mirror of
https://github.com/openai/codex.git
synced 2026-05-02 10:26:45 +00:00
1182 lines
43 KiB
Rust
1182 lines
43 KiB
Rust
mod layer_io;
|
|
#[cfg(target_os = "macos")]
|
|
mod macos;
|
|
|
|
use self::layer_io::LoadedConfigLayers;
|
|
use crate::CONFIG_TOML_FILE;
|
|
use crate::cloud_requirements::CloudRequirementsLoader;
|
|
use crate::config_requirements::ConfigRequirementsToml;
|
|
use crate::config_requirements::ConfigRequirementsWithSources;
|
|
use crate::config_requirements::RequirementSource;
|
|
use crate::config_requirements::SandboxModeRequirement;
|
|
use crate::config_toml::ConfigToml;
|
|
use crate::config_toml::ProjectConfig;
|
|
use crate::diagnostics::ConfigError;
|
|
use crate::diagnostics::config_error_from_toml;
|
|
use crate::diagnostics::first_layer_config_error_from_entries as typed_first_layer_config_error_from_entries;
|
|
use crate::diagnostics::io_error_from_config_error;
|
|
use crate::merge::merge_toml_values;
|
|
use crate::overrides::build_cli_overrides_layer;
|
|
use crate::project_root_markers::default_project_root_markers;
|
|
use crate::project_root_markers::project_root_markers_from_config;
|
|
use crate::state::ConfigLayerEntry;
|
|
use crate::state::ConfigLayerStack;
|
|
use crate::state::LoaderOverrides;
|
|
use crate::thread_config::ThreadConfigContext;
|
|
use crate::thread_config::ThreadConfigLoader;
|
|
use codex_app_server_protocol::ConfigLayerSource;
|
|
use codex_file_system::ExecutorFileSystem;
|
|
use codex_git_utils::resolve_root_git_project_for_trust;
|
|
use codex_protocol::config_types::ApprovalsReviewer;
|
|
use codex_protocol::config_types::SandboxMode;
|
|
use codex_protocol::config_types::TrustLevel;
|
|
use codex_protocol::protocol::AskForApproval;
|
|
use codex_utils_absolute_path::AbsolutePathBuf;
|
|
use codex_utils_absolute_path::AbsolutePathBufGuard;
|
|
use dunce::canonicalize as normalize_path;
|
|
use serde::Deserialize;
|
|
use std::io;
|
|
use std::path::Path;
|
|
#[cfg(windows)]
|
|
use std::path::PathBuf;
|
|
use toml::Value as TomlValue;
|
|
|
|
#[cfg(unix)]
|
|
const SYSTEM_CONFIG_TOML_FILE_UNIX: &str = "/etc/codex/config.toml";
|
|
|
|
#[cfg(windows)]
|
|
const DEFAULT_PROGRAM_DATA_DIR_WINDOWS: &str = r"C:\ProgramData";
|
|
|
|
async fn first_layer_config_error_from_entries(layers: &[ConfigLayerEntry]) -> Option<ConfigError> {
|
|
typed_first_layer_config_error_from_entries::<ConfigToml>(layers, CONFIG_TOML_FILE).await
|
|
}
|
|
|
|
/// To build up the set of admin-enforced constraints, we build up from multiple
|
|
/// configuration layers in the following order, but a constraint defined in an
|
|
/// earlier layer cannot be overridden by a later layer:
|
|
///
|
|
/// - cloud: managed cloud requirements
|
|
/// - admin: managed preferences (*)
|
|
/// - system `/etc/codex/requirements.toml` (Unix) or
|
|
/// `%ProgramData%\OpenAI\Codex\requirements.toml` (Windows)
|
|
///
|
|
/// For backwards compatibility, we also load from
|
|
/// `managed_config.toml` and map it to `requirements.toml`.
|
|
///
|
|
/// Configuration is built up from multiple layers in the following order:
|
|
///
|
|
/// - admin: managed preferences (*)
|
|
/// - system `/etc/codex/config.toml` (Unix) or
|
|
/// `%ProgramData%\OpenAI\Codex\config.toml` (Windows)
|
|
/// - user `${CODEX_HOME}/config.toml`
|
|
/// - cwd `${PWD}/config.toml` (loaded but disabled when the directory is untrusted)
|
|
/// - tree parent directories up to root looking for `./.codex/config.toml` (loaded but disabled when untrusted)
|
|
/// - repo `$(git rev-parse --show-toplevel)/.codex/config.toml` (loaded but disabled when untrusted)
|
|
/// - runtime e.g., --config flags, model selector in UI
|
|
///
|
|
/// (*) Only available on macOS via managed device profiles.
|
|
///
|
|
/// See https://developers.openai.com/codex/security for details.
|
|
///
|
|
/// When loading the config stack for a thread, there should be a `cwd`
|
|
/// associated with it such that `cwd` should be `Some(...)`. Only for
|
|
/// thread-agnostic config loading (e.g., for the app server's `/config`
|
|
/// endpoint) should `cwd` be `None`.
|
|
#[allow(clippy::too_many_arguments)]
|
|
pub async fn load_config_layers_state(
|
|
fs: &dyn ExecutorFileSystem,
|
|
codex_home: &Path,
|
|
cwd: Option<AbsolutePathBuf>,
|
|
cli_overrides: &[(String, TomlValue)],
|
|
overrides: LoaderOverrides,
|
|
cloud_requirements: CloudRequirementsLoader,
|
|
thread_config_loader: &dyn ThreadConfigLoader,
|
|
) -> io::Result<ConfigLayerStack> {
|
|
let ignore_managed_requirements = overrides.ignore_managed_requirements;
|
|
let ignore_user_config = overrides.ignore_user_config;
|
|
let ignore_user_and_project_exec_policy_rules =
|
|
overrides.ignore_user_and_project_exec_policy_rules;
|
|
let mut config_requirements_toml = ConfigRequirementsWithSources::default();
|
|
|
|
if !ignore_managed_requirements {
|
|
if let Some(requirements) = cloud_requirements.get().await.map_err(io::Error::other)? {
|
|
merge_requirements_with_remote_sandbox_config(
|
|
&mut config_requirements_toml,
|
|
RequirementSource::CloudRequirements,
|
|
requirements,
|
|
);
|
|
}
|
|
|
|
#[cfg(target_os = "macos")]
|
|
macos::load_managed_admin_requirements_toml(
|
|
&mut config_requirements_toml,
|
|
overrides
|
|
.macos_managed_config_requirements_base64
|
|
.as_deref(),
|
|
)
|
|
.await?;
|
|
|
|
// Honor the system requirements.toml location.
|
|
let requirements_toml_file = system_requirements_toml_file_with_overrides(&overrides)?;
|
|
load_requirements_toml(fs, &mut config_requirements_toml, &requirements_toml_file).await?;
|
|
}
|
|
|
|
// Make a best-effort to support the legacy `managed_config.toml` as a
|
|
// requirements specification.
|
|
let loaded_config_layers =
|
|
layer_io::load_config_layers_internal(fs, codex_home, overrides.clone()).await?;
|
|
if !ignore_managed_requirements {
|
|
load_requirements_from_legacy_scheme(
|
|
&mut config_requirements_toml,
|
|
loaded_config_layers.clone(),
|
|
)
|
|
.await?;
|
|
}
|
|
|
|
let thread_config_context = ThreadConfigContext {
|
|
thread_id: None,
|
|
cwd: cwd.clone(),
|
|
};
|
|
let thread_config_layers = thread_config_loader
|
|
.load_config_layers(thread_config_context)
|
|
.await
|
|
.map_err(io::Error::other)?;
|
|
|
|
let mut layers = Vec::<ConfigLayerEntry>::new();
|
|
|
|
let cli_overrides_layer = if cli_overrides.is_empty() {
|
|
None
|
|
} else {
|
|
let cli_overrides_layer = build_cli_overrides_layer(cli_overrides);
|
|
let base_dir = cwd
|
|
.as_ref()
|
|
.map(AbsolutePathBuf::as_path)
|
|
.unwrap_or(codex_home);
|
|
Some(resolve_relative_paths_in_config_toml(
|
|
cli_overrides_layer,
|
|
base_dir,
|
|
)?)
|
|
};
|
|
|
|
// Include an entry for the "system" config folder, loading its config.toml,
|
|
// if it exists.
|
|
let system_config_toml_file = system_config_toml_file_with_overrides(&overrides)?;
|
|
let system_layer =
|
|
load_config_toml_for_required_layer(fs, &system_config_toml_file, |config_toml| {
|
|
ConfigLayerEntry::new(
|
|
ConfigLayerSource::System {
|
|
file: system_config_toml_file.clone(),
|
|
},
|
|
config_toml,
|
|
)
|
|
})
|
|
.await?;
|
|
layers.push(system_layer);
|
|
|
|
// Add a layer for $CODEX_HOME/config.toml so folder-derived resources such
|
|
// as rules/ can still be discovered. When user config is ignored, preserve
|
|
// the layer metadata without reading config.toml.
|
|
let user_file = AbsolutePathBuf::resolve_path_against_base(CONFIG_TOML_FILE, codex_home);
|
|
let user_layer = if ignore_user_config {
|
|
ConfigLayerEntry::new(
|
|
ConfigLayerSource::User {
|
|
file: user_file.clone(),
|
|
},
|
|
TomlValue::Table(toml::map::Map::new()),
|
|
)
|
|
} else {
|
|
load_config_toml_for_required_layer(fs, &user_file, |config_toml| {
|
|
ConfigLayerEntry::new(
|
|
ConfigLayerSource::User {
|
|
file: user_file.clone(),
|
|
},
|
|
config_toml,
|
|
)
|
|
})
|
|
.await?
|
|
};
|
|
layers.push(user_layer);
|
|
|
|
if let Some(cwd) = cwd {
|
|
let mut merged_so_far = TomlValue::Table(toml::map::Map::new());
|
|
for layer in &layers {
|
|
merge_toml_values(&mut merged_so_far, &layer.config);
|
|
}
|
|
if let Some(cli_overrides_layer) = cli_overrides_layer.as_ref() {
|
|
merge_toml_values(&mut merged_so_far, cli_overrides_layer);
|
|
}
|
|
|
|
let project_root_markers = match project_root_markers_from_config(&merged_so_far) {
|
|
Ok(markers) => markers.unwrap_or_else(default_project_root_markers),
|
|
Err(err) => {
|
|
if let Some(config_error) = first_layer_config_error_from_entries(&layers).await {
|
|
return Err(io_error_from_config_error(
|
|
io::ErrorKind::InvalidData,
|
|
config_error,
|
|
/*source*/ None,
|
|
));
|
|
}
|
|
return Err(err);
|
|
}
|
|
};
|
|
let project_trust_context = match project_trust_context(
|
|
fs,
|
|
&merged_so_far,
|
|
&cwd,
|
|
&project_root_markers,
|
|
codex_home,
|
|
&user_file,
|
|
)
|
|
.await
|
|
{
|
|
Ok(context) => context,
|
|
Err(err) => {
|
|
let source = err
|
|
.get_ref()
|
|
.and_then(|err| err.downcast_ref::<toml::de::Error>())
|
|
.cloned();
|
|
if let Some(config_error) = first_layer_config_error_from_entries(&layers).await {
|
|
return Err(io_error_from_config_error(
|
|
io::ErrorKind::InvalidData,
|
|
config_error,
|
|
source,
|
|
));
|
|
}
|
|
return Err(err);
|
|
}
|
|
};
|
|
let project_layers = load_project_layers(
|
|
fs,
|
|
&cwd,
|
|
&project_trust_context.project_root,
|
|
&project_trust_context,
|
|
codex_home,
|
|
)
|
|
.await?;
|
|
layers.extend(project_layers);
|
|
}
|
|
|
|
// Add a layer for runtime overrides from the CLI or UI, if any exist.
|
|
if let Some(cli_overrides_layer) = cli_overrides_layer {
|
|
layers.push(ConfigLayerEntry::new(
|
|
ConfigLayerSource::SessionFlags,
|
|
cli_overrides_layer,
|
|
));
|
|
}
|
|
|
|
for thread_config_layer in thread_config_layers {
|
|
insert_layer_by_precedence(&mut layers, thread_config_layer);
|
|
}
|
|
|
|
// Make a best-effort to support the legacy `managed_config.toml` as a
|
|
// config layer on top of everything else. For fields in
|
|
// `managed_config.toml` that do not have an equivalent in
|
|
// `ConfigRequirements`, note users can still override these values on a
|
|
// per-turn basis in the TUI and VS Code.
|
|
let LoadedConfigLayers {
|
|
managed_config,
|
|
managed_config_from_mdm,
|
|
} = loaded_config_layers;
|
|
if let Some(config) = managed_config {
|
|
let managed_parent = config.file.as_path().parent().ok_or_else(|| {
|
|
io::Error::new(
|
|
io::ErrorKind::InvalidData,
|
|
format!(
|
|
"Managed config file {} has no parent directory",
|
|
config.file.as_path().display()
|
|
),
|
|
)
|
|
})?;
|
|
let managed_config =
|
|
resolve_relative_paths_in_config_toml(config.managed_config, managed_parent)?;
|
|
layers.push(ConfigLayerEntry::new(
|
|
ConfigLayerSource::LegacyManagedConfigTomlFromFile { file: config.file },
|
|
managed_config,
|
|
));
|
|
}
|
|
if let Some(config) = managed_config_from_mdm {
|
|
// As a general rule, config from MDM should _not_ include relative
|
|
// paths, starting with `./`, but a path starting with `~/` _is_ a
|
|
// supported use case. Because resolve_relative_paths_in_config_toml()
|
|
// relies on AbsolutePathBufGuard to resolve `~/`, we must supply a
|
|
// value for base_dir, so codex_home is as good a value as any.
|
|
let managed_config =
|
|
resolve_relative_paths_in_config_toml(config.managed_config, codex_home)?;
|
|
layers.push(ConfigLayerEntry::new_with_raw_toml(
|
|
ConfigLayerSource::LegacyManagedConfigTomlFromMdm,
|
|
managed_config,
|
|
config.raw_toml,
|
|
));
|
|
}
|
|
|
|
Ok(ConfigLayerStack::new(
|
|
layers,
|
|
config_requirements_toml.clone().try_into()?,
|
|
config_requirements_toml.into_toml(),
|
|
)?
|
|
.with_user_and_project_exec_policy_rules_ignored(ignore_user_and_project_exec_policy_rules))
|
|
}
|
|
|
|
fn insert_layer_by_precedence(layers: &mut Vec<ConfigLayerEntry>, layer: ConfigLayerEntry) {
|
|
match layers
|
|
.iter()
|
|
.position(|existing| existing.name.precedence() > layer.name.precedence())
|
|
{
|
|
Some(index) => layers.insert(index, layer),
|
|
None => layers.push(layer),
|
|
}
|
|
}
|
|
|
|
/// Attempts to load a config.toml file from `config_toml`.
|
|
/// - If the file exists and is valid TOML, passes the parsed `toml::Value` to
|
|
/// `create_entry` and returns the resulting layer entry.
|
|
/// - If the file does not exist, uses an empty `Table` with `create_entry` and
|
|
/// returns the resulting layer entry.
|
|
/// - If there is an error reading the file or parsing the TOML, returns an
|
|
/// error.
|
|
async fn load_config_toml_for_required_layer(
|
|
fs: &dyn ExecutorFileSystem,
|
|
toml_file: &AbsolutePathBuf,
|
|
create_entry: impl FnOnce(TomlValue) -> ConfigLayerEntry,
|
|
) -> io::Result<ConfigLayerEntry> {
|
|
let toml_value = match fs.read_file_text(toml_file, /*sandbox*/ None).await {
|
|
Ok(contents) => {
|
|
let config: TomlValue = toml::from_str(&contents).map_err(|err| {
|
|
let config_error =
|
|
config_error_from_toml(toml_file.as_path(), &contents, err.clone());
|
|
io_error_from_config_error(io::ErrorKind::InvalidData, config_error, Some(err))
|
|
})?;
|
|
let config_parent = toml_file.as_path().parent().ok_or_else(|| {
|
|
io::Error::new(
|
|
io::ErrorKind::InvalidData,
|
|
format!(
|
|
"Config file {} has no parent directory",
|
|
toml_file.as_path().display()
|
|
),
|
|
)
|
|
})?;
|
|
resolve_relative_paths_in_config_toml(config, config_parent)
|
|
}
|
|
Err(e) => {
|
|
if e.kind() == io::ErrorKind::NotFound {
|
|
Ok(TomlValue::Table(toml::map::Map::new()))
|
|
} else {
|
|
Err(io::Error::new(
|
|
e.kind(),
|
|
format!(
|
|
"Failed to read config file {}: {e}",
|
|
toml_file.as_path().display()
|
|
),
|
|
))
|
|
}
|
|
}
|
|
}?;
|
|
|
|
Ok(create_entry(toml_value))
|
|
}
|
|
|
|
/// If available, apply requirements from the platform system
|
|
/// `requirements.toml` location to `config_requirements_toml` by filling in
|
|
/// any unset fields.
|
|
#[doc(hidden)]
|
|
pub async fn load_requirements_toml(
|
|
fs: &dyn ExecutorFileSystem,
|
|
config_requirements_toml: &mut ConfigRequirementsWithSources,
|
|
requirements_toml_file: &AbsolutePathBuf,
|
|
) -> io::Result<()> {
|
|
match fs
|
|
.read_file_text(requirements_toml_file, /*sandbox*/ None)
|
|
.await
|
|
{
|
|
Ok(contents) => {
|
|
let requirements_parent = requirements_toml_file.parent().ok_or_else(|| {
|
|
io::Error::new(
|
|
io::ErrorKind::InvalidData,
|
|
format!(
|
|
"Requirements file {} has no parent directory",
|
|
requirements_toml_file.as_ref().display()
|
|
),
|
|
)
|
|
})?;
|
|
let _guard = AbsolutePathBufGuard::new(requirements_parent.as_path());
|
|
let requirements_config: ConfigRequirementsToml =
|
|
toml::from_str(&contents).map_err(|e| {
|
|
io::Error::new(
|
|
io::ErrorKind::InvalidData,
|
|
format!(
|
|
"Error parsing requirements file {}: {e}",
|
|
requirements_toml_file.as_path().display(),
|
|
),
|
|
)
|
|
})?;
|
|
merge_requirements_with_remote_sandbox_config(
|
|
config_requirements_toml,
|
|
RequirementSource::SystemRequirementsToml {
|
|
file: requirements_toml_file.clone(),
|
|
},
|
|
requirements_config,
|
|
);
|
|
}
|
|
Err(e) => {
|
|
if e.kind() != io::ErrorKind::NotFound {
|
|
return Err(io::Error::new(
|
|
e.kind(),
|
|
format!(
|
|
"Failed to read requirements file {}: {e}",
|
|
requirements_toml_file.as_path().display(),
|
|
),
|
|
));
|
|
}
|
|
}
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
#[cfg(unix)]
|
|
fn system_requirements_toml_file() -> io::Result<AbsolutePathBuf> {
|
|
AbsolutePathBuf::from_absolute_path(Path::new("/etc/codex/requirements.toml"))
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
fn system_requirements_toml_file() -> io::Result<AbsolutePathBuf> {
|
|
windows_system_requirements_toml_file()
|
|
}
|
|
|
|
fn system_requirements_toml_file_with_overrides(
|
|
overrides: &LoaderOverrides,
|
|
) -> io::Result<AbsolutePathBuf> {
|
|
match &overrides.system_requirements_path {
|
|
Some(path) => AbsolutePathBuf::from_absolute_path(path),
|
|
None => system_requirements_toml_file(),
|
|
}
|
|
}
|
|
|
|
#[cfg(unix)]
|
|
pub fn system_config_toml_file() -> io::Result<AbsolutePathBuf> {
|
|
AbsolutePathBuf::from_absolute_path(Path::new(SYSTEM_CONFIG_TOML_FILE_UNIX))
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
pub fn system_config_toml_file() -> io::Result<AbsolutePathBuf> {
|
|
windows_system_config_toml_file()
|
|
}
|
|
|
|
fn system_config_toml_file_with_overrides(
|
|
overrides: &LoaderOverrides,
|
|
) -> io::Result<AbsolutePathBuf> {
|
|
match &overrides.system_config_path {
|
|
Some(path) => AbsolutePathBuf::from_absolute_path(path),
|
|
None => system_config_toml_file(),
|
|
}
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
fn windows_codex_system_dir() -> PathBuf {
|
|
let program_data = windows_program_data_dir_from_known_folder().unwrap_or_else(|err| {
|
|
tracing::warn!(
|
|
error = %err,
|
|
"Failed to resolve ProgramData known folder; using default path"
|
|
);
|
|
PathBuf::from(DEFAULT_PROGRAM_DATA_DIR_WINDOWS)
|
|
});
|
|
program_data.join("OpenAI").join("Codex")
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
fn windows_system_requirements_toml_file() -> io::Result<AbsolutePathBuf> {
|
|
let requirements_toml_file = windows_codex_system_dir().join("requirements.toml");
|
|
AbsolutePathBuf::try_from(requirements_toml_file)
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
fn windows_system_config_toml_file() -> io::Result<AbsolutePathBuf> {
|
|
let config_toml_file = windows_codex_system_dir().join("config.toml");
|
|
AbsolutePathBuf::try_from(config_toml_file)
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
fn windows_program_data_dir_from_known_folder() -> io::Result<PathBuf> {
|
|
use std::ffi::OsString;
|
|
use std::os::windows::ffi::OsStringExt;
|
|
use windows_sys::Win32::System::Com::CoTaskMemFree;
|
|
use windows_sys::Win32::UI::Shell::FOLDERID_ProgramData;
|
|
use windows_sys::Win32::UI::Shell::KF_FLAG_DEFAULT;
|
|
use windows_sys::Win32::UI::Shell::SHGetKnownFolderPath;
|
|
|
|
let mut path_ptr = std::ptr::null_mut::<u16>();
|
|
let known_folder_flags = u32::try_from(KF_FLAG_DEFAULT).map_err(|_| {
|
|
io::Error::other(format!(
|
|
"KF_FLAG_DEFAULT did not fit in u32: {KF_FLAG_DEFAULT}"
|
|
))
|
|
})?;
|
|
// Known folder IDs reference:
|
|
// https://learn.microsoft.com/en-us/windows/win32/shell/knownfolderid
|
|
// SAFETY: SHGetKnownFolderPath initializes path_ptr with a CoTaskMem-allocated,
|
|
// null-terminated UTF-16 string on success.
|
|
let hr = unsafe {
|
|
SHGetKnownFolderPath(&FOLDERID_ProgramData, known_folder_flags, 0, &mut path_ptr)
|
|
};
|
|
if hr != 0 {
|
|
return Err(io::Error::other(format!(
|
|
"SHGetKnownFolderPath(FOLDERID_ProgramData) failed with HRESULT {hr:#010x}"
|
|
)));
|
|
}
|
|
if path_ptr.is_null() {
|
|
return Err(io::Error::other(
|
|
"SHGetKnownFolderPath(FOLDERID_ProgramData) returned a null pointer",
|
|
));
|
|
}
|
|
|
|
// SAFETY: path_ptr is a valid null-terminated UTF-16 string allocated by
|
|
// SHGetKnownFolderPath and must be freed with CoTaskMemFree.
|
|
let path = unsafe {
|
|
let mut len = 0usize;
|
|
while *path_ptr.add(len) != 0 {
|
|
len += 1;
|
|
}
|
|
let wide = std::slice::from_raw_parts(path_ptr, len);
|
|
let path = PathBuf::from(OsString::from_wide(wide));
|
|
CoTaskMemFree(path_ptr.cast());
|
|
path
|
|
};
|
|
|
|
Ok(path)
|
|
}
|
|
|
|
async fn load_requirements_from_legacy_scheme(
|
|
config_requirements_toml: &mut ConfigRequirementsWithSources,
|
|
loaded_config_layers: LoadedConfigLayers,
|
|
) -> io::Result<()> {
|
|
// In this implementation, earlier layers cannot be overwritten by later
|
|
// layers, so list managed_config_from_mdm first because it has the highest
|
|
// precedence.
|
|
let LoadedConfigLayers {
|
|
managed_config,
|
|
managed_config_from_mdm,
|
|
} = loaded_config_layers;
|
|
|
|
for (source, config) in managed_config_from_mdm
|
|
.map(|config| {
|
|
(
|
|
RequirementSource::LegacyManagedConfigTomlFromMdm,
|
|
config.managed_config,
|
|
)
|
|
})
|
|
.into_iter()
|
|
.chain(managed_config.map(|c| {
|
|
(
|
|
RequirementSource::LegacyManagedConfigTomlFromFile { file: c.file },
|
|
c.managed_config,
|
|
)
|
|
}))
|
|
{
|
|
let legacy_config: LegacyManagedConfigToml =
|
|
config.try_into().map_err(|err: toml::de::Error| {
|
|
io::Error::new(
|
|
io::ErrorKind::InvalidData,
|
|
format!("Failed to parse config requirements as TOML: {err}"),
|
|
)
|
|
})?;
|
|
|
|
merge_requirements_with_remote_sandbox_config(
|
|
config_requirements_toml,
|
|
source,
|
|
ConfigRequirementsToml::from(legacy_config),
|
|
);
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
pub(super) fn merge_requirements_with_remote_sandbox_config(
|
|
target: &mut ConfigRequirementsWithSources,
|
|
source: RequirementSource,
|
|
mut requirements: ConfigRequirementsToml,
|
|
) {
|
|
if requirements.remote_sandbox_config.is_some() {
|
|
let host_name = crate::host_name();
|
|
requirements.apply_remote_sandbox_config(host_name.as_deref());
|
|
}
|
|
target.merge_unset_fields(source, requirements);
|
|
}
|
|
|
|
struct ProjectTrustContext {
|
|
project_root: AbsolutePathBuf,
|
|
project_root_key: String,
|
|
project_root_lookup_keys: Vec<String>,
|
|
repo_root_key: Option<String>,
|
|
repo_root_lookup_keys: Option<Vec<String>>,
|
|
projects_trust: std::collections::HashMap<String, TrustLevel>,
|
|
user_config_file: AbsolutePathBuf,
|
|
}
|
|
|
|
#[derive(Deserialize)]
|
|
struct ProjectTrustConfigToml {
|
|
projects: Option<std::collections::HashMap<String, ProjectConfig>>,
|
|
}
|
|
|
|
struct ProjectTrustDecision {
|
|
trust_level: Option<TrustLevel>,
|
|
trust_key: String,
|
|
}
|
|
|
|
impl ProjectTrustDecision {
|
|
fn is_trusted(&self) -> bool {
|
|
matches!(self.trust_level, Some(TrustLevel::Trusted))
|
|
}
|
|
}
|
|
|
|
impl ProjectTrustContext {
|
|
fn decision_for_dir(&self, dir: &AbsolutePathBuf) -> ProjectTrustDecision {
|
|
for dir_key in normalized_project_trust_keys(dir.as_path()) {
|
|
if let Some((trust_key, trust_level)) =
|
|
project_trust_for_lookup_key(&self.projects_trust, &dir_key)
|
|
{
|
|
return ProjectTrustDecision {
|
|
trust_level: Some(trust_level),
|
|
trust_key,
|
|
};
|
|
}
|
|
}
|
|
|
|
for project_root_key in &self.project_root_lookup_keys {
|
|
if let Some((trust_key, trust_level)) =
|
|
project_trust_for_lookup_key(&self.projects_trust, project_root_key)
|
|
{
|
|
return ProjectTrustDecision {
|
|
trust_level: Some(trust_level),
|
|
trust_key,
|
|
};
|
|
}
|
|
}
|
|
|
|
if let Some(repo_root_lookup_keys) = self.repo_root_lookup_keys.as_ref() {
|
|
for repo_root_key in repo_root_lookup_keys {
|
|
if let Some((trust_key, trust_level)) =
|
|
project_trust_for_lookup_key(&self.projects_trust, repo_root_key)
|
|
{
|
|
return ProjectTrustDecision {
|
|
trust_level: Some(trust_level),
|
|
trust_key,
|
|
};
|
|
}
|
|
}
|
|
}
|
|
|
|
ProjectTrustDecision {
|
|
trust_level: None,
|
|
trust_key: self
|
|
.repo_root_key
|
|
.clone()
|
|
.unwrap_or_else(|| self.project_root_key.clone()),
|
|
}
|
|
}
|
|
|
|
fn disabled_reason_for_decision(&self, decision: &ProjectTrustDecision) -> Option<String> {
|
|
if decision.is_trusted() {
|
|
return None;
|
|
}
|
|
|
|
let gated_features = "project-local config, hooks, and exec policies";
|
|
let trust_key = decision.trust_key.as_str();
|
|
let user_config_file = self.user_config_file.as_path().display();
|
|
match decision.trust_level {
|
|
Some(TrustLevel::Untrusted) => Some(format!(
|
|
"{trust_key} is marked as untrusted in {user_config_file}. To load {gated_features}, mark it trusted."
|
|
)),
|
|
_ => Some(format!(
|
|
"To load {gated_features}, add {trust_key} as a trusted project in {user_config_file}."
|
|
)),
|
|
}
|
|
}
|
|
}
|
|
|
|
fn project_layer_entry(
|
|
dot_codex_folder: &AbsolutePathBuf,
|
|
config: TomlValue,
|
|
disabled_reason: Option<String>,
|
|
) -> ConfigLayerEntry {
|
|
let source = ConfigLayerSource::Project {
|
|
dot_codex_folder: dot_codex_folder.clone(),
|
|
};
|
|
|
|
if let Some(reason) = disabled_reason {
|
|
ConfigLayerEntry::new_disabled(source, config, reason)
|
|
} else {
|
|
ConfigLayerEntry::new(source, config)
|
|
}
|
|
}
|
|
|
|
async fn project_trust_context(
|
|
fs: &dyn ExecutorFileSystem,
|
|
merged_config: &TomlValue,
|
|
cwd: &AbsolutePathBuf,
|
|
project_root_markers: &[String],
|
|
config_base_dir: &Path,
|
|
user_config_file: &AbsolutePathBuf,
|
|
) -> io::Result<ProjectTrustContext> {
|
|
let project_trust_config: ProjectTrustConfigToml = {
|
|
let _guard = AbsolutePathBufGuard::new(config_base_dir);
|
|
merged_config
|
|
.clone()
|
|
.try_into()
|
|
.map_err(|err| std::io::Error::new(std::io::ErrorKind::InvalidData, err))?
|
|
};
|
|
|
|
let project_root = find_project_root(fs, cwd, project_root_markers).await?;
|
|
let projects = project_trust_config.projects.unwrap_or_default();
|
|
|
|
let project_root_lookup_keys = normalized_project_trust_keys(project_root.as_path());
|
|
let project_root_key = project_root_lookup_keys
|
|
.first()
|
|
.cloned()
|
|
.unwrap_or_else(|| project_trust_key(project_root.as_path()));
|
|
let repo_root = resolve_root_git_project_for_trust(fs, cwd).await;
|
|
let repo_root_lookup_keys = repo_root
|
|
.as_ref()
|
|
.map(|root| normalized_project_trust_keys(root.as_path()));
|
|
let repo_root_key = repo_root_lookup_keys
|
|
.as_ref()
|
|
.and_then(|keys| keys.first().cloned());
|
|
|
|
let projects_trust = projects
|
|
.into_iter()
|
|
.filter_map(|(key, project)| project.trust_level.map(|trust_level| (key, trust_level)))
|
|
.collect();
|
|
|
|
Ok(ProjectTrustContext {
|
|
project_root,
|
|
project_root_key,
|
|
project_root_lookup_keys,
|
|
repo_root_key,
|
|
repo_root_lookup_keys,
|
|
projects_trust,
|
|
user_config_file: user_config_file.clone(),
|
|
})
|
|
}
|
|
|
|
/// Canonicalize the path and convert it to a string to be used as a key in the
|
|
/// projects trust map. On Windows, strips UNC, when possible, to try to ensure
|
|
/// that different paths that point to the same location have the same key.
|
|
pub fn project_trust_key(path: &Path) -> String {
|
|
normalized_project_trust_keys(path)
|
|
.into_iter()
|
|
.next()
|
|
.unwrap_or_else(|| normalize_project_trust_lookup_key(path.to_string_lossy().to_string()))
|
|
}
|
|
|
|
fn normalized_project_trust_keys(path: &Path) -> Vec<String> {
|
|
let normalized_path = normalize_project_trust_lookup_key(path.to_string_lossy().to_string());
|
|
let normalized_canonical_path = normalize_project_trust_lookup_key(
|
|
normalize_path(path)
|
|
.unwrap_or_else(|_| path.to_path_buf())
|
|
.to_string_lossy()
|
|
.to_string(),
|
|
);
|
|
if normalized_path == normalized_canonical_path {
|
|
vec![normalized_canonical_path]
|
|
} else {
|
|
vec![normalized_canonical_path, normalized_path]
|
|
}
|
|
}
|
|
|
|
fn normalize_project_trust_lookup_key(key: String) -> String {
|
|
if cfg!(windows) {
|
|
key.to_ascii_lowercase()
|
|
} else {
|
|
key
|
|
}
|
|
}
|
|
fn project_trust_for_lookup_key(
|
|
projects_trust: &std::collections::HashMap<String, TrustLevel>,
|
|
lookup_key: &str,
|
|
) -> Option<(String, TrustLevel)> {
|
|
if let Some(trust_level) = projects_trust.get(lookup_key).copied() {
|
|
return Some((lookup_key.to_string(), trust_level));
|
|
}
|
|
|
|
let mut normalized_matches: Vec<_> = projects_trust
|
|
.iter()
|
|
.filter(|(key, _)| normalize_project_trust_lookup_key((*key).clone()) == lookup_key)
|
|
.collect();
|
|
normalized_matches.sort_by(|(left, _), (right, _)| left.cmp(right));
|
|
normalized_matches
|
|
.first()
|
|
.map(|(key, trust_level)| ((**key).clone(), **trust_level))
|
|
}
|
|
/// Takes a `toml::Value` parsed from a config.toml file and walks through it,
|
|
/// resolving any `AbsolutePathBuf` fields against `base_dir`, returning a new
|
|
/// `toml::Value` with the same shape but with paths resolved.
|
|
///
|
|
/// This ensures that multiple config layers can be merged together correctly
|
|
/// even if they were loaded from different directories.
|
|
#[doc(hidden)]
|
|
pub fn resolve_relative_paths_in_config_toml(
|
|
value_from_config_toml: TomlValue,
|
|
base_dir: &Path,
|
|
) -> io::Result<TomlValue> {
|
|
// Use the serialize/deserialize round-trip to convert the
|
|
// `toml::Value` into a `ConfigToml` with `AbsolutePath
|
|
let _guard = AbsolutePathBufGuard::new(base_dir);
|
|
let Ok(resolved) = value_from_config_toml.clone().try_into::<ConfigToml>() else {
|
|
return Ok(value_from_config_toml);
|
|
};
|
|
drop(_guard);
|
|
|
|
let resolved_value = TomlValue::try_from(resolved).map_err(|e| {
|
|
io::Error::new(
|
|
io::ErrorKind::InvalidData,
|
|
format!("Failed to serialize resolved config: {e}"),
|
|
)
|
|
})?;
|
|
|
|
Ok(copy_shape_from_original(
|
|
&value_from_config_toml,
|
|
&resolved_value,
|
|
))
|
|
}
|
|
|
|
/// Ensure that every field in `original` is present in the returned
|
|
/// `toml::Value`, taking the value from `resolved` where possible. This ensures
|
|
/// the fields that we "removed" during the serialize/deserialize round-trip in
|
|
/// `resolve_config_paths` are preserved, out of an abundance of caution.
|
|
fn copy_shape_from_original(original: &TomlValue, resolved: &TomlValue) -> TomlValue {
|
|
match (original, resolved) {
|
|
(TomlValue::Table(original_table), TomlValue::Table(resolved_table)) => {
|
|
let mut table = toml::map::Map::new();
|
|
for (key, original_value) in original_table {
|
|
let resolved_value = resolved_table.get(key).unwrap_or(original_value);
|
|
table.insert(
|
|
key.clone(),
|
|
copy_shape_from_original(original_value, resolved_value),
|
|
);
|
|
}
|
|
TomlValue::Table(table)
|
|
}
|
|
(TomlValue::Array(original_array), TomlValue::Array(resolved_array)) => {
|
|
let mut items = Vec::new();
|
|
for (index, original_value) in original_array.iter().enumerate() {
|
|
let resolved_value = resolved_array.get(index).unwrap_or(original_value);
|
|
items.push(copy_shape_from_original(original_value, resolved_value));
|
|
}
|
|
TomlValue::Array(items)
|
|
}
|
|
(_, resolved_value) => resolved_value.clone(),
|
|
}
|
|
}
|
|
|
|
async fn find_project_root(
|
|
fs: &dyn ExecutorFileSystem,
|
|
cwd: &AbsolutePathBuf,
|
|
project_root_markers: &[String],
|
|
) -> io::Result<AbsolutePathBuf> {
|
|
if project_root_markers.is_empty() {
|
|
return Ok(cwd.clone());
|
|
}
|
|
|
|
for ancestor in cwd.ancestors() {
|
|
for marker in project_root_markers {
|
|
let marker_path = ancestor.join(marker);
|
|
if fs
|
|
.get_metadata(&marker_path, /*sandbox*/ None)
|
|
.await
|
|
.is_ok()
|
|
{
|
|
return Ok(ancestor);
|
|
}
|
|
}
|
|
}
|
|
Ok(cwd.clone())
|
|
}
|
|
|
|
/// Return the appropriate list of layers (each with
|
|
/// [ConfigLayerSource::Project] as the source) between `cwd` and
|
|
/// `project_root`, inclusive. The list is ordered in _increasing_ precdence,
|
|
/// starting from folders closest to `project_root` (which is the lowest
|
|
/// precedence) to those closest to `cwd` (which is the highest precedence).
|
|
async fn load_project_layers(
|
|
fs: &dyn ExecutorFileSystem,
|
|
cwd: &AbsolutePathBuf,
|
|
project_root: &AbsolutePathBuf,
|
|
trust_context: &ProjectTrustContext,
|
|
codex_home: &Path,
|
|
) -> io::Result<Vec<ConfigLayerEntry>> {
|
|
let codex_home_abs = AbsolutePathBuf::from_absolute_path(codex_home)?;
|
|
let codex_home_normalized =
|
|
normalize_path(codex_home_abs.as_path()).unwrap_or_else(|_| codex_home_abs.to_path_buf());
|
|
let mut dirs = cwd
|
|
.ancestors()
|
|
.scan(false, |done, a| {
|
|
if *done {
|
|
None
|
|
} else {
|
|
if &a == project_root {
|
|
*done = true;
|
|
}
|
|
Some(a)
|
|
}
|
|
})
|
|
.collect::<Vec<_>>();
|
|
dirs.reverse();
|
|
|
|
let mut layers = Vec::new();
|
|
for dir in dirs {
|
|
let dot_codex_abs = dir.join(".codex");
|
|
if !fs
|
|
.get_metadata(&dot_codex_abs, /*sandbox*/ None)
|
|
.await
|
|
.map(|metadata| metadata.is_directory)
|
|
.unwrap_or(false)
|
|
{
|
|
continue;
|
|
}
|
|
|
|
let decision = trust_context.decision_for_dir(&dir);
|
|
let disabled_reason = trust_context.disabled_reason_for_decision(&decision);
|
|
let dot_codex_normalized =
|
|
normalize_path(dot_codex_abs.as_path()).unwrap_or_else(|_| dot_codex_abs.to_path_buf());
|
|
if dot_codex_abs == codex_home_abs || dot_codex_normalized == codex_home_normalized {
|
|
continue;
|
|
}
|
|
let config_file = dot_codex_abs.join(CONFIG_TOML_FILE);
|
|
match fs.read_file_text(&config_file, /*sandbox*/ None).await {
|
|
Ok(contents) => {
|
|
let config: TomlValue = match toml::from_str(&contents) {
|
|
Ok(config) => config,
|
|
Err(e) => {
|
|
if decision.is_trusted() {
|
|
let config_file_display = config_file.as_path().display();
|
|
return Err(io::Error::new(
|
|
io::ErrorKind::InvalidData,
|
|
format!(
|
|
"Error parsing project config file {config_file_display}: {e}"
|
|
),
|
|
));
|
|
}
|
|
layers.push(project_layer_entry(
|
|
&dot_codex_abs,
|
|
TomlValue::Table(toml::map::Map::new()),
|
|
disabled_reason.clone(),
|
|
));
|
|
continue;
|
|
}
|
|
};
|
|
let config =
|
|
resolve_relative_paths_in_config_toml(config, dot_codex_abs.as_path())?;
|
|
let entry = project_layer_entry(&dot_codex_abs, config, disabled_reason.clone());
|
|
layers.push(entry);
|
|
}
|
|
Err(err) => {
|
|
if err.kind() == io::ErrorKind::NotFound {
|
|
// If there is no config.toml file, record an empty entry
|
|
// for this project layer, as this may still have subfolders
|
|
// that are significant in the overall ConfigLayerStack.
|
|
layers.push(project_layer_entry(
|
|
&dot_codex_abs,
|
|
TomlValue::Table(toml::map::Map::new()),
|
|
disabled_reason,
|
|
));
|
|
} else {
|
|
let config_file_display = config_file.as_path().display();
|
|
return Err(io::Error::new(
|
|
err.kind(),
|
|
format!("Failed to read project config file {config_file_display}: {err}"),
|
|
));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
Ok(layers)
|
|
}
|
|
/// The legacy mechanism for specifying admin-enforced configuration is to read
|
|
/// from a file like `/etc/codex/managed_config.toml` that has the same
|
|
/// structure as `config.toml` where fields like `approval_policy` can specify
|
|
/// exactly one value rather than a list of allowed values.
|
|
///
|
|
/// If present, re-interpret `managed_config.toml` as a `requirements.toml`
|
|
/// where each specified field is treated as a constraint. Most fields allow
|
|
/// only the specified value. `approvals_reviewer = "auto_review"` also allows
|
|
/// `user` so people can opt out of the auto-reviewer.
|
|
#[derive(Deserialize, Debug, Clone, Default, PartialEq)]
|
|
struct LegacyManagedConfigToml {
|
|
approval_policy: Option<AskForApproval>,
|
|
approvals_reviewer: Option<ApprovalsReviewer>,
|
|
sandbox_mode: Option<SandboxMode>,
|
|
}
|
|
|
|
impl From<LegacyManagedConfigToml> for ConfigRequirementsToml {
|
|
fn from(legacy: LegacyManagedConfigToml) -> Self {
|
|
let mut config_requirements_toml = ConfigRequirementsToml::default();
|
|
|
|
let LegacyManagedConfigToml {
|
|
approval_policy,
|
|
approvals_reviewer,
|
|
sandbox_mode,
|
|
} = legacy;
|
|
if let Some(approval_policy) = approval_policy {
|
|
config_requirements_toml.allowed_approval_policies = Some(vec![approval_policy]);
|
|
}
|
|
if let Some(approvals_reviewer) = approvals_reviewer {
|
|
let mut allowed_reviewers = vec![approvals_reviewer];
|
|
if approvals_reviewer == ApprovalsReviewer::AutoReview {
|
|
allowed_reviewers.push(ApprovalsReviewer::User);
|
|
}
|
|
config_requirements_toml.allowed_approvals_reviewers = Some(allowed_reviewers);
|
|
}
|
|
if let Some(sandbox_mode) = sandbox_mode {
|
|
let required_mode: SandboxModeRequirement = sandbox_mode.into();
|
|
// Allowing read-only is a requirement for Codex to function correctly.
|
|
// So in this backfill path, we append read-only if it's not already specified.
|
|
let mut allowed_modes = vec![SandboxModeRequirement::ReadOnly];
|
|
if required_mode != SandboxModeRequirement::ReadOnly {
|
|
allowed_modes.push(required_mode);
|
|
}
|
|
config_requirements_toml.allowed_sandbox_modes = Some(allowed_modes);
|
|
}
|
|
config_requirements_toml
|
|
}
|
|
}
|
|
|
|
// Cannot name this `mod tests` because of tests.rs in this folder.
|
|
#[cfg(test)]
|
|
mod unit_tests {
|
|
use super::*;
|
|
#[cfg(windows)]
|
|
use std::path::Path;
|
|
use tempfile::tempdir;
|
|
|
|
#[test]
|
|
fn ensure_resolve_relative_paths_in_config_toml_preserves_all_fields() -> anyhow::Result<()> {
|
|
let tmp = tempdir()?;
|
|
let base_dir = tmp.path();
|
|
let contents = r#"
|
|
# This is a field recognized by config.toml that is an AbsolutePathBuf in
|
|
# the ConfigToml struct.
|
|
model_instructions_file = "./some_file.md"
|
|
|
|
# This is a field recognized by config.toml.
|
|
model = "gpt-1000"
|
|
|
|
# This is a field not recognized by config.toml.
|
|
foo = "xyzzy"
|
|
"#;
|
|
let user_config: TomlValue = toml::from_str(contents)?;
|
|
|
|
let normalized_toml_value = resolve_relative_paths_in_config_toml(user_config, base_dir)?;
|
|
let mut expected_toml_value = toml::map::Map::new();
|
|
expected_toml_value.insert(
|
|
"model_instructions_file".to_string(),
|
|
TomlValue::String(
|
|
AbsolutePathBuf::resolve_path_against_base("./some_file.md", base_dir)
|
|
.as_path()
|
|
.to_string_lossy()
|
|
.to_string(),
|
|
),
|
|
);
|
|
expected_toml_value.insert(
|
|
"model".to_string(),
|
|
TomlValue::String("gpt-1000".to_string()),
|
|
);
|
|
expected_toml_value.insert("foo".to_string(), TomlValue::String("xyzzy".to_string()));
|
|
assert_eq!(normalized_toml_value, TomlValue::Table(expected_toml_value));
|
|
Ok(())
|
|
}
|
|
|
|
#[test]
|
|
fn legacy_managed_config_backfill_includes_read_only_sandbox_mode() {
|
|
let legacy = LegacyManagedConfigToml {
|
|
approval_policy: None,
|
|
approvals_reviewer: None,
|
|
sandbox_mode: Some(SandboxMode::WorkspaceWrite),
|
|
};
|
|
|
|
let requirements = ConfigRequirementsToml::from(legacy);
|
|
|
|
assert_eq!(
|
|
requirements.allowed_sandbox_modes,
|
|
Some(vec![
|
|
SandboxModeRequirement::ReadOnly,
|
|
SandboxModeRequirement::WorkspaceWrite
|
|
])
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn legacy_managed_config_backfill_allows_user_when_guardian_is_required() {
|
|
let legacy = LegacyManagedConfigToml {
|
|
approval_policy: None,
|
|
approvals_reviewer: Some(ApprovalsReviewer::AutoReview),
|
|
sandbox_mode: None,
|
|
};
|
|
|
|
let requirements = ConfigRequirementsToml::from(legacy);
|
|
|
|
assert_eq!(
|
|
requirements.allowed_approvals_reviewers,
|
|
Some(vec![ApprovalsReviewer::AutoReview, ApprovalsReviewer::User,])
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn legacy_managed_config_backfill_preserves_user_only_approvals_reviewer() {
|
|
let legacy = LegacyManagedConfigToml {
|
|
approval_policy: None,
|
|
approvals_reviewer: Some(ApprovalsReviewer::User),
|
|
sandbox_mode: None,
|
|
};
|
|
|
|
let requirements = ConfigRequirementsToml::from(legacy);
|
|
|
|
assert_eq!(
|
|
requirements.allowed_approvals_reviewers,
|
|
Some(vec![ApprovalsReviewer::User])
|
|
);
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
#[test]
|
|
fn windows_system_requirements_toml_file_uses_expected_suffix() {
|
|
let expected = windows_program_data_dir_from_known_folder()
|
|
.unwrap_or_else(|_| PathBuf::from(DEFAULT_PROGRAM_DATA_DIR_WINDOWS))
|
|
.join("OpenAI")
|
|
.join("Codex")
|
|
.join("requirements.toml");
|
|
assert_eq!(
|
|
windows_system_requirements_toml_file()
|
|
.expect("requirements.toml path")
|
|
.as_path(),
|
|
expected.as_path()
|
|
);
|
|
assert!(
|
|
windows_system_requirements_toml_file()
|
|
.expect("requirements.toml path")
|
|
.as_path()
|
|
.ends_with(Path::new("OpenAI").join("Codex").join("requirements.toml"))
|
|
);
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
#[test]
|
|
fn windows_system_config_toml_file_uses_expected_suffix() {
|
|
let expected = windows_program_data_dir_from_known_folder()
|
|
.unwrap_or_else(|_| PathBuf::from(DEFAULT_PROGRAM_DATA_DIR_WINDOWS))
|
|
.join("OpenAI")
|
|
.join("Codex")
|
|
.join("config.toml");
|
|
assert_eq!(
|
|
windows_system_config_toml_file()
|
|
.expect("config.toml path")
|
|
.as_path(),
|
|
expected.as_path()
|
|
);
|
|
assert!(
|
|
windows_system_config_toml_file()
|
|
.expect("config.toml path")
|
|
.as_path()
|
|
.ends_with(Path::new("OpenAI").join("Codex").join("config.toml"))
|
|
);
|
|
}
|
|
}
|