1package config
2
3import (
4 "cmp"
5 "context"
6 "encoding/json"
7 "fmt"
8 "io"
9 "log/slog"
10 "maps"
11 "os"
12 "os/exec"
13 "path/filepath"
14 "runtime"
15 "slices"
16 "strconv"
17 "strings"
18
19 "git.secluded.site/crush/internal/csync"
20 "git.secluded.site/crush/internal/env"
21 "git.secluded.site/crush/internal/event"
22 "git.secluded.site/crush/internal/fsext"
23 "git.secluded.site/crush/internal/home"
24 "git.secluded.site/crush/internal/log"
25 "git.secluded.site/crush/internal/oauth/claude"
26 "github.com/charmbracelet/catwalk/pkg/catwalk"
27 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
28)
29
30const defaultCatwalkURL = "https://catwalk.charm.sh"
31
32// LoadReader config via io.Reader.
33func LoadReader(fd io.Reader) (*Config, error) {
34 data, err := io.ReadAll(fd)
35 if err != nil {
36 return nil, err
37 }
38
39 var config Config
40 err = json.Unmarshal(data, &config)
41 if err != nil {
42 return nil, err
43 }
44 return &config, err
45}
46
47// Load loads the configuration from the default paths.
48func Load(workingDir, dataDir string, debug bool) (*Config, error) {
49 configPaths := lookupConfigs(workingDir)
50
51 cfg, err := loadFromConfigPaths(configPaths)
52 if err != nil {
53 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
54 }
55
56 cfg.dataConfigDir = GlobalConfigData()
57
58 cfg.setDefaults(workingDir, dataDir)
59
60 if debug {
61 cfg.Options.Debug = true
62 }
63
64 // Setup logs
65 log.Setup(
66 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
67 cfg.Options.Debug,
68 )
69
70 if !isInsideWorktree() {
71 const depth = 2
72 const items = 100
73 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
74 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
75 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
76 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
77 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
78 }
79
80 // Load known providers, this loads the config from catwalk
81 providers, err := Providers(cfg)
82 if err != nil {
83 return nil, err
84 }
85 cfg.knownProviders = providers
86
87 env := env.New()
88 // Configure providers
89 valueResolver := NewShellVariableResolver(env)
90 cfg.resolver = valueResolver
91 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
92 return nil, fmt.Errorf("failed to configure providers: %w", err)
93 }
94
95 if !cfg.IsConfigured() {
96 slog.Warn("No providers configured")
97 return cfg, nil
98 }
99
100 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
101 return nil, fmt.Errorf("failed to configure selected models: %w", err)
102 }
103 cfg.SetupAgents()
104 return cfg, nil
105}
106
107func PushPopCrushEnv() func() {
108 found := []string{}
109 for _, ev := range os.Environ() {
110 if strings.HasPrefix(ev, "CRUSH_") {
111 pair := strings.SplitN(ev, "=", 2)
112 if len(pair) != 2 {
113 continue
114 }
115 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
116 }
117 }
118 backups := make(map[string]string)
119 for _, ev := range found {
120 backups[ev] = os.Getenv(ev)
121 }
122
123 for _, ev := range found {
124 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
125 }
126
127 restore := func() {
128 for k, v := range backups {
129 os.Setenv(k, v)
130 }
131 }
132 return restore
133}
134
135func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
136 knownProviderNames := make(map[string]bool)
137 restore := PushPopCrushEnv()
138 defer restore()
139
140 for _, p := range knownProviders {
141 knownProviderNames[string(p.ID)] = true
142 config, configExists := c.Providers.Get(string(p.ID))
143 // if the user configured a known provider we need to allow it to override a couple of parameters
144 if configExists {
145 if config.BaseURL != "" {
146 p.APIEndpoint = config.BaseURL
147 }
148 if config.APIKey != "" {
149 p.APIKey = config.APIKey
150 }
151 if len(config.Models) > 0 {
152 models := []catwalk.Model{}
153 seen := make(map[string]bool)
154
155 for _, model := range config.Models {
156 if seen[model.ID] {
157 continue
158 }
159 seen[model.ID] = true
160 if model.Name == "" {
161 model.Name = model.ID
162 }
163 models = append(models, model)
164 }
165 for _, model := range p.Models {
166 if seen[model.ID] {
167 continue
168 }
169 seen[model.ID] = true
170 if model.Name == "" {
171 model.Name = model.ID
172 }
173 models = append(models, model)
174 }
175
176 p.Models = models
177 }
178 }
179
180 headers := map[string]string{}
181 if len(p.DefaultHeaders) > 0 {
182 maps.Copy(headers, p.DefaultHeaders)
183 }
184 if len(config.ExtraHeaders) > 0 {
185 maps.Copy(headers, config.ExtraHeaders)
186 }
187 prepared := ProviderConfig{
188 ID: string(p.ID),
189 Name: p.Name,
190 BaseURL: p.APIEndpoint,
191 APIKey: p.APIKey,
192 OAuthToken: config.OAuthToken,
193 Type: p.Type,
194 Disable: config.Disable,
195 SystemPromptPrefix: config.SystemPromptPrefix,
196 ExtraHeaders: headers,
197 ExtraBody: config.ExtraBody,
198 ExtraParams: make(map[string]string),
199 Models: p.Models,
200 }
201
202 if p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil {
203 if config.OAuthToken.IsExpired() {
204 newToken, err := claude.RefreshToken(context.TODO(), config.OAuthToken.RefreshToken)
205 if err == nil {
206 slog.Info("Successfully refreshed Anthropic OAuth token")
207 config.OAuthToken = newToken
208 prepared.OAuthToken = newToken
209 if err := cmp.Or(
210 c.SetConfigField("providers.anthropic.api_key", newToken.AccessToken),
211 c.SetConfigField("providers.anthropic.oauth", newToken),
212 ); err != nil {
213 return err
214 }
215 } else {
216 slog.Error("Failed to refresh Anthropic OAuth token", "error", err)
217 event.Error(err)
218 }
219 } else {
220 slog.Info("Using existing non-expired Anthropic OAuth token")
221 }
222 prepared.SetupClaudeCode()
223 }
224
225 switch p.ID {
226 // Handle specific providers that require additional configuration
227 case catwalk.InferenceProviderVertexAI:
228 if !hasVertexCredentials(env) {
229 if configExists {
230 slog.Warn("Skipping Vertex AI provider due to missing credentials")
231 c.Providers.Del(string(p.ID))
232 }
233 continue
234 }
235 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
236 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
237 case catwalk.InferenceProviderAzure:
238 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
239 if err != nil || endpoint == "" {
240 if configExists {
241 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
242 c.Providers.Del(string(p.ID))
243 }
244 continue
245 }
246 prepared.BaseURL = endpoint
247 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
248 case catwalk.InferenceProviderBedrock:
249 if !hasAWSCredentials(env) {
250 if configExists {
251 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
252 c.Providers.Del(string(p.ID))
253 }
254 continue
255 }
256 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
257 if prepared.ExtraParams["region"] == "" {
258 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
259 }
260 for _, model := range p.Models {
261 if !strings.HasPrefix(model.ID, "anthropic.") {
262 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
263 }
264 }
265 default:
266 // if the provider api or endpoint are missing we skip them
267 v, err := resolver.ResolveValue(p.APIKey)
268 if v == "" || err != nil {
269 if configExists {
270 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
271 c.Providers.Del(string(p.ID))
272 }
273 continue
274 }
275 }
276 c.Providers.Set(string(p.ID), prepared)
277 }
278
279 // validate the custom providers
280 for id, providerConfig := range c.Providers.Seq2() {
281 if knownProviderNames[id] {
282 continue
283 }
284
285 // Make sure the provider ID is set
286 providerConfig.ID = id
287 if providerConfig.Name == "" {
288 providerConfig.Name = id // Use ID as name if not set
289 }
290 // default to OpenAI if not set
291 if providerConfig.Type == "" {
292 providerConfig.Type = catwalk.TypeOpenAICompat
293 }
294 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
295 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
296 c.Providers.Del(id)
297 continue
298 }
299
300 if providerConfig.Disable {
301 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
302 c.Providers.Del(id)
303 continue
304 }
305 if providerConfig.APIKey == "" {
306 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
307 }
308 if providerConfig.BaseURL == "" {
309 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
310 c.Providers.Del(id)
311 continue
312 }
313 if len(providerConfig.Models) == 0 {
314 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
315 c.Providers.Del(id)
316 continue
317 }
318 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
319 if apiKey == "" || err != nil {
320 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
321 }
322 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
323 if baseURL == "" || err != nil {
324 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
325 c.Providers.Del(id)
326 continue
327 }
328
329 c.Providers.Set(id, providerConfig)
330 }
331 return nil
332}
333
334func (c *Config) setDefaults(workingDir, dataDir string) {
335 c.workingDir = workingDir
336 if c.Options == nil {
337 c.Options = &Options{}
338 }
339 if c.Options.TUI == nil {
340 c.Options.TUI = &TUIOptions{}
341 }
342 if c.Options.ContextPaths == nil {
343 c.Options.ContextPaths = []string{}
344 }
345 if c.Options.MemoryPaths == nil {
346 crushConfigDir := filepath.Dir(GlobalConfig())
347 c.Options.MemoryPaths = []string{
348 filepath.Join(crushConfigDir, "CRUSH.md"),
349 filepath.Join(filepath.Dir(crushConfigDir), "AGENTS.md"),
350 }
351 }
352 slices.Sort(c.Options.MemoryPaths)
353 c.Options.MemoryPaths = slices.Compact(c.Options.MemoryPaths)
354
355 if dataDir != "" {
356 c.Options.DataDirectory = dataDir
357 } else if c.Options.DataDirectory == "" {
358 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
359 c.Options.DataDirectory = path
360 } else {
361 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
362 }
363 }
364 if c.Providers == nil {
365 c.Providers = csync.NewMap[string, ProviderConfig]()
366 }
367 if c.Models == nil {
368 c.Models = make(map[SelectedModelType]SelectedModel)
369 }
370 if c.RecentModels == nil {
371 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
372 }
373 if c.MCP == nil {
374 c.MCP = make(map[string]MCPConfig)
375 }
376 if c.LSP == nil {
377 c.LSP = make(map[string]LSPConfig)
378 }
379
380 // Apply defaults to LSP configurations
381 c.applyLSPDefaults()
382
383 // Add the default context paths if they are not already present
384 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
385 slices.Sort(c.Options.ContextPaths)
386 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
387
388 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
389 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
390 }
391
392 if c.Options.Attribution == nil {
393 c.Options.Attribution = &Attribution{
394 TrailerStyle: TrailerStyleAssistedBy,
395 GeneratedWith: true,
396 }
397 } else if c.Options.Attribution.TrailerStyle == "" {
398 // Migrate deprecated co_authored_by or apply default
399 if c.Options.Attribution.CoAuthoredBy != nil {
400 if *c.Options.Attribution.CoAuthoredBy {
401 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
402 } else {
403 c.Options.Attribution.TrailerStyle = TrailerStyleNone
404 }
405 } else {
406 c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
407 }
408 }
409 if c.Options.InitializeAs == "" {
410 c.Options.InitializeAs = defaultInitializeAs
411 }
412}
413
414// applyLSPDefaults applies default values from powernap to LSP configurations
415func (c *Config) applyLSPDefaults() {
416 // Get powernap's default configuration
417 configManager := powernapConfig.NewManager()
418 configManager.LoadDefaults()
419
420 // Apply defaults to each LSP configuration
421 for name, cfg := range c.LSP {
422 // Try to get defaults from powernap based on name or command name.
423 base, ok := configManager.GetServer(name)
424 if !ok {
425 base, ok = configManager.GetServer(cfg.Command)
426 if !ok {
427 continue
428 }
429 }
430 if cfg.Options == nil {
431 cfg.Options = base.Settings
432 }
433 if cfg.InitOptions == nil {
434 cfg.InitOptions = base.InitOptions
435 }
436 if len(cfg.FileTypes) == 0 {
437 cfg.FileTypes = base.FileTypes
438 }
439 if len(cfg.RootMarkers) == 0 {
440 cfg.RootMarkers = base.RootMarkers
441 }
442 if cfg.Command == "" {
443 cfg.Command = base.Command
444 }
445 if len(cfg.Args) == 0 {
446 cfg.Args = base.Args
447 }
448 if len(cfg.Env) == 0 {
449 cfg.Env = base.Environment
450 }
451 // Update the config in the map
452 c.LSP[name] = cfg
453 }
454}
455
456func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
457 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
458 err = fmt.Errorf("no providers configured, please configure at least one provider")
459 return largeModel, smallModel, err
460 }
461
462 // Use the first provider enabled based on the known providers order
463 // if no provider found that is known use the first provider configured
464 for _, p := range knownProviders {
465 providerConfig, ok := c.Providers.Get(string(p.ID))
466 if !ok || providerConfig.Disable {
467 continue
468 }
469 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
470 if defaultLargeModel == nil {
471 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
472 return largeModel, smallModel, err
473 }
474 largeModel = SelectedModel{
475 Provider: string(p.ID),
476 Model: defaultLargeModel.ID,
477 MaxTokens: defaultLargeModel.DefaultMaxTokens,
478 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
479 }
480
481 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
482 if defaultSmallModel == nil {
483 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
484 return largeModel, smallModel, err
485 }
486 smallModel = SelectedModel{
487 Provider: string(p.ID),
488 Model: defaultSmallModel.ID,
489 MaxTokens: defaultSmallModel.DefaultMaxTokens,
490 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
491 }
492 return largeModel, smallModel, err
493 }
494
495 enabledProviders := c.EnabledProviders()
496 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
497 return strings.Compare(a.ID, b.ID)
498 })
499
500 if len(enabledProviders) == 0 {
501 err = fmt.Errorf("no providers configured, please configure at least one provider")
502 return largeModel, smallModel, err
503 }
504
505 providerConfig := enabledProviders[0]
506 if len(providerConfig.Models) == 0 {
507 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
508 return largeModel, smallModel, err
509 }
510 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
511 largeModel = SelectedModel{
512 Provider: providerConfig.ID,
513 Model: defaultLargeModel.ID,
514 MaxTokens: defaultLargeModel.DefaultMaxTokens,
515 }
516 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
517 smallModel = SelectedModel{
518 Provider: providerConfig.ID,
519 Model: defaultSmallModel.ID,
520 MaxTokens: defaultSmallModel.DefaultMaxTokens,
521 }
522 return largeModel, smallModel, err
523}
524
525func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
526 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
527 if err != nil {
528 return fmt.Errorf("failed to select default models: %w", err)
529 }
530 large, small := defaultLarge, defaultSmall
531
532 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
533 if largeModelConfigured {
534 if largeModelSelected.Model != "" {
535 large.Model = largeModelSelected.Model
536 }
537 if largeModelSelected.Provider != "" {
538 large.Provider = largeModelSelected.Provider
539 }
540 model := c.GetModel(large.Provider, large.Model)
541 if model == nil {
542 large = defaultLarge
543 // override the model type to large
544 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
545 if err != nil {
546 return fmt.Errorf("failed to update preferred large model: %w", err)
547 }
548 } else {
549 if largeModelSelected.MaxTokens > 0 {
550 large.MaxTokens = largeModelSelected.MaxTokens
551 } else {
552 large.MaxTokens = model.DefaultMaxTokens
553 }
554 if largeModelSelected.ReasoningEffort != "" {
555 large.ReasoningEffort = largeModelSelected.ReasoningEffort
556 }
557 large.Think = largeModelSelected.Think
558 if largeModelSelected.Temperature != nil {
559 large.Temperature = largeModelSelected.Temperature
560 }
561 if largeModelSelected.TopP != nil {
562 large.TopP = largeModelSelected.TopP
563 }
564 if largeModelSelected.TopK != nil {
565 large.TopK = largeModelSelected.TopK
566 }
567 if largeModelSelected.FrequencyPenalty != nil {
568 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
569 }
570 if largeModelSelected.PresencePenalty != nil {
571 large.PresencePenalty = largeModelSelected.PresencePenalty
572 }
573 }
574 }
575 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
576 if smallModelConfigured {
577 if smallModelSelected.Model != "" {
578 small.Model = smallModelSelected.Model
579 }
580 if smallModelSelected.Provider != "" {
581 small.Provider = smallModelSelected.Provider
582 }
583
584 model := c.GetModel(small.Provider, small.Model)
585 if model == nil {
586 small = defaultSmall
587 // override the model type to small
588 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
589 if err != nil {
590 return fmt.Errorf("failed to update preferred small model: %w", err)
591 }
592 } else {
593 if smallModelSelected.MaxTokens > 0 {
594 small.MaxTokens = smallModelSelected.MaxTokens
595 } else {
596 small.MaxTokens = model.DefaultMaxTokens
597 }
598 if smallModelSelected.ReasoningEffort != "" {
599 small.ReasoningEffort = smallModelSelected.ReasoningEffort
600 }
601 if smallModelSelected.Temperature != nil {
602 small.Temperature = smallModelSelected.Temperature
603 }
604 if smallModelSelected.TopP != nil {
605 small.TopP = smallModelSelected.TopP
606 }
607 if smallModelSelected.TopK != nil {
608 small.TopK = smallModelSelected.TopK
609 }
610 if smallModelSelected.FrequencyPenalty != nil {
611 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
612 }
613 if smallModelSelected.PresencePenalty != nil {
614 small.PresencePenalty = smallModelSelected.PresencePenalty
615 }
616 small.Think = smallModelSelected.Think
617 }
618 }
619 c.Models[SelectedModelTypeLarge] = large
620 c.Models[SelectedModelTypeSmall] = small
621 return nil
622}
623
624// lookupConfigs searches config files recursively from CWD up to FS root
625func lookupConfigs(cwd string) []string {
626 // prepend default config paths
627 configPaths := []string{
628 GlobalConfig(),
629 GlobalConfigData(),
630 }
631
632 configNames := []string{appName + ".json", "." + appName + ".json"}
633
634 foundConfigs, err := fsext.Lookup(cwd, configNames...)
635 if err != nil {
636 // returns at least default configs
637 return configPaths
638 }
639
640 // reverse order so last config has more priority
641 slices.Reverse(foundConfigs)
642
643 return append(configPaths, foundConfigs...)
644}
645
646func loadFromConfigPaths(configPaths []string) (*Config, error) {
647 var configs []io.Reader
648
649 for _, path := range configPaths {
650 fd, err := os.Open(path)
651 if err != nil {
652 if os.IsNotExist(err) {
653 continue
654 }
655 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
656 }
657 defer fd.Close()
658
659 configs = append(configs, fd)
660 }
661
662 return loadFromReaders(configs)
663}
664
665func loadFromReaders(readers []io.Reader) (*Config, error) {
666 if len(readers) == 0 {
667 return &Config{}, nil
668 }
669
670 merged, err := Merge(readers)
671 if err != nil {
672 return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
673 }
674
675 return LoadReader(merged)
676}
677
678func hasVertexCredentials(env env.Env) bool {
679 hasProject := env.Get("VERTEXAI_PROJECT") != ""
680 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
681 return hasProject && hasLocation
682}
683
684func hasAWSCredentials(env env.Env) bool {
685 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
686 return true
687 }
688
689 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
690 return true
691 }
692
693 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
694 return true
695 }
696
697 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
698 return true
699 }
700
701 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
702 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
703 return true
704 }
705
706 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil {
707 return true
708 }
709
710 return false
711}
712
713// GlobalConfig returns the global configuration file path for the application.
714func GlobalConfig() string {
715 xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
716 if xdgConfigHome != "" {
717 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
718 }
719
720 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
721}
722
723// GlobalConfigData returns the path to the main data directory for the application.
724// this config is used when the app overrides configurations instead of updating the global config.
725func GlobalConfigData() string {
726 xdgDataHome := os.Getenv("XDG_DATA_HOME")
727 if xdgDataHome != "" {
728 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
729 }
730
731 // return the path to the main data directory
732 // for windows, it should be in `%LOCALAPPDATA%/crush/`
733 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
734 if runtime.GOOS == "windows" {
735 localAppData := os.Getenv("LOCALAPPDATA")
736 if localAppData == "" {
737 localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
738 }
739 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
740 }
741
742 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
743}
744
745func assignIfNil[T any](ptr **T, val T) {
746 if *ptr == nil {
747 *ptr = &val
748 }
749}
750
751func isInsideWorktree() bool {
752 bts, err := exec.CommandContext(
753 context.Background(),
754 "git", "rev-parse",
755 "--is-inside-work-tree",
756 ).CombinedOutput()
757 return err == nil && strings.TrimSpace(string(bts)) == "true"
758}