Agent Skills: /configure:all

Run all infrastructure standards checks and configure compliance

UncategorizedID: laurigates/claude-plugins/configure-all

Install this agent skill to your local

pnpm dlx add-skill https://github.com/laurigates/claude-plugins/tree/HEAD/configure-plugin/skills/configure-all

Skill Files

Browse the full folder contents for configure-all.

Download Skill

Loading file tree…

configure-plugin/skills/configure-all/SKILL.md

Skill Metadata

Name
configure-all
Description
Run all infrastructure standards checks and configure compliance

/configure:all

Run all infrastructure standards compliance checks.

When to Use This Skill

| Use this skill when... | Use another approach when... | |------------------------|------------------------------| | Performing comprehensive infrastructure audit | Checking single component (use specific /configure:X skill) | | Setting up new project with all standards | Project already has all standards configured | | CI/CD compliance validation | Need detailed status only (use /configure:status) | | Running initial configuration | Interactive component selection needed (use /configure:select) | | Batch-fixing all compliance issues with --fix | Manual review of each component preferred |

Context

  • Project standards: !find . -maxdepth 1 -name \'.project-standards.yaml\'
  • Project type indicators: !find . -maxdepth 1 \( -name 'package.json' -o -name 'pyproject.toml' -o -name 'Cargo.toml' -o -name '*.tf' \)
  • Infrastructure dirs: !find . -maxdepth 1 -type d \( -name 'terraform' -o -name 'helm' -o -name 'argocd' \)
  • Current standards version: !grep -m1 "^standards_version:" .project-standards.yaml

Parameters

Parse from command arguments:

  • --check-only: Report status without offering fixes (CI/CD mode)
  • --fix: Apply all fixes automatically without prompting
  • --type <type>: Override auto-detected project type (frontend, infrastructure, python)

Execution

Execute this comprehensive infrastructure standards compliance check:

Step 1: Detect project type

  1. Read .project-standards.yaml if it exists
  2. Auto-detect project type from file indicators:
    • infrastructure: Has terraform/, helm/, argocd/, or *.tf files
    • frontend: Has package.json with vue/react dependencies
    • python: Has pyproject.toml or requirements.txt
  3. Apply --type override if provided
  4. Report detected vs tracked type if different

Step 2: Run all checks

Execute each configure command in check-only mode using the SlashCommand tool:

/configure:makefile --check-only
/configure:pre-commit --check-only
/configure:release-please --check-only
/configure:dockerfile --check-only
/configure:container --check-only
/configure:skaffold --check-only
/configure:workflows --check-only
/configure:sentry --check-only
/configure:docs --check-only
/configure:github-pages --check-only
/configure:cache-busting --check-only
/configure:tests --check-only
/configure:coverage --check-only
/configure:memory-profiling --check-only
/configure:linting --check-only
/configure:formatting --check-only
/configure:dead-code --check-only
/configure:editor --check-only
/configure:security --check-only

Skip components that do not apply to the detected project type. For component applicability by project type, see REFERENCE.md.

Collect results from each check.

Step 3: Generate compliance report

Print a summary table with each component's status (PASS/WARN/FAIL), overall counts, and a list of issues to fix. For report format template, see REFERENCE.md.

Step 4: Apply fixes (if requested)

If --fix flag is set or user confirms:

  1. Run each failing configure command with --fix
  2. Report what was fixed and what requires manual intervention

Step 5: Update standards tracking

Create or update .project-standards.yaml with the current standards version, project type, timestamp, and component versions. For template, see REFERENCE.md.

Agentic Optimizations

| Context | Command | |---------|---------| | Quick compliance check (all components) | /configure:all --check-only | | Auto-fix all issues | /configure:all --fix | | Check standards file validity | test -f .project-standards.yaml && cat .project-standards.yaml \| head -10 | | List project type indicators | find . -maxdepth 1 \( -name 'package.json' -o -name 'pyproject.toml' -o -name 'Cargo.toml' \) -exec basename {} \; | | Count missing components | grep -c "status: missing" compliance-report.txt 2>/dev/null |

Flags

| Flag | Description | |------|-------------| | --check-only | Report status without offering fixes | | --fix | Apply all fixes automatically | | --type <type> | Override project type (frontend, infrastructure, python) |

Exit Codes (for CI)

| Code | Meaning | |------|---------| | 0 | All checks passed | | 1 | Warnings found (non-blocking) | | 2 | Failures found (blocking) |

Agent Teams (Optional)

For faster compliance checks on large projects, spawn teammates for parallel configuration checks:

| Teammate | Focus | Checks | |----------|-------|--------| | Linting teammate | Code quality configs | linting, formatting, dead-code, editor | | Security teammate | Security configs | security, pre-commit, container | | Testing teammate | Test infrastructure | tests, coverage, memory-profiling | | CI teammate | Deployment configs | workflows, release-please, dockerfile, skaffold |

This is optional -- the skill works sequentially without agent teams.

See Also

  • /configure:select - Interactively select which components to configure
  • /configure:status - Quick read-only status overview
  • /configure:pre-commit - Pre-commit specific checks
  • /configure:release-please - Release automation checks
  • /configure:dockerfile - Dockerfile configuration checks
  • /configure:container - Comprehensive container infrastructure
  • /configure:skaffold - Kubernetes development checks
  • /configure:workflows - GitHub Actions checks
  • /configure:sentry - Sentry error tracking checks
  • /configure:docs - Documentation standards and generators
  • /configure:github-pages - GitHub Pages deployment
  • /configure:cache-busting - Cache-busting strategies
  • /configure:tests - Testing framework setup
  • /configure:coverage - Code coverage configuration
  • /configure:memory-profiling - Memory profiling with pytest-memray
  • /configure:linting - Linter configuration
  • /configure:formatting - Code formatter setup
  • /configure:dead-code - Dead code detection
  • /configure:editor - Editor/IDE configuration
  • /configure:security - Security scanning