1package config
2
3import (
4 "context"
5 "encoding/json"
6 "fmt"
7 "io"
8 "log/slog"
9 "maps"
10 "os"
11 "os/exec"
12 "path/filepath"
13 "runtime"
14 "slices"
15 "strconv"
16 "strings"
17 "testing"
18
19 "github.com/charmbracelet/catwalk/pkg/catwalk"
20 "github.com/charmbracelet/crush/internal/agent/hyper"
21 "github.com/charmbracelet/crush/internal/csync"
22 "github.com/charmbracelet/crush/internal/env"
23 "github.com/charmbracelet/crush/internal/fsext"
24 "github.com/charmbracelet/crush/internal/home"
25 "github.com/charmbracelet/crush/internal/log"
26 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
27)
28
29const defaultCatwalkURL = "https://catwalk.charm.sh"
30
31// LoadReader config via io.Reader.
32func LoadReader(fd io.Reader) (*Config, error) {
33 data, err := io.ReadAll(fd)
34 if err != nil {
35 return nil, err
36 }
37
38 var config Config
39 err = json.Unmarshal(data, &config)
40 if err != nil {
41 return nil, err
42 }
43 return &config, err
44}
45
46// Load loads the configuration from the default paths.
47func Load(workingDir, dataDir string, debug bool) (*Config, error) {
48 configPaths := lookupConfigs(workingDir)
49
50 cfg, err := loadFromConfigPaths(configPaths)
51 if err != nil {
52 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
53 }
54
55 cfg.dataConfigDir = GlobalConfigData()
56
57 cfg.setDefaults(workingDir, dataDir)
58
59 if debug {
60 cfg.Options.Debug = true
61 }
62
63 // Setup logs
64 log.Setup(
65 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
66 cfg.Options.Debug,
67 )
68
69 if !isInsideWorktree() {
70 const depth = 2
71 const items = 100
72 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
73 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
74 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
75 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
76 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
77 }
78
79 // Load known providers, this loads the config from catwalk
80 providers, err := Providers(cfg)
81 if err != nil {
82 return nil, err
83 }
84 cfg.knownProviders = providers
85
86 env := env.New()
87 // Configure providers
88 valueResolver := NewShellVariableResolver(env)
89 cfg.resolver = valueResolver
90 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
91 return nil, fmt.Errorf("failed to configure providers: %w", err)
92 }
93
94 if !cfg.IsConfigured() {
95 slog.Warn("No providers configured")
96 return cfg, nil
97 }
98
99 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
100 return nil, fmt.Errorf("failed to configure selected models: %w", err)
101 }
102 cfg.SetupAgents()
103 return cfg, nil
104}
105
106func PushPopCrushEnv() func() {
107 found := []string{}
108 for _, ev := range os.Environ() {
109 if strings.HasPrefix(ev, "CRUSH_") {
110 pair := strings.SplitN(ev, "=", 2)
111 if len(pair) != 2 {
112 continue
113 }
114 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
115 }
116 }
117 backups := make(map[string]string)
118 for _, ev := range found {
119 backups[ev] = os.Getenv(ev)
120 }
121
122 for _, ev := range found {
123 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
124 }
125
126 restore := func() {
127 for k, v := range backups {
128 os.Setenv(k, v)
129 }
130 }
131 return restore
132}
133
134func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
135 knownProviderNames := make(map[string]bool)
136 restore := PushPopCrushEnv()
137 defer restore()
138
139 for _, p := range knownProviders {
140 knownProviderNames[string(p.ID)] = true
141 config, configExists := c.Providers.Get(string(p.ID))
142 // if the user configured a known provider we need to allow it to override a couple of parameters
143 if configExists {
144 if config.BaseURL != "" {
145 p.APIEndpoint = config.BaseURL
146 }
147 if config.APIKey != "" {
148 p.APIKey = config.APIKey
149 }
150 if len(config.Models) > 0 {
151 models := []catwalk.Model{}
152 seen := make(map[string]bool)
153
154 for _, model := range config.Models {
155 if seen[model.ID] {
156 continue
157 }
158 seen[model.ID] = true
159 if model.Name == "" {
160 model.Name = model.ID
161 }
162 models = append(models, model)
163 }
164 for _, model := range p.Models {
165 if seen[model.ID] {
166 continue
167 }
168 seen[model.ID] = true
169 if model.Name == "" {
170 model.Name = model.ID
171 }
172 models = append(models, model)
173 }
174
175 p.Models = models
176 }
177 }
178
179 headers := map[string]string{}
180 if len(p.DefaultHeaders) > 0 {
181 maps.Copy(headers, p.DefaultHeaders)
182 }
183 if len(config.ExtraHeaders) > 0 {
184 maps.Copy(headers, config.ExtraHeaders)
185 }
186 prepared := ProviderConfig{
187 ID: string(p.ID),
188 Name: p.Name,
189 BaseURL: p.APIEndpoint,
190 APIKey: p.APIKey,
191 APIKeyTemplate: p.APIKey, // Store original template for re-resolution
192 OAuthToken: config.OAuthToken,
193 Type: p.Type,
194 Disable: config.Disable,
195 SystemPromptPrefix: config.SystemPromptPrefix,
196 ExtraHeaders: headers,
197 ExtraBody: config.ExtraBody,
198 ExtraParams: make(map[string]string),
199 Models: p.Models,
200 }
201
202 if p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil {
203 prepared.SetupClaudeCode()
204 }
205
206 switch p.ID {
207 // Handle specific providers that require additional configuration
208 case catwalk.InferenceProviderVertexAI:
209 if !hasVertexCredentials(env) {
210 if configExists {
211 slog.Warn("Skipping Vertex AI provider due to missing credentials")
212 c.Providers.Del(string(p.ID))
213 }
214 continue
215 }
216 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
217 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
218 case catwalk.InferenceProviderAzure:
219 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
220 if err != nil || endpoint == "" {
221 if configExists {
222 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
223 c.Providers.Del(string(p.ID))
224 }
225 continue
226 }
227 prepared.BaseURL = endpoint
228 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
229 case catwalk.InferenceProviderBedrock:
230 if !hasAWSCredentials(env) {
231 if configExists {
232 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
233 c.Providers.Del(string(p.ID))
234 }
235 continue
236 }
237 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
238 if prepared.ExtraParams["region"] == "" {
239 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
240 }
241 for _, model := range p.Models {
242 if !strings.HasPrefix(model.ID, "anthropic.") {
243 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
244 }
245 }
246 default:
247 // if the provider api or endpoint are missing we skip them
248 v, err := resolver.ResolveValue(p.APIKey)
249 if v == "" || err != nil {
250 if configExists {
251 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
252 c.Providers.Del(string(p.ID))
253 }
254 continue
255 }
256 }
257 c.Providers.Set(string(p.ID), prepared)
258 }
259
260 // validate the custom providers
261 for id, providerConfig := range c.Providers.Seq2() {
262 if knownProviderNames[id] {
263 continue
264 }
265
266 // Make sure the provider ID is set
267 providerConfig.ID = id
268 if providerConfig.Name == "" {
269 providerConfig.Name = id // Use ID as name if not set
270 }
271 // default to OpenAI if not set
272 if providerConfig.Type == "" {
273 providerConfig.Type = catwalk.TypeOpenAICompat
274 }
275 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) && providerConfig.Type != hyper.Name {
276 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
277 c.Providers.Del(id)
278 continue
279 }
280
281 if providerConfig.Disable {
282 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
283 c.Providers.Del(id)
284 continue
285 }
286 if providerConfig.APIKey == "" {
287 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
288 }
289 if providerConfig.BaseURL == "" {
290 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
291 c.Providers.Del(id)
292 continue
293 }
294 if len(providerConfig.Models) == 0 {
295 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
296 c.Providers.Del(id)
297 continue
298 }
299 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
300 if apiKey == "" || err != nil {
301 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
302 }
303 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
304 if baseURL == "" || err != nil {
305 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
306 c.Providers.Del(id)
307 continue
308 }
309
310 c.Providers.Set(id, providerConfig)
311 }
312 return nil
313}
314
315func (c *Config) setDefaults(workingDir, dataDir string) {
316 c.workingDir = workingDir
317 if c.Options == nil {
318 c.Options = &Options{}
319 }
320 if c.Options.TUI == nil {
321 c.Options.TUI = &TUIOptions{}
322 }
323 if c.Options.ContextPaths == nil {
324 c.Options.ContextPaths = []string{}
325 }
326 if dataDir != "" {
327 c.Options.DataDirectory = dataDir
328 } else if c.Options.DataDirectory == "" {
329 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
330 c.Options.DataDirectory = path
331 } else {
332 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
333 }
334 }
335 if c.Providers == nil {
336 c.Providers = csync.NewMap[string, ProviderConfig]()
337 }
338 if c.Models == nil {
339 c.Models = make(map[SelectedModelType]SelectedModel)
340 }
341 if c.RecentModels == nil {
342 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
343 }
344 if c.MCP == nil {
345 c.MCP = make(map[string]MCPConfig)
346 }
347 if c.LSP == nil {
348 c.LSP = make(map[string]LSPConfig)
349 }
350
351 // Apply defaults to LSP configurations
352 c.applyLSPDefaults()
353
354 // Add the default context paths if they are not already present
355 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
356 slices.Sort(c.Options.ContextPaths)
357 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
358
359 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
360 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
361 }
362
363 if c.Options.Attribution == nil {
364 c.Options.Attribution = &Attribution{
365 TrailerStyle: TrailerStyleAssistedBy,
366 GeneratedWith: true,
367 }
368 } else if c.Options.Attribution.TrailerStyle == "" {
369 // Migrate deprecated co_authored_by or apply default
370 if c.Options.Attribution.CoAuthoredBy != nil {
371 if *c.Options.Attribution.CoAuthoredBy {
372 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
373 } else {
374 c.Options.Attribution.TrailerStyle = TrailerStyleNone
375 }
376 } else {
377 c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
378 }
379 }
380 if c.Options.InitializeAs == "" {
381 c.Options.InitializeAs = defaultInitializeAs
382 }
383}
384
385// applyLSPDefaults applies default values from powernap to LSP configurations
386func (c *Config) applyLSPDefaults() {
387 // Get powernap's default configuration
388 configManager := powernapConfig.NewManager()
389 configManager.LoadDefaults()
390
391 // Apply defaults to each LSP configuration
392 for name, cfg := range c.LSP {
393 // Try to get defaults from powernap based on name or command name.
394 base, ok := configManager.GetServer(name)
395 if !ok {
396 base, ok = configManager.GetServer(cfg.Command)
397 if !ok {
398 continue
399 }
400 }
401 if cfg.Options == nil {
402 cfg.Options = base.Settings
403 }
404 if cfg.InitOptions == nil {
405 cfg.InitOptions = base.InitOptions
406 }
407 if len(cfg.FileTypes) == 0 {
408 cfg.FileTypes = base.FileTypes
409 }
410 if len(cfg.RootMarkers) == 0 {
411 cfg.RootMarkers = base.RootMarkers
412 }
413 if cfg.Command == "" {
414 cfg.Command = base.Command
415 }
416 if len(cfg.Args) == 0 {
417 cfg.Args = base.Args
418 }
419 if len(cfg.Env) == 0 {
420 cfg.Env = base.Environment
421 }
422 // Update the config in the map
423 c.LSP[name] = cfg
424 }
425}
426
427func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
428 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
429 err = fmt.Errorf("no providers configured, please configure at least one provider")
430 return largeModel, smallModel, err
431 }
432
433 // Use the first provider enabled based on the known providers order
434 // if no provider found that is known use the first provider configured
435 for _, p := range knownProviders {
436 providerConfig, ok := c.Providers.Get(string(p.ID))
437 if !ok || providerConfig.Disable {
438 continue
439 }
440 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
441 if defaultLargeModel == nil {
442 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
443 return largeModel, smallModel, err
444 }
445 largeModel = SelectedModel{
446 Provider: string(p.ID),
447 Model: defaultLargeModel.ID,
448 MaxTokens: defaultLargeModel.DefaultMaxTokens,
449 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
450 }
451
452 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
453 if defaultSmallModel == nil {
454 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
455 return largeModel, smallModel, err
456 }
457 smallModel = SelectedModel{
458 Provider: string(p.ID),
459 Model: defaultSmallModel.ID,
460 MaxTokens: defaultSmallModel.DefaultMaxTokens,
461 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
462 }
463 return largeModel, smallModel, err
464 }
465
466 enabledProviders := c.EnabledProviders()
467 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
468 return strings.Compare(a.ID, b.ID)
469 })
470
471 if len(enabledProviders) == 0 {
472 err = fmt.Errorf("no providers configured, please configure at least one provider")
473 return largeModel, smallModel, err
474 }
475
476 providerConfig := enabledProviders[0]
477 if len(providerConfig.Models) == 0 {
478 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
479 return largeModel, smallModel, err
480 }
481 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
482 largeModel = SelectedModel{
483 Provider: providerConfig.ID,
484 Model: defaultLargeModel.ID,
485 MaxTokens: defaultLargeModel.DefaultMaxTokens,
486 }
487 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
488 smallModel = SelectedModel{
489 Provider: providerConfig.ID,
490 Model: defaultSmallModel.ID,
491 MaxTokens: defaultSmallModel.DefaultMaxTokens,
492 }
493 return largeModel, smallModel, err
494}
495
496func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
497 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
498 if err != nil {
499 return fmt.Errorf("failed to select default models: %w", err)
500 }
501 large, small := defaultLarge, defaultSmall
502
503 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
504 if largeModelConfigured {
505 if largeModelSelected.Model != "" {
506 large.Model = largeModelSelected.Model
507 }
508 if largeModelSelected.Provider != "" {
509 large.Provider = largeModelSelected.Provider
510 }
511 model := c.GetModel(large.Provider, large.Model)
512 if model == nil {
513 large = defaultLarge
514 // override the model type to large
515 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
516 if err != nil {
517 return fmt.Errorf("failed to update preferred large model: %w", err)
518 }
519 } else {
520 if largeModelSelected.MaxTokens > 0 {
521 large.MaxTokens = largeModelSelected.MaxTokens
522 } else {
523 large.MaxTokens = model.DefaultMaxTokens
524 }
525 if largeModelSelected.ReasoningEffort != "" {
526 large.ReasoningEffort = largeModelSelected.ReasoningEffort
527 }
528 large.Think = largeModelSelected.Think
529 if largeModelSelected.Temperature != nil {
530 large.Temperature = largeModelSelected.Temperature
531 }
532 if largeModelSelected.TopP != nil {
533 large.TopP = largeModelSelected.TopP
534 }
535 if largeModelSelected.TopK != nil {
536 large.TopK = largeModelSelected.TopK
537 }
538 if largeModelSelected.FrequencyPenalty != nil {
539 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
540 }
541 if largeModelSelected.PresencePenalty != nil {
542 large.PresencePenalty = largeModelSelected.PresencePenalty
543 }
544 }
545 }
546 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
547 if smallModelConfigured {
548 if smallModelSelected.Model != "" {
549 small.Model = smallModelSelected.Model
550 }
551 if smallModelSelected.Provider != "" {
552 small.Provider = smallModelSelected.Provider
553 }
554
555 model := c.GetModel(small.Provider, small.Model)
556 if model == nil {
557 small = defaultSmall
558 // override the model type to small
559 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
560 if err != nil {
561 return fmt.Errorf("failed to update preferred small model: %w", err)
562 }
563 } else {
564 if smallModelSelected.MaxTokens > 0 {
565 small.MaxTokens = smallModelSelected.MaxTokens
566 } else {
567 small.MaxTokens = model.DefaultMaxTokens
568 }
569 if smallModelSelected.ReasoningEffort != "" {
570 small.ReasoningEffort = smallModelSelected.ReasoningEffort
571 }
572 if smallModelSelected.Temperature != nil {
573 small.Temperature = smallModelSelected.Temperature
574 }
575 if smallModelSelected.TopP != nil {
576 small.TopP = smallModelSelected.TopP
577 }
578 if smallModelSelected.TopK != nil {
579 small.TopK = smallModelSelected.TopK
580 }
581 if smallModelSelected.FrequencyPenalty != nil {
582 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
583 }
584 if smallModelSelected.PresencePenalty != nil {
585 small.PresencePenalty = smallModelSelected.PresencePenalty
586 }
587 small.Think = smallModelSelected.Think
588 }
589 }
590 c.Models[SelectedModelTypeLarge] = large
591 c.Models[SelectedModelTypeSmall] = small
592 return nil
593}
594
595// lookupConfigs searches config files recursively from CWD up to FS root
596func lookupConfigs(cwd string) []string {
597 // prepend default config paths
598 configPaths := []string{
599 GlobalConfig(),
600 GlobalConfigData(),
601 }
602
603 configNames := []string{appName + ".json", "." + appName + ".json"}
604
605 foundConfigs, err := fsext.Lookup(cwd, configNames...)
606 if err != nil {
607 // returns at least default configs
608 return configPaths
609 }
610
611 // reverse order so last config has more priority
612 slices.Reverse(foundConfigs)
613
614 return append(configPaths, foundConfigs...)
615}
616
617func loadFromConfigPaths(configPaths []string) (*Config, error) {
618 var configs []io.Reader
619
620 for _, path := range configPaths {
621 fd, err := os.Open(path)
622 if err != nil {
623 if os.IsNotExist(err) {
624 continue
625 }
626 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
627 }
628 defer fd.Close()
629
630 configs = append(configs, fd)
631 }
632
633 return loadFromReaders(configs)
634}
635
636func loadFromReaders(readers []io.Reader) (*Config, error) {
637 if len(readers) == 0 {
638 return &Config{}, nil
639 }
640
641 merged, err := Merge(readers)
642 if err != nil {
643 return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
644 }
645
646 return LoadReader(merged)
647}
648
649func hasVertexCredentials(env env.Env) bool {
650 hasProject := env.Get("VERTEXAI_PROJECT") != ""
651 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
652 return hasProject && hasLocation
653}
654
655func hasAWSCredentials(env env.Env) bool {
656 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
657 return true
658 }
659
660 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
661 return true
662 }
663
664 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
665 return true
666 }
667
668 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
669 return true
670 }
671
672 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
673 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
674 return true
675 }
676
677 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil && !testing.Testing() {
678 return true
679 }
680
681 return false
682}
683
684// GlobalConfig returns the global configuration file path for the application.
685func GlobalConfig() string {
686 xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
687 if xdgConfigHome != "" {
688 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
689 }
690
691 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
692}
693
694// GlobalConfigData returns the path to the main data directory for the application.
695// this config is used when the app overrides configurations instead of updating the global config.
696func GlobalConfigData() string {
697 xdgDataHome := os.Getenv("XDG_DATA_HOME")
698 if xdgDataHome != "" {
699 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
700 }
701
702 // return the path to the main data directory
703 // for windows, it should be in `%LOCALAPPDATA%/crush/`
704 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
705 if runtime.GOOS == "windows" {
706 localAppData := os.Getenv("LOCALAPPDATA")
707 if localAppData == "" {
708 localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
709 }
710 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
711 }
712
713 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
714}
715
716func assignIfNil[T any](ptr **T, val T) {
717 if *ptr == nil {
718 *ptr = &val
719 }
720}
721
722func isInsideWorktree() bool {
723 bts, err := exec.CommandContext(
724 context.Background(),
725 "git", "rev-parse",
726 "--is-inside-work-tree",
727 ).CombinedOutput()
728 return err == nil && strings.TrimSpace(string(bts)) == "true"
729}