Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Support "use workflow" serialization for Sandbox and Command#72

Open
cramforce wants to merge 9 commits intomainfrom
malte/serde
Open

Support "use workflow" serialization for Sandbox and Command#72
cramforce wants to merge 9 commits intomainfrom
malte/serde

Conversation

@cramforce
Copy link

Does not add "use step" anywhere, so users will have to do this themselves. It could be done, but it is hard to reconzile with the use of AbortSignals and also won't be very useful in practice.

Introduces Sandbox.setCredentials to allow creating APIClient from serialized values.

@vercel
Copy link

vercel bot commented Mar 1, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
sandbox-cli Ready Ready Preview, Comment Mar 2, 2026 5:41pm
sandbox-sdk Ready Ready Preview, Comment Mar 2, 2026 5:41pm
sandbox-sdk-ai-example Ready Ready Preview, Comment Mar 2, 2026 5:41pm
vercel-sandbox-sdk-tests Error Error Mar 2, 2026 5:41pm

Request Review

@socket-security
Copy link

socket-security bot commented Mar 1, 2026

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addednpm/​@​workflow/​serde@​4.1.0-beta.2691007293100
Addednpm/​@​workflow/​core@​4.1.0-beta.629710075100100

View full report

@cramforce cramforce requested a review from Schniz March 1, 2026 14:32
@cramforce cramforce changed the title Support "use workflow" sealization for Sandbox and Command Support "use workflow" seralization for Sandbox and Command Mar 1, 2026
@cramforce cramforce changed the title Support "use workflow" seralization for Sandbox and Command Support "use workflow" serialization for Sandbox and Command Mar 1, 2026
@pranaygp
Copy link

pranaygp commented Mar 1, 2026

See also #58 (cc @TooTallNate )

Comment on lines +159 to +162
setSandboxCredentials({
token: process.env.VERCEL_TOKEN!,
teamId: process.env.VERCEL_TEAM_ID!,
});
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a way we can avoid having the user do this? the deserialization should be able to reconstruct the credentials each time, the same way we do in non-workflow context

now that we have e2e encryption in workflow, we can also serialize and pass credentials across the wire if that's a limitation

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah that what bothers me the most. but if you use OIDC or any short-term token it might not be good enough :sad:

@pranaygp pranaygp requested a review from TooTallNate March 1, 2026 20:19
cramforce and others added 8 commits March 2, 2026 12:37
Does *not* add `"use step"` anywhere, so users will have to do this themselves. It could be done, but it is hard to reconzile with the use of AbortSignals and also won't be very useful in practice.

Introduces `Sandbox.setCredentials` to allow creating APIClient from serialized values.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants