Skip to content

Commit eddf071

Browse files
committed
permissions: derive snapshot sandbox projections
1 parent 241de1c commit eddf071

5 files changed

Lines changed: 26 additions & 16 deletions

File tree

codex-rs/app-server/src/codex_message_processor.rs

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2859,6 +2859,7 @@ impl CodexMessageProcessor {
28592859
/*has_in_progress_turn*/ false,
28602860
);
28612861

2862+
let sandbox_policy = config_snapshot.sandbox_policy();
28622863
let permission_profile =
28632864
thread_response_permission_profile(config_snapshot.permission_profile);
28642865

@@ -2871,7 +2872,7 @@ impl CodexMessageProcessor {
28712872
instruction_sources,
28722873
approval_policy: config_snapshot.approval_policy.into(),
28732874
approvals_reviewer: config_snapshot.approvals_reviewer.into(),
2874-
sandbox: config_snapshot.sandbox_policy.into(),
2875+
sandbox: sandbox_policy.into(),
28752876
permission_profile,
28762877
reasoning_effort: config_snapshot.reasoning_effort,
28772878
};
@@ -3597,7 +3598,7 @@ impl CodexMessageProcessor {
35973598
builder.model_provider = Some(model_provider.clone());
35983599
builder.cwd = config_snapshot.cwd.to_path_buf();
35993600
builder.cli_version = Some(env!("CARGO_PKG_VERSION").to_string());
3600-
builder.sandbox_policy = config_snapshot.sandbox_policy.clone();
3601+
builder.sandbox_policy = config_snapshot.sandbox_policy();
36013602
builder.approval_mode = config_snapshot.approval_policy;
36023603
let metadata = builder.build(model_provider.as_str());
36033604
if let Err(err) = state_db_ctx.insert_thread_if_absent(&metadata).await {
@@ -4687,7 +4688,7 @@ impl CodexMessageProcessor {
46874688
instruction_sources,
46884689
approval_policy: session_configured.approval_policy.into(),
46894690
approvals_reviewer: session_configured.approvals_reviewer.into(),
4690-
sandbox: config_snapshot.sandbox_policy.into(),
4691+
sandbox: config_snapshot.sandbox_policy().into(),
46914692
permission_profile,
46924693
reasoning_effort: session_configured.reasoning_effort,
46934694
};
@@ -5418,7 +5419,7 @@ impl CodexMessageProcessor {
54185419
instruction_sources,
54195420
approval_policy: session_configured.approval_policy.into(),
54205421
approvals_reviewer: session_configured.approvals_reviewer.into(),
5421-
sandbox: config_snapshot.sandbox_policy.into(),
5422+
sandbox: config_snapshot.sandbox_policy().into(),
54225423
permission_profile,
54235424
reasoning_effort: session_configured.reasoning_effort,
54245425
};
@@ -8997,13 +8998,13 @@ async fn handle_pending_thread_resume_request(
89978998
tracing::warn!("failed to apply goal resume runtime effects: {err}");
89988999
}
89999000

9001+
let sandbox_policy = pending.config_snapshot.sandbox_policy();
90009002
let ThreadConfigSnapshot {
90019003
model,
90029004
model_provider_id,
90039005
service_tier,
90049006
approval_policy,
90059007
approvals_reviewer,
9006-
sandbox_policy,
90079008
permission_profile,
90089009
cwd,
90099010
reasoning_effort,
@@ -9226,8 +9227,9 @@ fn collect_resume_override_mismatches(
92269227
}
92279228
}
92289229
if let Some(requested_sandbox) = request.sandbox.as_ref() {
9230+
let active_sandbox = config_snapshot.sandbox_policy();
92299231
let sandbox_matches = matches!(
9230-
(requested_sandbox, &config_snapshot.sandbox_policy),
9232+
(requested_sandbox, &active_sandbox),
92319233
(
92329234
SandboxMode::ReadOnly,
92339235
codex_protocol::protocol::SandboxPolicy::ReadOnly { .. }
@@ -9244,8 +9246,7 @@ fn collect_resume_override_mismatches(
92449246
);
92459247
if !sandbox_matches {
92469248
mismatch_details.push(format!(
9247-
"sandbox requested={requested_sandbox:?} active={:?}",
9248-
config_snapshot.sandbox_policy
9249+
"sandbox requested={requested_sandbox:?} active={active_sandbox:?}"
92499250
));
92509251
}
92519252
}
@@ -10931,7 +10932,6 @@ mod tests {
1093110932
service_tier: Some(codex_protocol::config_types::ServiceTier::Flex),
1093210933
approval_policy: codex_protocol::protocol::AskForApproval::OnRequest,
1093310934
approvals_reviewer: codex_protocol::config_types::ApprovalsReviewer::User,
10934-
sandbox_policy: codex_protocol::protocol::SandboxPolicy::DangerFullAccess,
1093510935
permission_profile: codex_protocol::models::PermissionProfile::Disabled,
1093610936
cwd,
1093710937
ephemeral: false,

codex-rs/core/src/codex_thread.rs

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,6 @@ pub struct ThreadConfigSnapshot {
4747
pub service_tier: Option<ServiceTier>,
4848
pub approval_policy: AskForApproval,
4949
pub approvals_reviewer: ApprovalsReviewer,
50-
pub sandbox_policy: SandboxPolicy,
5150
pub permission_profile: PermissionProfile,
5251
pub cwd: AbsolutePathBuf,
5352
pub ephemeral: bool,
@@ -56,6 +55,18 @@ pub struct ThreadConfigSnapshot {
5655
pub session_source: SessionSource,
5756
}
5857

58+
impl ThreadConfigSnapshot {
59+
pub fn sandbox_policy(&self) -> SandboxPolicy {
60+
let file_system_sandbox_policy = self.permission_profile.file_system_sandbox_policy();
61+
codex_sandboxing::compatibility_sandbox_policy_for_permission_profile(
62+
&self.permission_profile,
63+
&file_system_sandbox_policy,
64+
self.permission_profile.network_sandbox_policy(),
65+
self.cwd.as_path(),
66+
)
67+
}
68+
}
69+
5970
/// Turn context overrides that app-server validates before starting a turn.
6071
#[derive(Clone, Default)]
6172
pub struct CodexThreadTurnContextOverrides {

codex-rs/core/src/memories/tests.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -718,11 +718,11 @@ mod phase2 {
718718
config_snapshot.cwd.as_path(),
719719
memory_root(&harness.config.codex_home).as_path()
720720
);
721-
match &config_snapshot.sandbox_policy {
721+
let sandbox_policy = config_snapshot.sandbox_policy();
722+
match &sandbox_policy {
722723
SandboxPolicy::WorkspaceWrite { network_access, .. } => {
723724
assert!(!*network_access);
724-
let effective_writable_roots: Vec<_> = config_snapshot
725-
.sandbox_policy
725+
let effective_writable_roots: Vec<_> = sandbox_policy
726726
.get_writable_roots_with_cwd(config_snapshot.cwd.as_path())
727727
.into_iter()
728728
.map(|root| root.root)
@@ -752,7 +752,7 @@ mod phase2 {
752752
let file_system_sandbox_policy = turn_context.file_system_sandbox_policy();
753753
let legacy_file_system_sandbox_policy =
754754
FileSystemSandboxPolicy::from_legacy_sandbox_policy_for_cwd(
755-
&config_snapshot.sandbox_policy,
755+
&sandbox_policy,
756756
config_snapshot.cwd.as_path(),
757757
);
758758
assert!(

codex-rs/core/src/session/session.rs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,6 @@ impl SessionConfiguration {
126126
service_tier: self.service_tier,
127127
approval_policy: self.approval_policy.value(),
128128
approvals_reviewer: self.approvals_reviewer,
129-
sandbox_policy: self.sandbox_policy(),
130129
permission_profile: self.permission_profile(),
131130
cwd: self.cwd.clone(),
132131
ephemeral: self.original_config_do_not_use.ephemeral,

codex-rs/core/src/tools/handlers/multi_agents_tests.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2143,7 +2143,7 @@ async fn spawn_agent_reapplies_runtime_sandbox_after_role_config() {
21432143
.expect("spawned agent thread should exist")
21442144
.config_snapshot()
21452145
.await;
2146-
assert_eq!(snapshot.sandbox_policy, expected_sandbox);
2146+
assert_eq!(snapshot.sandbox_policy(), expected_sandbox);
21472147
assert_eq!(snapshot.approval_policy, AskForApproval::OnRequest);
21482148
assert_eq!(snapshot.permission_profile, expected_permission_profile);
21492149
let child_thread = manager

0 commit comments

Comments
 (0)