fix: repair sandbox audit CI

Co-authored-by: Codex <noreply@openai.com>
This commit is contained in:
viyatb-oai
2026-05-05 11:22:04 -07:00
parent 51f124af16
commit a667fb589b
3 changed files with 6 additions and 1 deletions

View File

@@ -386,7 +386,10 @@ mod tests {
#[test]
fn unified_exec_options_combines_default_timeout_with_network_denial_cancellation() {
let cancellation = CancellationToken::new();
let options = unified_exec_options(Some(cancellation.clone()), None);
let options = unified_exec_options(
Some(cancellation.clone()),
/*sandbox_violation_context*/ None,
);
assert_eq!(options.capture_policy, ExecCapturePolicy::ShellTool);
match options.expiration {

View File

@@ -941,6 +941,7 @@ impl UnifiedExecProcessManager {
return UnifiedExecProcess::from_spawned(
spawned.map_err(|err| UnifiedExecError::create_process(err.to_string()))?,
request.sandbox,
request.sandbox_violation_context.clone(),
spawn_lifecycle,
)
.await;

View File

@@ -3,6 +3,7 @@ use codex_network_proxy::BlockedRequest;
use codex_protocol::exec_output::ExecToolCallOutput;
use tracing::warn;
#[cfg(unix)]
const EXIT_CODE_SIGNAL_BASE: i32 = 128;
const OUTPUT_SNIPPET_MAX_CHARS: usize = 512;