claude-flow-novice 2.18.40 → 2.19.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/agents/SHARED_PROTOCOL.md +25 -1
- package/.claude/agents/cfn-dev-team/dev-ops/fly-io-specialist.md +418 -0
- package/.claude/agents/cfn-dev-team/developers/database/mem0-specialist.md +579 -0
- package/.claude/agents/cfn-dev-team/developers/database/memgraph-specialist.md +722 -0
- package/.claude/agents/cfn-dev-team/documentation/pseudocode.md +1 -1
- package/.claude/agents/cfn-dev-team/documentation/specification-agent.md +1 -1
- package/.claude/agents/cfn-dev-team/testers/tester.md +35 -0
- package/.claude/commands/{cfn-ruvector → cfn-codesearch}/cfn-codebase-reindex.md +4 -4
- package/.claude/commands/{cfn-ruvector → cfn-codesearch}/cfn-codebase-search.md +7 -7
- package/.claude/commands/{cfn-ruvector → cfn-codesearch}/cfn-detect-stale-docs.md +3 -3
- package/.claude/commands/{cfn-ruvector-search.md → cfn-codesearch-search.md} +7 -7
- package/.claude/commands/cfn-fix-errors.md +1 -1
- package/.claude/commands/cfn-loop-task.md +66 -2
- package/.claude/skills/{bulk-add-ruvector-instructions.sh → bulk-add-codesearch-instructions.sh} +12 -12
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/AGENT_INTEGRATION_PATTERNS.md +20 -20
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/AGENT_LIFECYCLE_INTEGRATION.md +11 -11
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/Cargo.toml +9 -4
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/EXTRACTION_EXAMPLES.md +6 -6
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/IMMEDIATE_ACTION_REQUIRED.md +9 -9
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/README.md +7 -7
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SCHEMA_V2_IMPLEMENTATION.md +1 -1
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SECURITY_IMPLEMENTATION.md +3 -3
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SECURITY_TESTING_COMPLETION.md +4 -4
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SKILL.md +31 -31
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/analyze-agent-failures.sh +11 -11
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/cfn-integration.sh +27 -27
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index-code.sh +11 -11
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index_all.sh +2 -2
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/ingest-agent-transcript.sh +10 -10
- package/.claude/skills/{cfn-local-ruvector-accelerator/init-local-ruvector.sh → cfn-codesearch/init-local-codesearch.sh} +16 -16
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/project-structure.md +10 -10
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/query-local.sh +6 -6
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/index.rs +233 -4
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/init.rs +18 -18
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/query.rs +64 -3
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/embeddings.rs +19 -5
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/lib.rs +6 -4
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/main.rs +35 -25
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/paths.rs +19 -13
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/query_v2.rs +3 -4
- package/.claude/skills/cfn-codesearch/src/store_pgvector.rs +301 -0
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/store_v2.rs +12 -1
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test-agent-lifecycle-integration.sh +6 -6
- package/.claude/skills/{cfn-local-ruvector-accelerator/test-local-ruvector.sh → cfn-codesearch/test-local-codesearch.sh} +7 -7
- package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test_query_api.sh +2 -2
- package/.claude/skills/cfn-epic-creator/SKILL.md +110 -2
- package/.claude/skills/cfn-epic-creator/invoke.sh +120 -1
- package/.claude/skills/cfn-mdap-context-injection/SKILL.md +2 -2
- package/.claude/skills/cfn-mdap-context-injection/inject.sh +21 -21
- package/package.json +11 -11
- package/readme/feature-status.md +405 -0
- package/.claude/agents/docker-ts-fixer.md +0 -65
- /package/.claude/agents/cfn-dev-team/{testing → testers}/test-validation-agent.md +0 -0
- /package/.claude/{agents/cfn-dev-team/utility → cfn-extras/agents}/context-curator.md +0 -0
- /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/cfn-docker-expert.md +0 -0
- /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/cfn-loops-cli-expert.md +0 -0
- /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/cfn-redis-operations.md +0 -0
- /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/cfn-system-expert.md +0 -0
- /package/.claude/{agents/csuite → cfn-extras/agents/custom-agents}/cto-agent.md +0 -0
- /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/trigger-dev-expert.md +0 -0
- /package/.claude/{agents/cfn-dev-team/coordinators → cfn-extras/agents/deprecated-coordinators}/consensus-builder.md +0 -0
- /package/.claude/{agents/cfn-dev-team/coordinators → cfn-extras/agents/deprecated-coordinators}/multi-sprint-coordinator.md +0 -0
- /package/.claude/{agents → cfn-extras/agents/docker-team}/docker-coordinators/cfn-docker-v3-coordinator.md +0 -0
- /package/.claude/{agents/cfn-dev-team/dev-ops → cfn-extras/agents}/kubernetes-specialist.md +0 -0
- /package/.claude/{agents/cfn-dev-team/architecture → cfn-extras/agents}/planner.md +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/.claude/hooks/SessionStart-cfn-build-ruvector.sh +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/Cargo.toml.backup +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SECURITY_FINDINGS_SUMMARY.txt +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/EXECUTIVE_SUMMARY.txt +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/PHASE_4_QUERY_API.md +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/RUST_AST_EXTRACTOR_IMPLEMENTATION.md +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/TRANSACTION_MANAGEMENT.md +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/VALIDATION_FINDINGS.txt +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/embeddings_manager.py.backup +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/epic-ast-indexer.json +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index/index.bin +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index/metadata.json +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index-code.sh.backup +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/query-agent-patterns.sh +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/requirements.txt +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/search_engine_v2.py.backup +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/sqlite_store.py.backup +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/cleanup.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/export.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/find.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/index_ast.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/index_modified.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/migration.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/mod.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/refs.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/reset.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/stats.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/mod.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/rust.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/rust_placeholder.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/text_fallback.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/typescript.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/typescript_full.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/main.rs.backup +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/migration.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/migration_backup.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/migration_tx.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/migration_v2.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/path_validator.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/query_api.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/schema_v2.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/search_engine.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/security_tests.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/sqlite_store.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/store_v2_backup.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/store_v2_fixed.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/store_v2_tx.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/test_schema.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/transaction_tests.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test_ast_indexing.rs +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test_schema.sql +0 -0
- /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test_schema_v2.sql +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
name: pseudocode
|
|
3
3
|
description: MUST BE USED for algorithm design, logic planning, code outline creation. Use PROACTIVELY for problem decomposition, planning. Keywords - pseudocode, algorithm, logic, planning
|
|
4
|
-
model:
|
|
4
|
+
model: opus
|
|
5
5
|
color: indigo
|
|
6
6
|
type: specialist
|
|
7
7
|
capabilities:
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
name: specification-agent
|
|
3
3
|
description: MUST BE USED when defining requirements, specifications, or problem analysis in SPARC methodology. Use PROACTIVELY for requirements gathering, constraint identification, acceptance criteria definition, scope analysis, stakeholder requirements, domain analysis, use case documentation.
|
|
4
4
|
type: specialist
|
|
5
|
-
model:
|
|
5
|
+
model: opus
|
|
6
6
|
capabilities:
|
|
7
7
|
- requirements_gathering
|
|
8
8
|
- constraint_analysis
|
|
@@ -29,6 +29,41 @@ validation_hooks:
|
|
|
29
29
|
|
|
30
30
|
# Comprehensive Tester Agent Profile
|
|
31
31
|
|
|
32
|
+
## ⚠️ TEST FRAMEWORK ALIGNMENT (MANDATORY)
|
|
33
|
+
|
|
34
|
+
**Before writing ANY tests, you MUST detect and align with the existing test framework.**
|
|
35
|
+
|
|
36
|
+
```bash
|
|
37
|
+
# Detect existing test framework
|
|
38
|
+
if grep -q "vitest" package.json 2>/dev/null; then
|
|
39
|
+
FRAMEWORK="vitest"
|
|
40
|
+
elif grep -q "jest" package.json 2>/dev/null; then
|
|
41
|
+
FRAMEWORK="jest"
|
|
42
|
+
elif ls *.test.ts *.spec.ts 2>/dev/null | head -1 | xargs grep -l "vitest\|vi\." 2>/dev/null; then
|
|
43
|
+
FRAMEWORK="vitest"
|
|
44
|
+
elif ls *.test.ts *.spec.ts 2>/dev/null | head -1 | xargs grep -l "jest\|expect(" 2>/dev/null; then
|
|
45
|
+
FRAMEWORK="jest"
|
|
46
|
+
fi
|
|
47
|
+
```
|
|
48
|
+
|
|
49
|
+
| Check | Action |
|
|
50
|
+
|-------|--------|
|
|
51
|
+
| `vitest` in package.json | Use vitest patterns: `vi.fn()`, `vi.mock()` |
|
|
52
|
+
| `jest` in package.json | Use jest patterns: `jest.fn()`, `jest.mock()` |
|
|
53
|
+
| Existing `*.test.ts` files | Match their import style exactly |
|
|
54
|
+
| `vitest.config.ts` exists | Use vitest |
|
|
55
|
+
| `jest.config.js` exists | Use jest |
|
|
56
|
+
|
|
57
|
+
**NEVER mix frameworks. If project uses vitest, do NOT import from jest. If project uses jest, do NOT import from vitest.**
|
|
58
|
+
|
|
59
|
+
**Common mistakes to avoid:**
|
|
60
|
+
- ❌ `import { jest } from '@jest/globals'` in a vitest project
|
|
61
|
+
- ❌ `import { vi } from 'vitest'` in a jest project
|
|
62
|
+
- ❌ Using `jest.fn()` when project uses `vi.fn()`
|
|
63
|
+
- ❌ Creating `jest.config.js` when `vitest.config.ts` exists
|
|
64
|
+
|
|
65
|
+
---
|
|
66
|
+
|
|
32
67
|
## Success Criteria Awareness (REQUIRED - Phase 2 TDD)
|
|
33
68
|
|
|
34
69
|
→ See: `.claude/skills/cfn-test-execution/SKILL.md` for test execution framework
|
|
@@ -17,7 +17,7 @@ Add `--force` flag for complete reindex:
|
|
|
17
17
|
- Major restructuring
|
|
18
18
|
- Index issues
|
|
19
19
|
|
|
20
|
-
**Log file:** `/tmp/
|
|
20
|
+
**Log file:** `/tmp/codesearch-index.log` - tail this for progress monitoring.
|
|
21
21
|
|
|
22
22
|
---
|
|
23
23
|
|
|
@@ -40,9 +40,9 @@ fi
|
|
|
40
40
|
echo "✅ OpenAI key: ${OPENAI_API_KEY:0:12}..."
|
|
41
41
|
|
|
42
42
|
# --- Setup ---
|
|
43
|
-
RUVECTOR_BIN="${HOME}/.local/bin/local-
|
|
44
|
-
[ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-
|
|
45
|
-
LOG_FILE="/tmp/
|
|
43
|
+
RUVECTOR_BIN="${HOME}/.local/bin/local-codesearch"
|
|
44
|
+
[ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-codesearch-accelerator/target/release/local-codesearch"
|
|
45
|
+
LOG_FILE="/tmp/codesearch-index.log"
|
|
46
46
|
|
|
47
47
|
echo "📝 Logging to: $LOG_FILE"
|
|
48
48
|
echo " Monitor with: tail -f $LOG_FILE"
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
---
|
|
2
|
-
description: Search codebase using
|
|
2
|
+
description: Search codebase using CodeSearch semantic index (400x faster than grep)
|
|
3
3
|
arguments:
|
|
4
4
|
query:
|
|
5
5
|
description: Natural language search query
|
|
@@ -11,12 +11,12 @@ arguments:
|
|
|
11
11
|
|
|
12
12
|
# Codebase Search Command
|
|
13
13
|
|
|
14
|
-
Search your indexed codebase using
|
|
14
|
+
Search your indexed codebase using CodeSearch. Uses SQLite index for fast lookups.
|
|
15
15
|
|
|
16
16
|
**Examples:**
|
|
17
|
-
- `/cfn-
|
|
18
|
-
- `/cfn-
|
|
19
|
-
- `/cfn-
|
|
17
|
+
- `/cfn-codesearch:cfn-codebase-search authentication logic`
|
|
18
|
+
- `/cfn-codesearch:cfn-codebase-search React components --top 20`
|
|
19
|
+
- `/cfn-codesearch:cfn-codebase-search database migration`
|
|
20
20
|
|
|
21
21
|
**Prerequisites:**
|
|
22
22
|
- Codebase must be indexed: `/cfn-codebase-reindex`
|
|
@@ -33,8 +33,8 @@ if [[ ! "$OPENAI_API_KEY" =~ ^sk- ]] && [[ -f ".env" ]]; then
|
|
|
33
33
|
fi
|
|
34
34
|
[[ ! "$OPENAI_API_KEY" =~ ^sk- ]] && { echo "❌ OPENAI_API_KEY invalid. Add to .env" >&2; exit 1; }
|
|
35
35
|
|
|
36
|
-
RUVECTOR_BIN="${HOME}/.local/bin/local-
|
|
37
|
-
[ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-
|
|
36
|
+
RUVECTOR_BIN="${HOME}/.local/bin/local-codesearch"
|
|
37
|
+
[ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-codesearch-accelerator/target/release/local-codesearch"
|
|
38
38
|
|
|
39
39
|
# Use threshold 0.1 for better results (default 0.3 is too strict)
|
|
40
40
|
"$RUVECTOR_BIN" query "{{query}}" --max-results {{#if top}}{{top}}{{else}}10{{/if}} --threshold 0.1
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
---
|
|
2
|
-
description: Detect stale and legacy documentation using
|
|
2
|
+
description: Detect stale and legacy documentation using CodeSearch semantic analysis
|
|
3
3
|
---
|
|
4
4
|
|
|
5
5
|
# Detect Stale Documentation
|
|
@@ -38,7 +38,7 @@ Analyzes all `.md` files in the codebase to detect legacy/outdated documentation
|
|
|
38
38
|
|
|
39
39
|
```bash
|
|
40
40
|
# Find docs older than 90 days with no recent code references
|
|
41
|
-
sqlite3 ~/.local/share/
|
|
41
|
+
sqlite3 ~/.local/share/codesearch/index_v2.db "
|
|
42
42
|
SELECT e.file_path, e.name,
|
|
43
43
|
datetime(e.created_at, 'unixepoch') as indexed_at
|
|
44
44
|
FROM entities e
|
|
@@ -48,7 +48,7 @@ WHERE e.file_path LIKE '%.md'
|
|
|
48
48
|
LIMIT 20;"
|
|
49
49
|
|
|
50
50
|
# Find orphan docs (no references)
|
|
51
|
-
sqlite3 ~/.local/share/
|
|
51
|
+
sqlite3 ~/.local/share/codesearch/index_v2.db "
|
|
52
52
|
SELECT DISTINCT e.file_path
|
|
53
53
|
FROM entities e
|
|
54
54
|
LEFT JOIN refs r ON e.id = r.source_entity_id OR e.id = r.target_entity_id
|
|
@@ -1,17 +1,17 @@
|
|
|
1
1
|
---
|
|
2
|
-
description: "Semantic code search with
|
|
2
|
+
description: "Semantic code search with CodeSearch (400x faster than grep)"
|
|
3
3
|
argument-hint: "<query>"
|
|
4
4
|
---
|
|
5
5
|
|
|
6
|
-
#
|
|
6
|
+
# CodeSearch Search
|
|
7
7
|
|
|
8
8
|
Quick semantic search through your indexed codebase.
|
|
9
9
|
|
|
10
10
|
## Usage
|
|
11
11
|
|
|
12
12
|
```
|
|
13
|
-
/cfn-
|
|
14
|
-
/cfn-
|
|
13
|
+
/cfn-codesearch-search "authentication middleware"
|
|
14
|
+
/cfn-codesearch-search "error handling pattern"
|
|
15
15
|
```
|
|
16
16
|
|
|
17
17
|
## What it does
|
|
@@ -23,14 +23,14 @@ Quick semantic search through your indexed codebase.
|
|
|
23
23
|
## Prerequisites
|
|
24
24
|
|
|
25
25
|
- Project must be indexed first
|
|
26
|
-
- Run: `./local-
|
|
26
|
+
- Run: `./local-codesearch index --path . --force`
|
|
27
27
|
|
|
28
28
|
---
|
|
29
29
|
|
|
30
30
|
Execute search:
|
|
31
31
|
|
|
32
32
|
```bash
|
|
33
|
-
RUVECTOR_BIN="${HOME}/.local/bin/local-
|
|
34
|
-
[ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-
|
|
33
|
+
RUVECTOR_BIN="${HOME}/.local/bin/local-codesearch"
|
|
34
|
+
[ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-codesearch-accelerator/target/release/local-codesearch"
|
|
35
35
|
"$RUVECTOR_BIN" query "$ARGUMENTS" --max-results 10
|
|
36
36
|
```
|
|
@@ -124,7 +124,7 @@ Task("typescript-specialist" /* or "rust-developer" */,
|
|
|
124
124
|
```typescript
|
|
125
125
|
Task("typescript-specialist" /* or "rust-developer" */,
|
|
126
126
|
`# FORBIDDEN: Do NOT run npx tsc, npm run typecheck, or cargo check
|
|
127
|
-
# Use
|
|
127
|
+
# Use codesearch skills in place of 'search' or 'find'
|
|
128
128
|
# REQUIRED: Use CFN hooks for validation
|
|
129
129
|
|
|
130
130
|
## MANDATORY WORKFLOW:
|
|
@@ -10,6 +10,47 @@ allowed-tools: ["Task", "TodoWrite", "Read", "Bash", "Grep", "Glob"]
|
|
|
10
10
|
|
|
11
11
|
---
|
|
12
12
|
|
|
13
|
+
## ⚡ AUTONOMOUS PROGRESSION (CRITICAL)
|
|
14
|
+
|
|
15
|
+
**DO NOT stop to ask questions. Keep progressing by launching agents for next steps.**
|
|
16
|
+
|
|
17
|
+
| Stop For | Keep Going For |
|
|
18
|
+
|----------|----------------|
|
|
19
|
+
| Major regression (tests went from passing to failing) | Minor test failures (iterate to fix) |
|
|
20
|
+
| Structural mismatch (wrong architecture/framework) | Missing files (create them) |
|
|
21
|
+
| Security vulnerability found | Code style issues |
|
|
22
|
+
| Corrupted state requiring manual recovery | Ambiguous implementation details |
|
|
23
|
+
| Unclear requirements (feedback for epic improvement) | |
|
|
24
|
+
|
|
25
|
+
**Rules:**
|
|
26
|
+
- If uncertain about approach, pick the simpler option and iterate
|
|
27
|
+
- Spawn agents to investigate unknowns instead of asking user
|
|
28
|
+
- Only escalate to user for irreversible decisions or access issues
|
|
29
|
+
- Test failures are expected - that's why we iterate
|
|
30
|
+
|
|
31
|
+
---
|
|
32
|
+
|
|
33
|
+
## 🎯 0/0 POLICY (EXIT CRITERIA)
|
|
34
|
+
|
|
35
|
+
**Before PROCEED decision, verify:**
|
|
36
|
+
|
|
37
|
+
| Metric | Requirement |
|
|
38
|
+
|--------|-------------|
|
|
39
|
+
| Compilation errors (scoped work) | **0** |
|
|
40
|
+
| Compilation errors (scoped tests) | **0** |
|
|
41
|
+
| Todos remaining (scoped work) | **0** |
|
|
42
|
+
|
|
43
|
+
```bash
|
|
44
|
+
# Verify 0/0 before PROCEED
|
|
45
|
+
npm run typecheck 2>&1 | grep -c "error" || echo "0" # Must be 0
|
|
46
|
+
npm run build 2>&1 | grep -c "error" || echo "0" # Must be 0
|
|
47
|
+
# Review TodoWrite - all scoped items must be completed
|
|
48
|
+
```
|
|
49
|
+
|
|
50
|
+
**If not 0/0:** ITERATE, do not PROCEED. Fix errors before next gate check.
|
|
51
|
+
|
|
52
|
+
---
|
|
53
|
+
|
|
13
54
|
## MANDATORY: Initialize State Tracking
|
|
14
55
|
|
|
15
56
|
**IMMEDIATELY create this todo list using TodoWrite:**
|
|
@@ -184,6 +225,7 @@ CONTEXT:
|
|
|
184
225
|
- Mode: ${MODE}
|
|
185
226
|
- Iteration: ${ITERATION}
|
|
186
227
|
- Gate pass rate: ${PASS_RATE}
|
|
228
|
+
- Epic file: ${EPIC_FILE_PATH} (if applicable)
|
|
187
229
|
|
|
188
230
|
VALIDATOR FEEDBACK:
|
|
189
231
|
${VALIDATOR_1_FEEDBACK}
|
|
@@ -194,6 +236,13 @@ YOUR RESPONSIBILITIES:
|
|
|
194
236
|
2. Classify each finding as IN-SCOPE or OUT-OF-SCOPE
|
|
195
237
|
3. OUT-OF-SCOPE items: Log for backlog, do NOT require iteration
|
|
196
238
|
4. IN-SCOPE items: Determine if they block PROCEED
|
|
239
|
+
5. **EPIC CONSISTENCY CHECK**: Identify naming/reference mismatches in epic document
|
|
240
|
+
|
|
241
|
+
EPIC CONSISTENCY CHECK:
|
|
242
|
+
- Compare implemented names (files, modules, functions) against epic references
|
|
243
|
+
- Flag mismatches (e.g., phase 1 creates "AuthService" but phase 3 references "AuthenticationService")
|
|
244
|
+
- If mismatches found: Update epic document to match implementation
|
|
245
|
+
- Document all corrections in epic_corrections field
|
|
197
246
|
|
|
198
247
|
DECISION CRITERIA:
|
|
199
248
|
- PROCEED: All in-scope requirements met, tests pass, no blocking issues
|
|
@@ -206,12 +255,17 @@ RETURN FORMAT:
|
|
|
206
255
|
"in_scope_findings": [...],
|
|
207
256
|
"out_of_scope_findings": [...],
|
|
208
257
|
"reasoning": "...",
|
|
209
|
-
"iteration_guidance": "..." (if ITERATE)
|
|
258
|
+
"iteration_guidance": "..." (if ITERATE),
|
|
259
|
+
"epic_corrections": [
|
|
260
|
+
{"location": "Phase 3, step 2", "was": "XY", "now": "X", "reason": "Match phase 1 implementation"}
|
|
261
|
+
]
|
|
210
262
|
}
|
|
211
263
|
|
|
212
264
|
AGENT_ID: product-owner-${TASK_ID}-iter${ITERATION}
|
|
213
265
|
```
|
|
214
266
|
|
|
267
|
+
**If epic_corrections returned:** Update the epic file to fix inconsistencies before next iteration.
|
|
268
|
+
|
|
215
269
|
**WAIT for Product Owner agent to return decision.**
|
|
216
270
|
|
|
217
271
|
**Handle Decision:**
|
|
@@ -276,6 +330,7 @@ Task(subagent_type="root-cause-analyst", prompt="Analyze repeated failures...")
|
|
|
276
330
|
- OUT-OF-SCOPE items go to backlog, don't block PROCEED
|
|
277
331
|
- Only IN-SCOPE issues can trigger ITERATE
|
|
278
332
|
- ABORT is rare (corruption, security, dead-end architecture)
|
|
333
|
+
- **Epic consistency**: Fixes naming mismatches between phases (e.g., "X" vs "XY")
|
|
279
334
|
|
|
280
335
|
---
|
|
281
336
|
|
|
@@ -286,10 +341,19 @@ Task(subagent_type="root-cause-analyst", prompt="Analyze repeated failures...")
|
|
|
286
341
|
- **DO NOT skip Product Owner** - Only PO can approve PROCEED
|
|
287
342
|
- **DO NOT iterate on out-of-scope items** - PO filters these to backlog
|
|
288
343
|
- **DO NOT stop on test failures** - That's what iteration fixes
|
|
344
|
+
- **DO NOT ask the user questions** - Make reasonable assumptions and iterate
|
|
289
345
|
- **DO update todos** - This tracks your state as coordinator
|
|
290
346
|
- **DO pass validator feedback to PO** - PO needs full context to decide
|
|
291
347
|
- **DO inject PO guidance into next iteration** - Use iteration_guidance from PO
|
|
348
|
+
- **DO spawn agents to investigate unknowns** - Instead of asking user
|
|
349
|
+
|
|
350
|
+
**When to escalate to user (ONLY these cases):**
|
|
351
|
+
- Access denied / permission errors
|
|
352
|
+
- Irreversible destructive action needed
|
|
353
|
+
- Major regression detected (tests were passing, now failing)
|
|
354
|
+
- Structural mismatch with existing codebase
|
|
355
|
+
- Unclear requirements (helps improve epic creation process)
|
|
292
356
|
|
|
293
357
|
---
|
|
294
358
|
|
|
295
|
-
**Version:** 2.
|
|
359
|
+
**Version:** 2.2.0 | **Date:** 2026-01-13 | Added 0/0 policy, epic consistency check, autonomous progression
|
package/.claude/skills/{bulk-add-ruvector-instructions.sh → bulk-add-codesearch-instructions.sh}
RENAMED
|
@@ -1,30 +1,30 @@
|
|
|
1
1
|
#!/bin/bash
|
|
2
2
|
set -eu
|
|
3
3
|
|
|
4
|
-
# Add
|
|
4
|
+
# Add CodeSearch instructions to all agent profiles with Post-Edit Pipeline
|
|
5
5
|
|
|
6
6
|
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
|
7
7
|
AGENT_DIR="${SCRIPT_DIR}/../agents/cfn-dev-team"
|
|
8
8
|
|
|
9
|
-
#
|
|
9
|
+
# CodeSearch instruction block to add
|
|
10
10
|
RUVECTOR_BLOCK='
|
|
11
|
-
# IMPORTANT:
|
|
11
|
+
# IMPORTANT: CodeSearch Semantic Search (Before Making Changes)
|
|
12
12
|
# Before implementing any changes, ALWAYS query the codebase for similar patterns:
|
|
13
13
|
# /codebase-search "relevant search terms for your task" --top 5
|
|
14
14
|
# /codebase-search "error pattern or issue you'\''re fixing" --top 3
|
|
15
15
|
# Also query past errors and learnings:
|
|
16
|
-
# ./.claude/skills/cfn-
|
|
17
|
-
# ./.claude/skills/cfn-
|
|
16
|
+
# ./.claude/skills/cfn-codesearch-codebase-index/query-error-patterns.sh --task-description "Your task description"
|
|
17
|
+
# ./.claude/skills/cfn-codesearch-codebase-index/query-learnings.sh --task-description "Your task description" --category PATTERN
|
|
18
18
|
# This prevents duplicated work and leverages existing solutions.'
|
|
19
19
|
|
|
20
20
|
# Function to add instructions after post-edit pipeline section
|
|
21
|
-
|
|
21
|
+
add_codesearch_instructions() {
|
|
22
22
|
local file="$1"
|
|
23
23
|
local temp_file=$(mktemp)
|
|
24
24
|
|
|
25
|
-
# Check if file already has
|
|
26
|
-
if grep -q "
|
|
27
|
-
echo "⚠️ $(basename "$file") already has
|
|
25
|
+
# Check if file already has CodeSearch instructions
|
|
26
|
+
if grep -q "CodeSearch Semantic Search" "$file"; then
|
|
27
|
+
echo "⚠️ $(basename "$file") already has CodeSearch instructions"
|
|
28
28
|
rm -f "$temp_file"
|
|
29
29
|
return 0
|
|
30
30
|
fi
|
|
@@ -41,7 +41,7 @@ add_ruvector_instructions() {
|
|
|
41
41
|
{print}
|
|
42
42
|
' "$file" > "$temp_file"
|
|
43
43
|
mv "$temp_file" "$file"
|
|
44
|
-
echo "✅ Added
|
|
44
|
+
echo "✅ Added CodeSearch to $(basename "$file")"
|
|
45
45
|
return 1
|
|
46
46
|
else
|
|
47
47
|
rm -f "$temp_file"
|
|
@@ -50,7 +50,7 @@ add_ruvector_instructions() {
|
|
|
50
50
|
}
|
|
51
51
|
|
|
52
52
|
# Process all agent files recursively
|
|
53
|
-
echo "🔄 Adding
|
|
53
|
+
echo "🔄 Adding CodeSearch instructions to agent profiles..."
|
|
54
54
|
echo ""
|
|
55
55
|
|
|
56
56
|
updated=0
|
|
@@ -64,7 +64,7 @@ while IFS= read -r -d '' agent_file; do
|
|
|
64
64
|
continue
|
|
65
65
|
fi
|
|
66
66
|
|
|
67
|
-
if
|
|
67
|
+
if add_codesearch_instructions "$agent_file"; then
|
|
68
68
|
((skipped++)) || true
|
|
69
69
|
else
|
|
70
70
|
((updated++)) || true
|
|
@@ -1,10 +1,10 @@
|
|
|
1
|
-
# Agent Integration Patterns for AST-Aware
|
|
1
|
+
# Agent Integration Patterns for AST-Aware CodeSearch
|
|
2
2
|
|
|
3
|
-
This document describes how agents can integrate with the AST-aware
|
|
3
|
+
This document describes how agents can integrate with the AST-aware CodeSearch indexer to achieve sub-50ms query performance for code intelligence tasks.
|
|
4
4
|
|
|
5
5
|
## Overview
|
|
6
6
|
|
|
7
|
-
The AST-Aware
|
|
7
|
+
The AST-Aware CodeSearch Accelerator provides:
|
|
8
8
|
- Entity-based indexing (functions, structs, traits, etc.)
|
|
9
9
|
- Reference tracking (calls, imports, type usage)
|
|
10
10
|
- Vector embeddings for semantic search
|
|
@@ -15,11 +15,11 @@ The AST-Aware RuVector Accelerator provides:
|
|
|
15
15
|
### 1. Agent Setup
|
|
16
16
|
|
|
17
17
|
```bash
|
|
18
|
-
# Initialize
|
|
19
|
-
./target/release/local-
|
|
18
|
+
# Initialize CodeSearch in the project
|
|
19
|
+
./target/release/local-codesearch init
|
|
20
20
|
|
|
21
21
|
# Index the codebase
|
|
22
|
-
./target/release/local-
|
|
22
|
+
./target/release/local-codesearch index --path . --types rs,ts,tsx,js,jsx --force
|
|
23
23
|
```
|
|
24
24
|
|
|
25
25
|
### 2. Query Patterns
|
|
@@ -28,7 +28,7 @@ The AST-Aware RuVector Accelerator provides:
|
|
|
28
28
|
|
|
29
29
|
```bash
|
|
30
30
|
# Find all functions that use the `Album` type
|
|
31
|
-
./target/release/local-
|
|
31
|
+
./target/release/local-codesearch find --kind function --uses-type Album
|
|
32
32
|
|
|
33
33
|
# Example SQL query behind the scenes:
|
|
34
34
|
SELECT e.* FROM entities e
|
|
@@ -40,10 +40,10 @@ WHERE e.kind = 'function' AND tu.type_name = 'Album';
|
|
|
40
40
|
|
|
41
41
|
```bash
|
|
42
42
|
# Find all functions that call `create_album`
|
|
43
|
-
./target/release/local-
|
|
43
|
+
./target/release/local-codesearch refs --target create_album --kind calls
|
|
44
44
|
|
|
45
45
|
# Exclude calls within the same module
|
|
46
|
-
./target/release/local-
|
|
46
|
+
./target/release/local-codesearch refs --target create_album --kind calls --exclude-module src/album/
|
|
47
47
|
|
|
48
48
|
# Example SQL query:
|
|
49
49
|
SELECT r.* FROM refs r
|
|
@@ -56,16 +56,16 @@ WHERE e.name = 'create_album' AND r.ref_kind = 'call'
|
|
|
56
56
|
|
|
57
57
|
```bash
|
|
58
58
|
# Step 1: Find all references to a function
|
|
59
|
-
./target/release/local-
|
|
59
|
+
./target/release/local-codesearch refs --target function_name
|
|
60
60
|
|
|
61
61
|
# Step 2: Find all implementations of a trait
|
|
62
|
-
./target/release/local-
|
|
62
|
+
./target/release/local-codesearch find --kind impl --implements Trait
|
|
63
63
|
|
|
64
64
|
# Step 3: Find types used in a module
|
|
65
|
-
./target/release/local-
|
|
65
|
+
./target/release/local-codesearch find --file-path src/module/ --kind struct
|
|
66
66
|
|
|
67
67
|
# Step 4: Verify no breaks after refactoring
|
|
68
|
-
./target/release/local-
|
|
68
|
+
./target/release/local-codesearch query "broken reference error" --threshold 0.9
|
|
69
69
|
```
|
|
70
70
|
|
|
71
71
|
### 3. Programmatic Integration
|
|
@@ -73,8 +73,8 @@ WHERE e.name = 'create_album' AND r.ref_kind = 'call'
|
|
|
73
73
|
Agents can integrate using the Rust API directly:
|
|
74
74
|
|
|
75
75
|
```rust
|
|
76
|
-
use
|
|
77
|
-
use
|
|
76
|
+
use local_codesearch::store_v2::StoreV2;
|
|
77
|
+
use local_codesearch::query_api::QueryEngine;
|
|
78
78
|
|
|
79
79
|
let store = StoreV2::new(&db_path)?;
|
|
80
80
|
let query_engine = QueryEngine::new(store);
|
|
@@ -238,18 +238,18 @@ Based on the current implementation:
|
|
|
238
238
|
|
|
239
239
|
```bash
|
|
240
240
|
# Check database health
|
|
241
|
-
./target/release/local-
|
|
241
|
+
./target/release/local-codesearch stats --detailed
|
|
242
242
|
|
|
243
243
|
# Rebuild index
|
|
244
|
-
./target/release/local-
|
|
244
|
+
./target/release/local-codesearch index --force
|
|
245
245
|
|
|
246
246
|
# Query optimization
|
|
247
|
-
sqlite3 .
|
|
247
|
+
sqlite3 .codesearch/index.db "EXPLAIN QUERY PLAN SELECT ..."
|
|
248
248
|
|
|
249
249
|
# Check embeddings
|
|
250
|
-
./target/release/local-
|
|
250
|
+
./target/release/local-codesearch query "test query" --format json
|
|
251
251
|
```
|
|
252
252
|
|
|
253
253
|
## Conclusion
|
|
254
254
|
|
|
255
|
-
The AST-Aware
|
|
255
|
+
The AST-Aware CodeSearch Accelerator provides a powerful foundation for agent-driven code intelligence. By leveraging entity-based indexing and structured queries, agents can achieve sub-50ms response times for complex code analysis tasks.
|
|
@@ -1,8 +1,8 @@
|
|
|
1
|
-
#
|
|
1
|
+
# CodeSearch Agent Lifecycle Integration
|
|
2
2
|
|
|
3
3
|
## Overview
|
|
4
4
|
|
|
5
|
-
The
|
|
5
|
+
The CodeSearch Agent Lifecycle Integration automatically captures and indexes agent execution data, enabling semantic search over historical agent decisions, tool usage patterns, and failure recovery strategies.
|
|
6
6
|
|
|
7
7
|
## Architecture
|
|
8
8
|
|
|
@@ -108,7 +108,7 @@ Search historical agent data for guidance on current tasks.
|
|
|
108
108
|
|
|
109
109
|
## Integration with cfn-subagent-stop.sh
|
|
110
110
|
|
|
111
|
-
The subagent stop hook automatically triggers
|
|
111
|
+
The subagent stop hook automatically triggers CodeSearch ingestion:
|
|
112
112
|
|
|
113
113
|
```bash
|
|
114
114
|
# cfn-subagent-stop.sh (excerpt)
|
|
@@ -121,8 +121,8 @@ if awk "BEGIN {exit !($AGENT_CONFIDENCE < 0.70)}"; then
|
|
|
121
121
|
AGENT_SUCCESS="false"
|
|
122
122
|
fi
|
|
123
123
|
|
|
124
|
-
# Call
|
|
125
|
-
./.claude/skills/cfn-local-
|
|
124
|
+
# Call CodeSearch ingestion
|
|
125
|
+
./.claude/skills/cfn-local-codesearch-accelerator/ingest-agent-transcript.sh \
|
|
126
126
|
--transcript "$TRANSCRIPT_ARCHIVE" \
|
|
127
127
|
--agent-id "$AGENT_ID" \
|
|
128
128
|
--agent-type "$AGENT_TYPE" \
|
|
@@ -283,9 +283,9 @@ sqlite3 "$DB_PATH" "DELETE FROM agent_failure_patterns WHERE occurrence_count <
|
|
|
283
283
|
|
|
284
284
|
### Log Management
|
|
285
285
|
|
|
286
|
-
|
|
287
|
-
- `.artifacts/logs/
|
|
288
|
-
- `.artifacts/logs/
|
|
286
|
+
CodeSearch ingestion logs are written to:
|
|
287
|
+
- `.artifacts/logs/codesearch-ingestion.log` - Transcript ingestion events
|
|
288
|
+
- `.artifacts/logs/codesearch-failure-analysis.log` - Failure pattern analysis
|
|
289
289
|
- `.artifacts/logs/subagent-lifecycle.log` - Hook execution logs
|
|
290
290
|
|
|
291
291
|
Rotate logs periodically:
|
|
@@ -305,14 +305,14 @@ tail -f .artifacts/logs/subagent-lifecycle.log
|
|
|
305
305
|
|
|
306
306
|
Verify script exists and is executable:
|
|
307
307
|
```bash
|
|
308
|
-
ls -l .claude/skills/cfn-local-
|
|
308
|
+
ls -l .claude/skills/cfn-local-codesearch-accelerator/ingest-agent-transcript.sh
|
|
309
309
|
```
|
|
310
310
|
|
|
311
311
|
### No patterns found
|
|
312
312
|
|
|
313
313
|
Run failure analysis manually:
|
|
314
314
|
```bash
|
|
315
|
-
./.claude/skills/cfn-local-
|
|
315
|
+
./.claude/skills/cfn-local-codesearch-accelerator/analyze-agent-failures.sh --days 30
|
|
316
316
|
```
|
|
317
317
|
|
|
318
318
|
Check database tables exist:
|
|
@@ -337,5 +337,5 @@ Run with broader query:
|
|
|
337
337
|
|
|
338
338
|
- Analysis document: `docs/RUVECTOR_INTEGRATION_ANALYSIS.md`
|
|
339
339
|
- Subagent hooks: `.claude/hooks/cfn-subagent-*.sh`
|
|
340
|
-
-
|
|
340
|
+
- CodeSearch accelerator: `.claude/skills/cfn-local-codesearch-accelerator/`
|
|
341
341
|
- Lifecycle database: `.claude/skills/cfn-redis-coordination/data/cfn-loop.db`
|
|
@@ -1,18 +1,23 @@
|
|
|
1
1
|
[package]
|
|
2
|
-
name = "
|
|
3
|
-
version = "0.
|
|
2
|
+
name = "codesearch"
|
|
3
|
+
version = "0.2.0"
|
|
4
4
|
edition = "2021"
|
|
5
5
|
|
|
6
6
|
[dependencies]
|
|
7
|
-
# Database
|
|
7
|
+
# Database - SQLite for metadata (entities, refs, fast SQL queries)
|
|
8
8
|
rusqlite = { version = "0.31", features = ["bundled", "vtab"] }
|
|
9
|
+
# Database - PostgreSQL/pgvector for embeddings (fast vector search)
|
|
10
|
+
tokio-postgres = { version = "0.7", features = ["with-chrono-0_4", "with-serde_json-1"] }
|
|
11
|
+
deadpool-postgres = { version = "0.12" }
|
|
12
|
+
# pgvector type support for postgres
|
|
13
|
+
pgvector = { version = "0.4", features = ["postgres"] }
|
|
9
14
|
# Vector operations
|
|
10
15
|
ndarray = { version = "0.15", features = ["rayon"], default-features = false }
|
|
11
16
|
# Serialization
|
|
12
17
|
serde = { version = "1.0", features = ["derive"] }
|
|
13
18
|
serde_json = "1.0"
|
|
14
19
|
# CLI
|
|
15
|
-
clap = { version = "4.4", features = ["derive"] }
|
|
20
|
+
clap = { version = "4.4", features = ["derive", "env"] }
|
|
16
21
|
anyhow = "1.0"
|
|
17
22
|
# File system
|
|
18
23
|
walkdir = "2.4"
|
package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/EXTRACTION_EXAMPLES.md
RENAMED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
#
|
|
1
|
+
# CodeSearch Extraction Examples
|
|
2
2
|
|
|
3
3
|
This document demonstrates what the TypeScript/JavaScript and text-based fallback extractors capture from different file types.
|
|
4
4
|
|
|
@@ -207,7 +207,7 @@ setup_environment
|
|
|
207
207
|
|
|
208
208
|
## Indexing Results
|
|
209
209
|
|
|
210
|
-
When you run `local-
|
|
210
|
+
When you run `local-codesearch index`, the system:
|
|
211
211
|
|
|
212
212
|
1. **Scans** all files in the project
|
|
213
213
|
2. **Routes** files to appropriate extractors based on extension
|
|
@@ -279,9 +279,9 @@ Complete project indexing (10,000 files): ~30-50 seconds depending on file types
|
|
|
279
279
|
|
|
280
280
|
After indexing:
|
|
281
281
|
|
|
282
|
-
1. **Query** using `local-
|
|
283
|
-
2. **Export** results using `local-
|
|
284
|
-
3. **Analyze** dependencies using `local-
|
|
285
|
-
4. **Monitor** with `local-
|
|
282
|
+
1. **Query** using `local-codesearch query`
|
|
283
|
+
2. **Export** results using `local-codesearch export`
|
|
284
|
+
3. **Analyze** dependencies using `local-codesearch refs`
|
|
285
|
+
4. **Monitor** with `local-codesearch stats`
|
|
286
286
|
|
|
287
287
|
See the main README for detailed usage instructions.
|