-
Notifications
You must be signed in to change notification settings - Fork 331
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature]: More customizable commit message template and support for Perforce VCS #356
Comments
hi @philou, nice to meet you will get back to you this week :) |
@philou hi could you provide an example of what response you expect to get with commit customization? and any draft of a command or config to achieve this would be great as for the perforce, i think the best solution here is to support it as a dependency injection, doing it this way you would need to extract git commands (as they are hardcoded now) and pass them (or Perforce) into the (let's call it) module which requests an LLM to generate a commit message as per the config and CLI options if Perforce is used instead of git then the github action or githook should be disabled, i imagine a one liner |
Thanks for your answer. We were thinking of the same thing for Perforce. Regarding the commit customization, we can already go a long way with the template that We might also submit PRs to allow configuring the Ollama server address and adding a flowiseAI engine. |
@philou sounds great, lmk if you need help ;) |
My colleagues have prepared a branches for FlowiseAI backend: master...murex:opencommit:llmserviceFrontend. They will submit a PR pretty soon |
@philou the PR was merged and available in the latest version |
Description
💬 Discuss and agree about design before contribution
I am part of the Murex organization, we have a bit of time this summer, and we would like to contribute to your project. We want to extend it with the following features:
To avoid rework, I would like to start a conversation to get your feedback about the proposed features and design before we send pull request.
Suggested Solution
Alternatives
We could start from another tool (ex aicommits)
We could build something from scratch ourselves
Additional Context
We also plan to use the tool on our own internal RAG. I'm not sure what impact will this have yet.
The text was updated successfully, but these errors were encountered: