Skip to content

permissions: preserve full-access policy in voice + robust Kotlin bindings on Linux#70

Open
ericbosch wants to merge 4 commits intodnakov:mainfrom
ericbosch:codex/permissions-voice-bindings-fix
Open

permissions: preserve full-access policy in voice + robust Kotlin bindings on Linux#70
ericbosch wants to merge 4 commits intodnakov:mainfrom
ericbosch:codex/permissions-voice-bindings-fix

Conversation

@ericbosch
Copy link
Copy Markdown

Summary

  • preserve selected permission/sandbox policy through voice handoff/resume flows (iOS + Android)
  • default Litter launch sandbox to danger-full-access on both platforms
  • fix Linux Kotlin binding generation by sourcing UniFFI metadata from Android .so (avoid host V8 linker failure)

Validation

  • make bindings-kotlin
  • make android-emulator-fast (BUILD SUCCESSFUL)
  • generated APK sha256: 84ef3ff4b185b68e329bccfb5722a1be315fdaf49bee7ad215b17ffdf55b0b78

Notes

  • no submodule commit included; remains local-only as requested

ericbosch and others added 3 commits April 2, 2026 17:50
Ensure realtime voice/handoff paths reuse launch approval and sandbox settings instead of passing nil defaults.

Co-authored-by: Codex <noreply@openai.com>
Set default sandbox mode to danger-full-access across mobile launch state and voice fallback so sessions start with full access by default.

Co-authored-by: Codex <noreply@openai.com>
Skip host Linux cdylib builds for Kotlin-only binding generation and use an Android .so source (existing path, env override, or cargo-ndk fallback) to avoid V8 linker failures.

Co-authored-by: Codex <noreply@openai.com>
@ericbosch ericbosch force-pushed the codex/permissions-voice-bindings-fix branch from 32ee985 to c936d76 Compare April 2, 2026 15:50
@dnakov
Copy link
Copy Markdown
Owner

dnakov commented Apr 2, 2026

isnt inherit best? so we can actually have permission popups?
#43

Ensure thread resume, voice start, and remote directory probes use explicit never + danger-full-access defaults when no per-thread override exists. Also align Android thread selector fallback with current global permission settings.

Co-authored-by: Codex <noreply@openai.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants