opencode-gws-multi-account
v0.3.2
Published
Multi-account management for the Google Workspace CLI (`gws`). Ships an opencode plugin (published to npm) and a Claude Code plugin (published via .claude-plugin marketplace).
Downloads
516
Readme
gws-multi-account
Multi-account management for gws, the Google Workspace CLI. Ships plugins for two coding agents out of one package:
- Claude Code — a PreToolUse hook that blocks bare
gwscalls, installed via the bundled marketplace. - opencode — a
tool.execute.beforehook and auto-registered skill, installed from npm.
Both plugins share the same parser.ts and the same SKILL.md. One source tree, two targets.
Why
The gws CLI reads GOOGLE_WORKSPACE_CLI_CONFIG_DIR to pick which account's credentials to use. The simplest way to juggle multiple accounts is to put each account's credentials in its own subdirectory and point the env var at the right one:
GOOGLE_WORKSPACE_CLI_CONFIG_DIR=~/.config/gws/[email protected] gws auth login
GOOGLE_WORKSPACE_CLI_CONFIG_DIR=~/.config/gws/[email protected] gws auth loginThat gives you a per-account layout:
~/.config/gws/
├── [email protected]/
│ ├── client_secret.json
│ ├── credentials.enc
│ └── token_cache.json
└── [email protected]/
├── client_secret.json
├── credentials.enc
└── token_cache.jsonAnd from then on, every call names its account explicitly:
GOOGLE_WORKSPACE_CLI_CONFIG_DIR=~/.config/gws/[email protected] gws gmail ...
GOOGLE_WORKSPACE_CLI_CONFIG_DIR=~/.config/gws/[email protected] gws gmail ...This works — but it's easy for an agent to forget the prefix, and when it does, gws silently falls back to the default account and writes to the wrong inbox / calendar / drive. This package is the guardrail: a hook that inspects every gws invocation and blocks any call missing the env var with an explanatory message the agent can act on. The layout above becomes a contract; the agent picks the account from ~/.config/gws/accounts.json and the hook makes sure it actually did.
It also blocks a second footgun: foreground gws auth login. That command starts an interactive OAuth callback server and blocks until a browser redirect completes; the agent shell's ~60s command timeout kills it mid-flow and leaves the user with a dead URL. The hook catches this and points the agent at the background-spawn flow in references/auth-login.md. Legitimate background spawns (... gws auth login ... & or nohup gws auth login ... &) pass through unchanged.
See skills/gws-multi-account/SKILL.md for the full layout contract.
Install
Claude Code
/plugin marketplace add indentcorp/gws-multi-account
/plugin install gws-multi-account@gws-multi-accountopencode
Add to your opencode.json:
{
"$schema": "https://opencode.ai/config.json",
"plugin": ["opencode-gws-multi-account"]
}On first run the plugin registers its bundled skill by appending the path to skills.paths in your config (idempotent, JSONC-safe). Restart opencode once after the first install to pick up the skill.
Platform support
- macOS, Linux — both plugins work out of the box. The Claude hook runs under Node (bundled with Claude Code), the opencode plugin runs under Bun (bundled with opencode). No shell dependencies.
- Windows — the opencode plugin works. The Claude Code plugin is currently blocked by an upstream Claude Code bug (anthropics/claude-code#32486):
${CLAUDE_PLUGIN_ROOT}inhooks.jsonis not expanded on Windows, so the hook path never resolves. The plugin logic (parser, hook entry, skill registration) is cross-platform — the blocker is variable interpolation inside Claude Code itself, not in this package. The opencode plugin uses a different hook mechanism and is unaffected.
CI runs the full pipeline on Ubuntu, macOS, and Windows.
How it works
Both plugins funnel every Bash-style command through the same enforcement function before the agent is allowed to run it.
- Intercept the command. On Claude Code,
hooks/hooks.jsonregistershook.jsas aPreToolUsehook matching theBashtool; the hook receives the tool payload on stdin. On opencode,plugin.tsregisters atool.execute.beforecallback that fires for thebashtool with the resolved command args. Non-Bash tools and empty commands short-circuit immediately. - Split into segments.
parser.tssplits the command on shell control operators (;,&&,||,|,&) and evaluates each segment independently. This is whycd foo && gws …requires the env var on thegwssegment — thecdsegment is irrelevant. - Find the real command word. Within a segment, the parser walks past transparent prefixes:
NAME=VALUEassignments and theenvbuiltin. The first bare word is the actual command. If it isn'tgws(word-boundary match, somy_gws_wrapperandgwsfoodon't trigger), the segment passes. - Check for foreground
gws auth login. If the next two non-flag positional args areauththenlogin, and the segment was not backgrounded (trailing&at the original split point), it's a violation regardless of whether the env var is set — the env var doesn't help when the real problem is the interactive callback server getting killed by the agent's command timeout.gws auth status,gws auth logout,gws auth setup, and background-spawnedgws auth login ... &all pass. - Check for the env var. If any prefix assignment sets
GOOGLE_WORKSPACE_CLI_CONFIG_DIR, the segment passes. Otherwise it's a violation. - Block with an actionable message. Claude's hook writes a
PreToolUsedeny JSON to stdout (permissionDecision: "deny") with the exact offending segment and a fix hint. opencode's hook throws with the same message, which opencode surfaces to the agent. Both messages point at~/.config/gws/accounts.jsonso the agent can pick the right account and retry; the auth-login message additionally points at the skill's background-spawn reference. - Fail open on crash. If the parser itself throws, the Claude hook logs to stderr and exits 0 rather than bricking the user's Bash. The opencode hook inherits opencode's error surface but never swallows the user's command silently.
On opencode startup there's a second, independent flow: the plugin resolves its bundled skills/ directory (../../skills relative to dist/opencode/plugin.js) and appends it to skills.paths in the first writable opencode.json / opencode.jsonc it finds (project, then ~/.config/opencode/). Writes are atomic (temp file + rename) and idempotent. If the target is .jsonc with real JSONC features (comments, trailing commas), the plugin refuses to rewrite it and prints the path for manual editing — round-tripping through JSON.parse / JSON.stringify would silently strip those features. Set OPENCODE_GWS_SKIP_SKILL_REGISTRATION=1 to disable this step.
Layout
.
├── .claude-plugin/ Claude Code plugin + marketplace manifest
│ ├── marketplace.json
│ └── plugin.json
├── hooks/ Pre-built Claude hook (committed; marketplace clones from GitHub)
│ ├── hook.js Built output of src/claude/hook.ts
│ └── hooks.json
├── skills/
│ └── gws-multi-account/
│ ├── SKILL.md Canonical skill, shipped to both hosts
│ └── references/
│ └── auth-login.md OAuth background-spawn flow
├── src/
│ ├── parser.ts Shared enforcement logic (findViolation, buildDenyMessage)
│ ├── claude/
│ │ └── hook.ts Claude Code PreToolUse entry (stdin/stdout deny JSON)
│ └── opencode/
│ ├── plugin.ts opencode plugin entry (tool.execute.before hook)
│ └── skill-registration.ts
├── tests/
│ └── hook.test.ts bun test — parser, entries, registration, auth-login detection
├── build.ts One script, two targets (dist/opencode + hooks/)
├── package.json Published to npm as opencode-gws-multi-account
├── tsconfig.json
├── .oxlintrc.json
└── .oxfmtrc.jsonDevelop
bun install
bun run build # produces dist/opencode/plugin.js and hooks/hook.js
bun run test
bun run typecheck
bun run lint
bun run format # writes
bun run format:checkBuild outputs
hooks/hook.jsis committed to git. Claude Code's marketplace installer clones from GitHub and cannot runbun build, so the pre-built hook must be present in the tree.dist/is gitignored. opencode users install from npm, whereprepublishOnlyruns the build andfilesships onlydist/,skills/,hooks/, and.claude-plugin/.
After editing src/, run bun run build before committing so hooks/hook.js stays in sync. CI runs the full pipeline on every push/PR (bun run lint, format:check, typecheck, test) and then verifies no drift via git diff --exit-code hooks/ — so if you forget to rebuild, the check fails with a clear message.
Design notes
- Per-segment parsing — commands split on
;,&&,||,|,&socd foo && gws …is evaluated as two segments; the env-var must live on thegwssegment. - Background-aware split — the split preserves which separator produced each segment, so a segment terminated by a bare
&is marked backgrounded. Thegws auth logincheck skips backgrounded segments; the env-var check does not (forgetting the env var is wrong in any mode). - Transparent prefixes —
NAME=VALUEassignments and theenvbuiltin are walked over to find the real command word. Wrappers likenohup,setsid, andtimeoutare not walked — they become the command word, so thegws auth logincheck naturally skips them (wrapping innohupis exactly how you background-spawn). - Word boundaries —
gwsmust be a standalone word (regex(^|\s|=)gws(\s|$));my_gws_wrapperandgwsfoodon't trigger. - Positional-arg matching — the
gws auth logincheck walks positional args (skipping flags) instead of substring-matching, so a file argument likesome-auth-login.pdfor an unrelated subcommand likegws auth something-else-loginnever trips it. - Fail open on crash — a parser exception logs to stderr and exits 0 rather than blocking the user's Bash.
- JSONC-safe config writes — when the opencode plugin detects comments or trailing commas in
opencode.jsonc, it refuses to rewrite the file and prints the path for the user to paste manually.
License
MIT
