1package config
2
3import (
4 "context"
5 "encoding/json"
6 "fmt"
7 "io"
8 "log/slog"
9 "maps"
10 "os"
11 "os/exec"
12 "path/filepath"
13 "runtime"
14 "slices"
15 "strconv"
16 "strings"
17
18 "github.com/charmbracelet/catwalk/pkg/catwalk"
19 "github.com/charmbracelet/crush/internal/csync"
20 "github.com/charmbracelet/crush/internal/env"
21 "github.com/charmbracelet/crush/internal/fsext"
22 "github.com/charmbracelet/crush/internal/home"
23 "github.com/charmbracelet/crush/internal/log"
24 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
25)
26
27const defaultCatwalkURL = "https://catwalk.charm.sh"
28
29// LoadReader config via io.Reader.
30func LoadReader(fd io.Reader) (*Config, error) {
31 data, err := io.ReadAll(fd)
32 if err != nil {
33 return nil, err
34 }
35
36 var config Config
37 err = json.Unmarshal(data, &config)
38 if err != nil {
39 return nil, err
40 }
41 return &config, err
42}
43
44// Load loads the configuration from the default paths.
45func Load(workingDir, dataDir string, debug bool) (*Config, error) {
46 configPaths := lookupConfigs(workingDir)
47
48 cfg, err := loadFromConfigPaths(configPaths)
49 if err != nil {
50 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
51 }
52
53 cfg.dataConfigDir = GlobalConfigData()
54
55 cfg.setDefaults(workingDir, dataDir)
56
57 if debug {
58 cfg.Options.Debug = true
59 }
60
61 // Setup logs
62 log.Setup(
63 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
64 cfg.Options.Debug,
65 )
66
67 if !isInsideWorktree() {
68 const depth = 2
69 const items = 100
70 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
71 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
72 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
73 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
74 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
75 }
76
77 if isSSH() {
78 slog.Warn("Running over SSH, will enable reduce animations")
79 assignIfNil(&cfg.Options.TUI.ReduceAnimations, true)
80 }
81
82 // Load known providers, this loads the config from catwalk
83 providers, err := Providers(cfg)
84 if err != nil {
85 return nil, err
86 }
87 cfg.knownProviders = providers
88
89 env := env.New()
90 // Configure providers
91 valueResolver := NewShellVariableResolver(env)
92 cfg.resolver = valueResolver
93 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
94 return nil, fmt.Errorf("failed to configure providers: %w", err)
95 }
96
97 if !cfg.IsConfigured() {
98 slog.Warn("No providers configured")
99 return cfg, nil
100 }
101
102 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
103 return nil, fmt.Errorf("failed to configure selected models: %w", err)
104 }
105 cfg.SetupAgents()
106 return cfg, nil
107}
108
109func PushPopCrushEnv() func() {
110 found := []string{}
111 for _, ev := range os.Environ() {
112 if strings.HasPrefix(ev, "CRUSH_") {
113 pair := strings.SplitN(ev, "=", 2)
114 if len(pair) != 2 {
115 continue
116 }
117 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
118 }
119 }
120 backups := make(map[string]string)
121 for _, ev := range found {
122 backups[ev] = os.Getenv(ev)
123 }
124
125 for _, ev := range found {
126 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
127 }
128
129 restore := func() {
130 for k, v := range backups {
131 os.Setenv(k, v)
132 }
133 }
134 return restore
135}
136
137func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
138 knownProviderNames := make(map[string]bool)
139 restore := PushPopCrushEnv()
140 defer restore()
141 for _, p := range knownProviders {
142 knownProviderNames[string(p.ID)] = true
143 config, configExists := c.Providers.Get(string(p.ID))
144 // if the user configured a known provider we need to allow it to override a couple of parameters
145 if configExists {
146 if config.BaseURL != "" {
147 p.APIEndpoint = config.BaseURL
148 }
149 if config.APIKey != "" {
150 p.APIKey = config.APIKey
151 }
152 if len(config.Models) > 0 {
153 models := []catwalk.Model{}
154 seen := make(map[string]bool)
155
156 for _, model := range config.Models {
157 if seen[model.ID] {
158 continue
159 }
160 seen[model.ID] = true
161 if model.Name == "" {
162 model.Name = model.ID
163 }
164 models = append(models, model)
165 }
166 for _, model := range p.Models {
167 if seen[model.ID] {
168 continue
169 }
170 seen[model.ID] = true
171 if model.Name == "" {
172 model.Name = model.ID
173 }
174 models = append(models, model)
175 }
176
177 p.Models = models
178 }
179 }
180
181 headers := map[string]string{}
182 if len(p.DefaultHeaders) > 0 {
183 maps.Copy(headers, p.DefaultHeaders)
184 }
185 if len(config.ExtraHeaders) > 0 {
186 maps.Copy(headers, config.ExtraHeaders)
187 }
188 prepared := ProviderConfig{
189 ID: string(p.ID),
190 Name: p.Name,
191 BaseURL: p.APIEndpoint,
192 APIKey: p.APIKey,
193 Type: p.Type,
194 Disable: config.Disable,
195 SystemPromptPrefix: config.SystemPromptPrefix,
196 ExtraHeaders: headers,
197 ExtraBody: config.ExtraBody,
198 ExtraParams: make(map[string]string),
199 Models: p.Models,
200 }
201
202 switch p.ID {
203 // Handle specific providers that require additional configuration
204 case catwalk.InferenceProviderVertexAI:
205 if !hasVertexCredentials(env) {
206 if configExists {
207 slog.Warn("Skipping Vertex AI provider due to missing credentials")
208 c.Providers.Del(string(p.ID))
209 }
210 continue
211 }
212 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
213 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
214 case catwalk.InferenceProviderAzure:
215 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
216 if err != nil || endpoint == "" {
217 if configExists {
218 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
219 c.Providers.Del(string(p.ID))
220 }
221 continue
222 }
223 prepared.BaseURL = endpoint
224 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
225 case catwalk.InferenceProviderBedrock:
226 if !hasAWSCredentials(env) {
227 if configExists {
228 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
229 c.Providers.Del(string(p.ID))
230 }
231 continue
232 }
233 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
234 if prepared.ExtraParams["region"] == "" {
235 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
236 }
237 for _, model := range p.Models {
238 if !strings.HasPrefix(model.ID, "anthropic.") {
239 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
240 }
241 }
242 default:
243 // if the provider api or endpoint are missing we skip them
244 v, err := resolver.ResolveValue(p.APIKey)
245 if v == "" || err != nil {
246 if configExists {
247 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
248 c.Providers.Del(string(p.ID))
249 }
250 continue
251 }
252 }
253 c.Providers.Set(string(p.ID), prepared)
254 }
255
256 // validate the custom providers
257 for id, providerConfig := range c.Providers.Seq2() {
258 if knownProviderNames[id] {
259 continue
260 }
261
262 // Make sure the provider ID is set
263 providerConfig.ID = id
264 if providerConfig.Name == "" {
265 providerConfig.Name = id // Use ID as name if not set
266 }
267 // default to OpenAI if not set
268 if providerConfig.Type == "" {
269 providerConfig.Type = catwalk.TypeOpenAICompat
270 }
271 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
272 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
273 c.Providers.Del(id)
274 continue
275 }
276
277 if providerConfig.Disable {
278 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
279 c.Providers.Del(id)
280 continue
281 }
282 if providerConfig.APIKey == "" {
283 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
284 }
285 if providerConfig.BaseURL == "" {
286 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
287 c.Providers.Del(id)
288 continue
289 }
290 if len(providerConfig.Models) == 0 {
291 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
292 c.Providers.Del(id)
293 continue
294 }
295 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
296 if apiKey == "" || err != nil {
297 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
298 }
299 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
300 if baseURL == "" || err != nil {
301 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
302 c.Providers.Del(id)
303 continue
304 }
305
306 c.Providers.Set(id, providerConfig)
307 }
308 return nil
309}
310
311func (c *Config) setDefaults(workingDir, dataDir string) {
312 c.workingDir = workingDir
313 if c.Options == nil {
314 c.Options = &Options{}
315 }
316 if c.Options.TUI == nil {
317 c.Options.TUI = &TUIOptions{}
318 }
319 if c.Options.ContextPaths == nil {
320 c.Options.ContextPaths = []string{}
321 }
322 if dataDir != "" {
323 c.Options.DataDirectory = dataDir
324 } else if c.Options.DataDirectory == "" {
325 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
326 c.Options.DataDirectory = path
327 } else {
328 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
329 }
330 }
331 if c.Providers == nil {
332 c.Providers = csync.NewMap[string, ProviderConfig]()
333 }
334 if c.Models == nil {
335 c.Models = make(map[SelectedModelType]SelectedModel)
336 }
337 if c.MCP == nil {
338 c.MCP = make(map[string]MCPConfig)
339 }
340 if c.LSP == nil {
341 c.LSP = make(map[string]LSPConfig)
342 }
343
344 // Apply defaults to LSP configurations
345 c.applyLSPDefaults()
346
347 // Add the default context paths if they are not already present
348 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
349 slices.Sort(c.Options.ContextPaths)
350 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
351
352 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
353 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
354 }
355
356 if c.Options.Attribution == nil {
357 c.Options.Attribution = &Attribution{
358 CoAuthoredBy: true,
359 GeneratedWith: true,
360 }
361 }
362}
363
364// applyLSPDefaults applies default values from powernap to LSP configurations
365func (c *Config) applyLSPDefaults() {
366 // Get powernap's default configuration
367 configManager := powernapConfig.NewManager()
368 configManager.LoadDefaults()
369
370 // Apply defaults to each LSP configuration
371 for name, cfg := range c.LSP {
372 // Try to get defaults from powernap based on name or command name.
373 base, ok := configManager.GetServer(name)
374 if !ok {
375 base, ok = configManager.GetServer(cfg.Command)
376 if !ok {
377 continue
378 }
379 }
380 if cfg.Options == nil {
381 cfg.Options = base.Settings
382 }
383 if cfg.InitOptions == nil {
384 cfg.InitOptions = base.InitOptions
385 }
386 if len(cfg.FileTypes) == 0 {
387 cfg.FileTypes = base.FileTypes
388 }
389 if len(cfg.RootMarkers) == 0 {
390 cfg.RootMarkers = base.RootMarkers
391 }
392 if cfg.Command == "" {
393 cfg.Command = base.Command
394 }
395 if len(cfg.Args) == 0 {
396 cfg.Args = base.Args
397 }
398 if len(cfg.Env) == 0 {
399 cfg.Env = base.Environment
400 }
401 // Update the config in the map
402 c.LSP[name] = cfg
403 }
404}
405
406func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
407 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
408 err = fmt.Errorf("no providers configured, please configure at least one provider")
409 return largeModel, smallModel, err
410 }
411
412 // Use the first provider enabled based on the known providers order
413 // if no provider found that is known use the first provider configured
414 for _, p := range knownProviders {
415 providerConfig, ok := c.Providers.Get(string(p.ID))
416 if !ok || providerConfig.Disable {
417 continue
418 }
419 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
420 if defaultLargeModel == nil {
421 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
422 return largeModel, smallModel, err
423 }
424 largeModel = SelectedModel{
425 Provider: string(p.ID),
426 Model: defaultLargeModel.ID,
427 MaxTokens: defaultLargeModel.DefaultMaxTokens,
428 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
429 }
430
431 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
432 if defaultSmallModel == nil {
433 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
434 return largeModel, smallModel, err
435 }
436 smallModel = SelectedModel{
437 Provider: string(p.ID),
438 Model: defaultSmallModel.ID,
439 MaxTokens: defaultSmallModel.DefaultMaxTokens,
440 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
441 }
442 return largeModel, smallModel, err
443 }
444
445 enabledProviders := c.EnabledProviders()
446 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
447 return strings.Compare(a.ID, b.ID)
448 })
449
450 if len(enabledProviders) == 0 {
451 err = fmt.Errorf("no providers configured, please configure at least one provider")
452 return largeModel, smallModel, err
453 }
454
455 providerConfig := enabledProviders[0]
456 if len(providerConfig.Models) == 0 {
457 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
458 return largeModel, smallModel, err
459 }
460 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
461 largeModel = SelectedModel{
462 Provider: providerConfig.ID,
463 Model: defaultLargeModel.ID,
464 MaxTokens: defaultLargeModel.DefaultMaxTokens,
465 }
466 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
467 smallModel = SelectedModel{
468 Provider: providerConfig.ID,
469 Model: defaultSmallModel.ID,
470 MaxTokens: defaultSmallModel.DefaultMaxTokens,
471 }
472 return largeModel, smallModel, err
473}
474
475func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
476 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
477 if err != nil {
478 return fmt.Errorf("failed to select default models: %w", err)
479 }
480 large, small := defaultLarge, defaultSmall
481
482 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
483 if largeModelConfigured {
484 if largeModelSelected.Model != "" {
485 large.Model = largeModelSelected.Model
486 }
487 if largeModelSelected.Provider != "" {
488 large.Provider = largeModelSelected.Provider
489 }
490 model := c.GetModel(large.Provider, large.Model)
491 if model == nil {
492 large = defaultLarge
493 // override the model type to large
494 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
495 if err != nil {
496 return fmt.Errorf("failed to update preferred large model: %w", err)
497 }
498 } else {
499 if largeModelSelected.MaxTokens > 0 {
500 large.MaxTokens = largeModelSelected.MaxTokens
501 } else {
502 large.MaxTokens = model.DefaultMaxTokens
503 }
504 if largeModelSelected.ReasoningEffort != "" {
505 large.ReasoningEffort = largeModelSelected.ReasoningEffort
506 }
507 large.Think = largeModelSelected.Think
508 if largeModelSelected.Temperature != nil {
509 large.Temperature = largeModelSelected.Temperature
510 }
511 if largeModelSelected.TopP != nil {
512 large.TopP = largeModelSelected.TopP
513 }
514 if largeModelSelected.TopK != nil {
515 large.TopK = largeModelSelected.TopK
516 }
517 if largeModelSelected.FrequencyPenalty != nil {
518 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
519 }
520 if largeModelSelected.PresencePenalty != nil {
521 large.PresencePenalty = largeModelSelected.PresencePenalty
522 }
523 }
524 }
525 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
526 if smallModelConfigured {
527 if smallModelSelected.Model != "" {
528 small.Model = smallModelSelected.Model
529 }
530 if smallModelSelected.Provider != "" {
531 small.Provider = smallModelSelected.Provider
532 }
533
534 model := c.GetModel(small.Provider, small.Model)
535 if model == nil {
536 small = defaultSmall
537 // override the model type to small
538 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
539 if err != nil {
540 return fmt.Errorf("failed to update preferred small model: %w", err)
541 }
542 } else {
543 if smallModelSelected.MaxTokens > 0 {
544 small.MaxTokens = smallModelSelected.MaxTokens
545 } else {
546 small.MaxTokens = model.DefaultMaxTokens
547 }
548 if smallModelSelected.ReasoningEffort != "" {
549 small.ReasoningEffort = smallModelSelected.ReasoningEffort
550 }
551 if smallModelSelected.Temperature != nil {
552 small.Temperature = smallModelSelected.Temperature
553 }
554 if smallModelSelected.TopP != nil {
555 small.TopP = smallModelSelected.TopP
556 }
557 if smallModelSelected.TopK != nil {
558 small.TopK = smallModelSelected.TopK
559 }
560 if smallModelSelected.FrequencyPenalty != nil {
561 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
562 }
563 if smallModelSelected.PresencePenalty != nil {
564 small.PresencePenalty = smallModelSelected.PresencePenalty
565 }
566 small.Think = smallModelSelected.Think
567 }
568 }
569 c.Models[SelectedModelTypeLarge] = large
570 c.Models[SelectedModelTypeSmall] = small
571 return nil
572}
573
574// lookupConfigs searches config files recursively from CWD up to FS root
575func lookupConfigs(cwd string) []string {
576 // prepend default config paths
577 configPaths := []string{
578 GlobalConfig(),
579 GlobalConfigData(),
580 }
581
582 configNames := []string{appName + ".json", "." + appName + ".json"}
583
584 foundConfigs, err := fsext.Lookup(cwd, configNames...)
585 if err != nil {
586 // returns at least default configs
587 return configPaths
588 }
589
590 // reverse order so last config has more priority
591 slices.Reverse(foundConfigs)
592
593 return append(configPaths, foundConfigs...)
594}
595
596func loadFromConfigPaths(configPaths []string) (*Config, error) {
597 var configs []io.Reader
598
599 for _, path := range configPaths {
600 fd, err := os.Open(path)
601 if err != nil {
602 if os.IsNotExist(err) {
603 continue
604 }
605 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
606 }
607 defer fd.Close()
608
609 configs = append(configs, fd)
610 }
611
612 return loadFromReaders(configs)
613}
614
615func loadFromReaders(readers []io.Reader) (*Config, error) {
616 if len(readers) == 0 {
617 return &Config{}, nil
618 }
619
620 merged, err := Merge(readers)
621 if err != nil {
622 return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
623 }
624
625 return LoadReader(merged)
626}
627
628func hasVertexCredentials(env env.Env) bool {
629 hasProject := env.Get("VERTEXAI_PROJECT") != ""
630 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
631 return hasProject && hasLocation
632}
633
634func hasAWSCredentials(env env.Env) bool {
635 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
636 return true
637 }
638
639 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
640 return true
641 }
642
643 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
644 return true
645 }
646
647 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
648 return true
649 }
650
651 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
652 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
653 return true
654 }
655
656 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil {
657 return true
658 }
659
660 return false
661}
662
663// GlobalConfig returns the global configuration file path for the application.
664func GlobalConfig() string {
665 xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
666 if xdgConfigHome != "" {
667 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
668 }
669
670 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
671}
672
673// GlobalConfigData returns the path to the main data directory for the application.
674// this config is used when the app overrides configurations instead of updating the global config.
675func GlobalConfigData() string {
676 xdgDataHome := os.Getenv("XDG_DATA_HOME")
677 if xdgDataHome != "" {
678 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
679 }
680
681 // return the path to the main data directory
682 // for windows, it should be in `%LOCALAPPDATA%/crush/`
683 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
684 if runtime.GOOS == "windows" {
685 localAppData := os.Getenv("LOCALAPPDATA")
686 if localAppData == "" {
687 localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
688 }
689 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
690 }
691
692 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
693}
694
695func assignIfNil[T any](ptr **T, val T) {
696 if *ptr == nil {
697 *ptr = &val
698 }
699}
700
701func isInsideWorktree() bool {
702 bts, err := exec.CommandContext(
703 context.Background(),
704 "git", "rev-parse",
705 "--is-inside-work-tree",
706 ).CombinedOutput()
707 return err == nil && strings.TrimSpace(string(bts)) == "true"
708}
709
710func isSSH() bool { return os.Getenv("SSH_TTY") != "" }