1package config
2
3import (
4 "cmp"
5 "context"
6 "encoding/json"
7 "fmt"
8 "io"
9 "log/slog"
10 "maps"
11 "os"
12 "os/exec"
13 "path/filepath"
14 "runtime"
15 "slices"
16 "strconv"
17 "strings"
18 "testing"
19
20 "github.com/charmbracelet/catwalk/pkg/catwalk"
21 "github.com/charmbracelet/crush/internal/agent/hyper"
22 "github.com/charmbracelet/crush/internal/csync"
23 "github.com/charmbracelet/crush/internal/env"
24 "github.com/charmbracelet/crush/internal/fsext"
25 "github.com/charmbracelet/crush/internal/home"
26 "github.com/charmbracelet/crush/internal/log"
27 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
28)
29
30const defaultCatwalkURL = "https://catwalk.charm.sh"
31
32// LoadReader config via io.Reader.
33func LoadReader(fd io.Reader) (*Config, error) {
34 data, err := io.ReadAll(fd)
35 if err != nil {
36 return nil, err
37 }
38
39 var config Config
40 err = json.Unmarshal(data, &config)
41 if err != nil {
42 return nil, err
43 }
44 return &config, err
45}
46
47// Load loads the configuration from the default paths.
48func Load(workingDir, dataDir string, debug bool) (*Config, error) {
49 configPaths := lookupConfigs(workingDir)
50
51 cfg, err := loadFromConfigPaths(configPaths)
52 if err != nil {
53 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
54 }
55
56 cfg.dataConfigDir = GlobalConfigData()
57
58 cfg.setDefaults(workingDir, dataDir)
59
60 if debug {
61 cfg.Options.Debug = true
62 }
63
64 // Setup logs
65 log.Setup(
66 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
67 cfg.Options.Debug,
68 )
69
70 if !isInsideWorktree() {
71 const depth = 2
72 const items = 100
73 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
74 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
75 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
76 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
77 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
78 }
79
80 // Load known providers, this loads the config from catwalk
81 providers, err := Providers(cfg)
82 if err != nil {
83 return nil, err
84 }
85 cfg.knownProviders = providers
86
87 env := env.New()
88 // Configure providers
89 valueResolver := NewShellVariableResolver(env)
90 cfg.resolver = valueResolver
91 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
92 return nil, fmt.Errorf("failed to configure providers: %w", err)
93 }
94
95 if !cfg.IsConfigured() {
96 slog.Warn("No providers configured")
97 return cfg, nil
98 }
99
100 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
101 return nil, fmt.Errorf("failed to configure selected models: %w", err)
102 }
103 cfg.SetupAgents()
104 return cfg, nil
105}
106
107func PushPopCrushEnv() func() {
108 found := []string{}
109 for _, ev := range os.Environ() {
110 if strings.HasPrefix(ev, "CRUSH_") {
111 pair := strings.SplitN(ev, "=", 2)
112 if len(pair) != 2 {
113 continue
114 }
115 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
116 }
117 }
118 backups := make(map[string]string)
119 for _, ev := range found {
120 backups[ev] = os.Getenv(ev)
121 }
122
123 for _, ev := range found {
124 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
125 }
126
127 restore := func() {
128 for k, v := range backups {
129 os.Setenv(k, v)
130 }
131 }
132 return restore
133}
134
135func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
136 c.importCopilot()
137
138 knownProviderNames := make(map[string]bool)
139 restore := PushPopCrushEnv()
140 defer restore()
141
142 for _, p := range knownProviders {
143 knownProviderNames[string(p.ID)] = true
144 config, configExists := c.Providers.Get(string(p.ID))
145 // if the user configured a known provider we need to allow it to override a couple of parameters
146 if configExists {
147 if config.BaseURL != "" {
148 p.APIEndpoint = config.BaseURL
149 }
150 if config.APIKey != "" {
151 p.APIKey = config.APIKey
152 }
153 if len(config.Models) > 0 {
154 models := []catwalk.Model{}
155 seen := make(map[string]bool)
156
157 for _, model := range config.Models {
158 if seen[model.ID] {
159 continue
160 }
161 seen[model.ID] = true
162 if model.Name == "" {
163 model.Name = model.ID
164 }
165 models = append(models, model)
166 }
167 for _, model := range p.Models {
168 if seen[model.ID] {
169 continue
170 }
171 seen[model.ID] = true
172 if model.Name == "" {
173 model.Name = model.ID
174 }
175 models = append(models, model)
176 }
177
178 p.Models = models
179 }
180 }
181
182 headers := map[string]string{}
183 if len(p.DefaultHeaders) > 0 {
184 maps.Copy(headers, p.DefaultHeaders)
185 }
186 if len(config.ExtraHeaders) > 0 {
187 maps.Copy(headers, config.ExtraHeaders)
188 }
189 prepared := ProviderConfig{
190 ID: string(p.ID),
191 Name: p.Name,
192 BaseURL: p.APIEndpoint,
193 APIKey: p.APIKey,
194 APIKeyTemplate: p.APIKey, // Store original template for re-resolution
195 OAuthToken: config.OAuthToken,
196 Type: p.Type,
197 Disable: config.Disable,
198 SystemPromptPrefix: config.SystemPromptPrefix,
199 ExtraHeaders: headers,
200 ExtraBody: config.ExtraBody,
201 ExtraParams: make(map[string]string),
202 Models: p.Models,
203 }
204
205 switch {
206 case p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil:
207 prepared.SetupClaudeCode()
208 case p.ID == catwalk.InferenceProviderCopilot:
209 if config.OAuthToken != nil {
210 if token, ok := c.importCopilot(); ok {
211 prepared.OAuthToken = token
212 }
213 }
214 if config.OAuthToken != nil {
215 prepared.SetupGitHubCopilot()
216 }
217 }
218
219 switch p.ID {
220 // Handle specific providers that require additional configuration
221 case catwalk.InferenceProviderVertexAI:
222 if !hasVertexCredentials(env) {
223 if configExists {
224 slog.Warn("Skipping Vertex AI provider due to missing credentials")
225 c.Providers.Del(string(p.ID))
226 }
227 continue
228 }
229 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
230 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
231 case catwalk.InferenceProviderAzure:
232 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
233 if err != nil || endpoint == "" {
234 if configExists {
235 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
236 c.Providers.Del(string(p.ID))
237 }
238 continue
239 }
240 prepared.BaseURL = endpoint
241 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
242 case catwalk.InferenceProviderBedrock:
243 if !hasAWSCredentials(env) {
244 if configExists {
245 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
246 c.Providers.Del(string(p.ID))
247 }
248 continue
249 }
250 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
251 if prepared.ExtraParams["region"] == "" {
252 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
253 }
254 for _, model := range p.Models {
255 if !strings.HasPrefix(model.ID, "anthropic.") {
256 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
257 }
258 }
259 default:
260 // if the provider api or endpoint are missing we skip them
261 v, err := resolver.ResolveValue(p.APIKey)
262 if v == "" || err != nil {
263 if configExists {
264 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
265 c.Providers.Del(string(p.ID))
266 }
267 continue
268 }
269 }
270 c.Providers.Set(string(p.ID), prepared)
271 }
272
273 // validate the custom providers
274 for id, providerConfig := range c.Providers.Seq2() {
275 if knownProviderNames[id] {
276 continue
277 }
278
279 // Make sure the provider ID is set
280 providerConfig.ID = id
281 if providerConfig.Name == "" {
282 providerConfig.Name = id // Use ID as name if not set
283 }
284 // default to OpenAI if not set
285 if providerConfig.Type == "" {
286 providerConfig.Type = catwalk.TypeOpenAICompat
287 }
288 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) && providerConfig.Type != hyper.Name {
289 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
290 c.Providers.Del(id)
291 continue
292 }
293
294 if providerConfig.Disable {
295 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
296 c.Providers.Del(id)
297 continue
298 }
299 if providerConfig.APIKey == "" {
300 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
301 }
302 if providerConfig.BaseURL == "" {
303 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
304 c.Providers.Del(id)
305 continue
306 }
307 if len(providerConfig.Models) == 0 {
308 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
309 c.Providers.Del(id)
310 continue
311 }
312 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
313 if apiKey == "" || err != nil {
314 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
315 }
316 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
317 if baseURL == "" || err != nil {
318 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
319 c.Providers.Del(id)
320 continue
321 }
322
323 c.Providers.Set(id, providerConfig)
324 }
325 return nil
326}
327
328func (c *Config) setDefaults(workingDir, dataDir string) {
329 c.workingDir = workingDir
330 if c.Options == nil {
331 c.Options = &Options{}
332 }
333 if c.Options.TUI == nil {
334 c.Options.TUI = &TUIOptions{}
335 }
336 if c.Options.ContextPaths == nil {
337 c.Options.ContextPaths = []string{}
338 }
339 if dataDir != "" {
340 c.Options.DataDirectory = dataDir
341 } else if c.Options.DataDirectory == "" {
342 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
343 c.Options.DataDirectory = path
344 } else {
345 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
346 }
347 }
348 if c.Providers == nil {
349 c.Providers = csync.NewMap[string, ProviderConfig]()
350 }
351 if c.Models == nil {
352 c.Models = make(map[SelectedModelType]SelectedModel)
353 }
354 if c.RecentModels == nil {
355 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
356 }
357 if c.MCP == nil {
358 c.MCP = make(map[string]MCPConfig)
359 }
360 if c.LSP == nil {
361 c.LSP = make(map[string]LSPConfig)
362 }
363
364 // Apply defaults to LSP configurations
365 c.applyLSPDefaults()
366
367 // Add the default context paths if they are not already present
368 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
369 slices.Sort(c.Options.ContextPaths)
370 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
371
372 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
373 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
374 }
375
376 if c.Options.Attribution == nil {
377 c.Options.Attribution = &Attribution{
378 TrailerStyle: TrailerStyleAssistedBy,
379 GeneratedWith: true,
380 }
381 } else if c.Options.Attribution.TrailerStyle == "" {
382 // Migrate deprecated co_authored_by or apply default
383 if c.Options.Attribution.CoAuthoredBy != nil {
384 if *c.Options.Attribution.CoAuthoredBy {
385 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
386 } else {
387 c.Options.Attribution.TrailerStyle = TrailerStyleNone
388 }
389 } else {
390 c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
391 }
392 }
393 if c.Options.InitializeAs == "" {
394 c.Options.InitializeAs = defaultInitializeAs
395 }
396}
397
398// applyLSPDefaults applies default values from powernap to LSP configurations
399func (c *Config) applyLSPDefaults() {
400 // Get powernap's default configuration
401 configManager := powernapConfig.NewManager()
402 configManager.LoadDefaults()
403
404 // Apply defaults to each LSP configuration
405 for name, cfg := range c.LSP {
406 // Try to get defaults from powernap based on name or command name.
407 base, ok := configManager.GetServer(name)
408 if !ok {
409 base, ok = configManager.GetServer(cfg.Command)
410 if !ok {
411 continue
412 }
413 }
414 if cfg.Options == nil {
415 cfg.Options = base.Settings
416 }
417 if cfg.InitOptions == nil {
418 cfg.InitOptions = base.InitOptions
419 }
420 if len(cfg.FileTypes) == 0 {
421 cfg.FileTypes = base.FileTypes
422 }
423 if len(cfg.RootMarkers) == 0 {
424 cfg.RootMarkers = base.RootMarkers
425 }
426 if cfg.Command == "" {
427 cfg.Command = base.Command
428 }
429 if len(cfg.Args) == 0 {
430 cfg.Args = base.Args
431 }
432 if len(cfg.Env) == 0 {
433 cfg.Env = base.Environment
434 }
435 // Update the config in the map
436 c.LSP[name] = cfg
437 }
438}
439
440func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
441 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
442 err = fmt.Errorf("no providers configured, please configure at least one provider")
443 return largeModel, smallModel, err
444 }
445
446 // Use the first provider enabled based on the known providers order
447 // if no provider found that is known use the first provider configured
448 for _, p := range knownProviders {
449 providerConfig, ok := c.Providers.Get(string(p.ID))
450 if !ok || providerConfig.Disable {
451 continue
452 }
453 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
454 if defaultLargeModel == nil {
455 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
456 return largeModel, smallModel, err
457 }
458 largeModel = SelectedModel{
459 Provider: string(p.ID),
460 Model: defaultLargeModel.ID,
461 MaxTokens: defaultLargeModel.DefaultMaxTokens,
462 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
463 }
464
465 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
466 if defaultSmallModel == nil {
467 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
468 return largeModel, smallModel, err
469 }
470 smallModel = SelectedModel{
471 Provider: string(p.ID),
472 Model: defaultSmallModel.ID,
473 MaxTokens: defaultSmallModel.DefaultMaxTokens,
474 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
475 }
476 return largeModel, smallModel, err
477 }
478
479 enabledProviders := c.EnabledProviders()
480 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
481 return strings.Compare(a.ID, b.ID)
482 })
483
484 if len(enabledProviders) == 0 {
485 err = fmt.Errorf("no providers configured, please configure at least one provider")
486 return largeModel, smallModel, err
487 }
488
489 providerConfig := enabledProviders[0]
490 if len(providerConfig.Models) == 0 {
491 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
492 return largeModel, smallModel, err
493 }
494 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
495 largeModel = SelectedModel{
496 Provider: providerConfig.ID,
497 Model: defaultLargeModel.ID,
498 MaxTokens: defaultLargeModel.DefaultMaxTokens,
499 }
500 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
501 smallModel = SelectedModel{
502 Provider: providerConfig.ID,
503 Model: defaultSmallModel.ID,
504 MaxTokens: defaultSmallModel.DefaultMaxTokens,
505 }
506 return largeModel, smallModel, err
507}
508
509func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
510 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
511 if err != nil {
512 return fmt.Errorf("failed to select default models: %w", err)
513 }
514 large, small := defaultLarge, defaultSmall
515
516 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
517 if largeModelConfigured {
518 if largeModelSelected.Model != "" {
519 large.Model = largeModelSelected.Model
520 }
521 if largeModelSelected.Provider != "" {
522 large.Provider = largeModelSelected.Provider
523 }
524 model := c.GetModel(large.Provider, large.Model)
525 if model == nil {
526 large = defaultLarge
527 // override the model type to large
528 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
529 if err != nil {
530 return fmt.Errorf("failed to update preferred large model: %w", err)
531 }
532 } else {
533 if largeModelSelected.MaxTokens > 0 {
534 large.MaxTokens = largeModelSelected.MaxTokens
535 } else {
536 large.MaxTokens = model.DefaultMaxTokens
537 }
538 if largeModelSelected.ReasoningEffort != "" {
539 large.ReasoningEffort = largeModelSelected.ReasoningEffort
540 }
541 large.Think = largeModelSelected.Think
542 if largeModelSelected.Temperature != nil {
543 large.Temperature = largeModelSelected.Temperature
544 }
545 if largeModelSelected.TopP != nil {
546 large.TopP = largeModelSelected.TopP
547 }
548 if largeModelSelected.TopK != nil {
549 large.TopK = largeModelSelected.TopK
550 }
551 if largeModelSelected.FrequencyPenalty != nil {
552 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
553 }
554 if largeModelSelected.PresencePenalty != nil {
555 large.PresencePenalty = largeModelSelected.PresencePenalty
556 }
557 }
558 }
559 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
560 if smallModelConfigured {
561 if smallModelSelected.Model != "" {
562 small.Model = smallModelSelected.Model
563 }
564 if smallModelSelected.Provider != "" {
565 small.Provider = smallModelSelected.Provider
566 }
567
568 model := c.GetModel(small.Provider, small.Model)
569 if model == nil {
570 small = defaultSmall
571 // override the model type to small
572 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
573 if err != nil {
574 return fmt.Errorf("failed to update preferred small model: %w", err)
575 }
576 } else {
577 if smallModelSelected.MaxTokens > 0 {
578 small.MaxTokens = smallModelSelected.MaxTokens
579 } else {
580 small.MaxTokens = model.DefaultMaxTokens
581 }
582 if smallModelSelected.ReasoningEffort != "" {
583 small.ReasoningEffort = smallModelSelected.ReasoningEffort
584 }
585 if smallModelSelected.Temperature != nil {
586 small.Temperature = smallModelSelected.Temperature
587 }
588 if smallModelSelected.TopP != nil {
589 small.TopP = smallModelSelected.TopP
590 }
591 if smallModelSelected.TopK != nil {
592 small.TopK = smallModelSelected.TopK
593 }
594 if smallModelSelected.FrequencyPenalty != nil {
595 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
596 }
597 if smallModelSelected.PresencePenalty != nil {
598 small.PresencePenalty = smallModelSelected.PresencePenalty
599 }
600 small.Think = smallModelSelected.Think
601 }
602 }
603 c.Models[SelectedModelTypeLarge] = large
604 c.Models[SelectedModelTypeSmall] = small
605 return nil
606}
607
608// lookupConfigs searches config files recursively from CWD up to FS root
609func lookupConfigs(cwd string) []string {
610 // prepend default config paths
611 configPaths := []string{
612 GlobalConfig(),
613 GlobalConfigData(),
614 }
615
616 configNames := []string{appName + ".json", "." + appName + ".json"}
617
618 foundConfigs, err := fsext.Lookup(cwd, configNames...)
619 if err != nil {
620 // returns at least default configs
621 return configPaths
622 }
623
624 // reverse order so last config has more priority
625 slices.Reverse(foundConfigs)
626
627 return append(configPaths, foundConfigs...)
628}
629
630func loadFromConfigPaths(configPaths []string) (*Config, error) {
631 var configs []io.Reader
632
633 for _, path := range configPaths {
634 fd, err := os.Open(path)
635 if err != nil {
636 if os.IsNotExist(err) {
637 continue
638 }
639 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
640 }
641 defer fd.Close()
642
643 configs = append(configs, fd)
644 }
645
646 return loadFromReaders(configs)
647}
648
649func loadFromReaders(readers []io.Reader) (*Config, error) {
650 if len(readers) == 0 {
651 return &Config{}, nil
652 }
653
654 merged, err := Merge(readers)
655 if err != nil {
656 return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
657 }
658
659 return LoadReader(merged)
660}
661
662func hasVertexCredentials(env env.Env) bool {
663 hasProject := env.Get("VERTEXAI_PROJECT") != ""
664 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
665 return hasProject && hasLocation
666}
667
668func hasAWSCredentials(env env.Env) bool {
669 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
670 return true
671 }
672
673 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
674 return true
675 }
676
677 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
678 return true
679 }
680
681 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
682 return true
683 }
684
685 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
686 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
687 return true
688 }
689
690 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil && !testing.Testing() {
691 return true
692 }
693
694 return false
695}
696
697// GlobalConfig returns the global configuration file path for the application.
698func GlobalConfig() string {
699 if crushGlobal := os.Getenv("CRUSH_GLOBAL_CONFIG"); crushGlobal != "" {
700 return filepath.Join(crushGlobal, fmt.Sprintf("%s.json", appName))
701 }
702 if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
703 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
704 }
705 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
706}
707
708// GlobalConfigData returns the path to the main data directory for the application.
709// this config is used when the app overrides configurations instead of updating the global config.
710func GlobalConfigData() string {
711 if crushData := os.Getenv("CRUSH_GLOBAL_DATA"); crushData != "" {
712 return filepath.Join(crushData, fmt.Sprintf("%s.json", appName))
713 }
714 if xdgDataHome := os.Getenv("XDG_DATA_HOME"); xdgDataHome != "" {
715 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
716 }
717
718 // return the path to the main data directory
719 // for windows, it should be in `%LOCALAPPDATA%/crush/`
720 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
721 if runtime.GOOS == "windows" {
722 localAppData := cmp.Or(
723 os.Getenv("LOCALAPPDATA"),
724 filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
725 )
726 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
727 }
728
729 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
730}
731
732func assignIfNil[T any](ptr **T, val T) {
733 if *ptr == nil {
734 *ptr = &val
735 }
736}
737
738func isInsideWorktree() bool {
739 bts, err := exec.CommandContext(
740 context.Background(),
741 "git", "rev-parse",
742 "--is-inside-work-tree",
743 ).CombinedOutput()
744 return err == nil && strings.TrimSpace(string(bts)) == "true"
745}