load.go

  1package config
  2
  3import (
  4	"cmp"
  5	"context"
  6	"encoding/json"
  7	"fmt"
  8	"io"
  9	"log/slog"
 10	"maps"
 11	"os"
 12	"os/exec"
 13	"path/filepath"
 14	"runtime"
 15	"slices"
 16	"strconv"
 17	"strings"
 18	"testing"
 19
 20	"github.com/charmbracelet/catwalk/pkg/catwalk"
 21	"github.com/charmbracelet/crush/internal/agent/hyper"
 22	"github.com/charmbracelet/crush/internal/csync"
 23	"github.com/charmbracelet/crush/internal/env"
 24	"github.com/charmbracelet/crush/internal/fsext"
 25	"github.com/charmbracelet/crush/internal/home"
 26	"github.com/charmbracelet/crush/internal/log"
 27	powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
 28)
 29
 30const defaultCatwalkURL = "https://catwalk.charm.sh"
 31
 32// LoadReader config via io.Reader.
 33func LoadReader(fd io.Reader) (*Config, error) {
 34	data, err := io.ReadAll(fd)
 35	if err != nil {
 36		return nil, err
 37	}
 38
 39	var config Config
 40	err = json.Unmarshal(data, &config)
 41	if err != nil {
 42		return nil, err
 43	}
 44	return &config, err
 45}
 46
 47// Load loads the configuration from the default paths.
 48func Load(workingDir, dataDir string, debug bool) (*Config, error) {
 49	configPaths := lookupConfigs(workingDir)
 50
 51	cfg, err := loadFromConfigPaths(configPaths)
 52	if err != nil {
 53		return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
 54	}
 55
 56	cfg.dataConfigDir = GlobalConfigData()
 57
 58	cfg.setDefaults(workingDir, dataDir)
 59
 60	if debug {
 61		cfg.Options.Debug = true
 62	}
 63
 64	// Setup logs
 65	log.Setup(
 66		filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
 67		cfg.Options.Debug,
 68	)
 69
 70	if !isInsideWorktree() {
 71		const depth = 2
 72		const items = 100
 73		slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
 74		assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
 75		assignIfNil(&cfg.Tools.Ls.MaxItems, items)
 76		assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
 77		assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
 78	}
 79
 80	// Load known providers, this loads the config from catwalk
 81	providers, err := Providers(cfg)
 82	if err != nil {
 83		return nil, err
 84	}
 85	cfg.knownProviders = providers
 86
 87	env := env.New()
 88	// Configure providers
 89	valueResolver := NewShellVariableResolver(env)
 90	cfg.resolver = valueResolver
 91	if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
 92		return nil, fmt.Errorf("failed to configure providers: %w", err)
 93	}
 94
 95	if !cfg.IsConfigured() {
 96		slog.Warn("No providers configured")
 97		return cfg, nil
 98	}
 99
100	if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
101		return nil, fmt.Errorf("failed to configure selected models: %w", err)
102	}
103	cfg.SetupAgents()
104	return cfg, nil
105}
106
107func PushPopCrushEnv() func() {
108	found := []string{}
109	for _, ev := range os.Environ() {
110		if strings.HasPrefix(ev, "CRUSH_") {
111			pair := strings.SplitN(ev, "=", 2)
112			if len(pair) != 2 {
113				continue
114			}
115			found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
116		}
117	}
118	backups := make(map[string]string)
119	for _, ev := range found {
120		backups[ev] = os.Getenv(ev)
121	}
122
123	for _, ev := range found {
124		os.Setenv(ev, os.Getenv("CRUSH_"+ev))
125	}
126
127	restore := func() {
128		for k, v := range backups {
129			os.Setenv(k, v)
130		}
131	}
132	return restore
133}
134
135func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
136	knownProviderNames := make(map[string]bool)
137	restore := PushPopCrushEnv()
138	defer restore()
139
140	for _, p := range knownProviders {
141		knownProviderNames[string(p.ID)] = true
142		config, configExists := c.Providers.Get(string(p.ID))
143		// if the user configured a known provider we need to allow it to override a couple of parameters
144		if configExists {
145			if config.BaseURL != "" {
146				p.APIEndpoint = config.BaseURL
147			}
148			if config.APIKey != "" {
149				p.APIKey = config.APIKey
150			}
151			if len(config.Models) > 0 {
152				models := []catwalk.Model{}
153				seen := make(map[string]bool)
154
155				for _, model := range config.Models {
156					if seen[model.ID] {
157						continue
158					}
159					seen[model.ID] = true
160					if model.Name == "" {
161						model.Name = model.ID
162					}
163					models = append(models, model)
164				}
165				for _, model := range p.Models {
166					if seen[model.ID] {
167						continue
168					}
169					seen[model.ID] = true
170					if model.Name == "" {
171						model.Name = model.ID
172					}
173					models = append(models, model)
174				}
175
176				p.Models = models
177			}
178		}
179
180		headers := map[string]string{}
181		if len(p.DefaultHeaders) > 0 {
182			maps.Copy(headers, p.DefaultHeaders)
183		}
184		if len(config.ExtraHeaders) > 0 {
185			maps.Copy(headers, config.ExtraHeaders)
186		}
187		for k, v := range headers {
188			resolved, err := resolver.ResolveValue(v)
189			if err != nil {
190				continue
191			}
192			headers[k] = resolved
193		}
194		prepared := ProviderConfig{
195			ID:                 string(p.ID),
196			Name:               p.Name,
197			BaseURL:            p.APIEndpoint,
198			APIKey:             p.APIKey,
199			APIKeyTemplate:     p.APIKey, // Store original template for re-resolution
200			OAuthToken:         config.OAuthToken,
201			Type:               p.Type,
202			Disable:            config.Disable,
203			SystemPromptPrefix: config.SystemPromptPrefix,
204			ExtraHeaders:       headers,
205			ExtraBody:          config.ExtraBody,
206			ExtraParams:        make(map[string]string),
207			Models:             p.Models,
208		}
209
210		switch {
211		case p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil:
212			prepared.SetupClaudeCode()
213		case p.ID == catwalk.InferenceProviderCopilot:
214			if config.OAuthToken != nil {
215				prepared.SetupGitHubCopilot()
216			}
217		}
218
219		switch p.ID {
220		// Handle specific providers that require additional configuration
221		case catwalk.InferenceProviderVertexAI:
222			if !hasVertexCredentials(env) {
223				if configExists {
224					slog.Warn("Skipping Vertex AI provider due to missing credentials")
225					c.Providers.Del(string(p.ID))
226				}
227				continue
228			}
229			prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
230			prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
231		case catwalk.InferenceProviderAzure:
232			endpoint, err := resolver.ResolveValue(p.APIEndpoint)
233			if err != nil || endpoint == "" {
234				if configExists {
235					slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
236					c.Providers.Del(string(p.ID))
237				}
238				continue
239			}
240			prepared.BaseURL = endpoint
241			prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
242		case catwalk.InferenceProviderBedrock:
243			if !hasAWSCredentials(env) {
244				if configExists {
245					slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
246					c.Providers.Del(string(p.ID))
247				}
248				continue
249			}
250			prepared.ExtraParams["region"] = env.Get("AWS_REGION")
251			if prepared.ExtraParams["region"] == "" {
252				prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
253			}
254			for _, model := range p.Models {
255				if !strings.HasPrefix(model.ID, "anthropic.") {
256					return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
257				}
258			}
259		default:
260			// if the provider api or endpoint are missing we skip them
261			v, err := resolver.ResolveValue(p.APIKey)
262			if v == "" || err != nil {
263				if configExists {
264					slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
265					c.Providers.Del(string(p.ID))
266				}
267				continue
268			}
269		}
270		c.Providers.Set(string(p.ID), prepared)
271	}
272
273	// validate the custom providers
274	for id, providerConfig := range c.Providers.Seq2() {
275		if knownProviderNames[id] {
276			continue
277		}
278
279		// Make sure the provider ID is set
280		providerConfig.ID = id
281		if providerConfig.Name == "" {
282			providerConfig.Name = id // Use ID as name if not set
283		}
284		// default to OpenAI if not set
285		if providerConfig.Type == "" {
286			providerConfig.Type = catwalk.TypeOpenAICompat
287		}
288		if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) && providerConfig.Type != hyper.Name {
289			slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
290			c.Providers.Del(id)
291			continue
292		}
293
294		if providerConfig.Disable {
295			slog.Debug("Skipping custom provider due to disable flag", "provider", id)
296			c.Providers.Del(id)
297			continue
298		}
299		if providerConfig.APIKey == "" {
300			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
301		}
302		if providerConfig.BaseURL == "" {
303			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
304			c.Providers.Del(id)
305			continue
306		}
307		if len(providerConfig.Models) == 0 {
308			slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
309			c.Providers.Del(id)
310			continue
311		}
312		apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
313		if apiKey == "" || err != nil {
314			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
315		}
316		baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
317		if baseURL == "" || err != nil {
318			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
319			c.Providers.Del(id)
320			continue
321		}
322
323		for k, v := range providerConfig.ExtraHeaders {
324			resolved, err := resolver.ResolveValue(v)
325			if err != nil {
326				continue
327			}
328			providerConfig.ExtraHeaders[k] = resolved
329		}
330
331		c.Providers.Set(id, providerConfig)
332	}
333	return nil
334}
335
336func (c *Config) setDefaults(workingDir, dataDir string) {
337	c.workingDir = workingDir
338	if c.Options == nil {
339		c.Options = &Options{}
340	}
341	if c.Options.TUI == nil {
342		c.Options.TUI = &TUIOptions{}
343	}
344	if c.Options.ContextPaths == nil {
345		c.Options.ContextPaths = []string{}
346	}
347	if c.Options.SkillsPaths == nil {
348		c.Options.SkillsPaths = []string{}
349	}
350	if dataDir != "" {
351		c.Options.DataDirectory = dataDir
352	} else if c.Options.DataDirectory == "" {
353		if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
354			c.Options.DataDirectory = path
355		} else {
356			c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
357		}
358	}
359	if c.Providers == nil {
360		c.Providers = csync.NewMap[string, ProviderConfig]()
361	}
362	if c.Models == nil {
363		c.Models = make(map[SelectedModelType]SelectedModel)
364	}
365	if c.RecentModels == nil {
366		c.RecentModels = make(map[SelectedModelType][]SelectedModel)
367	}
368	if c.MCP == nil {
369		c.MCP = make(map[string]MCPConfig)
370	}
371	if c.LSP == nil {
372		c.LSP = make(map[string]LSPConfig)
373	}
374
375	// Apply defaults to LSP configurations
376	c.applyLSPDefaults()
377
378	// Add the default context paths if they are not already present
379	c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
380	slices.Sort(c.Options.ContextPaths)
381	c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
382
383	// Add the default skills directory if not already present.
384	defaultSkillsDir := GlobalSkillsDir()
385	if !slices.Contains(c.Options.SkillsPaths, defaultSkillsDir) {
386		c.Options.SkillsPaths = append([]string{defaultSkillsDir}, c.Options.SkillsPaths...)
387	}
388
389	if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
390		c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
391	}
392
393	if c.Options.Attribution == nil {
394		c.Options.Attribution = &Attribution{
395			TrailerStyle:  TrailerStyleAssistedBy,
396			GeneratedWith: true,
397		}
398	} else if c.Options.Attribution.TrailerStyle == "" {
399		// Migrate deprecated co_authored_by or apply default
400		if c.Options.Attribution.CoAuthoredBy != nil {
401			if *c.Options.Attribution.CoAuthoredBy {
402				c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
403			} else {
404				c.Options.Attribution.TrailerStyle = TrailerStyleNone
405			}
406		} else {
407			c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
408		}
409	}
410	if c.Options.InitializeAs == "" {
411		c.Options.InitializeAs = defaultInitializeAs
412	}
413}
414
415// applyLSPDefaults applies default values from powernap to LSP configurations
416func (c *Config) applyLSPDefaults() {
417	// Get powernap's default configuration
418	configManager := powernapConfig.NewManager()
419	configManager.LoadDefaults()
420
421	// Apply defaults to each LSP configuration
422	for name, cfg := range c.LSP {
423		// Try to get defaults from powernap based on name or command name.
424		base, ok := configManager.GetServer(name)
425		if !ok {
426			base, ok = configManager.GetServer(cfg.Command)
427			if !ok {
428				continue
429			}
430		}
431		if cfg.Options == nil {
432			cfg.Options = base.Settings
433		}
434		if cfg.InitOptions == nil {
435			cfg.InitOptions = base.InitOptions
436		}
437		if len(cfg.FileTypes) == 0 {
438			cfg.FileTypes = base.FileTypes
439		}
440		if len(cfg.RootMarkers) == 0 {
441			cfg.RootMarkers = base.RootMarkers
442		}
443		if cfg.Command == "" {
444			cfg.Command = base.Command
445		}
446		if len(cfg.Args) == 0 {
447			cfg.Args = base.Args
448		}
449		if len(cfg.Env) == 0 {
450			cfg.Env = base.Environment
451		}
452		// Update the config in the map
453		c.LSP[name] = cfg
454	}
455}
456
457func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
458	if len(knownProviders) == 0 && c.Providers.Len() == 0 {
459		err = fmt.Errorf("no providers configured, please configure at least one provider")
460		return largeModel, smallModel, err
461	}
462
463	// Use the first provider enabled based on the known providers order
464	// if no provider found that is known use the first provider configured
465	for _, p := range knownProviders {
466		providerConfig, ok := c.Providers.Get(string(p.ID))
467		if !ok || providerConfig.Disable {
468			continue
469		}
470		defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
471		if defaultLargeModel == nil {
472			err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
473			return largeModel, smallModel, err
474		}
475		largeModel = SelectedModel{
476			Provider:        string(p.ID),
477			Model:           defaultLargeModel.ID,
478			MaxTokens:       defaultLargeModel.DefaultMaxTokens,
479			ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
480		}
481
482		defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
483		if defaultSmallModel == nil {
484			err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
485			return largeModel, smallModel, err
486		}
487		smallModel = SelectedModel{
488			Provider:        string(p.ID),
489			Model:           defaultSmallModel.ID,
490			MaxTokens:       defaultSmallModel.DefaultMaxTokens,
491			ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
492		}
493		return largeModel, smallModel, err
494	}
495
496	enabledProviders := c.EnabledProviders()
497	slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
498		return strings.Compare(a.ID, b.ID)
499	})
500
501	if len(enabledProviders) == 0 {
502		err = fmt.Errorf("no providers configured, please configure at least one provider")
503		return largeModel, smallModel, err
504	}
505
506	providerConfig := enabledProviders[0]
507	if len(providerConfig.Models) == 0 {
508		err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
509		return largeModel, smallModel, err
510	}
511	defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
512	largeModel = SelectedModel{
513		Provider:  providerConfig.ID,
514		Model:     defaultLargeModel.ID,
515		MaxTokens: defaultLargeModel.DefaultMaxTokens,
516	}
517	defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
518	smallModel = SelectedModel{
519		Provider:  providerConfig.ID,
520		Model:     defaultSmallModel.ID,
521		MaxTokens: defaultSmallModel.DefaultMaxTokens,
522	}
523	return largeModel, smallModel, err
524}
525
526func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
527	defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
528	if err != nil {
529		return fmt.Errorf("failed to select default models: %w", err)
530	}
531	large, small := defaultLarge, defaultSmall
532
533	largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
534	if largeModelConfigured {
535		if largeModelSelected.Model != "" {
536			large.Model = largeModelSelected.Model
537		}
538		if largeModelSelected.Provider != "" {
539			large.Provider = largeModelSelected.Provider
540		}
541		model := c.GetModel(large.Provider, large.Model)
542		if model == nil {
543			large = defaultLarge
544			// override the model type to large
545			err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
546			if err != nil {
547				return fmt.Errorf("failed to update preferred large model: %w", err)
548			}
549		} else {
550			if largeModelSelected.MaxTokens > 0 {
551				large.MaxTokens = largeModelSelected.MaxTokens
552			} else {
553				large.MaxTokens = model.DefaultMaxTokens
554			}
555			if largeModelSelected.ReasoningEffort != "" {
556				large.ReasoningEffort = largeModelSelected.ReasoningEffort
557			}
558			large.Think = largeModelSelected.Think
559			if largeModelSelected.Temperature != nil {
560				large.Temperature = largeModelSelected.Temperature
561			}
562			if largeModelSelected.TopP != nil {
563				large.TopP = largeModelSelected.TopP
564			}
565			if largeModelSelected.TopK != nil {
566				large.TopK = largeModelSelected.TopK
567			}
568			if largeModelSelected.FrequencyPenalty != nil {
569				large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
570			}
571			if largeModelSelected.PresencePenalty != nil {
572				large.PresencePenalty = largeModelSelected.PresencePenalty
573			}
574		}
575	}
576	smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
577	if smallModelConfigured {
578		if smallModelSelected.Model != "" {
579			small.Model = smallModelSelected.Model
580		}
581		if smallModelSelected.Provider != "" {
582			small.Provider = smallModelSelected.Provider
583		}
584
585		model := c.GetModel(small.Provider, small.Model)
586		if model == nil {
587			small = defaultSmall
588			// override the model type to small
589			err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
590			if err != nil {
591				return fmt.Errorf("failed to update preferred small model: %w", err)
592			}
593		} else {
594			if smallModelSelected.MaxTokens > 0 {
595				small.MaxTokens = smallModelSelected.MaxTokens
596			} else {
597				small.MaxTokens = model.DefaultMaxTokens
598			}
599			if smallModelSelected.ReasoningEffort != "" {
600				small.ReasoningEffort = smallModelSelected.ReasoningEffort
601			}
602			if smallModelSelected.Temperature != nil {
603				small.Temperature = smallModelSelected.Temperature
604			}
605			if smallModelSelected.TopP != nil {
606				small.TopP = smallModelSelected.TopP
607			}
608			if smallModelSelected.TopK != nil {
609				small.TopK = smallModelSelected.TopK
610			}
611			if smallModelSelected.FrequencyPenalty != nil {
612				small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
613			}
614			if smallModelSelected.PresencePenalty != nil {
615				small.PresencePenalty = smallModelSelected.PresencePenalty
616			}
617			small.Think = smallModelSelected.Think
618		}
619	}
620	c.Models[SelectedModelTypeLarge] = large
621	c.Models[SelectedModelTypeSmall] = small
622	return nil
623}
624
625// lookupConfigs searches config files recursively from CWD up to FS root
626func lookupConfigs(cwd string) []string {
627	// prepend default config paths
628	configPaths := []string{
629		GlobalConfig(),
630		GlobalConfigData(),
631	}
632
633	configNames := []string{appName + ".json", "." + appName + ".json"}
634
635	foundConfigs, err := fsext.Lookup(cwd, configNames...)
636	if err != nil {
637		// returns at least default configs
638		return configPaths
639	}
640
641	// reverse order so last config has more priority
642	slices.Reverse(foundConfigs)
643
644	return append(configPaths, foundConfigs...)
645}
646
647func loadFromConfigPaths(configPaths []string) (*Config, error) {
648	var configs []io.Reader
649
650	for _, path := range configPaths {
651		fd, err := os.Open(path)
652		if err != nil {
653			if os.IsNotExist(err) {
654				continue
655			}
656			return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
657		}
658		defer fd.Close()
659
660		configs = append(configs, fd)
661	}
662
663	return loadFromReaders(configs)
664}
665
666func loadFromReaders(readers []io.Reader) (*Config, error) {
667	if len(readers) == 0 {
668		return &Config{}, nil
669	}
670
671	merged, err := Merge(readers)
672	if err != nil {
673		return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
674	}
675
676	return LoadReader(merged)
677}
678
679func hasVertexCredentials(env env.Env) bool {
680	hasProject := env.Get("VERTEXAI_PROJECT") != ""
681	hasLocation := env.Get("VERTEXAI_LOCATION") != ""
682	return hasProject && hasLocation
683}
684
685func hasAWSCredentials(env env.Env) bool {
686	if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
687		return true
688	}
689
690	if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
691		return true
692	}
693
694	if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
695		return true
696	}
697
698	if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
699		return true
700	}
701
702	if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
703		env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
704		return true
705	}
706
707	if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil && !testing.Testing() {
708		return true
709	}
710
711	return false
712}
713
714// GlobalConfig returns the global configuration file path for the application.
715func GlobalConfig() string {
716	if crushGlobal := os.Getenv("CRUSH_GLOBAL_CONFIG"); crushGlobal != "" {
717		return filepath.Join(crushGlobal, fmt.Sprintf("%s.json", appName))
718	}
719	if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
720		return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
721	}
722	return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
723}
724
725// GlobalConfigData returns the path to the main data directory for the application.
726// this config is used when the app overrides configurations instead of updating the global config.
727func GlobalConfigData() string {
728	if crushData := os.Getenv("CRUSH_GLOBAL_DATA"); crushData != "" {
729		return filepath.Join(crushData, fmt.Sprintf("%s.json", appName))
730	}
731	if xdgDataHome := os.Getenv("XDG_DATA_HOME"); xdgDataHome != "" {
732		return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
733	}
734
735	// return the path to the main data directory
736	// for windows, it should be in `%LOCALAPPDATA%/crush/`
737	// for linux and macOS, it should be in `$HOME/.local/share/crush/`
738	if runtime.GOOS == "windows" {
739		localAppData := cmp.Or(
740			os.Getenv("LOCALAPPDATA"),
741			filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
742		)
743		return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
744	}
745
746	return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
747}
748
749func assignIfNil[T any](ptr **T, val T) {
750	if *ptr == nil {
751		*ptr = &val
752	}
753}
754
755func isInsideWorktree() bool {
756	bts, err := exec.CommandContext(
757		context.Background(),
758		"git", "rev-parse",
759		"--is-inside-work-tree",
760	).CombinedOutput()
761	return err == nil && strings.TrimSpace(string(bts)) == "true"
762}
763
764// GlobalSkillsDir returns the default directory for Agent Skills.
765// Skills in this directory are auto-discovered and their files can be read
766// without permission prompts.
767func GlobalSkillsDir() string {
768	if crushSkills := os.Getenv("CRUSH_SKILLS_DIR"); crushSkills != "" {
769		return crushSkills
770	}
771	if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
772		return filepath.Join(xdgConfigHome, appName, "skills")
773	}
774
775	if runtime.GOOS == "windows" {
776		localAppData := cmp.Or(
777			os.Getenv("LOCALAPPDATA"),
778			filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
779		)
780		return filepath.Join(localAppData, appName, "skills")
781	}
782
783	return filepath.Join(home.Dir(), ".config", appName, "skills")
784}