1package config
2
3import (
4 "context"
5 "encoding/json"
6 "fmt"
7 "io"
8 "log/slog"
9 "maps"
10 "os"
11 "os/exec"
12 "path/filepath"
13 "runtime"
14 "slices"
15 "strconv"
16 "strings"
17
18 "github.com/charmbracelet/catwalk/pkg/catwalk"
19 "github.com/charmbracelet/crush/internal/csync"
20 "github.com/charmbracelet/crush/internal/env"
21 "github.com/charmbracelet/crush/internal/fsext"
22 "github.com/charmbracelet/crush/internal/home"
23 "github.com/charmbracelet/crush/internal/log"
24 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
25)
26
27const defaultCatwalkURL = "https://catwalk.charm.sh"
28
29// LoadReader config via io.Reader.
30func LoadReader(fd io.Reader) (*Config, error) {
31 data, err := io.ReadAll(fd)
32 if err != nil {
33 return nil, err
34 }
35
36 var config Config
37 err = json.Unmarshal(data, &config)
38 if err != nil {
39 return nil, err
40 }
41 return &config, err
42}
43
44// Load loads the configuration from the default paths.
45func Load(workingDir, dataDir string, debug bool) (*Config, error) {
46 configPaths := lookupConfigs(workingDir)
47
48 cfg, err := loadFromConfigPaths(configPaths)
49 if err != nil {
50 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
51 }
52
53 cfg.dataConfigDir = GlobalConfigData()
54
55 cfg.setDefaults(workingDir, dataDir)
56
57 if debug {
58 cfg.Options.Debug = true
59 }
60
61 // Setup logs
62 log.Setup(
63 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
64 cfg.Options.Debug,
65 )
66
67 if !isInsideWorktree() {
68 const depth = 2
69 const items = 100
70 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
71 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
72 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
73 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
74 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
75 }
76
77 // Load known providers, this loads the config from catwalk
78 providers, err := Providers(cfg)
79 if err != nil {
80 return nil, err
81 }
82 cfg.knownProviders = providers
83
84 // Validate hooks configuration.
85 if err := cfg.validateHooks(); err != nil {
86 return nil, fmt.Errorf("invalid hooks configuration: %w", err)
87 }
88
89 env := env.New()
90 // Configure providers
91 valueResolver := NewShellVariableResolver(env)
92 cfg.resolver = valueResolver
93 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
94 return nil, fmt.Errorf("failed to configure providers: %w", err)
95 }
96
97 if !cfg.IsConfigured() {
98 slog.Warn("No providers configured")
99 return cfg, nil
100 }
101
102 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
103 return nil, fmt.Errorf("failed to configure selected models: %w", err)
104 }
105 cfg.SetupAgents()
106 return cfg, nil
107}
108
109func PushPopCrushEnv() func() {
110 found := []string{}
111 for _, ev := range os.Environ() {
112 if strings.HasPrefix(ev, "CRUSH_") {
113 pair := strings.SplitN(ev, "=", 2)
114 if len(pair) != 2 {
115 continue
116 }
117 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
118 }
119 }
120 backups := make(map[string]string)
121 for _, ev := range found {
122 backups[ev] = os.Getenv(ev)
123 }
124
125 for _, ev := range found {
126 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
127 }
128
129 restore := func() {
130 for k, v := range backups {
131 os.Setenv(k, v)
132 }
133 }
134 return restore
135}
136
137func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
138 knownProviderNames := make(map[string]bool)
139 restore := PushPopCrushEnv()
140 defer restore()
141 for _, p := range knownProviders {
142 knownProviderNames[string(p.ID)] = true
143 config, configExists := c.Providers.Get(string(p.ID))
144 // if the user configured a known provider we need to allow it to override a couple of parameters
145 if configExists {
146 if config.BaseURL != "" {
147 p.APIEndpoint = config.BaseURL
148 }
149 if config.APIKey != "" {
150 p.APIKey = config.APIKey
151 }
152 if len(config.Models) > 0 {
153 models := []catwalk.Model{}
154 seen := make(map[string]bool)
155
156 for _, model := range config.Models {
157 if seen[model.ID] {
158 continue
159 }
160 seen[model.ID] = true
161 if model.Name == "" {
162 model.Name = model.ID
163 }
164 models = append(models, model)
165 }
166 for _, model := range p.Models {
167 if seen[model.ID] {
168 continue
169 }
170 seen[model.ID] = true
171 if model.Name == "" {
172 model.Name = model.ID
173 }
174 models = append(models, model)
175 }
176
177 p.Models = models
178 }
179 }
180
181 headers := map[string]string{}
182 if len(p.DefaultHeaders) > 0 {
183 maps.Copy(headers, p.DefaultHeaders)
184 }
185 if len(config.ExtraHeaders) > 0 {
186 maps.Copy(headers, config.ExtraHeaders)
187 }
188 prepared := ProviderConfig{
189 ID: string(p.ID),
190 Name: p.Name,
191 BaseURL: p.APIEndpoint,
192 APIKey: p.APIKey,
193 Type: p.Type,
194 Disable: config.Disable,
195 SystemPromptPrefix: config.SystemPromptPrefix,
196 ExtraHeaders: headers,
197 ExtraBody: config.ExtraBody,
198 ExtraParams: make(map[string]string),
199 Models: p.Models,
200 }
201
202 switch p.ID {
203 // Handle specific providers that require additional configuration
204 case catwalk.InferenceProviderVertexAI:
205 if !hasVertexCredentials(env) {
206 if configExists {
207 slog.Warn("Skipping Vertex AI provider due to missing credentials")
208 c.Providers.Del(string(p.ID))
209 }
210 continue
211 }
212 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
213 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
214 case catwalk.InferenceProviderAzure:
215 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
216 if err != nil || endpoint == "" {
217 if configExists {
218 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
219 c.Providers.Del(string(p.ID))
220 }
221 continue
222 }
223 prepared.BaseURL = endpoint
224 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
225 case catwalk.InferenceProviderBedrock:
226 if !hasAWSCredentials(env) {
227 if configExists {
228 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
229 c.Providers.Del(string(p.ID))
230 }
231 continue
232 }
233 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
234 if prepared.ExtraParams["region"] == "" {
235 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
236 }
237 for _, model := range p.Models {
238 if !strings.HasPrefix(model.ID, "anthropic.") {
239 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
240 }
241 }
242 default:
243 // if the provider api or endpoint are missing we skip them
244 v, err := resolver.ResolveValue(p.APIKey)
245 if v == "" || err != nil {
246 if configExists {
247 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
248 c.Providers.Del(string(p.ID))
249 }
250 continue
251 }
252 }
253 c.Providers.Set(string(p.ID), prepared)
254 }
255
256 // validate the custom providers
257 for id, providerConfig := range c.Providers.Seq2() {
258 if knownProviderNames[id] {
259 continue
260 }
261
262 // Make sure the provider ID is set
263 providerConfig.ID = id
264 if providerConfig.Name == "" {
265 providerConfig.Name = id // Use ID as name if not set
266 }
267 // default to OpenAI if not set
268 if providerConfig.Type == "" {
269 providerConfig.Type = catwalk.TypeOpenAICompat
270 }
271 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
272 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
273 c.Providers.Del(id)
274 continue
275 }
276
277 if providerConfig.Disable {
278 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
279 c.Providers.Del(id)
280 continue
281 }
282 if providerConfig.APIKey == "" {
283 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
284 }
285 if providerConfig.BaseURL == "" {
286 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
287 c.Providers.Del(id)
288 continue
289 }
290 if len(providerConfig.Models) == 0 {
291 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
292 c.Providers.Del(id)
293 continue
294 }
295 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
296 if apiKey == "" || err != nil {
297 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
298 }
299 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
300 if baseURL == "" || err != nil {
301 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
302 c.Providers.Del(id)
303 continue
304 }
305
306 c.Providers.Set(id, providerConfig)
307 }
308 return nil
309}
310
311func (c *Config) setDefaults(workingDir, dataDir string) {
312 c.workingDir = workingDir
313 if c.Options == nil {
314 c.Options = &Options{}
315 }
316 if c.Options.TUI == nil {
317 c.Options.TUI = &TUIOptions{}
318 }
319 if c.Options.ContextPaths == nil {
320 c.Options.ContextPaths = []string{}
321 }
322 if dataDir != "" {
323 c.Options.DataDirectory = dataDir
324 } else if c.Options.DataDirectory == "" {
325 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
326 c.Options.DataDirectory = path
327 } else {
328 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
329 }
330 }
331 if c.Providers == nil {
332 c.Providers = csync.NewMap[string, ProviderConfig]()
333 }
334 if c.Models == nil {
335 c.Models = make(map[SelectedModelType]SelectedModel)
336 }
337 if c.RecentModels == nil {
338 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
339 }
340 if c.MCP == nil {
341 c.MCP = make(map[string]MCPConfig)
342 }
343 if c.LSP == nil {
344 c.LSP = make(map[string]LSPConfig)
345 }
346
347 // Apply defaults to LSP configurations
348 c.applyLSPDefaults()
349
350 // Add the default context paths if they are not already present
351 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
352 slices.Sort(c.Options.ContextPaths)
353 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
354
355 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
356 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
357 }
358
359 if c.Options.Attribution == nil {
360 c.Options.Attribution = &Attribution{
361 TrailerStyle: TrailerStyleCoAuthoredBy,
362 GeneratedWith: true,
363 }
364 } else if c.Options.Attribution.TrailerStyle == "" {
365 // Migrate deprecated co_authored_by or apply default
366 if c.Options.Attribution.CoAuthoredBy != nil && !*c.Options.Attribution.CoAuthoredBy {
367 c.Options.Attribution.TrailerStyle = TrailerStyleNone
368 } else {
369 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
370 }
371 }
372 if c.Options.InitializeAs == "" {
373 c.Options.InitializeAs = defaultInitializeAs
374 }
375}
376
377// applyLSPDefaults applies default values from powernap to LSP configurations
378func (c *Config) applyLSPDefaults() {
379 // Get powernap's default configuration
380 configManager := powernapConfig.NewManager()
381 configManager.LoadDefaults()
382
383 // Apply defaults to each LSP configuration
384 for name, cfg := range c.LSP {
385 // Try to get defaults from powernap based on name or command name.
386 base, ok := configManager.GetServer(name)
387 if !ok {
388 base, ok = configManager.GetServer(cfg.Command)
389 if !ok {
390 continue
391 }
392 }
393 if cfg.Options == nil {
394 cfg.Options = base.Settings
395 }
396 if cfg.InitOptions == nil {
397 cfg.InitOptions = base.InitOptions
398 }
399 if len(cfg.FileTypes) == 0 {
400 cfg.FileTypes = base.FileTypes
401 }
402 if len(cfg.RootMarkers) == 0 {
403 cfg.RootMarkers = base.RootMarkers
404 }
405 if cfg.Command == "" {
406 cfg.Command = base.Command
407 }
408 if len(cfg.Args) == 0 {
409 cfg.Args = base.Args
410 }
411 if len(cfg.Env) == 0 {
412 cfg.Env = base.Environment
413 }
414 // Update the config in the map
415 c.LSP[name] = cfg
416 }
417}
418
419func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
420 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
421 err = fmt.Errorf("no providers configured, please configure at least one provider")
422 return largeModel, smallModel, err
423 }
424
425 // Use the first provider enabled based on the known providers order
426 // if no provider found that is known use the first provider configured
427 for _, p := range knownProviders {
428 providerConfig, ok := c.Providers.Get(string(p.ID))
429 if !ok || providerConfig.Disable {
430 continue
431 }
432 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
433 if defaultLargeModel == nil {
434 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
435 return largeModel, smallModel, err
436 }
437 largeModel = SelectedModel{
438 Provider: string(p.ID),
439 Model: defaultLargeModel.ID,
440 MaxTokens: defaultLargeModel.DefaultMaxTokens,
441 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
442 }
443
444 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
445 if defaultSmallModel == nil {
446 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
447 return largeModel, smallModel, err
448 }
449 smallModel = SelectedModel{
450 Provider: string(p.ID),
451 Model: defaultSmallModel.ID,
452 MaxTokens: defaultSmallModel.DefaultMaxTokens,
453 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
454 }
455 return largeModel, smallModel, err
456 }
457
458 enabledProviders := c.EnabledProviders()
459 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
460 return strings.Compare(a.ID, b.ID)
461 })
462
463 if len(enabledProviders) == 0 {
464 err = fmt.Errorf("no providers configured, please configure at least one provider")
465 return largeModel, smallModel, err
466 }
467
468 providerConfig := enabledProviders[0]
469 if len(providerConfig.Models) == 0 {
470 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
471 return largeModel, smallModel, err
472 }
473 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
474 largeModel = SelectedModel{
475 Provider: providerConfig.ID,
476 Model: defaultLargeModel.ID,
477 MaxTokens: defaultLargeModel.DefaultMaxTokens,
478 }
479 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
480 smallModel = SelectedModel{
481 Provider: providerConfig.ID,
482 Model: defaultSmallModel.ID,
483 MaxTokens: defaultSmallModel.DefaultMaxTokens,
484 }
485 return largeModel, smallModel, err
486}
487
488func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
489 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
490 if err != nil {
491 return fmt.Errorf("failed to select default models: %w", err)
492 }
493 large, small := defaultLarge, defaultSmall
494
495 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
496 if largeModelConfigured {
497 if largeModelSelected.Model != "" {
498 large.Model = largeModelSelected.Model
499 }
500 if largeModelSelected.Provider != "" {
501 large.Provider = largeModelSelected.Provider
502 }
503 model := c.GetModel(large.Provider, large.Model)
504 if model == nil {
505 large = defaultLarge
506 // override the model type to large
507 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
508 if err != nil {
509 return fmt.Errorf("failed to update preferred large model: %w", err)
510 }
511 } else {
512 if largeModelSelected.MaxTokens > 0 {
513 large.MaxTokens = largeModelSelected.MaxTokens
514 } else {
515 large.MaxTokens = model.DefaultMaxTokens
516 }
517 if largeModelSelected.ReasoningEffort != "" {
518 large.ReasoningEffort = largeModelSelected.ReasoningEffort
519 }
520 large.Think = largeModelSelected.Think
521 if largeModelSelected.Temperature != nil {
522 large.Temperature = largeModelSelected.Temperature
523 }
524 if largeModelSelected.TopP != nil {
525 large.TopP = largeModelSelected.TopP
526 }
527 if largeModelSelected.TopK != nil {
528 large.TopK = largeModelSelected.TopK
529 }
530 if largeModelSelected.FrequencyPenalty != nil {
531 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
532 }
533 if largeModelSelected.PresencePenalty != nil {
534 large.PresencePenalty = largeModelSelected.PresencePenalty
535 }
536 }
537 }
538 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
539 if smallModelConfigured {
540 if smallModelSelected.Model != "" {
541 small.Model = smallModelSelected.Model
542 }
543 if smallModelSelected.Provider != "" {
544 small.Provider = smallModelSelected.Provider
545 }
546
547 model := c.GetModel(small.Provider, small.Model)
548 if model == nil {
549 small = defaultSmall
550 // override the model type to small
551 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
552 if err != nil {
553 return fmt.Errorf("failed to update preferred small model: %w", err)
554 }
555 } else {
556 if smallModelSelected.MaxTokens > 0 {
557 small.MaxTokens = smallModelSelected.MaxTokens
558 } else {
559 small.MaxTokens = model.DefaultMaxTokens
560 }
561 if smallModelSelected.ReasoningEffort != "" {
562 small.ReasoningEffort = smallModelSelected.ReasoningEffort
563 }
564 if smallModelSelected.Temperature != nil {
565 small.Temperature = smallModelSelected.Temperature
566 }
567 if smallModelSelected.TopP != nil {
568 small.TopP = smallModelSelected.TopP
569 }
570 if smallModelSelected.TopK != nil {
571 small.TopK = smallModelSelected.TopK
572 }
573 if smallModelSelected.FrequencyPenalty != nil {
574 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
575 }
576 if smallModelSelected.PresencePenalty != nil {
577 small.PresencePenalty = smallModelSelected.PresencePenalty
578 }
579 small.Think = smallModelSelected.Think
580 }
581 }
582 c.Models[SelectedModelTypeLarge] = large
583 c.Models[SelectedModelTypeSmall] = small
584 return nil
585}
586
587// lookupConfigs searches config files recursively from CWD up to FS root
588func lookupConfigs(cwd string) []string {
589 // prepend default config paths
590 configPaths := []string{
591 GlobalConfig(),
592 GlobalConfigData(),
593 }
594
595 configNames := []string{appName + ".json", "." + appName + ".json"}
596
597 foundConfigs, err := fsext.Lookup(cwd, configNames...)
598 if err != nil {
599 // returns at least default configs
600 return configPaths
601 }
602
603 // reverse order so last config has more priority
604 slices.Reverse(foundConfigs)
605
606 return append(configPaths, foundConfigs...)
607}
608
609func loadFromConfigPaths(configPaths []string) (*Config, error) {
610 var configs []io.Reader
611
612 for _, path := range configPaths {
613 fd, err := os.Open(path)
614 if err != nil {
615 if os.IsNotExist(err) {
616 continue
617 }
618 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
619 }
620 defer fd.Close()
621
622 configs = append(configs, fd)
623 }
624
625 return loadFromReaders(configs)
626}
627
628func loadFromReaders(readers []io.Reader) (*Config, error) {
629 if len(readers) == 0 {
630 return &Config{}, nil
631 }
632
633 merged, err := Merge(readers)
634 if err != nil {
635 return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
636 }
637
638 return LoadReader(merged)
639}
640
641func hasVertexCredentials(env env.Env) bool {
642 hasProject := env.Get("VERTEXAI_PROJECT") != ""
643 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
644 return hasProject && hasLocation
645}
646
647func hasAWSCredentials(env env.Env) bool {
648 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
649 return true
650 }
651
652 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
653 return true
654 }
655
656 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
657 return true
658 }
659
660 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
661 return true
662 }
663
664 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
665 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
666 return true
667 }
668
669 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil {
670 return true
671 }
672
673 return false
674}
675
676// GlobalConfig returns the global configuration file path for the application.
677func GlobalConfig() string {
678 xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
679 if xdgConfigHome != "" {
680 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
681 }
682
683 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
684}
685
686// GlobalConfigData returns the path to the main data directory for the application.
687// this config is used when the app overrides configurations instead of updating the global config.
688func GlobalConfigData() string {
689 xdgDataHome := os.Getenv("XDG_DATA_HOME")
690 if xdgDataHome != "" {
691 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
692 }
693
694 // return the path to the main data directory
695 // for windows, it should be in `%LOCALAPPDATA%/crush/`
696 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
697 if runtime.GOOS == "windows" {
698 localAppData := os.Getenv("LOCALAPPDATA")
699 if localAppData == "" {
700 localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
701 }
702 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
703 }
704
705 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
706}
707
708func assignIfNil[T any](ptr **T, val T) {
709 if *ptr == nil {
710 *ptr = &val
711 }
712}
713
714func isInsideWorktree() bool {
715 bts, err := exec.CommandContext(
716 context.Background(),
717 "git", "rev-parse",
718 "--is-inside-work-tree",
719 ).CombinedOutput()
720 return err == nil && strings.TrimSpace(string(bts)) == "true"
721}