load.go

  1package config
  2
  3import (
  4	"context"
  5	"encoding/json"
  6	"fmt"
  7	"io"
  8	"log/slog"
  9	"maps"
 10	"os"
 11	"os/exec"
 12	"path/filepath"
 13	"runtime"
 14	"slices"
 15	"strconv"
 16	"strings"
 17
 18	"git.secluded.site/crush/internal/csync"
 19	"git.secluded.site/crush/internal/env"
 20	"git.secluded.site/crush/internal/fsext"
 21	"git.secluded.site/crush/internal/home"
 22	"git.secluded.site/crush/internal/log"
 23	"github.com/charmbracelet/catwalk/pkg/catwalk"
 24	powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
 25)
 26
 27const defaultCatwalkURL = "https://catwalk.charm.sh"
 28
 29// LoadReader config via io.Reader.
 30func LoadReader(fd io.Reader) (*Config, error) {
 31	data, err := io.ReadAll(fd)
 32	if err != nil {
 33		return nil, err
 34	}
 35
 36	var config Config
 37	err = json.Unmarshal(data, &config)
 38	if err != nil {
 39		return nil, err
 40	}
 41	return &config, err
 42}
 43
 44// Load loads the configuration from the default paths.
 45func Load(workingDir, dataDir string, debug bool) (*Config, error) {
 46	configPaths := lookupConfigs(workingDir)
 47
 48	cfg, err := loadFromConfigPaths(configPaths)
 49	if err != nil {
 50		return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
 51	}
 52
 53	cfg.dataConfigDir = GlobalConfigData()
 54
 55	cfg.setDefaults(workingDir, dataDir)
 56
 57	if debug {
 58		cfg.Options.Debug = true
 59	}
 60
 61	// Setup logs
 62	log.Setup(
 63		filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
 64		cfg.Options.Debug,
 65	)
 66
 67	if !isInsideWorktree() {
 68		const depth = 2
 69		const items = 100
 70		slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
 71		assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
 72		assignIfNil(&cfg.Tools.Ls.MaxItems, items)
 73		assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
 74		assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
 75	}
 76
 77	// Load known providers, this loads the config from catwalk
 78	providers, err := Providers(cfg)
 79	if err != nil {
 80		return nil, err
 81	}
 82	cfg.knownProviders = providers
 83
 84	env := env.New()
 85	// Configure providers
 86	valueResolver := NewShellVariableResolver(env)
 87	cfg.resolver = valueResolver
 88	if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
 89		return nil, fmt.Errorf("failed to configure providers: %w", err)
 90	}
 91
 92	if !cfg.IsConfigured() {
 93		slog.Warn("No providers configured")
 94		return cfg, nil
 95	}
 96
 97	if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
 98		return nil, fmt.Errorf("failed to configure selected models: %w", err)
 99	}
100	cfg.SetupAgents()
101	return cfg, nil
102}
103
104func PushPopCrushEnv() func() {
105	found := []string{}
106	for _, ev := range os.Environ() {
107		if strings.HasPrefix(ev, "CRUSH_") {
108			pair := strings.SplitN(ev, "=", 2)
109			if len(pair) != 2 {
110				continue
111			}
112			found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
113		}
114	}
115	backups := make(map[string]string)
116	for _, ev := range found {
117		backups[ev] = os.Getenv(ev)
118	}
119
120	for _, ev := range found {
121		os.Setenv(ev, os.Getenv("CRUSH_"+ev))
122	}
123
124	restore := func() {
125		for k, v := range backups {
126			os.Setenv(k, v)
127		}
128	}
129	return restore
130}
131
132func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
133	knownProviderNames := make(map[string]bool)
134	restore := PushPopCrushEnv()
135	defer restore()
136	for _, p := range knownProviders {
137		knownProviderNames[string(p.ID)] = true
138		config, configExists := c.Providers.Get(string(p.ID))
139		// if the user configured a known provider we need to allow it to override a couple of parameters
140		if configExists {
141			if config.BaseURL != "" {
142				p.APIEndpoint = config.BaseURL
143			}
144			if config.APIKey != "" {
145				p.APIKey = config.APIKey
146			}
147			if len(config.Models) > 0 {
148				models := []catwalk.Model{}
149				seen := make(map[string]bool)
150
151				for _, model := range config.Models {
152					if seen[model.ID] {
153						continue
154					}
155					seen[model.ID] = true
156					if model.Name == "" {
157						model.Name = model.ID
158					}
159					models = append(models, model)
160				}
161				for _, model := range p.Models {
162					if seen[model.ID] {
163						continue
164					}
165					seen[model.ID] = true
166					if model.Name == "" {
167						model.Name = model.ID
168					}
169					models = append(models, model)
170				}
171
172				p.Models = models
173			}
174		}
175
176		headers := map[string]string{}
177		if len(p.DefaultHeaders) > 0 {
178			maps.Copy(headers, p.DefaultHeaders)
179		}
180		if len(config.ExtraHeaders) > 0 {
181			maps.Copy(headers, config.ExtraHeaders)
182		}
183		prepared := ProviderConfig{
184			ID:                 string(p.ID),
185			Name:               p.Name,
186			BaseURL:            p.APIEndpoint,
187			APIKey:             p.APIKey,
188			Type:               p.Type,
189			Disable:            config.Disable,
190			SystemPromptPrefix: config.SystemPromptPrefix,
191			ExtraHeaders:       headers,
192			ExtraBody:          config.ExtraBody,
193			ExtraParams:        make(map[string]string),
194			Models:             p.Models,
195		}
196
197		switch p.ID {
198		// Handle specific providers that require additional configuration
199		case catwalk.InferenceProviderVertexAI:
200			if !hasVertexCredentials(env) {
201				if configExists {
202					slog.Warn("Skipping Vertex AI provider due to missing credentials")
203					c.Providers.Del(string(p.ID))
204				}
205				continue
206			}
207			prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
208			prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
209		case catwalk.InferenceProviderAzure:
210			endpoint, err := resolver.ResolveValue(p.APIEndpoint)
211			if err != nil || endpoint == "" {
212				if configExists {
213					slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
214					c.Providers.Del(string(p.ID))
215				}
216				continue
217			}
218			prepared.BaseURL = endpoint
219			prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
220		case catwalk.InferenceProviderBedrock:
221			if !hasAWSCredentials(env) {
222				if configExists {
223					slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
224					c.Providers.Del(string(p.ID))
225				}
226				continue
227			}
228			prepared.ExtraParams["region"] = env.Get("AWS_REGION")
229			if prepared.ExtraParams["region"] == "" {
230				prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
231			}
232			for _, model := range p.Models {
233				if !strings.HasPrefix(model.ID, "anthropic.") {
234					return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
235				}
236			}
237		default:
238			// if the provider api or endpoint are missing we skip them
239			v, err := resolver.ResolveValue(p.APIKey)
240			if v == "" || err != nil {
241				if configExists {
242					slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
243					c.Providers.Del(string(p.ID))
244				}
245				continue
246			}
247		}
248		c.Providers.Set(string(p.ID), prepared)
249	}
250
251	// validate the custom providers
252	for id, providerConfig := range c.Providers.Seq2() {
253		if knownProviderNames[id] {
254			continue
255		}
256
257		// Make sure the provider ID is set
258		providerConfig.ID = id
259		if providerConfig.Name == "" {
260			providerConfig.Name = id // Use ID as name if not set
261		}
262		// default to OpenAI if not set
263		if providerConfig.Type == "" {
264			providerConfig.Type = catwalk.TypeOpenAICompat
265		}
266		if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
267			slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
268			c.Providers.Del(id)
269			continue
270		}
271
272		if providerConfig.Disable {
273			slog.Debug("Skipping custom provider due to disable flag", "provider", id)
274			c.Providers.Del(id)
275			continue
276		}
277		if providerConfig.APIKey == "" {
278			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
279		}
280		if providerConfig.BaseURL == "" {
281			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
282			c.Providers.Del(id)
283			continue
284		}
285		if len(providerConfig.Models) == 0 {
286			slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
287			c.Providers.Del(id)
288			continue
289		}
290		apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
291		if apiKey == "" || err != nil {
292			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
293		}
294		baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
295		if baseURL == "" || err != nil {
296			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
297			c.Providers.Del(id)
298			continue
299		}
300
301		c.Providers.Set(id, providerConfig)
302	}
303	return nil
304}
305
306func (c *Config) setDefaults(workingDir, dataDir string) {
307	c.workingDir = workingDir
308	if c.Options == nil {
309		c.Options = &Options{}
310	}
311	if c.Options.TUI == nil {
312		c.Options.TUI = &TUIOptions{}
313	}
314	if c.Options.ContextPaths == nil {
315		c.Options.ContextPaths = []string{}
316	}
317	if c.Options.MemoryPaths == nil {
318		crushConfigDir := filepath.Dir(GlobalConfig())
319		c.Options.MemoryPaths = []string{
320			filepath.Join(crushConfigDir, "CRUSH.md"),
321			filepath.Join(filepath.Dir(crushConfigDir), "AGENTS.md"),
322		}
323	}
324	slices.Sort(c.Options.MemoryPaths)
325	c.Options.MemoryPaths = slices.Compact(c.Options.MemoryPaths)
326
327	if dataDir != "" {
328		c.Options.DataDirectory = dataDir
329	} else if c.Options.DataDirectory == "" {
330		if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
331			c.Options.DataDirectory = path
332		} else {
333			c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
334		}
335	}
336	if c.Providers == nil {
337		c.Providers = csync.NewMap[string, ProviderConfig]()
338	}
339	if c.Models == nil {
340		c.Models = make(map[SelectedModelType]SelectedModel)
341	}
342	if c.RecentModels == nil {
343		c.RecentModels = make(map[SelectedModelType][]SelectedModel)
344	}
345	if c.MCP == nil {
346		c.MCP = make(map[string]MCPConfig)
347	}
348	if c.LSP == nil {
349		c.LSP = make(map[string]LSPConfig)
350	}
351
352	// Apply defaults to LSP configurations
353	c.applyLSPDefaults()
354
355	// Add the default context paths if they are not already present
356	c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
357	slices.Sort(c.Options.ContextPaths)
358	c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
359
360	if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
361		c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
362	}
363
364	if c.Options.Attribution == nil {
365		c.Options.Attribution = &Attribution{
366			TrailerStyle:  TrailerStyleAssistedBy,
367			GeneratedWith: true,
368		}
369	} else if c.Options.Attribution.TrailerStyle == "" {
370		// Migrate deprecated co_authored_by or apply default
371		if c.Options.Attribution.CoAuthoredBy != nil {
372			if *c.Options.Attribution.CoAuthoredBy {
373				c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
374			} else {
375				c.Options.Attribution.TrailerStyle = TrailerStyleNone
376			}
377		} else {
378			c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
379		}
380	}
381	if c.Options.InitializeAs == "" {
382		c.Options.InitializeAs = defaultInitializeAs
383	}
384}
385
386// applyLSPDefaults applies default values from powernap to LSP configurations
387func (c *Config) applyLSPDefaults() {
388	// Get powernap's default configuration
389	configManager := powernapConfig.NewManager()
390	configManager.LoadDefaults()
391
392	// Apply defaults to each LSP configuration
393	for name, cfg := range c.LSP {
394		// Try to get defaults from powernap based on name or command name.
395		base, ok := configManager.GetServer(name)
396		if !ok {
397			base, ok = configManager.GetServer(cfg.Command)
398			if !ok {
399				continue
400			}
401		}
402		if cfg.Options == nil {
403			cfg.Options = base.Settings
404		}
405		if cfg.InitOptions == nil {
406			cfg.InitOptions = base.InitOptions
407		}
408		if len(cfg.FileTypes) == 0 {
409			cfg.FileTypes = base.FileTypes
410		}
411		if len(cfg.RootMarkers) == 0 {
412			cfg.RootMarkers = base.RootMarkers
413		}
414		if cfg.Command == "" {
415			cfg.Command = base.Command
416		}
417		if len(cfg.Args) == 0 {
418			cfg.Args = base.Args
419		}
420		if len(cfg.Env) == 0 {
421			cfg.Env = base.Environment
422		}
423		// Update the config in the map
424		c.LSP[name] = cfg
425	}
426}
427
428func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
429	if len(knownProviders) == 0 && c.Providers.Len() == 0 {
430		err = fmt.Errorf("no providers configured, please configure at least one provider")
431		return largeModel, smallModel, err
432	}
433
434	// Use the first provider enabled based on the known providers order
435	// if no provider found that is known use the first provider configured
436	for _, p := range knownProviders {
437		providerConfig, ok := c.Providers.Get(string(p.ID))
438		if !ok || providerConfig.Disable {
439			continue
440		}
441		defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
442		if defaultLargeModel == nil {
443			err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
444			return largeModel, smallModel, err
445		}
446		largeModel = SelectedModel{
447			Provider:        string(p.ID),
448			Model:           defaultLargeModel.ID,
449			MaxTokens:       defaultLargeModel.DefaultMaxTokens,
450			ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
451		}
452
453		defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
454		if defaultSmallModel == nil {
455			err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
456			return largeModel, smallModel, err
457		}
458		smallModel = SelectedModel{
459			Provider:        string(p.ID),
460			Model:           defaultSmallModel.ID,
461			MaxTokens:       defaultSmallModel.DefaultMaxTokens,
462			ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
463		}
464		return largeModel, smallModel, err
465	}
466
467	enabledProviders := c.EnabledProviders()
468	slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
469		return strings.Compare(a.ID, b.ID)
470	})
471
472	if len(enabledProviders) == 0 {
473		err = fmt.Errorf("no providers configured, please configure at least one provider")
474		return largeModel, smallModel, err
475	}
476
477	providerConfig := enabledProviders[0]
478	if len(providerConfig.Models) == 0 {
479		err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
480		return largeModel, smallModel, err
481	}
482	defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
483	largeModel = SelectedModel{
484		Provider:  providerConfig.ID,
485		Model:     defaultLargeModel.ID,
486		MaxTokens: defaultLargeModel.DefaultMaxTokens,
487	}
488	defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
489	smallModel = SelectedModel{
490		Provider:  providerConfig.ID,
491		Model:     defaultSmallModel.ID,
492		MaxTokens: defaultSmallModel.DefaultMaxTokens,
493	}
494	return largeModel, smallModel, err
495}
496
497func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
498	defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
499	if err != nil {
500		return fmt.Errorf("failed to select default models: %w", err)
501	}
502	large, small := defaultLarge, defaultSmall
503
504	largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
505	if largeModelConfigured {
506		if largeModelSelected.Model != "" {
507			large.Model = largeModelSelected.Model
508		}
509		if largeModelSelected.Provider != "" {
510			large.Provider = largeModelSelected.Provider
511		}
512		model := c.GetModel(large.Provider, large.Model)
513		if model == nil {
514			large = defaultLarge
515			// override the model type to large
516			err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
517			if err != nil {
518				return fmt.Errorf("failed to update preferred large model: %w", err)
519			}
520		} else {
521			if largeModelSelected.MaxTokens > 0 {
522				large.MaxTokens = largeModelSelected.MaxTokens
523			} else {
524				large.MaxTokens = model.DefaultMaxTokens
525			}
526			if largeModelSelected.ReasoningEffort != "" {
527				large.ReasoningEffort = largeModelSelected.ReasoningEffort
528			}
529			large.Think = largeModelSelected.Think
530			if largeModelSelected.Temperature != nil {
531				large.Temperature = largeModelSelected.Temperature
532			}
533			if largeModelSelected.TopP != nil {
534				large.TopP = largeModelSelected.TopP
535			}
536			if largeModelSelected.TopK != nil {
537				large.TopK = largeModelSelected.TopK
538			}
539			if largeModelSelected.FrequencyPenalty != nil {
540				large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
541			}
542			if largeModelSelected.PresencePenalty != nil {
543				large.PresencePenalty = largeModelSelected.PresencePenalty
544			}
545		}
546	}
547	smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
548	if smallModelConfigured {
549		if smallModelSelected.Model != "" {
550			small.Model = smallModelSelected.Model
551		}
552		if smallModelSelected.Provider != "" {
553			small.Provider = smallModelSelected.Provider
554		}
555
556		model := c.GetModel(small.Provider, small.Model)
557		if model == nil {
558			small = defaultSmall
559			// override the model type to small
560			err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
561			if err != nil {
562				return fmt.Errorf("failed to update preferred small model: %w", err)
563			}
564		} else {
565			if smallModelSelected.MaxTokens > 0 {
566				small.MaxTokens = smallModelSelected.MaxTokens
567			} else {
568				small.MaxTokens = model.DefaultMaxTokens
569			}
570			if smallModelSelected.ReasoningEffort != "" {
571				small.ReasoningEffort = smallModelSelected.ReasoningEffort
572			}
573			if smallModelSelected.Temperature != nil {
574				small.Temperature = smallModelSelected.Temperature
575			}
576			if smallModelSelected.TopP != nil {
577				small.TopP = smallModelSelected.TopP
578			}
579			if smallModelSelected.TopK != nil {
580				small.TopK = smallModelSelected.TopK
581			}
582			if smallModelSelected.FrequencyPenalty != nil {
583				small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
584			}
585			if smallModelSelected.PresencePenalty != nil {
586				small.PresencePenalty = smallModelSelected.PresencePenalty
587			}
588			small.Think = smallModelSelected.Think
589		}
590	}
591	c.Models[SelectedModelTypeLarge] = large
592	c.Models[SelectedModelTypeSmall] = small
593	return nil
594}
595
596// lookupConfigs searches config files recursively from CWD up to FS root
597func lookupConfigs(cwd string) []string {
598	// prepend default config paths
599	configPaths := []string{
600		GlobalConfig(),
601		GlobalConfigData(),
602	}
603
604	configNames := []string{appName + ".json", "." + appName + ".json"}
605
606	foundConfigs, err := fsext.Lookup(cwd, configNames...)
607	if err != nil {
608		// returns at least default configs
609		return configPaths
610	}
611
612	// reverse order so last config has more priority
613	slices.Reverse(foundConfigs)
614
615	return append(configPaths, foundConfigs...)
616}
617
618func loadFromConfigPaths(configPaths []string) (*Config, error) {
619	var configs []io.Reader
620
621	for _, path := range configPaths {
622		fd, err := os.Open(path)
623		if err != nil {
624			if os.IsNotExist(err) {
625				continue
626			}
627			return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
628		}
629		defer fd.Close()
630
631		configs = append(configs, fd)
632	}
633
634	return loadFromReaders(configs)
635}
636
637func loadFromReaders(readers []io.Reader) (*Config, error) {
638	if len(readers) == 0 {
639		return &Config{}, nil
640	}
641
642	merged, err := Merge(readers)
643	if err != nil {
644		return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
645	}
646
647	return LoadReader(merged)
648}
649
650func hasVertexCredentials(env env.Env) bool {
651	hasProject := env.Get("VERTEXAI_PROJECT") != ""
652	hasLocation := env.Get("VERTEXAI_LOCATION") != ""
653	return hasProject && hasLocation
654}
655
656func hasAWSCredentials(env env.Env) bool {
657	if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
658		return true
659	}
660
661	if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
662		return true
663	}
664
665	if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
666		return true
667	}
668
669	if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
670		return true
671	}
672
673	if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
674		env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
675		return true
676	}
677
678	if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil {
679		return true
680	}
681
682	return false
683}
684
685// GlobalConfig returns the global configuration file path for the application.
686func GlobalConfig() string {
687	xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
688	if xdgConfigHome != "" {
689		return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
690	}
691
692	return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
693}
694
695// GlobalConfigData returns the path to the main data directory for the application.
696// this config is used when the app overrides configurations instead of updating the global config.
697func GlobalConfigData() string {
698	xdgDataHome := os.Getenv("XDG_DATA_HOME")
699	if xdgDataHome != "" {
700		return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
701	}
702
703	// return the path to the main data directory
704	// for windows, it should be in `%LOCALAPPDATA%/crush/`
705	// for linux and macOS, it should be in `$HOME/.local/share/crush/`
706	if runtime.GOOS == "windows" {
707		localAppData := os.Getenv("LOCALAPPDATA")
708		if localAppData == "" {
709			localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
710		}
711		return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
712	}
713
714	return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
715}
716
717func assignIfNil[T any](ptr **T, val T) {
718	if *ptr == nil {
719		*ptr = &val
720	}
721}
722
723func isInsideWorktree() bool {
724	bts, err := exec.CommandContext(
725		context.Background(),
726		"git", "rev-parse",
727		"--is-inside-work-tree",
728	).CombinedOutput()
729	return err == nil && strings.TrimSpace(string(bts)) == "true"
730}