-
Notifications
You must be signed in to change notification settings - Fork 60
Commit changes without Sandbox deployment #314
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Commit changes without Sandbox deployment #314
Conversation
|
Thanks for the contribution! Before we can merge this, we need @aruntyagiTutu to sign the Salesforce Inc. Contributor License Agreement. |
| } | ||
|
|
||
| // Create commit | ||
| execFileSync('git', ['commit', '-m', commitMessage], { cwd: workingDir, encoding: 'utf8' }); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is this commitMesage the same tool parameter from commit_devops_center_work_item?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes. Commit message is passed via ['-m', commitMessage], so it won’t be treated as flags.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I meant that commitMessage as a tool param is populated by an LLM, so would this count as passing unsanitized LLM input to a shell exec call?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
update:
execFileSync is spawning the git bin and bypassing the shell middle step so we are fine here.
cristiand391
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
left a question about a possible insecure shell exec
What
Compute add/modify/delete via Git, handle deletes from HEAD, map to SDR, commit, return commit SHA with push instructions.
Why
Make committing independent of deployment and avoid manual git errors.
Tests
No-changes error; happy path with commit SHA.
Impact
No breaking changes.