From b4635ccc07829eb58e48d03e11466a9a33e289c4 Mon Sep 17 00:00:00 2001 From: iceweasel-oai Date: Mon, 15 Dec 2025 10:15:40 -0800 Subject: [PATCH] better name for windows sandbox features (#8077) `--enable enable...` is a bad look --- codex-rs/app-server/src/codex_message_processor.rs | 4 ++-- codex-rs/core/src/features.rs | 4 ++-- codex-rs/core/src/features/legacy.rs | 4 ++++ codex-rs/core/src/sandboxing/mod.rs | 2 +- 4 files changed, 9 insertions(+), 5 deletions(-) diff --git a/codex-rs/app-server/src/codex_message_processor.rs b/codex-rs/app-server/src/codex_message_processor.rs index 21acaec97..627b84b09 100644 --- a/codex-rs/app-server/src/codex_message_processor.rs +++ b/codex-rs/app-server/src/codex_message_processor.rs @@ -1270,7 +1270,7 @@ impl CodexMessageProcessor { let mut cli_overrides = cli_overrides.unwrap_or_default(); if cfg!(windows) && self.config.features.enabled(Feature::WindowsSandbox) { cli_overrides.insert( - "features.enable_experimental_windows_sandbox".to_string(), + "features.experimental_windows_sandbox".to_string(), serde_json::json!(true), ); } @@ -2187,7 +2187,7 @@ impl CodexMessageProcessor { let mut cli_overrides = cli_overrides.unwrap_or_default(); if cfg!(windows) && self.config.features.enabled(Feature::WindowsSandbox) { cli_overrides.insert( - "features.enable_experimental_windows_sandbox".to_string(), + "features.experimental_windows_sandbox".to_string(), serde_json::json!(true), ); } diff --git a/codex-rs/core/src/features.rs b/codex-rs/core/src/features.rs index 20f405bf2..431eabe3c 100644 --- a/codex-rs/core/src/features.rs +++ b/codex-rs/core/src/features.rs @@ -325,13 +325,13 @@ pub const FEATURES: &[FeatureSpec] = &[ }, FeatureSpec { id: Feature::WindowsSandbox, - key: "enable_experimental_windows_sandbox", + key: "experimental_windows_sandbox", stage: Stage::Experimental, default_enabled: false, }, FeatureSpec { id: Feature::WindowsSandboxElevated, - key: "enable_elevated_windows_sandbox", + key: "elevated_windows_sandbox", stage: Stage::Experimental, default_enabled: false, }, diff --git a/codex-rs/core/src/features/legacy.rs b/codex-rs/core/src/features/legacy.rs index 0c74d380e..19210c675 100644 --- a/codex-rs/core/src/features/legacy.rs +++ b/codex-rs/core/src/features/legacy.rs @@ -9,6 +9,10 @@ struct Alias { } const ALIASES: &[Alias] = &[ + Alias { + legacy_key: "enable_experimental_windows_sandbox", + feature: Feature::WindowsSandbox, + }, Alias { legacy_key: "experimental_use_unified_exec_tool", feature: Feature::UnifiedExec, diff --git a/codex-rs/core/src/sandboxing/mod.rs b/codex-rs/core/src/sandboxing/mod.rs index 5d719a792..f751287b2 100644 --- a/codex-rs/core/src/sandboxing/mod.rs +++ b/codex-rs/core/src/sandboxing/mod.rs @@ -81,7 +81,7 @@ impl SandboxManager { SandboxablePreference::Forbid => SandboxType::None, SandboxablePreference::Require => { // Require a platform sandbox when available; on Windows this - // respects the enable_experimental_windows_sandbox feature. + // respects the experimental_windows_sandbox feature. crate::safety::get_platform_sandbox().unwrap_or(SandboxType::None) } SandboxablePreference::Auto => match policy {