Similar to what @sayan-oai did in openai/codex#8956 for `config.schema.json`, this PR updates the repo so that it includes the output of `codex app-server generate-json-schema` and `codex app-server generate-ts` and adds a test to verify it is in sync with the current code. Motivation: - This makes any schema changes introduced by a PR transparent during code review. - In particular, this should help us catch PRs that would introduce a non-backwards-compatible change to the app schema (eventually, this should also be enforced by tooling). - Once https://github.com/openai/codex/pull/10231 is in to formalize the notion of "experimental" fields, we can work on ensuring the non-experimental bits are backwards-compatible. `codex-rs/app-server-protocol/tests/schema_fixtures.rs` was added as the test and `just write-app-server-schema` can be use to generate the vendored schema files. Incidentally, when I run: ``` rg _ codex-rs/app-server-protocol/schema/typescript/v2 ``` I see a number of `snake_case` names that should be `camelCase`.
73 lines
No EOL
2.2 KiB
JSON
73 lines
No EOL
2.2 KiB
JSON
{
|
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
|
"definitions": {
|
|
"ReviewDecision": {
|
|
"description": "User's decision in response to an ExecApprovalRequest.",
|
|
"oneOf": [
|
|
{
|
|
"description": "User has approved this command and the agent should execute it.",
|
|
"enum": [
|
|
"approved"
|
|
],
|
|
"type": "string"
|
|
},
|
|
{
|
|
"additionalProperties": false,
|
|
"description": "User has approved this command and wants to apply the proposed execpolicy amendment so future matching commands are permitted.",
|
|
"properties": {
|
|
"approved_execpolicy_amendment": {
|
|
"properties": {
|
|
"proposed_execpolicy_amendment": {
|
|
"items": {
|
|
"type": "string"
|
|
},
|
|
"type": "array"
|
|
}
|
|
},
|
|
"required": [
|
|
"proposed_execpolicy_amendment"
|
|
],
|
|
"type": "object"
|
|
}
|
|
},
|
|
"required": [
|
|
"approved_execpolicy_amendment"
|
|
],
|
|
"title": "ApprovedExecpolicyAmendmentReviewDecision",
|
|
"type": "object"
|
|
},
|
|
{
|
|
"description": "User has approved this command and wants to automatically approve any future identical instances (`command` and `cwd` match exactly) for the remainder of the session.",
|
|
"enum": [
|
|
"approved_for_session"
|
|
],
|
|
"type": "string"
|
|
},
|
|
{
|
|
"description": "User has denied this command and the agent should not execute it, but it should continue the session and try something else.",
|
|
"enum": [
|
|
"denied"
|
|
],
|
|
"type": "string"
|
|
},
|
|
{
|
|
"description": "User has denied this command and the agent should not do anything until the user's next command.",
|
|
"enum": [
|
|
"abort"
|
|
],
|
|
"type": "string"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"properties": {
|
|
"decision": {
|
|
"$ref": "#/definitions/ReviewDecision"
|
|
}
|
|
},
|
|
"required": [
|
|
"decision"
|
|
],
|
|
"title": "ExecCommandApprovalResponse",
|
|
"type": "object"
|
|
} |