fix(core): handle policy ALLOW for exit_plan_mode#21802
fix(core): handle policy ALLOW for exit_plan_mode#21802ruomengz merged 2 commits intogoogle-gemini:mainfrom
Conversation
When a user policy grants `decision = "allow"` for exit_plan_mode, the scheduler skips the confirmation phase entirely. This means shouldConfirmExecute is never called and approvalPayload remains null. The tool then falls through to the rejection branch and returns "Rejected (no feedback)" — even though the policy explicitly allowed it. Default approvalPayload to approved with DEFAULT mode when null, matching the behavior of the ALLOW branch in shouldConfirmExecute.
|
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request resolves a bug where explicit policy allowances for Highlights
Changelog
Activity
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request addresses a bug where exit_plan_mode would incorrectly reject execution when an ALLOW policy was in place, due to approvalPayload being null. The fix introduces a nullish coalescing operator to provide a default approval payload, ensuring the tool call proceeds as expected. The change is clear, well-commented, and effectively resolves the issue described. The implementation looks solid.
|
I've signed the CLA now |
|
@backnotprop please file an issue for this and add tests for this change, thank you for the contribution! |
Covers the case where the scheduler skips confirmation due to a policy ALLOW decision, calling execute() without shouldConfirmExecute(). Verifies the tool defaults to approved with DEFAULT mode. Fixes google-gemini#21806
ruomengz
left a comment
There was a problem hiding this comment.
Thanks for the contribution! LGTM
|
Awesome, you can probably announce a cool antigravity integration - giving cli users a better surface to review plans and automate the feedback loop to cli from that surface. |
Fixes #21806
Problem
When a user policy grants
decision = "allow"forexit_plan_mode, the scheduler correctly skips the confirmation phase. However, this meansshouldConfirmExecute()is never called, soapprovalPayloadremainsnull. The tool then falls through to the rejection branch and returns "Rejected (no feedback)" — even though the policy explicitly allowed execution.Solution
Default
approvalPayloadto{ approved: true, approvalMode: DEFAULT }whennull. This matches the existing behavior of theALLOWbranch insideshouldConfirmExecute()(line 149-157), which sets the same values when the message bus returnsALLOW.Test
Added a test that calls
execute()directly without callingshouldConfirmExecute()first, simulating the scheduler's policy ALLOW path. Verifies the tool approves with DEFAULT mode and sets the approved plan path.Use case
User policies that auto-allow
exit_plan_modeenable hook-driven plan approval workflows — e.g. routing plan review to a web UI viaBeforeToolhooks (see plannotator). Without this fix, the policyallowdecision has no effect on this tool.