|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
import * as fs from 'node:fs'; |
|
|
import * as path from 'node:path'; |
|
|
import { homedir } from 'node:os'; |
|
|
import yargs from 'yargs/yargs'; |
|
|
import { hideBin } from 'yargs/helpers'; |
|
|
import process from 'node:process'; |
|
|
import { mcpCommand } from '../commands/mcp.js'; |
|
|
import type { |
|
|
TelemetryTarget, |
|
|
FileFilteringOptions, |
|
|
MCPServerConfig, |
|
|
} from '@google/gemini-cli-core'; |
|
|
import { extensionsCommand } from '../commands/extensions.js'; |
|
|
import { |
|
|
Config, |
|
|
loadServerHierarchicalMemory, |
|
|
setGeminiMdFilename as setServerGeminiMdFilename, |
|
|
getCurrentGeminiMdFilename, |
|
|
ApprovalMode, |
|
|
DEFAULT_GEMINI_MODEL, |
|
|
DEFAULT_GEMINI_EMBEDDING_MODEL, |
|
|
DEFAULT_MEMORY_FILE_FILTERING_OPTIONS, |
|
|
FileDiscoveryService, |
|
|
ShellTool, |
|
|
EditTool, |
|
|
WriteFileTool, |
|
|
} from '@google/gemini-cli-core'; |
|
|
import type { Settings } from './settings.js'; |
|
|
|
|
|
import type { Extension } from './extension.js'; |
|
|
import { annotateActiveExtensions } from './extension.js'; |
|
|
import { getCliVersion } from '../utils/version.js'; |
|
|
import { loadSandboxConfig } from './sandboxConfig.js'; |
|
|
import { resolvePath } from '../utils/resolvePath.js'; |
|
|
import { appEvents } from '../utils/events.js'; |
|
|
|
|
|
import { isWorkspaceTrusted } from './trustedFolders.js'; |
|
|
|
|
|
|
|
|
const logger = { |
|
|
|
|
|
debug: (...args: any[]) => console.debug('[DEBUG]', ...args), |
|
|
|
|
|
warn: (...args: any[]) => console.warn('[WARN]', ...args), |
|
|
|
|
|
error: (...args: any[]) => console.error('[ERROR]', ...args), |
|
|
}; |
|
|
|
|
|
export interface CliArgs { |
|
|
model: string | undefined; |
|
|
sandbox: boolean | string | undefined; |
|
|
sandboxImage: string | undefined; |
|
|
debug: boolean | undefined; |
|
|
prompt: string | undefined; |
|
|
promptInteractive: string | undefined; |
|
|
allFiles: boolean | undefined; |
|
|
showMemoryUsage: boolean | undefined; |
|
|
yolo: boolean | undefined; |
|
|
approvalMode: string | undefined; |
|
|
telemetry: boolean | undefined; |
|
|
checkpointing: boolean | undefined; |
|
|
telemetryTarget: string | undefined; |
|
|
telemetryOtlpEndpoint: string | undefined; |
|
|
telemetryOtlpProtocol: string | undefined; |
|
|
telemetryLogPrompts: boolean | undefined; |
|
|
telemetryOutfile: string | undefined; |
|
|
allowedMcpServerNames: string[] | undefined; |
|
|
allowedTools: string[] | undefined; |
|
|
experimentalAcp: boolean | undefined; |
|
|
extensions: string[] | undefined; |
|
|
listExtensions: boolean | undefined; |
|
|
proxy: string | undefined; |
|
|
includeDirectories: string[] | undefined; |
|
|
screenReader: boolean | undefined; |
|
|
useSmartEdit: boolean | undefined; |
|
|
sessionSummary: string | undefined; |
|
|
} |
|
|
|
|
|
export async function parseArguments(settings: Settings): Promise<CliArgs> { |
|
|
const yargsInstance = yargs(hideBin(process.argv)) |
|
|
.locale('en') |
|
|
.scriptName('gemini') |
|
|
.usage( |
|
|
'Usage: gemini [options] [command]\n\nGemini CLI - Launch an interactive CLI, use -p/--prompt for non-interactive mode', |
|
|
) |
|
|
.command('$0', 'Launch Gemini CLI', (yargsInstance) => |
|
|
yargsInstance |
|
|
.option('model', { |
|
|
alias: 'm', |
|
|
type: 'string', |
|
|
description: `Model`, |
|
|
default: process.env['GEMINI_MODEL'], |
|
|
}) |
|
|
.option('prompt', { |
|
|
alias: 'p', |
|
|
type: 'string', |
|
|
description: 'Prompt. Appended to input on stdin (if any).', |
|
|
}) |
|
|
.option('prompt-interactive', { |
|
|
alias: 'i', |
|
|
type: 'string', |
|
|
description: |
|
|
'Execute the provided prompt and continue in interactive mode', |
|
|
}) |
|
|
.option('sandbox', { |
|
|
alias: 's', |
|
|
type: 'boolean', |
|
|
description: 'Run in sandbox?', |
|
|
}) |
|
|
.option('sandbox-image', { |
|
|
type: 'string', |
|
|
description: 'Sandbox image URI.', |
|
|
}) |
|
|
.option('debug', { |
|
|
alias: 'd', |
|
|
type: 'boolean', |
|
|
description: 'Run in debug mode?', |
|
|
default: false, |
|
|
}) |
|
|
.option('all-files', { |
|
|
alias: ['a'], |
|
|
type: 'boolean', |
|
|
description: 'Include ALL files in context?', |
|
|
default: false, |
|
|
}) |
|
|
.option('show-memory-usage', { |
|
|
type: 'boolean', |
|
|
description: 'Show memory usage in status bar', |
|
|
default: false, |
|
|
}) |
|
|
.option('yolo', { |
|
|
alias: 'y', |
|
|
type: 'boolean', |
|
|
description: |
|
|
'Automatically accept all actions (aka YOLO mode, see https://www.youtube.com/watch?v=xvFZjo5PgG0 for more details)?', |
|
|
default: false, |
|
|
}) |
|
|
.option('approval-mode', { |
|
|
type: 'string', |
|
|
choices: ['default', 'auto_edit', 'yolo'], |
|
|
description: |
|
|
'Set the approval mode: default (prompt for approval), auto_edit (auto-approve edit tools), yolo (auto-approve all tools)', |
|
|
}) |
|
|
.option('telemetry', { |
|
|
type: 'boolean', |
|
|
description: |
|
|
'Enable telemetry? This flag specifically controls if telemetry is sent. Other --telemetry-* flags set specific values but do not enable telemetry on their own.', |
|
|
}) |
|
|
.option('telemetry-target', { |
|
|
type: 'string', |
|
|
choices: ['local', 'gcp'], |
|
|
description: |
|
|
'Set the telemetry target (local or gcp). Overrides settings files.', |
|
|
}) |
|
|
.option('telemetry-otlp-endpoint', { |
|
|
type: 'string', |
|
|
description: |
|
|
'Set the OTLP endpoint for telemetry. Overrides environment variables and settings files.', |
|
|
}) |
|
|
.option('telemetry-otlp-protocol', { |
|
|
type: 'string', |
|
|
choices: ['grpc', 'http'], |
|
|
description: |
|
|
'Set the OTLP protocol for telemetry (grpc or http). Overrides settings files.', |
|
|
}) |
|
|
.option('telemetry-log-prompts', { |
|
|
type: 'boolean', |
|
|
description: |
|
|
'Enable or disable logging of user prompts for telemetry. Overrides settings files.', |
|
|
}) |
|
|
.option('telemetry-outfile', { |
|
|
type: 'string', |
|
|
description: 'Redirect all telemetry output to the specified file.', |
|
|
}) |
|
|
.option('checkpointing', { |
|
|
alias: 'c', |
|
|
type: 'boolean', |
|
|
description: 'Enables checkpointing of file edits', |
|
|
default: false, |
|
|
}) |
|
|
.option('experimental-acp', { |
|
|
type: 'boolean', |
|
|
description: 'Starts the agent in ACP mode', |
|
|
}) |
|
|
.option('allowed-mcp-server-names', { |
|
|
type: 'array', |
|
|
string: true, |
|
|
description: 'Allowed MCP server names', |
|
|
}) |
|
|
.option('allowed-tools', { |
|
|
type: 'array', |
|
|
string: true, |
|
|
description: 'Tools that are allowed to run without confirmation', |
|
|
}) |
|
|
.option('extensions', { |
|
|
alias: 'e', |
|
|
type: 'array', |
|
|
string: true, |
|
|
description: |
|
|
'A list of extensions to use. If not provided, all extensions are used.', |
|
|
}) |
|
|
.option('list-extensions', { |
|
|
alias: 'l', |
|
|
type: 'boolean', |
|
|
description: 'List all available extensions and exit.', |
|
|
}) |
|
|
.option('proxy', { |
|
|
type: 'string', |
|
|
description: |
|
|
'Proxy for gemini client, like schema://user:password@host:port', |
|
|
}) |
|
|
.option('include-directories', { |
|
|
type: 'array', |
|
|
string: true, |
|
|
description: |
|
|
'Additional directories to include in the workspace (comma-separated or multiple --include-directories)', |
|
|
coerce: (dirs: string[]) => |
|
|
|
|
|
dirs.flatMap((dir) => dir.split(',').map((d) => d.trim())), |
|
|
}) |
|
|
.option('screen-reader', { |
|
|
type: 'boolean', |
|
|
description: 'Enable screen reader mode for accessibility.', |
|
|
default: false, |
|
|
}) |
|
|
.option('session-summary', { |
|
|
type: 'string', |
|
|
description: 'File to write session summary to.', |
|
|
}) |
|
|
.deprecateOption( |
|
|
'telemetry', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'telemetry-target', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'telemetry-otlp-endpoint', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'telemetry-otlp-protocol', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'telemetry-log-prompts', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'telemetry-outfile', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'show-memory-usage', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'sandbox-image', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'proxy', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'checkpointing', |
|
|
'Use settings.json instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.deprecateOption( |
|
|
'all-files', |
|
|
'Use @ includes in the application instead. This flag will be removed in a future version.', |
|
|
) |
|
|
.check((argv) => { |
|
|
if (argv.prompt && argv['promptInteractive']) { |
|
|
throw new Error( |
|
|
'Cannot use both --prompt (-p) and --prompt-interactive (-i) together', |
|
|
); |
|
|
} |
|
|
if (argv.yolo && argv['approvalMode']) { |
|
|
throw new Error( |
|
|
'Cannot use both --yolo (-y) and --approval-mode together. Use --approval-mode=yolo instead.', |
|
|
); |
|
|
} |
|
|
return true; |
|
|
}), |
|
|
) |
|
|
|
|
|
.command(mcpCommand); |
|
|
|
|
|
if (settings?.experimental?.extensionManagement ?? false) { |
|
|
yargsInstance.command(extensionsCommand); |
|
|
} |
|
|
|
|
|
yargsInstance |
|
|
.version(await getCliVersion()) |
|
|
.alias('v', 'version') |
|
|
.help() |
|
|
.alias('h', 'help') |
|
|
.strict() |
|
|
.demandCommand(0, 0); |
|
|
|
|
|
yargsInstance.wrap(yargsInstance.terminalWidth()); |
|
|
const result = await yargsInstance.parse(); |
|
|
|
|
|
|
|
|
|
|
|
if ( |
|
|
result._.length > 0 && |
|
|
(result._[0] === 'mcp' || result._[0] === 'extensions') |
|
|
) { |
|
|
|
|
|
process.exit(0); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
return result as unknown as CliArgs; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
export async function loadHierarchicalGeminiMemory( |
|
|
currentWorkingDirectory: string, |
|
|
includeDirectoriesToReadGemini: readonly string[] = [], |
|
|
debugMode: boolean, |
|
|
fileService: FileDiscoveryService, |
|
|
settings: Settings, |
|
|
extensionContextFilePaths: string[] = [], |
|
|
folderTrust: boolean, |
|
|
memoryImportFormat: 'flat' | 'tree' = 'tree', |
|
|
fileFilteringOptions?: FileFilteringOptions, |
|
|
): Promise<{ memoryContent: string; fileCount: number }> { |
|
|
|
|
|
const realCwd = fs.realpathSync(path.resolve(currentWorkingDirectory)); |
|
|
const realHome = fs.realpathSync(path.resolve(homedir())); |
|
|
const isHomeDirectory = realCwd === realHome; |
|
|
|
|
|
|
|
|
|
|
|
const effectiveCwd = isHomeDirectory ? '' : currentWorkingDirectory; |
|
|
|
|
|
if (debugMode) { |
|
|
logger.debug( |
|
|
`CLI: Delegating hierarchical memory load to server for CWD: ${currentWorkingDirectory} (memoryImportFormat: ${memoryImportFormat})`, |
|
|
); |
|
|
} |
|
|
|
|
|
|
|
|
return loadServerHierarchicalMemory( |
|
|
effectiveCwd, |
|
|
includeDirectoriesToReadGemini, |
|
|
debugMode, |
|
|
fileService, |
|
|
extensionContextFilePaths, |
|
|
folderTrust, |
|
|
memoryImportFormat, |
|
|
fileFilteringOptions, |
|
|
settings.context?.discoveryMaxDirs, |
|
|
); |
|
|
} |
|
|
|
|
|
export async function loadCliConfig( |
|
|
settings: Settings, |
|
|
extensions: Extension[], |
|
|
sessionId: string, |
|
|
argv: CliArgs, |
|
|
cwd: string = process.cwd(), |
|
|
): Promise<Config> { |
|
|
const debugMode = |
|
|
argv.debug || |
|
|
[process.env['DEBUG'], process.env['DEBUG_MODE']].some( |
|
|
(v) => v === 'true' || v === '1', |
|
|
) || |
|
|
false; |
|
|
const memoryImportFormat = settings.context?.importFormat || 'tree'; |
|
|
|
|
|
const ideMode = settings.ide?.enabled ?? false; |
|
|
|
|
|
const folderTrustFeature = |
|
|
settings.security?.folderTrust?.featureEnabled ?? false; |
|
|
const folderTrustSetting = settings.security?.folderTrust?.enabled ?? true; |
|
|
const folderTrust = folderTrustFeature && folderTrustSetting; |
|
|
const trustedFolder = isWorkspaceTrusted(settings) ?? true; |
|
|
|
|
|
const allExtensions = annotateActiveExtensions( |
|
|
extensions, |
|
|
argv.extensions || [], |
|
|
cwd, |
|
|
); |
|
|
|
|
|
const activeExtensions = extensions.filter( |
|
|
(_, i) => allExtensions[i].isActive, |
|
|
); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if (settings.context?.fileName) { |
|
|
setServerGeminiMdFilename(settings.context.fileName); |
|
|
} else { |
|
|
|
|
|
setServerGeminiMdFilename(getCurrentGeminiMdFilename()); |
|
|
} |
|
|
|
|
|
const extensionContextFilePaths = activeExtensions.flatMap( |
|
|
(e) => e.contextFiles, |
|
|
); |
|
|
|
|
|
const fileService = new FileDiscoveryService(cwd); |
|
|
|
|
|
const fileFiltering = { |
|
|
...DEFAULT_MEMORY_FILE_FILTERING_OPTIONS, |
|
|
...settings.context?.fileFiltering, |
|
|
}; |
|
|
|
|
|
const includeDirectories = (settings.context?.includeDirectories || []) |
|
|
.map(resolvePath) |
|
|
.concat((argv.includeDirectories || []).map(resolvePath)); |
|
|
|
|
|
|
|
|
const { memoryContent, fileCount } = await loadHierarchicalGeminiMemory( |
|
|
cwd, |
|
|
settings.context?.loadMemoryFromIncludeDirectories |
|
|
? includeDirectories |
|
|
: [], |
|
|
debugMode, |
|
|
fileService, |
|
|
settings, |
|
|
extensionContextFilePaths, |
|
|
trustedFolder, |
|
|
memoryImportFormat, |
|
|
fileFiltering, |
|
|
); |
|
|
|
|
|
let mcpServers = mergeMcpServers(settings, activeExtensions); |
|
|
const question = argv.promptInteractive || argv.prompt || ''; |
|
|
|
|
|
|
|
|
let approvalMode: ApprovalMode; |
|
|
if (argv.approvalMode) { |
|
|
|
|
|
switch (argv.approvalMode) { |
|
|
case 'yolo': |
|
|
approvalMode = ApprovalMode.YOLO; |
|
|
break; |
|
|
case 'auto_edit': |
|
|
approvalMode = ApprovalMode.AUTO_EDIT; |
|
|
break; |
|
|
case 'default': |
|
|
approvalMode = ApprovalMode.DEFAULT; |
|
|
break; |
|
|
default: |
|
|
throw new Error( |
|
|
`Invalid approval mode: ${argv.approvalMode}. Valid values are: yolo, auto_edit, default`, |
|
|
); |
|
|
} |
|
|
} else { |
|
|
|
|
|
approvalMode = |
|
|
argv.yolo || false ? ApprovalMode.YOLO : ApprovalMode.DEFAULT; |
|
|
} |
|
|
|
|
|
|
|
|
if (!trustedFolder && approvalMode !== ApprovalMode.DEFAULT) { |
|
|
logger.warn( |
|
|
`Approval mode overridden to "default" because the current folder is not trusted.`, |
|
|
); |
|
|
approvalMode = ApprovalMode.DEFAULT; |
|
|
} |
|
|
|
|
|
const interactive = |
|
|
!!argv.promptInteractive || (process.stdin.isTTY && question.length === 0); |
|
|
|
|
|
const extraExcludes: string[] = []; |
|
|
if (!interactive && !argv.experimentalAcp) { |
|
|
switch (approvalMode) { |
|
|
case ApprovalMode.DEFAULT: |
|
|
|
|
|
extraExcludes.push(ShellTool.Name, EditTool.Name, WriteFileTool.Name); |
|
|
break; |
|
|
case ApprovalMode.AUTO_EDIT: |
|
|
|
|
|
extraExcludes.push(ShellTool.Name); |
|
|
break; |
|
|
case ApprovalMode.YOLO: |
|
|
|
|
|
break; |
|
|
default: |
|
|
|
|
|
break; |
|
|
} |
|
|
} |
|
|
|
|
|
const excludeTools = mergeExcludeTools( |
|
|
settings, |
|
|
activeExtensions, |
|
|
extraExcludes.length > 0 ? extraExcludes : undefined, |
|
|
); |
|
|
const blockedMcpServers: Array<{ name: string; extensionName: string }> = []; |
|
|
|
|
|
if (!argv.allowedMcpServerNames) { |
|
|
if (settings.mcp?.allowed) { |
|
|
mcpServers = allowedMcpServers( |
|
|
mcpServers, |
|
|
settings.mcp.allowed, |
|
|
blockedMcpServers, |
|
|
); |
|
|
} |
|
|
|
|
|
if (settings.mcp?.excluded) { |
|
|
const excludedNames = new Set(settings.mcp.excluded.filter(Boolean)); |
|
|
if (excludedNames.size > 0) { |
|
|
mcpServers = Object.fromEntries( |
|
|
Object.entries(mcpServers).filter(([key]) => !excludedNames.has(key)), |
|
|
); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
if (argv.allowedMcpServerNames) { |
|
|
mcpServers = allowedMcpServers( |
|
|
mcpServers, |
|
|
argv.allowedMcpServerNames, |
|
|
blockedMcpServers, |
|
|
); |
|
|
} |
|
|
|
|
|
const sandboxConfig = await loadSandboxConfig(settings, argv); |
|
|
const screenReader = |
|
|
argv.screenReader !== undefined |
|
|
? argv.screenReader |
|
|
: (settings.ui?.accessibility?.screenReader ?? false); |
|
|
return new Config({ |
|
|
sessionId, |
|
|
embeddingModel: DEFAULT_GEMINI_EMBEDDING_MODEL, |
|
|
sandbox: sandboxConfig, |
|
|
targetDir: cwd, |
|
|
includeDirectories, |
|
|
loadMemoryFromIncludeDirectories: |
|
|
settings.context?.loadMemoryFromIncludeDirectories || false, |
|
|
debugMode, |
|
|
question, |
|
|
fullContext: argv.allFiles || false, |
|
|
coreTools: settings.tools?.core || undefined, |
|
|
allowedTools: argv.allowedTools || settings.tools?.allowed || undefined, |
|
|
excludeTools, |
|
|
toolDiscoveryCommand: settings.tools?.discoveryCommand, |
|
|
toolCallCommand: settings.tools?.callCommand, |
|
|
mcpServerCommand: settings.mcp?.serverCommand, |
|
|
mcpServers, |
|
|
userMemory: memoryContent, |
|
|
geminiMdFileCount: fileCount, |
|
|
approvalMode, |
|
|
showMemoryUsage: |
|
|
argv.showMemoryUsage || settings.ui?.showMemoryUsage || false, |
|
|
accessibility: { |
|
|
...settings.ui?.accessibility, |
|
|
screenReader, |
|
|
}, |
|
|
telemetry: { |
|
|
enabled: argv.telemetry ?? settings.telemetry?.enabled, |
|
|
target: (argv.telemetryTarget ?? |
|
|
settings.telemetry?.target) as TelemetryTarget, |
|
|
otlpEndpoint: |
|
|
argv.telemetryOtlpEndpoint ?? |
|
|
process.env['OTEL_EXPORTER_OTLP_ENDPOINT'] ?? |
|
|
settings.telemetry?.otlpEndpoint, |
|
|
otlpProtocol: (['grpc', 'http'] as const).find( |
|
|
(p) => |
|
|
p === |
|
|
(argv.telemetryOtlpProtocol ?? settings.telemetry?.otlpProtocol), |
|
|
), |
|
|
logPrompts: argv.telemetryLogPrompts ?? settings.telemetry?.logPrompts, |
|
|
outfile: argv.telemetryOutfile ?? settings.telemetry?.outfile, |
|
|
}, |
|
|
usageStatisticsEnabled: settings.privacy?.usageStatisticsEnabled ?? true, |
|
|
|
|
|
fileFiltering: { |
|
|
respectGitIgnore: settings.context?.fileFiltering?.respectGitIgnore, |
|
|
respectGeminiIgnore: settings.context?.fileFiltering?.respectGeminiIgnore, |
|
|
enableRecursiveFileSearch: |
|
|
settings.context?.fileFiltering?.enableRecursiveFileSearch, |
|
|
disableFuzzySearch: settings.context?.fileFiltering?.disableFuzzySearch, |
|
|
}, |
|
|
checkpointing: |
|
|
argv.checkpointing || settings.general?.checkpointing?.enabled, |
|
|
proxy: |
|
|
argv.proxy || |
|
|
process.env['HTTPS_PROXY'] || |
|
|
process.env['https_proxy'] || |
|
|
process.env['HTTP_PROXY'] || |
|
|
process.env['http_proxy'], |
|
|
cwd, |
|
|
fileDiscoveryService: fileService, |
|
|
bugCommand: settings.advanced?.bugCommand, |
|
|
model: argv.model || settings.model?.name || DEFAULT_GEMINI_MODEL, |
|
|
extensionContextFilePaths, |
|
|
maxSessionTurns: settings.model?.maxSessionTurns ?? -1, |
|
|
experimentalZedIntegration: argv.experimentalAcp || false, |
|
|
listExtensions: argv.listExtensions || false, |
|
|
extensions: allExtensions, |
|
|
blockedMcpServers, |
|
|
noBrowser: !!process.env['NO_BROWSER'], |
|
|
summarizeToolOutput: settings.model?.summarizeToolOutput, |
|
|
ideMode, |
|
|
chatCompression: settings.model?.chatCompression, |
|
|
folderTrustFeature, |
|
|
folderTrust, |
|
|
interactive, |
|
|
trustedFolder, |
|
|
useRipgrep: settings.tools?.useRipgrep, |
|
|
shouldUseNodePtyShell: settings.tools?.usePty, |
|
|
skipNextSpeakerCheck: settings.model?.skipNextSpeakerCheck, |
|
|
enablePromptCompletion: settings.general?.enablePromptCompletion ?? false, |
|
|
eventEmitter: appEvents, |
|
|
useSmartEdit: argv.useSmartEdit ?? settings.useSmartEdit, |
|
|
}); |
|
|
} |
|
|
|
|
|
function allowedMcpServers( |
|
|
mcpServers: { [x: string]: MCPServerConfig }, |
|
|
allowMCPServers: string[], |
|
|
blockedMcpServers: Array<{ name: string; extensionName: string }>, |
|
|
) { |
|
|
const allowedNames = new Set(allowMCPServers.filter(Boolean)); |
|
|
if (allowedNames.size > 0) { |
|
|
mcpServers = Object.fromEntries( |
|
|
Object.entries(mcpServers).filter(([key, server]) => { |
|
|
const isAllowed = allowedNames.has(key); |
|
|
if (!isAllowed) { |
|
|
blockedMcpServers.push({ |
|
|
name: key, |
|
|
extensionName: server.extensionName || '', |
|
|
}); |
|
|
} |
|
|
return isAllowed; |
|
|
}), |
|
|
); |
|
|
} else { |
|
|
blockedMcpServers.push( |
|
|
...Object.entries(mcpServers).map(([key, server]) => ({ |
|
|
name: key, |
|
|
extensionName: server.extensionName || '', |
|
|
})), |
|
|
); |
|
|
mcpServers = {}; |
|
|
} |
|
|
return mcpServers; |
|
|
} |
|
|
|
|
|
function mergeMcpServers(settings: Settings, extensions: Extension[]) { |
|
|
const mcpServers = { ...(settings.mcpServers || {}) }; |
|
|
for (const extension of extensions) { |
|
|
Object.entries(extension.config.mcpServers || {}).forEach( |
|
|
([key, server]) => { |
|
|
if (mcpServers[key]) { |
|
|
logger.warn( |
|
|
`Skipping extension MCP config for server with key "${key}" as it already exists.`, |
|
|
); |
|
|
return; |
|
|
} |
|
|
mcpServers[key] = { |
|
|
...server, |
|
|
extensionName: extension.config.name, |
|
|
}; |
|
|
}, |
|
|
); |
|
|
} |
|
|
return mcpServers; |
|
|
} |
|
|
|
|
|
function mergeExcludeTools( |
|
|
settings: Settings, |
|
|
extensions: Extension[], |
|
|
extraExcludes?: string[] | undefined, |
|
|
): string[] { |
|
|
const allExcludeTools = new Set([ |
|
|
...(settings.tools?.exclude || []), |
|
|
...(extraExcludes || []), |
|
|
]); |
|
|
for (const extension of extensions) { |
|
|
for (const tool of extension.config.excludeTools || []) { |
|
|
allExcludeTools.add(tool); |
|
|
} |
|
|
} |
|
|
return [...allExcludeTools]; |
|
|
} |
|
|
|