load.go

  1package config
  2
  3import (
  4	"context"
  5	"encoding/json"
  6	"fmt"
  7	"io"
  8	"log/slog"
  9	"maps"
 10	"os"
 11	"os/exec"
 12	"path/filepath"
 13	"runtime"
 14	"slices"
 15	"strconv"
 16	"strings"
 17
 18	"github.com/charmbracelet/catwalk/pkg/catwalk"
 19	"github.com/charmbracelet/crush/internal/csync"
 20	"github.com/charmbracelet/crush/internal/env"
 21	"github.com/charmbracelet/crush/internal/fsext"
 22	"github.com/charmbracelet/crush/internal/home"
 23	"github.com/charmbracelet/crush/internal/log"
 24	powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
 25)
 26
 27const defaultCatwalkURL = "https://catwalk.charm.sh"
 28
 29// LoadReader config via io.Reader.
 30func LoadReader(fd io.Reader) (*Config, error) {
 31	data, err := io.ReadAll(fd)
 32	if err != nil {
 33		return nil, err
 34	}
 35
 36	var config Config
 37	err = json.Unmarshal(data, &config)
 38	if err != nil {
 39		return nil, err
 40	}
 41	return &config, err
 42}
 43
 44// Load loads the configuration from the default paths.
 45func Load(workingDir, dataDir string, debug bool) (*Config, error) {
 46	configPaths := lookupConfigs(workingDir)
 47
 48	cfg, err := loadFromConfigPaths(configPaths)
 49	if err != nil {
 50		return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
 51	}
 52
 53	cfg.dataConfigDir = GlobalConfigData()
 54
 55	cfg.setDefaults(workingDir, dataDir)
 56
 57	if debug {
 58		cfg.Options.Debug = true
 59	}
 60
 61	// Setup logs
 62	log.Setup(
 63		filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
 64		cfg.Options.Debug,
 65	)
 66
 67	if !isInsideWorktree() {
 68		const depth = 2
 69		const items = 100
 70		slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
 71		assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
 72		assignIfNil(&cfg.Tools.Ls.MaxItems, items)
 73		assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
 74		assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
 75	}
 76
 77	if isSSH() {
 78		slog.Warn("Running over SSH, will enable reduce animations")
 79		assignIfNil(&cfg.Options.TUI.ReduceAnimations, true)
 80	}
 81	if b, _ := strconv.ParseBool(os.Getenv("CRUSH_REDUCE_ANIMATIONS")); b {
 82		assignIfNil(&cfg.Options.TUI.ReduceAnimations, true)
 83	}
 84
 85	// Load known providers, this loads the config from catwalk
 86	providers, err := Providers(cfg)
 87	if err != nil {
 88		return nil, err
 89	}
 90	cfg.knownProviders = providers
 91
 92	env := env.New()
 93	// Configure providers
 94	valueResolver := NewShellVariableResolver(env)
 95	cfg.resolver = valueResolver
 96	if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
 97		return nil, fmt.Errorf("failed to configure providers: %w", err)
 98	}
 99
100	if !cfg.IsConfigured() {
101		slog.Warn("No providers configured")
102		return cfg, nil
103	}
104
105	if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
106		return nil, fmt.Errorf("failed to configure selected models: %w", err)
107	}
108	cfg.SetupAgents()
109	return cfg, nil
110}
111
112func PushPopCrushEnv() func() {
113	found := []string{}
114	for _, ev := range os.Environ() {
115		if strings.HasPrefix(ev, "CRUSH_") {
116			pair := strings.SplitN(ev, "=", 2)
117			if len(pair) != 2 {
118				continue
119			}
120			found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
121		}
122	}
123	backups := make(map[string]string)
124	for _, ev := range found {
125		backups[ev] = os.Getenv(ev)
126	}
127
128	for _, ev := range found {
129		os.Setenv(ev, os.Getenv("CRUSH_"+ev))
130	}
131
132	restore := func() {
133		for k, v := range backups {
134			os.Setenv(k, v)
135		}
136	}
137	return restore
138}
139
140func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
141	knownProviderNames := make(map[string]bool)
142	restore := PushPopCrushEnv()
143	defer restore()
144	for _, p := range knownProviders {
145		knownProviderNames[string(p.ID)] = true
146		config, configExists := c.Providers.Get(string(p.ID))
147		// if the user configured a known provider we need to allow it to override a couple of parameters
148		if configExists {
149			if config.BaseURL != "" {
150				p.APIEndpoint = config.BaseURL
151			}
152			if config.APIKey != "" {
153				p.APIKey = config.APIKey
154			}
155			if len(config.Models) > 0 {
156				models := []catwalk.Model{}
157				seen := make(map[string]bool)
158
159				for _, model := range config.Models {
160					if seen[model.ID] {
161						continue
162					}
163					seen[model.ID] = true
164					if model.Name == "" {
165						model.Name = model.ID
166					}
167					models = append(models, model)
168				}
169				for _, model := range p.Models {
170					if seen[model.ID] {
171						continue
172					}
173					seen[model.ID] = true
174					if model.Name == "" {
175						model.Name = model.ID
176					}
177					models = append(models, model)
178				}
179
180				p.Models = models
181			}
182		}
183
184		headers := map[string]string{}
185		if len(p.DefaultHeaders) > 0 {
186			maps.Copy(headers, p.DefaultHeaders)
187		}
188		if len(config.ExtraHeaders) > 0 {
189			maps.Copy(headers, config.ExtraHeaders)
190		}
191		prepared := ProviderConfig{
192			ID:                 string(p.ID),
193			Name:               p.Name,
194			BaseURL:            p.APIEndpoint,
195			APIKey:             p.APIKey,
196			Type:               p.Type,
197			Disable:            config.Disable,
198			SystemPromptPrefix: config.SystemPromptPrefix,
199			ExtraHeaders:       headers,
200			ExtraBody:          config.ExtraBody,
201			ExtraParams:        make(map[string]string),
202			Models:             p.Models,
203		}
204
205		switch p.ID {
206		// Handle specific providers that require additional configuration
207		case catwalk.InferenceProviderVertexAI:
208			if !hasVertexCredentials(env) {
209				if configExists {
210					slog.Warn("Skipping Vertex AI provider due to missing credentials")
211					c.Providers.Del(string(p.ID))
212				}
213				continue
214			}
215			prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
216			prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
217		case catwalk.InferenceProviderAzure:
218			endpoint, err := resolver.ResolveValue(p.APIEndpoint)
219			if err != nil || endpoint == "" {
220				if configExists {
221					slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
222					c.Providers.Del(string(p.ID))
223				}
224				continue
225			}
226			prepared.BaseURL = endpoint
227			prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
228		case catwalk.InferenceProviderBedrock:
229			if !hasAWSCredentials(env) {
230				if configExists {
231					slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
232					c.Providers.Del(string(p.ID))
233				}
234				continue
235			}
236			prepared.ExtraParams["region"] = env.Get("AWS_REGION")
237			if prepared.ExtraParams["region"] == "" {
238				prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
239			}
240			for _, model := range p.Models {
241				if !strings.HasPrefix(model.ID, "anthropic.") {
242					return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
243				}
244			}
245		default:
246			// if the provider api or endpoint are missing we skip them
247			v, err := resolver.ResolveValue(p.APIKey)
248			if v == "" || err != nil {
249				if configExists {
250					slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
251					c.Providers.Del(string(p.ID))
252				}
253				continue
254			}
255		}
256		c.Providers.Set(string(p.ID), prepared)
257	}
258
259	// validate the custom providers
260	for id, providerConfig := range c.Providers.Seq2() {
261		if knownProviderNames[id] {
262			continue
263		}
264
265		// Make sure the provider ID is set
266		providerConfig.ID = id
267		if providerConfig.Name == "" {
268			providerConfig.Name = id // Use ID as name if not set
269		}
270		// default to OpenAI if not set
271		if providerConfig.Type == "" {
272			providerConfig.Type = catwalk.TypeOpenAICompat
273		}
274		if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
275			slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
276			c.Providers.Del(id)
277			continue
278		}
279
280		if providerConfig.Disable {
281			slog.Debug("Skipping custom provider due to disable flag", "provider", id)
282			c.Providers.Del(id)
283			continue
284		}
285		if providerConfig.APIKey == "" {
286			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
287		}
288		if providerConfig.BaseURL == "" {
289			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
290			c.Providers.Del(id)
291			continue
292		}
293		if len(providerConfig.Models) == 0 {
294			slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
295			c.Providers.Del(id)
296			continue
297		}
298		apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
299		if apiKey == "" || err != nil {
300			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
301		}
302		baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
303		if baseURL == "" || err != nil {
304			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
305			c.Providers.Del(id)
306			continue
307		}
308
309		c.Providers.Set(id, providerConfig)
310	}
311	return nil
312}
313
314func (c *Config) setDefaults(workingDir, dataDir string) {
315	c.workingDir = workingDir
316	if c.Options == nil {
317		c.Options = &Options{}
318	}
319	if c.Options.TUI == nil {
320		c.Options.TUI = &TUIOptions{}
321	}
322	if c.Options.ContextPaths == nil {
323		c.Options.ContextPaths = []string{}
324	}
325	if dataDir != "" {
326		c.Options.DataDirectory = dataDir
327	} else if c.Options.DataDirectory == "" {
328		if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
329			c.Options.DataDirectory = path
330		} else {
331			c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
332		}
333	}
334	if c.Providers == nil {
335		c.Providers = csync.NewMap[string, ProviderConfig]()
336	}
337	if c.Models == nil {
338		c.Models = make(map[SelectedModelType]SelectedModel)
339	}
340	if c.MCP == nil {
341		c.MCP = make(map[string]MCPConfig)
342	}
343	if c.LSP == nil {
344		c.LSP = make(map[string]LSPConfig)
345	}
346
347	// Apply defaults to LSP configurations
348	c.applyLSPDefaults()
349
350	// Add the default context paths if they are not already present
351	c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
352	slices.Sort(c.Options.ContextPaths)
353	c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
354
355	if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
356		c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
357	}
358
359	if c.Options.Attribution == nil {
360		c.Options.Attribution = &Attribution{
361			CoAuthoredBy:  true,
362			GeneratedWith: true,
363		}
364	}
365}
366
367// applyLSPDefaults applies default values from powernap to LSP configurations
368func (c *Config) applyLSPDefaults() {
369	// Get powernap's default configuration
370	configManager := powernapConfig.NewManager()
371	configManager.LoadDefaults()
372
373	// Apply defaults to each LSP configuration
374	for name, cfg := range c.LSP {
375		// Try to get defaults from powernap based on name or command name.
376		base, ok := configManager.GetServer(name)
377		if !ok {
378			base, ok = configManager.GetServer(cfg.Command)
379			if !ok {
380				continue
381			}
382		}
383		if cfg.Options == nil {
384			cfg.Options = base.Settings
385		}
386		if cfg.InitOptions == nil {
387			cfg.InitOptions = base.InitOptions
388		}
389		if len(cfg.FileTypes) == 0 {
390			cfg.FileTypes = base.FileTypes
391		}
392		if len(cfg.RootMarkers) == 0 {
393			cfg.RootMarkers = base.RootMarkers
394		}
395		if cfg.Command == "" {
396			cfg.Command = base.Command
397		}
398		if len(cfg.Args) == 0 {
399			cfg.Args = base.Args
400		}
401		if len(cfg.Env) == 0 {
402			cfg.Env = base.Environment
403		}
404		// Update the config in the map
405		c.LSP[name] = cfg
406	}
407}
408
409func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
410	if len(knownProviders) == 0 && c.Providers.Len() == 0 {
411		err = fmt.Errorf("no providers configured, please configure at least one provider")
412		return largeModel, smallModel, err
413	}
414
415	// Use the first provider enabled based on the known providers order
416	// if no provider found that is known use the first provider configured
417	for _, p := range knownProviders {
418		providerConfig, ok := c.Providers.Get(string(p.ID))
419		if !ok || providerConfig.Disable {
420			continue
421		}
422		defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
423		if defaultLargeModel == nil {
424			err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
425			return largeModel, smallModel, err
426		}
427		largeModel = SelectedModel{
428			Provider:        string(p.ID),
429			Model:           defaultLargeModel.ID,
430			MaxTokens:       defaultLargeModel.DefaultMaxTokens,
431			ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
432		}
433
434		defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
435		if defaultSmallModel == nil {
436			err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
437			return largeModel, smallModel, err
438		}
439		smallModel = SelectedModel{
440			Provider:        string(p.ID),
441			Model:           defaultSmallModel.ID,
442			MaxTokens:       defaultSmallModel.DefaultMaxTokens,
443			ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
444		}
445		return largeModel, smallModel, err
446	}
447
448	enabledProviders := c.EnabledProviders()
449	slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
450		return strings.Compare(a.ID, b.ID)
451	})
452
453	if len(enabledProviders) == 0 {
454		err = fmt.Errorf("no providers configured, please configure at least one provider")
455		return largeModel, smallModel, err
456	}
457
458	providerConfig := enabledProviders[0]
459	if len(providerConfig.Models) == 0 {
460		err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
461		return largeModel, smallModel, err
462	}
463	defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
464	largeModel = SelectedModel{
465		Provider:  providerConfig.ID,
466		Model:     defaultLargeModel.ID,
467		MaxTokens: defaultLargeModel.DefaultMaxTokens,
468	}
469	defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
470	smallModel = SelectedModel{
471		Provider:  providerConfig.ID,
472		Model:     defaultSmallModel.ID,
473		MaxTokens: defaultSmallModel.DefaultMaxTokens,
474	}
475	return largeModel, smallModel, err
476}
477
478func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
479	defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
480	if err != nil {
481		return fmt.Errorf("failed to select default models: %w", err)
482	}
483	large, small := defaultLarge, defaultSmall
484
485	largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
486	if largeModelConfigured {
487		if largeModelSelected.Model != "" {
488			large.Model = largeModelSelected.Model
489		}
490		if largeModelSelected.Provider != "" {
491			large.Provider = largeModelSelected.Provider
492		}
493		model := c.GetModel(large.Provider, large.Model)
494		if model == nil {
495			large = defaultLarge
496			// override the model type to large
497			err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
498			if err != nil {
499				return fmt.Errorf("failed to update preferred large model: %w", err)
500			}
501		} else {
502			if largeModelSelected.MaxTokens > 0 {
503				large.MaxTokens = largeModelSelected.MaxTokens
504			} else {
505				large.MaxTokens = model.DefaultMaxTokens
506			}
507			if largeModelSelected.ReasoningEffort != "" {
508				large.ReasoningEffort = largeModelSelected.ReasoningEffort
509			}
510			large.Think = largeModelSelected.Think
511			if largeModelSelected.Temperature != nil {
512				large.Temperature = largeModelSelected.Temperature
513			}
514			if largeModelSelected.TopP != nil {
515				large.TopP = largeModelSelected.TopP
516			}
517			if largeModelSelected.TopK != nil {
518				large.TopK = largeModelSelected.TopK
519			}
520			if largeModelSelected.FrequencyPenalty != nil {
521				large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
522			}
523			if largeModelSelected.PresencePenalty != nil {
524				large.PresencePenalty = largeModelSelected.PresencePenalty
525			}
526		}
527	}
528	smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
529	if smallModelConfigured {
530		if smallModelSelected.Model != "" {
531			small.Model = smallModelSelected.Model
532		}
533		if smallModelSelected.Provider != "" {
534			small.Provider = smallModelSelected.Provider
535		}
536
537		model := c.GetModel(small.Provider, small.Model)
538		if model == nil {
539			small = defaultSmall
540			// override the model type to small
541			err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
542			if err != nil {
543				return fmt.Errorf("failed to update preferred small model: %w", err)
544			}
545		} else {
546			if smallModelSelected.MaxTokens > 0 {
547				small.MaxTokens = smallModelSelected.MaxTokens
548			} else {
549				small.MaxTokens = model.DefaultMaxTokens
550			}
551			if smallModelSelected.ReasoningEffort != "" {
552				small.ReasoningEffort = smallModelSelected.ReasoningEffort
553			}
554			if smallModelSelected.Temperature != nil {
555				small.Temperature = smallModelSelected.Temperature
556			}
557			if smallModelSelected.TopP != nil {
558				small.TopP = smallModelSelected.TopP
559			}
560			if smallModelSelected.TopK != nil {
561				small.TopK = smallModelSelected.TopK
562			}
563			if smallModelSelected.FrequencyPenalty != nil {
564				small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
565			}
566			if smallModelSelected.PresencePenalty != nil {
567				small.PresencePenalty = smallModelSelected.PresencePenalty
568			}
569			small.Think = smallModelSelected.Think
570		}
571	}
572	c.Models[SelectedModelTypeLarge] = large
573	c.Models[SelectedModelTypeSmall] = small
574	return nil
575}
576
577// lookupConfigs searches config files recursively from CWD up to FS root
578func lookupConfigs(cwd string) []string {
579	// prepend default config paths
580	configPaths := []string{
581		GlobalConfig(),
582		GlobalConfigData(),
583	}
584
585	configNames := []string{appName + ".json", "." + appName + ".json"}
586
587	foundConfigs, err := fsext.Lookup(cwd, configNames...)
588	if err != nil {
589		// returns at least default configs
590		return configPaths
591	}
592
593	// reverse order so last config has more priority
594	slices.Reverse(foundConfigs)
595
596	return append(configPaths, foundConfigs...)
597}
598
599func loadFromConfigPaths(configPaths []string) (*Config, error) {
600	var configs []io.Reader
601
602	for _, path := range configPaths {
603		fd, err := os.Open(path)
604		if err != nil {
605			if os.IsNotExist(err) {
606				continue
607			}
608			return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
609		}
610		defer fd.Close()
611
612		configs = append(configs, fd)
613	}
614
615	return loadFromReaders(configs)
616}
617
618func loadFromReaders(readers []io.Reader) (*Config, error) {
619	if len(readers) == 0 {
620		return &Config{}, nil
621	}
622
623	merged, err := Merge(readers)
624	if err != nil {
625		return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
626	}
627
628	return LoadReader(merged)
629}
630
631func hasVertexCredentials(env env.Env) bool {
632	hasProject := env.Get("VERTEXAI_PROJECT") != ""
633	hasLocation := env.Get("VERTEXAI_LOCATION") != ""
634	return hasProject && hasLocation
635}
636
637func hasAWSCredentials(env env.Env) bool {
638	if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
639		return true
640	}
641
642	if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
643		return true
644	}
645
646	if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
647		return true
648	}
649
650	if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
651		return true
652	}
653
654	if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
655		env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
656		return true
657	}
658
659	if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil {
660		return true
661	}
662
663	return false
664}
665
666// GlobalConfig returns the global configuration file path for the application.
667func GlobalConfig() string {
668	xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
669	if xdgConfigHome != "" {
670		return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
671	}
672
673	return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
674}
675
676// GlobalConfigData returns the path to the main data directory for the application.
677// this config is used when the app overrides configurations instead of updating the global config.
678func GlobalConfigData() string {
679	xdgDataHome := os.Getenv("XDG_DATA_HOME")
680	if xdgDataHome != "" {
681		return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
682	}
683
684	// return the path to the main data directory
685	// for windows, it should be in `%LOCALAPPDATA%/crush/`
686	// for linux and macOS, it should be in `$HOME/.local/share/crush/`
687	if runtime.GOOS == "windows" {
688		localAppData := os.Getenv("LOCALAPPDATA")
689		if localAppData == "" {
690			localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
691		}
692		return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
693	}
694
695	return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
696}
697
698func assignIfNil[T any](ptr **T, val T) {
699	if *ptr == nil {
700		*ptr = &val
701	}
702}
703
704func isInsideWorktree() bool {
705	bts, err := exec.CommandContext(
706		context.Background(),
707		"git", "rev-parse",
708		"--is-inside-work-tree",
709	).CombinedOutput()
710	return err == nil && strings.TrimSpace(string(bts)) == "true"
711}
712
713func isSSH() bool { return os.Getenv("SSH_TTY") != "" }