1package config
2
3import (
4 "cmp"
5 "context"
6 "encoding/json"
7 "fmt"
8 "log/slog"
9 "maps"
10 "os"
11 "os/exec"
12 "path/filepath"
13 "runtime"
14 "slices"
15 "strconv"
16 "strings"
17 "testing"
18
19 "github.com/charmbracelet/catwalk/pkg/catwalk"
20 "github.com/charmbracelet/crush/internal/agent/hyper"
21 "github.com/charmbracelet/crush/internal/csync"
22 "github.com/charmbracelet/crush/internal/env"
23 "github.com/charmbracelet/crush/internal/fsext"
24 "github.com/charmbracelet/crush/internal/home"
25 "github.com/charmbracelet/crush/internal/log"
26 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
27 "github.com/qjebbs/go-jsons"
28)
29
30const defaultCatwalkURL = "https://catwalk.charm.sh"
31
32// Load loads the configuration from the default paths.
33func Load(workingDir, dataDir string, debug bool) (*Config, error) {
34 configPaths := lookupConfigs(workingDir)
35
36 cfg, err := loadFromConfigPaths(configPaths)
37 if err != nil {
38 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
39 }
40
41 cfg.dataConfigDir = GlobalConfigData()
42
43 cfg.setDefaults(workingDir, dataDir)
44
45 if debug {
46 cfg.Options.Debug = true
47 }
48
49 // Setup logs
50 log.Setup(
51 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
52 cfg.Options.Debug,
53 )
54
55 if !isInsideWorktree() {
56 const depth = 2
57 const items = 100
58 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
59 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
60 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
61 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
62 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
63 }
64
65 // Load known providers, this loads the config from catwalk
66 providers, err := Providers(cfg)
67 if err != nil {
68 return nil, err
69 }
70 cfg.knownProviders = providers
71
72 env := env.New()
73 // Configure providers
74 valueResolver := NewShellVariableResolver(env)
75 cfg.resolver = valueResolver
76 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
77 return nil, fmt.Errorf("failed to configure providers: %w", err)
78 }
79
80 if !cfg.IsConfigured() {
81 slog.Warn("No providers configured")
82 return cfg, nil
83 }
84
85 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
86 return nil, fmt.Errorf("failed to configure selected models: %w", err)
87 }
88 cfg.SetupAgents()
89 return cfg, nil
90}
91
92func PushPopCrushEnv() func() {
93 found := []string{}
94 for _, ev := range os.Environ() {
95 if strings.HasPrefix(ev, "CRUSH_") {
96 pair := strings.SplitN(ev, "=", 2)
97 if len(pair) != 2 {
98 continue
99 }
100 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
101 }
102 }
103 backups := make(map[string]string)
104 for _, ev := range found {
105 backups[ev] = os.Getenv(ev)
106 }
107
108 for _, ev := range found {
109 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
110 }
111
112 restore := func() {
113 for k, v := range backups {
114 os.Setenv(k, v)
115 }
116 }
117 return restore
118}
119
120func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
121 knownProviderNames := make(map[string]bool)
122 restore := PushPopCrushEnv()
123 defer restore()
124
125 // When disable_default_providers is enabled, skip all default/embedded
126 // providers entirely. Users must fully specify any providers they want.
127 // We skip to the custom provider validation loop which handles all
128 // user-configured providers uniformly.
129 if c.Options.DisableDefaultProviders {
130 knownProviders = nil
131 }
132
133 for _, p := range knownProviders {
134 knownProviderNames[string(p.ID)] = true
135 config, configExists := c.Providers.Get(string(p.ID))
136 // if the user configured a known provider we need to allow it to override a couple of parameters
137 if configExists {
138 if config.BaseURL != "" {
139 p.APIEndpoint = config.BaseURL
140 }
141 if config.APIKey != "" {
142 p.APIKey = config.APIKey
143 }
144 if len(config.Models) > 0 {
145 models := []catwalk.Model{}
146 seen := make(map[string]bool)
147
148 for _, model := range config.Models {
149 if seen[model.ID] {
150 continue
151 }
152 seen[model.ID] = true
153 if model.Name == "" {
154 model.Name = model.ID
155 }
156 models = append(models, model)
157 }
158 for _, model := range p.Models {
159 if seen[model.ID] {
160 continue
161 }
162 seen[model.ID] = true
163 if model.Name == "" {
164 model.Name = model.ID
165 }
166 models = append(models, model)
167 }
168
169 p.Models = models
170 }
171 }
172
173 headers := map[string]string{}
174 if len(p.DefaultHeaders) > 0 {
175 maps.Copy(headers, p.DefaultHeaders)
176 }
177 if len(config.ExtraHeaders) > 0 {
178 maps.Copy(headers, config.ExtraHeaders)
179 }
180 prepared := ProviderConfig{
181 ID: string(p.ID),
182 Name: p.Name,
183 BaseURL: p.APIEndpoint,
184 APIKey: p.APIKey,
185 APIKeyTemplate: p.APIKey, // Store original template for re-resolution
186 OAuthToken: config.OAuthToken,
187 Type: p.Type,
188 Disable: config.Disable,
189 SystemPromptPrefix: config.SystemPromptPrefix,
190 ExtraHeaders: headers,
191 ExtraBody: config.ExtraBody,
192 ExtraParams: make(map[string]string),
193 Models: p.Models,
194 }
195
196 switch {
197 case p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil:
198 // Claude Code subscription is not supported anymore. Remove to show onboarding.
199 c.RemoveConfigField("providers.anthropic")
200 c.Providers.Del(string(p.ID))
201 continue
202 case p.ID == catwalk.InferenceProviderCopilot && config.OAuthToken != nil:
203 prepared.SetupGitHubCopilot()
204 }
205
206 switch p.ID {
207 // Handle specific providers that require additional configuration
208 case catwalk.InferenceProviderVertexAI:
209 if !hasVertexCredentials(env) {
210 if configExists {
211 slog.Warn("Skipping Vertex AI provider due to missing credentials")
212 c.Providers.Del(string(p.ID))
213 }
214 continue
215 }
216 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
217 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
218 case catwalk.InferenceProviderAzure:
219 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
220 if err != nil || endpoint == "" {
221 if configExists {
222 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
223 c.Providers.Del(string(p.ID))
224 }
225 continue
226 }
227 prepared.BaseURL = endpoint
228 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
229 case catwalk.InferenceProviderBedrock:
230 if !hasAWSCredentials(env) {
231 if configExists {
232 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
233 c.Providers.Del(string(p.ID))
234 }
235 continue
236 }
237 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
238 if prepared.ExtraParams["region"] == "" {
239 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
240 }
241 for _, model := range p.Models {
242 if !strings.HasPrefix(model.ID, "anthropic.") {
243 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
244 }
245 }
246 default:
247 // if the provider api or endpoint are missing we skip them
248 v, err := resolver.ResolveValue(p.APIKey)
249 if v == "" || err != nil {
250 if configExists {
251 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
252 c.Providers.Del(string(p.ID))
253 }
254 continue
255 }
256 }
257 c.Providers.Set(string(p.ID), prepared)
258 }
259
260 // validate the custom providers
261 for id, providerConfig := range c.Providers.Seq2() {
262 if knownProviderNames[id] {
263 continue
264 }
265
266 // Make sure the provider ID is set
267 providerConfig.ID = id
268 if providerConfig.Name == "" {
269 providerConfig.Name = id // Use ID as name if not set
270 }
271 // default to OpenAI if not set
272 if providerConfig.Type == "" {
273 providerConfig.Type = catwalk.TypeOpenAICompat
274 }
275 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) && providerConfig.Type != hyper.Name {
276 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
277 c.Providers.Del(id)
278 continue
279 }
280
281 if providerConfig.Disable {
282 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
283 c.Providers.Del(id)
284 continue
285 }
286 if providerConfig.APIKey == "" {
287 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
288 }
289 if providerConfig.BaseURL == "" {
290 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
291 c.Providers.Del(id)
292 continue
293 }
294 if len(providerConfig.Models) == 0 {
295 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
296 c.Providers.Del(id)
297 continue
298 }
299 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
300 if apiKey == "" || err != nil {
301 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
302 }
303 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
304 if baseURL == "" || err != nil {
305 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
306 c.Providers.Del(id)
307 continue
308 }
309
310 c.Providers.Set(id, providerConfig)
311 }
312 return nil
313}
314
315func (c *Config) setDefaults(workingDir, dataDir string) {
316 c.workingDir = workingDir
317 if c.Options == nil {
318 c.Options = &Options{}
319 }
320 if c.Options.TUI == nil {
321 c.Options.TUI = &TUIOptions{}
322 }
323 if c.Options.ContextPaths == nil {
324 c.Options.ContextPaths = []string{}
325 }
326 if c.Options.SkillsPaths == nil {
327 c.Options.SkillsPaths = []string{}
328 }
329 if dataDir != "" {
330 c.Options.DataDirectory = dataDir
331 } else if c.Options.DataDirectory == "" {
332 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
333 c.Options.DataDirectory = path
334 } else {
335 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
336 }
337 }
338 if c.Providers == nil {
339 c.Providers = csync.NewMap[string, ProviderConfig]()
340 }
341 if c.Models == nil {
342 c.Models = make(map[SelectedModelType]SelectedModel)
343 }
344 if c.RecentModels == nil {
345 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
346 }
347 if c.MCP == nil {
348 c.MCP = make(map[string]MCPConfig)
349 }
350 if c.LSP == nil {
351 c.LSP = make(map[string]LSPConfig)
352 }
353
354 // Apply defaults to LSP configurations
355 c.applyLSPDefaults()
356
357 // Add the default context paths if they are not already present
358 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
359 slices.Sort(c.Options.ContextPaths)
360 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
361
362 // Add the default skills directories if not already present.
363 for _, dir := range GlobalSkillsDirs() {
364 if !slices.Contains(c.Options.SkillsPaths, dir) {
365 c.Options.SkillsPaths = append(c.Options.SkillsPaths, dir)
366 }
367 }
368
369 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
370 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
371 }
372
373 if str, ok := os.LookupEnv("CRUSH_DISABLE_DEFAULT_PROVIDERS"); ok {
374 c.Options.DisableDefaultProviders, _ = strconv.ParseBool(str)
375 }
376
377 if c.Options.Attribution == nil {
378 c.Options.Attribution = &Attribution{
379 TrailerStyle: TrailerStyleAssistedBy,
380 GeneratedWith: true,
381 }
382 } else if c.Options.Attribution.TrailerStyle == "" {
383 // Migrate deprecated co_authored_by or apply default
384 if c.Options.Attribution.CoAuthoredBy != nil {
385 if *c.Options.Attribution.CoAuthoredBy {
386 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
387 } else {
388 c.Options.Attribution.TrailerStyle = TrailerStyleNone
389 }
390 } else {
391 c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
392 }
393 }
394 if c.Options.InitializeAs == "" {
395 c.Options.InitializeAs = defaultInitializeAs
396 }
397}
398
399// applyLSPDefaults applies default values from powernap to LSP configurations
400func (c *Config) applyLSPDefaults() {
401 // Get powernap's default configuration
402 configManager := powernapConfig.NewManager()
403 configManager.LoadDefaults()
404
405 // Apply defaults to each LSP configuration
406 for name, cfg := range c.LSP {
407 // Try to get defaults from powernap based on name or command name.
408 base, ok := configManager.GetServer(name)
409 if !ok {
410 base, ok = configManager.GetServer(cfg.Command)
411 if !ok {
412 continue
413 }
414 }
415 if cfg.Options == nil {
416 cfg.Options = base.Settings
417 }
418 if cfg.InitOptions == nil {
419 cfg.InitOptions = base.InitOptions
420 }
421 if len(cfg.FileTypes) == 0 {
422 cfg.FileTypes = base.FileTypes
423 }
424 if len(cfg.RootMarkers) == 0 {
425 cfg.RootMarkers = base.RootMarkers
426 }
427 if cfg.Command == "" {
428 cfg.Command = base.Command
429 }
430 if len(cfg.Args) == 0 {
431 cfg.Args = base.Args
432 }
433 if len(cfg.Env) == 0 {
434 cfg.Env = base.Environment
435 }
436 // Update the config in the map
437 c.LSP[name] = cfg
438 }
439}
440
441func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
442 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
443 err = fmt.Errorf("no providers configured, please configure at least one provider")
444 return largeModel, smallModel, err
445 }
446
447 // Use the first provider enabled based on the known providers order
448 // if no provider found that is known use the first provider configured
449 for _, p := range knownProviders {
450 providerConfig, ok := c.Providers.Get(string(p.ID))
451 if !ok || providerConfig.Disable {
452 continue
453 }
454 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
455 if defaultLargeModel == nil {
456 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
457 return largeModel, smallModel, err
458 }
459 largeModel = SelectedModel{
460 Provider: string(p.ID),
461 Model: defaultLargeModel.ID,
462 MaxTokens: defaultLargeModel.DefaultMaxTokens,
463 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
464 }
465
466 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
467 if defaultSmallModel == nil {
468 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
469 return largeModel, smallModel, err
470 }
471 smallModel = SelectedModel{
472 Provider: string(p.ID),
473 Model: defaultSmallModel.ID,
474 MaxTokens: defaultSmallModel.DefaultMaxTokens,
475 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
476 }
477 return largeModel, smallModel, err
478 }
479
480 enabledProviders := c.EnabledProviders()
481 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
482 return strings.Compare(a.ID, b.ID)
483 })
484
485 if len(enabledProviders) == 0 {
486 err = fmt.Errorf("no providers configured, please configure at least one provider")
487 return largeModel, smallModel, err
488 }
489
490 providerConfig := enabledProviders[0]
491 if len(providerConfig.Models) == 0 {
492 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
493 return largeModel, smallModel, err
494 }
495 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
496 largeModel = SelectedModel{
497 Provider: providerConfig.ID,
498 Model: defaultLargeModel.ID,
499 MaxTokens: defaultLargeModel.DefaultMaxTokens,
500 }
501 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
502 smallModel = SelectedModel{
503 Provider: providerConfig.ID,
504 Model: defaultSmallModel.ID,
505 MaxTokens: defaultSmallModel.DefaultMaxTokens,
506 }
507 return largeModel, smallModel, err
508}
509
510func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
511 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
512 if err != nil {
513 return fmt.Errorf("failed to select default models: %w", err)
514 }
515 large, small := defaultLarge, defaultSmall
516
517 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
518 if largeModelConfigured {
519 if largeModelSelected.Model != "" {
520 large.Model = largeModelSelected.Model
521 }
522 if largeModelSelected.Provider != "" {
523 large.Provider = largeModelSelected.Provider
524 }
525 model := c.GetModel(large.Provider, large.Model)
526 if model == nil {
527 large = defaultLarge
528 // override the model type to large
529 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
530 if err != nil {
531 return fmt.Errorf("failed to update preferred large model: %w", err)
532 }
533 } else {
534 if largeModelSelected.MaxTokens > 0 {
535 large.MaxTokens = largeModelSelected.MaxTokens
536 } else {
537 large.MaxTokens = model.DefaultMaxTokens
538 }
539 if largeModelSelected.ReasoningEffort != "" {
540 large.ReasoningEffort = largeModelSelected.ReasoningEffort
541 }
542 large.Think = largeModelSelected.Think
543 if largeModelSelected.Temperature != nil {
544 large.Temperature = largeModelSelected.Temperature
545 }
546 if largeModelSelected.TopP != nil {
547 large.TopP = largeModelSelected.TopP
548 }
549 if largeModelSelected.TopK != nil {
550 large.TopK = largeModelSelected.TopK
551 }
552 if largeModelSelected.FrequencyPenalty != nil {
553 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
554 }
555 if largeModelSelected.PresencePenalty != nil {
556 large.PresencePenalty = largeModelSelected.PresencePenalty
557 }
558 }
559 }
560 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
561 if smallModelConfigured {
562 if smallModelSelected.Model != "" {
563 small.Model = smallModelSelected.Model
564 }
565 if smallModelSelected.Provider != "" {
566 small.Provider = smallModelSelected.Provider
567 }
568
569 model := c.GetModel(small.Provider, small.Model)
570 if model == nil {
571 small = defaultSmall
572 // override the model type to small
573 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
574 if err != nil {
575 return fmt.Errorf("failed to update preferred small model: %w", err)
576 }
577 } else {
578 if smallModelSelected.MaxTokens > 0 {
579 small.MaxTokens = smallModelSelected.MaxTokens
580 } else {
581 small.MaxTokens = model.DefaultMaxTokens
582 }
583 if smallModelSelected.ReasoningEffort != "" {
584 small.ReasoningEffort = smallModelSelected.ReasoningEffort
585 }
586 if smallModelSelected.Temperature != nil {
587 small.Temperature = smallModelSelected.Temperature
588 }
589 if smallModelSelected.TopP != nil {
590 small.TopP = smallModelSelected.TopP
591 }
592 if smallModelSelected.TopK != nil {
593 small.TopK = smallModelSelected.TopK
594 }
595 if smallModelSelected.FrequencyPenalty != nil {
596 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
597 }
598 if smallModelSelected.PresencePenalty != nil {
599 small.PresencePenalty = smallModelSelected.PresencePenalty
600 }
601 small.Think = smallModelSelected.Think
602 }
603 }
604 c.Models[SelectedModelTypeLarge] = large
605 c.Models[SelectedModelTypeSmall] = small
606 return nil
607}
608
609// lookupConfigs searches config files recursively from CWD up to FS root
610func lookupConfigs(cwd string) []string {
611 // prepend default config paths
612 configPaths := []string{
613 GlobalConfig(),
614 GlobalConfigData(),
615 }
616
617 configNames := []string{appName + ".json", "." + appName + ".json"}
618
619 foundConfigs, err := fsext.Lookup(cwd, configNames...)
620 if err != nil {
621 // returns at least default configs
622 return configPaths
623 }
624
625 // reverse order so last config has more priority
626 slices.Reverse(foundConfigs)
627
628 return append(configPaths, foundConfigs...)
629}
630
631func loadFromConfigPaths(configPaths []string) (*Config, error) {
632 var configs [][]byte
633
634 for _, path := range configPaths {
635 data, err := os.ReadFile(path)
636 if err != nil {
637 if os.IsNotExist(err) {
638 continue
639 }
640 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
641 }
642 if len(data) == 0 {
643 continue
644 }
645 configs = append(configs, data)
646 }
647
648 return loadFromBytes(configs)
649}
650
651func loadFromBytes(configs [][]byte) (*Config, error) {
652 if len(configs) == 0 {
653 return &Config{}, nil
654 }
655
656 data, err := jsons.Merge(configs)
657 if err != nil {
658 return nil, err
659 }
660 var config Config
661 if err := json.Unmarshal(data, &config); err != nil {
662 return nil, err
663 }
664 return &config, nil
665}
666
667func hasVertexCredentials(env env.Env) bool {
668 hasProject := env.Get("VERTEXAI_PROJECT") != ""
669 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
670 return hasProject && hasLocation
671}
672
673func hasAWSCredentials(env env.Env) bool {
674 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
675 return true
676 }
677
678 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
679 return true
680 }
681
682 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
683 return true
684 }
685
686 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
687 return true
688 }
689
690 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
691 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
692 return true
693 }
694
695 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil && !testing.Testing() {
696 return true
697 }
698
699 return false
700}
701
702// GlobalConfig returns the global configuration file path for the application.
703func GlobalConfig() string {
704 if crushGlobal := os.Getenv("CRUSH_GLOBAL_CONFIG"); crushGlobal != "" {
705 return filepath.Join(crushGlobal, fmt.Sprintf("%s.json", appName))
706 }
707 if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
708 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
709 }
710 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
711}
712
713// GlobalConfigData returns the path to the main data directory for the application.
714// this config is used when the app overrides configurations instead of updating the global config.
715func GlobalConfigData() string {
716 if crushData := os.Getenv("CRUSH_GLOBAL_DATA"); crushData != "" {
717 return filepath.Join(crushData, fmt.Sprintf("%s.json", appName))
718 }
719 if xdgDataHome := os.Getenv("XDG_DATA_HOME"); xdgDataHome != "" {
720 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
721 }
722
723 // return the path to the main data directory
724 // for windows, it should be in `%LOCALAPPDATA%/crush/`
725 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
726 if runtime.GOOS == "windows" {
727 localAppData := cmp.Or(
728 os.Getenv("LOCALAPPDATA"),
729 filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
730 )
731 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
732 }
733
734 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
735}
736
737func assignIfNil[T any](ptr **T, val T) {
738 if *ptr == nil {
739 *ptr = &val
740 }
741}
742
743func isInsideWorktree() bool {
744 bts, err := exec.CommandContext(
745 context.Background(),
746 "git", "rev-parse",
747 "--is-inside-work-tree",
748 ).CombinedOutput()
749 return err == nil && strings.TrimSpace(string(bts)) == "true"
750}
751
752// GlobalSkillsDirs returns the default directories for Agent Skills.
753// Skills in these directories are auto-discovered and their files can be read
754// without permission prompts.
755func GlobalSkillsDirs() []string {
756 if crushSkills := os.Getenv("CRUSH_SKILLS_DIR"); crushSkills != "" {
757 return []string{crushSkills}
758 }
759
760 // Determine the base config directory.
761 var configBase string
762 if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
763 configBase = xdgConfigHome
764 } else if runtime.GOOS == "windows" {
765 configBase = cmp.Or(
766 os.Getenv("LOCALAPPDATA"),
767 filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
768 )
769 } else {
770 configBase = filepath.Join(home.Dir(), ".config")
771 }
772
773 return []string{
774 filepath.Join(configBase, appName, "skills"),
775 filepath.Join(configBase, "agents", "skills"),
776 }
777}