Skip to content

Commit c7046a9

Browse files
chore(ci): full runtime_ci_tooling update from v0.23.10
- Updated gemini settings and autodoc safety policy - Regenerated all workflows Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent 2e5071f commit c7046a9

7 files changed

Lines changed: 396 additions & 71 deletions

File tree

.gemini/policies/autodoc-safety.toml

Lines changed: 39 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,15 @@
88
# it must only write `.md` files and must never create helper scripts or other
99
# non-Markdown artifacts. The installed `runtime_ci_tooling` package may also
1010
# apply this policy from its template tree at invocation time.
11+
#
12+
# This policy replaces the deprecated `--allowed-tools` CLI flag (removed in
13+
# Gemini CLI 1.0). Tool-surface restriction is handled entirely by these rules:
14+
# explicit allows for the tools the autodoc pipeline needs, and a catch-all deny
15+
# for everything else. When loaded via `--policy`, these rules operate at User
16+
# tier (base priority 2) which overrides both the built-in defaults (tier 1)
17+
# and `--yolo` mode's allow-all rule (priority 1.999).
18+
19+
# ── Allowed tools ────────────────────────────────────────────────────────────
1120

1221
# Allow docs-only file edits for .md files only
1322
# (Gemini CLI 0.34+: file edits use `write_file` / `replace`; `edit_file` is not a registered tool.)
@@ -17,24 +26,47 @@ decision = "allow"
1726
priority = 100
1827
argsPattern = '"(file_path|path)"\s*:\s*"[^"]*\.md"'
1928

29+
# Allow all read operations unconditionally
30+
[[rule]]
31+
toolName = ["read_file", "read_many_files", "glob", "grep_search", "list_directory", "search_file_content"]
32+
decision = "allow"
33+
priority = 100
34+
35+
# ── Denied tools ─────────────────────────────────────────────────────────────
36+
2037
# Deny docs-only file edits for all non-.md files
2138
[[rule]]
2239
toolName = ["write_file", "replace"]
2340
decision = "deny"
2441
priority = 90
2542
deny_message = "Autodoc safety: only .md files may be edited. Source code and config files are read-only."
2643

27-
# Allow all read operations unconditionally
28-
[[rule]]
29-
toolName = ["read_file", "read_many_files", "glob", "grep_search", "list_directory"]
30-
decision = "allow"
31-
priority = 100
32-
3344
# Deny shell access entirely for docs-only Gemini runs. The tooling already
3445
# provides the required prompt and file context, so shell access is unnecessary
3546
# and can be abused to create helper scripts or other non-Markdown files.
3647
[[rule]]
37-
toolName = ["run_shell_command"]
48+
toolName = "run_shell_command"
3849
decision = "deny"
3950
priority = 100
4051
deny_message = "Autodoc safety: shell access is disabled during docs-only Gemini runs."
52+
53+
# Deny web access — docs-only runs should not fetch external resources.
54+
[[rule]]
55+
toolName = ["web_fetch", "google_web_search"]
56+
decision = "deny"
57+
priority = 100
58+
deny_message = "Autodoc safety: web access is disabled during docs-only Gemini runs."
59+
60+
# Deny agent delegation — sub-agents could bypass the policy restrictions.
61+
[[rule]]
62+
toolName = ["codebase_investigator"]
63+
decision = "deny"
64+
priority = 100
65+
deny_message = "Autodoc safety: agent delegation is disabled during docs-only Gemini runs."
66+
67+
# Deny memory and planning tools — not needed for docs generation.
68+
[[rule]]
69+
toolName = ["save_memory", "write_todos", "enter_plan_mode"]
70+
decision = "deny"
71+
priority = 100
72+
deny_message = "Autodoc safety: memory/planning tools are disabled during docs-only Gemini runs."

.gemini/settings.json

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,13 @@
55
},
66
"tools": {
77
"core": [
8+
"read_file",
9+
"read_many_files",
10+
"write_file",
11+
"replace",
12+
"glob",
13+
"grep_search",
14+
"list_directory",
815
"run_shell_command(git)",
916
"run_shell_command(gh)",
1017
"run_shell_command(tree)",

0 commit comments

Comments
 (0)