moving args around

This commit is contained in:
kevin zhao
2025-11-21 15:30:46 -05:00
parent d747d1d492
commit aa3c4d3d1f
3 changed files with 11 additions and 11 deletions

View File

@@ -172,9 +172,9 @@ fn allow_prefix_if_applicable(
pub(crate) fn create_approval_requirement_for_command(
policy: &Policy,
features: &Features,
command: &[String],
approval_policy: AskForApproval,
features: &Features,
sandbox_policy: &SandboxPolicy,
sandbox_permissions: SandboxPermissions,
) -> ApprovalRequirement {
@@ -350,9 +350,9 @@ prefix_rule(pattern=["rm"], decision="forbidden")
let requirement = create_approval_requirement_for_command(
&policy,
&Features::with_defaults(),
&forbidden_script,
AskForApproval::OnRequest,
&Features::with_defaults(),
&SandboxPolicy::DangerFullAccess,
SandboxPermissions::UseDefault,
);
@@ -377,9 +377,9 @@ prefix_rule(pattern=["rm"], decision="forbidden")
let requirement = create_approval_requirement_for_command(
&policy,
&Features::with_defaults(),
&command,
AskForApproval::OnRequest,
&Features::with_defaults(),
&SandboxPolicy::DangerFullAccess,
SandboxPermissions::UseDefault,
);
@@ -405,9 +405,9 @@ prefix_rule(pattern=["rm"], decision="forbidden")
let requirement = create_approval_requirement_for_command(
&policy,
&Features::with_defaults(),
&command,
AskForApproval::Never,
&Features::with_defaults(),
&SandboxPolicy::DangerFullAccess,
SandboxPermissions::UseDefault,
);
@@ -427,9 +427,9 @@ prefix_rule(pattern=["rm"], decision="forbidden")
let empty_policy = Policy::empty();
let requirement = create_approval_requirement_for_command(
&empty_policy,
&Features::with_defaults(),
&command,
AskForApproval::UnlessTrusted,
&Features::with_defaults(),
&SandboxPolicy::ReadOnly,
SandboxPermissions::UseDefault,
);
@@ -498,9 +498,9 @@ prefix_rule(pattern=["rm"], decision="forbidden")
let empty_policy = Policy::empty();
let requirement = create_approval_requirement_for_command(
&empty_policy,
&Features::with_defaults(),
&command,
AskForApproval::UnlessTrusted,
&Features::with_defaults(),
&SandboxPolicy::ReadOnly,
SandboxPermissions::UseDefault,
);
@@ -523,9 +523,9 @@ prefix_rule(pattern=["rm"], decision="forbidden")
let requirement = create_approval_requirement_for_command(
&Policy::empty(),
&features,
&command,
AskForApproval::UnlessTrusted,
&features,
&SandboxPolicy::ReadOnly,
SandboxPermissions::UseDefault,
);
@@ -551,9 +551,9 @@ prefix_rule(pattern=["rm"], decision="forbidden")
let requirement = create_approval_requirement_for_command(
&policy,
&Features::with_defaults(),
&command,
AskForApproval::OnRequest,
&Features::with_defaults(),
&SandboxPolicy::DangerFullAccess,
SandboxPermissions::UseDefault,
);
@@ -576,9 +576,9 @@ prefix_rule(pattern=["rm"], decision="forbidden")
];
let requirement = create_approval_requirement_for_command(
&Policy::empty(),
&Features::with_defaults(),
&command,
AskForApproval::UnlessTrusted,
&Features::with_defaults(),
&SandboxPolicy::ReadOnly,
SandboxPermissions::UseDefault,
);

View File

@@ -243,9 +243,9 @@ impl ShellHandler {
justification: exec_params.justification.clone(),
approval_requirement: create_approval_requirement_for_command(
&exec_policy,
&features,
&exec_params.command,
turn.approval_policy,
&features,
&turn.sandbox_policy,
SandboxPermissions::from(exec_params.with_escalated_permissions.unwrap_or(false)),
),

View File

@@ -566,9 +566,9 @@ impl UnifiedExecSessionManager {
justification,
create_approval_requirement_for_command(
&exec_policy,
&features,
command,
context.turn.approval_policy,
&features,
&context.turn.sandbox_policy,
SandboxPermissions::from(with_escalated_permissions.unwrap_or(false)),
),