Conversation
💡 Codex Reviewcodex/codex-rs/utils/sandbox-summary/src/sandbox_summary.rs Lines 40 to 47 in 53010bd This branch classifies any managed profile with at least one writable root as ℹ️ About Codex in GitHubYour team has set up Codex to review pull requests in this repo. Reviews are triggered when you
If Codex has suggestions, it will comment; otherwise it will react with 👍. Codex can also answer questions or update the PR. Try commenting "@codex address that feedback". |
Why
A couple of integration test helpers were still passing
SandboxPolicy::DangerFullAccessfor ordinary turn submission. These tests are not validating the legacy policy bridge; they just need the turn to run without sandbox restrictions. UsingPermissionProfiledirectly keeps the tests aligned with the canonical permissions model and removes more incidental legacy usage.What Changed
Op::UserTurndirectly to populate both permission fields fromPermissionProfile::Disabledviaturn_permission_fields(...).submit_turn_with_permission_profile(...)instead ofsubmit_turn_with_policy(...).SandboxPolicyimport fromcore/tests/suite/apply_patch_cli.rs.Verification
Stack created with Sapling. Best reviewed with ReviewStack.