From 6c9db2a21b6520f9b2af16d8f39201809ad1dfd4 Mon Sep 17 00:00:00 2001 From: Michael Bolin Date: Sun, 26 Apr 2026 15:48:34 -0700 Subject: [PATCH] fix: update core config tests after loader move --- codex-rs/core/src/config/config_tests.rs | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/codex-rs/core/src/config/config_tests.rs b/codex-rs/core/src/config/config_tests.rs index 1d1a60e13d..900ec46e08 100644 --- a/codex-rs/core/src/config/config_tests.rs +++ b/codex-rs/core/src/config/config_tests.rs @@ -914,14 +914,14 @@ async fn managed_unrestricted_permission_profile_still_enables_network_requireme .collect(); let mut requirements = config.config_layer_stack.requirements().clone(); requirements.network = Some(Sourced::new( - crate::config_loader::NetworkConstraints { + codex_config::NetworkConstraints { enabled: Some(true), ..Default::default() }, RequirementSource::CloudRequirements, )); let mut requirements_toml = config.config_layer_stack.requirements_toml().clone(); - requirements_toml.network = Some(crate::config_loader::NetworkRequirementsToml { + requirements_toml.network = Some(codex_config::NetworkRequirementsToml { enabled: Some(true), ..Default::default() }); @@ -6746,8 +6746,8 @@ async fn explicit_sandbox_mode_falls_back_when_disallowed_by_requirements() -> s async fn permission_profile_override_falls_back_when_disallowed_by_requirements() -> std::io::Result<()> { let codex_home = TempDir::new()?; - let requirements = crate::config_loader::ConfigRequirementsToml { - allowed_sandbox_modes: Some(vec![crate::config_loader::SandboxModeRequirement::ReadOnly]), + let requirements = codex_config::ConfigRequirementsToml { + allowed_sandbox_modes: Some(vec![codex_config::SandboxModeRequirement::ReadOnly]), ..Default::default() };