docs: remove references to deprecated flags (--checkpointing, --sandbox-image) (#12578)

Co-authored-by: Jack Wotherspoon <jackwoth@google.com>
This commit is contained in:
YongSung Na
2025-11-15 00:28:14 +09:00
committed by GitHub
parent 638dd2f6c0
commit a591505bf9
3 changed files with 6 additions and 21 deletions

View File

@@ -37,22 +37,8 @@ file in your project's temporary directory, typically located at
## Enabling the Feature
The Checkpointing feature is disabled by default. To enable it, you can either
use a command-line flag or edit your `settings.json` file.
### Using the Command-Line Flag
You can enable checkpointing for the current session by using the
`--checkpointing` flag when starting the Gemini CLI:
```bash
gemini --checkpointing
```
### Using the `settings.json` File
To enable checkpointing by default for all sessions, you need to edit your
`settings.json` file.
The Checkpointing feature is disabled by default. To enable it, you need to edit
your `settings.json` file.
Add the following key to your `settings.json`:

View File

@@ -154,8 +154,8 @@ Slash commands provide meta-level control over the CLI itself.
edits made by a tool. If run without a tool call ID, it will list available
checkpoints to restore from.
- **Usage:** `/restore [tool_call_id]`
- **Note:** Only available if the CLI is invoked with the `--checkpointing`
option or configured via [settings](../get-started/configuration.md). See
- **Note:** Only available if configured via
[settings](../get-started/configuration.md). See
[Checkpointing documentation](../cli/checkpointing.md) for more details.
- **`/settings`**

View File

@@ -363,9 +363,8 @@ containerized environment.
}
```
You can also specify a custom, hardened Docker image for the sandbox using the
`--sandbox-image` command-line argument or by building a custom
`sandbox.Dockerfile` as described in the
You can also specify a custom, hardened Docker image for the sandbox by building
a custom `sandbox.Dockerfile` as described in the
[Sandboxing documentation](./sandbox.md).
## Controlling Network Access via Proxy