load.go

  1package config
  2
  3import (
  4	"context"
  5	"encoding/json"
  6	"fmt"
  7	"io"
  8	"log/slog"
  9	"maps"
 10	"os"
 11	"os/exec"
 12	"path/filepath"
 13	"runtime"
 14	"slices"
 15	"strconv"
 16	"strings"
 17	"testing"
 18
 19	"github.com/charmbracelet/catwalk/pkg/catwalk"
 20	"git.secluded.site/crush/internal/csync"
 21	"git.secluded.site/crush/internal/env"
 22	"git.secluded.site/crush/internal/fsext"
 23	"git.secluded.site/crush/internal/home"
 24	"git.secluded.site/crush/internal/log"
 25	powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
 26)
 27
 28const defaultCatwalkURL = "https://catwalk.charm.sh"
 29
 30// LoadReader config via io.Reader.
 31func LoadReader(fd io.Reader) (*Config, error) {
 32	data, err := io.ReadAll(fd)
 33	if err != nil {
 34		return nil, err
 35	}
 36
 37	var config Config
 38	err = json.Unmarshal(data, &config)
 39	if err != nil {
 40		return nil, err
 41	}
 42	return &config, err
 43}
 44
 45// Load loads the configuration from the default paths.
 46func Load(workingDir, dataDir string, debug bool) (*Config, error) {
 47	configPaths := lookupConfigs(workingDir)
 48
 49	cfg, err := loadFromConfigPaths(configPaths)
 50	if err != nil {
 51		return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
 52	}
 53
 54	cfg.dataConfigDir = GlobalConfigData()
 55
 56	cfg.setDefaults(workingDir, dataDir)
 57
 58	if debug {
 59		cfg.Options.Debug = true
 60	}
 61
 62	// Setup logs
 63	log.Setup(
 64		filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
 65		cfg.Options.Debug,
 66	)
 67
 68	if !isInsideWorktree() {
 69		const depth = 2
 70		const items = 100
 71		slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
 72		assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
 73		assignIfNil(&cfg.Tools.Ls.MaxItems, items)
 74		assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
 75		assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
 76	}
 77
 78	// Load known providers, this loads the config from catwalk
 79	providers, err := Providers(cfg)
 80	if err != nil {
 81		return nil, err
 82	}
 83	cfg.knownProviders = providers
 84
 85	env := env.New()
 86	// Configure providers
 87	valueResolver := NewShellVariableResolver(env)
 88	cfg.resolver = valueResolver
 89	if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
 90		return nil, fmt.Errorf("failed to configure providers: %w", err)
 91	}
 92
 93	if !cfg.IsConfigured() {
 94		slog.Warn("No providers configured")
 95		return cfg, nil
 96	}
 97
 98	if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
 99		return nil, fmt.Errorf("failed to configure selected models: %w", err)
100	}
101	cfg.SetupAgents()
102	return cfg, nil
103}
104
105func PushPopCrushEnv() func() {
106	found := []string{}
107	for _, ev := range os.Environ() {
108		if strings.HasPrefix(ev, "CRUSH_") {
109			pair := strings.SplitN(ev, "=", 2)
110			if len(pair) != 2 {
111				continue
112			}
113			found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
114		}
115	}
116	backups := make(map[string]string)
117	for _, ev := range found {
118		backups[ev] = os.Getenv(ev)
119	}
120
121	for _, ev := range found {
122		os.Setenv(ev, os.Getenv("CRUSH_"+ev))
123	}
124
125	restore := func() {
126		for k, v := range backups {
127			os.Setenv(k, v)
128		}
129	}
130	return restore
131}
132
133func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
134	knownProviderNames := make(map[string]bool)
135	restore := PushPopCrushEnv()
136	defer restore()
137
138	for _, p := range knownProviders {
139		knownProviderNames[string(p.ID)] = true
140		config, configExists := c.Providers.Get(string(p.ID))
141		// if the user configured a known provider we need to allow it to override a couple of parameters
142		if configExists {
143			if config.BaseURL != "" {
144				p.APIEndpoint = config.BaseURL
145			}
146			if config.APIKey != "" {
147				p.APIKey = config.APIKey
148			}
149			if len(config.Models) > 0 {
150				models := []catwalk.Model{}
151				seen := make(map[string]bool)
152
153				for _, model := range config.Models {
154					if seen[model.ID] {
155						continue
156					}
157					seen[model.ID] = true
158					if model.Name == "" {
159						model.Name = model.ID
160					}
161					models = append(models, model)
162				}
163				for _, model := range p.Models {
164					if seen[model.ID] {
165						continue
166					}
167					seen[model.ID] = true
168					if model.Name == "" {
169						model.Name = model.ID
170					}
171					models = append(models, model)
172				}
173
174				p.Models = models
175			}
176		}
177
178		headers := map[string]string{}
179		if len(p.DefaultHeaders) > 0 {
180			maps.Copy(headers, p.DefaultHeaders)
181		}
182		if len(config.ExtraHeaders) > 0 {
183			maps.Copy(headers, config.ExtraHeaders)
184		}
185		prepared := ProviderConfig{
186			ID:                 string(p.ID),
187			Name:               p.Name,
188			BaseURL:            p.APIEndpoint,
189			APIKey:             p.APIKey,
190			APIKeyTemplate:     p.APIKey, // Store original template for re-resolution
191			OAuthToken:         config.OAuthToken,
192			Type:               p.Type,
193			Disable:            config.Disable,
194			SystemPromptPrefix: config.SystemPromptPrefix,
195			ExtraHeaders:       headers,
196			ExtraBody:          config.ExtraBody,
197			ExtraParams:        make(map[string]string),
198			Models:             p.Models,
199		}
200
201		if p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil {
202			prepared.SetupClaudeCode()
203		}
204
205		switch p.ID {
206		// Handle specific providers that require additional configuration
207		case catwalk.InferenceProviderVertexAI:
208			if !hasVertexCredentials(env) {
209				if configExists {
210					slog.Warn("Skipping Vertex AI provider due to missing credentials")
211					c.Providers.Del(string(p.ID))
212				}
213				continue
214			}
215			prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
216			prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
217		case catwalk.InferenceProviderAzure:
218			endpoint, err := resolver.ResolveValue(p.APIEndpoint)
219			if err != nil || endpoint == "" {
220				if configExists {
221					slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
222					c.Providers.Del(string(p.ID))
223				}
224				continue
225			}
226			prepared.BaseURL = endpoint
227			prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
228		case catwalk.InferenceProviderBedrock:
229			if !hasAWSCredentials(env) {
230				if configExists {
231					slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
232					c.Providers.Del(string(p.ID))
233				}
234				continue
235			}
236			prepared.ExtraParams["region"] = env.Get("AWS_REGION")
237			if prepared.ExtraParams["region"] == "" {
238				prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
239			}
240			for _, model := range p.Models {
241				if !strings.HasPrefix(model.ID, "anthropic.") {
242					return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
243				}
244			}
245		default:
246			// if the provider api or endpoint are missing we skip them
247			v, err := resolver.ResolveValue(p.APIKey)
248			if v == "" || err != nil {
249				if configExists {
250					slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
251					c.Providers.Del(string(p.ID))
252				}
253				continue
254			}
255		}
256		c.Providers.Set(string(p.ID), prepared)
257	}
258
259	// validate the custom providers
260	for id, providerConfig := range c.Providers.Seq2() {
261		if knownProviderNames[id] {
262			continue
263		}
264
265		// Make sure the provider ID is set
266		providerConfig.ID = id
267		if providerConfig.Name == "" {
268			providerConfig.Name = id // Use ID as name if not set
269		}
270		// default to OpenAI if not set
271		if providerConfig.Type == "" {
272			providerConfig.Type = catwalk.TypeOpenAICompat
273		}
274		if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
275			slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
276			c.Providers.Del(id)
277			continue
278		}
279
280		if providerConfig.Disable {
281			slog.Debug("Skipping custom provider due to disable flag", "provider", id)
282			c.Providers.Del(id)
283			continue
284		}
285		if providerConfig.APIKey == "" {
286			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
287		}
288		if providerConfig.BaseURL == "" {
289			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
290			c.Providers.Del(id)
291			continue
292		}
293		if len(providerConfig.Models) == 0 {
294			slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
295			c.Providers.Del(id)
296			continue
297		}
298		apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
299		if apiKey == "" || err != nil {
300			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
301		}
302		baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
303		if baseURL == "" || err != nil {
304			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
305			c.Providers.Del(id)
306			continue
307		}
308
309		c.Providers.Set(id, providerConfig)
310	}
311	return nil
312}
313
314func (c *Config) setDefaults(workingDir, dataDir string) {
315	c.workingDir = workingDir
316	if c.Options == nil {
317		c.Options = &Options{}
318	}
319	if c.Options.TUI == nil {
320		c.Options.TUI = &TUIOptions{}
321	}
322	if c.Options.ContextPaths == nil {
323		c.Options.ContextPaths = []string{}
324	}
325	if c.Options.MemoryPaths == nil {
326		crushConfigDir := filepath.Dir(GlobalConfig())
327		c.Options.MemoryPaths = []string{
328			filepath.Join(crushConfigDir, "CRUSH.md"),
329			filepath.Join(filepath.Dir(crushConfigDir), "AGENTS.md"),
330		}
331	}
332	slices.Sort(c.Options.MemoryPaths)
333	c.Options.MemoryPaths = slices.Compact(c.Options.MemoryPaths)
334
335	if dataDir != "" {
336		c.Options.DataDirectory = dataDir
337	} else if c.Options.DataDirectory == "" {
338		if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
339			c.Options.DataDirectory = path
340		} else {
341			c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
342		}
343	}
344	if c.Providers == nil {
345		c.Providers = csync.NewMap[string, ProviderConfig]()
346	}
347	if c.Models == nil {
348		c.Models = make(map[SelectedModelType]SelectedModel)
349	}
350	if c.RecentModels == nil {
351		c.RecentModels = make(map[SelectedModelType][]SelectedModel)
352	}
353	if c.MCP == nil {
354		c.MCP = make(map[string]MCPConfig)
355	}
356	if c.LSP == nil {
357		c.LSP = make(map[string]LSPConfig)
358	}
359
360	// Apply defaults to LSP configurations
361	c.applyLSPDefaults()
362
363	// Add the default context paths if they are not already present
364	c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
365	slices.Sort(c.Options.ContextPaths)
366	c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
367
368	if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
369		c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
370	}
371
372	if c.Options.Attribution == nil {
373		c.Options.Attribution = &Attribution{
374			TrailerStyle:  TrailerStyleAssistedBy,
375			GeneratedWith: true,
376		}
377	} else if c.Options.Attribution.TrailerStyle == "" {
378		// Migrate deprecated co_authored_by or apply default
379		if c.Options.Attribution.CoAuthoredBy != nil {
380			if *c.Options.Attribution.CoAuthoredBy {
381				c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
382			} else {
383				c.Options.Attribution.TrailerStyle = TrailerStyleNone
384			}
385		} else {
386			c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
387		}
388	}
389	if c.Options.InitializeAs == "" {
390		c.Options.InitializeAs = defaultInitializeAs
391	}
392}
393
394// applyLSPDefaults applies default values from powernap to LSP configurations
395func (c *Config) applyLSPDefaults() {
396	// Get powernap's default configuration
397	configManager := powernapConfig.NewManager()
398	configManager.LoadDefaults()
399
400	// Apply defaults to each LSP configuration
401	for name, cfg := range c.LSP {
402		// Try to get defaults from powernap based on name or command name.
403		base, ok := configManager.GetServer(name)
404		if !ok {
405			base, ok = configManager.GetServer(cfg.Command)
406			if !ok {
407				continue
408			}
409		}
410		if cfg.Options == nil {
411			cfg.Options = base.Settings
412		}
413		if cfg.InitOptions == nil {
414			cfg.InitOptions = base.InitOptions
415		}
416		if len(cfg.FileTypes) == 0 {
417			cfg.FileTypes = base.FileTypes
418		}
419		if len(cfg.RootMarkers) == 0 {
420			cfg.RootMarkers = base.RootMarkers
421		}
422		if cfg.Command == "" {
423			cfg.Command = base.Command
424		}
425		if len(cfg.Args) == 0 {
426			cfg.Args = base.Args
427		}
428		if len(cfg.Env) == 0 {
429			cfg.Env = base.Environment
430		}
431		// Update the config in the map
432		c.LSP[name] = cfg
433	}
434}
435
436func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
437	if len(knownProviders) == 0 && c.Providers.Len() == 0 {
438		err = fmt.Errorf("no providers configured, please configure at least one provider")
439		return largeModel, smallModel, err
440	}
441
442	// Use the first provider enabled based on the known providers order
443	// if no provider found that is known use the first provider configured
444	for _, p := range knownProviders {
445		providerConfig, ok := c.Providers.Get(string(p.ID))
446		if !ok || providerConfig.Disable {
447			continue
448		}
449		defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
450		if defaultLargeModel == nil {
451			err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
452			return largeModel, smallModel, err
453		}
454		largeModel = SelectedModel{
455			Provider:        string(p.ID),
456			Model:           defaultLargeModel.ID,
457			MaxTokens:       defaultLargeModel.DefaultMaxTokens,
458			ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
459		}
460
461		defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
462		if defaultSmallModel == nil {
463			err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
464			return largeModel, smallModel, err
465		}
466		smallModel = SelectedModel{
467			Provider:        string(p.ID),
468			Model:           defaultSmallModel.ID,
469			MaxTokens:       defaultSmallModel.DefaultMaxTokens,
470			ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
471		}
472		return largeModel, smallModel, err
473	}
474
475	enabledProviders := c.EnabledProviders()
476	slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
477		return strings.Compare(a.ID, b.ID)
478	})
479
480	if len(enabledProviders) == 0 {
481		err = fmt.Errorf("no providers configured, please configure at least one provider")
482		return largeModel, smallModel, err
483	}
484
485	providerConfig := enabledProviders[0]
486	if len(providerConfig.Models) == 0 {
487		err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
488		return largeModel, smallModel, err
489	}
490	defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
491	largeModel = SelectedModel{
492		Provider:  providerConfig.ID,
493		Model:     defaultLargeModel.ID,
494		MaxTokens: defaultLargeModel.DefaultMaxTokens,
495	}
496	defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
497	smallModel = SelectedModel{
498		Provider:  providerConfig.ID,
499		Model:     defaultSmallModel.ID,
500		MaxTokens: defaultSmallModel.DefaultMaxTokens,
501	}
502	return largeModel, smallModel, err
503}
504
505func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
506	defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
507	if err != nil {
508		return fmt.Errorf("failed to select default models: %w", err)
509	}
510	large, small := defaultLarge, defaultSmall
511
512	largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
513	if largeModelConfigured {
514		if largeModelSelected.Model != "" {
515			large.Model = largeModelSelected.Model
516		}
517		if largeModelSelected.Provider != "" {
518			large.Provider = largeModelSelected.Provider
519		}
520		model := c.GetModel(large.Provider, large.Model)
521		if model == nil {
522			large = defaultLarge
523			// override the model type to large
524			err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
525			if err != nil {
526				return fmt.Errorf("failed to update preferred large model: %w", err)
527			}
528		} else {
529			if largeModelSelected.MaxTokens > 0 {
530				large.MaxTokens = largeModelSelected.MaxTokens
531			} else {
532				large.MaxTokens = model.DefaultMaxTokens
533			}
534			if largeModelSelected.ReasoningEffort != "" {
535				large.ReasoningEffort = largeModelSelected.ReasoningEffort
536			}
537			large.Think = largeModelSelected.Think
538			if largeModelSelected.Temperature != nil {
539				large.Temperature = largeModelSelected.Temperature
540			}
541			if largeModelSelected.TopP != nil {
542				large.TopP = largeModelSelected.TopP
543			}
544			if largeModelSelected.TopK != nil {
545				large.TopK = largeModelSelected.TopK
546			}
547			if largeModelSelected.FrequencyPenalty != nil {
548				large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
549			}
550			if largeModelSelected.PresencePenalty != nil {
551				large.PresencePenalty = largeModelSelected.PresencePenalty
552			}
553		}
554	}
555	smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
556	if smallModelConfigured {
557		if smallModelSelected.Model != "" {
558			small.Model = smallModelSelected.Model
559		}
560		if smallModelSelected.Provider != "" {
561			small.Provider = smallModelSelected.Provider
562		}
563
564		model := c.GetModel(small.Provider, small.Model)
565		if model == nil {
566			small = defaultSmall
567			// override the model type to small
568			err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
569			if err != nil {
570				return fmt.Errorf("failed to update preferred small model: %w", err)
571			}
572		} else {
573			if smallModelSelected.MaxTokens > 0 {
574				small.MaxTokens = smallModelSelected.MaxTokens
575			} else {
576				small.MaxTokens = model.DefaultMaxTokens
577			}
578			if smallModelSelected.ReasoningEffort != "" {
579				small.ReasoningEffort = smallModelSelected.ReasoningEffort
580			}
581			if smallModelSelected.Temperature != nil {
582				small.Temperature = smallModelSelected.Temperature
583			}
584			if smallModelSelected.TopP != nil {
585				small.TopP = smallModelSelected.TopP
586			}
587			if smallModelSelected.TopK != nil {
588				small.TopK = smallModelSelected.TopK
589			}
590			if smallModelSelected.FrequencyPenalty != nil {
591				small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
592			}
593			if smallModelSelected.PresencePenalty != nil {
594				small.PresencePenalty = smallModelSelected.PresencePenalty
595			}
596			small.Think = smallModelSelected.Think
597		}
598	}
599	c.Models[SelectedModelTypeLarge] = large
600	c.Models[SelectedModelTypeSmall] = small
601	return nil
602}
603
604// lookupConfigs searches config files recursively from CWD up to FS root
605func lookupConfigs(cwd string) []string {
606	// prepend default config paths
607	configPaths := []string{
608		GlobalConfig(),
609		GlobalConfigData(),
610	}
611
612	configNames := []string{appName + ".json", "." + appName + ".json"}
613
614	foundConfigs, err := fsext.Lookup(cwd, configNames...)
615	if err != nil {
616		// returns at least default configs
617		return configPaths
618	}
619
620	// reverse order so last config has more priority
621	slices.Reverse(foundConfigs)
622
623	return append(configPaths, foundConfigs...)
624}
625
626func loadFromConfigPaths(configPaths []string) (*Config, error) {
627	var configs []io.Reader
628
629	for _, path := range configPaths {
630		fd, err := os.Open(path)
631		if err != nil {
632			if os.IsNotExist(err) {
633				continue
634			}
635			return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
636		}
637		defer fd.Close()
638
639		configs = append(configs, fd)
640	}
641
642	return loadFromReaders(configs)
643}
644
645func loadFromReaders(readers []io.Reader) (*Config, error) {
646	if len(readers) == 0 {
647		return &Config{}, nil
648	}
649
650	merged, err := Merge(readers)
651	if err != nil {
652		return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
653	}
654
655	return LoadReader(merged)
656}
657
658func hasVertexCredentials(env env.Env) bool {
659	hasProject := env.Get("VERTEXAI_PROJECT") != ""
660	hasLocation := env.Get("VERTEXAI_LOCATION") != ""
661	return hasProject && hasLocation
662}
663
664func hasAWSCredentials(env env.Env) bool {
665	if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
666		return true
667	}
668
669	if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
670		return true
671	}
672
673	if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
674		return true
675	}
676
677	if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
678		return true
679	}
680
681	if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
682		env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
683		return true
684	}
685
686	if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil && !testing.Testing() {
687		return true
688	}
689
690	return false
691}
692
693// GlobalConfig returns the global configuration file path for the application.
694func GlobalConfig() string {
695	xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
696	if xdgConfigHome != "" {
697		return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
698	}
699
700	return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
701}
702
703// GlobalConfigData returns the path to the main data directory for the application.
704// this config is used when the app overrides configurations instead of updating the global config.
705func GlobalConfigData() string {
706	xdgDataHome := os.Getenv("XDG_DATA_HOME")
707	if xdgDataHome != "" {
708		return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
709	}
710
711	// return the path to the main data directory
712	// for windows, it should be in `%LOCALAPPDATA%/crush/`
713	// for linux and macOS, it should be in `$HOME/.local/share/crush/`
714	if runtime.GOOS == "windows" {
715		localAppData := os.Getenv("LOCALAPPDATA")
716		if localAppData == "" {
717			localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
718		}
719		return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
720	}
721
722	return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
723}
724
725func assignIfNil[T any](ptr **T, val T) {
726	if *ptr == nil {
727		*ptr = &val
728	}
729}
730
731func isInsideWorktree() bool {
732	bts, err := exec.CommandContext(
733		context.Background(),
734		"git", "rev-parse",
735		"--is-inside-work-tree",
736	).CombinedOutput()
737	return err == nil && strings.TrimSpace(string(bts)) == "true"
738}