Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
19 commits
Select commit Hold shift + click to select a range
ab18c97
fix: support split carveouts in windows elevated sandbox
viyatb-oai Mar 13, 2026
01617c0
fix: restack elevated windows sandbox support
viyatb-oai Mar 18, 2026
c7b5c90
fix: refresh elevated branch exec test callsites
viyatb-oai Mar 24, 2026
da72d73
fix: refresh windows elevated sandbox debug callsite
viyatb-oai Mar 25, 2026
fc4fbd2
fix: preserve elevated windows helper read roots
viyatb-oai Mar 26, 2026
cc808bf
Merge remote-tracking branch 'origin/main' into codex/viyatb/windows-…
viyatb-oai Mar 27, 2026
e8bbcb4
fix: normalize elevated windows deny carveout matching
viyatb-oai Mar 27, 2026
5e92cf6
fix: borrow elevated windows setup root overrides
viyatb-oai Mar 27, 2026
af6075a
docs: clarify elevated windows read root overrides
viyatb-oai Mar 27, 2026
2b7e9ac
fix: remove needless borrows in windows setup overrides
viyatb-oai Mar 27, 2026
2b05255
refactor: merge windows sandbox filesystem overrides
viyatb-oai Mar 31, 2026
3d69c07
Merge remote-tracking branch 'origin/main' into codex/viyatb/windows-…
viyatb-oai Apr 6, 2026
d8c64cb
fix: address windows sandbox clippy
viyatb-oai Apr 6, 2026
267052a
Merge remote-tracking branch 'origin/main' into codex/viyatb/windows-…
viyatb-oai Apr 7, 2026
9985804
fix: preserve elevated Windows read overrides
viyatb-oai Apr 7, 2026
cf02f58
Merge branch 'main' into codex/viyatb/windows-elevated-permissions-su…
viyatb-oai Apr 8, 2026
e435cc4
fix: align Windows sandbox filesystem overrides
viyatb-oai Apr 9, 2026
6c2128c
docs: clarify Windows deny-write carveout setup
viyatb-oai Apr 9, 2026
2d04216
docs: specify read-only carveout materialization
viyatb-oai Apr 9, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions codex-rs/cli/src/debug_sandbox.rs
Original file line number Diff line number Diff line change
Expand Up @@ -174,6 +174,9 @@ async fn run_command_under_sandbox(
timeout_ms: None,
use_private_desktop: config.permissions.windows_sandbox_private_desktop,
proxy_enforced: false,
read_roots_override: None,
write_roots_override: None,
deny_write_paths_override: &[],
},
)
} else {
Expand Down
17 changes: 11 additions & 6 deletions codex-rs/core/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,19 +59,24 @@ backend-managed system read roots required for basic execution, such as
`C:\Windows`, `C:\Program Files`, `C:\Program Files (x86)`, and
`C:\ProgramData`. When it is `false`, those extra system roots are omitted.

The elevated Windows sandbox also supports:

- legacy `ReadOnly` and `WorkspaceWrite` behavior
- split filesystem policies that need exact readable roots, exact writable
roots, or extra read-only carveouts under writable roots

The unelevated restricted-token backend still supports the legacy full-read
Windows model for legacy `ReadOnly` and `WorkspaceWrite` behavior. It also
supports a narrow split-filesystem subset: full-read split policies whose
writable roots still match the legacy `WorkspaceWrite` root set, but add extra
read-only carveouts under those writable roots.

New `[permissions]` / split filesystem policies remain supported on Windows
only when they round-trip through the legacy `SandboxPolicy` model without
changing semantics. Policies that would require direct read restriction,
explicit unreadable carveouts, reopened writable descendants under read-only
carveouts, different writable root sets, or split carveout support in the
elevated setup/runner backend still fail closed instead of running with weaker
enforcement.
only when they can be enforced directly by the selected Windows backend or
round-trip through the legacy `SandboxPolicy` model without changing semantics.
Policies that would require direct explicit unreadable carveouts (`none`) or
reopened writable descendants under read-only carveouts still fail closed
instead of running with weaker enforcement.

### All Platforms

Expand Down
Loading
Loading