1package config
2
3import (
4 "context"
5 "encoding/json"
6 "fmt"
7 "io"
8 "log/slog"
9 "maps"
10 "os"
11 "os/exec"
12 "path/filepath"
13 "runtime"
14 "slices"
15 "strconv"
16 "strings"
17
18 "github.com/charmbracelet/catwalk/pkg/catwalk"
19 "github.com/charmbracelet/crush/internal/csync"
20 "github.com/charmbracelet/crush/internal/env"
21 "github.com/charmbracelet/crush/internal/fsext"
22 "github.com/charmbracelet/crush/internal/home"
23 "github.com/charmbracelet/crush/internal/log"
24 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
25)
26
27const defaultCatwalkURL = "https://catwalk.charm.sh"
28
29// LoadReader config via io.Reader.
30func LoadReader(fd io.Reader) (*Config, error) {
31 data, err := io.ReadAll(fd)
32 if err != nil {
33 return nil, err
34 }
35
36 var config Config
37 err = json.Unmarshal(data, &config)
38 if err != nil {
39 return nil, err
40 }
41 return &config, err
42}
43
44// Load loads the configuration from the default paths.
45func Load(workingDir, dataDir string, debug bool) (*Config, error) {
46 configPaths := lookupConfigs(workingDir)
47
48 cfg, err := loadFromConfigPaths(configPaths)
49 if err != nil {
50 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
51 }
52
53 cfg.dataConfigDir = GlobalConfigData()
54
55 cfg.setDefaults(workingDir, dataDir)
56
57 if debug {
58 cfg.Options.Debug = true
59 }
60
61 // Setup logs
62 log.Setup(
63 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
64 cfg.Options.Debug,
65 )
66
67 if !isInsideWorktree() {
68 const depth = 2
69 const items = 100
70 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
71 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
72 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
73 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
74 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
75 }
76
77 // Load known providers, this loads the config from catwalk
78 providers, err := Providers(cfg)
79 if err != nil {
80 return nil, err
81 }
82 cfg.knownProviders = providers
83
84 env := env.New()
85 // Configure providers
86 valueResolver := NewShellVariableResolver(env)
87 cfg.resolver = valueResolver
88 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
89 return nil, fmt.Errorf("failed to configure providers: %w", err)
90 }
91
92 if !cfg.IsConfigured() {
93 slog.Warn("No providers configured")
94 return cfg, nil
95 }
96
97 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
98 return nil, fmt.Errorf("failed to configure selected models: %w", err)
99 }
100 cfg.SetupAgents()
101 return cfg, nil
102}
103
104func PushPopCrushEnv() func() {
105 found := []string{}
106 for _, ev := range os.Environ() {
107 if strings.HasPrefix(ev, "CRUSH_") {
108 pair := strings.SplitN(ev, "=", 2)
109 if len(pair) != 2 {
110 continue
111 }
112 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
113 }
114 }
115 backups := make(map[string]string)
116 for _, ev := range found {
117 backups[ev] = os.Getenv(ev)
118 }
119
120 for _, ev := range found {
121 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
122 }
123
124 restore := func() {
125 for k, v := range backups {
126 os.Setenv(k, v)
127 }
128 }
129 return restore
130}
131
132func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
133 knownProviderNames := make(map[string]bool)
134 restore := PushPopCrushEnv()
135 defer restore()
136
137 for _, p := range knownProviders {
138 knownProviderNames[string(p.ID)] = true
139 config, configExists := c.Providers.Get(string(p.ID))
140 // if the user configured a known provider we need to allow it to override a couple of parameters
141 if configExists {
142 if config.BaseURL != "" {
143 p.APIEndpoint = config.BaseURL
144 }
145 if config.APIKey != "" {
146 p.APIKey = config.APIKey
147 }
148 if len(config.Models) > 0 {
149 models := []catwalk.Model{}
150 seen := make(map[string]bool)
151
152 for _, model := range config.Models {
153 if seen[model.ID] {
154 continue
155 }
156 seen[model.ID] = true
157 if model.Name == "" {
158 model.Name = model.ID
159 }
160 models = append(models, model)
161 }
162 for _, model := range p.Models {
163 if seen[model.ID] {
164 continue
165 }
166 seen[model.ID] = true
167 if model.Name == "" {
168 model.Name = model.ID
169 }
170 models = append(models, model)
171 }
172
173 p.Models = models
174 }
175 }
176
177 headers := map[string]string{}
178 if len(p.DefaultHeaders) > 0 {
179 maps.Copy(headers, p.DefaultHeaders)
180 }
181 if len(config.ExtraHeaders) > 0 {
182 maps.Copy(headers, config.ExtraHeaders)
183 }
184 prepared := ProviderConfig{
185 ID: string(p.ID),
186 Name: p.Name,
187 BaseURL: p.APIEndpoint,
188 APIKey: p.APIKey,
189 APIKeyTemplate: p.APIKey, // Store original template for re-resolution
190 OAuthToken: config.OAuthToken,
191 Type: p.Type,
192 Disable: config.Disable,
193 SystemPromptPrefix: config.SystemPromptPrefix,
194 ExtraHeaders: headers,
195 ExtraBody: config.ExtraBody,
196 ExtraParams: make(map[string]string),
197 Models: p.Models,
198 }
199
200 if p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil {
201 prepared.SetupClaudeCode()
202 }
203
204 switch p.ID {
205 // Handle specific providers that require additional configuration
206 case catwalk.InferenceProviderVertexAI:
207 if !hasVertexCredentials(env) {
208 if configExists {
209 slog.Warn("Skipping Vertex AI provider due to missing credentials")
210 c.Providers.Del(string(p.ID))
211 }
212 continue
213 }
214 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
215 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
216 case catwalk.InferenceProviderAzure:
217 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
218 if err != nil || endpoint == "" {
219 if configExists {
220 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
221 c.Providers.Del(string(p.ID))
222 }
223 continue
224 }
225 prepared.BaseURL = endpoint
226 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
227 case catwalk.InferenceProviderBedrock:
228 if !hasAWSCredentials(env) {
229 if configExists {
230 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
231 c.Providers.Del(string(p.ID))
232 }
233 continue
234 }
235 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
236 if prepared.ExtraParams["region"] == "" {
237 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
238 }
239 for _, model := range p.Models {
240 if !strings.HasPrefix(model.ID, "anthropic.") {
241 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
242 }
243 }
244 default:
245 // if the provider api or endpoint are missing we skip them
246 v, err := resolver.ResolveValue(p.APIKey)
247 if v == "" || err != nil {
248 if configExists {
249 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
250 c.Providers.Del(string(p.ID))
251 }
252 continue
253 }
254 }
255 c.Providers.Set(string(p.ID), prepared)
256 }
257
258 // validate the custom providers
259 for id, providerConfig := range c.Providers.Seq2() {
260 if knownProviderNames[id] {
261 continue
262 }
263
264 // Make sure the provider ID is set
265 providerConfig.ID = id
266 if providerConfig.Name == "" {
267 providerConfig.Name = id // Use ID as name if not set
268 }
269 // default to OpenAI if not set
270 if providerConfig.Type == "" {
271 providerConfig.Type = catwalk.TypeOpenAICompat
272 }
273 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
274 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
275 c.Providers.Del(id)
276 continue
277 }
278
279 if providerConfig.Disable {
280 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
281 c.Providers.Del(id)
282 continue
283 }
284 if providerConfig.APIKey == "" {
285 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
286 }
287 if providerConfig.BaseURL == "" {
288 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
289 c.Providers.Del(id)
290 continue
291 }
292 if len(providerConfig.Models) == 0 {
293 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
294 c.Providers.Del(id)
295 continue
296 }
297 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
298 if apiKey == "" || err != nil {
299 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
300 }
301 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
302 if baseURL == "" || err != nil {
303 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
304 c.Providers.Del(id)
305 continue
306 }
307
308 c.Providers.Set(id, providerConfig)
309 }
310 return nil
311}
312
313func (c *Config) setDefaults(workingDir, dataDir string) {
314 c.workingDir = workingDir
315 if c.Options == nil {
316 c.Options = &Options{}
317 }
318 if c.Options.TUI == nil {
319 c.Options.TUI = &TUIOptions{}
320 }
321 if c.Options.ContextPaths == nil {
322 c.Options.ContextPaths = []string{}
323 }
324 if dataDir != "" {
325 c.Options.DataDirectory = dataDir
326 } else if c.Options.DataDirectory == "" {
327 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
328 c.Options.DataDirectory = path
329 } else {
330 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
331 }
332 }
333 if c.Providers == nil {
334 c.Providers = csync.NewMap[string, ProviderConfig]()
335 }
336 if c.Models == nil {
337 c.Models = make(map[SelectedModelType]SelectedModel)
338 }
339 if c.RecentModels == nil {
340 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
341 }
342 if c.MCP == nil {
343 c.MCP = make(map[string]MCPConfig)
344 }
345 if c.LSP == nil {
346 c.LSP = make(map[string]LSPConfig)
347 }
348
349 // Apply defaults to LSP configurations
350 c.applyLSPDefaults()
351
352 // Add the default context paths if they are not already present
353 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
354 slices.Sort(c.Options.ContextPaths)
355 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
356
357 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
358 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
359 }
360
361 if c.Options.Attribution == nil {
362 c.Options.Attribution = &Attribution{
363 TrailerStyle: TrailerStyleAssistedBy,
364 GeneratedWith: true,
365 }
366 } else if c.Options.Attribution.TrailerStyle == "" {
367 // Migrate deprecated co_authored_by or apply default
368 if c.Options.Attribution.CoAuthoredBy != nil {
369 if *c.Options.Attribution.CoAuthoredBy {
370 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
371 } else {
372 c.Options.Attribution.TrailerStyle = TrailerStyleNone
373 }
374 } else {
375 c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
376 }
377 }
378 if c.Options.InitializeAs == "" {
379 c.Options.InitializeAs = defaultInitializeAs
380 }
381}
382
383// applyLSPDefaults applies default values from powernap to LSP configurations
384func (c *Config) applyLSPDefaults() {
385 // Get powernap's default configuration
386 configManager := powernapConfig.NewManager()
387 configManager.LoadDefaults()
388
389 // Apply defaults to each LSP configuration
390 for name, cfg := range c.LSP {
391 // Try to get defaults from powernap based on name or command name.
392 base, ok := configManager.GetServer(name)
393 if !ok {
394 base, ok = configManager.GetServer(cfg.Command)
395 if !ok {
396 continue
397 }
398 }
399 if cfg.Options == nil {
400 cfg.Options = base.Settings
401 }
402 if cfg.InitOptions == nil {
403 cfg.InitOptions = base.InitOptions
404 }
405 if len(cfg.FileTypes) == 0 {
406 cfg.FileTypes = base.FileTypes
407 }
408 if len(cfg.RootMarkers) == 0 {
409 cfg.RootMarkers = base.RootMarkers
410 }
411 if cfg.Command == "" {
412 cfg.Command = base.Command
413 }
414 if len(cfg.Args) == 0 {
415 cfg.Args = base.Args
416 }
417 if len(cfg.Env) == 0 {
418 cfg.Env = base.Environment
419 }
420 // Update the config in the map
421 c.LSP[name] = cfg
422 }
423}
424
425func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
426 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
427 err = fmt.Errorf("no providers configured, please configure at least one provider")
428 return largeModel, smallModel, err
429 }
430
431 // Use the first provider enabled based on the known providers order
432 // if no provider found that is known use the first provider configured
433 for _, p := range knownProviders {
434 providerConfig, ok := c.Providers.Get(string(p.ID))
435 if !ok || providerConfig.Disable {
436 continue
437 }
438 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
439 if defaultLargeModel == nil {
440 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
441 return largeModel, smallModel, err
442 }
443 largeModel = SelectedModel{
444 Provider: string(p.ID),
445 Model: defaultLargeModel.ID,
446 MaxTokens: defaultLargeModel.DefaultMaxTokens,
447 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
448 }
449
450 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
451 if defaultSmallModel == nil {
452 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
453 return largeModel, smallModel, err
454 }
455 smallModel = SelectedModel{
456 Provider: string(p.ID),
457 Model: defaultSmallModel.ID,
458 MaxTokens: defaultSmallModel.DefaultMaxTokens,
459 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
460 }
461 return largeModel, smallModel, err
462 }
463
464 enabledProviders := c.EnabledProviders()
465 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
466 return strings.Compare(a.ID, b.ID)
467 })
468
469 if len(enabledProviders) == 0 {
470 err = fmt.Errorf("no providers configured, please configure at least one provider")
471 return largeModel, smallModel, err
472 }
473
474 providerConfig := enabledProviders[0]
475 if len(providerConfig.Models) == 0 {
476 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
477 return largeModel, smallModel, err
478 }
479 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
480 largeModel = SelectedModel{
481 Provider: providerConfig.ID,
482 Model: defaultLargeModel.ID,
483 MaxTokens: defaultLargeModel.DefaultMaxTokens,
484 }
485 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
486 smallModel = SelectedModel{
487 Provider: providerConfig.ID,
488 Model: defaultSmallModel.ID,
489 MaxTokens: defaultSmallModel.DefaultMaxTokens,
490 }
491 return largeModel, smallModel, err
492}
493
494func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
495 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
496 if err != nil {
497 return fmt.Errorf("failed to select default models: %w", err)
498 }
499 large, small := defaultLarge, defaultSmall
500
501 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
502 if largeModelConfigured {
503 if largeModelSelected.Model != "" {
504 large.Model = largeModelSelected.Model
505 }
506 if largeModelSelected.Provider != "" {
507 large.Provider = largeModelSelected.Provider
508 }
509 model := c.GetModel(large.Provider, large.Model)
510 if model == nil {
511 large = defaultLarge
512 // override the model type to large
513 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
514 if err != nil {
515 return fmt.Errorf("failed to update preferred large model: %w", err)
516 }
517 } else {
518 if largeModelSelected.MaxTokens > 0 {
519 large.MaxTokens = largeModelSelected.MaxTokens
520 } else {
521 large.MaxTokens = model.DefaultMaxTokens
522 }
523 if largeModelSelected.ReasoningEffort != "" {
524 large.ReasoningEffort = largeModelSelected.ReasoningEffort
525 }
526 large.Think = largeModelSelected.Think
527 if largeModelSelected.Temperature != nil {
528 large.Temperature = largeModelSelected.Temperature
529 }
530 if largeModelSelected.TopP != nil {
531 large.TopP = largeModelSelected.TopP
532 }
533 if largeModelSelected.TopK != nil {
534 large.TopK = largeModelSelected.TopK
535 }
536 if largeModelSelected.FrequencyPenalty != nil {
537 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
538 }
539 if largeModelSelected.PresencePenalty != nil {
540 large.PresencePenalty = largeModelSelected.PresencePenalty
541 }
542 }
543 }
544 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
545 if smallModelConfigured {
546 if smallModelSelected.Model != "" {
547 small.Model = smallModelSelected.Model
548 }
549 if smallModelSelected.Provider != "" {
550 small.Provider = smallModelSelected.Provider
551 }
552
553 model := c.GetModel(small.Provider, small.Model)
554 if model == nil {
555 small = defaultSmall
556 // override the model type to small
557 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
558 if err != nil {
559 return fmt.Errorf("failed to update preferred small model: %w", err)
560 }
561 } else {
562 if smallModelSelected.MaxTokens > 0 {
563 small.MaxTokens = smallModelSelected.MaxTokens
564 } else {
565 small.MaxTokens = model.DefaultMaxTokens
566 }
567 if smallModelSelected.ReasoningEffort != "" {
568 small.ReasoningEffort = smallModelSelected.ReasoningEffort
569 }
570 if smallModelSelected.Temperature != nil {
571 small.Temperature = smallModelSelected.Temperature
572 }
573 if smallModelSelected.TopP != nil {
574 small.TopP = smallModelSelected.TopP
575 }
576 if smallModelSelected.TopK != nil {
577 small.TopK = smallModelSelected.TopK
578 }
579 if smallModelSelected.FrequencyPenalty != nil {
580 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
581 }
582 if smallModelSelected.PresencePenalty != nil {
583 small.PresencePenalty = smallModelSelected.PresencePenalty
584 }
585 small.Think = smallModelSelected.Think
586 }
587 }
588 c.Models[SelectedModelTypeLarge] = large
589 c.Models[SelectedModelTypeSmall] = small
590 return nil
591}
592
593// lookupConfigs searches config files recursively from CWD up to FS root
594func lookupConfigs(cwd string) []string {
595 // prepend default config paths
596 configPaths := []string{
597 GlobalConfig(),
598 GlobalConfigData(),
599 }
600
601 configNames := []string{appName + ".json", "." + appName + ".json"}
602
603 foundConfigs, err := fsext.Lookup(cwd, configNames...)
604 if err != nil {
605 // returns at least default configs
606 return configPaths
607 }
608
609 // reverse order so last config has more priority
610 slices.Reverse(foundConfigs)
611
612 return append(configPaths, foundConfigs...)
613}
614
615func loadFromConfigPaths(configPaths []string) (*Config, error) {
616 var configs []io.Reader
617
618 for _, path := range configPaths {
619 fd, err := os.Open(path)
620 if err != nil {
621 if os.IsNotExist(err) {
622 continue
623 }
624 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
625 }
626 defer fd.Close()
627
628 configs = append(configs, fd)
629 }
630
631 return loadFromReaders(configs)
632}
633
634func loadFromReaders(readers []io.Reader) (*Config, error) {
635 if len(readers) == 0 {
636 return &Config{}, nil
637 }
638
639 merged, err := Merge(readers)
640 if err != nil {
641 return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
642 }
643
644 return LoadReader(merged)
645}
646
647func hasVertexCredentials(env env.Env) bool {
648 hasProject := env.Get("VERTEXAI_PROJECT") != ""
649 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
650 return hasProject && hasLocation
651}
652
653func hasAWSCredentials(env env.Env) bool {
654 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
655 return true
656 }
657
658 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
659 return true
660 }
661
662 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
663 return true
664 }
665
666 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
667 return true
668 }
669
670 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
671 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
672 return true
673 }
674
675 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil {
676 return true
677 }
678
679 return false
680}
681
682// GlobalConfig returns the global configuration file path for the application.
683func GlobalConfig() string {
684 xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
685 if xdgConfigHome != "" {
686 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
687 }
688
689 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
690}
691
692// GlobalConfigData returns the path to the main data directory for the application.
693// this config is used when the app overrides configurations instead of updating the global config.
694func GlobalConfigData() string {
695 xdgDataHome := os.Getenv("XDG_DATA_HOME")
696 if xdgDataHome != "" {
697 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
698 }
699
700 // return the path to the main data directory
701 // for windows, it should be in `%LOCALAPPDATA%/crush/`
702 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
703 if runtime.GOOS == "windows" {
704 localAppData := os.Getenv("LOCALAPPDATA")
705 if localAppData == "" {
706 localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
707 }
708 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
709 }
710
711 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
712}
713
714func assignIfNil[T any](ptr **T, val T) {
715 if *ptr == nil {
716 *ptr = &val
717 }
718}
719
720func isInsideWorktree() bool {
721 bts, err := exec.CommandContext(
722 context.Background(),
723 "git", "rev-parse",
724 "--is-inside-work-tree",
725 ).CombinedOutput()
726 return err == nil && strings.TrimSpace(string(bts)) == "true"
727}