mirror of
https://github.com/openai/codex.git
synced 2026-05-04 11:26:33 +00:00
## Summary
- adds managed requirements support for deny-read filesystem entries
- constrains config layers so managed deny-read requirements cannot be
widened by user-controlled config
- surfaces managed deny-read requirements through debug/config plumbing
This PR lets managed requirements inject deny-read filesystem
constraints into the effective filesystem sandbox policy.
User-controlled config can still choose the surrounding permission
profile, but it cannot remove or weaken the managed deny-read entries.
## Managed deny-read shape
A managed requirements file can declare exact paths and glob patterns
under `[permissions.filesystem]`:
```toml
# /etc/codex/requirements.toml
[permissions.filesystem]
deny_read = [
"/Users/alice/.gitconfig",
"/Users/alice/.ssh",
"./managed-private/**/*.env",
]
```
Those entries are compiled into the effective filesystem policy as
`access = none` rules, equivalent in shape to filesystem permission
entries like:
```toml
[permissions.workspace.filesystem]
"/Users/alice/.gitconfig" = "none"
"/Users/alice/.ssh" = "none"
"/absolute/path/to/managed-private/**/*.env" = "none"
```
The important difference is that the managed entries come from
requirements, so lower-precedence user config cannot remove them or make
those paths readable again.
Relative managed `deny_read` entries are resolved relative to the
directory containing the managed requirements file. Glob entries keep
their glob suffix after the non-glob prefix is normalized.
## Runtime behavior
- Managed `deny_read` entries are appended to the effective
`FileSystemSandboxPolicy` after the selected permission profile is
resolved.
- Exact paths become `FileSystemPath::Path { access: None }`; glob
patterns become `FileSystemPath::GlobPattern { access: None }`.
- When managed deny-read entries are present, `sandbox_mode` is
constrained to `read-only` or `workspace-write`; `danger-full-access`
and `external-sandbox` cannot silently bypass the managed read-deny
policy.
- On Windows, the managed deny-read policy is enforced for direct file
tools, but shell subprocess reads are not sandboxed yet, so startup
emits a warning for that platform.
- `/debug-config` shows the effective managed requirement as
`permissions.filesystem.deny_read` with its source.
## Stack
1. #15979 - glob deny-read policy/config/direct-tool support
2. #18096 - macOS and Linux sandbox enforcement
3. This PR - managed deny-read requirements
---------
Co-authored-by: Codex <noreply@openai.com>
333 lines
9.8 KiB
Rust
333 lines
9.8 KiB
Rust
use std::fmt;
|
|
use std::sync::Arc;
|
|
|
|
use crate::config_requirements::RequirementSource;
|
|
use thiserror::Error;
|
|
|
|
#[derive(Debug, Error, PartialEq, Eq)]
|
|
pub enum ConstraintError {
|
|
#[error(
|
|
"invalid value for `{field_name}`: `{candidate}` is not in the allowed set {allowed} (set by {requirement_source})"
|
|
)]
|
|
InvalidValue {
|
|
field_name: &'static str,
|
|
candidate: String,
|
|
allowed: String,
|
|
requirement_source: RequirementSource,
|
|
},
|
|
|
|
#[error("field `{field_name}` cannot be empty")]
|
|
EmptyField { field_name: String },
|
|
|
|
#[error("invalid rules in requirements (set by {requirement_source}): {reason}")]
|
|
ExecPolicyParse {
|
|
requirement_source: RequirementSource,
|
|
reason: String,
|
|
},
|
|
}
|
|
|
|
impl ConstraintError {
|
|
pub fn empty_field(field_name: impl Into<String>) -> Self {
|
|
Self::EmptyField {
|
|
field_name: field_name.into(),
|
|
}
|
|
}
|
|
}
|
|
|
|
pub type ConstraintResult<T> = Result<T, ConstraintError>;
|
|
|
|
impl From<ConstraintError> for std::io::Error {
|
|
fn from(err: ConstraintError) -> Self {
|
|
std::io::Error::new(std::io::ErrorKind::InvalidInput, err)
|
|
}
|
|
}
|
|
|
|
type ConstraintValidator<T> = dyn Fn(&T) -> ConstraintResult<()> + Send + Sync;
|
|
/// A ConstraintNormalizer is a function which transforms a value into another of the same type.
|
|
/// `Constrained` uses normalizers to transform values to satisfy constraints or enforce values.
|
|
type ConstraintNormalizer<T> = dyn Fn(T) -> T + Send + Sync;
|
|
|
|
#[derive(Clone)]
|
|
pub struct Constrained<T> {
|
|
value: T,
|
|
validator: Arc<ConstraintValidator<T>>,
|
|
normalizer: Option<Arc<ConstraintNormalizer<T>>>,
|
|
}
|
|
|
|
impl<T: Send + Sync> Constrained<T> {
|
|
pub fn new(
|
|
initial_value: T,
|
|
validator: impl Fn(&T) -> ConstraintResult<()> + Send + Sync + 'static,
|
|
) -> ConstraintResult<Self> {
|
|
let validator: Arc<ConstraintValidator<T>> = Arc::new(validator);
|
|
validator(&initial_value)?;
|
|
Ok(Self {
|
|
value: initial_value,
|
|
validator,
|
|
normalizer: None,
|
|
})
|
|
}
|
|
|
|
/// normalized creates a `Constrained` value with a normalizer function and a validator that allows any value.
|
|
pub fn normalized(
|
|
initial_value: T,
|
|
normalizer: impl Fn(T) -> T + Send + Sync + 'static,
|
|
) -> ConstraintResult<Self> {
|
|
let validator: Arc<ConstraintValidator<T>> = Arc::new(|_| Ok(()));
|
|
let normalizer: Arc<ConstraintNormalizer<T>> = Arc::new(normalizer);
|
|
let normalized = normalizer(initial_value);
|
|
validator(&normalized)?;
|
|
Ok(Self {
|
|
value: normalized,
|
|
validator,
|
|
normalizer: Some(normalizer),
|
|
})
|
|
}
|
|
|
|
pub fn allow_any(initial_value: T) -> Self {
|
|
Self {
|
|
value: initial_value,
|
|
validator: Arc::new(|_| Ok(())),
|
|
normalizer: None,
|
|
}
|
|
}
|
|
|
|
pub fn allow_only(only_value: T) -> Self
|
|
where
|
|
T: Clone + fmt::Debug + PartialEq + 'static,
|
|
{
|
|
let allowed_value = only_value.clone();
|
|
Self {
|
|
value: only_value,
|
|
validator: Arc::new(move |candidate| {
|
|
if candidate == &allowed_value {
|
|
Ok(())
|
|
} else {
|
|
Err(ConstraintError::InvalidValue {
|
|
field_name: "<unknown>",
|
|
candidate: format!("{candidate:?}"),
|
|
allowed: format!("[{allowed_value:?}]"),
|
|
requirement_source: RequirementSource::Unknown,
|
|
})
|
|
}
|
|
}),
|
|
normalizer: None,
|
|
}
|
|
}
|
|
|
|
/// Allow any value of T, using T's Default as the initial value.
|
|
pub fn allow_any_from_default() -> Self
|
|
where
|
|
T: Default,
|
|
{
|
|
Self::allow_any(T::default())
|
|
}
|
|
|
|
pub fn get(&self) -> &T {
|
|
&self.value
|
|
}
|
|
|
|
pub fn value(&self) -> T
|
|
where
|
|
T: Copy,
|
|
{
|
|
self.value
|
|
}
|
|
|
|
pub fn can_set(&self, candidate: &T) -> ConstraintResult<()> {
|
|
(self.validator)(candidate)
|
|
}
|
|
|
|
/// Composes an additional validator onto the current constraint.
|
|
///
|
|
/// The existing value must satisfy the combined validator before it is installed.
|
|
pub fn add_validator(
|
|
&mut self,
|
|
validator: impl Fn(&T) -> ConstraintResult<()> + Send + Sync + 'static,
|
|
) -> ConstraintResult<()>
|
|
where
|
|
T: 'static,
|
|
{
|
|
let existing_validator = self.validator.clone();
|
|
let combined_validator: Arc<ConstraintValidator<T>> = Arc::new(move |candidate| {
|
|
existing_validator(candidate)?;
|
|
validator(candidate)
|
|
});
|
|
|
|
combined_validator(&self.value)?;
|
|
self.validator = combined_validator;
|
|
Ok(())
|
|
}
|
|
|
|
pub fn set(&mut self, value: T) -> ConstraintResult<()> {
|
|
let value = if let Some(normalizer) = &self.normalizer {
|
|
normalizer(value)
|
|
} else {
|
|
value
|
|
};
|
|
(self.validator)(&value)?;
|
|
self.value = value;
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
impl<T> std::ops::Deref for Constrained<T> {
|
|
type Target = T;
|
|
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.value
|
|
}
|
|
}
|
|
|
|
impl<T: fmt::Debug> fmt::Debug for Constrained<T> {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.debug_struct("Constrained")
|
|
.field("value", &self.value)
|
|
.finish()
|
|
}
|
|
}
|
|
|
|
impl<T: PartialEq> PartialEq for Constrained<T> {
|
|
fn eq(&self, other: &Self) -> bool {
|
|
self.value == other.value
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use pretty_assertions::assert_eq;
|
|
|
|
fn invalid_value(candidate: impl Into<String>, allowed: impl Into<String>) -> ConstraintError {
|
|
ConstraintError::InvalidValue {
|
|
field_name: "<unknown>",
|
|
candidate: candidate.into(),
|
|
allowed: allowed.into(),
|
|
requirement_source: RequirementSource::Unknown,
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn constrained_allow_any_accepts_any_value() {
|
|
let mut constrained = Constrained::allow_any(/*initial_value*/ 5);
|
|
constrained
|
|
.set(/*value*/ -10)
|
|
.expect("allow any accepts all values");
|
|
assert_eq!(constrained.value(), -10);
|
|
}
|
|
|
|
#[test]
|
|
fn constrained_allow_any_default_uses_default_value() {
|
|
let constrained = Constrained::<i32>::allow_any_from_default();
|
|
assert_eq!(constrained.value(), 0);
|
|
}
|
|
|
|
#[test]
|
|
fn constrained_allow_only_rejects_different_values() {
|
|
let mut constrained = Constrained::allow_only(/*only_value*/ 5);
|
|
constrained
|
|
.set(/*value*/ 5)
|
|
.expect("allowed value should be accepted");
|
|
|
|
let err = constrained
|
|
.set(/*value*/ 6)
|
|
.expect_err("different value should be rejected");
|
|
assert_eq!(err, invalid_value("6", "[5]"));
|
|
assert_eq!(constrained.value(), 5);
|
|
}
|
|
|
|
#[test]
|
|
fn constrained_normalizer_applies_on_init_and_set() -> anyhow::Result<()> {
|
|
let mut constrained =
|
|
Constrained::normalized(/*initial_value*/ -1, |value| value.max(0))?;
|
|
assert_eq!(constrained.value(), 0);
|
|
constrained.set(/*value*/ -5)?;
|
|
assert_eq!(constrained.value(), 0);
|
|
constrained.set(/*value*/ 10)?;
|
|
assert_eq!(constrained.value(), 10);
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn constrained_add_validator_composes_with_existing_validator() -> anyhow::Result<()> {
|
|
let mut constrained = Constrained::new(/*initial_value*/ 5, |value: &i32| {
|
|
if *value >= 0 {
|
|
Ok(())
|
|
} else {
|
|
Err(ConstraintError::empty_field("value"))
|
|
}
|
|
})?;
|
|
constrained.add_validator(|value| {
|
|
if *value <= 10 {
|
|
Ok(())
|
|
} else {
|
|
Err(ConstraintError::empty_field("value"))
|
|
}
|
|
})?;
|
|
|
|
assert_eq!(constrained.can_set(&7), Ok(()));
|
|
assert_eq!(
|
|
constrained.can_set(&11),
|
|
Err(ConstraintError::empty_field("value"))
|
|
);
|
|
assert_eq!(
|
|
constrained.can_set(&-1),
|
|
Err(ConstraintError::empty_field("value"))
|
|
);
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn constrained_new_rejects_invalid_initial_value() {
|
|
let result = Constrained::new(/*initial_value*/ 0, |value| {
|
|
if *value > 0 {
|
|
Ok(())
|
|
} else {
|
|
Err(invalid_value(value.to_string(), "positive values"))
|
|
}
|
|
});
|
|
|
|
assert_eq!(result, Err(invalid_value("0", "positive values")));
|
|
}
|
|
|
|
#[test]
|
|
fn constrained_set_rejects_invalid_value_and_leaves_previous() {
|
|
let mut constrained = Constrained::new(/*initial_value*/ 1, |value| {
|
|
if *value > 0 {
|
|
Ok(())
|
|
} else {
|
|
Err(invalid_value(value.to_string(), "positive values"))
|
|
}
|
|
})
|
|
.expect("initial value should be accepted");
|
|
|
|
let err = constrained
|
|
.set(/*value*/ -5)
|
|
.expect_err("negative values should be rejected");
|
|
assert_eq!(err, invalid_value("-5", "positive values"));
|
|
assert_eq!(constrained.value(), 1);
|
|
}
|
|
|
|
#[test]
|
|
fn constrained_can_set_allows_probe_without_setting() {
|
|
let constrained = Constrained::new(/*initial_value*/ 1, |value| {
|
|
if *value > 0 {
|
|
Ok(())
|
|
} else {
|
|
Err(invalid_value(value.to_string(), "positive values"))
|
|
}
|
|
})
|
|
.expect("initial value should be accepted");
|
|
|
|
constrained
|
|
.can_set(&2)
|
|
.expect("can_set should accept positive value");
|
|
let err = constrained
|
|
.can_set(&-1)
|
|
.expect_err("can_set should reject negative value");
|
|
assert_eq!(err, invalid_value("-1", "positive values"));
|
|
assert_eq!(constrained.value(), 1);
|
|
}
|
|
}
|