sfdx-hardis 6.17.2-alpha202512261823.0 → 6.18.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/oclif.manifest.json +787 -787
- package/package.json +1 -1
package/oclif.manifest.json
CHANGED
|
@@ -57,12 +57,13 @@
|
|
|
57
57
|
"world:hello"
|
|
58
58
|
]
|
|
59
59
|
},
|
|
60
|
-
"hardis:
|
|
60
|
+
"hardis:auth:login": {
|
|
61
61
|
"aliases": [],
|
|
62
62
|
"args": {},
|
|
63
|
-
"description": "\n## Command Behavior\n\n**
|
|
63
|
+
"description": "\n## Command Behavior\n\n**Authenticates to a Salesforce org, primarily designed for CI/CD workflows.**\n\nThis command facilitates secure and automated logins to Salesforce organizations within continuous integration and continuous delivery pipelines. It leverages pre-configured authentication details, ensuring that CI/CD processes can interact with Salesforce without manual intervention.\n\nKey aspects:\n\n- **Configuration-Driven:** It relies on authentication variables and files set up by dedicated configuration commands:\n - For CI/CD repositories: [Configure Org CI Authentication](https://sfdx-hardis.cloudity.com/hardis/project/configure/auth/)\n - For Monitoring repositories: [Configure Org Monitoring](https://sfdx-hardis.cloudity.com/hardis/org/configure/monitoring/)\n- **Technical Org Support:** Supports authentication to a 'technical org' (e.g., for calling Agentforce from another org) by utilizing the `SFDX_AUTH_URL_TECHNICAL_ORG` environment variable. If this variable is set, the command authenticates to this org with the alias `TECHNICAL_ORG`.\n\nTo obtain the `SFDX_AUTH_URL_TECHNICAL_ORG` value, you can run `sf org display --verbose --json` and copy the `sfdxAuthUrl` field from the output.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical flow involves:\n\n- **Flag Parsing:** It parses command-line flags such as `instanceurl`, `devhub`, `scratchorg`, and `debug` to determine the authentication context.\n- **Authentication Hook:** It triggers an internal authentication hook (`this.config.runHook('auth', ...`)) which is responsible for executing the actual authentication logic based on the provided flags (e.g., whether it's a Dev Hub or a scratch org).\n- **Environment Variable Check:** It checks for the presence of `SFDX_AUTH_URL_TECHNICAL_ORG` or `TECHNICAL_ORG_ALIAS` environment variables.\n- **`authOrg` Utility:** If a technical org is configured, it calls the `authOrg` utility function to perform the authentication for that specific org, ensuring it's connected and available for subsequent operations.\n- **Salesforce CLI Integration:** It integrates with the Salesforce CLI's authentication mechanisms to establish and manage org connections.\n</details>\n",
|
|
64
64
|
"examples": [
|
|
65
|
-
"$ sf hardis:
|
|
65
|
+
"$ sf hardis:auth:login",
|
|
66
|
+
"CI=true CI_COMMIT_REF_NAME=monitoring_myclient sf hardis:auth:login"
|
|
66
67
|
],
|
|
67
68
|
"flags": {
|
|
68
69
|
"json": {
|
|
@@ -80,6 +81,28 @@
|
|
|
80
81
|
"multiple": false,
|
|
81
82
|
"type": "option"
|
|
82
83
|
},
|
|
84
|
+
"instanceurl": {
|
|
85
|
+
"char": "r",
|
|
86
|
+
"description": "URL of org instance",
|
|
87
|
+
"name": "instanceurl",
|
|
88
|
+
"hasDynamicHelp": false,
|
|
89
|
+
"multiple": false,
|
|
90
|
+
"type": "option"
|
|
91
|
+
},
|
|
92
|
+
"devhub": {
|
|
93
|
+
"char": "h",
|
|
94
|
+
"description": "Also connect associated DevHub",
|
|
95
|
+
"name": "devhub",
|
|
96
|
+
"allowNo": false,
|
|
97
|
+
"type": "boolean"
|
|
98
|
+
},
|
|
99
|
+
"scratchorg": {
|
|
100
|
+
"char": "s",
|
|
101
|
+
"description": "Scratch org",
|
|
102
|
+
"name": "scratchorg",
|
|
103
|
+
"allowNo": false,
|
|
104
|
+
"type": "boolean"
|
|
105
|
+
},
|
|
83
106
|
"debug": {
|
|
84
107
|
"char": "d",
|
|
85
108
|
"description": "Activate debug mode (more logs)",
|
|
@@ -103,42 +126,38 @@
|
|
|
103
126
|
},
|
|
104
127
|
"hasDynamicHelp": false,
|
|
105
128
|
"hiddenAliases": [],
|
|
106
|
-
"id": "hardis:
|
|
129
|
+
"id": "hardis:auth:login",
|
|
107
130
|
"pluginAlias": "sfdx-hardis",
|
|
108
131
|
"pluginName": "sfdx-hardis",
|
|
109
132
|
"pluginType": "core",
|
|
110
133
|
"strict": true,
|
|
111
134
|
"enableJsonFlag": true,
|
|
112
|
-
"title": "
|
|
113
|
-
"uiConfig": {
|
|
114
|
-
"hide": true
|
|
115
|
-
},
|
|
135
|
+
"title": "Login",
|
|
116
136
|
"requiresProject": false,
|
|
117
137
|
"isESM": true,
|
|
118
138
|
"relativePath": [
|
|
119
139
|
"lib",
|
|
120
140
|
"commands",
|
|
121
141
|
"hardis",
|
|
122
|
-
"
|
|
123
|
-
"
|
|
142
|
+
"auth",
|
|
143
|
+
"login.js"
|
|
124
144
|
],
|
|
125
145
|
"aliasPermutations": [],
|
|
126
146
|
"permutations": [
|
|
127
|
-
"hardis:
|
|
128
|
-
"
|
|
129
|
-
"
|
|
130
|
-
"hardis:
|
|
131
|
-
"
|
|
132
|
-
"
|
|
147
|
+
"hardis:auth:login",
|
|
148
|
+
"auth:hardis:login",
|
|
149
|
+
"auth:login:hardis",
|
|
150
|
+
"hardis:login:auth",
|
|
151
|
+
"login:hardis:auth",
|
|
152
|
+
"login:auth:hardis"
|
|
133
153
|
]
|
|
134
154
|
},
|
|
135
|
-
"hardis:
|
|
155
|
+
"hardis:cache:clear": {
|
|
136
156
|
"aliases": [],
|
|
137
157
|
"args": {},
|
|
138
|
-
"description": "\n## Command Behavior\n\n**
|
|
158
|
+
"description": "\n## Command Behavior\n\n**Clears the local cache generated by the sfdx-hardis plugin.**\n\nThis command is designed to remove temporary files, stored configurations, and other cached data that sfdx-hardis uses to optimize its operations. Clearing the cache can be beneficial for:\n\n- **Troubleshooting:** Resolving unexpected behavior or inconsistencies.\n- **Disk Space Management:** Freeing up storage on your local machine.\n- **Ensuring Fresh Data:** Guaranteeing that the plugin operates with the most current data and configurations.\n\n## Technical explanations\n\nThe command's technical implementation is straightforward:\n\n- **Direct Function Call:** It directly invokes the `clearCache()` function, which is imported from \buri../../../common/cache/index.js\buri.\n- **Cache Management Logic:** The \buriclearCache()` function encapsulates the logic for identifying and removing the specific files and directories that constitute the sfdx-hardis cache.\n",
|
|
139
159
|
"examples": [
|
|
140
|
-
"$ sf hardis:
|
|
141
|
-
"CI=true CI_COMMIT_REF_NAME=monitoring_myclient sf hardis:auth:login"
|
|
160
|
+
"$ sf hardis:cache:clear"
|
|
142
161
|
],
|
|
143
162
|
"flags": {
|
|
144
163
|
"json": {
|
|
@@ -156,28 +175,6 @@
|
|
|
156
175
|
"multiple": false,
|
|
157
176
|
"type": "option"
|
|
158
177
|
},
|
|
159
|
-
"instanceurl": {
|
|
160
|
-
"char": "r",
|
|
161
|
-
"description": "URL of org instance",
|
|
162
|
-
"name": "instanceurl",
|
|
163
|
-
"hasDynamicHelp": false,
|
|
164
|
-
"multiple": false,
|
|
165
|
-
"type": "option"
|
|
166
|
-
},
|
|
167
|
-
"devhub": {
|
|
168
|
-
"char": "h",
|
|
169
|
-
"description": "Also connect associated DevHub",
|
|
170
|
-
"name": "devhub",
|
|
171
|
-
"allowNo": false,
|
|
172
|
-
"type": "boolean"
|
|
173
|
-
},
|
|
174
|
-
"scratchorg": {
|
|
175
|
-
"char": "s",
|
|
176
|
-
"description": "Scratch org",
|
|
177
|
-
"name": "scratchorg",
|
|
178
|
-
"allowNo": false,
|
|
179
|
-
"type": "boolean"
|
|
180
|
-
},
|
|
181
178
|
"debug": {
|
|
182
179
|
"char": "d",
|
|
183
180
|
"description": "Activate debug mode (more logs)",
|
|
@@ -201,30 +198,33 @@
|
|
|
201
198
|
},
|
|
202
199
|
"hasDynamicHelp": false,
|
|
203
200
|
"hiddenAliases": [],
|
|
204
|
-
"id": "hardis:
|
|
201
|
+
"id": "hardis:cache:clear",
|
|
205
202
|
"pluginAlias": "sfdx-hardis",
|
|
206
203
|
"pluginName": "sfdx-hardis",
|
|
207
204
|
"pluginType": "core",
|
|
208
205
|
"strict": true,
|
|
209
206
|
"enableJsonFlag": true,
|
|
210
|
-
"title": "
|
|
207
|
+
"title": "Clear sfdx-hardis cache",
|
|
208
|
+
"uiConfig": {
|
|
209
|
+
"hide": true
|
|
210
|
+
},
|
|
211
211
|
"requiresProject": false,
|
|
212
212
|
"isESM": true,
|
|
213
213
|
"relativePath": [
|
|
214
214
|
"lib",
|
|
215
215
|
"commands",
|
|
216
216
|
"hardis",
|
|
217
|
-
"
|
|
218
|
-
"
|
|
217
|
+
"cache",
|
|
218
|
+
"clear.js"
|
|
219
219
|
],
|
|
220
220
|
"aliasPermutations": [],
|
|
221
221
|
"permutations": [
|
|
222
|
-
"hardis:
|
|
223
|
-
"
|
|
224
|
-
"
|
|
225
|
-
"hardis:
|
|
226
|
-
"
|
|
227
|
-
"
|
|
222
|
+
"hardis:cache:clear",
|
|
223
|
+
"cache:hardis:clear",
|
|
224
|
+
"cache:clear:hardis",
|
|
225
|
+
"hardis:clear:cache",
|
|
226
|
+
"clear:hardis:cache",
|
|
227
|
+
"clear:cache:hardis"
|
|
228
228
|
]
|
|
229
229
|
},
|
|
230
230
|
"hardis:config:get": {
|
|
@@ -5924,121 +5924,6 @@
|
|
|
5924
5924
|
"import:data:org:hardis"
|
|
5925
5925
|
]
|
|
5926
5926
|
},
|
|
5927
|
-
"hardis:org:fix:listviewmine": {
|
|
5928
|
-
"aliases": [],
|
|
5929
|
-
"args": {},
|
|
5930
|
-
"description": "Fix listviews whose scope Mine has been replaced by Everything\n\n[](https://nicolas.vuillamy.fr/invalid-scope-mine-not-allowed-deploy-your-listviews-anyway-443aceca8ac7)\n\nList of ListViews can be:\n\n- read from .sfdx-hardis.yml file in property **listViewsToSetToMine**\n- sent in argument listviews\n\nNote: property **listViewsToSetToMine** can be auto-generated by command hardis:work:save if .sfdx-hardis.yml contains the following configuration\n\n```yaml\nautoCleanTypes:\n - listViewsMine\n```\n\n- Example of sfdx-hardis.yml property `listViewsToSetToMine`:\n\n```yaml\nlistViewsToSetToMine:\n - \"force-app/main/default/objects/Operation__c/listViews/MyCurrentOperations.listView-meta.xml\"\n - \"force-app/main/default/objects/Operation__c/listViews/MyFinalizedOperations.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/Default_Opportunity_Pipeline.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/MyCurrentSubscriptions.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/MySubscriptions.listView-meta.xml\"\n - \"force-app/main/default/objects/Account/listViews/MyActivePartners.listView-meta.xml\"\n```\n\n- If manually written, this could also be:\n\n```yaml\nlistViewsToSetToMine:\n - \"Operation__c:MyCurrentOperations\"\n - \"Operation__c:MyFinalizedOperations\"\n - \"Opportunity:Default_Opportunity_Pipeline\"\n - \"Opportunity:MyCurrentSubscriptions\"\n - \"Opportunity:MySubscriptions\"\n - \"Account:MyActivePartners\"\n```\n\nTroubleshooting: if you need to run this command from an alpine-linux based docker image, use this workaround in your dockerfile:\n\n```dockerfile\n# Do not use puppeteer embedded chromium\nRUN apk add --update --no-cache chromium\nENV PUPPETEER_SKIP_CHROMIUM_DOWNLOAD=\"true\"\nENV CHROMIUM_PATH=\"/usr/bin/chromium-browser\"\nENV PUPPETEER_EXECUTABLE_PATH=\"$\\{CHROMIUM_PATH}\" // remove \\ before {\n```\n",
|
|
5931
|
-
"examples": [
|
|
5932
|
-
"$ sf hardis:org:fix:listviewmine",
|
|
5933
|
-
"$ sf hardis:org:fix:listviewmine --listviews Opportunity:MySubscriptions,Account:MyActivePartners"
|
|
5934
|
-
],
|
|
5935
|
-
"flags": {
|
|
5936
|
-
"json": {
|
|
5937
|
-
"description": "Format output as json.",
|
|
5938
|
-
"helpGroup": "GLOBAL",
|
|
5939
|
-
"name": "json",
|
|
5940
|
-
"allowNo": false,
|
|
5941
|
-
"type": "boolean"
|
|
5942
|
-
},
|
|
5943
|
-
"flags-dir": {
|
|
5944
|
-
"helpGroup": "GLOBAL",
|
|
5945
|
-
"name": "flags-dir",
|
|
5946
|
-
"summary": "Import flag values from a directory.",
|
|
5947
|
-
"hasDynamicHelp": false,
|
|
5948
|
-
"multiple": false,
|
|
5949
|
-
"type": "option"
|
|
5950
|
-
},
|
|
5951
|
-
"listviews": {
|
|
5952
|
-
"char": "l",
|
|
5953
|
-
"description": "Comma-separated list of listviews following format Object:ListViewName\nExample: Contact:MyContacts,Contact:MyActiveContacts,Opportunity:MYClosedOpportunities",
|
|
5954
|
-
"name": "listviews",
|
|
5955
|
-
"hasDynamicHelp": false,
|
|
5956
|
-
"multiple": false,
|
|
5957
|
-
"type": "option"
|
|
5958
|
-
},
|
|
5959
|
-
"debug": {
|
|
5960
|
-
"char": "d",
|
|
5961
|
-
"description": "Activate debug mode (more logs)",
|
|
5962
|
-
"name": "debug",
|
|
5963
|
-
"allowNo": false,
|
|
5964
|
-
"type": "boolean"
|
|
5965
|
-
},
|
|
5966
|
-
"websocket": {
|
|
5967
|
-
"description": "Websocket host:port for VsCode SFDX Hardis UI integration",
|
|
5968
|
-
"name": "websocket",
|
|
5969
|
-
"hasDynamicHelp": false,
|
|
5970
|
-
"multiple": false,
|
|
5971
|
-
"type": "option"
|
|
5972
|
-
},
|
|
5973
|
-
"skipauth": {
|
|
5974
|
-
"description": "Skip authentication check when a default username is required",
|
|
5975
|
-
"name": "skipauth",
|
|
5976
|
-
"allowNo": false,
|
|
5977
|
-
"type": "boolean"
|
|
5978
|
-
},
|
|
5979
|
-
"target-org": {
|
|
5980
|
-
"aliases": [
|
|
5981
|
-
"targetusername",
|
|
5982
|
-
"u"
|
|
5983
|
-
],
|
|
5984
|
-
"char": "o",
|
|
5985
|
-
"deprecateAliases": true,
|
|
5986
|
-
"name": "target-org",
|
|
5987
|
-
"noCacheDefault": true,
|
|
5988
|
-
"required": true,
|
|
5989
|
-
"summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
|
|
5990
|
-
"hasDynamicHelp": true,
|
|
5991
|
-
"multiple": false,
|
|
5992
|
-
"type": "option"
|
|
5993
|
-
}
|
|
5994
|
-
},
|
|
5995
|
-
"hasDynamicHelp": true,
|
|
5996
|
-
"hiddenAliases": [],
|
|
5997
|
-
"id": "hardis:org:fix:listviewmine",
|
|
5998
|
-
"pluginAlias": "sfdx-hardis",
|
|
5999
|
-
"pluginName": "sfdx-hardis",
|
|
6000
|
-
"pluginType": "core",
|
|
6001
|
-
"strict": true,
|
|
6002
|
-
"enableJsonFlag": true,
|
|
6003
|
-
"title": "Fix listviews with ",
|
|
6004
|
-
"requiresProject": true,
|
|
6005
|
-
"isESM": true,
|
|
6006
|
-
"relativePath": [
|
|
6007
|
-
"lib",
|
|
6008
|
-
"commands",
|
|
6009
|
-
"hardis",
|
|
6010
|
-
"org",
|
|
6011
|
-
"fix",
|
|
6012
|
-
"listviewmine.js"
|
|
6013
|
-
],
|
|
6014
|
-
"aliasPermutations": [],
|
|
6015
|
-
"permutations": [
|
|
6016
|
-
"hardis:org:fix:listviewmine",
|
|
6017
|
-
"org:hardis:fix:listviewmine",
|
|
6018
|
-
"org:fix:hardis:listviewmine",
|
|
6019
|
-
"org:fix:listviewmine:hardis",
|
|
6020
|
-
"hardis:fix:org:listviewmine",
|
|
6021
|
-
"fix:hardis:org:listviewmine",
|
|
6022
|
-
"fix:org:hardis:listviewmine",
|
|
6023
|
-
"fix:org:listviewmine:hardis",
|
|
6024
|
-
"hardis:fix:listviewmine:org",
|
|
6025
|
-
"fix:hardis:listviewmine:org",
|
|
6026
|
-
"fix:listviewmine:hardis:org",
|
|
6027
|
-
"fix:listviewmine:org:hardis",
|
|
6028
|
-
"hardis:org:listviewmine:fix",
|
|
6029
|
-
"org:hardis:listviewmine:fix",
|
|
6030
|
-
"org:listviewmine:hardis:fix",
|
|
6031
|
-
"org:listviewmine:fix:hardis",
|
|
6032
|
-
"hardis:listviewmine:org:fix",
|
|
6033
|
-
"listviewmine:hardis:org:fix",
|
|
6034
|
-
"listviewmine:org:hardis:fix",
|
|
6035
|
-
"listviewmine:org:fix:hardis",
|
|
6036
|
-
"hardis:listviewmine:fix:org",
|
|
6037
|
-
"listviewmine:hardis:fix:org",
|
|
6038
|
-
"listviewmine:fix:hardis:org",
|
|
6039
|
-
"listviewmine:fix:org:hardis"
|
|
6040
|
-
]
|
|
6041
|
-
},
|
|
6042
5927
|
"hardis:org:files:export": {
|
|
6043
5928
|
"aliases": [],
|
|
6044
5929
|
"args": {},
|
|
@@ -6308,14 +6193,15 @@
|
|
|
6308
6193
|
"import:files:org:hardis"
|
|
6309
6194
|
]
|
|
6310
6195
|
},
|
|
6311
|
-
"hardis:org:
|
|
6196
|
+
"hardis:org:diagnose:audittrail": {
|
|
6312
6197
|
"aliases": [],
|
|
6313
6198
|
"args": {},
|
|
6314
|
-
"description": "
|
|
6199
|
+
"description": "Export Audit trail into a CSV file with selected criteria, and highlight suspect actions\n\nAlso detects updates of Custom Settings values (disable by defining `SKIP_AUDIT_TRAIL_CUSTOM_SETTINGS=true`)\n\nRegular setup actions performed in major orgs are filtered.\n\n- \"\"\n - createScratchOrg\n - changedsenderemail\n - deleteScratchOrg\n - loginasgrantedtopartnerbt\n- Certificate and Key Management\n - insertCertificate\n- Custom App Licenses\n - addeduserpackagelicense\n - granteduserpackagelicense\n - revokeduserpackagelicense\n- Customer Portal\n - createdcustomersuccessuser\n - CSPUserDisabled\n- Currency\n - updateddatedexchrate\n- Data Management\n - queueMembership\n- Email Administration\n - dkimRotationPreparationSuccessful\n - dkimRotationSuccessful\n- External Objects\n - xdsEncryptedFieldChange\n- Groups\n - groupMembership\n- Holidays\n - holiday_insert\n- Inbox mobile and legacy desktop apps\n - enableSIQUserNonEAC\n - siqUserAcceptedTOS\n- Manage Users\n - activateduser\n - createduser\n - changedcommunitynickname\n - changedemail\n - changedfederationid\n - changedpassword\n - changedinteractionuseroffon\n - changedinteractionuseronoff\n - changedmarketinguseroffon\n - changedmarketinguseronoff\n - changedofflineuseroffon\n - changedprofileforuserstdtostd\n - changedprofileforuser\n - changedprofileforusercusttostd\n - changedprofileforuserstdtocust\n - changedroleforusertonone\n - changedroleforuser\n - changedroleforuserfromnone\n - changedUserAdminVerifiedStatusVerified\n - changedUserEmailVerifiedStatusUnverified\n - changedUserEmailVerifiedStatusVerified\n - changedknowledgeuseroffon\n - changedsfcontentuseroffon\n - changedsupportuseroffon\n - changedusername\n - changedUserPhoneNumber\n - changedUserPhoneVerifiedStatusUnverified\n - changedUserPhoneVerifiedStatusVerified\n - deactivateduser\n - deleteAuthenticatorPairing\n - deleteTwoFactorInfo2\n - deleteTwoFactorTempCode\n - frozeuser\n - insertAuthenticatorPairing\n - insertTwoFactorInfo2\n - insertTwoFactorTempCode\n - lightningloginenroll\n - PermSetAssign\n - PermSetGroupAssign\n - PermSetGroupUnassign\n - PermSetLicenseAssign\n - PermSetUnassign\n - PermSetLicenseUnassign\n - registeredUserPhoneNumber\n - resetpassword\n - suNetworkAdminLogin\n - suNetworkAdminLogout\n - suOrgAdminLogin\n - suOrgAdminLogout\n - unfrozeuser\n - useremailchangesent\n- Mobile Administration\n - assigneduserstomobileconfig\n- Reporting Snapshots\n - createdReportJob\n - deletedReportJob\n- Sandboxes\n - DeleteSandbox\n\nBy default, deployment user defined in .sfdx-hardis.yml targetUsername property will be excluded.\n\nYou can define additional users to exclude in .sfdx-hardis.yml **monitoringExcludeUsernames** property.\n\nYou can also add more sections / actions considered as not suspect using property **monitoringAllowedSectionsActions**\n\nExample:\n\n```yaml\nmonitoringExcludeUsernames:\n - deploymentuser@cloudity.com\n - marketingcloud@cloudity.com\n - integration-user@cloudity.com\n\nmonitoringAllowedSectionsActions:\n \"Some section\": [] // Will ignore all actions from such section\n \"Some other section\": [\"actionType1\",\"actionType2\",\"actionType3\"] // Will ignore only those 3 actions from section \"Some other section\". Other actions in the same section will be considered as suspect.\n```\n\n## Excel output example\n\n\n\n## Local output example\n\n\n\nThis command is part of [sfdx-hardis Monitoring](https://sfdx-hardis.cloudity.com/salesforce-monitoring-suspect-audit-trail/) and can output Grafana, Slack and MsTeams Notifications.\n",
|
|
6315
6200
|
"examples": [
|
|
6316
|
-
"$ sf hardis:org:
|
|
6317
|
-
"$ sf hardis:org:
|
|
6318
|
-
"$ sf hardis:org:
|
|
6201
|
+
"$ sf hardis:org:diagnose:audittrail",
|
|
6202
|
+
"$ sf hardis:org:diagnose:audittrail --excludeusers baptiste@titi.com",
|
|
6203
|
+
"$ sf hardis:org:diagnose:audittrail --excludeusers baptiste@titi.com,bertrand@titi.com",
|
|
6204
|
+
"$ sf hardis:org:diagnose:audittrail --lastndays 5"
|
|
6319
6205
|
],
|
|
6320
6206
|
"flags": {
|
|
6321
6207
|
"json": {
|
|
@@ -6333,148 +6219,25 @@
|
|
|
6333
6219
|
"multiple": false,
|
|
6334
6220
|
"type": "option"
|
|
6335
6221
|
},
|
|
6222
|
+
"excludeusers": {
|
|
6223
|
+
"char": "e",
|
|
6224
|
+
"description": "Comma-separated list of usernames to exclude",
|
|
6225
|
+
"name": "excludeusers",
|
|
6226
|
+
"hasDynamicHelp": false,
|
|
6227
|
+
"multiple": false,
|
|
6228
|
+
"type": "option"
|
|
6229
|
+
},
|
|
6230
|
+
"lastndays": {
|
|
6231
|
+
"char": "t",
|
|
6232
|
+
"description": "Number of days to extract from today (included)",
|
|
6233
|
+
"name": "lastndays",
|
|
6234
|
+
"hasDynamicHelp": false,
|
|
6235
|
+
"multiple": false,
|
|
6236
|
+
"type": "option"
|
|
6237
|
+
},
|
|
6336
6238
|
"outputfile": {
|
|
6337
|
-
"
|
|
6338
|
-
"
|
|
6339
|
-
"hasDynamicHelp": false,
|
|
6340
|
-
"multiple": false,
|
|
6341
|
-
"type": "option"
|
|
6342
|
-
},
|
|
6343
|
-
"debug": {
|
|
6344
|
-
"char": "d",
|
|
6345
|
-
"description": "Activate debug mode (more logs)",
|
|
6346
|
-
"name": "debug",
|
|
6347
|
-
"allowNo": false,
|
|
6348
|
-
"type": "boolean"
|
|
6349
|
-
},
|
|
6350
|
-
"no-prompt": {
|
|
6351
|
-
"char": "n",
|
|
6352
|
-
"description": "Do not prompt for org username, use the default one",
|
|
6353
|
-
"name": "no-prompt",
|
|
6354
|
-
"allowNo": false,
|
|
6355
|
-
"type": "boolean"
|
|
6356
|
-
},
|
|
6357
|
-
"websocket": {
|
|
6358
|
-
"description": "Websocket host:port for VsCode SFDX Hardis UI integration",
|
|
6359
|
-
"name": "websocket",
|
|
6360
|
-
"hasDynamicHelp": false,
|
|
6361
|
-
"multiple": false,
|
|
6362
|
-
"type": "option"
|
|
6363
|
-
},
|
|
6364
|
-
"skipauth": {
|
|
6365
|
-
"description": "Skip authentication check when a default username is required",
|
|
6366
|
-
"name": "skipauth",
|
|
6367
|
-
"allowNo": false,
|
|
6368
|
-
"type": "boolean"
|
|
6369
|
-
},
|
|
6370
|
-
"target-org": {
|
|
6371
|
-
"aliases": [
|
|
6372
|
-
"targetusername",
|
|
6373
|
-
"u"
|
|
6374
|
-
],
|
|
6375
|
-
"char": "o",
|
|
6376
|
-
"deprecateAliases": true,
|
|
6377
|
-
"name": "target-org",
|
|
6378
|
-
"noCacheDefault": true,
|
|
6379
|
-
"required": true,
|
|
6380
|
-
"summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
|
|
6381
|
-
"hasDynamicHelp": true,
|
|
6382
|
-
"multiple": false,
|
|
6383
|
-
"type": "option"
|
|
6384
|
-
}
|
|
6385
|
-
},
|
|
6386
|
-
"hasDynamicHelp": true,
|
|
6387
|
-
"hiddenAliases": [],
|
|
6388
|
-
"id": "hardis:org:generate:packagexmlfull",
|
|
6389
|
-
"pluginAlias": "sfdx-hardis",
|
|
6390
|
-
"pluginName": "sfdx-hardis",
|
|
6391
|
-
"pluginType": "core",
|
|
6392
|
-
"strict": true,
|
|
6393
|
-
"enableJsonFlag": true,
|
|
6394
|
-
"title": "Generate Full Org package.xml",
|
|
6395
|
-
"requiresProject": false,
|
|
6396
|
-
"isESM": true,
|
|
6397
|
-
"relativePath": [
|
|
6398
|
-
"lib",
|
|
6399
|
-
"commands",
|
|
6400
|
-
"hardis",
|
|
6401
|
-
"org",
|
|
6402
|
-
"generate",
|
|
6403
|
-
"packagexmlfull.js"
|
|
6404
|
-
],
|
|
6405
|
-
"aliasPermutations": [],
|
|
6406
|
-
"permutations": [
|
|
6407
|
-
"hardis:org:generate:packagexmlfull",
|
|
6408
|
-
"org:hardis:generate:packagexmlfull",
|
|
6409
|
-
"org:generate:hardis:packagexmlfull",
|
|
6410
|
-
"org:generate:packagexmlfull:hardis",
|
|
6411
|
-
"hardis:generate:org:packagexmlfull",
|
|
6412
|
-
"generate:hardis:org:packagexmlfull",
|
|
6413
|
-
"generate:org:hardis:packagexmlfull",
|
|
6414
|
-
"generate:org:packagexmlfull:hardis",
|
|
6415
|
-
"hardis:generate:packagexmlfull:org",
|
|
6416
|
-
"generate:hardis:packagexmlfull:org",
|
|
6417
|
-
"generate:packagexmlfull:hardis:org",
|
|
6418
|
-
"generate:packagexmlfull:org:hardis",
|
|
6419
|
-
"hardis:org:packagexmlfull:generate",
|
|
6420
|
-
"org:hardis:packagexmlfull:generate",
|
|
6421
|
-
"org:packagexmlfull:hardis:generate",
|
|
6422
|
-
"org:packagexmlfull:generate:hardis",
|
|
6423
|
-
"hardis:packagexmlfull:org:generate",
|
|
6424
|
-
"packagexmlfull:hardis:org:generate",
|
|
6425
|
-
"packagexmlfull:org:hardis:generate",
|
|
6426
|
-
"packagexmlfull:org:generate:hardis",
|
|
6427
|
-
"hardis:packagexmlfull:generate:org",
|
|
6428
|
-
"packagexmlfull:hardis:generate:org",
|
|
6429
|
-
"packagexmlfull:generate:hardis:org",
|
|
6430
|
-
"packagexmlfull:generate:org:hardis"
|
|
6431
|
-
]
|
|
6432
|
-
},
|
|
6433
|
-
"hardis:org:diagnose:audittrail": {
|
|
6434
|
-
"aliases": [],
|
|
6435
|
-
"args": {},
|
|
6436
|
-
"description": "Export Audit trail into a CSV file with selected criteria, and highlight suspect actions\n\nAlso detects updates of Custom Settings values (disable by defining `SKIP_AUDIT_TRAIL_CUSTOM_SETTINGS=true`)\n\nRegular setup actions performed in major orgs are filtered.\n\n- \"\"\n - createScratchOrg\n - changedsenderemail\n - deleteScratchOrg\n - loginasgrantedtopartnerbt\n- Certificate and Key Management\n - insertCertificate\n- Custom App Licenses\n - addeduserpackagelicense\n - granteduserpackagelicense\n - revokeduserpackagelicense\n- Customer Portal\n - createdcustomersuccessuser\n - CSPUserDisabled\n- Currency\n - updateddatedexchrate\n- Data Management\n - queueMembership\n- Email Administration\n - dkimRotationPreparationSuccessful\n - dkimRotationSuccessful\n- External Objects\n - xdsEncryptedFieldChange\n- Groups\n - groupMembership\n- Holidays\n - holiday_insert\n- Inbox mobile and legacy desktop apps\n - enableSIQUserNonEAC\n - siqUserAcceptedTOS\n- Manage Users\n - activateduser\n - createduser\n - changedcommunitynickname\n - changedemail\n - changedfederationid\n - changedpassword\n - changedinteractionuseroffon\n - changedinteractionuseronoff\n - changedmarketinguseroffon\n - changedmarketinguseronoff\n - changedofflineuseroffon\n - changedprofileforuserstdtostd\n - changedprofileforuser\n - changedprofileforusercusttostd\n - changedprofileforuserstdtocust\n - changedroleforusertonone\n - changedroleforuser\n - changedroleforuserfromnone\n - changedUserAdminVerifiedStatusVerified\n - changedUserEmailVerifiedStatusUnverified\n - changedUserEmailVerifiedStatusVerified\n - changedknowledgeuseroffon\n - changedsfcontentuseroffon\n - changedsupportuseroffon\n - changedusername\n - changedUserPhoneNumber\n - changedUserPhoneVerifiedStatusUnverified\n - changedUserPhoneVerifiedStatusVerified\n - deactivateduser\n - deleteAuthenticatorPairing\n - deleteTwoFactorInfo2\n - deleteTwoFactorTempCode\n - frozeuser\n - insertAuthenticatorPairing\n - insertTwoFactorInfo2\n - insertTwoFactorTempCode\n - lightningloginenroll\n - PermSetAssign\n - PermSetGroupAssign\n - PermSetGroupUnassign\n - PermSetLicenseAssign\n - PermSetUnassign\n - PermSetLicenseUnassign\n - registeredUserPhoneNumber\n - resetpassword\n - suNetworkAdminLogin\n - suNetworkAdminLogout\n - suOrgAdminLogin\n - suOrgAdminLogout\n - unfrozeuser\n - useremailchangesent\n- Mobile Administration\n - assigneduserstomobileconfig\n- Reporting Snapshots\n - createdReportJob\n - deletedReportJob\n- Sandboxes\n - DeleteSandbox\n\nBy default, deployment user defined in .sfdx-hardis.yml targetUsername property will be excluded.\n\nYou can define additional users to exclude in .sfdx-hardis.yml **monitoringExcludeUsernames** property.\n\nYou can also add more sections / actions considered as not suspect using property **monitoringAllowedSectionsActions**\n\nExample:\n\n```yaml\nmonitoringExcludeUsernames:\n - deploymentuser@cloudity.com\n - marketingcloud@cloudity.com\n - integration-user@cloudity.com\n\nmonitoringAllowedSectionsActions:\n \"Some section\": [] // Will ignore all actions from such section\n \"Some other section\": [\"actionType1\",\"actionType2\",\"actionType3\"] // Will ignore only those 3 actions from section \"Some other section\". Other actions in the same section will be considered as suspect.\n```\n\n## Excel output example\n\n\n\n## Local output example\n\n\n\nThis command is part of [sfdx-hardis Monitoring](https://sfdx-hardis.cloudity.com/salesforce-monitoring-suspect-audit-trail/) and can output Grafana, Slack and MsTeams Notifications.\n",
|
|
6437
|
-
"examples": [
|
|
6438
|
-
"$ sf hardis:org:diagnose:audittrail",
|
|
6439
|
-
"$ sf hardis:org:diagnose:audittrail --excludeusers baptiste@titi.com",
|
|
6440
|
-
"$ sf hardis:org:diagnose:audittrail --excludeusers baptiste@titi.com,bertrand@titi.com",
|
|
6441
|
-
"$ sf hardis:org:diagnose:audittrail --lastndays 5"
|
|
6442
|
-
],
|
|
6443
|
-
"flags": {
|
|
6444
|
-
"json": {
|
|
6445
|
-
"description": "Format output as json.",
|
|
6446
|
-
"helpGroup": "GLOBAL",
|
|
6447
|
-
"name": "json",
|
|
6448
|
-
"allowNo": false,
|
|
6449
|
-
"type": "boolean"
|
|
6450
|
-
},
|
|
6451
|
-
"flags-dir": {
|
|
6452
|
-
"helpGroup": "GLOBAL",
|
|
6453
|
-
"name": "flags-dir",
|
|
6454
|
-
"summary": "Import flag values from a directory.",
|
|
6455
|
-
"hasDynamicHelp": false,
|
|
6456
|
-
"multiple": false,
|
|
6457
|
-
"type": "option"
|
|
6458
|
-
},
|
|
6459
|
-
"excludeusers": {
|
|
6460
|
-
"char": "e",
|
|
6461
|
-
"description": "Comma-separated list of usernames to exclude",
|
|
6462
|
-
"name": "excludeusers",
|
|
6463
|
-
"hasDynamicHelp": false,
|
|
6464
|
-
"multiple": false,
|
|
6465
|
-
"type": "option"
|
|
6466
|
-
},
|
|
6467
|
-
"lastndays": {
|
|
6468
|
-
"char": "t",
|
|
6469
|
-
"description": "Number of days to extract from today (included)",
|
|
6470
|
-
"name": "lastndays",
|
|
6471
|
-
"hasDynamicHelp": false,
|
|
6472
|
-
"multiple": false,
|
|
6473
|
-
"type": "option"
|
|
6474
|
-
},
|
|
6475
|
-
"outputfile": {
|
|
6476
|
-
"char": "f",
|
|
6477
|
-
"description": "Force the path and name of output report file. Must end with .csv",
|
|
6239
|
+
"char": "f",
|
|
6240
|
+
"description": "Force the path and name of output report file. Must end with .csv",
|
|
6478
6241
|
"name": "outputfile",
|
|
6479
6242
|
"hasDynamicHelp": false,
|
|
6480
6243
|
"multiple": false,
|
|
@@ -7828,12 +7591,13 @@
|
|
|
7828
7591
|
"unusedusers:diagnose:org:hardis"
|
|
7829
7592
|
]
|
|
7830
7593
|
},
|
|
7831
|
-
"hardis:org:
|
|
7594
|
+
"hardis:org:fix:listviewmine": {
|
|
7832
7595
|
"aliases": [],
|
|
7833
7596
|
"args": {},
|
|
7834
|
-
"description": "
|
|
7597
|
+
"description": "Fix listviews whose scope Mine has been replaced by Everything\n\n[](https://nicolas.vuillamy.fr/invalid-scope-mine-not-allowed-deploy-your-listviews-anyway-443aceca8ac7)\n\nList of ListViews can be:\n\n- read from .sfdx-hardis.yml file in property **listViewsToSetToMine**\n- sent in argument listviews\n\nNote: property **listViewsToSetToMine** can be auto-generated by command hardis:work:save if .sfdx-hardis.yml contains the following configuration\n\n```yaml\nautoCleanTypes:\n - listViewsMine\n```\n\n- Example of sfdx-hardis.yml property `listViewsToSetToMine`:\n\n```yaml\nlistViewsToSetToMine:\n - \"force-app/main/default/objects/Operation__c/listViews/MyCurrentOperations.listView-meta.xml\"\n - \"force-app/main/default/objects/Operation__c/listViews/MyFinalizedOperations.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/Default_Opportunity_Pipeline.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/MyCurrentSubscriptions.listView-meta.xml\"\n - \"force-app/main/default/objects/Opportunity/listViews/MySubscriptions.listView-meta.xml\"\n - \"force-app/main/default/objects/Account/listViews/MyActivePartners.listView-meta.xml\"\n```\n\n- If manually written, this could also be:\n\n```yaml\nlistViewsToSetToMine:\n - \"Operation__c:MyCurrentOperations\"\n - \"Operation__c:MyFinalizedOperations\"\n - \"Opportunity:Default_Opportunity_Pipeline\"\n - \"Opportunity:MyCurrentSubscriptions\"\n - \"Opportunity:MySubscriptions\"\n - \"Account:MyActivePartners\"\n```\n\nTroubleshooting: if you need to run this command from an alpine-linux based docker image, use this workaround in your dockerfile:\n\n```dockerfile\n# Do not use puppeteer embedded chromium\nRUN apk add --update --no-cache chromium\nENV PUPPETEER_SKIP_CHROMIUM_DOWNLOAD=\"true\"\nENV CHROMIUM_PATH=\"/usr/bin/chromium-browser\"\nENV PUPPETEER_EXECUTABLE_PATH=\"$\\{CHROMIUM_PATH}\" // remove \\ before {\n```\n",
|
|
7835
7598
|
"examples": [
|
|
7836
|
-
"$ sf hardis:org:
|
|
7599
|
+
"$ sf hardis:org:fix:listviewmine",
|
|
7600
|
+
"$ sf hardis:org:fix:listviewmine --listviews Opportunity:MySubscriptions,Account:MyActivePartners"
|
|
7837
7601
|
],
|
|
7838
7602
|
"flags": {
|
|
7839
7603
|
"json": {
|
|
@@ -7851,6 +7615,14 @@
|
|
|
7851
7615
|
"multiple": false,
|
|
7852
7616
|
"type": "option"
|
|
7853
7617
|
},
|
|
7618
|
+
"listviews": {
|
|
7619
|
+
"char": "l",
|
|
7620
|
+
"description": "Comma-separated list of listviews following format Object:ListViewName\nExample: Contact:MyContacts,Contact:MyActiveContacts,Opportunity:MYClosedOpportunities",
|
|
7621
|
+
"name": "listviews",
|
|
7622
|
+
"hasDynamicHelp": false,
|
|
7623
|
+
"multiple": false,
|
|
7624
|
+
"type": "option"
|
|
7625
|
+
},
|
|
7854
7626
|
"debug": {
|
|
7855
7627
|
"char": "d",
|
|
7856
7628
|
"description": "Activate debug mode (more logs)",
|
|
@@ -7889,125 +7661,353 @@
|
|
|
7889
7661
|
},
|
|
7890
7662
|
"hasDynamicHelp": true,
|
|
7891
7663
|
"hiddenAliases": [],
|
|
7892
|
-
"id": "hardis:org:
|
|
7664
|
+
"id": "hardis:org:fix:listviewmine",
|
|
7893
7665
|
"pluginAlias": "sfdx-hardis",
|
|
7894
7666
|
"pluginName": "sfdx-hardis",
|
|
7895
7667
|
"pluginType": "core",
|
|
7896
7668
|
"strict": true,
|
|
7897
7669
|
"enableJsonFlag": true,
|
|
7898
|
-
"title": "
|
|
7899
|
-
"monitoringCommandsDefault": [
|
|
7900
|
-
{
|
|
7901
|
-
"key": "AUDIT_TRAIL",
|
|
7902
|
-
"title": "Detect suspect setup actions in major org",
|
|
7903
|
-
"command": "sf hardis:org:diagnose:audittrail",
|
|
7904
|
-
"frequency": "daily"
|
|
7905
|
-
},
|
|
7906
|
-
{
|
|
7907
|
-
"key": "LEGACY_API",
|
|
7908
|
-
"title": "Detect calls to deprecated API versions",
|
|
7909
|
-
"command": "sf hardis:org:diagnose:legacyapi",
|
|
7910
|
-
"frequency": "daily"
|
|
7911
|
-
},
|
|
7912
|
-
{
|
|
7913
|
-
"key": "ORG_LIMITS",
|
|
7914
|
-
"title": "Detect if org limits are close to be reached",
|
|
7915
|
-
"command": "sf hardis:org:monitor:limits",
|
|
7916
|
-
"frequency": "daily"
|
|
7917
|
-
},
|
|
7918
|
-
{
|
|
7919
|
-
"key": "UNSECURED_CONNECTED_APPS",
|
|
7920
|
-
"title": "Detect unsecured Connected Apps in an org",
|
|
7921
|
-
"command": "sf hardis:org:diagnose:unsecure-connected-apps",
|
|
7922
|
-
"frequency": "daily"
|
|
7923
|
-
},
|
|
7924
|
-
{
|
|
7925
|
-
"key": "LICENSES",
|
|
7926
|
-
"title": "Extract licenses information",
|
|
7927
|
-
"command": "sf hardis:org:diagnose:licenses",
|
|
7928
|
-
"frequency": "weekly"
|
|
7929
|
-
},
|
|
7930
|
-
{
|
|
7931
|
-
"key": "LINT_ACCESS",
|
|
7932
|
-
"title": "Detect custom elements with no access rights defined in permission sets",
|
|
7933
|
-
"command": "sf hardis:lint:access",
|
|
7934
|
-
"frequency": "weekly"
|
|
7935
|
-
},
|
|
7936
|
-
{
|
|
7937
|
-
"key": "UNUSED_LICENSES",
|
|
7938
|
-
"title": "Detect permission set licenses that are assigned to users that do not need them",
|
|
7939
|
-
"command": "sf hardis:org:diagnose:unusedlicenses",
|
|
7940
|
-
"frequency": "weekly"
|
|
7941
|
-
},
|
|
7942
|
-
{
|
|
7943
|
-
"key": "UNUSED_USERS",
|
|
7944
|
-
"title": "Detect active users without recent logins",
|
|
7945
|
-
"command": "sf hardis:org:diagnose:unusedusers",
|
|
7946
|
-
"frequency": "weekly"
|
|
7947
|
-
},
|
|
7948
|
-
{
|
|
7949
|
-
"key": "ACTIVE_USERS",
|
|
7950
|
-
"title": "Detect active users with recent logins",
|
|
7951
|
-
"command": "sf hardis:org:diagnose:unusedusers --returnactiveusers",
|
|
7952
|
-
"frequency": "weekly"
|
|
7953
|
-
},
|
|
7954
|
-
{
|
|
7955
|
-
"key": "ORG_INFO",
|
|
7956
|
-
"title": "Get org info + SF instance info + next major upgrade date",
|
|
7957
|
-
"command": "sf hardis:org:diagnose:instanceupgrade",
|
|
7958
|
-
"frequency": "weekly"
|
|
7959
|
-
},
|
|
7960
|
-
{
|
|
7961
|
-
"key": "RELEASE_UPDATES",
|
|
7962
|
-
"title": "Gather warnings about incoming and overdue Release Updates",
|
|
7963
|
-
"command": "sf hardis:org:diagnose:releaseupdates",
|
|
7964
|
-
"frequency": "weekly"
|
|
7965
|
-
},
|
|
7966
|
-
{
|
|
7967
|
-
"key": "UNUSED_METADATAS",
|
|
7968
|
-
"title": "Detect custom labels and custom permissions that are not in use",
|
|
7969
|
-
"command": "sf hardis:lint:unusedmetadatas",
|
|
7970
|
-
"frequency": "weekly"
|
|
7971
|
-
},
|
|
7972
|
-
{
|
|
7973
|
-
"key": "UNUSED_APEX_CLASSES",
|
|
7974
|
-
"title": "Detect unused Apex classes in an org",
|
|
7975
|
-
"command": "sf hardis:org:diagnose:unused-apex-classes",
|
|
7976
|
-
"frequency": "weekly"
|
|
7977
|
-
},
|
|
7978
|
-
{
|
|
7979
|
-
"key": "CONNECTED_APPS",
|
|
7980
|
-
"title": "Detect unused Connected Apps in an org",
|
|
7981
|
-
"command": "sf hardis:org:diagnose:unused-connected-apps",
|
|
7982
|
-
"frequency": "weekly"
|
|
7983
|
-
},
|
|
7984
|
-
{
|
|
7985
|
-
"key": "METADATA_STATUS",
|
|
7986
|
-
"title": "Detect inactive metadata",
|
|
7987
|
-
"command": "sf hardis:lint:metadatastatus",
|
|
7988
|
-
"frequency": "weekly"
|
|
7989
|
-
},
|
|
7990
|
-
{
|
|
7991
|
-
"key": "MISSING_ATTRIBUTES",
|
|
7992
|
-
"title": "Detect missing description on custom field",
|
|
7993
|
-
"command": "sf hardis:lint:missingattributes",
|
|
7994
|
-
"frequency": "weekly"
|
|
7995
|
-
}
|
|
7996
|
-
],
|
|
7670
|
+
"title": "Fix listviews with ",
|
|
7997
7671
|
"requiresProject": true,
|
|
7998
|
-
"triggerNotification": true,
|
|
7999
7672
|
"isESM": true,
|
|
8000
7673
|
"relativePath": [
|
|
8001
7674
|
"lib",
|
|
8002
7675
|
"commands",
|
|
8003
7676
|
"hardis",
|
|
8004
7677
|
"org",
|
|
8005
|
-
"
|
|
8006
|
-
"
|
|
7678
|
+
"fix",
|
|
7679
|
+
"listviewmine.js"
|
|
8007
7680
|
],
|
|
8008
7681
|
"aliasPermutations": [],
|
|
8009
7682
|
"permutations": [
|
|
8010
|
-
"hardis:org:
|
|
7683
|
+
"hardis:org:fix:listviewmine",
|
|
7684
|
+
"org:hardis:fix:listviewmine",
|
|
7685
|
+
"org:fix:hardis:listviewmine",
|
|
7686
|
+
"org:fix:listviewmine:hardis",
|
|
7687
|
+
"hardis:fix:org:listviewmine",
|
|
7688
|
+
"fix:hardis:org:listviewmine",
|
|
7689
|
+
"fix:org:hardis:listviewmine",
|
|
7690
|
+
"fix:org:listviewmine:hardis",
|
|
7691
|
+
"hardis:fix:listviewmine:org",
|
|
7692
|
+
"fix:hardis:listviewmine:org",
|
|
7693
|
+
"fix:listviewmine:hardis:org",
|
|
7694
|
+
"fix:listviewmine:org:hardis",
|
|
7695
|
+
"hardis:org:listviewmine:fix",
|
|
7696
|
+
"org:hardis:listviewmine:fix",
|
|
7697
|
+
"org:listviewmine:hardis:fix",
|
|
7698
|
+
"org:listviewmine:fix:hardis",
|
|
7699
|
+
"hardis:listviewmine:org:fix",
|
|
7700
|
+
"listviewmine:hardis:org:fix",
|
|
7701
|
+
"listviewmine:org:hardis:fix",
|
|
7702
|
+
"listviewmine:org:fix:hardis",
|
|
7703
|
+
"hardis:listviewmine:fix:org",
|
|
7704
|
+
"listviewmine:hardis:fix:org",
|
|
7705
|
+
"listviewmine:fix:hardis:org",
|
|
7706
|
+
"listviewmine:fix:org:hardis"
|
|
7707
|
+
]
|
|
7708
|
+
},
|
|
7709
|
+
"hardis:org:generate:packagexmlfull": {
|
|
7710
|
+
"aliases": [],
|
|
7711
|
+
"args": {},
|
|
7712
|
+
"description": "\n## Command Behavior\n\n**Generates a comprehensive `package.xml` file for a Salesforce org, including all metadata components, even managed ones.**\n\nThis command is essential for various Salesforce development and administration tasks, especially when you need a complete snapshot of an org's metadata. It goes beyond typical source tracking by including managed package components, which is crucial for understanding the full metadata footprint of an org.\n\nKey functionalities:\n\n- **Full Org Metadata Retrieval:** Connects to a specified Salesforce org (or prompts for one if not provided) and retrieves a complete list of all metadata types and their members.\n- **Managed Package Inclusion:** Unlike standard source retrieval, this command explicitly includes metadata from managed packages, providing a truly comprehensive `package.xml`.\n- **Customizable Output:** Allows you to specify the output file path for the generated `package.xml`.\n- **Interactive Org Selection:** If no target org is specified, it interactively prompts the user to choose an org. (or use --no-prompt to skip this step)\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **Salesforce Metadata API Interaction:** It leverages the Salesforce Metadata API to list all available metadata types and then retrieve all components for each type.\n- **`buildOrgManifest` Utility:** The core logic for querying the org's metadata and constructing the `package.xml` is encapsulated within the `buildOrgManifest` utility function.\n- **XML Generation:** It dynamically builds the XML structure of the `package.xml` file, including the `types` and `members` elements for all retrieved metadata.\n- **File System Operations:** It writes the generated `package.xml` file to the specified output path.\n- **Interactive Prompts:** Uses `promptOrgUsernameDefault` to guide the user in selecting the target Salesforce org.\n</details>\n",
|
|
7713
|
+
"examples": [
|
|
7714
|
+
"$ sf hardis:org:generate:packagexmlfull",
|
|
7715
|
+
"$ sf hardis:org:generate:packagexmlfull --outputfile /tmp/packagexmlfull.xml",
|
|
7716
|
+
"$ sf hardis:org:generate:packagexmlfull --target-org nico@example.com"
|
|
7717
|
+
],
|
|
7718
|
+
"flags": {
|
|
7719
|
+
"json": {
|
|
7720
|
+
"description": "Format output as json.",
|
|
7721
|
+
"helpGroup": "GLOBAL",
|
|
7722
|
+
"name": "json",
|
|
7723
|
+
"allowNo": false,
|
|
7724
|
+
"type": "boolean"
|
|
7725
|
+
},
|
|
7726
|
+
"flags-dir": {
|
|
7727
|
+
"helpGroup": "GLOBAL",
|
|
7728
|
+
"name": "flags-dir",
|
|
7729
|
+
"summary": "Import flag values from a directory.",
|
|
7730
|
+
"hasDynamicHelp": false,
|
|
7731
|
+
"multiple": false,
|
|
7732
|
+
"type": "option"
|
|
7733
|
+
},
|
|
7734
|
+
"outputfile": {
|
|
7735
|
+
"description": "Output package.xml file",
|
|
7736
|
+
"name": "outputfile",
|
|
7737
|
+
"hasDynamicHelp": false,
|
|
7738
|
+
"multiple": false,
|
|
7739
|
+
"type": "option"
|
|
7740
|
+
},
|
|
7741
|
+
"debug": {
|
|
7742
|
+
"char": "d",
|
|
7743
|
+
"description": "Activate debug mode (more logs)",
|
|
7744
|
+
"name": "debug",
|
|
7745
|
+
"allowNo": false,
|
|
7746
|
+
"type": "boolean"
|
|
7747
|
+
},
|
|
7748
|
+
"no-prompt": {
|
|
7749
|
+
"char": "n",
|
|
7750
|
+
"description": "Do not prompt for org username, use the default one",
|
|
7751
|
+
"name": "no-prompt",
|
|
7752
|
+
"allowNo": false,
|
|
7753
|
+
"type": "boolean"
|
|
7754
|
+
},
|
|
7755
|
+
"websocket": {
|
|
7756
|
+
"description": "Websocket host:port for VsCode SFDX Hardis UI integration",
|
|
7757
|
+
"name": "websocket",
|
|
7758
|
+
"hasDynamicHelp": false,
|
|
7759
|
+
"multiple": false,
|
|
7760
|
+
"type": "option"
|
|
7761
|
+
},
|
|
7762
|
+
"skipauth": {
|
|
7763
|
+
"description": "Skip authentication check when a default username is required",
|
|
7764
|
+
"name": "skipauth",
|
|
7765
|
+
"allowNo": false,
|
|
7766
|
+
"type": "boolean"
|
|
7767
|
+
},
|
|
7768
|
+
"target-org": {
|
|
7769
|
+
"aliases": [
|
|
7770
|
+
"targetusername",
|
|
7771
|
+
"u"
|
|
7772
|
+
],
|
|
7773
|
+
"char": "o",
|
|
7774
|
+
"deprecateAliases": true,
|
|
7775
|
+
"name": "target-org",
|
|
7776
|
+
"noCacheDefault": true,
|
|
7777
|
+
"required": true,
|
|
7778
|
+
"summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
|
|
7779
|
+
"hasDynamicHelp": true,
|
|
7780
|
+
"multiple": false,
|
|
7781
|
+
"type": "option"
|
|
7782
|
+
}
|
|
7783
|
+
},
|
|
7784
|
+
"hasDynamicHelp": true,
|
|
7785
|
+
"hiddenAliases": [],
|
|
7786
|
+
"id": "hardis:org:generate:packagexmlfull",
|
|
7787
|
+
"pluginAlias": "sfdx-hardis",
|
|
7788
|
+
"pluginName": "sfdx-hardis",
|
|
7789
|
+
"pluginType": "core",
|
|
7790
|
+
"strict": true,
|
|
7791
|
+
"enableJsonFlag": true,
|
|
7792
|
+
"title": "Generate Full Org package.xml",
|
|
7793
|
+
"requiresProject": false,
|
|
7794
|
+
"isESM": true,
|
|
7795
|
+
"relativePath": [
|
|
7796
|
+
"lib",
|
|
7797
|
+
"commands",
|
|
7798
|
+
"hardis",
|
|
7799
|
+
"org",
|
|
7800
|
+
"generate",
|
|
7801
|
+
"packagexmlfull.js"
|
|
7802
|
+
],
|
|
7803
|
+
"aliasPermutations": [],
|
|
7804
|
+
"permutations": [
|
|
7805
|
+
"hardis:org:generate:packagexmlfull",
|
|
7806
|
+
"org:hardis:generate:packagexmlfull",
|
|
7807
|
+
"org:generate:hardis:packagexmlfull",
|
|
7808
|
+
"org:generate:packagexmlfull:hardis",
|
|
7809
|
+
"hardis:generate:org:packagexmlfull",
|
|
7810
|
+
"generate:hardis:org:packagexmlfull",
|
|
7811
|
+
"generate:org:hardis:packagexmlfull",
|
|
7812
|
+
"generate:org:packagexmlfull:hardis",
|
|
7813
|
+
"hardis:generate:packagexmlfull:org",
|
|
7814
|
+
"generate:hardis:packagexmlfull:org",
|
|
7815
|
+
"generate:packagexmlfull:hardis:org",
|
|
7816
|
+
"generate:packagexmlfull:org:hardis",
|
|
7817
|
+
"hardis:org:packagexmlfull:generate",
|
|
7818
|
+
"org:hardis:packagexmlfull:generate",
|
|
7819
|
+
"org:packagexmlfull:hardis:generate",
|
|
7820
|
+
"org:packagexmlfull:generate:hardis",
|
|
7821
|
+
"hardis:packagexmlfull:org:generate",
|
|
7822
|
+
"packagexmlfull:hardis:org:generate",
|
|
7823
|
+
"packagexmlfull:org:hardis:generate",
|
|
7824
|
+
"packagexmlfull:org:generate:hardis",
|
|
7825
|
+
"hardis:packagexmlfull:generate:org",
|
|
7826
|
+
"packagexmlfull:hardis:generate:org",
|
|
7827
|
+
"packagexmlfull:generate:hardis:org",
|
|
7828
|
+
"packagexmlfull:generate:org:hardis"
|
|
7829
|
+
]
|
|
7830
|
+
},
|
|
7831
|
+
"hardis:org:monitor:all": {
|
|
7832
|
+
"aliases": [],
|
|
7833
|
+
"args": {},
|
|
7834
|
+
"description": "Monitor org, generate reports and sends notifications\n\nYou can disable some commands defining either a **monitoringDisable** property in `.sfdx-hardis.yml`, or a comma separated list in env variable **MONITORING_DISABLE**\n\nExample in .sfdx-hardis.yml:\n \n```yaml\nmonitoringDisable:\n - METADATA_STATUS\n - MISSING_ATTRIBUTES\n - UNUSED_METADATAS\n```\n \nExample in env var:\n\n```sh\nMONITORING_DISABLE=METADATA_STATUS,MISSING_ATTRIBUTES,UNUSED_METADATAS\n```\n\nA [default list of monitoring commands](https://sfdx-hardis.cloudity.com/salesforce-monitoring-home/#monitoring-commands) is used, if you want to override it you can define property **monitoringCommands** in your .sfdx-hardis.yml file\n\nExample:\n\n```yaml\nmonitoringCommands:\n - title: My Custom command\n command: sf my:custom:command\n - title: My Custom command 2\n command: sf my:other:custom:command\n```\n\nYou can force the daily run of all commands by defining env var `MONITORING_IGNORE_FREQUENCY=true`\n\nThe default list of commands is the following:\n\n| Key | Description | Command | Frequency |\n| :---: | :---- | :---- | :-----: |\n| [AUDIT_TRAIL](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/audittrail) | Detect suspect setup actions in major org | [sf hardis:org:diagnose:audittrail](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/audittrail) | daily |\n| [LEGACY_API](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/legacyapi) | Detect calls to deprecated API versions | [sf hardis:org:diagnose:legacyapi](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/legacyapi) | daily |\n| [ORG_LIMITS](https://sfdx-hardis.cloudity.com/hardis/org/monitor/limits) | Detect if org limits are close to be reached | [sf hardis:org:monitor:limits](https://sfdx-hardis.cloudity.com/hardis/org/monitor/limits) | daily |\n| [UNSECURED_CONNECTED_APPS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unsecure-connected-apps) | Detect unsecured Connected Apps in an org | [sf hardis:org:diagnose:unsecure-connected-apps](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unsecure-connected-apps) | daily |\n| [LICENSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/licenses) | Extract licenses information | [sf hardis:org:diagnose:licenses](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/licenses) | weekly |\n| [LINT_ACCESS](https://sfdx-hardis.cloudity.com/hardis/lint/access) | Detect custom elements with no access rights defined in permission sets | [sf hardis:lint:access](https://sfdx-hardis.cloudity.com/hardis/lint/access) | weekly |\n| [UNUSED_LICENSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedlicenses) | Detect permission set licenses that are assigned to users that do not need them | [sf hardis:org:diagnose:unusedlicenses](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedlicenses) | weekly |\n| [UNUSED_USERS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | Detect active users without recent logins | [sf hardis:org:diagnose:unusedusers](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | weekly |\n| [ACTIVE_USERS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | Detect active users with recent logins | [sf hardis:org:diagnose:unusedusers --returnactiveusers](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unusedusers) | weekly |\n| [ORG_INFO](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/instanceupgrade) | Get org info + SF instance info + next major upgrade date | [sf hardis:org:diagnose:instanceupgrade](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/instanceupgrade) | weekly |\n| [RELEASE_UPDATES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/releaseupdates) | Gather warnings about incoming and overdue Release Updates | [sf hardis:org:diagnose:releaseupdates](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/releaseupdates) | weekly |\n| [UNUSED_METADATAS](https://sfdx-hardis.cloudity.com/hardis/lint/unusedmetadatas) | Detect custom labels and custom permissions that are not in use | [sf hardis:lint:unusedmetadatas](https://sfdx-hardis.cloudity.com/hardis/lint/unusedmetadatas) | weekly |\n| [UNUSED_APEX_CLASSES](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-apex-classes) | Detect unused Apex classes in an org | [sf hardis:org:diagnose:unused-apex-classes](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-apex-classes) | weekly |\n| [CONNECTED_APPS](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-connected-apps) | Detect unused Connected Apps in an org | [sf hardis:org:diagnose:unused-connected-apps](https://sfdx-hardis.cloudity.com/hardis/org/diagnose/unused-connected-apps) | weekly |\n| [METADATA_STATUS](https://sfdx-hardis.cloudity.com/hardis/lint/metadatastatus) | Detect inactive metadata | [sf hardis:lint:metadatastatus](https://sfdx-hardis.cloudity.com/hardis/lint/metadatastatus) | weekly |\n| [MISSING_ATTRIBUTES](https://sfdx-hardis.cloudity.com/hardis/lint/missingattributes) | Detect missing description on custom field | [sf hardis:lint:missingattributes](https://sfdx-hardis.cloudity.com/hardis/lint/missingattributes) | weekly |\n\n",
|
|
7835
|
+
"examples": [
|
|
7836
|
+
"$ sf hardis:org:monitor:all"
|
|
7837
|
+
],
|
|
7838
|
+
"flags": {
|
|
7839
|
+
"json": {
|
|
7840
|
+
"description": "Format output as json.",
|
|
7841
|
+
"helpGroup": "GLOBAL",
|
|
7842
|
+
"name": "json",
|
|
7843
|
+
"allowNo": false,
|
|
7844
|
+
"type": "boolean"
|
|
7845
|
+
},
|
|
7846
|
+
"flags-dir": {
|
|
7847
|
+
"helpGroup": "GLOBAL",
|
|
7848
|
+
"name": "flags-dir",
|
|
7849
|
+
"summary": "Import flag values from a directory.",
|
|
7850
|
+
"hasDynamicHelp": false,
|
|
7851
|
+
"multiple": false,
|
|
7852
|
+
"type": "option"
|
|
7853
|
+
},
|
|
7854
|
+
"debug": {
|
|
7855
|
+
"char": "d",
|
|
7856
|
+
"description": "Activate debug mode (more logs)",
|
|
7857
|
+
"name": "debug",
|
|
7858
|
+
"allowNo": false,
|
|
7859
|
+
"type": "boolean"
|
|
7860
|
+
},
|
|
7861
|
+
"websocket": {
|
|
7862
|
+
"description": "Websocket host:port for VsCode SFDX Hardis UI integration",
|
|
7863
|
+
"name": "websocket",
|
|
7864
|
+
"hasDynamicHelp": false,
|
|
7865
|
+
"multiple": false,
|
|
7866
|
+
"type": "option"
|
|
7867
|
+
},
|
|
7868
|
+
"skipauth": {
|
|
7869
|
+
"description": "Skip authentication check when a default username is required",
|
|
7870
|
+
"name": "skipauth",
|
|
7871
|
+
"allowNo": false,
|
|
7872
|
+
"type": "boolean"
|
|
7873
|
+
},
|
|
7874
|
+
"target-org": {
|
|
7875
|
+
"aliases": [
|
|
7876
|
+
"targetusername",
|
|
7877
|
+
"u"
|
|
7878
|
+
],
|
|
7879
|
+
"char": "o",
|
|
7880
|
+
"deprecateAliases": true,
|
|
7881
|
+
"name": "target-org",
|
|
7882
|
+
"noCacheDefault": true,
|
|
7883
|
+
"required": true,
|
|
7884
|
+
"summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
|
|
7885
|
+
"hasDynamicHelp": true,
|
|
7886
|
+
"multiple": false,
|
|
7887
|
+
"type": "option"
|
|
7888
|
+
}
|
|
7889
|
+
},
|
|
7890
|
+
"hasDynamicHelp": true,
|
|
7891
|
+
"hiddenAliases": [],
|
|
7892
|
+
"id": "hardis:org:monitor:all",
|
|
7893
|
+
"pluginAlias": "sfdx-hardis",
|
|
7894
|
+
"pluginName": "sfdx-hardis",
|
|
7895
|
+
"pluginType": "core",
|
|
7896
|
+
"strict": true,
|
|
7897
|
+
"enableJsonFlag": true,
|
|
7898
|
+
"title": "Monitor org",
|
|
7899
|
+
"monitoringCommandsDefault": [
|
|
7900
|
+
{
|
|
7901
|
+
"key": "AUDIT_TRAIL",
|
|
7902
|
+
"title": "Detect suspect setup actions in major org",
|
|
7903
|
+
"command": "sf hardis:org:diagnose:audittrail",
|
|
7904
|
+
"frequency": "daily"
|
|
7905
|
+
},
|
|
7906
|
+
{
|
|
7907
|
+
"key": "LEGACY_API",
|
|
7908
|
+
"title": "Detect calls to deprecated API versions",
|
|
7909
|
+
"command": "sf hardis:org:diagnose:legacyapi",
|
|
7910
|
+
"frequency": "daily"
|
|
7911
|
+
},
|
|
7912
|
+
{
|
|
7913
|
+
"key": "ORG_LIMITS",
|
|
7914
|
+
"title": "Detect if org limits are close to be reached",
|
|
7915
|
+
"command": "sf hardis:org:monitor:limits",
|
|
7916
|
+
"frequency": "daily"
|
|
7917
|
+
},
|
|
7918
|
+
{
|
|
7919
|
+
"key": "UNSECURED_CONNECTED_APPS",
|
|
7920
|
+
"title": "Detect unsecured Connected Apps in an org",
|
|
7921
|
+
"command": "sf hardis:org:diagnose:unsecure-connected-apps",
|
|
7922
|
+
"frequency": "daily"
|
|
7923
|
+
},
|
|
7924
|
+
{
|
|
7925
|
+
"key": "LICENSES",
|
|
7926
|
+
"title": "Extract licenses information",
|
|
7927
|
+
"command": "sf hardis:org:diagnose:licenses",
|
|
7928
|
+
"frequency": "weekly"
|
|
7929
|
+
},
|
|
7930
|
+
{
|
|
7931
|
+
"key": "LINT_ACCESS",
|
|
7932
|
+
"title": "Detect custom elements with no access rights defined in permission sets",
|
|
7933
|
+
"command": "sf hardis:lint:access",
|
|
7934
|
+
"frequency": "weekly"
|
|
7935
|
+
},
|
|
7936
|
+
{
|
|
7937
|
+
"key": "UNUSED_LICENSES",
|
|
7938
|
+
"title": "Detect permission set licenses that are assigned to users that do not need them",
|
|
7939
|
+
"command": "sf hardis:org:diagnose:unusedlicenses",
|
|
7940
|
+
"frequency": "weekly"
|
|
7941
|
+
},
|
|
7942
|
+
{
|
|
7943
|
+
"key": "UNUSED_USERS",
|
|
7944
|
+
"title": "Detect active users without recent logins",
|
|
7945
|
+
"command": "sf hardis:org:diagnose:unusedusers",
|
|
7946
|
+
"frequency": "weekly"
|
|
7947
|
+
},
|
|
7948
|
+
{
|
|
7949
|
+
"key": "ACTIVE_USERS",
|
|
7950
|
+
"title": "Detect active users with recent logins",
|
|
7951
|
+
"command": "sf hardis:org:diagnose:unusedusers --returnactiveusers",
|
|
7952
|
+
"frequency": "weekly"
|
|
7953
|
+
},
|
|
7954
|
+
{
|
|
7955
|
+
"key": "ORG_INFO",
|
|
7956
|
+
"title": "Get org info + SF instance info + next major upgrade date",
|
|
7957
|
+
"command": "sf hardis:org:diagnose:instanceupgrade",
|
|
7958
|
+
"frequency": "weekly"
|
|
7959
|
+
},
|
|
7960
|
+
{
|
|
7961
|
+
"key": "RELEASE_UPDATES",
|
|
7962
|
+
"title": "Gather warnings about incoming and overdue Release Updates",
|
|
7963
|
+
"command": "sf hardis:org:diagnose:releaseupdates",
|
|
7964
|
+
"frequency": "weekly"
|
|
7965
|
+
},
|
|
7966
|
+
{
|
|
7967
|
+
"key": "UNUSED_METADATAS",
|
|
7968
|
+
"title": "Detect custom labels and custom permissions that are not in use",
|
|
7969
|
+
"command": "sf hardis:lint:unusedmetadatas",
|
|
7970
|
+
"frequency": "weekly"
|
|
7971
|
+
},
|
|
7972
|
+
{
|
|
7973
|
+
"key": "UNUSED_APEX_CLASSES",
|
|
7974
|
+
"title": "Detect unused Apex classes in an org",
|
|
7975
|
+
"command": "sf hardis:org:diagnose:unused-apex-classes",
|
|
7976
|
+
"frequency": "weekly"
|
|
7977
|
+
},
|
|
7978
|
+
{
|
|
7979
|
+
"key": "CONNECTED_APPS",
|
|
7980
|
+
"title": "Detect unused Connected Apps in an org",
|
|
7981
|
+
"command": "sf hardis:org:diagnose:unused-connected-apps",
|
|
7982
|
+
"frequency": "weekly"
|
|
7983
|
+
},
|
|
7984
|
+
{
|
|
7985
|
+
"key": "METADATA_STATUS",
|
|
7986
|
+
"title": "Detect inactive metadata",
|
|
7987
|
+
"command": "sf hardis:lint:metadatastatus",
|
|
7988
|
+
"frequency": "weekly"
|
|
7989
|
+
},
|
|
7990
|
+
{
|
|
7991
|
+
"key": "MISSING_ATTRIBUTES",
|
|
7992
|
+
"title": "Detect missing description on custom field",
|
|
7993
|
+
"command": "sf hardis:lint:missingattributes",
|
|
7994
|
+
"frequency": "weekly"
|
|
7995
|
+
}
|
|
7996
|
+
],
|
|
7997
|
+
"requiresProject": true,
|
|
7998
|
+
"triggerNotification": true,
|
|
7999
|
+
"isESM": true,
|
|
8000
|
+
"relativePath": [
|
|
8001
|
+
"lib",
|
|
8002
|
+
"commands",
|
|
8003
|
+
"hardis",
|
|
8004
|
+
"org",
|
|
8005
|
+
"monitor",
|
|
8006
|
+
"all.js"
|
|
8007
|
+
],
|
|
8008
|
+
"aliasPermutations": [],
|
|
8009
|
+
"permutations": [
|
|
8010
|
+
"hardis:org:monitor:all",
|
|
8011
8011
|
"org:hardis:monitor:all",
|
|
8012
8012
|
"org:monitor:hardis:all",
|
|
8013
8013
|
"org:monitor:all:hardis",
|
|
@@ -10236,229 +10236,9 @@
|
|
|
10236
10236
|
"hardis:project:audit:remotesites": {
|
|
10237
10237
|
"aliases": [],
|
|
10238
10238
|
"args": {},
|
|
10239
|
-
"description": "\n## Command Behavior\n\n**Audits Salesforce Remote Site Settings in your project, providing a comprehensive overview of external endpoints accessed by your Salesforce org.**\n\nThis command is crucial for security reviews, compliance checks, and understanding the external integrations of your Salesforce environment. It helps identify all configured remote sites, their URLs, activity status, and associated protocols.\n\nKey functionalities:\n\n- **Remote Site Discovery:** Scans your project for RemoteSiteSetting metadata files (.remoteSite-meta.xml or .remoteSite).\n- **URL Extraction:** Extracts the URL, active status, and description for each remote site.\n- **Protocol and Domain Identification:** Determines the protocol (HTTP/HTTPS) and extracts the domain from each URL, providing a clearer picture of the external systems being accessed.\n- **Reporting:** Generates a CSV report summarizing all detected remote sites, including their protocol, domain, name, URL, active status, and description.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **File Discovery:** Uses `glob` to find all RemoteSiteSetting metadata files within the project.\n- **Content Analysis:** Reads the content of each XML file and uses regular expressions (/<url>(.*?)<\\/url>/gim, /<isActive>(.*?)<\\/isActive>/gim, /<description>(.*?)<\\/description>/gim) to extract relevant details.\n- **`catchMatches` Utility:** This utility function is used to apply the defined regular expressions to each file and extract all matching occurrences.\n- **URL Parsing:** Uses Node.js's `url` module to parse the extracted URLs and `psl` (Public Suffix List) to extract the domain name from the hostname.\n- **Data Structuring:** Organizes the extracted information into a structured format, including the remote site's name, file name, namespace, URL, active status, description, protocol, and domain.\n- **Reporting:** Uses `generateReports` to create a CSV report and display a table in the console, summarizing the audit findings.\n</details>\n",
|
|
10240
|
-
"examples": [
|
|
10241
|
-
"$ sf hardis:project:audit:remotesites"
|
|
10242
|
-
],
|
|
10243
|
-
"flags": {
|
|
10244
|
-
"json": {
|
|
10245
|
-
"description": "Format output as json.",
|
|
10246
|
-
"helpGroup": "GLOBAL",
|
|
10247
|
-
"name": "json",
|
|
10248
|
-
"allowNo": false,
|
|
10249
|
-
"type": "boolean"
|
|
10250
|
-
},
|
|
10251
|
-
"flags-dir": {
|
|
10252
|
-
"helpGroup": "GLOBAL",
|
|
10253
|
-
"name": "flags-dir",
|
|
10254
|
-
"summary": "Import flag values from a directory.",
|
|
10255
|
-
"hasDynamicHelp": false,
|
|
10256
|
-
"multiple": false,
|
|
10257
|
-
"type": "option"
|
|
10258
|
-
},
|
|
10259
|
-
"debug": {
|
|
10260
|
-
"char": "d",
|
|
10261
|
-
"description": "Activate debug mode (more logs)",
|
|
10262
|
-
"name": "debug",
|
|
10263
|
-
"allowNo": false,
|
|
10264
|
-
"type": "boolean"
|
|
10265
|
-
},
|
|
10266
|
-
"websocket": {
|
|
10267
|
-
"description": "Websocket host:port for VsCode SFDX Hardis UI integration",
|
|
10268
|
-
"name": "websocket",
|
|
10269
|
-
"hasDynamicHelp": false,
|
|
10270
|
-
"multiple": false,
|
|
10271
|
-
"type": "option"
|
|
10272
|
-
},
|
|
10273
|
-
"skipauth": {
|
|
10274
|
-
"description": "Skip authentication check when a default username is required",
|
|
10275
|
-
"name": "skipauth",
|
|
10276
|
-
"allowNo": false,
|
|
10277
|
-
"type": "boolean"
|
|
10278
|
-
}
|
|
10279
|
-
},
|
|
10280
|
-
"hasDynamicHelp": false,
|
|
10281
|
-
"hiddenAliases": [],
|
|
10282
|
-
"id": "hardis:project:audit:remotesites",
|
|
10283
|
-
"pluginAlias": "sfdx-hardis",
|
|
10284
|
-
"pluginName": "sfdx-hardis",
|
|
10285
|
-
"pluginType": "core",
|
|
10286
|
-
"strict": true,
|
|
10287
|
-
"enableJsonFlag": true,
|
|
10288
|
-
"title": "Audit Remote Sites",
|
|
10289
|
-
"requiresProject": true,
|
|
10290
|
-
"isESM": true,
|
|
10291
|
-
"relativePath": [
|
|
10292
|
-
"lib",
|
|
10293
|
-
"commands",
|
|
10294
|
-
"hardis",
|
|
10295
|
-
"project",
|
|
10296
|
-
"audit",
|
|
10297
|
-
"remotesites.js"
|
|
10298
|
-
],
|
|
10299
|
-
"aliasPermutations": [],
|
|
10300
|
-
"permutations": [
|
|
10301
|
-
"hardis:project:audit:remotesites",
|
|
10302
|
-
"project:hardis:audit:remotesites",
|
|
10303
|
-
"project:audit:hardis:remotesites",
|
|
10304
|
-
"project:audit:remotesites:hardis",
|
|
10305
|
-
"hardis:audit:project:remotesites",
|
|
10306
|
-
"audit:hardis:project:remotesites",
|
|
10307
|
-
"audit:project:hardis:remotesites",
|
|
10308
|
-
"audit:project:remotesites:hardis",
|
|
10309
|
-
"hardis:audit:remotesites:project",
|
|
10310
|
-
"audit:hardis:remotesites:project",
|
|
10311
|
-
"audit:remotesites:hardis:project",
|
|
10312
|
-
"audit:remotesites:project:hardis",
|
|
10313
|
-
"hardis:project:remotesites:audit",
|
|
10314
|
-
"project:hardis:remotesites:audit",
|
|
10315
|
-
"project:remotesites:hardis:audit",
|
|
10316
|
-
"project:remotesites:audit:hardis",
|
|
10317
|
-
"hardis:remotesites:project:audit",
|
|
10318
|
-
"remotesites:hardis:project:audit",
|
|
10319
|
-
"remotesites:project:hardis:audit",
|
|
10320
|
-
"remotesites:project:audit:hardis",
|
|
10321
|
-
"hardis:remotesites:audit:project",
|
|
10322
|
-
"remotesites:hardis:audit:project",
|
|
10323
|
-
"remotesites:audit:hardis:project",
|
|
10324
|
-
"remotesites:audit:project:hardis"
|
|
10325
|
-
]
|
|
10326
|
-
},
|
|
10327
|
-
"hardis:project:configure:auth": {
|
|
10328
|
-
"aliases": [],
|
|
10329
|
-
"args": {},
|
|
10330
|
-
"description": "\n## Command Behavior\n\n**Configures authentication between a Git branch and a target Salesforce org for CI/CD deployments.**\n\nThis command facilitates the setup of automated CI/CD pipelines, enabling seamless deployments from specific Git branches to designated Salesforce orgs. It supports both standard Salesforce orgs and Dev Hub configurations, catering to various enterprise deployment workflows.\n\nKey functionalities include:\n\n- **Org Selection/Login:** Guides the user to select an existing Salesforce org or log in to a new one.\n- **Git Branch Association:** Allows associating a specific Git branch with the chosen Salesforce org.\n- **Merge Target Definition:** Enables defining target Git branches into which the configured branch can merge, ensuring controlled deployment flows.\n- **Salesforce Username Configuration:** Prompts for the Salesforce username to be used by the CI server for deployments.\n- **SSL Certificate Generation:** Automatically generates an SSL certificate for secure authentication.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's implementation involves several key technical aspects:\n\n- **SF CLI Integration:** Utilizes \n@salesforce/sf-plugins-core\n for command structure and flag parsing.\n- **Interactive Prompts:** Employs the \nprompts\n library for interactive user input, guiding the configuration process.\n- **Git Integration:** Interacts with Git to retrieve branch information using \n`git().branch([\"--list\", \"-r\"])`\n.\n- **Configuration Management:** Leverages internal utilities (`checkConfig`, `getConfig`, `setConfig`, `setInConfigFile`) to read from and write to project-specific configuration files (e.g., `.sfdx-hardis.<branchName>.yml`).\n- **Salesforce CLI Execution:** Executes Salesforce CLI commands programmatically via `execSfdxJson` for org interactions.\n- **SSL Certificate Generation:** Calls `generateSSLCertificate` to create necessary SSL certificates for JWT-based authentication.\n- **WebSocket Communication:** Uses `WebSocketClient` for potential communication with external tools or processes, such as restarting the command in VS Code.\n- **Dependency Check:** Ensures the presence of `openssl` on the system, which is required for SSL certificate generation.\n",
|
|
10331
|
-
"examples": [
|
|
10332
|
-
"$ sf hardis:project:configure:auth"
|
|
10333
|
-
],
|
|
10334
|
-
"flags": {
|
|
10335
|
-
"json": {
|
|
10336
|
-
"description": "Format output as json.",
|
|
10337
|
-
"helpGroup": "GLOBAL",
|
|
10338
|
-
"name": "json",
|
|
10339
|
-
"allowNo": false,
|
|
10340
|
-
"type": "boolean"
|
|
10341
|
-
},
|
|
10342
|
-
"flags-dir": {
|
|
10343
|
-
"helpGroup": "GLOBAL",
|
|
10344
|
-
"name": "flags-dir",
|
|
10345
|
-
"summary": "Import flag values from a directory.",
|
|
10346
|
-
"hasDynamicHelp": false,
|
|
10347
|
-
"multiple": false,
|
|
10348
|
-
"type": "option"
|
|
10349
|
-
},
|
|
10350
|
-
"devhub": {
|
|
10351
|
-
"char": "b",
|
|
10352
|
-
"description": "Configure project DevHub",
|
|
10353
|
-
"name": "devhub",
|
|
10354
|
-
"allowNo": false,
|
|
10355
|
-
"type": "boolean"
|
|
10356
|
-
},
|
|
10357
|
-
"debug": {
|
|
10358
|
-
"char": "d",
|
|
10359
|
-
"description": "Activate debug mode (more logs)",
|
|
10360
|
-
"name": "debug",
|
|
10361
|
-
"allowNo": false,
|
|
10362
|
-
"type": "boolean"
|
|
10363
|
-
},
|
|
10364
|
-
"websocket": {
|
|
10365
|
-
"description": "Websocket host:port for VsCode SFDX Hardis UI integration",
|
|
10366
|
-
"name": "websocket",
|
|
10367
|
-
"hasDynamicHelp": false,
|
|
10368
|
-
"multiple": false,
|
|
10369
|
-
"type": "option"
|
|
10370
|
-
},
|
|
10371
|
-
"skipauth": {
|
|
10372
|
-
"description": "Skip authentication check when a default username is required",
|
|
10373
|
-
"name": "skipauth",
|
|
10374
|
-
"allowNo": false,
|
|
10375
|
-
"type": "boolean"
|
|
10376
|
-
},
|
|
10377
|
-
"target-org": {
|
|
10378
|
-
"aliases": [
|
|
10379
|
-
"targetusername",
|
|
10380
|
-
"u"
|
|
10381
|
-
],
|
|
10382
|
-
"char": "o",
|
|
10383
|
-
"deprecateAliases": true,
|
|
10384
|
-
"name": "target-org",
|
|
10385
|
-
"noCacheDefault": true,
|
|
10386
|
-
"summary": "Username or alias of the target org.",
|
|
10387
|
-
"hasDynamicHelp": true,
|
|
10388
|
-
"multiple": false,
|
|
10389
|
-
"type": "option"
|
|
10390
|
-
},
|
|
10391
|
-
"target-dev-hub": {
|
|
10392
|
-
"aliases": [
|
|
10393
|
-
"targetdevhubusername"
|
|
10394
|
-
],
|
|
10395
|
-
"char": "v",
|
|
10396
|
-
"deprecateAliases": true,
|
|
10397
|
-
"name": "target-dev-hub",
|
|
10398
|
-
"noCacheDefault": true,
|
|
10399
|
-
"required": false,
|
|
10400
|
-
"summary": "Username or alias of the Dev Hub org.",
|
|
10401
|
-
"hasDynamicHelp": true,
|
|
10402
|
-
"multiple": false,
|
|
10403
|
-
"type": "option"
|
|
10404
|
-
}
|
|
10405
|
-
},
|
|
10406
|
-
"hasDynamicHelp": true,
|
|
10407
|
-
"hiddenAliases": [],
|
|
10408
|
-
"id": "hardis:project:configure:auth",
|
|
10409
|
-
"pluginAlias": "sfdx-hardis",
|
|
10410
|
-
"pluginName": "sfdx-hardis",
|
|
10411
|
-
"pluginType": "core",
|
|
10412
|
-
"strict": true,
|
|
10413
|
-
"enableJsonFlag": true,
|
|
10414
|
-
"title": "Configure authentication",
|
|
10415
|
-
"requiresProject": false,
|
|
10416
|
-
"requiresDependencies": [
|
|
10417
|
-
"openssl"
|
|
10418
|
-
],
|
|
10419
|
-
"isESM": true,
|
|
10420
|
-
"relativePath": [
|
|
10421
|
-
"lib",
|
|
10422
|
-
"commands",
|
|
10423
|
-
"hardis",
|
|
10424
|
-
"project",
|
|
10425
|
-
"configure",
|
|
10426
|
-
"auth.js"
|
|
10427
|
-
],
|
|
10428
|
-
"aliasPermutations": [],
|
|
10429
|
-
"permutations": [
|
|
10430
|
-
"hardis:project:configure:auth",
|
|
10431
|
-
"project:hardis:configure:auth",
|
|
10432
|
-
"project:configure:hardis:auth",
|
|
10433
|
-
"project:configure:auth:hardis",
|
|
10434
|
-
"hardis:configure:project:auth",
|
|
10435
|
-
"configure:hardis:project:auth",
|
|
10436
|
-
"configure:project:hardis:auth",
|
|
10437
|
-
"configure:project:auth:hardis",
|
|
10438
|
-
"hardis:configure:auth:project",
|
|
10439
|
-
"configure:hardis:auth:project",
|
|
10440
|
-
"configure:auth:hardis:project",
|
|
10441
|
-
"configure:auth:project:hardis",
|
|
10442
|
-
"hardis:project:auth:configure",
|
|
10443
|
-
"project:hardis:auth:configure",
|
|
10444
|
-
"project:auth:hardis:configure",
|
|
10445
|
-
"project:auth:configure:hardis",
|
|
10446
|
-
"hardis:auth:project:configure",
|
|
10447
|
-
"auth:hardis:project:configure",
|
|
10448
|
-
"auth:project:hardis:configure",
|
|
10449
|
-
"auth:project:configure:hardis",
|
|
10450
|
-
"hardis:auth:configure:project",
|
|
10451
|
-
"auth:hardis:configure:project",
|
|
10452
|
-
"auth:configure:hardis:project",
|
|
10453
|
-
"auth:configure:project:hardis"
|
|
10454
|
-
]
|
|
10455
|
-
},
|
|
10456
|
-
"hardis:project:convert:profilestopermsets": {
|
|
10457
|
-
"aliases": [],
|
|
10458
|
-
"args": {},
|
|
10459
|
-
"description": "\n## Command Behavior\n\n**Converts existing Salesforce Profiles into Permission Sets, facilitating a more granular and recommended security model.**\n\nThis command helps in migrating permissions from Profiles to Permission Sets, which is a best practice for managing user access in Salesforce. It creates a new Permission Set for each specified Profile, adopting a naming convention of `PS_PROFILENAME`.\n\nKey functionalities:\n\n- **Profile to Permission Set Conversion:** Automatically extracts permissions from a Profile and creates a corresponding Permission Set.\n- **Naming Convention:** New Permission Sets are named with a `PS_` prefix followed by the Profile name (e.g., `PS_Standard_User`).\n- **Exclusion Filter:** Allows you to exclude specific Profiles from the conversion process using the `--except` flag.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **External Plugin Integration:** It relies on the `shane-sfdx-plugins` (specifically the `sf shane:profile:convert` command) to perform the actual conversion.\n- **File System Scan:** It reads the contents of the `force-app/main/default/profiles` directory to identify all available Profile metadata files.\n- **Command Execution:** For each identified Profile (that is not excluded), it constructs and executes the `sf shane:profile:convert` command with the appropriate Profile name and desired Permission Set name.\n- **Error Handling:** Includes basic error handling for the external command execution.\n</details>\n",
|
|
10239
|
+
"description": "\n## Command Behavior\n\n**Audits Salesforce Remote Site Settings in your project, providing a comprehensive overview of external endpoints accessed by your Salesforce org.**\n\nThis command is crucial for security reviews, compliance checks, and understanding the external integrations of your Salesforce environment. It helps identify all configured remote sites, their URLs, activity status, and associated protocols.\n\nKey functionalities:\n\n- **Remote Site Discovery:** Scans your project for RemoteSiteSetting metadata files (.remoteSite-meta.xml or .remoteSite).\n- **URL Extraction:** Extracts the URL, active status, and description for each remote site.\n- **Protocol and Domain Identification:** Determines the protocol (HTTP/HTTPS) and extracts the domain from each URL, providing a clearer picture of the external systems being accessed.\n- **Reporting:** Generates a CSV report summarizing all detected remote sites, including their protocol, domain, name, URL, active status, and description.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **File Discovery:** Uses `glob` to find all RemoteSiteSetting metadata files within the project.\n- **Content Analysis:** Reads the content of each XML file and uses regular expressions (/<url>(.*?)<\\/url>/gim, /<isActive>(.*?)<\\/isActive>/gim, /<description>(.*?)<\\/description>/gim) to extract relevant details.\n- **`catchMatches` Utility:** This utility function is used to apply the defined regular expressions to each file and extract all matching occurrences.\n- **URL Parsing:** Uses Node.js's `url` module to parse the extracted URLs and `psl` (Public Suffix List) to extract the domain name from the hostname.\n- **Data Structuring:** Organizes the extracted information into a structured format, including the remote site's name, file name, namespace, URL, active status, description, protocol, and domain.\n- **Reporting:** Uses `generateReports` to create a CSV report and display a table in the console, summarizing the audit findings.\n</details>\n",
|
|
10460
10240
|
"examples": [
|
|
10461
|
-
"$ sf hardis:project:
|
|
10241
|
+
"$ sf hardis:project:audit:remotesites"
|
|
10462
10242
|
],
|
|
10463
10243
|
"flags": {
|
|
10464
10244
|
"json": {
|
|
@@ -10476,15 +10256,6 @@
|
|
|
10476
10256
|
"multiple": false,
|
|
10477
10257
|
"type": "option"
|
|
10478
10258
|
},
|
|
10479
|
-
"except": {
|
|
10480
|
-
"char": "e",
|
|
10481
|
-
"description": "List of filters",
|
|
10482
|
-
"name": "except",
|
|
10483
|
-
"default": [],
|
|
10484
|
-
"hasDynamicHelp": false,
|
|
10485
|
-
"multiple": true,
|
|
10486
|
-
"type": "option"
|
|
10487
|
-
},
|
|
10488
10259
|
"debug": {
|
|
10489
10260
|
"char": "d",
|
|
10490
10261
|
"description": "Activate debug mode (more logs)",
|
|
@@ -10508,52 +10279,49 @@
|
|
|
10508
10279
|
},
|
|
10509
10280
|
"hasDynamicHelp": false,
|
|
10510
10281
|
"hiddenAliases": [],
|
|
10511
|
-
"id": "hardis:project:
|
|
10282
|
+
"id": "hardis:project:audit:remotesites",
|
|
10512
10283
|
"pluginAlias": "sfdx-hardis",
|
|
10513
10284
|
"pluginName": "sfdx-hardis",
|
|
10514
10285
|
"pluginType": "core",
|
|
10515
10286
|
"strict": true,
|
|
10516
10287
|
"enableJsonFlag": true,
|
|
10517
|
-
"title": "
|
|
10288
|
+
"title": "Audit Remote Sites",
|
|
10518
10289
|
"requiresProject": true,
|
|
10519
|
-
"requiresSfdxPlugins": [
|
|
10520
|
-
"shane-sfdx-plugins"
|
|
10521
|
-
],
|
|
10522
10290
|
"isESM": true,
|
|
10523
10291
|
"relativePath": [
|
|
10524
10292
|
"lib",
|
|
10525
10293
|
"commands",
|
|
10526
10294
|
"hardis",
|
|
10527
10295
|
"project",
|
|
10528
|
-
"
|
|
10529
|
-
"
|
|
10296
|
+
"audit",
|
|
10297
|
+
"remotesites.js"
|
|
10530
10298
|
],
|
|
10531
10299
|
"aliasPermutations": [],
|
|
10532
10300
|
"permutations": [
|
|
10533
|
-
"hardis:project:
|
|
10534
|
-
"project:hardis:
|
|
10535
|
-
"project:
|
|
10536
|
-
"project:
|
|
10537
|
-
"hardis:
|
|
10538
|
-
"
|
|
10539
|
-
"
|
|
10540
|
-
"
|
|
10541
|
-
"hardis:
|
|
10542
|
-
"
|
|
10543
|
-
"
|
|
10544
|
-
"
|
|
10545
|
-
"hardis:project:
|
|
10546
|
-
"project:hardis:
|
|
10547
|
-
"project:
|
|
10548
|
-
"project:
|
|
10549
|
-
"hardis:
|
|
10550
|
-
"
|
|
10551
|
-
"
|
|
10552
|
-
"
|
|
10553
|
-
"hardis:
|
|
10554
|
-
"
|
|
10555
|
-
"
|
|
10556
|
-
"
|
|
10301
|
+
"hardis:project:audit:remotesites",
|
|
10302
|
+
"project:hardis:audit:remotesites",
|
|
10303
|
+
"project:audit:hardis:remotesites",
|
|
10304
|
+
"project:audit:remotesites:hardis",
|
|
10305
|
+
"hardis:audit:project:remotesites",
|
|
10306
|
+
"audit:hardis:project:remotesites",
|
|
10307
|
+
"audit:project:hardis:remotesites",
|
|
10308
|
+
"audit:project:remotesites:hardis",
|
|
10309
|
+
"hardis:audit:remotesites:project",
|
|
10310
|
+
"audit:hardis:remotesites:project",
|
|
10311
|
+
"audit:remotesites:hardis:project",
|
|
10312
|
+
"audit:remotesites:project:hardis",
|
|
10313
|
+
"hardis:project:remotesites:audit",
|
|
10314
|
+
"project:hardis:remotesites:audit",
|
|
10315
|
+
"project:remotesites:hardis:audit",
|
|
10316
|
+
"project:remotesites:audit:hardis",
|
|
10317
|
+
"hardis:remotesites:project:audit",
|
|
10318
|
+
"remotesites:hardis:project:audit",
|
|
10319
|
+
"remotesites:project:hardis:audit",
|
|
10320
|
+
"remotesites:project:audit:hardis",
|
|
10321
|
+
"hardis:remotesites:audit:project",
|
|
10322
|
+
"remotesites:hardis:audit:project",
|
|
10323
|
+
"remotesites:audit:hardis:project",
|
|
10324
|
+
"remotesites:audit:project:hardis"
|
|
10557
10325
|
]
|
|
10558
10326
|
},
|
|
10559
10327
|
"hardis:project:clean:emptyitems": {
|
|
@@ -12142,12 +11910,12 @@
|
|
|
12142
11910
|
"xml:clean:project:hardis"
|
|
12143
11911
|
]
|
|
12144
11912
|
},
|
|
12145
|
-
"hardis:project:
|
|
11913
|
+
"hardis:project:convert:profilestopermsets": {
|
|
12146
11914
|
"aliases": [],
|
|
12147
11915
|
"args": {},
|
|
12148
|
-
"description": "\n## Command Behavior\n\n**
|
|
11916
|
+
"description": "\n## Command Behavior\n\n**Converts existing Salesforce Profiles into Permission Sets, facilitating a more granular and recommended security model.**\n\nThis command helps in migrating permissions from Profiles to Permission Sets, which is a best practice for managing user access in Salesforce. It creates a new Permission Set for each specified Profile, adopting a naming convention of `PS_PROFILENAME`.\n\nKey functionalities:\n\n- **Profile to Permission Set Conversion:** Automatically extracts permissions from a Profile and creates a corresponding Permission Set.\n- **Naming Convention:** New Permission Sets are named with a `PS_` prefix followed by the Profile name (e.g., `PS_Standard_User`).\n- **Exclusion Filter:** Allows you to exclude specific Profiles from the conversion process using the `--except` flag.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **External Plugin Integration:** It relies on the `shane-sfdx-plugins` (specifically the `sf shane:profile:convert` command) to perform the actual conversion.\n- **File System Scan:** It reads the contents of the `force-app/main/default/profiles` directory to identify all available Profile metadata files.\n- **Command Execution:** For each identified Profile (that is not excluded), it constructs and executes the `sf shane:profile:convert` command with the appropriate Profile name and desired Permission Set name.\n- **Error Handling:** Includes basic error handling for the external command execution.\n</details>\n",
|
|
12149
11917
|
"examples": [
|
|
12150
|
-
"$ sf hardis:project:
|
|
11918
|
+
"$ sf hardis:project:convert:profilestopermsets"
|
|
12151
11919
|
],
|
|
12152
11920
|
"flags": {
|
|
12153
11921
|
"json": {
|
|
@@ -12165,13 +11933,13 @@
|
|
|
12165
11933
|
"multiple": false,
|
|
12166
11934
|
"type": "option"
|
|
12167
11935
|
},
|
|
12168
|
-
"
|
|
12169
|
-
"char": "
|
|
12170
|
-
"description": "
|
|
12171
|
-
"name": "
|
|
12172
|
-
"default":
|
|
11936
|
+
"except": {
|
|
11937
|
+
"char": "e",
|
|
11938
|
+
"description": "List of filters",
|
|
11939
|
+
"name": "except",
|
|
11940
|
+
"default": [],
|
|
12173
11941
|
"hasDynamicHelp": false,
|
|
12174
|
-
"multiple":
|
|
11942
|
+
"multiple": true,
|
|
12175
11943
|
"type": "option"
|
|
12176
11944
|
},
|
|
12177
11945
|
"debug": {
|
|
@@ -12193,76 +11961,64 @@
|
|
|
12193
11961
|
"name": "skipauth",
|
|
12194
11962
|
"allowNo": false,
|
|
12195
11963
|
"type": "boolean"
|
|
12196
|
-
},
|
|
12197
|
-
"target-org": {
|
|
12198
|
-
"aliases": [
|
|
12199
|
-
"targetusername",
|
|
12200
|
-
"u"
|
|
12201
|
-
],
|
|
12202
|
-
"char": "o",
|
|
12203
|
-
"deprecateAliases": true,
|
|
12204
|
-
"name": "target-org",
|
|
12205
|
-
"noCacheDefault": true,
|
|
12206
|
-
"required": true,
|
|
12207
|
-
"summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
|
|
12208
|
-
"hasDynamicHelp": true,
|
|
12209
|
-
"multiple": false,
|
|
12210
|
-
"type": "option"
|
|
12211
11964
|
}
|
|
12212
11965
|
},
|
|
12213
|
-
"hasDynamicHelp":
|
|
11966
|
+
"hasDynamicHelp": false,
|
|
12214
11967
|
"hiddenAliases": [],
|
|
12215
|
-
"id": "hardis:project:
|
|
11968
|
+
"id": "hardis:project:convert:profilestopermsets",
|
|
12216
11969
|
"pluginAlias": "sfdx-hardis",
|
|
12217
11970
|
"pluginName": "sfdx-hardis",
|
|
12218
11971
|
"pluginType": "core",
|
|
12219
11972
|
"strict": true,
|
|
12220
11973
|
"enableJsonFlag": true,
|
|
12221
|
-
"title": "
|
|
11974
|
+
"title": "Convert Profiles into Permission Sets",
|
|
12222
11975
|
"requiresProject": true,
|
|
11976
|
+
"requiresSfdxPlugins": [
|
|
11977
|
+
"shane-sfdx-plugins"
|
|
11978
|
+
],
|
|
12223
11979
|
"isESM": true,
|
|
12224
11980
|
"relativePath": [
|
|
12225
11981
|
"lib",
|
|
12226
11982
|
"commands",
|
|
12227
11983
|
"hardis",
|
|
12228
11984
|
"project",
|
|
12229
|
-
"
|
|
12230
|
-
"
|
|
11985
|
+
"convert",
|
|
11986
|
+
"profilestopermsets.js"
|
|
12231
11987
|
],
|
|
12232
11988
|
"aliasPermutations": [],
|
|
12233
11989
|
"permutations": [
|
|
12234
|
-
"hardis:project:
|
|
12235
|
-
"project:hardis:
|
|
12236
|
-
"project:
|
|
12237
|
-
"project:
|
|
12238
|
-
"hardis:
|
|
12239
|
-
"
|
|
12240
|
-
"
|
|
12241
|
-
"
|
|
12242
|
-
"hardis:
|
|
12243
|
-
"
|
|
12244
|
-
"
|
|
12245
|
-
"
|
|
12246
|
-
"hardis:project:
|
|
12247
|
-
"project:hardis:
|
|
12248
|
-
"project:
|
|
12249
|
-
"project:
|
|
12250
|
-
"hardis:
|
|
12251
|
-
"
|
|
12252
|
-
"
|
|
12253
|
-
"
|
|
12254
|
-
"hardis:
|
|
12255
|
-
"
|
|
12256
|
-
"
|
|
12257
|
-
"
|
|
11990
|
+
"hardis:project:convert:profilestopermsets",
|
|
11991
|
+
"project:hardis:convert:profilestopermsets",
|
|
11992
|
+
"project:convert:hardis:profilestopermsets",
|
|
11993
|
+
"project:convert:profilestopermsets:hardis",
|
|
11994
|
+
"hardis:convert:project:profilestopermsets",
|
|
11995
|
+
"convert:hardis:project:profilestopermsets",
|
|
11996
|
+
"convert:project:hardis:profilestopermsets",
|
|
11997
|
+
"convert:project:profilestopermsets:hardis",
|
|
11998
|
+
"hardis:convert:profilestopermsets:project",
|
|
11999
|
+
"convert:hardis:profilestopermsets:project",
|
|
12000
|
+
"convert:profilestopermsets:hardis:project",
|
|
12001
|
+
"convert:profilestopermsets:project:hardis",
|
|
12002
|
+
"hardis:project:profilestopermsets:convert",
|
|
12003
|
+
"project:hardis:profilestopermsets:convert",
|
|
12004
|
+
"project:profilestopermsets:hardis:convert",
|
|
12005
|
+
"project:profilestopermsets:convert:hardis",
|
|
12006
|
+
"hardis:profilestopermsets:project:convert",
|
|
12007
|
+
"profilestopermsets:hardis:project:convert",
|
|
12008
|
+
"profilestopermsets:project:hardis:convert",
|
|
12009
|
+
"profilestopermsets:project:convert:hardis",
|
|
12010
|
+
"hardis:profilestopermsets:convert:project",
|
|
12011
|
+
"profilestopermsets:hardis:convert:project",
|
|
12012
|
+
"profilestopermsets:convert:hardis:project",
|
|
12013
|
+
"profilestopermsets:convert:project:hardis"
|
|
12258
12014
|
]
|
|
12259
12015
|
},
|
|
12260
|
-
"hardis:project:
|
|
12016
|
+
"hardis:project:configure:auth": {
|
|
12261
12017
|
"aliases": [],
|
|
12262
12018
|
"args": {},
|
|
12263
|
-
"description": "\n## Command Behavior\n\n**
|
|
12019
|
+
"description": "\n## Command Behavior\n\n**Configures authentication between a Git branch and a target Salesforce org for CI/CD deployments.**\n\nThis command facilitates the setup of automated CI/CD pipelines, enabling seamless deployments from specific Git branches to designated Salesforce orgs. It supports both standard Salesforce orgs and Dev Hub configurations, catering to various enterprise deployment workflows.\n\nKey functionalities include:\n\n- **Org Selection/Login:** Guides the user to select an existing Salesforce org or log in to a new one.\n- **Git Branch Association:** Allows associating a specific Git branch with the chosen Salesforce org.\n- **Merge Target Definition:** Enables defining target Git branches into which the configured branch can merge, ensuring controlled deployment flows.\n- **Salesforce Username Configuration:** Prompts for the Salesforce username to be used by the CI server for deployments.\n- **SSL Certificate Generation:** Automatically generates an SSL certificate for secure authentication.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's implementation involves several key technical aspects:\n\n- **SF CLI Integration:** Utilizes \n@salesforce/sf-plugins-core\n for command structure and flag parsing.\n- **Interactive Prompts:** Employs the \nprompts\n library for interactive user input, guiding the configuration process.\n- **Git Integration:** Interacts with Git to retrieve branch information using \n`git().branch([\"--list\", \"-r\"])`\n.\n- **Configuration Management:** Leverages internal utilities (`checkConfig`, `getConfig`, `setConfig`, `setInConfigFile`) to read from and write to project-specific configuration files (e.g., `.sfdx-hardis.<branchName>.yml`).\n- **Salesforce CLI Execution:** Executes Salesforce CLI commands programmatically via `execSfdxJson` for org interactions.\n- **SSL Certificate Generation:** Calls `generateSSLCertificate` to create necessary SSL certificates for JWT-based authentication.\n- **WebSocket Communication:** Uses `WebSocketClient` for potential communication with external tools or processes, such as restarting the command in VS Code.\n- **Dependency Check:** Ensures the presence of `openssl` on the system, which is required for SSL certificate generation.\n",
|
|
12264
12020
|
"examples": [
|
|
12265
|
-
"$ sf hardis:project:
|
|
12021
|
+
"$ sf hardis:project:configure:auth"
|
|
12266
12022
|
],
|
|
12267
12023
|
"flags": {
|
|
12268
12024
|
"json": {
|
|
@@ -12280,14 +12036,12 @@
|
|
|
12280
12036
|
"multiple": false,
|
|
12281
12037
|
"type": "option"
|
|
12282
12038
|
},
|
|
12283
|
-
"
|
|
12284
|
-
"char": "
|
|
12285
|
-
"description": "
|
|
12286
|
-
"name": "
|
|
12287
|
-
"
|
|
12288
|
-
"
|
|
12289
|
-
"multiple": false,
|
|
12290
|
-
"type": "option"
|
|
12039
|
+
"devhub": {
|
|
12040
|
+
"char": "b",
|
|
12041
|
+
"description": "Configure project DevHub",
|
|
12042
|
+
"name": "devhub",
|
|
12043
|
+
"allowNo": false,
|
|
12044
|
+
"type": "boolean"
|
|
12291
12045
|
},
|
|
12292
12046
|
"debug": {
|
|
12293
12047
|
"char": "d",
|
|
@@ -12308,53 +12062,84 @@
|
|
|
12308
12062
|
"name": "skipauth",
|
|
12309
12063
|
"allowNo": false,
|
|
12310
12064
|
"type": "boolean"
|
|
12065
|
+
},
|
|
12066
|
+
"target-org": {
|
|
12067
|
+
"aliases": [
|
|
12068
|
+
"targetusername",
|
|
12069
|
+
"u"
|
|
12070
|
+
],
|
|
12071
|
+
"char": "o",
|
|
12072
|
+
"deprecateAliases": true,
|
|
12073
|
+
"name": "target-org",
|
|
12074
|
+
"noCacheDefault": true,
|
|
12075
|
+
"summary": "Username or alias of the target org.",
|
|
12076
|
+
"hasDynamicHelp": true,
|
|
12077
|
+
"multiple": false,
|
|
12078
|
+
"type": "option"
|
|
12079
|
+
},
|
|
12080
|
+
"target-dev-hub": {
|
|
12081
|
+
"aliases": [
|
|
12082
|
+
"targetdevhubusername"
|
|
12083
|
+
],
|
|
12084
|
+
"char": "v",
|
|
12085
|
+
"deprecateAliases": true,
|
|
12086
|
+
"name": "target-dev-hub",
|
|
12087
|
+
"noCacheDefault": true,
|
|
12088
|
+
"required": false,
|
|
12089
|
+
"summary": "Username or alias of the Dev Hub org.",
|
|
12090
|
+
"hasDynamicHelp": true,
|
|
12091
|
+
"multiple": false,
|
|
12092
|
+
"type": "option"
|
|
12311
12093
|
}
|
|
12312
12094
|
},
|
|
12313
|
-
"hasDynamicHelp":
|
|
12095
|
+
"hasDynamicHelp": true,
|
|
12314
12096
|
"hiddenAliases": [],
|
|
12315
|
-
"id": "hardis:project:
|
|
12097
|
+
"id": "hardis:project:configure:auth",
|
|
12316
12098
|
"pluginAlias": "sfdx-hardis",
|
|
12317
12099
|
"pluginName": "sfdx-hardis",
|
|
12318
12100
|
"pluginType": "core",
|
|
12319
12101
|
"strict": true,
|
|
12320
|
-
"enableJsonFlag": true,
|
|
12321
|
-
"title": "
|
|
12322
|
-
"requiresProject":
|
|
12323
|
-
"
|
|
12324
|
-
|
|
12325
|
-
|
|
12326
|
-
|
|
12327
|
-
|
|
12328
|
-
"
|
|
12329
|
-
"
|
|
12330
|
-
"
|
|
12331
|
-
|
|
12332
|
-
|
|
12333
|
-
|
|
12334
|
-
|
|
12335
|
-
|
|
12336
|
-
|
|
12337
|
-
"project:
|
|
12338
|
-
"hardis:
|
|
12339
|
-
"
|
|
12340
|
-
"
|
|
12341
|
-
"
|
|
12342
|
-
"hardis:
|
|
12343
|
-
"
|
|
12344
|
-
"
|
|
12345
|
-
"
|
|
12346
|
-
"hardis:project
|
|
12347
|
-
"
|
|
12348
|
-
"project:
|
|
12349
|
-
"project:
|
|
12350
|
-
"hardis:
|
|
12351
|
-
"
|
|
12352
|
-
"
|
|
12353
|
-
"
|
|
12354
|
-
"hardis:
|
|
12355
|
-
"
|
|
12356
|
-
"
|
|
12357
|
-
"
|
|
12102
|
+
"enableJsonFlag": true,
|
|
12103
|
+
"title": "Configure authentication",
|
|
12104
|
+
"requiresProject": false,
|
|
12105
|
+
"requiresDependencies": [
|
|
12106
|
+
"openssl"
|
|
12107
|
+
],
|
|
12108
|
+
"isESM": true,
|
|
12109
|
+
"relativePath": [
|
|
12110
|
+
"lib",
|
|
12111
|
+
"commands",
|
|
12112
|
+
"hardis",
|
|
12113
|
+
"project",
|
|
12114
|
+
"configure",
|
|
12115
|
+
"auth.js"
|
|
12116
|
+
],
|
|
12117
|
+
"aliasPermutations": [],
|
|
12118
|
+
"permutations": [
|
|
12119
|
+
"hardis:project:configure:auth",
|
|
12120
|
+
"project:hardis:configure:auth",
|
|
12121
|
+
"project:configure:hardis:auth",
|
|
12122
|
+
"project:configure:auth:hardis",
|
|
12123
|
+
"hardis:configure:project:auth",
|
|
12124
|
+
"configure:hardis:project:auth",
|
|
12125
|
+
"configure:project:hardis:auth",
|
|
12126
|
+
"configure:project:auth:hardis",
|
|
12127
|
+
"hardis:configure:auth:project",
|
|
12128
|
+
"configure:hardis:auth:project",
|
|
12129
|
+
"configure:auth:hardis:project",
|
|
12130
|
+
"configure:auth:project:hardis",
|
|
12131
|
+
"hardis:project:auth:configure",
|
|
12132
|
+
"project:hardis:auth:configure",
|
|
12133
|
+
"project:auth:hardis:configure",
|
|
12134
|
+
"project:auth:configure:hardis",
|
|
12135
|
+
"hardis:auth:project:configure",
|
|
12136
|
+
"auth:hardis:project:configure",
|
|
12137
|
+
"auth:project:hardis:configure",
|
|
12138
|
+
"auth:project:configure:hardis",
|
|
12139
|
+
"hardis:auth:configure:project",
|
|
12140
|
+
"auth:hardis:configure:project",
|
|
12141
|
+
"auth:configure:hardis:project",
|
|
12142
|
+
"auth:configure:project:hardis"
|
|
12358
12143
|
]
|
|
12359
12144
|
},
|
|
12360
12145
|
"hardis:project:deploy:notify": {
|
|
@@ -13531,6 +13316,221 @@
|
|
|
13531
13316
|
"validate:deploy:project:hardis"
|
|
13532
13317
|
]
|
|
13533
13318
|
},
|
|
13319
|
+
"hardis:project:fix:profiletabs": {
|
|
13320
|
+
"aliases": [],
|
|
13321
|
+
"args": {},
|
|
13322
|
+
"description": "\n## Command Behavior\n\n**Interactively updates tab visibility settings in Salesforce profiles, addressing a common issue where tab visibilities are not correctly retrieved by `sf project retrieve start`.**\n\nThis command provides a user-friendly interface to manage tab settings within your profile XML files, ensuring that your local project accurately reflects the intended tab configurations in your Salesforce org.\n\nKey functionalities:\n\n- **Interactive Tab Selection:** Displays a multi-select menu of all available tabs in your org, allowing you to choose which tabs to update.\n- **Visibility Control:** Lets you set the visibility for the selected tabs to either `DefaultOn` (Visible) or `Hidden`.\n- **Profile Selection:** Presents a multi-select menu of all .profile-meta.xml files in your project, allowing you to apply the tab visibility changes to specific profiles.\n- **XML Updates:** Modifies the <tabVisibilities> section of the selected profile XML files to reflect the chosen tab settings. If a tab visibility setting already exists for a selected tab, it will be updated; otherwise, a new one will be added.\n- **Sorted Output:** The <tabVisibilities> in the updated profile XML files are sorted alphabetically for consistency and readability.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **SOQL Queries (Tooling API):** It queries the `TabDefinition` object using `soqlQueryTooling` to retrieve a list of all available tabs in the target org.\n- **File Discovery:** Uses `glob` to find all .profile-meta.xml files within the specified project path.\n- **Interactive Prompts:** Leverages the `prompts` library to create interactive menus for selecting tabs, visibility settings, and profiles.\n- **XML Parsing and Manipulation:** Uses `parseXmlFile` to read the content of profile XML files and `writeXmlFile` to write the modified content back. It manipulates the `tabVisibilities` array within the parsed XML to add or update tab settings.\n- **Array Sorting:** Employs the `sort-array` library to sort the `tabVisibilities` alphabetically by tab name.\n- **Logging:** Provides feedback to the user about which profiles have been updated and a summary of the changes.\n</details>\n",
|
|
13323
|
+
"examples": [
|
|
13324
|
+
"$ sf hardis:project:fix:profiletabs"
|
|
13325
|
+
],
|
|
13326
|
+
"flags": {
|
|
13327
|
+
"json": {
|
|
13328
|
+
"description": "Format output as json.",
|
|
13329
|
+
"helpGroup": "GLOBAL",
|
|
13330
|
+
"name": "json",
|
|
13331
|
+
"allowNo": false,
|
|
13332
|
+
"type": "boolean"
|
|
13333
|
+
},
|
|
13334
|
+
"flags-dir": {
|
|
13335
|
+
"helpGroup": "GLOBAL",
|
|
13336
|
+
"name": "flags-dir",
|
|
13337
|
+
"summary": "Import flag values from a directory.",
|
|
13338
|
+
"hasDynamicHelp": false,
|
|
13339
|
+
"multiple": false,
|
|
13340
|
+
"type": "option"
|
|
13341
|
+
},
|
|
13342
|
+
"path": {
|
|
13343
|
+
"char": "p",
|
|
13344
|
+
"description": "Root folder",
|
|
13345
|
+
"name": "path",
|
|
13346
|
+
"default": "/home/runner/work/sfdx-hardis/sfdx-hardis",
|
|
13347
|
+
"hasDynamicHelp": false,
|
|
13348
|
+
"multiple": false,
|
|
13349
|
+
"type": "option"
|
|
13350
|
+
},
|
|
13351
|
+
"debug": {
|
|
13352
|
+
"char": "d",
|
|
13353
|
+
"description": "Activate debug mode (more logs)",
|
|
13354
|
+
"name": "debug",
|
|
13355
|
+
"allowNo": false,
|
|
13356
|
+
"type": "boolean"
|
|
13357
|
+
},
|
|
13358
|
+
"websocket": {
|
|
13359
|
+
"description": "Websocket host:port for VsCode SFDX Hardis UI integration",
|
|
13360
|
+
"name": "websocket",
|
|
13361
|
+
"hasDynamicHelp": false,
|
|
13362
|
+
"multiple": false,
|
|
13363
|
+
"type": "option"
|
|
13364
|
+
},
|
|
13365
|
+
"skipauth": {
|
|
13366
|
+
"description": "Skip authentication check when a default username is required",
|
|
13367
|
+
"name": "skipauth",
|
|
13368
|
+
"allowNo": false,
|
|
13369
|
+
"type": "boolean"
|
|
13370
|
+
},
|
|
13371
|
+
"target-org": {
|
|
13372
|
+
"aliases": [
|
|
13373
|
+
"targetusername",
|
|
13374
|
+
"u"
|
|
13375
|
+
],
|
|
13376
|
+
"char": "o",
|
|
13377
|
+
"deprecateAliases": true,
|
|
13378
|
+
"name": "target-org",
|
|
13379
|
+
"noCacheDefault": true,
|
|
13380
|
+
"required": true,
|
|
13381
|
+
"summary": "Username or alias of the target org. Not required if the `target-org` configuration variable is already set.",
|
|
13382
|
+
"hasDynamicHelp": true,
|
|
13383
|
+
"multiple": false,
|
|
13384
|
+
"type": "option"
|
|
13385
|
+
}
|
|
13386
|
+
},
|
|
13387
|
+
"hasDynamicHelp": true,
|
|
13388
|
+
"hiddenAliases": [],
|
|
13389
|
+
"id": "hardis:project:fix:profiletabs",
|
|
13390
|
+
"pluginAlias": "sfdx-hardis",
|
|
13391
|
+
"pluginName": "sfdx-hardis",
|
|
13392
|
+
"pluginType": "core",
|
|
13393
|
+
"strict": true,
|
|
13394
|
+
"enableJsonFlag": true,
|
|
13395
|
+
"title": "Fix profiles to add tabs that are not retrieved by SF CLI",
|
|
13396
|
+
"requiresProject": true,
|
|
13397
|
+
"isESM": true,
|
|
13398
|
+
"relativePath": [
|
|
13399
|
+
"lib",
|
|
13400
|
+
"commands",
|
|
13401
|
+
"hardis",
|
|
13402
|
+
"project",
|
|
13403
|
+
"fix",
|
|
13404
|
+
"profiletabs.js"
|
|
13405
|
+
],
|
|
13406
|
+
"aliasPermutations": [],
|
|
13407
|
+
"permutations": [
|
|
13408
|
+
"hardis:project:fix:profiletabs",
|
|
13409
|
+
"project:hardis:fix:profiletabs",
|
|
13410
|
+
"project:fix:hardis:profiletabs",
|
|
13411
|
+
"project:fix:profiletabs:hardis",
|
|
13412
|
+
"hardis:fix:project:profiletabs",
|
|
13413
|
+
"fix:hardis:project:profiletabs",
|
|
13414
|
+
"fix:project:hardis:profiletabs",
|
|
13415
|
+
"fix:project:profiletabs:hardis",
|
|
13416
|
+
"hardis:fix:profiletabs:project",
|
|
13417
|
+
"fix:hardis:profiletabs:project",
|
|
13418
|
+
"fix:profiletabs:hardis:project",
|
|
13419
|
+
"fix:profiletabs:project:hardis",
|
|
13420
|
+
"hardis:project:profiletabs:fix",
|
|
13421
|
+
"project:hardis:profiletabs:fix",
|
|
13422
|
+
"project:profiletabs:hardis:fix",
|
|
13423
|
+
"project:profiletabs:fix:hardis",
|
|
13424
|
+
"hardis:profiletabs:project:fix",
|
|
13425
|
+
"profiletabs:hardis:project:fix",
|
|
13426
|
+
"profiletabs:project:hardis:fix",
|
|
13427
|
+
"profiletabs:project:fix:hardis",
|
|
13428
|
+
"hardis:profiletabs:fix:project",
|
|
13429
|
+
"profiletabs:hardis:fix:project",
|
|
13430
|
+
"profiletabs:fix:hardis:project",
|
|
13431
|
+
"profiletabs:fix:project:hardis"
|
|
13432
|
+
]
|
|
13433
|
+
},
|
|
13434
|
+
"hardis:project:fix:v53flexipages": {
|
|
13435
|
+
"aliases": [],
|
|
13436
|
+
"args": {},
|
|
13437
|
+
"description": "\n## Command Behavior\n\n**Fixes Salesforce FlexiPages for compatibility with API Version 53.0 (Winter '22 release) by adding missing identifiers to component instances.**\n\nSalesforce introduced a change in API Version 53.0 that requires `identifier` tags within `componentInstance` and `fieldInstance` elements in FlexiPage metadata. If these identifiers are missing, deployments to orgs with API version 53.0 or higher will fail. This command automates the process of adding these missing identifiers, ensuring your FlexiPages remain deployable.\n\nKey functionalities:\n\n- **Targeted FlexiPage Processing:** Scans all .flexipage-meta.xml files within the specified root folder (defaults to current working directory).\n- **Identifier Injection:** Inserts a unique `identifier` tag (e.g., `SFDX_HARDIS_REPLACEMENT_ID`) into `componentInstance` and `fieldInstance` elements that lack one.\n\n**Important Note:** After running this command, ensure you update your `apiVersion` to `53.0` (or higher) in your `package.xml` and `sfdx-project.json` files.\n\n<details markdown=\"1\">\n<summary>Technical explanations</summary>\n\nThe command's technical implementation involves:\n\n- **File Discovery:** Uses `glob` to find all .flexipage-meta.xml files.\n- **Content Reading:** Reads the XML content of each FlexiPage file.\n- **Regular Expression Replacement:** Employs a set of regular expressions to identify specific XML patterns (componentName.../componentName.../componentInstance, componentName.../componentName.../visibilityRule, fieldItem.../fieldItem.../fieldInstance) that are missing the `identifier` tag.\n- **Dynamic ID Generation:** For each match, it generates a unique identifier (e.g., `sfdxHardisIdX`) and injects it into the XML structure.\n- **File Writing:** If changes are made, the modified XML content is written back to the FlexiPage file using `fs.writeFile`.\n- **Logging:** Provides messages about which FlexiPages are being processed and a summary of the total number of identifiers added.\n</details>\n",
|
|
13438
|
+
"examples": [
|
|
13439
|
+
"$ sf hardis:project:fix:v53flexipages"
|
|
13440
|
+
],
|
|
13441
|
+
"flags": {
|
|
13442
|
+
"json": {
|
|
13443
|
+
"description": "Format output as json.",
|
|
13444
|
+
"helpGroup": "GLOBAL",
|
|
13445
|
+
"name": "json",
|
|
13446
|
+
"allowNo": false,
|
|
13447
|
+
"type": "boolean"
|
|
13448
|
+
},
|
|
13449
|
+
"flags-dir": {
|
|
13450
|
+
"helpGroup": "GLOBAL",
|
|
13451
|
+
"name": "flags-dir",
|
|
13452
|
+
"summary": "Import flag values from a directory.",
|
|
13453
|
+
"hasDynamicHelp": false,
|
|
13454
|
+
"multiple": false,
|
|
13455
|
+
"type": "option"
|
|
13456
|
+
},
|
|
13457
|
+
"path": {
|
|
13458
|
+
"char": "p",
|
|
13459
|
+
"description": "Root folder",
|
|
13460
|
+
"name": "path",
|
|
13461
|
+
"default": "/home/runner/work/sfdx-hardis/sfdx-hardis",
|
|
13462
|
+
"hasDynamicHelp": false,
|
|
13463
|
+
"multiple": false,
|
|
13464
|
+
"type": "option"
|
|
13465
|
+
},
|
|
13466
|
+
"debug": {
|
|
13467
|
+
"char": "d",
|
|
13468
|
+
"description": "Activate debug mode (more logs)",
|
|
13469
|
+
"name": "debug",
|
|
13470
|
+
"allowNo": false,
|
|
13471
|
+
"type": "boolean"
|
|
13472
|
+
},
|
|
13473
|
+
"websocket": {
|
|
13474
|
+
"description": "Websocket host:port for VsCode SFDX Hardis UI integration",
|
|
13475
|
+
"name": "websocket",
|
|
13476
|
+
"hasDynamicHelp": false,
|
|
13477
|
+
"multiple": false,
|
|
13478
|
+
"type": "option"
|
|
13479
|
+
},
|
|
13480
|
+
"skipauth": {
|
|
13481
|
+
"description": "Skip authentication check when a default username is required",
|
|
13482
|
+
"name": "skipauth",
|
|
13483
|
+
"allowNo": false,
|
|
13484
|
+
"type": "boolean"
|
|
13485
|
+
}
|
|
13486
|
+
},
|
|
13487
|
+
"hasDynamicHelp": false,
|
|
13488
|
+
"hiddenAliases": [],
|
|
13489
|
+
"id": "hardis:project:fix:v53flexipages",
|
|
13490
|
+
"pluginAlias": "sfdx-hardis",
|
|
13491
|
+
"pluginName": "sfdx-hardis",
|
|
13492
|
+
"pluginType": "core",
|
|
13493
|
+
"strict": true,
|
|
13494
|
+
"enableJsonFlag": true,
|
|
13495
|
+
"title": "Fix flexipages for v53",
|
|
13496
|
+
"requiresProject": true,
|
|
13497
|
+
"isESM": true,
|
|
13498
|
+
"relativePath": [
|
|
13499
|
+
"lib",
|
|
13500
|
+
"commands",
|
|
13501
|
+
"hardis",
|
|
13502
|
+
"project",
|
|
13503
|
+
"fix",
|
|
13504
|
+
"v53flexipages.js"
|
|
13505
|
+
],
|
|
13506
|
+
"aliasPermutations": [],
|
|
13507
|
+
"permutations": [
|
|
13508
|
+
"hardis:project:fix:v53flexipages",
|
|
13509
|
+
"project:hardis:fix:v53flexipages",
|
|
13510
|
+
"project:fix:hardis:v53flexipages",
|
|
13511
|
+
"project:fix:v53flexipages:hardis",
|
|
13512
|
+
"hardis:fix:project:v53flexipages",
|
|
13513
|
+
"fix:hardis:project:v53flexipages",
|
|
13514
|
+
"fix:project:hardis:v53flexipages",
|
|
13515
|
+
"fix:project:v53flexipages:hardis",
|
|
13516
|
+
"hardis:fix:v53flexipages:project",
|
|
13517
|
+
"fix:hardis:v53flexipages:project",
|
|
13518
|
+
"fix:v53flexipages:hardis:project",
|
|
13519
|
+
"fix:v53flexipages:project:hardis",
|
|
13520
|
+
"hardis:project:v53flexipages:fix",
|
|
13521
|
+
"project:hardis:v53flexipages:fix",
|
|
13522
|
+
"project:v53flexipages:hardis:fix",
|
|
13523
|
+
"project:v53flexipages:fix:hardis",
|
|
13524
|
+
"hardis:v53flexipages:project:fix",
|
|
13525
|
+
"v53flexipages:hardis:project:fix",
|
|
13526
|
+
"v53flexipages:project:hardis:fix",
|
|
13527
|
+
"v53flexipages:project:fix:hardis",
|
|
13528
|
+
"hardis:v53flexipages:fix:project",
|
|
13529
|
+
"v53flexipages:hardis:fix:project",
|
|
13530
|
+
"v53flexipages:fix:hardis:project",
|
|
13531
|
+
"v53flexipages:fix:project:hardis"
|
|
13532
|
+
]
|
|
13533
|
+
},
|
|
13534
13534
|
"hardis:project:generate:bypass": {
|
|
13535
13535
|
"aliases": [],
|
|
13536
13536
|
"args": {},
|
|
@@ -16104,5 +16104,5 @@
|
|
|
16104
16104
|
]
|
|
16105
16105
|
}
|
|
16106
16106
|
},
|
|
16107
|
-
"version": "6.
|
|
16107
|
+
"version": "6.18.0"
|
|
16108
16108
|
}
|