Skip to content

feat(cli): implement atomic writes and safety checks for trusted folders#18406

Merged
galz10 merged 9 commits intomainfrom
galzahavi/ft/overwrite
Feb 9, 2026
Merged

feat(cli): implement atomic writes and safety checks for trusted folders#18406
galz10 merged 9 commits intomainfrom
galzahavi/ft/overwrite

Conversation

@galz10
Copy link
Copy Markdown
Collaborator

@galz10 galz10 commented Feb 5, 2026

Summary

This PR implements atomic file writing for trustedFolders.json and adds a critical safety check to prevent configuration corruption. These changes ensure that the trusted folders configuration remains consistent even in the event of a crash during a write operation or if the file was improperly loaded initially.

Details

  • Atomic Writes: Updated saveTrustedFolders to write to a unique temporary file (e.g., trustedFolders.json.tmp.<random>) and then use fs.renameSync to overwrite the target file. This ensures the update is atomic at the filesystem level.
  • Validation Safety Check: Modified LoadedTrustedFolders.setValue to throw a FatalConfigError if any errors were detected during the initial loading of the configuration. This prevents the CLI from accidentally wiping out a partially corrupted file with a "clean" but incomplete state.
  • Cleanup Logic: Added error handling in saveTrustedFolders to attempt unlinking the temporary file if the write or rename operation fails.

Related Issues

N/A

How to Validate

  1. Unit Tests:

    • Run npm test -w @google/gemini-cli -- packages/cli/src/config/trustedFolders.test.ts
    • Verify that "setValue should update the user config and save it atomically" passes.
    • Verify that "setValue should throw FatalConfigError if there were load errors" passes.
  2. Manual Verification (MacOS):

    • Trust a new folder using the CLI.
    • Verify that the trustedFolders.json file is updated correctly.

Pre-Merge Checklist

  • Updated relevant documentation and README (if needed)
  • Added/updated tests (if needed)
  • Noted breaking changes (if any)
  • Validated on required platforms/methods:
    • MacOS
      • npm run
      • npx
      • Docker
      • Podman
      • Seatbelt
    • Windows
      • npm run
      • npx
      • Docker
    • Linux
      • npm run
      • npx
      • Docker

Implements atomic file writing for `trustedFolders.json` using a temporary
file and rename operation to prevent file corruption. Also adds a safety
check to `setValue` that prevents updating the configuration if it failed
to load correctly, avoiding accidental overwrites of invalid files.

- Update `saveTrustedFolders` to write to a temp file and rename.
- Add validation check in `LoadedTrustedFolders.setValue`.
- Add unit tests for atomic writes and error handling.
@galz10 galz10 requested a review from a team as a code owner February 5, 2026 22:46
@gemini-code-assist
Copy link
Copy Markdown
Contributor

Summary of Changes

Hello @galz10, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request significantly enhances the robustness and reliability of the trustedFolders.json configuration management within the CLI. By implementing atomic write operations and a proactive safety check against corrupted configurations, it ensures that the trusted folders settings remain consistent and uncompromised, even in adverse conditions like system crashes or pre-existing file corruption.

Highlights

  • Atomic Writes for Configuration: The trustedFolders.json file now uses atomic write operations. Changes are first written to a unique temporary file, and then fs.renameSync is used to atomically replace the original file, ensuring data integrity even if a crash occurs during the write process.
  • Configuration Validation Safety Check: A critical safety check has been added to LoadedTrustedFolders.setValue. If the trustedFolders.json file was initially loaded with errors (e.g., due to corruption), any subsequent attempt to modify the configuration will now throw a FatalConfigError, preventing the CLI from overwriting a partially corrupted file with an incomplete state.
  • Temporary File Cleanup: Error handling has been improved in saveTrustedFolders to include cleanup logic. If the atomic write or rename operation fails, the temporary file created during the process will be unlinked to prevent orphaned files.
Changelog
  • packages/cli/src/config/trustedFolders.test.ts
    • Added mocks for fs.renameSync and fs.unlinkSync to support testing atomic file operations.
    • Introduced a new test case to verify that setValue performs atomic writes using temporary files and fs.renameSync.
    • Added a new test case to confirm that setValue throws a FatalConfigError when attempting to update a configuration that was loaded with errors.
  • packages/cli/src/config/trustedFolders.ts
    • Modified saveTrustedFolders to implement atomic writes: data is written to a temporary file, then fs.renameSync is used to replace the target file.
    • Added error handling within saveTrustedFolders to attempt unlinking the temporary file if the write or rename operation fails.
    • Implemented a check in LoadedTrustedFolders.setValue that throws a FatalConfigError if the configuration was loaded with existing errors, preventing updates to a potentially corrupted state.
Activity
  • The pull request introduces new features related to configuration management (feat).
  • Comprehensive unit tests have been added to cover the new atomic write and safety check functionalities.
  • The changes have been validated on MacOS, ensuring compatibility and correct behavior on this platform.
  • Relevant documentation and README files have been updated as part of the pre-merge checklist.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@gemini-cli gemini-cli bot added the status/need-issue Pull requests that need to have an associated issue. label Feb 5, 2026
Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces important improvements to the handling of the trustedFolders.json configuration file. The implementation of atomic writes using a temporary file and fs.renameSync is a solid approach to prevent file corruption during write operations. Additionally, the safety check in setValue that prevents updates when the configuration has loading errors is a crucial enhancement for data integrity. My feedback includes one suggestion to further improve the robustness of the temporary file generation, which also aligns with our import consistency rules.

@github-actions
Copy link
Copy Markdown

github-actions bot commented Feb 5, 2026

Size Change: +2.15 kB (+0.01%)

Total Size: 23.9 MB

Filename Size Change
./bundle/gemini.js 23.8 MB +2.15 kB (+0.01%)
ℹ️ View Unchanged
Filename Size
./bundle/sandbox-macos-permissive-closed.sb 1.03 kB
./bundle/sandbox-macos-permissive-open.sb 890 B
./bundle/sandbox-macos-permissive-proxied.sb 1.31 kB
./bundle/sandbox-macos-restrictive-closed.sb 3.29 kB
./bundle/sandbox-macos-restrictive-open.sb 3.36 kB
./bundle/sandbox-macos-restrictive-proxied.sb 3.56 kB

compressed-size-action

Copy link
Copy Markdown
Contributor

@jacob314 jacob314 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

#17901
is landing a dependency we should use to do these atomic writes robustly. lets go that route using a lock file which will avoid edge cases is there is contention for who is writing.

@galz10 galz10 requested a review from a team as a code owner February 6, 2026 22:31
@galz10 galz10 requested a review from jacob314 February 7, 2026 04:09
@galz10 galz10 force-pushed the galzahavi/ft/overwrite branch from 21e8712 to 1b11940 Compare February 7, 2026 05:20
@galz10 galz10 force-pushed the galzahavi/ft/overwrite branch from 1b11940 to 64e717b Compare February 7, 2026 05:31
Copy link
Copy Markdown
Contributor

@jacob314 jacob314 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@galz10 galz10 added this pull request to the merge queue Feb 9, 2026
Merged via the queue into main with commit 81ccd80 Feb 9, 2026
26 checks passed
@galz10 galz10 deleted the galzahavi/ft/overwrite branch February 9, 2026 17:31
@galz10
Copy link
Copy Markdown
Collaborator Author

galz10 commented Feb 9, 2026

/patch preview

@github-actions
Copy link
Copy Markdown

github-actions bot commented Feb 9, 2026

Patch workflow(s) dispatched successfully!

📋 Details:

  • Channels: preview
  • Commit: 81ccd80c6d94a7fe315b258e1672065629ce0d50
  • Workflows Created: 1

🔗 Track Progress:

@github-actions
Copy link
Copy Markdown

github-actions bot commented Feb 9, 2026

🚀 Patch PR Created!

📋 Patch Details:

📝 Next Steps:

  1. Review and approve the hotfix PR: #18651
  2. Once merged, the patch release will automatically trigger
  3. You'll receive updates here when the release completes

🔗 Track Progress:

@github-actions
Copy link
Copy Markdown

github-actions bot commented Feb 9, 2026

🚀 Patch Release Started!

📋 Release Details:

  • Environment: prod
  • Channel: preview → publishing to npm tag preview
  • Version: v0.28.0-preview.5
  • Hotfix PR: Merged ✅
  • Release Branch: release/v0.28.0-preview.5-pr-18406

⏳ Status: The patch release is now running. You'll receive another update when it completes.

🔗 Track Progress:

@github-actions
Copy link
Copy Markdown

github-actions bot commented Feb 9, 2026

Patch Release Failed!

📋 Details:

  • Version: 0.28.0-preview.6
  • Channel: preview
  • Error: The patch release workflow encountered an error

🔍 Next Steps:

  1. Check the workflow logs for detailed error information
  2. The maintainers have been notified via automatic issue creation
  3. You may need to retry the patch once the issue is resolved

🔗 Troubleshooting:

1 similar comment
@github-actions
Copy link
Copy Markdown

github-actions bot commented Feb 9, 2026

Patch Release Failed!

📋 Details:

  • Version: 0.28.0-preview.6
  • Channel: preview
  • Error: The patch release workflow encountered an error

🔍 Next Steps:

  1. Check the workflow logs for detailed error information
  2. The maintainers have been notified via automatic issue creation
  3. You may need to retry the patch once the issue is resolved

🔗 Troubleshooting:

@github-actions
Copy link
Copy Markdown

github-actions bot commented Feb 9, 2026

Patch Release Complete!

📦 Release Details:

🎉 Status: Your patch has been successfully released and published to npm!

📝 What's Available:

🔗 Links:

krsjenmt added a commit to krsjenmt/gemini-cli that referenced this pull request Feb 11, 2026
* Fix newline insertion bug in replace tool (google-gemini#18595)

* fix(evals): update save_memory evals and simplify tool description (google-gemini#18610)

* chore(evals): update validation_fidelity_pre_existing_errors to USUALLY_PASSES (google-gemini#18617)

* fix: shorten tool call IDs and fix duplicate tool name in truncated output filenames (google-gemini#18600)

* feat(cli): implement atomic writes and safety checks for trusted folders (google-gemini#18406)

* Remove relative docs links (google-gemini#18650)

* docs: add legacy snippets convention to GEMINI.md (google-gemini#18597)

* fix(chore): Support linting for cjs (google-gemini#18639)

Co-authored-by: Gal Zahavi <38544478+galz10@users.noreply.github.com>

* feat: move shell efficiency guidelines to tool description (google-gemini#18614)

* Added "" as default value, since getText() used to expect a string only and thus crashed when undefined...  Fixes google-gemini#18076   (google-gemini#18099)

* Allow @-includes outside of workspaces (with permission) (google-gemini#18470)

* chore: make `ask_user` header description more clear (google-gemini#18657)

* bug(core): Fix minor bug in migration logic. (google-gemini#18661)

* Harded code assist converter. (google-gemini#18656)

* refactor(core): model-dependent tool definitions (google-gemini#18563)

* feat: enable plan mode experiment in settings (google-gemini#18636)

* refactor: push isValidPath() into parsePastedPaths() (google-gemini#18664)

* fix(cli): correct 'esc to cancel' position and restore duration display (google-gemini#18534)

* feat(cli): add DevTools integration with gemini-cli-devtools (google-gemini#18648)

* chore: remove unused exports and redundant hook files (google-gemini#18681)

* Fix number of lines being reported in rewind confirmation dialog (google-gemini#18675)

* feat(cli): disable folder trust in headless mode (google-gemini#18407)

* Disallow unsafe type assertions (google-gemini#18688)

* Change event type for release (google-gemini#18693)

* feat: handle multiple dynamic context filenames in system prompt (google-gemini#18598)

* Properly parse at-commands with narrow non-breaking spaces (google-gemini#18677)

* refactor(core): centralize core tool definitions and support model-specific schemas (google-gemini#18662)

* feat(core): Render memory hierarchically in context. (google-gemini#18350)

* feat: Ctrl+O to expand paste placeholder (google-gemini#18103)

* fix(cli): Improve header spacing (google-gemini#18531)

* Feature/quota visibility 16795 (google-gemini#18203)

* docs: remove TOC marker from Plan Mode header (google-gemini#18678)

* Inline thinking bubbles with summary/full modes (google-gemini#18033)

Co-authored-by: Jacob Richman <jacob314@gmail.com>

* fix(ui): remove redundant newlines in Gemini messages (google-gemini#18538)

* test(cli): fix AppContainer act() warnings and improve waitFor resilience (google-gemini#18676)

* refactor(core): refine Security & System Integrity section in system prompt (google-gemini#18601)

* Fix layout rounding. (google-gemini#18667)

* docs(skills): enhance pr-creator safety and interactivity (google-gemini#18616)

* test(core): remove hardcoded model from TestRig (google-gemini#18710)

* feat(core): optimize sub-agents system prompt intro (google-gemini#18608)

* feat(cli): update approval mode labels and shortcuts per latest UX spec (google-gemini#18698)

* fix(plan): update persistent approval mode setting (google-gemini#18638)

Co-authored-by: Sandy Tao <sandytao520@icloud.com>

* fix: move toasts location to left side (google-gemini#18705)

* feat(routing): restrict numerical routing to Gemini 3 family (google-gemini#18478)

* fix(ide): fix ide nudge setting (google-gemini#18733)

* fix(core): standardize tool formatting in system prompts (google-gemini#18615)

* chore: consolidate to green in ask user dialog (google-gemini#18734)

* feat: add `extensionsExplore` setting to enable extensions explore UI. (google-gemini#18686)

* feat(cli): defer devtools startup and integrate with F12 (google-gemini#18695)

* ui: update & subdue footer colors and animate progress indicator (google-gemini#18570)

* test: add model-specific snapshots for coreTools (google-gemini#18707)

Co-authored-by: matt korwel <matt.korwel@gmail.com>

* ci: shard windows tests and fix event listener leaks (google-gemini#18670)

* fix: allow `ask_user` tool in yolo mode (google-gemini#18541)

* feat: redact disabled tools from system prompt (google-gemini#13597) (google-gemini#18613)

* Update Gemini.md to use the curent year on creating new files (google-gemini#18460)

* Code review cleanup for thinking display (google-gemini#18720)

* fix(cli): hide scrollbars when in alternate buffer copy mode (google-gemini#18354)

Co-authored-by: Jacob Richman <jacob314@gmail.com>

* Fix issues with rip grep (google-gemini#18756)

* fix(cli): fix history navigation regression after prompt autocomplete (google-gemini#18752)

* chore: cleanup unused and add unlisted dependencies in packages/cli (google-gemini#18749)

* Fix issue where Gemini CLI creates tests in a new file (google-gemini#18409)

* feat(telemetry): Ensure experiment IDs are included in OpenTelemetry logs (google-gemini#18747)

* feat(ux): added text wrapping capabilities to markdown tables (google-gemini#18240)

Co-authored-by: jacob314 <jacob314@gmail.com>

* Revert "fix(mcp): ensure MCP transport is closed to prevent memory leaks" (google-gemini#18771)

* chore(release): bump version to 0.30.0-nightly.20260210.a2174751d (google-gemini#18772)

* chore: cleanup unused and add unlisted dependencies in packages/core (google-gemini#18762)

* chore(core): update activate_skill prompt verbiage to be more direct (google-gemini#18605)

* Add autoconfigure memory usage setting to the dialog (google-gemini#18510)

Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>

* fix(core): prevent race condition in policy persistence (google-gemini#18506)

Co-authored-by: Allen Hutchison <adh@google.com>

* fix(evals): prevent false positive in hierarchical memory test (google-gemini#18777)

* test(evals): mark all `save_memory` evals as `USUALLY_PASSES` due to unreliability (google-gemini#18786)

* feat(cli): add setting to hide shortcuts hint UI (google-gemini#18562)

* feat(core): formalize 5-phase sequential planning workflow (google-gemini#18759)

* Introduce limits for search results. (google-gemini#18767)

---------

Co-authored-by: Andrew Garrett <andrewgarrett@google.com>
Co-authored-by: N. Taylor Mullen <ntaylormullen@google.com>
Co-authored-by: Sandy Tao <sandytao520@icloud.com>
Co-authored-by: Gal Zahavi <38544478+galz10@users.noreply.github.com>
Co-authored-by: christine betts <chrstn@uw.edu>
Co-authored-by: Aswin Ashok <aswwwin@google.com>
Co-authored-by: Abhijith V Ashok <abhi2349jith@gmail.com>
Co-authored-by: Tommaso Sciortino <sciortino@gmail.com>
Co-authored-by: Jack Wotherspoon <jackwoth@google.com>
Co-authored-by: joshualitt <joshualitt@google.com>
Co-authored-by: Jacob Richman <jacob314@gmail.com>
Co-authored-by: Aishanee Shah <aishaneeshah@gmail.com>
Co-authored-by: Jerop Kipruto <jerop@google.com>
Co-authored-by: Adib234 <30782825+Adib234@users.noreply.github.com>
Co-authored-by: Christian Gunderman <gundermanc@gmail.com>
Co-authored-by: g-samroberts <158088236+g-samroberts@users.noreply.github.com>
Co-authored-by: Spencer <spencertang@google.com>
Co-authored-by: Dmitry Lyalin <dmitry.lyalin@lyalin.com>
Co-authored-by: matt korwel <matt.korwel@gmail.com>
Co-authored-by: Shreya Keshive <shreyakeshive@google.com>
Co-authored-by: Sri Pasumarthi <111310667+sripasg@users.noreply.github.com>
Co-authored-by: Keith Guerin <keithguerin@gmail.com>
Co-authored-by: Sehoon Shon <sshon@google.com>
Co-authored-by: Adam Weidman <65992621+adamfweidman@users.noreply.github.com>
Co-authored-by: Kevin Ramdass <ramdass.kevin@gmail.com>
Co-authored-by: Dev Randalpura <devrandalpura@google.com>
Co-authored-by: gemini-cli-robot <gemini-cli-robot@google.com>
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Co-authored-by: Brad Dux <959674+braddux@users.noreply.github.com>
Co-authored-by: Allen Hutchison <adh@google.com>
Co-authored-by: Abhijit Balaji <abhijitbalaji@google.com>
kuishou68 pushed a commit to iOfficeAI/aioncli that referenced this pull request Feb 27, 2026
liamhelmer pushed a commit to badal-io/gemini-cli that referenced this pull request Mar 12, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

status/need-issue Pull requests that need to have an associated issue.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants