better name for windows sandbox features (#8077)

`--enable enable...` is a bad look
This commit is contained in:
iceweasel-oai
2025-12-15 10:15:40 -08:00
committed by GitHub
parent 017a4a06b2
commit b4635ccc07
4 changed files with 9 additions and 5 deletions

View File

@@ -1270,7 +1270,7 @@ impl CodexMessageProcessor {
let mut cli_overrides = cli_overrides.unwrap_or_default();
if cfg!(windows) && self.config.features.enabled(Feature::WindowsSandbox) {
cli_overrides.insert(
"features.enable_experimental_windows_sandbox".to_string(),
"features.experimental_windows_sandbox".to_string(),
serde_json::json!(true),
);
}
@@ -2187,7 +2187,7 @@ impl CodexMessageProcessor {
let mut cli_overrides = cli_overrides.unwrap_or_default();
if cfg!(windows) && self.config.features.enabled(Feature::WindowsSandbox) {
cli_overrides.insert(
"features.enable_experimental_windows_sandbox".to_string(),
"features.experimental_windows_sandbox".to_string(),
serde_json::json!(true),
);
}

View File

@@ -325,13 +325,13 @@ pub const FEATURES: &[FeatureSpec] = &[
},
FeatureSpec {
id: Feature::WindowsSandbox,
key: "enable_experimental_windows_sandbox",
key: "experimental_windows_sandbox",
stage: Stage::Experimental,
default_enabled: false,
},
FeatureSpec {
id: Feature::WindowsSandboxElevated,
key: "enable_elevated_windows_sandbox",
key: "elevated_windows_sandbox",
stage: Stage::Experimental,
default_enabled: false,
},

View File

@@ -9,6 +9,10 @@ struct Alias {
}
const ALIASES: &[Alias] = &[
Alias {
legacy_key: "enable_experimental_windows_sandbox",
feature: Feature::WindowsSandbox,
},
Alias {
legacy_key: "experimental_use_unified_exec_tool",
feature: Feature::UnifiedExec,

View File

@@ -81,7 +81,7 @@ impl SandboxManager {
SandboxablePreference::Forbid => SandboxType::None,
SandboxablePreference::Require => {
// Require a platform sandbox when available; on Windows this
// respects the enable_experimental_windows_sandbox feature.
// respects the experimental_windows_sandbox feature.
crate::safety::get_platform_sandbox().unwrap_or(SandboxType::None)
}
SandboxablePreference::Auto => match policy {