Skip to content

Add WSL Docker fallback for Sandcastle runtime#6

Merged
MatheusBBarni merged 4 commits intomainfrom
refactor/sandcastle-integration
May 3, 2026
Merged

Add WSL Docker fallback for Sandcastle runtime#6
MatheusBBarni merged 4 commits intomainfrom
refactor/sandcastle-integration

Conversation

@MatheusBBarni
Copy link
Copy Markdown
Owner

Summary

  • add shared Docker runtime detection for host Docker and Windows WSL fallback
  • route Sandcastle build/run/stop paths through the shared Docker resolver
  • document WSL fallback behavior and path conversion for runtime readiness

Verification

  • cargo check --manifest-path .\src-tauri\Cargo.toml
  • cargo test --manifest-path .\src-tauri\Cargo.toml
  • bun run build

Copy link
Copy Markdown
Owner Author

@MatheusBBarni MatheusBBarni left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed the PR for the Docker runtime integration path. No blocking findings.

Checked the WSL fallback behavior in src-tauri/src/docker.rs, the shared usage from PRD/spec generation, chat, execution, and stop/remove paths, and the docs updates. The runtime now preserves host Docker behavior for macOS/Linux and converts Windows host paths only when using WSL Docker.

Local verification already run:

  • cargo check --manifest-path .\src-tauri\Cargo.toml
  • cargo test --manifest-path .\src-tauri\Cargo.toml
  • bun run build

No review comments to address at this time.

Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: cb376ff634

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment thread src-tauri/src/agent.rs
Comment on lines +460 to +462
if let Some(api_key) = read_cursor_api_key()?.filter(|value| !value.trim().is_empty()) {
command.arg("-e").arg(format!("OPENAI_API_KEY={api_key}"));
return Ok(());
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Honor auth mode when selecting Sandcastle credentials

providerAuthMode is now persisted in project settings, but this auth path ignores it and always prefers a stored API key when one exists. In projects configured for subscription, runs will still use OPENAI_API_KEY if present, so execution can silently use the wrong account/billing context and contradict the setting shown in the UI. Please thread the selected auth mode into runtime execution and branch here accordingly.

Useful? React with 👍 / 👎.

Comment on lines +574 to +576
if (environmentCodexStatus !== "found") {
return `Install or repair Codex CLI before generating a ${target}.`;
}
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Remove host Codex CLI hard gate from doc generation

This validation now blocks PRD/spec generation unless host Codex CLI status is found, but the generation path runs codex exec inside the Docker image (run_cursor_agent_prompt_sync) and does not use a host Codex binary. As a result, users with working Docker + auth are incorrectly prevented from generating documents when Codex is not installed on the host.

Useful? React with 👍 / 👎.

@MatheusBBarni MatheusBBarni merged commit c3de50e into main May 3, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant