Skip to content

Commit 9905a75

Browse files
authored
chore: remove remaining navigator and nemoclaw references (#279)
1 parent 29f72f3 commit 9905a75

File tree

5 files changed

+6
-6
lines changed

5 files changed

+6
-6
lines changed

.gitattributes

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,4 @@ python/openshell/_proto/*_pb2_grpc.py linguist-generated
77
python/openshell/_proto/*_pb2.pyi linguist-generated
88

99
# Generated Rust protobuf code (excludes hand-written mod.rs)
10-
crates/navigator-core/src/proto/navigator.*.rs linguist-generated
10+
crates/openshell-core/src/proto/openshell.*.rs linguist-generated

architecture/sandbox-providers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -274,7 +274,7 @@ for (key, value) in provider_env {
274274

275275
This uses `tokio::process::Command`. The `.env()` call adds each variable to the child's
276276
inherited environment without clearing it. The spawn path also explicitly removes
277-
`NEMOCLAW_SSH_HANDSHAKE_SECRET` so the handshake secret does not leak into the agent
277+
`OPENSHELL_SSH_HANDSHAKE_SECRET` so the handshake secret does not leak into the agent
278278
entrypoint process.
279279

280280
After provider env vars, proxy env vars (`HTTP_PROXY`, `HTTPS_PROXY`, `ALL_PROXY`,
@@ -370,7 +370,7 @@ Providers are stored with `object_type = "provider"` in the shared object store.
370370
provider store and are fetched at runtime by the sandbox supervisor.
371371
- Child processes never receive the raw provider secret values; they only receive
372372
placeholders, and the supervisor resolves those placeholders during outbound proxying.
373-
- `NEMOCLAW_SSH_HANDSHAKE_SECRET` is required by the supervisor/SSH server path but is
373+
- `OPENSHELL_SSH_HANDSHAKE_SECRET` is required by the supervisor/SSH server path but is
374374
explicitly kept out of spawned sandbox child-process environments.
375375

376376
## Test Strategy

crates/openshell-sandbox/src/process.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ use std::process::Stdio;
2222
use tokio::process::{Child, Command};
2323
use tracing::{debug, warn};
2424

25-
const SSH_HANDSHAKE_SECRET_ENV: &str = "NEMOCLAW_SSH_HANDSHAKE_SECRET";
25+
const SSH_HANDSHAKE_SECRET_ENV: &str = "OPENSHELL_SSH_HANDSHAKE_SECRET";
2626

2727
fn inject_provider_env(cmd: &mut Command, provider_env: &HashMap<String, String>) {
2828
for (key, value) in provider_env {

crates/openshell-sandbox/src/ssh.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ use tracing::{info, warn};
3030

3131
const PREFACE_MAGIC: &str = "NSSH1";
3232
#[cfg(test)]
33-
const SSH_HANDSHAKE_SECRET_ENV: &str = "NEMOCLAW_SSH_HANDSHAKE_SECRET";
33+
const SSH_HANDSHAKE_SECRET_ENV: &str = "OPENSHELL_SSH_HANDSHAKE_SECRET";
3434

3535
/// A time-bounded set of nonces used to detect replayed NSSH1 handshakes.
3636
/// Each entry records the `Instant` it was inserted; a background reaper task

e2e/python/test_sandbox_providers.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ def test_ssh_handshake_secret_not_visible_in_exec_environment(
194194
def read_handshake_secret() -> str:
195195
import os
196196

197-
return os.environ.get("NEMOCLAW_SSH_HANDSHAKE_SECRET", "NOT_SET")
197+
return os.environ.get("OPENSHELL_SSH_HANDSHAKE_SECRET", "NOT_SET")
198198

199199
with sandbox(delete_on_exit=True) as sb:
200200
result = sb.exec_python(read_handshake_secret)

0 commit comments

Comments
 (0)