Skip to content

fix(sandbox): centralize async git worktree resolution and enforce read-only security#25040

Merged
ehedlund merged 4 commits intomainfrom
fix/sandbox-git-worktree-resolution
Apr 9, 2026
Merged

fix(sandbox): centralize async git worktree resolution and enforce read-only security#25040
ehedlund merged 4 commits intomainfrom
fix/sandbox-git-worktree-resolution

Conversation

@ehedlund
Copy link
Copy Markdown
Contributor

@ehedlund ehedlund commented Apr 9, 2026

Summary

Centralizes Git Worktree resolution to be asynchronous and strictly enforces read-only access across all sandboxes to prevent RCE vulnerabilities via git hooks.

Details

This PR refactors how we handle Git Worktrees inside the sandbox and addresses critical security feedback:

  • Centralized & Async Resolution: Migrated resolveGitWorktreePaths to use node:fs/promises and moved it into the core resolveSandboxPaths step, eliminating redundant synchronous resolution across OS builders.
  • Path Cleanup: Removed local tryRealpath implementations in favor of the shared resolveToRealPath utility.
  • Enforced Read-Only Security:
    • macOS (seatbelt): Removed unconditional file-write* access for git worktree directories, granting only file-read* to prevent malicious hook modification.
    • Linux (bwrap): Replaced conditional write binding with unconditional --ro-bind-try (read-only).
    • Windows: Added explicit documentation and test assertions to ensure Low Integrity (write) access is not granted to git worktrees, relying on Windows' default read inheritance.
  • Testing: Added extensive unit and integration tests verifying read access is permitted while write access to external worktree directories is strictly blocked.

Related Issues

How to Validate

  1. Run the core integration tests: npm run test -w @google/gemini-cli-core -- src/services/sandboxManager.integration.test.ts
  2. Test using a git worktree setup that the CLI successfully runs read-only git operations but blocks modifications to the worktree's .git files.

Pre-Merge Checklist

  • Updated relevant documentation and README (if needed)
  • Added/updated tests (if needed)
  • Noted breaking changes (if any)
  • Validated on required platforms/methods:
    • MacOS
      • npm run
      • npx
      • Docker
      • Podman
      • Seatbelt
    • Windows
      • npm run
      • npx
      • Docker
    • Linux
      • npm run
      • npx
      • Docker

@ehedlund ehedlund requested a review from a team as a code owner April 9, 2026 16:46
@gemini-cli
Copy link
Copy Markdown
Contributor

gemini-cli Bot commented Apr 9, 2026

Hi @ehedlund, thank you so much for your contribution to Gemini CLI! We really appreciate the time and effort you've put into this.

We're making some updates to our contribution process to improve how we track and review changes. Please take a moment to review our recent discussion post: Improving Our Contribution Process & Introducing New Guidelines.

Key Update: Starting January 26, 2026, the Gemini CLI project will require all pull requests to be associated with an existing issue. Any pull requests not linked to an issue by that date will be automatically closed.

Thank you for your understanding and for being a part of our community!

@gemini-cli gemini-cli Bot added the status/need-issue Pull requests that need to have an associated issue. label Apr 9, 2026
@gemini-code-assist
Copy link
Copy Markdown
Contributor

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request significantly enhances the sandbox manager by centralizing Git worktree resolution and extending its support to Windows. By consolidating the worktree logic into a single, asynchronous step, the change improves maintainability and ensures consistent behavior across operating systems. This also addresses a previous gap by enabling proper sandboxing for Git worktrees on Windows, alongside updates to Linux and macOS builders to leverage this unified approach.

Highlights

  • Centralized Git Worktree Resolution: The logic for resolving Git worktree paths has been centralized into a shared resolveSandboxPaths step, improving consistency and maintainability across different sandbox managers.
  • Windows Git Worktree Support: Comprehensive support for Git worktrees has been added to the Windows sandbox manager, including the necessary Low Integrity access grants to ensure proper functionality.
  • Asynchronous File System Operations: The resolveGitWorktreePaths function has been refactored to be fully asynchronous, utilizing node:fs/promises for improved performance and non-blocking I/O.
  • Unified Path Resolution Utility: All local implementations of tryRealpath have been replaced with a single, shared resolveToRealPath utility, streamlining path resolution logic.
  • Sandbox Builder Updates: Linux (bwrap) and macOS (seatbelt) sandbox builders have been updated to consume the newly centralized Git worktree paths from ResolvedSandboxPaths.
  • Enhanced Testing: New unit and integration tests have been introduced to thoroughly validate Git worktree functionality across all supported platforms.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Apr 9, 2026

Size Change: -60 B (0%)

Total Size: 34 MB

Filename Size Change
./bundle/chunk-5QDCNTKY.js 0 B -3.47 kB (removed) 🏆
./bundle/chunk-BEZVRD5X.js 0 B -3.16 MB (removed) 🏆
./bundle/chunk-PCRMHXG3.js 0 B -14.8 MB (removed) 🏆
./bundle/core-P2XNJBEN.js 0 B -45.6 kB (removed) 🏆
./bundle/devtoolsService-BIH77Y6P.js 0 B -28.4 kB (removed) 🏆
./bundle/gemini-PEVHKVMZ.js 0 B -552 kB (removed) 🏆
./bundle/interactiveCli-4CAMGVG7.js 0 B -1.66 MB (removed) 🏆
./bundle/oauth2-provider-L7FNVSJ5.js 0 B -9.16 kB (removed) 🏆
./bundle/chunk-2DIZBDVH.js 3.16 MB +3.16 MB (new file) 🆕
./bundle/chunk-KSKCLAWV.js 3.47 kB +3.47 kB (new file) 🆕
./bundle/chunk-KVKX6KD4.js 14.8 MB +14.8 MB (new file) 🆕
./bundle/core-I766MSGC.js 45.6 kB +45.6 kB (new file) 🆕
./bundle/devtoolsService-DPRTLPDX.js 28.4 kB +28.4 kB (new file) 🆕
./bundle/gemini-QPW74JNH.js 552 kB +552 kB (new file) 🆕
./bundle/interactiveCli-6BD5R3GY.js 1.66 MB +1.66 MB (new file) 🆕
./bundle/oauth2-provider-MVYAORRI.js 9.16 kB +9.16 kB (new file) 🆕
ℹ️ View Unchanged
Filename Size Change
./bundle/bundled/third_party/index.js 8 MB 0 B
./bundle/chunk-34MYV7JD.js 2.45 kB 0 B
./bundle/chunk-5AUYMPVF.js 858 B 0 B
./bundle/chunk-5PS3AYFU.js 1.18 kB 0 B
./bundle/chunk-664ZODQF.js 124 kB 0 B
./bundle/chunk-DAHVX5MI.js 206 kB 0 B
./bundle/chunk-ETSDHTGW.js 1.96 MB 0 B
./bundle/chunk-IUUIT4SU.js 56.5 kB 0 B
./bundle/chunk-RJTRUG2J.js 39.8 kB 0 B
./bundle/cleanup-6LOTO6NL.js 0 B -856 B (removed) 🏆
./bundle/devtools-36NN55EP.js 696 kB 0 B
./bundle/dist-T73EYRDX.js 356 B 0 B
./bundle/events-XB7DADIJ.js 418 B 0 B
./bundle/gemini.js 4.97 kB 0 B
./bundle/getMachineId-bsd-TXG52NKR.js 1.55 kB 0 B
./bundle/getMachineId-darwin-7OE4DDZ6.js 1.55 kB 0 B
./bundle/getMachineId-linux-SHIFKOOX.js 1.34 kB 0 B
./bundle/getMachineId-unsupported-5U5DOEYY.js 1.06 kB 0 B
./bundle/getMachineId-win-6KLLGOI4.js 1.72 kB 0 B
./bundle/memoryDiscovery-YL35JRSL.js 980 B 0 B
./bundle/multipart-parser-KPBZEGQU.js 11.7 kB 0 B
./bundle/node_modules/@google/gemini-cli-devtools/dist/client/main.js 222 kB 0 B
./bundle/node_modules/@google/gemini-cli-devtools/dist/src/_client-assets.js 229 kB 0 B
./bundle/node_modules/@google/gemini-cli-devtools/dist/src/index.js 13.4 kB 0 B
./bundle/node_modules/@google/gemini-cli-devtools/dist/src/types.js 132 B 0 B
./bundle/sandbox-macos-permissive-open.sb 890 B 0 B
./bundle/sandbox-macos-permissive-proxied.sb 1.31 kB 0 B
./bundle/sandbox-macos-restrictive-open.sb 3.36 kB 0 B
./bundle/sandbox-macos-restrictive-proxied.sb 3.56 kB 0 B
./bundle/sandbox-macos-strict-open.sb 4.82 kB 0 B
./bundle/sandbox-macos-strict-proxied.sb 5.02 kB 0 B
./bundle/src-QVCVGIUX.js 47 kB 0 B
./bundle/tree-sitter-7U6MW5PS.js 274 kB 0 B
./bundle/tree-sitter-bash-34ZGLXVX.js 1.84 MB 0 B
./bundle/cleanup-3AJM62IL.js 856 B +856 B (new file) 🆕

compressed-size-action

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request refactors git worktree and submodule path resolution across Linux, macOS, and Windows sandboxes by centralizing the logic in resolveSandboxPaths and adopting asynchronous file system operations. The tryRealpath utility has been replaced with resolveToRealPath from the shared paths utility. Feedback identifies critical security vulnerabilities in the macOS and Windows implementations where granting write access to git directories could enable Remote Code Execution via malicious git hooks. Additionally, test assertions for the Linux sandbox should be updated to reflect read-write mounting for these paths to ensure consistency with the intended sandbox policy.

Comment thread packages/core/src/sandbox/macos/seatbeltArgsBuilder.ts Outdated
Comment thread packages/core/src/sandbox/windows/WindowsSandboxManager.ts Outdated
Comment thread packages/core/src/sandbox/linux/bwrapArgsBuilder.test.ts
@ehedlund ehedlund changed the title fix(sandbox): refactor git worktree resolution and add windows support fix(sandbox): centralize async git worktree resolution and enforce read-only security Apr 9, 2026
@ehedlund ehedlund enabled auto-merge April 9, 2026 18:05
@scidomino scidomino self-requested a review April 9, 2026 21:01
Copy link
Copy Markdown
Collaborator

@scidomino scidomino left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved but Gemini pointed out this edge case. Address it if you feel like it:

  1. macOS (seatbeltArgsBuilder.ts):
    Currently, the PR adds (allow file-read* (subpath ...)) for the worktree paths. However, Seatbelt rules are additive and evaluated in order. If a user explicitly allows write access to a parent directory of the worktree via policyAllowed, the write access will cascade to the worktree .git directory.
    Suggestion: Similar to how GOVERNANCE_FILES are handled, consider appending an explicit (deny file-write* (subpath ...)) for worktreeGitDir and mainGitDir at the bottom of the profile to make the read-only enforcement bulletproof against policy overrides.

  2. Linux (bwrapArgsBuilder.ts):
    The --ro-bind-try for git worktrees is pushed to bwrapArgs before policyAllowed and policyWrite bindings. Because bwrap processes mounts in order (later mounts overlay earlier ones), a broad write policy for a parent directory will override the read-only bind of the git directory.
    Suggestion: Consider moving the gitWorktree read-only binds closer to the end of the argument list (near the forbidden paths logic) to guarantee they cannot be overridden by broad write policies.

@scidomino scidomino disabled auto-merge April 9, 2026 21:12
Copy link
Copy Markdown
Contributor

@DavidAPierce DavidAPierce left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM + CLI Review:

Review Summary
This PR significantly enhances the security of the sandbox environments (macOS, Linux, and Windows) by centralizing the resolution of Git worktree paths and enforcing strict read-only access to these directories. This is
a critical security fix aimed at preventing Remote Code Execution (RCE) via malicious git hooks. The refactoring also improves performance by making path resolution asynchronous.


Detailed Findings

  1. Correctness & Security
  • RCE Mitigation: The core improvement is the switch from file-write* to file-read* (or equivalent) for git worktree directories. By ensuring that the sandboxed agent cannot modify .git/hooks or .git/config in a
    worktree, the PR effectively closes a potential RCE vector.
  • Asynchronous I/O: The refactoring of resolveGitWorktreePaths to use node:fs/promises is a welcome change, preventing event-loop blocking during sandbox initialization.
  • Bidirectional Link Verification: The addition of a security check to verify the bidirectional link between the .git file and the gitdir in the worktree is excellent. This prevents an attacker from "tricking" the
    sandbox into granting read access to arbitrary directories by crafting a fake .git file.
  1. Maintainability & Readability
  • Centralized Logic: Moving the git worktree resolution into the shared resolveSandboxPaths (in sandboxManager.ts) ensures that all platforms (macOS, Linux, Windows) use a consistent set of pre-resolved paths, reducing
    duplication and potential bugs in platform-specific builders.
  • Utility Standardization: Replacing multiple local implementations of tryRealpath with a shared resolveToRealPath utility improves codebase consistency.
  • Clear Intent: The comments added across bwrapArgsBuilder.ts, seatbeltArgsBuilder.ts, and WindowsSandboxManager.ts clearly explain why read-only access is enforced (to prevent RCE).
  1. Testability
  • Comprehensive Coverage: The PR includes high-quality unit tests for the new async logic in fsUtils.test.ts and platform-specific builders.
  • Integration Testing: The new integration tests in sandboxManager.integration.test.ts are particularly strong, as they empirically verify that:
    • Git worktree files are still readable within the sandbox.
    • Attempts to write to git worktree directories are blocked, even when "YOLO" mode (full workspace write access) is enabled.

Improvements & Suggestions

  • Logic Simplification (Minor): In packages/core/src/services/sandboxManager.ts, the code for creating the gitWorktree object can be slightly more concise, though the current implementation is perfectly clear.
  • Windows ACLs: The Windows implementation correctly skips grantLowIntegrityAccess for git worktrees, which effectively keeps them read-only for the sandboxed process. This is a clever and idiomatic use of the Windows
    integrity system.

Conclusion
Recommendation: Approved.

The changes are architecturally sound, well-tested, and significantly improve the security posture of the Gemini CLI. The transition to async path resolution is also a great performance win.

@ehedlund ehedlund enabled auto-merge April 9, 2026 21:32
@ehedlund ehedlund added this pull request to the merge queue Apr 9, 2026
Merged via the queue into main with commit 451edb3 Apr 9, 2026
27 checks passed
@ehedlund ehedlund deleted the fix/sandbox-git-worktree-resolution branch April 9, 2026 22:36
ik-gemini-bot added a commit to spigell/gemini-cli that referenced this pull request Apr 23, 2026
* refactor(plan): simplify policy priorities and consolidate read-only rules (google-gemini#24849)

* feat(test-utils): add memory usage integration test harness (google-gemini#24876)

* feat(memory): add /memory inbox command for reviewing extracted skills (google-gemini#24544)

* chore(release): bump version to 0.39.0-nightly.20260408.e77b22e63 (google-gemini#24939)

* fix(core): ensure robust sandbox cleanup in all process execution paths (google-gemini#24763)

Co-authored-by: Spencer <spencertang@google.com>

* chore: update ink version to 6.6.8 (google-gemini#24934)

* Changelog for v0.38.0-preview.0 (google-gemini#24938)

Co-authored-by: gemini-cli-robot <224641728+gemini-cli-robot@users.noreply.github.com>
Co-authored-by: g-samroberts <samroberts@google.com>

* chore: ignore conductor directory (google-gemini#22128)

Co-authored-by: Coco Sheng <cocosheng@google.com>

* Changelog for v0.37.0 (google-gemini#24940)

Co-authored-by: gemini-cli-robot <224641728+gemini-cli-robot@users.noreply.github.com>
Co-authored-by: Sam Roberts <158088236+g-samroberts@users.noreply.github.com>

* feat(plan): require user confirmation for activate_skill in Plan Mode (google-gemini#24946)

* feat(test-utils): add CPU performance integration test harness (google-gemini#24951)

* fix(core): resolve windows symlink bypass and stabilize sandbox integration tests (google-gemini#24834)

* test(sdk): add unit tests for GeminiCliSession (google-gemini#21897)

* fix(cli): restore file path display in edit and write tool confirmations (google-gemini#24974)

* fix(cli-ui): enable Ctrl+Backspace for word deletion in Windows Terminal (google-gemini#21447)

* fix(core): dynamic session ID injection to resolve resume bugs (google-gemini#24972)

* Update ink version to 6.6.9 (google-gemini#24980)

* feat(core): refine shell tool description display logic (google-gemini#24903)

* Generalize evals infra to support more types of evals, organization and queuing of named suites (google-gemini#24941)

* fix(cli): optimize startup with lightweight parent process (google-gemini#24667)

* refactor(sandbox): use centralized sandbox paths in macOS Seatbelt implementation (google-gemini#24984)

* feat(cli): refine tool output formatting for compact mode (google-gemini#24677)

* fix(sdk): skip broken sendStream tests to unblock nightly (google-gemini#25000)

* refactor(core): use centralized path resolution for Linux sandbox (google-gemini#24985)

* Support ctrl+shift+g (google-gemini#25035)

* feat(core): refactor subagent tool to unified invoke_subagent tool (google-gemini#24489)

* fix(core): add explicit git identity env vars to prevent sandbox checkpointing error (google-gemini#19775)

Co-authored-by: David Pierce <davidapierce@google.com>

* fix: respect hideContextPercentage when FooterConfigDialog is closed without changes (google-gemini#24773)

Co-authored-by: Coco Sheng <cocosheng@google.com>

* fix(cli): suppress unhandled AbortError logs during request cancellation (google-gemini#22621)

* Automated documentation audit (google-gemini#24567)

* feat(cli): implement useAgentStream hook (google-gemini#24292)

Co-authored-by: Adam Weidman <adamfweidman@gmail.com>
Co-authored-by: Adam Weidman <adamfweidman@google.com>

* refactor(core): remove legacy subagent wrapping tools (google-gemini#25053)

* refactor(plan) Clean default plan toml (google-gemini#25037)

* fix(core): honor retryDelay in RetryInfo for 503 errors (google-gemini#25057)

* fix(core): remediate subagent memory leaks using AbortSignal in MessageBus (google-gemini#25048)

* feat(cli): wire up useAgentStream in AppContainer (google-gemini#24297)

Co-authored-by: Adam Weidman <adamfweidman@gmail.com>
Co-authored-by: Adam Weidman <adamfweidman@google.com>

* feat(core): migrate chat recording to JSONL streaming (google-gemini#23749)

* fix(core): clear 5-minute timeouts in oauth flow to prevent memory leaks (google-gemini#24968)

* fix(sandbox): centralize async git worktree resolution and enforce read-only security (google-gemini#25040)

* feat(test): add high-volume shell test and refine perf harness (google-gemini#24983)

* fix(core): silently handle EPERM when listing dir structure (google-gemini#25066)

* Changelog for v0.37.1 (google-gemini#25055)

Co-authored-by: gemini-cli-robot <224641728+gemini-cli-robot@users.noreply.github.com>

* fix: decode Uint8Array and multi-byte UTF-8 in API error messages (google-gemini#23341)

Co-authored-by: Coco Sheng <cocosheng@google.com>

* Automated documentation audit results (google-gemini#22755)

* debugging(ui): add optional debugRainbow setting (google-gemini#25088)

* fix: resolve lifecycle memory leaks by cleaning up listeners and root closures (google-gemini#25049)

* docs(cli): updates f12 description to be more precise (google-gemini#15816)

* fix(cli): mark /settings as unsafe to run concurrently (google-gemini#25061)

* fix(core): remove buffer slice to prevent OOM on large output streams (google-gemini#25094)

* feat(core): persist subagent agentId in tool call records (google-gemini#25092)

* chore(core): increase codebase investigator turn limits to 50 (google-gemini#25125)

* refactor(core): consolidate execute() arguments into ExecuteOptions (google-gemini#25101)

* feat(core): add Strategic Re-evaluation guidance to system prompt (google-gemini#25062)

* fix(core): preserve shell execution config fields on update (google-gemini#25113)

* docs: add vi shortcuts and clarify MCP sandbox setup (google-gemini#21679)

Co-authored-by: Jenna Inouye <jinouye@google.com>

* fix(cli): pass session id to interactive shell executions (google-gemini#25114)

* fix(cli): resolve text sanitization data loss due to C1 control characters (google-gemini#22624)

* feat(core): add large memory regression test (google-gemini#25059)

* fix(core): resolve PTY exhaustion and orphan MCP subprocess leaks (google-gemini#25079)

* chore: switch from keytar to @github/keytar (google-gemini#25143)

* chore(deps): update vulnerable dependencies via npm audit fix (google-gemini#25140)

* perf(sandbox): optimize Windows sandbox initialization via native ACL application (google-gemini#25077)

* fix: improve audio MIME normalization and validation in file reads (google-gemini#21636)

Co-authored-by: Coco Sheng <cocosheng@google.com>

* docs: Update docs-audit to include changes in PR body (google-gemini#25153)

* docs: correct documentation for enforced authentication type (google-gemini#25142)

* fix(cli): exclude update_topic from confirmation queue count (google-gemini#24945)

* Memory fix for trace's streamWrapper. (google-gemini#25089)

* fix(core): fix quota footer for non-auto models and improve display (google-gemini#25121)

* docs(contributing): clarify self-assignment policy for issues (google-gemini#23087)

* feat(core): add skill patching support with /memory inbox integration (google-gemini#25148)

* Stop suppressing thoughts and text in model response (google-gemini#25073)

* fix(release): prefix git hash in nightly versions to prevent semver normalization (google-gemini#25304)

* feat(cli): extract QuotaContext and resolve infinite render loop (google-gemini#24959)

* refactor(core): extract and centralize sandbox path utilities (google-gemini#25305)

Co-authored-by: David Pierce <davidapierce@google.com>

* feat(ui): added enhancements to scroll momentum (google-gemini#24447)

* fix(core): replace custom binary detection with isbinaryfile to correctly handle UTF-8 (U+FFFD) (google-gemini#25297)

* feat(agent): implement tool-controlled display protocol (Steps 2-3) (google-gemini#25134)

* Stop showing scrollbar unless we are in terminalBuffer mode (google-gemini#25320)

* fix(core): expose GEMINI_PLANS_DIR to hook environment (google-gemini#25296)

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* feat: support auth block in MCP servers config in agents (google-gemini#24770)

* feat(core): implement silent fallback for Plan Mode model routing (google-gemini#25317)

* fix: correct redirect count increment in fetchJson (google-gemini#24896)

Co-authored-by: Tommaso Sciortino <sciortino@gmail.com>

* fix(core): prevent secondary crash in ModelRouterService finally block (google-gemini#25333)

* feat(core): introduce decoupled ContextManager and Sidecar architecture (google-gemini#24752)

* docs(core): update generalist agent documentation (google-gemini#25325)

* chore(mcp): check MCP error code over brittle string match (google-gemini#25381)

* test(core): improve sandbox integration test coverage and fix OS-specific failures (google-gemini#25307)

Co-authored-by: David Pierce <davidapierce@google.com>

* feat(plan): update plan mode prompt to allow showing plan content (google-gemini#25058)

* fix(core): use debug level for keychain fallback logging (google-gemini#25398)

* feat(test): add a performance test in asian language (google-gemini#25392)

* feat(cli): enable mouse clicking for cursor positioning in AskUser multi-line answers (google-gemini#24630)

* fix(core): detect kmscon terminal as supporting true color (google-gemini#25282)

Co-authored-by: Adib234 <30782825+Adib234@users.noreply.github.com>
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* ci: add agent session drift check workflow (google-gemini#25389)

* use macos-latest-large runner where applicable. (google-gemini#25413)

* Changelog for v0.37.2 (google-gemini#25336)

Co-authored-by: gemini-cli-robot <224641728+gemini-cli-robot@users.noreply.github.com>

* chore(release): v0.39.0-preview.0

* fix(patch): cherry-pick a4e98c0 to release/v0.39.0-preview.0-pr-25138 to patch version v0.39.0-preview.0 and create version 0.39.0-preview.1 (google-gemini#25766)

Co-authored-by: Mahima Shanware <mahima.shanware@gmail.com>

* chore(release): v0.39.0-preview.1

* fix(patch): cherry-pick d6f88f8 to release/v0.39.0-preview.1-pr-25670 to patch version v0.39.0-preview.1 and create version 0.39.0-preview.2 (google-gemini#25776)

Co-authored-by: Adam Weidman <65992621+adamfweidman@users.noreply.github.com>

* chore(release): v0.39.0-preview.2

* chore(release): v0.39.0

---------

Co-authored-by: ruomeng <ruomeng@google.com>
Co-authored-by: Sri Pasumarthi <111310667+sripasg@users.noreply.github.com>
Co-authored-by: Sandy Tao <sandytao520@icloud.com>
Co-authored-by: gemini-cli-robot <gemini-cli-robot@google.com>
Co-authored-by: Emily Hedlund <ehedlund@google.com>
Co-authored-by: Spencer <spencertang@google.com>
Co-authored-by: Jacob Richman <jacob314@gmail.com>
Co-authored-by: gemini-cli-robot <224641728+gemini-cli-robot@users.noreply.github.com>
Co-authored-by: g-samroberts <samroberts@google.com>
Co-authored-by: JAYADITYA <96861162+JayadityaGit@users.noreply.github.com>
Co-authored-by: Coco Sheng <cocosheng@google.com>
Co-authored-by: Sam Roberts <158088236+g-samroberts@users.noreply.github.com>
Co-authored-by: Adamya Singh <adamyasingh54@gmail.com>
Co-authored-by: Jarrod Whelan <150866123+jwhelangoog@users.noreply.github.com>
Co-authored-by: dogukanozen <dogukannozen@hotmail.com>
Co-authored-by: Tommaso Sciortino <sciortino@gmail.com>
Co-authored-by: Christian Gunderman <gundermanc@google.com>
Co-authored-by: Sehoon Shon <sshon@google.com>
Co-authored-by: Abhi <43648792+abhipatel12@users.noreply.github.com>
Co-authored-by: MD. MOHIBUR RAHMAN <35300157+mrpmohiburrahman@users.noreply.github.com>
Co-authored-by: David Pierce <davidapierce@google.com>
Co-authored-by: chernistry <73943355+chernistry@users.noreply.github.com>
Co-authored-by: euxaristia <25621994+euxaristia@users.noreply.github.com>
Co-authored-by: Michael Bleigh <mbleigh@mbleigh.com>
Co-authored-by: Adam Weidman <adamfweidman@gmail.com>
Co-authored-by: Adam Weidman <adamfweidman@google.com>
Co-authored-by: Yuna Seol <yunaseol@gmail.com>
Co-authored-by: June <kimjune01@gmail.com>
Co-authored-by: Aishanee Shah <aishaneeshah@google.com>
Co-authored-by: Jason Matthew Suhari <jasonmatthewsuhari@gmail.com>
Co-authored-by: Christopher Thomas <cobekgn@gmail.com>
Co-authored-by: Jenna Inouye <jinouye@google.com>
Co-authored-by: cynthialong0-0 <82900738+cynthialong0-0@users.noreply.github.com>
Co-authored-by: M Junaid Shaukat <154750865+junaiddshaukat@users.noreply.github.com>
Co-authored-by: Abhijit Balaji <abhijitbalaji@google.com>
Co-authored-by: Mark Griffith <anthraxmilkshake@hotmail.com>
Co-authored-by: Jack Wotherspoon <jackwoth@google.com>
Co-authored-by: Jesse Rosenstock <jesse.rosenstock@gmail.com>
Co-authored-by: Adib234 <30782825+Adib234@users.noreply.github.com>
Co-authored-by: Dev Randalpura <devrandalpura@google.com>
Co-authored-by: Anjaligarhwal <anjaligarhwal1610@gmail.com>
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Co-authored-by: Tanmay Vartak <9002434+TanmayVartak@users.noreply.github.com>
Co-authored-by: Jerop Kipruto <jerop@google.com>
Co-authored-by: Kevin Zhao <kevin8093@126.com>
Co-authored-by: joshualitt <joshualitt@google.com>
Co-authored-by: Clay <claygeo6@gmail.com>
Co-authored-by: Adam Weidman <65992621+adamfweidman@users.noreply.github.com>
Co-authored-by: Mahima Shanware <mahima.shanware@gmail.com>
Co-authored-by: codex-bot <spigelly+gh-bot@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

status/need-issue Pull requests that need to have an associated issue.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants