config.go

  1package config
  2
  3import (
  4	"cmp"
  5	"context"
  6	"errors"
  7	"fmt"
  8	"maps"
  9	"net/http"
 10	"net/url"
 11	"slices"
 12	"strings"
 13	"time"
 14
 15	"charm.land/catwalk/pkg/catwalk"
 16	"github.com/charmbracelet/crush/internal/csync"
 17	"github.com/charmbracelet/crush/internal/oauth"
 18	"github.com/charmbracelet/crush/internal/oauth/copilot"
 19	"github.com/invopop/jsonschema"
 20)
 21
 22const (
 23	appName              = "crush"
 24	defaultDataDirectory = ".crush"
 25	defaultInitializeAs  = "AGENTS.md"
 26)
 27
 28var defaultContextPaths = []string{
 29	".github/copilot-instructions.md",
 30	".cursorrules",
 31	".cursor/rules/",
 32	"CLAUDE.md",
 33	"CLAUDE.local.md",
 34	"GEMINI.md",
 35	"gemini.md",
 36	"crush.md",
 37	"crush.local.md",
 38	"Crush.md",
 39	"Crush.local.md",
 40	"CRUSH.md",
 41	"CRUSH.local.md",
 42	"AGENTS.md",
 43	"agents.md",
 44	"Agents.md",
 45}
 46
 47type SelectedModelType string
 48
 49// String returns the string representation of the [SelectedModelType].
 50func (s SelectedModelType) String() string {
 51	return string(s)
 52}
 53
 54const (
 55	SelectedModelTypeLarge SelectedModelType = "large"
 56	SelectedModelTypeSmall SelectedModelType = "small"
 57)
 58
 59const (
 60	AgentCoder string = "coder"
 61	AgentTask  string = "task"
 62)
 63
 64type SelectedModel struct {
 65	// The model id as used by the provider API.
 66	// Required.
 67	Model string `json:"model" jsonschema:"required,description=The model ID as used by the provider API,example=gpt-4o"`
 68	// The model provider, same as the key/id used in the providers config.
 69	// Required.
 70	Provider string `json:"provider" jsonschema:"required,description=The model provider ID that matches a key in the providers config,example=openai"`
 71
 72	// Only used by models that use the openai provider and need this set.
 73	ReasoningEffort string `json:"reasoning_effort,omitempty" jsonschema:"description=Reasoning effort level for OpenAI models that support it,enum=low,enum=medium,enum=high"`
 74
 75	// Used by anthropic models that can reason to indicate if the model should think.
 76	Think bool `json:"think,omitempty" jsonschema:"description=Enable thinking mode for Anthropic models that support reasoning"`
 77
 78	// Overrides the default model configuration.
 79	MaxTokens        int64    `json:"max_tokens,omitempty" jsonschema:"description=Maximum number of tokens for model responses,maximum=200000,example=4096"`
 80	Temperature      *float64 `json:"temperature,omitempty" jsonschema:"description=Sampling temperature,minimum=0,maximum=1,example=0.7"`
 81	TopP             *float64 `json:"top_p,omitempty" jsonschema:"description=Top-p (nucleus) sampling parameter,minimum=0,maximum=1,example=0.9"`
 82	TopK             *int64   `json:"top_k,omitempty" jsonschema:"description=Top-k sampling parameter"`
 83	FrequencyPenalty *float64 `json:"frequency_penalty,omitempty" jsonschema:"description=Frequency penalty to reduce repetition"`
 84	PresencePenalty  *float64 `json:"presence_penalty,omitempty" jsonschema:"description=Presence penalty to increase topic diversity"`
 85
 86	// Override provider specific options.
 87	ProviderOptions map[string]any `json:"provider_options,omitempty" jsonschema:"description=Additional provider-specific options for the model"`
 88}
 89
 90type ProviderConfig struct {
 91	// The provider's id.
 92	ID string `json:"id,omitempty" jsonschema:"description=Unique identifier for the provider,example=openai"`
 93	// The provider's name, used for display purposes.
 94	Name string `json:"name,omitempty" jsonschema:"description=Human-readable name for the provider,example=OpenAI"`
 95	// The provider's API endpoint.
 96	BaseURL string `json:"base_url,omitempty" jsonschema:"description=Base URL for the provider's API,format=uri,example=https://api.openai.com/v1"`
 97	// The provider type, e.g. "openai", "anthropic", etc. if empty it defaults to openai.
 98	Type catwalk.Type `json:"type,omitempty" jsonschema:"description=Provider type that determines the API format,enum=openai,enum=openai-compat,enum=anthropic,enum=gemini,enum=azure,enum=vertexai,default=openai"`
 99	// The provider's API key.
100	APIKey string `json:"api_key,omitempty" jsonschema:"description=API key for authentication with the provider,example=$OPENAI_API_KEY"`
101	// The original API key template before resolution (for re-resolution on auth errors).
102	APIKeyTemplate string `json:"-"`
103	// OAuthToken for providers that use OAuth2 authentication.
104	OAuthToken *oauth.Token `json:"oauth,omitempty" jsonschema:"description=OAuth2 token for authentication with the provider"`
105	// Marks the provider as disabled.
106	Disable bool `json:"disable,omitempty" jsonschema:"description=Whether this provider is disabled,default=false"`
107
108	// Custom system prompt prefix.
109	SystemPromptPrefix string `json:"system_prompt_prefix,omitempty" jsonschema:"description=Custom prefix to add to system prompts for this provider"`
110
111	// Extra headers to send with each request to the provider. Values
112	// run through shell expansion at config-load time, so $VAR and
113	// $(cmd) work the same way they do in MCP headers. A header whose
114	// value resolves to the empty string (unset bare $VAR under
115	// lenient nounset, $(echo), or literal "") is omitted from the
116	// outgoing request rather than sent as "Header:". See PLAN.md
117	// Phase 2 design decision #18.
118	ExtraHeaders map[string]string `json:"extra_headers,omitempty" jsonschema:"description=Additional HTTP headers to send with requests"`
119	// ExtraBody is merged verbatim into OpenAI-compatible request
120	// bodies. String values are NOT shell-expanded: this is a plain
121	// JSON passthrough so that arbitrary provider-extension fields
122	// (numbers, nested objects, booleans) round-trip without a
123	// recursive walker guessing at intent. If you need an env-var-
124	// driven value at request time, put it in extra_headers, or in
125	// the provider's top-level api_key / base_url, all of which do
126	// expand. See PLAN.md Phase 2 design decision #16.
127	ExtraBody map[string]any `json:"extra_body,omitempty" jsonschema:"description=Additional fields to include in request bodies\\, only works with openai-compatible providers"`
128
129	ProviderOptions map[string]any `json:"provider_options,omitempty" jsonschema:"description=Additional provider-specific options for this provider"`
130
131	// Used to pass extra parameters to the provider.
132	ExtraParams map[string]string `json:"-"`
133
134	// Skip cost accumulation for this provider when using subscription or flat rate billing.
135	FlatRate bool `json:"flat_rate,omitempty" jsonschema:"description=Flat-rate mode for this provider"`
136
137	// The provider models
138	Models []catwalk.Model `json:"models,omitempty" jsonschema:"description=List of models available from this provider"`
139}
140
141// ToProvider converts the [ProviderConfig] to a [catwalk.Provider].
142func (c *ProviderConfig) ToProvider() catwalk.Provider {
143	// Convert config provider to provider.Provider format
144	provider := catwalk.Provider{
145		Name:   c.Name,
146		ID:     catwalk.InferenceProvider(c.ID),
147		Models: make([]catwalk.Model, len(c.Models)),
148	}
149
150	// Convert models
151	for i, model := range c.Models {
152		provider.Models[i] = catwalk.Model{
153			ID:                     model.ID,
154			Name:                   model.Name,
155			CostPer1MIn:            model.CostPer1MIn,
156			CostPer1MOut:           model.CostPer1MOut,
157			CostPer1MInCached:      model.CostPer1MInCached,
158			CostPer1MOutCached:     model.CostPer1MOutCached,
159			ContextWindow:          model.ContextWindow,
160			DefaultMaxTokens:       model.DefaultMaxTokens,
161			CanReason:              model.CanReason,
162			ReasoningLevels:        model.ReasoningLevels,
163			DefaultReasoningEffort: model.DefaultReasoningEffort,
164			SupportsImages:         model.SupportsImages,
165		}
166	}
167
168	return provider
169}
170
171func (c *ProviderConfig) SetupGitHubCopilot() {
172	maps.Copy(c.ExtraHeaders, copilot.Headers())
173}
174
175type MCPType string
176
177const (
178	MCPStdio MCPType = "stdio"
179	MCPSSE   MCPType = "sse"
180	MCPHttp  MCPType = "http"
181)
182
183type MCPConfig struct {
184	Command       string            `json:"command,omitempty" jsonschema:"description=Command to execute for stdio MCP servers,example=npx"`
185	Env           map[string]string `json:"env,omitempty" jsonschema:"description=Environment variables to set for the MCP server"`
186	Args          []string          `json:"args,omitempty" jsonschema:"description=Arguments to pass to the MCP server command"`
187	Type          MCPType           `json:"type" jsonschema:"required,description=Type of MCP connection,enum=stdio,enum=sse,enum=http,default=stdio"`
188	URL           string            `json:"url,omitempty" jsonschema:"description=URL for HTTP or SSE MCP servers,format=uri,example=http://localhost:3000/mcp"`
189	Disabled      bool              `json:"disabled,omitempty" jsonschema:"description=Whether this MCP server is disabled,default=false"`
190	DisabledTools []string          `json:"disabled_tools,omitempty" jsonschema:"description=List of tools from this MCP server to disable,example=get-library-doc"`
191	Timeout       int               `json:"timeout,omitempty" jsonschema:"description=Timeout in seconds for MCP server connections,default=15,example=30,example=60,example=120"`
192
193	// Headers are HTTP headers for HTTP/SSE MCP servers. Values run
194	// through shell expansion at MCP startup, so $VAR and $(cmd)
195	// work. A header whose value resolves to the empty string (unset
196	// bare $VAR under lenient nounset, $(echo), or literal "") is
197	// omitted from the outgoing request rather than sent as
198	// "Header:". See PLAN.md Phase 2 design decision #18.
199	Headers map[string]string `json:"headers,omitempty" jsonschema:"description=HTTP headers for HTTP/SSE MCP servers"`
200}
201
202type LSPConfig struct {
203	Disabled    bool              `json:"disabled,omitempty" jsonschema:"description=Whether this LSP server is disabled,default=false"`
204	Command     string            `json:"command,omitempty" jsonschema:"description=Command to execute for the LSP server,example=gopls"`
205	Args        []string          `json:"args,omitempty" jsonschema:"description=Arguments to pass to the LSP server command"`
206	Env         map[string]string `json:"env,omitempty" jsonschema:"description=Environment variables to set to the LSP server command"`
207	FileTypes   []string          `json:"filetypes,omitempty" jsonschema:"description=File types this LSP server handles,example=go,example=mod,example=rs,example=c,example=js,example=ts"`
208	RootMarkers []string          `json:"root_markers,omitempty" jsonschema:"description=Files or directories that indicate the project root,example=go.mod,example=package.json,example=Cargo.toml"`
209	InitOptions map[string]any    `json:"init_options,omitempty" jsonschema:"description=Initialization options passed to the LSP server during initialize request"`
210	Options     map[string]any    `json:"options,omitempty" jsonschema:"description=LSP server-specific settings passed during initialization"`
211	Timeout     int               `json:"timeout,omitempty" jsonschema:"description=Timeout in seconds for LSP server initialization,default=30,example=60,example=120"`
212}
213
214type TUIOptions struct {
215	CompactMode bool   `json:"compact_mode,omitempty" jsonschema:"description=Enable compact mode for the TUI interface,default=false"`
216	DiffMode    string `json:"diff_mode,omitempty" jsonschema:"description=Diff mode for the TUI interface,enum=unified,enum=split"`
217	// Here we can add themes later or any TUI related options
218	//
219
220	Completions Completions `json:"completions,omitzero" jsonschema:"description=Completions UI options"`
221	Transparent *bool       `json:"transparent,omitempty" jsonschema:"description=Enable transparent background for the TUI interface,default=false"`
222}
223
224// Completions defines options for the completions UI.
225type Completions struct {
226	MaxDepth *int `json:"max_depth,omitempty" jsonschema:"description=Maximum depth for the ls tool,default=0,example=10"`
227	MaxItems *int `json:"max_items,omitempty" jsonschema:"description=Maximum number of items to return for the ls tool,default=1000,example=100"`
228}
229
230func (c Completions) Limits() (depth, items int) {
231	return ptrValOr(c.MaxDepth, 0), ptrValOr(c.MaxItems, 0)
232}
233
234type Permissions struct {
235	AllowedTools []string `json:"allowed_tools,omitempty" jsonschema:"description=List of tools that don't require permission prompts,example=bash,example=view"`
236}
237
238type TrailerStyle string
239
240const (
241	TrailerStyleNone         TrailerStyle = "none"
242	TrailerStyleCoAuthoredBy TrailerStyle = "co-authored-by"
243	TrailerStyleAssistedBy   TrailerStyle = "assisted-by"
244)
245
246type Attribution struct {
247	TrailerStyle  TrailerStyle `json:"trailer_style,omitempty" jsonschema:"description=Style of attribution trailer to add to commits,enum=none,enum=co-authored-by,enum=assisted-by,default=assisted-by"`
248	CoAuthoredBy  *bool        `json:"co_authored_by,omitempty" jsonschema:"description=Deprecated: use trailer_style instead"`
249	GeneratedWith bool         `json:"generated_with,omitempty" jsonschema:"description=Add Generated with Crush line to commit messages and issues and PRs,default=true"`
250}
251
252// JSONSchemaExtend marks the co_authored_by field as deprecated in the schema.
253func (Attribution) JSONSchemaExtend(schema *jsonschema.Schema) {
254	if schema.Properties != nil {
255		if prop, ok := schema.Properties.Get("co_authored_by"); ok {
256			prop.Deprecated = true
257		}
258	}
259}
260
261type Options struct {
262	ContextPaths              []string     `json:"context_paths,omitempty" jsonschema:"description=Paths to files containing context information for the AI,example=.cursorrules,example=CRUSH.md"`
263	SkillsPaths               []string     `json:"skills_paths,omitempty" jsonschema:"description=Paths to directories containing Agent Skills (folders with SKILL.md files),example=~/.config/crush/skills,example=./skills"`
264	TUI                       *TUIOptions  `json:"tui,omitempty" jsonschema:"description=Terminal user interface options"`
265	Debug                     bool         `json:"debug,omitempty" jsonschema:"description=Enable debug logging,default=false"`
266	DebugLSP                  bool         `json:"debug_lsp,omitempty" jsonschema:"description=Enable debug logging for LSP servers,default=false"`
267	DisableAutoSummarize      bool         `json:"disable_auto_summarize,omitempty" jsonschema:"description=Disable automatic conversation summarization,default=false"`
268	DataDirectory             string       `json:"data_directory,omitempty" jsonschema:"description=Directory for storing application data (relative to working directory),default=.crush,example=.crush"` // Relative to the cwd
269	DisabledTools             []string     `json:"disabled_tools,omitempty" jsonschema:"description=List of built-in tools to disable and hide from the agent,example=bash,example=sourcegraph"`
270	DisableProviderAutoUpdate bool         `json:"disable_provider_auto_update,omitempty" jsonschema:"description=Disable providers auto-update,default=false"`
271	DisableDefaultProviders   bool         `json:"disable_default_providers,omitempty" jsonschema:"description=Ignore all default/embedded providers. When enabled\\, providers must be fully specified in the config file with base_url\\, models\\, and api_key - no merging with defaults occurs,default=false"`
272	Attribution               *Attribution `json:"attribution,omitempty" jsonschema:"description=Attribution settings for generated content"`
273	DisableMetrics            bool         `json:"disable_metrics,omitempty" jsonschema:"description=Disable sending metrics,default=false"`
274	InitializeAs              string       `json:"initialize_as,omitempty" jsonschema:"description=Name of the context file to create/update during project initialization,default=AGENTS.md,example=AGENTS.md,example=CRUSH.md,example=CLAUDE.md,example=docs/LLMs.md"`
275	AutoLSP                   *bool        `json:"auto_lsp,omitempty" jsonschema:"description=Automatically setup LSPs based on root markers,default=true"`
276	Progress                  *bool        `json:"progress,omitempty" jsonschema:"description=Show indeterminate progress updates during long operations,default=true"`
277	DisableNotifications      bool         `json:"disable_notifications,omitempty" jsonschema:"description=Disable desktop notifications,default=false"`
278	DisabledSkills            []string     `json:"disabled_skills,omitempty" jsonschema:"description=List of skill names to disable and hide from the agent,example=crush-config"`
279}
280
281type MCPs map[string]MCPConfig
282
283type MCP struct {
284	Name string    `json:"name"`
285	MCP  MCPConfig `json:"mcp"`
286}
287
288func (m MCPs) Sorted() []MCP {
289	sorted := make([]MCP, 0, len(m))
290	for k, v := range m {
291		sorted = append(sorted, MCP{
292			Name: k,
293			MCP:  v,
294		})
295	}
296	slices.SortFunc(sorted, func(a, b MCP) int {
297		return strings.Compare(a.Name, b.Name)
298	})
299	return sorted
300}
301
302type LSPs map[string]LSPConfig
303
304type LSP struct {
305	Name string    `json:"name"`
306	LSP  LSPConfig `json:"lsp"`
307}
308
309func (l LSPs) Sorted() []LSP {
310	sorted := make([]LSP, 0, len(l))
311	for k, v := range l {
312		sorted = append(sorted, LSP{
313			Name: k,
314			LSP:  v,
315		})
316	}
317	slices.SortFunc(sorted, func(a, b LSP) int {
318		return strings.Compare(a.Name, b.Name)
319	})
320	return sorted
321}
322
323// ResolvedEnv returns m.Env with every value expanded through the
324// given resolver. The returned slice is of the form "KEY=value" sorted
325// by key so callers get deterministic output; the receiver's Env map is
326// not mutated. On the first resolution failure it returns nil and an
327// error that identifies the offending key; the inner resolver error is
328// already sanitized by ResolveValue and is wrapped with %w so
329// errors.Is/As continues to work. Callers are expected to surface it
330// (for MCP, via StateError on the status card) rather than silently
331// spawn the server with an empty credential.
332//
333// The resolver choice matters: in server mode pass the shell resolver
334// so $VAR / $(cmd) expand; in client mode pass IdentityResolver so the
335// template is forwarded verbatim and expansion happens on the server.
336func (m MCPConfig) ResolvedEnv(r VariableResolver) ([]string, error) {
337	return resolveEnvs(m.Env, r)
338}
339
340// ResolvedArgs returns m.Args with every element expanded through the
341// given resolver. A fresh slice is allocated; m.Args is never mutated.
342// On the first resolution failure it returns nil and an error
343// identifying the offending positional index; the inner resolver error
344// is already sanitized by ResolveValue and is wrapped with %w so
345// errors.Is/As continues to work.
346//
347// See ResolvedEnv for guidance on picking a resolver.
348func (m MCPConfig) ResolvedArgs(r VariableResolver) ([]string, error) {
349	if len(m.Args) == 0 {
350		return nil, nil
351	}
352	out := make([]string, len(m.Args))
353	for i, a := range m.Args {
354		v, err := r.ResolveValue(a)
355		if err != nil {
356			return nil, fmt.Errorf("arg %d: %w", i, err)
357		}
358		out[i] = v
359	}
360	return out, nil
361}
362
363// ResolvedURL returns m.URL expanded through the given resolver. The
364// receiver is not mutated. Errors from the resolver are already
365// sanitized by ResolveValue and are wrapped with %w for errors.Is/As.
366//
367// URLs run through the same shell-expansion pipeline as the other
368// fields, so a literal '$' (e.g. OData query strings containing
369// $filter/$select) must be escaped as '\$' or '${DOLLAR:-$}' to avoid
370// being interpreted as a variable reference. Same constraint already
371// applies to command, args, env, and headers.
372//
373// See ResolvedEnv for guidance on picking a resolver.
374func (m MCPConfig) ResolvedURL(r VariableResolver) (string, error) {
375	if m.URL == "" {
376		return "", nil
377	}
378	v, err := r.ResolveValue(m.URL)
379	if err != nil {
380		return "", fmt.Errorf("url: %w", err)
381	}
382	return v, nil
383}
384
385// ResolvedHeaders returns m.Headers with every value expanded through
386// the given resolver. A fresh map is allocated; m.Headers is never
387// mutated. On the first resolution failure it returns nil and an error
388// identifying the offending header name; the inner resolver error is
389// already sanitized by ResolveValue and is wrapped with %w so
390// errors.Is/As continues to work.
391//
392// A header whose value resolves to the empty string (unset bare $VAR
393// under lenient nounset, $(echo), or literal "") is omitted from the
394// returned map — sending "X-Auth:" with an empty value is rejected by
395// some providers and the user's intent in "optional, env-gated
396// header" is clearly "absent when the var isn't set." See PLAN.md
397// Phase 2 design decision #18.
398//
399// See ResolvedEnv for guidance on picking a resolver.
400func (m MCPConfig) ResolvedHeaders(r VariableResolver) (map[string]string, error) {
401	if len(m.Headers) == 0 {
402		return map[string]string{}, nil
403	}
404	out := make(map[string]string, len(m.Headers))
405	// Sort keys so failures are reported deterministically when more
406	// than one header would fail.
407	keys := make([]string, 0, len(m.Headers))
408	for k := range m.Headers {
409		keys = append(keys, k)
410	}
411	slices.Sort(keys)
412	for _, k := range keys {
413		v, err := r.ResolveValue(m.Headers[k])
414		if err != nil {
415			return nil, fmt.Errorf("header %s: %w", k, err)
416		}
417		if v == "" {
418			continue
419		}
420		out[k] = v
421	}
422	return out, nil
423}
424
425// ResolvedArgs returns l.Args with every element expanded through the
426// given resolver. A fresh slice is allocated; l.Args is never mutated.
427// On the first resolution failure it returns nil and an error
428// identifying the offending positional index; the inner resolver error
429// is already sanitized by ResolveValue and is wrapped with %w so
430// errors.Is/As continues to work.
431//
432// Empty resolved values are kept (a deliberate "empty positional arg"
433// like --flag "" is sometimes valid), matching MCPConfig.ResolvedArgs;
434// see PLAN.md Phase 2 design decision #18.
435//
436// The resolver choice matters: in server mode pass the shell resolver
437// so $VAR / $(cmd) expand; in client mode pass IdentityResolver so the
438// template is forwarded verbatim. See PLAN.md Phase 2 design decision
439// #13.
440func (l LSPConfig) ResolvedArgs(r VariableResolver) ([]string, error) {
441	if len(l.Args) == 0 {
442		return nil, nil
443	}
444	out := make([]string, len(l.Args))
445	for i, a := range l.Args {
446		v, err := r.ResolveValue(a)
447		if err != nil {
448			return nil, fmt.Errorf("arg %d: %w", i, err)
449		}
450		out[i] = v
451	}
452	return out, nil
453}
454
455// ResolvedEnv returns l.Env with every value expanded through the
456// given resolver. A fresh map is allocated; l.Env is never mutated.
457// On the first resolution failure it returns nil and an error that
458// identifies the offending key; the inner resolver error is already
459// sanitized by ResolveValue and is wrapped with %w so errors.Is/As
460// continues to work.
461//
462// Empty resolved values are kept ("FOO=" is a legitimate request;
463// opt out via ${VAR:+...}), matching MCPConfig.ResolvedEnv; see
464// PLAN.md Phase 2 design decision #18.
465//
466// Shape note: this returns map[string]string rather than the []string
467// shape MCPConfig.ResolvedEnv uses because the consumer
468// (powernap.ClientConfig.Environment in internal/lsp/client.go) takes
469// a map directly — returning a []string here would only force a
470// round-trip back to a map at the call site. See PLAN.md Phase 2
471// design decision #13.
472//
473// See ResolvedArgs for guidance on picking a resolver.
474func (l LSPConfig) ResolvedEnv(r VariableResolver) (map[string]string, error) {
475	if len(l.Env) == 0 {
476		return map[string]string{}, nil
477	}
478	out := make(map[string]string, len(l.Env))
479	// Sort keys so failures are reported deterministically when more
480	// than one value would fail.
481	keys := make([]string, 0, len(l.Env))
482	for k := range l.Env {
483		keys = append(keys, k)
484	}
485	slices.Sort(keys)
486	for _, k := range keys {
487		v, err := r.ResolveValue(l.Env[k])
488		if err != nil {
489			return nil, fmt.Errorf("env %q: %w", k, err)
490		}
491		out[k] = v
492	}
493	return out, nil
494}
495
496type Agent struct {
497	ID          string `json:"id,omitempty"`
498	Name        string `json:"name,omitempty"`
499	Description string `json:"description,omitempty"`
500	// This is the id of the system prompt used by the agent
501	Disabled bool `json:"disabled,omitempty"`
502
503	Model SelectedModelType `json:"model" jsonschema:"required,description=The model type to use for this agent,enum=large,enum=small,default=large"`
504
505	// The available tools for the agent
506	//  if this is nil, all tools are available
507	AllowedTools []string `json:"allowed_tools,omitempty"`
508
509	// this tells us which MCPs are available for this agent
510	//  if this is empty all mcps are available
511	//  the string array is the list of tools from the AllowedMCP the agent has available
512	//  if the string array is nil, all tools from the AllowedMCP are available
513	AllowedMCP map[string][]string `json:"allowed_mcp,omitempty"`
514
515	// Overrides the context paths for this agent
516	ContextPaths []string `json:"context_paths,omitempty"`
517}
518
519type Tools struct {
520	Ls   ToolLs   `json:"ls,omitzero"`
521	Grep ToolGrep `json:"grep,omitzero"`
522}
523
524type ToolLs struct {
525	MaxDepth *int `json:"max_depth,omitempty" jsonschema:"description=Maximum depth for the ls tool,default=0,example=10"`
526	MaxItems *int `json:"max_items,omitempty" jsonschema:"description=Maximum number of items to return for the ls tool,default=1000,example=100"`
527}
528
529// Limits returns the user-defined max-depth and max-items, or their defaults.
530func (t ToolLs) Limits() (depth, items int) {
531	return ptrValOr(t.MaxDepth, 0), ptrValOr(t.MaxItems, 0)
532}
533
534type ToolGrep struct {
535	Timeout *time.Duration `json:"timeout,omitempty" jsonschema:"description=Timeout for the grep tool call,default=5s,example=10s"`
536}
537
538// GetTimeout returns the user-defined timeout or the default.
539func (t ToolGrep) GetTimeout() time.Duration {
540	return ptrValOr(t.Timeout, 5*time.Second)
541}
542
543// HookConfig defines a user-configured shell command that fires on a hook
544// event (e.g. PreToolUse). This is a pure-data struct: matcher compilation
545// is owned by hooks.Runner so a JSON round-trip, merge, or reload can't
546// silently drop compiled state.
547type HookConfig struct {
548	// Regex pattern tested against the tool name. Empty means match all.
549	Matcher string `json:"matcher,omitempty" jsonschema:"description=Regex pattern tested against the tool name. Empty means match all tools."`
550	// Shell command to execute.
551	Command string `json:"command" jsonschema:"required,description=Shell command to execute when the hook fires"`
552	// Timeout in seconds. Default 30.
553	Timeout int `json:"timeout,omitempty" jsonschema:"description=Timeout in seconds for the hook command,default=30"`
554}
555
556// TimeoutDuration returns the hook timeout as a time.Duration, defaulting
557// to 30s.
558func (h *HookConfig) TimeoutDuration() time.Duration {
559	if h.Timeout <= 0 {
560		return 30 * time.Second
561	}
562	return time.Duration(h.Timeout) * time.Second
563}
564
565// Config holds the configuration for crush.
566type Config struct {
567	Schema string `json:"$schema,omitempty"`
568
569	// We currently only support large/small as values here.
570	Models map[SelectedModelType]SelectedModel `json:"models,omitempty" jsonschema:"description=Model configurations for different model types,example={\"large\":{\"model\":\"gpt-4o\",\"provider\":\"openai\"}}"`
571
572	// Recently used models stored in the data directory config.
573	RecentModels map[SelectedModelType][]SelectedModel `json:"recent_models,omitempty" jsonschema:"-"`
574
575	// The providers that are configured
576	Providers *csync.Map[string, ProviderConfig] `json:"providers,omitempty" jsonschema:"description=AI provider configurations"`
577
578	MCP MCPs `json:"mcp,omitempty" jsonschema:"description=Model Context Protocol server configurations"`
579
580	LSP LSPs `json:"lsp,omitempty" jsonschema:"description=Language Server Protocol configurations"`
581
582	Options *Options `json:"options,omitempty" jsonschema:"description=General application options"`
583
584	Permissions *Permissions `json:"permissions,omitempty" jsonschema:"description=Permission settings for tool usage"`
585
586	Tools Tools `json:"tools,omitzero" jsonschema:"description=Tool configurations"`
587
588	Hooks map[string][]HookConfig `json:"hooks,omitempty" jsonschema:"description=User-defined shell commands that fire on hook events (e.g. PreToolUse)"`
589
590	Agents map[string]Agent `json:"-"`
591}
592
593func (c *Config) EnabledProviders() []ProviderConfig {
594	var enabled []ProviderConfig
595	for p := range c.Providers.Seq() {
596		if !p.Disable {
597			enabled = append(enabled, p)
598		}
599	}
600	return enabled
601}
602
603// IsConfigured  return true if at least one provider is configured
604func (c *Config) IsConfigured() bool {
605	return len(c.EnabledProviders()) > 0
606}
607
608func (c *Config) GetModel(provider, model string) *catwalk.Model {
609	if providerConfig, ok := c.Providers.Get(provider); ok {
610		for _, m := range providerConfig.Models {
611			if m.ID == model {
612				return &m
613			}
614		}
615	}
616	return nil
617}
618
619func (c *Config) GetProviderForModel(modelType SelectedModelType) *ProviderConfig {
620	model, ok := c.Models[modelType]
621	if !ok {
622		return nil
623	}
624	if providerConfig, ok := c.Providers.Get(model.Provider); ok {
625		return &providerConfig
626	}
627	return nil
628}
629
630func (c *Config) GetModelByType(modelType SelectedModelType) *catwalk.Model {
631	model, ok := c.Models[modelType]
632	if !ok {
633		return nil
634	}
635	return c.GetModel(model.Provider, model.Model)
636}
637
638func (c *Config) LargeModel() *catwalk.Model {
639	model, ok := c.Models[SelectedModelTypeLarge]
640	if !ok {
641		return nil
642	}
643	return c.GetModel(model.Provider, model.Model)
644}
645
646func (c *Config) SmallModel() *catwalk.Model {
647	model, ok := c.Models[SelectedModelTypeSmall]
648	if !ok {
649		return nil
650	}
651	return c.GetModel(model.Provider, model.Model)
652}
653
654const maxRecentModelsPerType = 5
655
656func allToolNames() []string {
657	return []string{
658		"agent",
659		"bash",
660		"crush_info",
661		"crush_logs",
662		"job_output",
663		"job_kill",
664		"download",
665		"edit",
666		"multiedit",
667		"lsp_diagnostics",
668		"lsp_references",
669		"lsp_restart",
670		"fetch",
671		"agentic_fetch",
672		"glob",
673		"grep",
674		"ls",
675		"sourcegraph",
676		"todos",
677		"view",
678		"write",
679		"list_mcp_resources",
680		"read_mcp_resource",
681	}
682}
683
684func resolveAllowedTools(allTools []string, disabledTools []string) []string {
685	if disabledTools == nil {
686		return allTools
687	}
688	// filter out disabled tools (exclude mode)
689	return filterSlice(allTools, disabledTools, false)
690}
691
692func resolveReadOnlyTools(tools []string) []string {
693	readOnlyTools := []string{"glob", "grep", "ls", "sourcegraph", "view"}
694	// filter to only include tools that are in allowedtools (include mode)
695	return filterSlice(tools, readOnlyTools, true)
696}
697
698func filterSlice(data []string, mask []string, include bool) []string {
699	var filtered []string
700	for _, s := range data {
701		// if include is true, we include items that ARE in the mask
702		// if include is false, we include items that are NOT in the mask
703		if include == slices.Contains(mask, s) {
704			filtered = append(filtered, s)
705		}
706	}
707	return filtered
708}
709
710func (c *Config) SetupAgents() {
711	allowedTools := resolveAllowedTools(allToolNames(), c.Options.DisabledTools)
712
713	agents := map[string]Agent{
714		AgentCoder: {
715			ID:           AgentCoder,
716			Name:         "Coder",
717			Description:  "An agent that helps with executing coding tasks.",
718			Model:        SelectedModelTypeLarge,
719			ContextPaths: c.Options.ContextPaths,
720			AllowedTools: allowedTools,
721		},
722
723		AgentTask: {
724			ID:           AgentTask,
725			Name:         "Task",
726			Description:  "An agent that helps with searching for context and finding implementation details.",
727			Model:        SelectedModelTypeLarge,
728			ContextPaths: c.Options.ContextPaths,
729			AllowedTools: resolveReadOnlyTools(allowedTools),
730			// NO MCPs or LSPs by default
731			AllowedMCP: map[string][]string{},
732		},
733	}
734	c.Agents = agents
735}
736
737func (c *ProviderConfig) TestConnection(resolver VariableResolver) error {
738	var (
739		providerID = catwalk.InferenceProvider(c.ID)
740		testURL    = ""
741		headers    = make(map[string]string)
742		apiKey, _  = resolver.ResolveValue(c.APIKey)
743	)
744
745	switch providerID {
746	case catwalk.InferenceProviderMiniMax, catwalk.InferenceProviderMiniMaxChina:
747		// NOTE: MiniMax has no good endpoint we can use to validate the API key.
748		return nil
749	}
750
751	switch c.Type {
752	case catwalk.TypeOpenAI, catwalk.TypeOpenAICompat, catwalk.TypeOpenRouter:
753		baseURL, _ := resolver.ResolveValue(c.BaseURL)
754		baseURL = cmp.Or(baseURL, "https://api.openai.com/v1")
755
756		switch providerID {
757		case catwalk.InferenceProviderOpenRouter:
758			testURL = baseURL + "/credits"
759		case catwalk.InferenceProviderOpenCodeGo:
760			testURL = strings.Replace(baseURL, "/go", "", 1) + "/models"
761		default:
762			testURL = baseURL + "/models"
763		}
764
765		headers["Authorization"] = "Bearer " + apiKey
766	case catwalk.TypeAnthropic:
767		baseURL, _ := resolver.ResolveValue(c.BaseURL)
768		baseURL = cmp.Or(baseURL, "https://api.anthropic.com/v1")
769
770		switch providerID {
771		case catwalk.InferenceKimiCoding:
772			testURL = baseURL + "/v1/models"
773		default:
774			testURL = baseURL + "/models"
775		}
776
777		headers["x-api-key"] = apiKey
778		headers["anthropic-version"] = "2023-06-01"
779	case catwalk.TypeGoogle:
780		baseURL, _ := resolver.ResolveValue(c.BaseURL)
781		baseURL = cmp.Or(baseURL, "https://generativelanguage.googleapis.com")
782		testURL = baseURL + "/v1beta/models?key=" + url.QueryEscape(apiKey)
783	case catwalk.TypeBedrock:
784		// NOTE: Bedrock has a `/foundation-models` endpoint that we could in
785		// theory use, but apparently the authorization is region-specific,
786		// so it's not so trivial.
787		if strings.HasPrefix(apiKey, "ABSK") { // Bedrock API keys
788			return nil
789		}
790		return errors.New("not a valid bedrock api key")
791	case catwalk.TypeVercel:
792		// NOTE: Vercel does not validate API keys on the `/models` endpoint.
793		if strings.HasPrefix(apiKey, "vck_") { // Vercel API keys
794			return nil
795		}
796		return errors.New("not a valid vercel api key")
797	}
798
799	ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
800	defer cancel()
801
802	client := &http.Client{}
803	req, err := http.NewRequestWithContext(ctx, "GET", testURL, nil)
804	if err != nil {
805		return fmt.Errorf("failed to create request for provider %s: %w", c.ID, err)
806	}
807	for k, v := range headers {
808		req.Header.Set(k, v)
809	}
810	for k, v := range c.ExtraHeaders {
811		req.Header.Set(k, v)
812	}
813
814	resp, err := client.Do(req)
815	if err != nil {
816		return fmt.Errorf("failed to create request for provider %s: %w", c.ID, err)
817	}
818	defer resp.Body.Close()
819
820	switch providerID {
821	case catwalk.InferenceProviderZAI:
822		if resp.StatusCode == http.StatusUnauthorized {
823			return fmt.Errorf("failed to connect to provider %s: %s", c.ID, resp.Status)
824		}
825	default:
826		if resp.StatusCode != http.StatusOK {
827			return fmt.Errorf("failed to connect to provider %s: %s", c.ID, resp.Status)
828		}
829	}
830	return nil
831}
832
833// resolveEnvs expands every value in envs through the given resolver
834// and returns a fresh "KEY=value" slice sorted by key. The input map is
835// not mutated. On the first resolution failure it returns nil and an
836// error identifying the offending variable; the inner resolver error is
837// already sanitized by ResolveValue and is wrapped with %w.
838func resolveEnvs(envs map[string]string, r VariableResolver) ([]string, error) {
839	if len(envs) == 0 {
840		return nil, nil
841	}
842	keys := make([]string, 0, len(envs))
843	for k := range envs {
844		keys = append(keys, k)
845	}
846	slices.Sort(keys)
847	res := make([]string, 0, len(envs))
848	for _, k := range keys {
849		v, err := r.ResolveValue(envs[k])
850		if err != nil {
851			return nil, fmt.Errorf("env %s: %w", k, err)
852		}
853		res = append(res, fmt.Sprintf("%s=%s", k, v))
854	}
855	return res, nil
856}
857
858func ptrValOr[T any](t *T, el T) T {
859	if t == nil {
860		return el
861	}
862	return *t
863}