Skip to content

tests: use disabled profile in exec capture check#20389

Open
bolinfest wants to merge 1 commit intopr20388from
pr20389
Open

tests: use disabled profile in exec capture check#20389
bolinfest wants to merge 1 commit intopr20388from
pr20389

Conversation

@bolinfest
Copy link
Copy Markdown
Collaborator

@bolinfest bolinfest commented Apr 30, 2026

Why

The full-buffer exec capture test only needs an unsandboxed/disabled permission profile. It previously constructed SandboxPolicy::DangerFullAccess solely to convert it to PermissionProfile::Disabled, which kept an unnecessary dependency on the legacy abstraction.

What Changed

  • Replaced the legacy bridge in process_exec_tool_call_preserves_full_buffer_capture_policy with PermissionProfile::Disabled.
  • Left the remaining SandboxPolicy uses in exec_tests.rs intact because they exercise Windows sandbox compatibility paths that still take legacy policy input.

Verification

  • cargo test -p codex-core process_exec_tool_call_preserves_full_buffer_capture_policy -- --nocapture
  • just fmt
  • just fix -p codex-core

Stack created with Sapling. Best reviewed with ReviewStack.

@bolinfest bolinfest requested a review from a team as a code owner April 30, 2026 10:28
@bolinfest bolinfest changed the base branch from main to pr20388 April 30, 2026 10:28
This was referenced Apr 30, 2026
This was referenced Apr 30, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant