| | |
| | |
| | |
| | |
| | |
| |
|
| | import * as fs from 'node:fs'; |
| | import * as path from 'node:path'; |
| | import { homedir } from 'node:os'; |
| | import yargs from 'yargs/yargs'; |
| | import { hideBin } from 'yargs/helpers'; |
| | import process from 'node:process'; |
| | import { mcpCommand } from '../commands/mcp.js'; |
| | import type { |
| | TelemetryTarget, |
| | FileFilteringOptions, |
| | MCPServerConfig, |
| | } from '@google/gemini-cli-core'; |
| | import { extensionsCommand } from '../commands/extensions.js'; |
| | import { |
| | Config, |
| | loadServerHierarchicalMemory, |
| | setGeminiMdFilename as setServerGeminiMdFilename, |
| | getCurrentGeminiMdFilename, |
| | ApprovalMode, |
| | DEFAULT_GEMINI_MODEL, |
| | DEFAULT_GEMINI_EMBEDDING_MODEL, |
| | DEFAULT_MEMORY_FILE_FILTERING_OPTIONS, |
| | FileDiscoveryService, |
| | ShellTool, |
| | EditTool, |
| | WriteFileTool, |
| | } from '@google/gemini-cli-core'; |
| | import type { Settings } from './settings.js'; |
| |
|
| | import type { Extension } from './extension.js'; |
| | import { annotateActiveExtensions } from './extension.js'; |
| | import { getCliVersion } from '../utils/version.js'; |
| | import { loadSandboxConfig } from './sandboxConfig.js'; |
| | import { resolvePath } from '../utils/resolvePath.js'; |
| | import { appEvents } from '../utils/events.js'; |
| |
|
| | import { isWorkspaceTrusted } from './trustedFolders.js'; |
| |
|
| | |
| | const logger = { |
| | |
| | debug: (...args: any[]) => console.debug('[DEBUG]', ...args), |
| | |
| | warn: (...args: any[]) => console.warn('[WARN]', ...args), |
| | |
| | error: (...args: any[]) => console.error('[ERROR]', ...args), |
| | }; |
| |
|
| | export interface CliArgs { |
| | model: string | undefined; |
| | sandbox: boolean | string | undefined; |
| | sandboxImage: string | undefined; |
| | debug: boolean | undefined; |
| | prompt: string | undefined; |
| | promptInteractive: string | undefined; |
| | allFiles: boolean | undefined; |
| | showMemoryUsage: boolean | undefined; |
| | yolo: boolean | undefined; |
| | approvalMode: string | undefined; |
| | telemetry: boolean | undefined; |
| | checkpointing: boolean | undefined; |
| | telemetryTarget: string | undefined; |
| | telemetryOtlpEndpoint: string | undefined; |
| | telemetryOtlpProtocol: string | undefined; |
| | telemetryLogPrompts: boolean | undefined; |
| | telemetryOutfile: string | undefined; |
| | allowedMcpServerNames: string[] | undefined; |
| | allowedTools: string[] | undefined; |
| | experimentalAcp: boolean | undefined; |
| | extensions: string[] | undefined; |
| | listExtensions: boolean | undefined; |
| | proxy: string | undefined; |
| | includeDirectories: string[] | undefined; |
| | screenReader: boolean | undefined; |
| | useSmartEdit: boolean | undefined; |
| | sessionSummary: string | undefined; |
| | } |
| |
|
| | export async function parseArguments(settings: Settings): Promise<CliArgs> { |
| | const yargsInstance = yargs(hideBin(process.argv)) |
| | .locale('en') |
| | .scriptName('gemini') |
| | .usage( |
| | 'Usage: gemini [options] [command]\n\nGemini CLI - Launch an interactive CLI, use -p/--prompt for non-interactive mode', |
| | ) |
| | .command('$0', 'Launch Gemini CLI', (yargsInstance) => |
| | yargsInstance |
| | .option('model', { |
| | alias: 'm', |
| | type: 'string', |
| | description: `Model`, |
| | default: process.env['GEMINI_MODEL'], |
| | }) |
| | .option('prompt', { |
| | alias: 'p', |
| | type: 'string', |
| | description: 'Prompt. Appended to input on stdin (if any).', |
| | }) |
| | .option('prompt-interactive', { |
| | alias: 'i', |
| | type: 'string', |
| | description: |
| | 'Execute the provided prompt and continue in interactive mode', |
| | }) |
| | .option('sandbox', { |
| | alias: 's', |
| | type: 'boolean', |
| | description: 'Run in sandbox?', |
| | }) |
| | .option('sandbox-image', { |
| | type: 'string', |
| | description: 'Sandbox image URI.', |
| | }) |
| | .option('debug', { |
| | alias: 'd', |
| | type: 'boolean', |
| | description: 'Run in debug mode?', |
| | default: false, |
| | }) |
| | .option('all-files', { |
| | alias: ['a'], |
| | type: 'boolean', |
| | description: 'Include ALL files in context?', |
| | default: false, |
| | }) |
| | .option('show-memory-usage', { |
| | type: 'boolean', |
| | description: 'Show memory usage in status bar', |
| | default: false, |
| | }) |
| | .option('yolo', { |
| | alias: 'y', |
| | type: 'boolean', |
| | description: |
| | 'Automatically accept all actions (aka YOLO mode, see https://www.youtube.com/watch?v=xvFZjo5PgG0 for more details)?', |
| | default: false, |
| | }) |
| | .option('approval-mode', { |
| | type: 'string', |
| | choices: ['default', 'auto_edit', 'yolo'], |
| | description: |
| | 'Set the approval mode: default (prompt for approval), auto_edit (auto-approve edit tools), yolo (auto-approve all tools)', |
| | }) |
| | .option('telemetry', { |
| | type: 'boolean', |
| | description: |
| | 'Enable telemetry? This flag specifically controls if telemetry is sent. Other --telemetry-* flags set specific values but do not enable telemetry on their own.', |
| | }) |
| | .option('telemetry-target', { |
| | type: 'string', |
| | choices: ['local', 'gcp'], |
| | description: |
| | 'Set the telemetry target (local or gcp). Overrides settings files.', |
| | }) |
| | .option('telemetry-otlp-endpoint', { |
| | type: 'string', |
| | description: |
| | 'Set the OTLP endpoint for telemetry. Overrides environment variables and settings files.', |
| | }) |
| | .option('telemetry-otlp-protocol', { |
| | type: 'string', |
| | choices: ['grpc', 'http'], |
| | description: |
| | 'Set the OTLP protocol for telemetry (grpc or http). Overrides settings files.', |
| | }) |
| | .option('telemetry-log-prompts', { |
| | type: 'boolean', |
| | description: |
| | 'Enable or disable logging of user prompts for telemetry. Overrides settings files.', |
| | }) |
| | .option('telemetry-outfile', { |
| | type: 'string', |
| | description: 'Redirect all telemetry output to the specified file.', |
| | }) |
| | .option('checkpointing', { |
| | alias: 'c', |
| | type: 'boolean', |
| | description: 'Enables checkpointing of file edits', |
| | default: false, |
| | }) |
| | .option('experimental-acp', { |
| | type: 'boolean', |
| | description: 'Starts the agent in ACP mode', |
| | }) |
| | .option('allowed-mcp-server-names', { |
| | type: 'array', |
| | string: true, |
| | description: 'Allowed MCP server names', |
| | }) |
| | .option('allowed-tools', { |
| | type: 'array', |
| | string: true, |
| | description: 'Tools that are allowed to run without confirmation', |
| | }) |
| | .option('extensions', { |
| | alias: 'e', |
| | type: 'array', |
| | string: true, |
| | description: |
| | 'A list of extensions to use. If not provided, all extensions are used.', |
| | }) |
| | .option('list-extensions', { |
| | alias: 'l', |
| | type: 'boolean', |
| | description: 'List all available extensions and exit.', |
| | }) |
| | .option('proxy', { |
| | type: 'string', |
| | description: |
| | 'Proxy for gemini client, like schema://user:password@host:port', |
| | }) |
| | .option('include-directories', { |
| | type: 'array', |
| | string: true, |
| | description: |
| | 'Additional directories to include in the workspace (comma-separated or multiple --include-directories)', |
| | coerce: (dirs: string[]) => |
| | |
| | dirs.flatMap((dir) => dir.split(',').map((d) => d.trim())), |
| | }) |
| | .option('screen-reader', { |
| | type: 'boolean', |
| | description: 'Enable screen reader mode for accessibility.', |
| | default: false, |
| | }) |
| | .option('session-summary', { |
| | type: 'string', |
| | description: 'File to write session summary to.', |
| | }) |
| | .deprecateOption( |
| | 'telemetry', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'telemetry-target', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'telemetry-otlp-endpoint', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'telemetry-otlp-protocol', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'telemetry-log-prompts', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'telemetry-outfile', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'show-memory-usage', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'sandbox-image', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'proxy', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'checkpointing', |
| | 'Use settings.json instead. This flag will be removed in a future version.', |
| | ) |
| | .deprecateOption( |
| | 'all-files', |
| | 'Use @ includes in the application instead. This flag will be removed in a future version.', |
| | ) |
| | .check((argv) => { |
| | if (argv.prompt && argv['promptInteractive']) { |
| | throw new Error( |
| | 'Cannot use both --prompt (-p) and --prompt-interactive (-i) together', |
| | ); |
| | } |
| | if (argv.yolo && argv['approvalMode']) { |
| | throw new Error( |
| | 'Cannot use both --yolo (-y) and --approval-mode together. Use --approval-mode=yolo instead.', |
| | ); |
| | } |
| | return true; |
| | }), |
| | ) |
| | |
| | .command(mcpCommand); |
| |
|
| | if (settings?.experimental?.extensionManagement ?? false) { |
| | yargsInstance.command(extensionsCommand); |
| | } |
| |
|
| | yargsInstance |
| | .version(await getCliVersion()) |
| | .alias('v', 'version') |
| | .help() |
| | .alias('h', 'help') |
| | .strict() |
| | .demandCommand(0, 0); |
| |
|
| | yargsInstance.wrap(yargsInstance.terminalWidth()); |
| | const result = await yargsInstance.parse(); |
| |
|
| | |
| | |
| | if ( |
| | result._.length > 0 && |
| | (result._[0] === 'mcp' || result._[0] === 'extensions') |
| | ) { |
| | |
| | process.exit(0); |
| | } |
| |
|
| | |
| | |
| | return result as unknown as CliArgs; |
| | } |
| |
|
| | |
| | |
| | |
| | export async function loadHierarchicalGeminiMemory( |
| | currentWorkingDirectory: string, |
| | includeDirectoriesToReadGemini: readonly string[] = [], |
| | debugMode: boolean, |
| | fileService: FileDiscoveryService, |
| | settings: Settings, |
| | extensionContextFilePaths: string[] = [], |
| | folderTrust: boolean, |
| | memoryImportFormat: 'flat' | 'tree' = 'tree', |
| | fileFilteringOptions?: FileFilteringOptions, |
| | ): Promise<{ memoryContent: string; fileCount: number }> { |
| | |
| | const realCwd = fs.realpathSync(path.resolve(currentWorkingDirectory)); |
| | const realHome = fs.realpathSync(path.resolve(homedir())); |
| | const isHomeDirectory = realCwd === realHome; |
| |
|
| | |
| | |
| | const effectiveCwd = isHomeDirectory ? '' : currentWorkingDirectory; |
| |
|
| | if (debugMode) { |
| | logger.debug( |
| | `CLI: Delegating hierarchical memory load to server for CWD: ${currentWorkingDirectory} (memoryImportFormat: ${memoryImportFormat})`, |
| | ); |
| | } |
| |
|
| | |
| | return loadServerHierarchicalMemory( |
| | effectiveCwd, |
| | includeDirectoriesToReadGemini, |
| | debugMode, |
| | fileService, |
| | extensionContextFilePaths, |
| | folderTrust, |
| | memoryImportFormat, |
| | fileFilteringOptions, |
| | settings.context?.discoveryMaxDirs, |
| | ); |
| | } |
| |
|
| | export async function loadCliConfig( |
| | settings: Settings, |
| | extensions: Extension[], |
| | sessionId: string, |
| | argv: CliArgs, |
| | cwd: string = process.cwd(), |
| | ): Promise<Config> { |
| | const debugMode = |
| | argv.debug || |
| | [process.env['DEBUG'], process.env['DEBUG_MODE']].some( |
| | (v) => v === 'true' || v === '1', |
| | ) || |
| | false; |
| | const memoryImportFormat = settings.context?.importFormat || 'tree'; |
| |
|
| | const ideMode = settings.ide?.enabled ?? false; |
| |
|
| | const folderTrustFeature = |
| | settings.security?.folderTrust?.featureEnabled ?? false; |
| | const folderTrustSetting = settings.security?.folderTrust?.enabled ?? true; |
| | const folderTrust = folderTrustFeature && folderTrustSetting; |
| | const trustedFolder = isWorkspaceTrusted(settings) ?? true; |
| |
|
| | const allExtensions = annotateActiveExtensions( |
| | extensions, |
| | argv.extensions || [], |
| | cwd, |
| | ); |
| |
|
| | const activeExtensions = extensions.filter( |
| | (_, i) => allExtensions[i].isActive, |
| | ); |
| |
|
| | |
| | |
| | |
| | |
| | if (settings.context?.fileName) { |
| | setServerGeminiMdFilename(settings.context.fileName); |
| | } else { |
| | |
| | setServerGeminiMdFilename(getCurrentGeminiMdFilename()); |
| | } |
| |
|
| | const extensionContextFilePaths = activeExtensions.flatMap( |
| | (e) => e.contextFiles, |
| | ); |
| |
|
| | const fileService = new FileDiscoveryService(cwd); |
| |
|
| | const fileFiltering = { |
| | ...DEFAULT_MEMORY_FILE_FILTERING_OPTIONS, |
| | ...settings.context?.fileFiltering, |
| | }; |
| |
|
| | const includeDirectories = (settings.context?.includeDirectories || []) |
| | .map(resolvePath) |
| | .concat((argv.includeDirectories || []).map(resolvePath)); |
| |
|
| | |
| | const { memoryContent, fileCount } = await loadHierarchicalGeminiMemory( |
| | cwd, |
| | settings.context?.loadMemoryFromIncludeDirectories |
| | ? includeDirectories |
| | : [], |
| | debugMode, |
| | fileService, |
| | settings, |
| | extensionContextFilePaths, |
| | trustedFolder, |
| | memoryImportFormat, |
| | fileFiltering, |
| | ); |
| |
|
| | let mcpServers = mergeMcpServers(settings, activeExtensions); |
| | const question = argv.promptInteractive || argv.prompt || ''; |
| |
|
| | |
| | let approvalMode: ApprovalMode; |
| | if (argv.approvalMode) { |
| | |
| | switch (argv.approvalMode) { |
| | case 'yolo': |
| | approvalMode = ApprovalMode.YOLO; |
| | break; |
| | case 'auto_edit': |
| | approvalMode = ApprovalMode.AUTO_EDIT; |
| | break; |
| | case 'default': |
| | approvalMode = ApprovalMode.DEFAULT; |
| | break; |
| | default: |
| | throw new Error( |
| | `Invalid approval mode: ${argv.approvalMode}. Valid values are: yolo, auto_edit, default`, |
| | ); |
| | } |
| | } else { |
| | |
| | approvalMode = |
| | argv.yolo || false ? ApprovalMode.YOLO : ApprovalMode.DEFAULT; |
| | } |
| |
|
| | |
| | if (!trustedFolder && approvalMode !== ApprovalMode.DEFAULT) { |
| | logger.warn( |
| | `Approval mode overridden to "default" because the current folder is not trusted.`, |
| | ); |
| | approvalMode = ApprovalMode.DEFAULT; |
| | } |
| |
|
| | const interactive = |
| | !!argv.promptInteractive || (process.stdin.isTTY && question.length === 0); |
| | |
| | const extraExcludes: string[] = []; |
| | if (!interactive && !argv.experimentalAcp) { |
| | switch (approvalMode) { |
| | case ApprovalMode.DEFAULT: |
| | |
| | extraExcludes.push(ShellTool.Name, EditTool.Name, WriteFileTool.Name); |
| | break; |
| | case ApprovalMode.AUTO_EDIT: |
| | |
| | extraExcludes.push(ShellTool.Name); |
| | break; |
| | case ApprovalMode.YOLO: |
| | |
| | break; |
| | default: |
| | |
| | break; |
| | } |
| | } |
| |
|
| | const excludeTools = mergeExcludeTools( |
| | settings, |
| | activeExtensions, |
| | extraExcludes.length > 0 ? extraExcludes : undefined, |
| | ); |
| | const blockedMcpServers: Array<{ name: string; extensionName: string }> = []; |
| |
|
| | if (!argv.allowedMcpServerNames) { |
| | if (settings.mcp?.allowed) { |
| | mcpServers = allowedMcpServers( |
| | mcpServers, |
| | settings.mcp.allowed, |
| | blockedMcpServers, |
| | ); |
| | } |
| |
|
| | if (settings.mcp?.excluded) { |
| | const excludedNames = new Set(settings.mcp.excluded.filter(Boolean)); |
| | if (excludedNames.size > 0) { |
| | mcpServers = Object.fromEntries( |
| | Object.entries(mcpServers).filter(([key]) => !excludedNames.has(key)), |
| | ); |
| | } |
| | } |
| | } |
| |
|
| | if (argv.allowedMcpServerNames) { |
| | mcpServers = allowedMcpServers( |
| | mcpServers, |
| | argv.allowedMcpServerNames, |
| | blockedMcpServers, |
| | ); |
| | } |
| |
|
| | const sandboxConfig = await loadSandboxConfig(settings, argv); |
| | const screenReader = |
| | argv.screenReader !== undefined |
| | ? argv.screenReader |
| | : (settings.ui?.accessibility?.screenReader ?? false); |
| | return new Config({ |
| | sessionId, |
| | embeddingModel: DEFAULT_GEMINI_EMBEDDING_MODEL, |
| | sandbox: sandboxConfig, |
| | targetDir: cwd, |
| | includeDirectories, |
| | loadMemoryFromIncludeDirectories: |
| | settings.context?.loadMemoryFromIncludeDirectories || false, |
| | debugMode, |
| | question, |
| | fullContext: argv.allFiles || false, |
| | coreTools: settings.tools?.core || undefined, |
| | allowedTools: argv.allowedTools || settings.tools?.allowed || undefined, |
| | excludeTools, |
| | toolDiscoveryCommand: settings.tools?.discoveryCommand, |
| | toolCallCommand: settings.tools?.callCommand, |
| | mcpServerCommand: settings.mcp?.serverCommand, |
| | mcpServers, |
| | userMemory: memoryContent, |
| | geminiMdFileCount: fileCount, |
| | approvalMode, |
| | showMemoryUsage: |
| | argv.showMemoryUsage || settings.ui?.showMemoryUsage || false, |
| | accessibility: { |
| | ...settings.ui?.accessibility, |
| | screenReader, |
| | }, |
| | telemetry: { |
| | enabled: argv.telemetry ?? settings.telemetry?.enabled, |
| | target: (argv.telemetryTarget ?? |
| | settings.telemetry?.target) as TelemetryTarget, |
| | otlpEndpoint: |
| | argv.telemetryOtlpEndpoint ?? |
| | process.env['OTEL_EXPORTER_OTLP_ENDPOINT'] ?? |
| | settings.telemetry?.otlpEndpoint, |
| | otlpProtocol: (['grpc', 'http'] as const).find( |
| | (p) => |
| | p === |
| | (argv.telemetryOtlpProtocol ?? settings.telemetry?.otlpProtocol), |
| | ), |
| | logPrompts: argv.telemetryLogPrompts ?? settings.telemetry?.logPrompts, |
| | outfile: argv.telemetryOutfile ?? settings.telemetry?.outfile, |
| | }, |
| | usageStatisticsEnabled: settings.privacy?.usageStatisticsEnabled ?? true, |
| | |
| | fileFiltering: { |
| | respectGitIgnore: settings.context?.fileFiltering?.respectGitIgnore, |
| | respectGeminiIgnore: settings.context?.fileFiltering?.respectGeminiIgnore, |
| | enableRecursiveFileSearch: |
| | settings.context?.fileFiltering?.enableRecursiveFileSearch, |
| | disableFuzzySearch: settings.context?.fileFiltering?.disableFuzzySearch, |
| | }, |
| | checkpointing: |
| | argv.checkpointing || settings.general?.checkpointing?.enabled, |
| | proxy: |
| | argv.proxy || |
| | process.env['HTTPS_PROXY'] || |
| | process.env['https_proxy'] || |
| | process.env['HTTP_PROXY'] || |
| | process.env['http_proxy'], |
| | cwd, |
| | fileDiscoveryService: fileService, |
| | bugCommand: settings.advanced?.bugCommand, |
| | model: argv.model || settings.model?.name || DEFAULT_GEMINI_MODEL, |
| | extensionContextFilePaths, |
| | maxSessionTurns: settings.model?.maxSessionTurns ?? -1, |
| | experimentalZedIntegration: argv.experimentalAcp || false, |
| | listExtensions: argv.listExtensions || false, |
| | extensions: allExtensions, |
| | blockedMcpServers, |
| | noBrowser: !!process.env['NO_BROWSER'], |
| | summarizeToolOutput: settings.model?.summarizeToolOutput, |
| | ideMode, |
| | chatCompression: settings.model?.chatCompression, |
| | folderTrustFeature, |
| | folderTrust, |
| | interactive, |
| | trustedFolder, |
| | useRipgrep: settings.tools?.useRipgrep, |
| | shouldUseNodePtyShell: settings.tools?.usePty, |
| | skipNextSpeakerCheck: settings.model?.skipNextSpeakerCheck, |
| | enablePromptCompletion: settings.general?.enablePromptCompletion ?? false, |
| | eventEmitter: appEvents, |
| | useSmartEdit: argv.useSmartEdit ?? settings.useSmartEdit, |
| | }); |
| | } |
| |
|
| | function allowedMcpServers( |
| | mcpServers: { [x: string]: MCPServerConfig }, |
| | allowMCPServers: string[], |
| | blockedMcpServers: Array<{ name: string; extensionName: string }>, |
| | ) { |
| | const allowedNames = new Set(allowMCPServers.filter(Boolean)); |
| | if (allowedNames.size > 0) { |
| | mcpServers = Object.fromEntries( |
| | Object.entries(mcpServers).filter(([key, server]) => { |
| | const isAllowed = allowedNames.has(key); |
| | if (!isAllowed) { |
| | blockedMcpServers.push({ |
| | name: key, |
| | extensionName: server.extensionName || '', |
| | }); |
| | } |
| | return isAllowed; |
| | }), |
| | ); |
| | } else { |
| | blockedMcpServers.push( |
| | ...Object.entries(mcpServers).map(([key, server]) => ({ |
| | name: key, |
| | extensionName: server.extensionName || '', |
| | })), |
| | ); |
| | mcpServers = {}; |
| | } |
| | return mcpServers; |
| | } |
| |
|
| | function mergeMcpServers(settings: Settings, extensions: Extension[]) { |
| | const mcpServers = { ...(settings.mcpServers || {}) }; |
| | for (const extension of extensions) { |
| | Object.entries(extension.config.mcpServers || {}).forEach( |
| | ([key, server]) => { |
| | if (mcpServers[key]) { |
| | logger.warn( |
| | `Skipping extension MCP config for server with key "${key}" as it already exists.`, |
| | ); |
| | return; |
| | } |
| | mcpServers[key] = { |
| | ...server, |
| | extensionName: extension.config.name, |
| | }; |
| | }, |
| | ); |
| | } |
| | return mcpServers; |
| | } |
| |
|
| | function mergeExcludeTools( |
| | settings: Settings, |
| | extensions: Extension[], |
| | extraExcludes?: string[] | undefined, |
| | ): string[] { |
| | const allExcludeTools = new Set([ |
| | ...(settings.tools?.exclude || []), |
| | ...(extraExcludes || []), |
| | ]); |
| | for (const extension of extensions) { |
| | for (const tool of extension.config.excludeTools || []) { |
| | allExcludeTools.add(tool); |
| | } |
| | } |
| | return [...allExcludeTools]; |
| | } |
| |
|