Summary - **Solution-ID**: SOL-DSC-001-1 - **Issue-ID**: DSC-001 - **Risk/Impact/Complexity**: high/high/medium ## Tasks Completed - [T1] Create Windows shell escape utility - [T2] Escape cli-executor spawn() args on Windows - [T3] Add command injection regression tests ## Files Modified - ccw/src/utils/shell-escape.ts - ccw/src/tools/cli-executor.ts - ccw/tests/shell-escape.test.ts - ccw/tests/security/command-injection.test.ts ## Verification - npm run build - npm test -- ccw/tests/shell-escape.test.ts ccw/tests/security/command-injection.test.ts * fix(security): Harden path validation (DSC-005) ## Solution Summary - Solution-ID: SOL-DSC-005-1 - Issue-ID: DSC-005 ## Tasks Completed - T1: Refactor path validation to pre-resolution checking - T2: Implement allowlist-based path validation - T3: Add path validation to API routes - T4: Add path security regression tests ## Files Modified - ccw/src/utils/path-resolver.ts - ccw/src/utils/path-validator.ts - ccw/src/core/routes/graph-routes.ts - ccw/src/core/routes/files-routes.ts - ccw/src/core/routes/skills-routes.ts - ccw/tests/path-resolver.test.ts - ccw/tests/graph-routes.test.ts - ccw/tests/files-routes.test.ts - ccw/tests/skills-routes.test.ts - ccw/tests/security/path-traversal.test.ts ## Verification - npm run build - npm test -- path-resolver.test.ts - npm test -- path-validator.test.ts - npm test -- graph-routes.test.ts - npm test -- files-routes.test.ts - npm test -- skills-routes.test.ts - npm test -- ccw/tests/security/path-traversal.test.ts * fix(security): Prevent credential leakage (DSC-004) ## Solution Summary - Solution-ID: SOL-DSC-004-1 - Issue-ID: DSC-004 ## Tasks Completed - T1: Create credential handling security tests - T2: Add log sanitization tests - T3: Add env var leakage prevention tests - T4: Add secure storage tests ## Files Modified - ccw/src/config/litellm-api-config-manager.ts - ccw/src/core/routes/litellm-api-routes.ts - ccw/tests/security/credential-handling.test.ts ## Verification - npm run build - node --experimental-strip-types --test ccw/tests/security/credential-handling.test.ts * test(ranking): expand normalize_weights edge case coverage (ISS-1766920108814-0) ## Solution Summary - Solution-ID: SOL-20251228113607 - Issue-ID: ISS-1766920108814-0 ## Tasks Completed - T1: Fix NaN and invalid total handling in normalize_weights - T2: Add unit tests for NaN edge cases in normalize_weights ## Files Modified - codex-lens/tests/test_rrf_fusion.py ## Verification - python -m pytest codex-lens/tests/test_rrf_fusion.py::TestNormalizeBM25Score -v - python -m pytest codex-lens/tests/test_rrf_fusion.py -v -k normalize - python -m pytest codex-lens/tests/test_rrf_fusion.py::TestReciprocalRankFusion::test_weight_normalization codex-lens/tests/test_cli_hybrid_search.py::TestCLIHybridSearch::test_weights_normalization -v * feat(security): Add CSRF protection and tighten CORS (DSC-006) ## Solution Summary - Solution-ID: SOL-DSC-006-1 - Issue-ID: DSC-006 - Risk/Impact/Complexity: high/high/medium ## Tasks Completed - T1: Create CSRF token generation system - T2: Add CSRF token endpoints - T3: Implement CSRF validation middleware - T4: Restrict CORS to trusted origins - T5: Add CSRF security tests ## Files Modified - ccw/src/core/auth/csrf-manager.ts - ccw/src/core/auth/csrf-middleware.ts - ccw/src/core/routes/auth-routes.ts - ccw/src/core/server.ts - ccw/tests/csrf-manager.test.ts - ccw/tests/auth-routes.test.ts - ccw/tests/csrf-middleware.test.ts - ccw/tests/security/csrf.test.ts ## Verification - npm run build - node --experimental-strip-types --test ccw/tests/csrf-manager.test.ts - node --experimental-strip-types --test ccw/tests/auth-routes.test.ts - node --experimental-strip-types --test ccw/tests/csrf-middleware.test.ts - node --experimental-strip-types --test ccw/tests/cors.test.ts - node --experimental-strip-types --test ccw/tests/security/csrf.test.ts * fix(cli-executor): prevent stale SIGKILL timeouts ## Solution Summary - Solution-ID: SOL-DSC-007-1 - Issue-ID: DSC-007 - Risk/Impact/Complexity: low/low/low ## Tasks Completed - [T1] Store timeout handle in killCurrentCliProcess ## Files Modified - ccw/src/tools/cli-executor.ts - ccw/tests/cli-executor-kill.test.ts ## Verification - node --experimental-strip-types --test ccw/tests/cli-executor-kill.test.ts * fix(cli-executor): enhance merge validation guards ## Solution Summary - Solution-ID: SOL-DSC-008-1 - Issue-ID: DSC-008 - Risk/Impact/Complexity: low/low/low ## Tasks Completed - [T1] Enhance sourceConversations array validation ## Files Modified - ccw/src/tools/cli-executor.ts - ccw/tests/cli-executor-merge-validation.test.ts ## Verification - node --experimental-strip-types --test ccw/tests/cli-executor-merge-validation.test.ts * refactor(core): remove @ts-nocheck from core routes ## Solution Summary - Solution-ID: SOL-DSC-003-1 - Issue-ID: DSC-003 - Queue-ID: QUE-20260106-164500 - Item-ID: S-9 ## Tasks Completed - T1: Create shared RouteContext type definition - T2: Remove @ts-nocheck from small route files - T3: Remove @ts-nocheck from medium route files - T4: Remove @ts-nocheck from large route files - T5: Remove @ts-nocheck from remaining core files ## Files Modified - ccw/src/core/dashboard-generator-patch.ts - ccw/src/core/dashboard-generator.ts - ccw/src/core/routes/ccw-routes.ts - ccw/src/core/routes/claude-routes.ts - ccw/src/core/routes/cli-routes.ts - ccw/src/core/routes/codexlens-routes.ts - ccw/src/core/routes/discovery-routes.ts - ccw/src/core/routes/files-routes.ts - ccw/src/core/routes/graph-routes.ts - ccw/src/core/routes/help-routes.ts - ccw/src/core/routes/hooks-routes.ts - ccw/src/core/routes/issue-routes.ts - ccw/src/core/routes/litellm-api-routes.ts - ccw/src/core/routes/litellm-routes.ts - ccw/src/core/routes/mcp-routes.ts - ccw/src/core/routes/mcp-routes.ts.backup - ccw/src/core/routes/mcp-templates-db.ts - ccw/src/core/routes/nav-status-routes.ts - ccw/src/core/routes/rules-routes.ts - ccw/src/core/routes/session-routes.ts - ccw/src/core/routes/skills-routes.ts - ccw/src/core/routes/status-routes.ts - ccw/src/core/routes/system-routes.ts - ccw/src/core/routes/types.ts - ccw/src/core/server.ts - ccw/src/core/websocket.ts ## Verification - npm run build - npm test * refactor: split cli-executor and codexlens routes into modules ## Solution Summary - Solution-ID: SOL-DSC-012-1 - Issue-ID: DSC-012 - Risk/Impact/Complexity: medium/medium/high ## Tasks Completed - [T1] Extract execution orchestration from cli-executor.ts (Refactor ccw/src/tools) - [T2] Extract route handlers from codexlens-routes.ts (Refactor ccw/src/core/routes) - [T3] Extract prompt concatenation logic from cli-executor (Refactor ccw/src/tools) - [T4] Document refactored module architecture (Docs) ## Files Modified - ccw/src/tools/cli-executor.ts - ccw/src/tools/cli-executor-core.ts - ccw/src/tools/cli-executor-utils.ts - ccw/src/tools/cli-executor-state.ts - ccw/src/tools/cli-prompt-builder.ts - ccw/src/tools/README.md - ccw/src/core/routes/codexlens-routes.ts - ccw/src/core/routes/codexlens/config-handlers.ts - ccw/src/core/routes/codexlens/index-handlers.ts - ccw/src/core/routes/codexlens/semantic-handlers.ts - ccw/src/core/routes/codexlens/watcher-handlers.ts - ccw/src/core/routes/codexlens/utils.ts - ccw/src/core/routes/codexlens/README.md ## Verification - npm run build - npm test * test(issue): Add comprehensive issue command tests ## Solution Summary - **Solution-ID**: SOL-DSC-009-1 - **Issue-ID**: DSC-009 - **Risk/Impact/Complexity**: low/high/medium ## Tasks Completed - [T1] Create issue command test file structure: Create isolated test harness - [T2] Add JSONL read/write operation tests: Verify JSONL correctness and errors - [T3] Add issue lifecycle tests: Verify status transitions and timestamps - [T4] Add solution binding tests: Verify binding flows and error cases - [T5] Add queue formation tests: Verify queue creation, IDs, and DAG behavior - [T6] Add queue execution tests: Verify next/done/retry and status sync ## Files Modified - ccw/src/commands/issue.ts - ccw/tests/issue-command.test.ts ## Verification - node --experimental-strip-types --test ccw/tests/issue-command.test.ts * test(routes): Add integration tests for route modules ## Solution Summary - Solution-ID: SOL-DSC-010-1 - Issue-ID: DSC-010 - Queue-ID: QUE-20260106-164500 ## Tasks Completed - [T1] Add tests for ccw-routes.ts - [T2] Add tests for files-routes.ts - [T3] Add tests for claude-routes.ts (includes Windows path fix for create) - [T4] Add tests for issue-routes.ts - [T5] Add tests for help-routes.ts (avoid hanging watchers) - [T6] Add tests for nav-status-routes.ts - [T7] Add tests for hooks/graph/rules/skills/litellm-api routes ## Files Modified - ccw/src/core/routes/claude-routes.ts - ccw/src/core/routes/help-routes.ts - ccw/tests/integration/ccw-routes.test.ts - ccw/tests/integration/claude-routes.test.ts - ccw/tests/integration/files-routes.test.ts - ccw/tests/integration/issue-routes.test.ts - ccw/tests/integration/help-routes.test.ts - ccw/tests/integration/nav-status-routes.test.ts - ccw/tests/integration/hooks-routes.test.ts - ccw/tests/integration/graph-routes.test.ts - ccw/tests/integration/rules-routes.test.ts - ccw/tests/integration/skills-routes.test.ts - ccw/tests/integration/litellm-api-routes.test.ts ## Verification - node --experimental-strip-types --test ccw/tests/integration/ccw-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/files-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/claude-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/issue-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/help-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/nav-status-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/hooks-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/graph-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/rules-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/skills-routes.test.ts - node --experimental-strip-types --test ccw/tests/integration/litellm-api-routes.test.ts * refactor(core): Switch cache and lite scanning to async fs ## Solution Summary - Solution-ID: SOL-DSC-013-1 - Issue-ID: DSC-013 - Queue-ID: QUE-20260106-164500 ## Tasks Completed - [T1] Convert cache-manager.ts to async file operations - [T2] Convert lite-scanner.ts to async file operations - [T3] Update cache-manager call sites to await async API - [T4] Update lite-scanner call sites to await async API ## Files Modified - ccw/src/core/cache-manager.ts - ccw/src/core/lite-scanner.ts - ccw/src/core/data-aggregator.ts ## Verification - npm run build - npm test * fix(exec): Add timeout protection for execSync ## Solution Summary - Solution-ID: SOL-DSC-014-1 - Issue-ID: DSC-014 - Queue-ID: QUE-20260106-164500 ## Tasks Completed - [T1] Add timeout to execSync calls in python-utils.ts - [T2] Add timeout to execSync calls in detect-changed-modules.ts - [T3] Add timeout to execSync calls in claude-freshness.ts - [T4] Add timeout to execSync calls in issue.ts - [T5] Consolidate execSync timeout constants and audit coverage ## Files Modified - ccw/src/utils/exec-constants.ts - ccw/src/utils/python-utils.ts - ccw/src/tools/detect-changed-modules.ts - ccw/src/core/claude-freshness.ts - ccw/src/commands/issue.ts - ccw/src/tools/smart-search.ts - ccw/src/tools/codex-lens.ts - ccw/src/core/routes/codexlens/config-handlers.ts ## Verification - npm run build - npm test - node --experimental-strip-types --test ccw/tests/issue-command.test.ts * feat(cli): Add progress spinner with elapsed time for long-running operations ## Solution Summary - Solution-ID: SOL-DSC-015-1 - Issue-ID: DSC-015 - Queue-Item: S-15 - Risk/Impact/Complexity: low/medium/low ## Tasks Completed - [T1] Add progress spinner to CLI execution: Update ccw/src/commands/cli.ts ## Files Modified - ccw/src/commands/cli.ts - ccw/tests/cli-command.test.ts ## Verification - node --experimental-strip-types --test ccw/tests/cli-command.test.ts - node --experimental-strip-types --test ccw/tests/cli-executor-kill.test.ts - node --experimental-strip-types --test ccw/tests/cli-executor-merge-validation.test.ts * fix(cli): Move full output hint immediately after truncation notice ## Solution Summary - Solution-ID: SOL-DSC-016-1 - Issue-ID: DSC-016 - Queue-Item: S-16 - Risk/Impact/Complexity: low/high/low ## Tasks Completed - [T1] Relocate output hint after truncation: Update ccw/src/commands/cli.ts ## Files Modified - ccw/src/commands/cli.ts - ccw/tests/cli-command.test.ts ## Verification - npm run build - node --experimental-strip-types --test ccw/tests/cli-command.test.ts * feat(cli): Add confirmation prompts for destructive operations ## Solution Summary - Solution-ID: SOL-DSC-017-1 - Issue-ID: DSC-017 - Queue-Item: S-17 - Risk/Impact/Complexity: low/high/low ## Tasks Completed - [T1] Add confirmation to storage clean operations: Update ccw/src/commands/cli.ts - [T2] Add confirmation to issue queue delete: Update ccw/src/commands/issue.ts ## Files Modified - ccw/src/commands/cli.ts - ccw/src/commands/issue.ts - ccw/tests/cli-command.test.ts - ccw/tests/issue-command.test.ts ## Verification - npm run build - node --experimental-strip-types --test ccw/tests/cli-command.test.ts - node --experimental-strip-types --test ccw/tests/issue-command.test.ts * feat(cli): Improve multi-line prompt guidance ## Solution Summary - Solution-ID: SOL-DSC-018-1 - Issue-ID: DSC-018 - Queue-Item: S-18 - Risk/Impact/Complexity: low/medium/low ## Tasks Completed - [T1] Update CLI help to emphasize --file option: Update ccw/src/commands/cli.ts - [T2] Add inline hint for multi-line detection: Update ccw/src/commands/cli.ts ## Files Modified - ccw/src/commands/cli.ts - ccw/tests/cli-command.test.ts ## Verification - npm run build - node --experimental-strip-types --test ccw/tests/cli-command.test.ts --------- Co-authored-by: catlog22 <catlog22@github.com>
344 lines
9.3 KiB
TypeScript
344 lines
9.3 KiB
TypeScript
/**
|
|
* Detect Changed Modules Tool
|
|
* Find modules affected by git changes or recent modifications
|
|
*/
|
|
|
|
import { z } from 'zod';
|
|
import type { ToolSchema, ToolResult } from '../types/tool.js';
|
|
import { readdirSync, statSync, existsSync } from 'fs';
|
|
import { join, resolve, dirname, extname, relative } from 'path';
|
|
import { execSync } from 'child_process';
|
|
import { EXEC_TIMEOUTS } from '../utils/exec-constants.js';
|
|
|
|
function isExecTimeoutError(error: unknown): boolean {
|
|
const err = error as { code?: unknown; errno?: unknown; message?: unknown } | null;
|
|
const code = err?.code ?? err?.errno;
|
|
if (code === 'ETIMEDOUT') return true;
|
|
const message = typeof err?.message === 'string' ? err.message : '';
|
|
return message.includes('ETIMEDOUT');
|
|
}
|
|
|
|
// Source file extensions to track
|
|
const SOURCE_EXTENSIONS = [
|
|
'.md', '.js', '.ts', '.jsx', '.tsx',
|
|
'.py', '.go', '.rs', '.java', '.cpp', '.c', '.h',
|
|
'.sh', '.ps1', '.json', '.yaml', '.yml'
|
|
];
|
|
|
|
// Directories to exclude
|
|
const EXCLUDE_DIRS = [
|
|
'.git', '__pycache__', 'node_modules', '.venv', 'venv', 'env',
|
|
'dist', 'build', '.cache', '.pytest_cache', '.mypy_cache',
|
|
'coverage', '.nyc_output', 'logs', 'tmp', 'temp'
|
|
];
|
|
|
|
// Define Zod schema for validation
|
|
const ParamsSchema = z.object({
|
|
format: z.enum(['list', 'grouped', 'paths']).default('paths'),
|
|
path: z.string().default('.'),
|
|
});
|
|
|
|
type Params = z.infer<typeof ParamsSchema>;
|
|
|
|
interface ModuleResult {
|
|
depth: number;
|
|
path: string;
|
|
files: number;
|
|
types: string[];
|
|
has_claude: boolean;
|
|
}
|
|
|
|
interface ToolOutput {
|
|
format: string;
|
|
change_source: 'git' | 'mtime' | 'none';
|
|
changed_files_count: number;
|
|
affected_modules_count: number;
|
|
results: ModuleResult[];
|
|
output: string;
|
|
}
|
|
|
|
/**
|
|
* Check if git is available and we're in a repo
|
|
*/
|
|
function isGitRepo(basePath: string): boolean {
|
|
try {
|
|
execSync('git rev-parse --git-dir', { cwd: basePath, stdio: 'pipe', timeout: EXEC_TIMEOUTS.GIT_QUICK });
|
|
return true;
|
|
} catch (e: unknown) {
|
|
if (isExecTimeoutError(e)) {
|
|
console.warn(`[detect_changed_modules] git rev-parse timed out after ${EXEC_TIMEOUTS.GIT_QUICK}ms`);
|
|
}
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get changed files from git
|
|
*/
|
|
function getGitChangedFiles(basePath: string): string[] {
|
|
try {
|
|
// Get staged + unstaged changes
|
|
let output = execSync('git diff --name-only HEAD 2>/dev/null', {
|
|
cwd: basePath,
|
|
encoding: 'utf8',
|
|
stdio: ['pipe', 'pipe', 'pipe'],
|
|
timeout: EXEC_TIMEOUTS.GIT_DIFF,
|
|
}).trim();
|
|
|
|
const cachedOutput = execSync('git diff --name-only --cached 2>/dev/null', {
|
|
cwd: basePath,
|
|
encoding: 'utf8',
|
|
stdio: ['pipe', 'pipe', 'pipe'],
|
|
timeout: EXEC_TIMEOUTS.GIT_DIFF,
|
|
}).trim();
|
|
|
|
if (cachedOutput) {
|
|
output = output ? `${output}\n${cachedOutput}` : cachedOutput;
|
|
}
|
|
|
|
// If no working changes, check last commit
|
|
if (!output) {
|
|
output = execSync('git diff --name-only HEAD~1 HEAD 2>/dev/null', {
|
|
cwd: basePath,
|
|
encoding: 'utf8',
|
|
stdio: ['pipe', 'pipe', 'pipe'],
|
|
timeout: EXEC_TIMEOUTS.GIT_DIFF,
|
|
}).trim();
|
|
}
|
|
|
|
return output ? output.split('\n').filter(f => f.trim()) : [];
|
|
} catch (e: unknown) {
|
|
if (isExecTimeoutError(e)) {
|
|
console.warn(`[detect_changed_modules] git diff timed out after ${EXEC_TIMEOUTS.GIT_DIFF}ms`);
|
|
}
|
|
return [];
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Find recently modified files (fallback when no git changes)
|
|
*/
|
|
function findRecentlyModified(basePath: string, hoursAgo: number = 24): string[] {
|
|
const results: string[] = [];
|
|
const cutoffTime = Date.now() - (hoursAgo * 60 * 60 * 1000);
|
|
|
|
function scan(dirPath: string): void {
|
|
try {
|
|
const entries = readdirSync(dirPath, { withFileTypes: true });
|
|
|
|
for (const entry of entries) {
|
|
if (entry.isDirectory()) {
|
|
if (EXCLUDE_DIRS.includes(entry.name)) continue;
|
|
scan(join(dirPath, entry.name));
|
|
} else if (entry.isFile()) {
|
|
const ext = extname(entry.name).toLowerCase();
|
|
if (!SOURCE_EXTENSIONS.includes(ext)) continue;
|
|
|
|
const fullPath = join(dirPath, entry.name);
|
|
try {
|
|
const stat = statSync(fullPath);
|
|
if (stat.mtimeMs > cutoffTime) {
|
|
results.push(relative(basePath, fullPath));
|
|
}
|
|
} catch (e) {
|
|
// Skip files we can't stat
|
|
}
|
|
}
|
|
}
|
|
} catch (e) {
|
|
// Ignore permission errors
|
|
}
|
|
}
|
|
|
|
scan(basePath);
|
|
return results;
|
|
}
|
|
|
|
/**
|
|
* Extract unique parent directories from file list
|
|
*/
|
|
function extractDirectories(files: string[], basePath: string): string[] {
|
|
const dirs = new Set<string>();
|
|
|
|
for (const file of files) {
|
|
const dir = dirname(file);
|
|
if (dir === '.' || dir === '') {
|
|
dirs.add('.');
|
|
} else {
|
|
dirs.add('./' + dir.replace(/\\/g, '/'));
|
|
}
|
|
}
|
|
|
|
return Array.from(dirs).sort();
|
|
}
|
|
|
|
/**
|
|
* Count files in directory
|
|
*/
|
|
function countFiles(dirPath: string): number {
|
|
try {
|
|
const entries = readdirSync(dirPath, { withFileTypes: true });
|
|
return entries.filter(e => e.isFile()).length;
|
|
} catch (e) {
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get file types in directory
|
|
*/
|
|
function getFileTypes(dirPath: string): string[] {
|
|
const types = new Set<string>();
|
|
try {
|
|
const entries = readdirSync(dirPath, { withFileTypes: true });
|
|
entries.forEach(entry => {
|
|
if (entry.isFile()) {
|
|
const ext = extname(entry.name).slice(1);
|
|
if (ext) types.add(ext);
|
|
}
|
|
});
|
|
} catch (e) {
|
|
// Ignore
|
|
}
|
|
return Array.from(types);
|
|
}
|
|
|
|
// Tool schema for MCP
|
|
export const schema: ToolSchema = {
|
|
name: 'detect_changed_modules',
|
|
description: `Detect modules affected by git changes or recent file modifications.
|
|
Features:
|
|
- Git-aware: detects staged, unstaged, or last commit changes
|
|
- Fallback: finds files modified in last 24 hours
|
|
- Respects .gitignore patterns
|
|
|
|
Output formats: list, grouped, paths (default)`,
|
|
inputSchema: {
|
|
type: 'object',
|
|
properties: {
|
|
format: {
|
|
type: 'string',
|
|
enum: ['list', 'grouped', 'paths'],
|
|
description: 'Output format (default: paths)',
|
|
default: 'paths'
|
|
},
|
|
path: {
|
|
type: 'string',
|
|
description: 'Target directory path (default: current directory)',
|
|
default: '.'
|
|
}
|
|
},
|
|
required: []
|
|
}
|
|
};
|
|
|
|
// Handler function
|
|
export async function handler(params: Record<string, unknown>): Promise<ToolResult<ToolOutput>> {
|
|
const parsed = ParamsSchema.safeParse(params);
|
|
if (!parsed.success) {
|
|
return { success: false, error: `Invalid params: ${parsed.error.message}` };
|
|
}
|
|
|
|
const { format, path: targetPath } = parsed.data;
|
|
|
|
try {
|
|
const basePath = resolve(process.cwd(), targetPath);
|
|
|
|
if (!existsSync(basePath)) {
|
|
return { success: false, error: `Directory not found: ${basePath}` };
|
|
}
|
|
|
|
// Get changed files
|
|
let changedFiles: string[] = [];
|
|
let changeSource: 'git' | 'mtime' | 'none' = 'none';
|
|
|
|
if (isGitRepo(basePath)) {
|
|
changedFiles = getGitChangedFiles(basePath);
|
|
changeSource = changedFiles.length > 0 ? 'git' : 'none';
|
|
}
|
|
|
|
// Fallback to recently modified files
|
|
if (changedFiles.length === 0) {
|
|
changedFiles = findRecentlyModified(basePath);
|
|
changeSource = changedFiles.length > 0 ? 'mtime' : 'none';
|
|
}
|
|
|
|
// Extract affected directories
|
|
const affectedDirs = extractDirectories(changedFiles, basePath);
|
|
|
|
// Format output
|
|
let output: string;
|
|
const results: ModuleResult[] = [];
|
|
|
|
for (const dir of affectedDirs) {
|
|
const fullPath = dir === '.' ? basePath : resolve(basePath, dir);
|
|
if (!existsSync(fullPath) || !statSync(fullPath).isDirectory()) continue;
|
|
|
|
const fileCount = countFiles(fullPath);
|
|
const types = getFileTypes(fullPath);
|
|
const depth = dir === '.' ? 0 : (dir.match(/\//g) || []).length;
|
|
const hasClaude = existsSync(join(fullPath, 'CLAUDE.md'));
|
|
|
|
results.push({
|
|
depth,
|
|
path: dir,
|
|
files: fileCount,
|
|
types,
|
|
has_claude: hasClaude
|
|
});
|
|
}
|
|
|
|
switch (format) {
|
|
case 'list':
|
|
output = results.map(r =>
|
|
`depth:${r.depth}|path:${r.path}|files:${r.files}|types:[${r.types.join(',')}]|has_claude:${r.has_claude ? 'yes' : 'no'}|status:changed`
|
|
).join('\n');
|
|
break;
|
|
|
|
case 'grouped':
|
|
const maxDepth = results.length > 0 ? Math.max(...results.map(r => r.depth)) : 0;
|
|
const lines = ['Affected modules by changes:'];
|
|
|
|
for (let d = 0; d <= maxDepth; d++) {
|
|
const atDepth = results.filter(r => r.depth === d);
|
|
if (atDepth.length > 0) {
|
|
lines.push(` Depth ${d}:`);
|
|
atDepth.forEach(r => {
|
|
const claudeIndicator = r.has_claude ? ' [OK]' : '';
|
|
lines.push(` - ${r.path}${claudeIndicator} (changed)`);
|
|
});
|
|
}
|
|
}
|
|
|
|
if (results.length === 0) {
|
|
lines.push(' No recent changes detected');
|
|
}
|
|
|
|
output = lines.join('\n');
|
|
break;
|
|
|
|
case 'paths':
|
|
default:
|
|
output = affectedDirs.join('\n');
|
|
break;
|
|
}
|
|
|
|
return {
|
|
success: true,
|
|
result: {
|
|
format,
|
|
change_source: changeSource,
|
|
changed_files_count: changedFiles.length,
|
|
affected_modules_count: results.length,
|
|
results,
|
|
output
|
|
}
|
|
};
|
|
} catch (error) {
|
|
return {
|
|
success: false,
|
|
error: `Failed to detect changed modules: ${(error as Error).message}`
|
|
};
|
|
}
|
|
}
|