2025-07-28 08:31:24 -07:00
|
|
|
|
use std::future::Future;
|
|
|
|
|
|
use std::path::Path;
|
|
|
|
|
|
use std::path::PathBuf;
|
|
|
|
|
|
|
|
|
|
|
|
/// While we want to deploy the Codex CLI as a single executable for simplicity,
|
|
|
|
|
|
/// we also want to expose some of its functionality as distinct CLIs, so we use
|
|
|
|
|
|
/// the "arg0 trick" to determine which CLI to dispatch. This effectively allows
|
|
|
|
|
|
/// us to simulate deploying multiple executables as a single binary on Mac and
|
|
|
|
|
|
/// Linux (but not Windows).
|
|
|
|
|
|
///
|
|
|
|
|
|
/// When the current executable is invoked through the hard-link or alias named
|
|
|
|
|
|
/// `codex-linux-sandbox` we *directly* execute
|
|
|
|
|
|
/// [`codex_linux_sandbox::run_main`] (which never returns). Otherwise we:
|
|
|
|
|
|
///
|
|
|
|
|
|
/// 1. Use [`dotenvy::from_path`] and [`dotenvy::dotenv`] to modify the
|
|
|
|
|
|
/// environment before creating any threads.
|
|
|
|
|
|
/// 2. Construct a Tokio multi-thread runtime.
|
|
|
|
|
|
/// 3. Derive the path to the current executable (so children can re-invoke the
|
|
|
|
|
|
/// sandbox) when running on Linux.
|
|
|
|
|
|
/// 4. Execute the provided async `main_fn` inside that runtime, forwarding any
|
|
|
|
|
|
/// error. Note that `main_fn` receives `codex_linux_sandbox_exe:
|
|
|
|
|
|
/// Option<PathBuf>`, as an argument, which is generally needed as part of
|
|
|
|
|
|
/// constructing [`codex_core::config::Config`].
|
|
|
|
|
|
///
|
|
|
|
|
|
/// This function should be used to wrap any `main()` function in binary crates
|
|
|
|
|
|
/// in this workspace that depends on these helper CLIs.
|
|
|
|
|
|
pub fn arg0_dispatch_or_else<F, Fut>(main_fn: F) -> anyhow::Result<()>
|
|
|
|
|
|
where
|
|
|
|
|
|
F: FnOnce(Option<PathBuf>) -> Fut,
|
|
|
|
|
|
Fut: Future<Output = anyhow::Result<()>>,
|
|
|
|
|
|
{
|
|
|
|
|
|
// Determine if we were invoked via the special alias.
|
2025-07-28 08:52:18 -07:00
|
|
|
|
let argv0 = std::env::args_os().next().unwrap_or_default();
|
2025-07-28 08:31:24 -07:00
|
|
|
|
let exe_name = Path::new(&argv0)
|
|
|
|
|
|
.file_name()
|
|
|
|
|
|
.and_then(|s| s.to_str())
|
|
|
|
|
|
.unwrap_or("");
|
|
|
|
|
|
|
|
|
|
|
|
if exe_name == "codex-linux-sandbox" {
|
|
|
|
|
|
// Safety: [`run_main`] never returns.
|
|
|
|
|
|
codex_linux_sandbox::run_main();
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// This modifies the environment, which is not thread-safe, so do this
|
|
|
|
|
|
// before creating any threads/the Tokio runtime.
|
|
|
|
|
|
load_dotenv();
|
|
|
|
|
|
|
|
|
|
|
|
// Regular invocation – create a Tokio runtime and execute the provided
|
|
|
|
|
|
// async entry-point.
|
|
|
|
|
|
let runtime = tokio::runtime::Runtime::new()?;
|
|
|
|
|
|
runtime.block_on(async move {
|
|
|
|
|
|
let codex_linux_sandbox_exe: Option<PathBuf> = if cfg!(target_os = "linux") {
|
|
|
|
|
|
std::env::current_exe().ok()
|
|
|
|
|
|
} else {
|
|
|
|
|
|
None
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
main_fn(codex_linux_sandbox_exe).await
|
|
|
|
|
|
})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/// Load env vars from ~/.codex/.env and `$(pwd)/.env`.
|
|
|
|
|
|
fn load_dotenv() {
|
|
|
|
|
|
if let Ok(codex_home) = codex_core::config::find_codex_home() {
|
|
|
|
|
|
dotenvy::from_path(codex_home.join(".env")).ok();
|
|
|
|
|
|
}
|
|
|
|
|
|
dotenvy::dotenv().ok();
|
|
|
|
|
|
}
|