load.go

  1package config
  2
  3import (
  4	"cmp"
  5	"context"
  6	"encoding/json"
  7	"fmt"
  8	"log/slog"
  9	"maps"
 10	"os"
 11	"os/exec"
 12	"path/filepath"
 13	"runtime"
 14	"slices"
 15	"strconv"
 16	"strings"
 17	"testing"
 18
 19	"github.com/charmbracelet/catwalk/pkg/catwalk"
 20	"github.com/charmbracelet/crush/internal/agent/hyper"
 21	"github.com/charmbracelet/crush/internal/csync"
 22	"github.com/charmbracelet/crush/internal/env"
 23	"github.com/charmbracelet/crush/internal/fsext"
 24	"github.com/charmbracelet/crush/internal/home"
 25	"github.com/charmbracelet/crush/internal/log"
 26	powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
 27	"github.com/qjebbs/go-jsons"
 28)
 29
 30const defaultCatwalkURL = "https://catwalk.charm.sh"
 31
 32// Load loads the configuration from the default paths.
 33func Load(workingDir, dataDir string, debug bool) (*Config, error) {
 34	configPaths := lookupConfigs(workingDir)
 35
 36	cfg, err := loadFromConfigPaths(configPaths)
 37	if err != nil {
 38		return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
 39	}
 40
 41	cfg.dataConfigDir = GlobalConfigData()
 42
 43	cfg.setDefaults(workingDir, dataDir)
 44
 45	if debug {
 46		cfg.Options.Debug = true
 47	}
 48
 49	// Setup logs
 50	log.Setup(
 51		filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
 52		cfg.Options.Debug,
 53	)
 54
 55	if !isInsideWorktree() {
 56		const depth = 2
 57		const items = 100
 58		slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
 59		assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
 60		assignIfNil(&cfg.Tools.Ls.MaxItems, items)
 61		assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
 62		assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
 63	}
 64
 65	// Load known providers, this loads the config from catwalk
 66	providers, err := Providers(cfg)
 67	if err != nil {
 68		return nil, err
 69	}
 70	cfg.knownProviders = providers
 71
 72	env := env.New()
 73	// Configure providers
 74	valueResolver := NewShellVariableResolver(env)
 75	cfg.resolver = valueResolver
 76	if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
 77		return nil, fmt.Errorf("failed to configure providers: %w", err)
 78	}
 79
 80	if !cfg.IsConfigured() {
 81		slog.Warn("No providers configured")
 82		return cfg, nil
 83	}
 84
 85	if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
 86		return nil, fmt.Errorf("failed to configure selected models: %w", err)
 87	}
 88	cfg.SetupAgents()
 89	return cfg, nil
 90}
 91
 92func PushPopCrushEnv() func() {
 93	found := []string{}
 94	for _, ev := range os.Environ() {
 95		if strings.HasPrefix(ev, "CRUSH_") {
 96			pair := strings.SplitN(ev, "=", 2)
 97			if len(pair) != 2 {
 98				continue
 99			}
100			found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
101		}
102	}
103	backups := make(map[string]string)
104	for _, ev := range found {
105		backups[ev] = os.Getenv(ev)
106	}
107
108	for _, ev := range found {
109		os.Setenv(ev, os.Getenv("CRUSH_"+ev))
110	}
111
112	restore := func() {
113		for k, v := range backups {
114			os.Setenv(k, v)
115		}
116	}
117	return restore
118}
119
120func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
121	knownProviderNames := make(map[string]bool)
122	restore := PushPopCrushEnv()
123	defer restore()
124
125	// When disable_default_providers is enabled, skip all default/embedded
126	// providers entirely. Users must fully specify any providers they want.
127	// We skip to the custom provider validation loop which handles all
128	// user-configured providers uniformly.
129	if c.Options.DisableDefaultProviders {
130		knownProviders = nil
131	}
132
133	for _, p := range knownProviders {
134		knownProviderNames[string(p.ID)] = true
135		config, configExists := c.Providers.Get(string(p.ID))
136		// if the user configured a known provider we need to allow it to override a couple of parameters
137		if configExists {
138			if config.BaseURL != "" {
139				p.APIEndpoint = config.BaseURL
140			}
141			if config.APIKey != "" {
142				p.APIKey = config.APIKey
143			}
144			if len(config.Models) > 0 {
145				models := []catwalk.Model{}
146				seen := make(map[string]bool)
147
148				for _, model := range config.Models {
149					if seen[model.ID] {
150						continue
151					}
152					seen[model.ID] = true
153					if model.Name == "" {
154						model.Name = model.ID
155					}
156					models = append(models, model)
157				}
158				for _, model := range p.Models {
159					if seen[model.ID] {
160						continue
161					}
162					seen[model.ID] = true
163					if model.Name == "" {
164						model.Name = model.ID
165					}
166					models = append(models, model)
167				}
168
169				p.Models = models
170			}
171		}
172
173		headers := map[string]string{}
174		if len(p.DefaultHeaders) > 0 {
175			maps.Copy(headers, p.DefaultHeaders)
176		}
177		if len(config.ExtraHeaders) > 0 {
178			maps.Copy(headers, config.ExtraHeaders)
179		}
180		prepared := ProviderConfig{
181			ID:                 string(p.ID),
182			Name:               p.Name,
183			BaseURL:            p.APIEndpoint,
184			APIKey:             p.APIKey,
185			APIKeyTemplate:     p.APIKey, // Store original template for re-resolution
186			OAuthToken:         config.OAuthToken,
187			Type:               p.Type,
188			Disable:            config.Disable,
189			SystemPromptPrefix: config.SystemPromptPrefix,
190			ExtraHeaders:       headers,
191			ExtraBody:          config.ExtraBody,
192			ExtraParams:        make(map[string]string),
193			Models:             p.Models,
194		}
195
196		switch {
197		case p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil:
198			// Claude Code subscription is not supported anymore. Remove to show onboarding.
199			c.RemoveConfigField("providers.anthropic")
200			c.Providers.Del(string(p.ID))
201			continue
202		case p.ID == catwalk.InferenceProviderCopilot && config.OAuthToken != nil:
203			prepared.SetupGitHubCopilot()
204		}
205
206		switch p.ID {
207		// Handle specific providers that require additional configuration
208		case catwalk.InferenceProviderVertexAI:
209			if !hasVertexCredentials(env) {
210				if configExists {
211					slog.Warn("Skipping Vertex AI provider due to missing credentials")
212					c.Providers.Del(string(p.ID))
213				}
214				continue
215			}
216			prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
217			prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
218		case catwalk.InferenceProviderAzure:
219			endpoint, err := resolver.ResolveValue(p.APIEndpoint)
220			if err != nil || endpoint == "" {
221				if configExists {
222					slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
223					c.Providers.Del(string(p.ID))
224				}
225				continue
226			}
227			prepared.BaseURL = endpoint
228			prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
229		case catwalk.InferenceProviderBedrock:
230			if !hasAWSCredentials(env) {
231				if configExists {
232					slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
233					c.Providers.Del(string(p.ID))
234				}
235				continue
236			}
237			prepared.ExtraParams["region"] = env.Get("AWS_REGION")
238			if prepared.ExtraParams["region"] == "" {
239				prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
240			}
241			for _, model := range p.Models {
242				if !strings.HasPrefix(model.ID, "anthropic.") {
243					return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
244				}
245			}
246		default:
247			// if the provider api or endpoint are missing we skip them
248			v, err := resolver.ResolveValue(p.APIKey)
249			if v == "" || err != nil {
250				if configExists {
251					slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
252					c.Providers.Del(string(p.ID))
253				}
254				continue
255			}
256		}
257		c.Providers.Set(string(p.ID), prepared)
258	}
259
260	// validate the custom providers
261	for id, providerConfig := range c.Providers.Seq2() {
262		if knownProviderNames[id] {
263			continue
264		}
265
266		// Make sure the provider ID is set
267		providerConfig.ID = id
268		if providerConfig.Name == "" {
269			providerConfig.Name = id // Use ID as name if not set
270		}
271		// default to OpenAI if not set
272		if providerConfig.Type == "" {
273			providerConfig.Type = catwalk.TypeOpenAICompat
274		}
275		if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) && providerConfig.Type != hyper.Name {
276			slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
277			c.Providers.Del(id)
278			continue
279		}
280
281		if providerConfig.Disable {
282			slog.Debug("Skipping custom provider due to disable flag", "provider", id)
283			c.Providers.Del(id)
284			continue
285		}
286		if providerConfig.APIKey == "" {
287			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
288		}
289		if providerConfig.BaseURL == "" {
290			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
291			c.Providers.Del(id)
292			continue
293		}
294		if len(providerConfig.Models) == 0 {
295			slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
296			c.Providers.Del(id)
297			continue
298		}
299		apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
300		if apiKey == "" || err != nil {
301			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
302		}
303		baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
304		if baseURL == "" || err != nil {
305			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
306			c.Providers.Del(id)
307			continue
308		}
309
310		c.Providers.Set(id, providerConfig)
311	}
312	return nil
313}
314
315func (c *Config) setDefaults(workingDir, dataDir string) {
316	c.workingDir = workingDir
317	if c.Options == nil {
318		c.Options = &Options{}
319	}
320	if c.Options.TUI == nil {
321		c.Options.TUI = &TUIOptions{}
322	}
323	if c.Options.ContextPaths == nil {
324		c.Options.ContextPaths = []string{}
325	}
326	if c.Options.SkillsPaths == nil {
327		c.Options.SkillsPaths = []string{}
328	}
329	if dataDir != "" {
330		c.Options.DataDirectory = dataDir
331	} else if c.Options.DataDirectory == "" {
332		if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
333			c.Options.DataDirectory = path
334		} else {
335			c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
336		}
337	}
338	if c.Providers == nil {
339		c.Providers = csync.NewMap[string, ProviderConfig]()
340	}
341	if c.Models == nil {
342		c.Models = make(map[SelectedModelType]SelectedModel)
343	}
344	if c.RecentModels == nil {
345		c.RecentModels = make(map[SelectedModelType][]SelectedModel)
346	}
347	if c.MCP == nil {
348		c.MCP = make(map[string]MCPConfig)
349	}
350	if c.LSP == nil {
351		c.LSP = make(map[string]LSPConfig)
352	}
353
354	// Apply defaults to LSP configurations
355	c.applyLSPDefaults()
356
357	// Add the default context paths if they are not already present
358	c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
359	slices.Sort(c.Options.ContextPaths)
360	c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
361
362	// Add the default skills directories if not already present.
363	for _, dir := range GlobalSkillsDirs() {
364		if !slices.Contains(c.Options.SkillsPaths, dir) {
365			c.Options.SkillsPaths = append(c.Options.SkillsPaths, dir)
366		}
367	}
368
369	if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
370		c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
371	}
372
373	if str, ok := os.LookupEnv("CRUSH_DISABLE_DEFAULT_PROVIDERS"); ok {
374		c.Options.DisableDefaultProviders, _ = strconv.ParseBool(str)
375	}
376
377	if c.Options.Attribution == nil {
378		c.Options.Attribution = &Attribution{
379			TrailerStyle:  TrailerStyleAssistedBy,
380			GeneratedWith: true,
381		}
382	} else if c.Options.Attribution.TrailerStyle == "" {
383		// Migrate deprecated co_authored_by or apply default
384		if c.Options.Attribution.CoAuthoredBy != nil {
385			if *c.Options.Attribution.CoAuthoredBy {
386				c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
387			} else {
388				c.Options.Attribution.TrailerStyle = TrailerStyleNone
389			}
390		} else {
391			c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
392		}
393	}
394	if c.Options.InitializeAs == "" {
395		c.Options.InitializeAs = defaultInitializeAs
396	}
397}
398
399// applyLSPDefaults applies default values from powernap to LSP configurations
400func (c *Config) applyLSPDefaults() {
401	// Get powernap's default configuration
402	configManager := powernapConfig.NewManager()
403	configManager.LoadDefaults()
404
405	// Apply defaults to each LSP configuration
406	for name, cfg := range c.LSP {
407		// Try to get defaults from powernap based on name or command name.
408		base, ok := configManager.GetServer(name)
409		if !ok {
410			base, ok = configManager.GetServer(cfg.Command)
411			if !ok {
412				continue
413			}
414		}
415		if cfg.Options == nil {
416			cfg.Options = base.Settings
417		}
418		if cfg.InitOptions == nil {
419			cfg.InitOptions = base.InitOptions
420		}
421		if len(cfg.FileTypes) == 0 {
422			cfg.FileTypes = base.FileTypes
423		}
424		if len(cfg.RootMarkers) == 0 {
425			cfg.RootMarkers = base.RootMarkers
426		}
427		if cfg.Command == "" {
428			cfg.Command = base.Command
429		}
430		if len(cfg.Args) == 0 {
431			cfg.Args = base.Args
432		}
433		if len(cfg.Env) == 0 {
434			cfg.Env = base.Environment
435		}
436		// Update the config in the map
437		c.LSP[name] = cfg
438	}
439}
440
441func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
442	if len(knownProviders) == 0 && c.Providers.Len() == 0 {
443		err = fmt.Errorf("no providers configured, please configure at least one provider")
444		return largeModel, smallModel, err
445	}
446
447	// Use the first provider enabled based on the known providers order
448	// if no provider found that is known use the first provider configured
449	for _, p := range knownProviders {
450		providerConfig, ok := c.Providers.Get(string(p.ID))
451		if !ok || providerConfig.Disable {
452			continue
453		}
454		defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
455		if defaultLargeModel == nil {
456			err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
457			return largeModel, smallModel, err
458		}
459		largeModel = SelectedModel{
460			Provider:        string(p.ID),
461			Model:           defaultLargeModel.ID,
462			MaxTokens:       defaultLargeModel.DefaultMaxTokens,
463			ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
464		}
465
466		defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
467		if defaultSmallModel == nil {
468			err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
469			return largeModel, smallModel, err
470		}
471		smallModel = SelectedModel{
472			Provider:        string(p.ID),
473			Model:           defaultSmallModel.ID,
474			MaxTokens:       defaultSmallModel.DefaultMaxTokens,
475			ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
476		}
477		return largeModel, smallModel, err
478	}
479
480	enabledProviders := c.EnabledProviders()
481	slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
482		return strings.Compare(a.ID, b.ID)
483	})
484
485	if len(enabledProviders) == 0 {
486		err = fmt.Errorf("no providers configured, please configure at least one provider")
487		return largeModel, smallModel, err
488	}
489
490	providerConfig := enabledProviders[0]
491	if len(providerConfig.Models) == 0 {
492		err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
493		return largeModel, smallModel, err
494	}
495	defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
496	largeModel = SelectedModel{
497		Provider:  providerConfig.ID,
498		Model:     defaultLargeModel.ID,
499		MaxTokens: defaultLargeModel.DefaultMaxTokens,
500	}
501	defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
502	smallModel = SelectedModel{
503		Provider:  providerConfig.ID,
504		Model:     defaultSmallModel.ID,
505		MaxTokens: defaultSmallModel.DefaultMaxTokens,
506	}
507	return largeModel, smallModel, err
508}
509
510func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
511	defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
512	if err != nil {
513		return fmt.Errorf("failed to select default models: %w", err)
514	}
515	large, small := defaultLarge, defaultSmall
516
517	largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
518	if largeModelConfigured {
519		if largeModelSelected.Model != "" {
520			large.Model = largeModelSelected.Model
521		}
522		if largeModelSelected.Provider != "" {
523			large.Provider = largeModelSelected.Provider
524		}
525		model := c.GetModel(large.Provider, large.Model)
526		if model == nil {
527			large = defaultLarge
528			// override the model type to large
529			err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
530			if err != nil {
531				return fmt.Errorf("failed to update preferred large model: %w", err)
532			}
533		} else {
534			if largeModelSelected.MaxTokens > 0 {
535				large.MaxTokens = largeModelSelected.MaxTokens
536			} else {
537				large.MaxTokens = model.DefaultMaxTokens
538			}
539			if largeModelSelected.ReasoningEffort != "" {
540				large.ReasoningEffort = largeModelSelected.ReasoningEffort
541			}
542			large.Think = largeModelSelected.Think
543			if largeModelSelected.Temperature != nil {
544				large.Temperature = largeModelSelected.Temperature
545			}
546			if largeModelSelected.TopP != nil {
547				large.TopP = largeModelSelected.TopP
548			}
549			if largeModelSelected.TopK != nil {
550				large.TopK = largeModelSelected.TopK
551			}
552			if largeModelSelected.FrequencyPenalty != nil {
553				large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
554			}
555			if largeModelSelected.PresencePenalty != nil {
556				large.PresencePenalty = largeModelSelected.PresencePenalty
557			}
558		}
559	}
560	smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
561	if smallModelConfigured {
562		if smallModelSelected.Model != "" {
563			small.Model = smallModelSelected.Model
564		}
565		if smallModelSelected.Provider != "" {
566			small.Provider = smallModelSelected.Provider
567		}
568
569		model := c.GetModel(small.Provider, small.Model)
570		if model == nil {
571			small = defaultSmall
572			// override the model type to small
573			err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
574			if err != nil {
575				return fmt.Errorf("failed to update preferred small model: %w", err)
576			}
577		} else {
578			if smallModelSelected.MaxTokens > 0 {
579				small.MaxTokens = smallModelSelected.MaxTokens
580			} else {
581				small.MaxTokens = model.DefaultMaxTokens
582			}
583			if smallModelSelected.ReasoningEffort != "" {
584				small.ReasoningEffort = smallModelSelected.ReasoningEffort
585			}
586			if smallModelSelected.Temperature != nil {
587				small.Temperature = smallModelSelected.Temperature
588			}
589			if smallModelSelected.TopP != nil {
590				small.TopP = smallModelSelected.TopP
591			}
592			if smallModelSelected.TopK != nil {
593				small.TopK = smallModelSelected.TopK
594			}
595			if smallModelSelected.FrequencyPenalty != nil {
596				small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
597			}
598			if smallModelSelected.PresencePenalty != nil {
599				small.PresencePenalty = smallModelSelected.PresencePenalty
600			}
601			small.Think = smallModelSelected.Think
602		}
603	}
604	c.Models[SelectedModelTypeLarge] = large
605	c.Models[SelectedModelTypeSmall] = small
606	return nil
607}
608
609// lookupConfigs searches config files recursively from CWD up to FS root
610func lookupConfigs(cwd string) []string {
611	// prepend default config paths
612	configPaths := []string{
613		GlobalConfig(),
614		GlobalConfigData(),
615	}
616
617	configNames := []string{appName + ".json", "." + appName + ".json"}
618
619	foundConfigs, err := fsext.Lookup(cwd, configNames...)
620	if err != nil {
621		// returns at least default configs
622		return configPaths
623	}
624
625	// reverse order so last config has more priority
626	slices.Reverse(foundConfigs)
627
628	return append(configPaths, foundConfigs...)
629}
630
631func loadFromConfigPaths(configPaths []string) (*Config, error) {
632	var configs [][]byte
633
634	for _, path := range configPaths {
635		data, err := os.ReadFile(path)
636		if err != nil {
637			if os.IsNotExist(err) {
638				continue
639			}
640			return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
641		}
642		if len(data) == 0 {
643			continue
644		}
645		configs = append(configs, data)
646	}
647
648	return loadFromBytes(configs)
649}
650
651func loadFromBytes(configs [][]byte) (*Config, error) {
652	if len(configs) == 0 {
653		return &Config{}, nil
654	}
655
656	data, err := jsons.Merge(configs)
657	if err != nil {
658		return nil, err
659	}
660	var config Config
661	if err := json.Unmarshal(data, &config); err != nil {
662		return nil, err
663	}
664	return &config, nil
665}
666
667func hasVertexCredentials(env env.Env) bool {
668	hasProject := env.Get("VERTEXAI_PROJECT") != ""
669	hasLocation := env.Get("VERTEXAI_LOCATION") != ""
670	return hasProject && hasLocation
671}
672
673func hasAWSCredentials(env env.Env) bool {
674	if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
675		return true
676	}
677
678	if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
679		return true
680	}
681
682	if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
683		return true
684	}
685
686	if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
687		return true
688	}
689
690	if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
691		env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
692		return true
693	}
694
695	if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil && !testing.Testing() {
696		return true
697	}
698
699	return false
700}
701
702// GlobalConfig returns the global configuration file path for the application.
703func GlobalConfig() string {
704	if crushGlobal := os.Getenv("CRUSH_GLOBAL_CONFIG"); crushGlobal != "" {
705		return filepath.Join(crushGlobal, fmt.Sprintf("%s.json", appName))
706	}
707	if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
708		return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
709	}
710	return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
711}
712
713// GlobalConfigData returns the path to the main data directory for the application.
714// this config is used when the app overrides configurations instead of updating the global config.
715func GlobalConfigData() string {
716	if crushData := os.Getenv("CRUSH_GLOBAL_DATA"); crushData != "" {
717		return filepath.Join(crushData, fmt.Sprintf("%s.json", appName))
718	}
719	if xdgDataHome := os.Getenv("XDG_DATA_HOME"); xdgDataHome != "" {
720		return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
721	}
722
723	// return the path to the main data directory
724	// for windows, it should be in `%LOCALAPPDATA%/crush/`
725	// for linux and macOS, it should be in `$HOME/.local/share/crush/`
726	if runtime.GOOS == "windows" {
727		localAppData := cmp.Or(
728			os.Getenv("LOCALAPPDATA"),
729			filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
730		)
731		return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
732	}
733
734	return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
735}
736
737func assignIfNil[T any](ptr **T, val T) {
738	if *ptr == nil {
739		*ptr = &val
740	}
741}
742
743func isInsideWorktree() bool {
744	bts, err := exec.CommandContext(
745		context.Background(),
746		"git", "rev-parse",
747		"--is-inside-work-tree",
748	).CombinedOutput()
749	return err == nil && strings.TrimSpace(string(bts)) == "true"
750}
751
752// GlobalSkillsDirs returns the default directories for Agent Skills.
753// Skills in these directories are auto-discovered and their files can be read
754// without permission prompts.
755func GlobalSkillsDirs() []string {
756	if crushSkills := os.Getenv("CRUSH_SKILLS_DIR"); crushSkills != "" {
757		return []string{crushSkills}
758	}
759
760	// Determine the base config directory.
761	var configBase string
762	if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
763		configBase = xdgConfigHome
764	} else if runtime.GOOS == "windows" {
765		configBase = cmp.Or(
766			os.Getenv("LOCALAPPDATA"),
767			filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
768		)
769	} else {
770		configBase = filepath.Join(home.Dir(), ".config")
771	}
772
773	return []string{
774		filepath.Join(configBase, appName, "skills"),
775		filepath.Join(configBase, "agents", "skills"),
776	}
777}