Skip to content

Commit cb0186b

Browse files
committed
permissions: make SessionConfigured profile-only
1 parent 86504e2 commit cb0186b

17 files changed

Lines changed: 192 additions & 161 deletions

File tree

codex-rs/app-server/src/codex_message_processor.rs

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4674,9 +4674,9 @@ impl CodexMessageProcessor {
46744674
thread_status,
46754675
/*has_live_in_progress_turn*/ false,
46764676
);
4677-
let permission_profile = thread_response_permission_profile(
4678-
codex_thread.config_snapshot().await.permission_profile,
4679-
);
4677+
let config_snapshot = codex_thread.config_snapshot().await;
4678+
let permission_profile =
4679+
thread_response_permission_profile(config_snapshot.permission_profile.clone());
46804680

46814681
let response = ThreadResumeResponse {
46824682
thread,
@@ -4687,7 +4687,7 @@ impl CodexMessageProcessor {
46874687
instruction_sources,
46884688
approval_policy: session_configured.approval_policy.into(),
46894689
approvals_reviewer: session_configured.approvals_reviewer.into(),
4690-
sandbox: session_configured.sandbox_policy.into(),
4690+
sandbox: config_snapshot.sandbox_policy.into(),
46914691
permission_profile,
46924692
reasoning_effort: session_configured.reasoning_effort,
46934693
};
@@ -5405,9 +5405,9 @@ impl CodexMessageProcessor {
54055405
.await,
54065406
/*has_in_progress_turn*/ false,
54075407
);
5408-
let permission_profile = thread_response_permission_profile(
5409-
forked_thread.config_snapshot().await.permission_profile,
5410-
);
5408+
let config_snapshot = forked_thread.config_snapshot().await;
5409+
let permission_profile =
5410+
thread_response_permission_profile(config_snapshot.permission_profile.clone());
54115411

54125412
let response = ThreadForkResponse {
54135413
thread: thread.clone(),
@@ -5418,7 +5418,7 @@ impl CodexMessageProcessor {
54185418
instruction_sources,
54195419
approval_policy: session_configured.approval_policy.into(),
54205420
approvals_reviewer: session_configured.approvals_reviewer.into(),
5421-
sandbox: session_configured.sandbox_policy.into(),
5421+
sandbox: config_snapshot.sandbox_policy.into(),
54225422
permission_profile,
54235423
reasoning_effort: session_configured.reasoning_effort,
54245424
};

codex-rs/core/src/session/session.rs

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -867,7 +867,6 @@ impl Session {
867867
// Dispatch the SessionConfiguredEvent first and then report any errors.
868868
// If resuming, include converted initial messages in the payload so UIs can render them immediately.
869869
let initial_messages = initial_history.get_event_msgs();
870-
let session_sandbox_policy = session_configuration.sandbox_policy();
871870
let events = std::iter::once(Event {
872871
id: INITIAL_SUBMIT_ID.to_owned(),
873872
msg: EventMsg::SessionConfigured(SessionConfiguredEvent {
@@ -879,8 +878,7 @@ impl Session {
879878
service_tier: session_configuration.service_tier,
880879
approval_policy: session_configuration.approval_policy.value(),
881880
approvals_reviewer: session_configuration.approvals_reviewer,
882-
sandbox_policy: session_sandbox_policy.clone(),
883-
permission_profile: Some(session_configuration.permission_profile()),
881+
permission_profile: session_configuration.permission_profile(),
884882
cwd: session_configuration.cwd.clone(),
885883
reasoning_effort: session_configuration.collaboration_mode.reasoning_effort(),
886884
history_log_id,

codex-rs/core/src/session/tests.rs

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1527,17 +1527,12 @@ async fn session_configured_reports_permission_profile_for_external_sandbox() ->
15271527

15281528
let test = builder.build(&server).await?;
15291529

1530-
assert_eq!(
1531-
test.session_configured.sandbox_policy,
1532-
expected_sandbox_policy
1533-
);
15341530
let expected_permission_profile =
15351531
codex_protocol::models::PermissionProfile::from_legacy_sandbox_policy(
15361532
&expected_sandbox_policy,
15371533
);
15381534
assert_eq!(
1539-
test.session_configured.permission_profile,
1540-
Some(expected_permission_profile),
1535+
test.session_configured.permission_profile, expected_permission_profile,
15411536
"ExternalSandbox is represented explicitly instead of as a lossy root-write profile"
15421537
);
15431538
Ok(())

codex-rs/exec/src/lib.rs

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1043,8 +1043,9 @@ fn session_configured_from_thread_response(
10431043
service_tier,
10441044
approval_policy,
10451045
approvals_reviewer,
1046-
sandbox_policy,
1047-
permission_profile,
1046+
permission_profile: permission_profile.unwrap_or_else(|| {
1047+
PermissionProfile::from_legacy_sandbox_policy_for_cwd(&sandbox_policy, cwd.as_path())
1048+
}),
10481049
cwd,
10491050
reasoning_effort,
10501051
history_log_id: 0,

codex-rs/exec/tests/event_processor_with_json_output.rs

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@ use codex_app_server_protocol::TurnStartedNotification;
2828
use codex_app_server_protocol::TurnStatus;
2929
use codex_app_server_protocol::WebSearchAction as ApiWebSearchAction;
3030
use codex_protocol::ThreadId;
31+
use codex_protocol::models::PermissionProfile;
3132
use codex_protocol::models::WebSearchAction;
3233
use codex_protocol::protocol::AskForApproval;
33-
use codex_protocol::protocol::SandboxPolicy;
3434
use codex_protocol::protocol::SessionConfiguredEvent;
3535
use codex_utils_absolute_path::test_support::PathBufExt;
3636
use codex_utils_absolute_path::test_support::test_path_buf;
@@ -114,8 +114,7 @@ fn session_configured_produces_thread_started_event() {
114114
service_tier: None,
115115
approval_policy: AskForApproval::Never,
116116
approvals_reviewer: codex_protocol::config_types::ApprovalsReviewer::User,
117-
sandbox_policy: SandboxPolicy::new_read_only_policy(),
118-
permission_profile: None,
117+
permission_profile: PermissionProfile::read_only(),
119118
cwd: test_path_buf("/tmp/project").abs(),
120119
reasoning_effort: None,
121120
history_log_id: 0,

codex-rs/mcp-server/src/outgoing_message.rs

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -231,10 +231,10 @@ mod tests {
231231

232232
use anyhow::Result;
233233
use codex_protocol::ThreadId;
234+
use codex_protocol::models::PermissionProfile;
234235
use codex_protocol::openai_models::ReasoningEffort;
235236
use codex_protocol::protocol::AskForApproval;
236237
use codex_protocol::protocol::EventMsg;
237-
use codex_protocol::protocol::SandboxPolicy;
238238
use codex_protocol::protocol::SessionConfiguredEvent;
239239
use codex_utils_absolute_path::test_support::PathBufExt;
240240
use codex_utils_absolute_path::test_support::test_path_buf;
@@ -304,8 +304,7 @@ mod tests {
304304
service_tier: None,
305305
approval_policy: AskForApproval::Never,
306306
approvals_reviewer: codex_protocol::config_types::ApprovalsReviewer::User,
307-
sandbox_policy: SandboxPolicy::new_read_only_policy(),
308-
permission_profile: None,
307+
permission_profile: PermissionProfile::read_only(),
309308
cwd: test_path_buf("/home/user/project").abs(),
310309
reasoning_effort: Some(ReasoningEffort::default()),
311310
history_log_id: 1,
@@ -349,8 +348,7 @@ mod tests {
349348
service_tier: None,
350349
approval_policy: AskForApproval::Never,
351350
approvals_reviewer: codex_protocol::config_types::ApprovalsReviewer::User,
352-
sandbox_policy: SandboxPolicy::new_read_only_policy(),
353-
permission_profile: None,
351+
permission_profile: PermissionProfile::read_only(),
354352
cwd: test_path_buf("/home/user/project").abs(),
355353
reasoning_effort: Some(ReasoningEffort::default()),
356354
history_log_id: 1,
@@ -389,9 +387,7 @@ mod tests {
389387
"model_provider_id": "test-provider",
390388
"approval_policy": "never",
391389
"approvals_reviewer": "user",
392-
"sandbox_policy": {
393-
"type": "read-only"
394-
},
390+
"permission_profile": session_configured_event.permission_profile,
395391
"cwd": test_path_buf("/home/user/project"),
396392
"reasoning_effort": session_configured_event.reasoning_effort,
397393
"history_log_id": session_configured_event.history_log_id,
@@ -419,8 +415,7 @@ mod tests {
419415
service_tier: None,
420416
approval_policy: AskForApproval::Never,
421417
approvals_reviewer: codex_protocol::config_types::ApprovalsReviewer::User,
422-
sandbox_policy: SandboxPolicy::new_read_only_policy(),
423-
permission_profile: None,
418+
permission_profile: PermissionProfile::read_only(),
424419
cwd: test_path_buf("/home/user/project").abs(),
425420
reasoning_effort: Some(ReasoningEffort::default()),
426421
history_log_id: 1,
@@ -460,9 +455,7 @@ mod tests {
460455
"model_provider_id": "test-provider",
461456
"approval_policy": "never",
462457
"approvals_reviewer": "user",
463-
"sandbox_policy": {
464-
"type": "read-only"
465-
},
458+
"permission_profile": session_configured_event.permission_profile,
466459
"cwd": test_path_buf("/home/user/project"),
467460
"reasoning_effort": session_configured_event.reasoning_effort,
468461
"history_log_id": session_configured_event.history_log_id,

codex-rs/protocol/src/protocol.rs

Lines changed: 88 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3538,7 +3538,7 @@ pub struct SessionNetworkProxyRuntime {
35383538
pub socks_addr: String,
35393539
}
35403540

3541-
#[derive(Debug, Clone, Deserialize, Serialize, JsonSchema, TS)]
3541+
#[derive(Debug, Clone, Serialize, JsonSchema, TS)]
35423542
pub struct SessionConfiguredEvent {
35433543
pub session_id: ThreadId,
35443544
#[serde(skip_serializing_if = "Option::is_none")]
@@ -3566,16 +3566,8 @@ pub struct SessionConfiguredEvent {
35663566
#[serde(default)]
35673567
pub approvals_reviewer: ApprovalsReviewer,
35683568

3569-
/// Legacy sandbox projection for commands executed in the system.
3570-
///
3571-
/// Consumers should prefer `permission_profile` when it is present. This
3572-
/// field remains available as a compatibility fallback for older emitters
3573-
/// and sessions that only expose legacy sandbox state.
3574-
pub sandbox_policy: SandboxPolicy,
3575-
35763569
/// Canonical effective permissions for commands executed in the session.
3577-
#[serde(default, skip_serializing_if = "Option::is_none")]
3578-
pub permission_profile: Option<PermissionProfile>,
3570+
pub permission_profile: PermissionProfile,
35793571

35803572
/// Working directory that should be treated as the *root* of the
35813573
/// session.
@@ -3606,6 +3598,67 @@ pub struct SessionConfiguredEvent {
36063598
pub rollout_path: Option<PathBuf>,
36073599
}
36083600

3601+
impl<'de> Deserialize<'de> for SessionConfiguredEvent {
3602+
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
3603+
where
3604+
D: serde::Deserializer<'de>,
3605+
{
3606+
#[derive(Deserialize)]
3607+
struct Wire {
3608+
session_id: ThreadId,
3609+
forked_from_id: Option<ThreadId>,
3610+
#[serde(default)]
3611+
thread_name: Option<String>,
3612+
model: String,
3613+
model_provider_id: String,
3614+
service_tier: Option<ServiceTier>,
3615+
approval_policy: AskForApproval,
3616+
#[serde(default)]
3617+
approvals_reviewer: ApprovalsReviewer,
3618+
sandbox_policy: Option<SandboxPolicy>,
3619+
permission_profile: Option<PermissionProfile>,
3620+
cwd: AbsolutePathBuf,
3621+
reasoning_effort: Option<ReasoningEffortConfig>,
3622+
history_log_id: u64,
3623+
history_entry_count: usize,
3624+
initial_messages: Option<Vec<EventMsg>>,
3625+
network_proxy: Option<SessionNetworkProxyRuntime>,
3626+
rollout_path: Option<PathBuf>,
3627+
}
3628+
3629+
let wire = Wire::deserialize(deserializer)?;
3630+
let permission_profile = match (wire.permission_profile, wire.sandbox_policy) {
3631+
(Some(permission_profile), _) => permission_profile,
3632+
(None, Some(sandbox_policy)) => PermissionProfile::from_legacy_sandbox_policy_for_cwd(
3633+
&sandbox_policy,
3634+
wire.cwd.as_path(),
3635+
),
3636+
(None, None) => {
3637+
return Err(serde::de::Error::missing_field("permission_profile"));
3638+
}
3639+
};
3640+
3641+
Ok(Self {
3642+
session_id: wire.session_id,
3643+
forked_from_id: wire.forked_from_id,
3644+
thread_name: wire.thread_name,
3645+
model: wire.model,
3646+
model_provider_id: wire.model_provider_id,
3647+
service_tier: wire.service_tier,
3648+
approval_policy: wire.approval_policy,
3649+
approvals_reviewer: wire.approvals_reviewer,
3650+
permission_profile,
3651+
cwd: wire.cwd,
3652+
reasoning_effort: wire.reasoning_effort,
3653+
history_log_id: wire.history_log_id,
3654+
history_entry_count: wire.history_entry_count,
3655+
initial_messages: wire.initial_messages,
3656+
network_proxy: wire.network_proxy,
3657+
rollout_path: wire.rollout_path,
3658+
})
3659+
}
3660+
}
3661+
36093662
#[derive(Debug, Clone, Deserialize, Serialize, JsonSchema, TS)]
36103663
pub struct ThreadNameUpdatedEvent {
36113664
pub thread_id: ThreadId,
@@ -5085,6 +5138,7 @@ mod tests {
50855138
fn serialize_event() -> Result<()> {
50865139
let conversation_id = ThreadId::from_string("67e55044-10b1-426f-9247-bb680e5fe0c8")?;
50875140
let rollout_file = NamedTempFile::new()?;
5141+
let permission_profile = PermissionProfile::read_only();
50885142
let event = Event {
50895143
id: "1234".to_string(),
50905144
msg: EventMsg::SessionConfigured(SessionConfiguredEvent {
@@ -5096,8 +5150,7 @@ mod tests {
50965150
service_tier: None,
50975151
approval_policy: AskForApproval::Never,
50985152
approvals_reviewer: ApprovalsReviewer::User,
5099-
sandbox_policy: SandboxPolicy::new_read_only_policy(),
5100-
permission_profile: None,
5153+
permission_profile: permission_profile.clone(),
51015154
cwd: test_path_buf("/home/user/project").abs(),
51025155
reasoning_effort: Some(ReasoningEffortConfig::default()),
51035156
history_log_id: 0,
@@ -5117,9 +5170,7 @@ mod tests {
51175170
"model_provider_id": "openai",
51185171
"approval_policy": "never",
51195172
"approvals_reviewer": "user",
5120-
"sandbox_policy": {
5121-
"type": "read-only"
5122-
},
5173+
"permission_profile": permission_profile,
51235174
"cwd": test_path_buf("/home/user/project"),
51245175
"reasoning_effort": "medium",
51255176
"history_log_id": 0,
@@ -5131,6 +5182,28 @@ mod tests {
51315182
Ok(())
51325183
}
51335184

5185+
#[test]
5186+
fn deserialize_legacy_session_configured_event_uses_sandbox_policy() -> Result<()> {
5187+
let cwd = test_path_buf("/home/user/project");
5188+
let value = json!({
5189+
"session_id": "67e55044-10b1-426f-9247-bb680e5fe0c8",
5190+
"model": "codex-mini-latest",
5191+
"model_provider_id": "openai",
5192+
"approval_policy": "never",
5193+
"approvals_reviewer": "user",
5194+
"sandbox_policy": {
5195+
"type": "read-only"
5196+
},
5197+
"cwd": cwd,
5198+
"history_log_id": 0,
5199+
"history_entry_count": 0,
5200+
});
5201+
5202+
let event: SessionConfiguredEvent = serde_json::from_value(value)?;
5203+
assert_eq!(event.permission_profile, PermissionProfile::read_only());
5204+
Ok(())
5205+
}
5206+
51345207
#[test]
51355208
fn vec_u8_as_base64_serialization_and_deserialization() -> Result<()> {
51365209
let event = ExecCommandOutputDeltaEvent {

codex-rs/tui/src/app/config_persistence.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -556,6 +556,7 @@ mod tests {
556556
use crate::app::test_support::app_enabled_in_effective_config;
557557
use crate::app::test_support::make_test_app;
558558
use crate::test_support::PathBufExt;
559+
use codex_protocol::models::PermissionProfile;
559560
use codex_protocol::protocol::Event;
560561
use codex_protocol::protocol::EventMsg;
561562
use codex_protocol::protocol::SessionConfiguredEvent;
@@ -653,8 +654,7 @@ mod tests {
653654
service_tier: None,
654655
approval_policy: AskForApproval::Never,
655656
approvals_reviewer: ApprovalsReviewer::User,
656-
sandbox_policy: SandboxPolicy::new_read_only_policy(),
657-
permission_profile: None,
657+
permission_profile: PermissionProfile::read_only(),
658658
cwd: next_cwd.clone().abs(),
659659
reasoning_effort: None,
660660
history_log_id: 0,

0 commit comments

Comments
 (0)