1package config
2
3import (
4 "context"
5 "encoding/json"
6 "fmt"
7 "io"
8 "log/slog"
9 "maps"
10 "os"
11 "os/exec"
12 "path/filepath"
13 "runtime"
14 "slices"
15 "strconv"
16 "strings"
17 "testing"
18
19 "github.com/charmbracelet/catwalk/pkg/catwalk"
20 "git.secluded.site/crush/internal/csync"
21 "git.secluded.site/crush/internal/env"
22 "git.secluded.site/crush/internal/fsext"
23 "git.secluded.site/crush/internal/home"
24 "git.secluded.site/crush/internal/log"
25 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
26)
27
28const defaultCatwalkURL = "https://catwalk.charm.sh"
29
30// LoadReader config via io.Reader.
31func LoadReader(fd io.Reader) (*Config, error) {
32 data, err := io.ReadAll(fd)
33 if err != nil {
34 return nil, err
35 }
36
37 var config Config
38 err = json.Unmarshal(data, &config)
39 if err != nil {
40 return nil, err
41 }
42 return &config, err
43}
44
45// Load loads the configuration from the default paths.
46func Load(workingDir, dataDir string, debug bool) (*Config, error) {
47 configPaths := lookupConfigs(workingDir)
48
49 cfg, err := loadFromConfigPaths(configPaths)
50 if err != nil {
51 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
52 }
53
54 cfg.dataConfigDir = GlobalConfigData()
55
56 cfg.setDefaults(workingDir, dataDir)
57
58 if debug {
59 cfg.Options.Debug = true
60 }
61
62 // Setup logs
63 log.Setup(
64 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
65 cfg.Options.Debug,
66 )
67
68 if !isInsideWorktree() {
69 const depth = 2
70 const items = 100
71 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
72 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
73 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
74 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
75 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
76 }
77
78 // Load known providers, this loads the config from catwalk
79 providers, err := Providers(cfg)
80 if err != nil {
81 return nil, err
82 }
83 cfg.knownProviders = providers
84
85 env := env.New()
86 // Configure providers
87 valueResolver := NewShellVariableResolver(env)
88 cfg.resolver = valueResolver
89 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
90 return nil, fmt.Errorf("failed to configure providers: %w", err)
91 }
92
93 if !cfg.IsConfigured() {
94 slog.Warn("No providers configured")
95 return cfg, nil
96 }
97
98 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
99 return nil, fmt.Errorf("failed to configure selected models: %w", err)
100 }
101 cfg.SetupAgents()
102 return cfg, nil
103}
104
105func PushPopCrushEnv() func() {
106 found := []string{}
107 for _, ev := range os.Environ() {
108 if strings.HasPrefix(ev, "CRUSH_") {
109 pair := strings.SplitN(ev, "=", 2)
110 if len(pair) != 2 {
111 continue
112 }
113 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
114 }
115 }
116 backups := make(map[string]string)
117 for _, ev := range found {
118 backups[ev] = os.Getenv(ev)
119 }
120
121 for _, ev := range found {
122 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
123 }
124
125 restore := func() {
126 for k, v := range backups {
127 os.Setenv(k, v)
128 }
129 }
130 return restore
131}
132
133func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
134 knownProviderNames := make(map[string]bool)
135 restore := PushPopCrushEnv()
136 defer restore()
137
138 for _, p := range knownProviders {
139 knownProviderNames[string(p.ID)] = true
140 config, configExists := c.Providers.Get(string(p.ID))
141 // if the user configured a known provider we need to allow it to override a couple of parameters
142 if configExists {
143 if config.BaseURL != "" {
144 p.APIEndpoint = config.BaseURL
145 }
146 if config.APIKey != "" {
147 p.APIKey = config.APIKey
148 }
149 if len(config.Models) > 0 {
150 models := []catwalk.Model{}
151 seen := make(map[string]bool)
152
153 for _, model := range config.Models {
154 if seen[model.ID] {
155 continue
156 }
157 seen[model.ID] = true
158 if model.Name == "" {
159 model.Name = model.ID
160 }
161 models = append(models, model)
162 }
163 for _, model := range p.Models {
164 if seen[model.ID] {
165 continue
166 }
167 seen[model.ID] = true
168 if model.Name == "" {
169 model.Name = model.ID
170 }
171 models = append(models, model)
172 }
173
174 p.Models = models
175 }
176 }
177
178 headers := map[string]string{}
179 if len(p.DefaultHeaders) > 0 {
180 maps.Copy(headers, p.DefaultHeaders)
181 }
182 if len(config.ExtraHeaders) > 0 {
183 maps.Copy(headers, config.ExtraHeaders)
184 }
185 prepared := ProviderConfig{
186 ID: string(p.ID),
187 Name: p.Name,
188 BaseURL: p.APIEndpoint,
189 APIKey: p.APIKey,
190 APIKeyTemplate: p.APIKey, // Store original template for re-resolution
191 OAuthToken: config.OAuthToken,
192 Type: p.Type,
193 Disable: config.Disable,
194 SystemPromptPrefix: config.SystemPromptPrefix,
195 ExtraHeaders: headers,
196 ExtraBody: config.ExtraBody,
197 ExtraParams: make(map[string]string),
198 Models: p.Models,
199 }
200
201 if p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil {
202 prepared.SetupClaudeCode()
203 }
204
205 switch p.ID {
206 // Handle specific providers that require additional configuration
207 case catwalk.InferenceProviderVertexAI:
208 if !hasVertexCredentials(env) {
209 if configExists {
210 slog.Warn("Skipping Vertex AI provider due to missing credentials")
211 c.Providers.Del(string(p.ID))
212 }
213 continue
214 }
215 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
216 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
217 case catwalk.InferenceProviderAzure:
218 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
219 if err != nil || endpoint == "" {
220 if configExists {
221 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
222 c.Providers.Del(string(p.ID))
223 }
224 continue
225 }
226 prepared.BaseURL = endpoint
227 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
228 case catwalk.InferenceProviderBedrock:
229 if !hasAWSCredentials(env) {
230 if configExists {
231 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
232 c.Providers.Del(string(p.ID))
233 }
234 continue
235 }
236 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
237 if prepared.ExtraParams["region"] == "" {
238 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
239 }
240 for _, model := range p.Models {
241 if !strings.HasPrefix(model.ID, "anthropic.") {
242 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
243 }
244 }
245 default:
246 // if the provider api or endpoint are missing we skip them
247 v, err := resolver.ResolveValue(p.APIKey)
248 if v == "" || err != nil {
249 if configExists {
250 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
251 c.Providers.Del(string(p.ID))
252 }
253 continue
254 }
255 }
256 c.Providers.Set(string(p.ID), prepared)
257 }
258
259 // validate the custom providers
260 for id, providerConfig := range c.Providers.Seq2() {
261 if knownProviderNames[id] {
262 continue
263 }
264
265 // Make sure the provider ID is set
266 providerConfig.ID = id
267 if providerConfig.Name == "" {
268 providerConfig.Name = id // Use ID as name if not set
269 }
270 // default to OpenAI if not set
271 if providerConfig.Type == "" {
272 providerConfig.Type = catwalk.TypeOpenAICompat
273 }
274 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
275 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
276 c.Providers.Del(id)
277 continue
278 }
279
280 if providerConfig.Disable {
281 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
282 c.Providers.Del(id)
283 continue
284 }
285 if providerConfig.APIKey == "" {
286 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
287 }
288 if providerConfig.BaseURL == "" {
289 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
290 c.Providers.Del(id)
291 continue
292 }
293 if len(providerConfig.Models) == 0 {
294 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
295 c.Providers.Del(id)
296 continue
297 }
298 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
299 if apiKey == "" || err != nil {
300 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
301 }
302 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
303 if baseURL == "" || err != nil {
304 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
305 c.Providers.Del(id)
306 continue
307 }
308
309 c.Providers.Set(id, providerConfig)
310 }
311 return nil
312}
313
314func (c *Config) setDefaults(workingDir, dataDir string) {
315 c.workingDir = workingDir
316 if c.Options == nil {
317 c.Options = &Options{}
318 }
319 if c.Options.TUI == nil {
320 c.Options.TUI = &TUIOptions{}
321 }
322 if c.Options.ContextPaths == nil {
323 c.Options.ContextPaths = []string{}
324 }
325 if c.Options.MemoryPaths == nil {
326 crushConfigDir := filepath.Dir(GlobalConfig())
327 c.Options.MemoryPaths = []string{
328 filepath.Join(crushConfigDir, "CRUSH.md"),
329 filepath.Join(filepath.Dir(crushConfigDir), "AGENTS.md"),
330 }
331 }
332 slices.Sort(c.Options.MemoryPaths)
333 c.Options.MemoryPaths = slices.Compact(c.Options.MemoryPaths)
334
335 if dataDir != "" {
336 c.Options.DataDirectory = dataDir
337 } else if c.Options.DataDirectory == "" {
338 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
339 c.Options.DataDirectory = path
340 } else {
341 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
342 }
343 }
344 if c.Providers == nil {
345 c.Providers = csync.NewMap[string, ProviderConfig]()
346 }
347 if c.Models == nil {
348 c.Models = make(map[SelectedModelType]SelectedModel)
349 }
350 if c.RecentModels == nil {
351 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
352 }
353 if c.MCP == nil {
354 c.MCP = make(map[string]MCPConfig)
355 }
356 if c.LSP == nil {
357 c.LSP = make(map[string]LSPConfig)
358 }
359
360 // Apply defaults to LSP configurations
361 c.applyLSPDefaults()
362
363 // Add the default context paths if they are not already present
364 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
365 slices.Sort(c.Options.ContextPaths)
366 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
367
368 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
369 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
370 }
371
372 if c.Options.Attribution == nil {
373 c.Options.Attribution = &Attribution{
374 TrailerStyle: TrailerStyleAssistedBy,
375 GeneratedWith: true,
376 }
377 } else if c.Options.Attribution.TrailerStyle == "" {
378 // Migrate deprecated co_authored_by or apply default
379 if c.Options.Attribution.CoAuthoredBy != nil {
380 if *c.Options.Attribution.CoAuthoredBy {
381 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
382 } else {
383 c.Options.Attribution.TrailerStyle = TrailerStyleNone
384 }
385 } else {
386 c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
387 }
388 }
389 if c.Options.InitializeAs == "" {
390 c.Options.InitializeAs = defaultInitializeAs
391 }
392}
393
394// applyLSPDefaults applies default values from powernap to LSP configurations
395func (c *Config) applyLSPDefaults() {
396 // Get powernap's default configuration
397 configManager := powernapConfig.NewManager()
398 configManager.LoadDefaults()
399
400 // Apply defaults to each LSP configuration
401 for name, cfg := range c.LSP {
402 // Try to get defaults from powernap based on name or command name.
403 base, ok := configManager.GetServer(name)
404 if !ok {
405 base, ok = configManager.GetServer(cfg.Command)
406 if !ok {
407 continue
408 }
409 }
410 if cfg.Options == nil {
411 cfg.Options = base.Settings
412 }
413 if cfg.InitOptions == nil {
414 cfg.InitOptions = base.InitOptions
415 }
416 if len(cfg.FileTypes) == 0 {
417 cfg.FileTypes = base.FileTypes
418 }
419 if len(cfg.RootMarkers) == 0 {
420 cfg.RootMarkers = base.RootMarkers
421 }
422 if cfg.Command == "" {
423 cfg.Command = base.Command
424 }
425 if len(cfg.Args) == 0 {
426 cfg.Args = base.Args
427 }
428 if len(cfg.Env) == 0 {
429 cfg.Env = base.Environment
430 }
431 // Update the config in the map
432 c.LSP[name] = cfg
433 }
434}
435
436func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
437 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
438 err = fmt.Errorf("no providers configured, please configure at least one provider")
439 return largeModel, smallModel, err
440 }
441
442 // Use the first provider enabled based on the known providers order
443 // if no provider found that is known use the first provider configured
444 for _, p := range knownProviders {
445 providerConfig, ok := c.Providers.Get(string(p.ID))
446 if !ok || providerConfig.Disable {
447 continue
448 }
449 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
450 if defaultLargeModel == nil {
451 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
452 return largeModel, smallModel, err
453 }
454 largeModel = SelectedModel{
455 Provider: string(p.ID),
456 Model: defaultLargeModel.ID,
457 MaxTokens: defaultLargeModel.DefaultMaxTokens,
458 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
459 }
460
461 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
462 if defaultSmallModel == nil {
463 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
464 return largeModel, smallModel, err
465 }
466 smallModel = SelectedModel{
467 Provider: string(p.ID),
468 Model: defaultSmallModel.ID,
469 MaxTokens: defaultSmallModel.DefaultMaxTokens,
470 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
471 }
472 return largeModel, smallModel, err
473 }
474
475 enabledProviders := c.EnabledProviders()
476 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
477 return strings.Compare(a.ID, b.ID)
478 })
479
480 if len(enabledProviders) == 0 {
481 err = fmt.Errorf("no providers configured, please configure at least one provider")
482 return largeModel, smallModel, err
483 }
484
485 providerConfig := enabledProviders[0]
486 if len(providerConfig.Models) == 0 {
487 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
488 return largeModel, smallModel, err
489 }
490 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
491 largeModel = SelectedModel{
492 Provider: providerConfig.ID,
493 Model: defaultLargeModel.ID,
494 MaxTokens: defaultLargeModel.DefaultMaxTokens,
495 }
496 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
497 smallModel = SelectedModel{
498 Provider: providerConfig.ID,
499 Model: defaultSmallModel.ID,
500 MaxTokens: defaultSmallModel.DefaultMaxTokens,
501 }
502 return largeModel, smallModel, err
503}
504
505func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
506 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
507 if err != nil {
508 return fmt.Errorf("failed to select default models: %w", err)
509 }
510 large, small := defaultLarge, defaultSmall
511
512 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
513 if largeModelConfigured {
514 if largeModelSelected.Model != "" {
515 large.Model = largeModelSelected.Model
516 }
517 if largeModelSelected.Provider != "" {
518 large.Provider = largeModelSelected.Provider
519 }
520 model := c.GetModel(large.Provider, large.Model)
521 if model == nil {
522 large = defaultLarge
523 // override the model type to large
524 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
525 if err != nil {
526 return fmt.Errorf("failed to update preferred large model: %w", err)
527 }
528 } else {
529 if largeModelSelected.MaxTokens > 0 {
530 large.MaxTokens = largeModelSelected.MaxTokens
531 } else {
532 large.MaxTokens = model.DefaultMaxTokens
533 }
534 if largeModelSelected.ReasoningEffort != "" {
535 large.ReasoningEffort = largeModelSelected.ReasoningEffort
536 }
537 large.Think = largeModelSelected.Think
538 if largeModelSelected.Temperature != nil {
539 large.Temperature = largeModelSelected.Temperature
540 }
541 if largeModelSelected.TopP != nil {
542 large.TopP = largeModelSelected.TopP
543 }
544 if largeModelSelected.TopK != nil {
545 large.TopK = largeModelSelected.TopK
546 }
547 if largeModelSelected.FrequencyPenalty != nil {
548 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
549 }
550 if largeModelSelected.PresencePenalty != nil {
551 large.PresencePenalty = largeModelSelected.PresencePenalty
552 }
553 }
554 }
555 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
556 if smallModelConfigured {
557 if smallModelSelected.Model != "" {
558 small.Model = smallModelSelected.Model
559 }
560 if smallModelSelected.Provider != "" {
561 small.Provider = smallModelSelected.Provider
562 }
563
564 model := c.GetModel(small.Provider, small.Model)
565 if model == nil {
566 small = defaultSmall
567 // override the model type to small
568 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
569 if err != nil {
570 return fmt.Errorf("failed to update preferred small model: %w", err)
571 }
572 } else {
573 if smallModelSelected.MaxTokens > 0 {
574 small.MaxTokens = smallModelSelected.MaxTokens
575 } else {
576 small.MaxTokens = model.DefaultMaxTokens
577 }
578 if smallModelSelected.ReasoningEffort != "" {
579 small.ReasoningEffort = smallModelSelected.ReasoningEffort
580 }
581 if smallModelSelected.Temperature != nil {
582 small.Temperature = smallModelSelected.Temperature
583 }
584 if smallModelSelected.TopP != nil {
585 small.TopP = smallModelSelected.TopP
586 }
587 if smallModelSelected.TopK != nil {
588 small.TopK = smallModelSelected.TopK
589 }
590 if smallModelSelected.FrequencyPenalty != nil {
591 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
592 }
593 if smallModelSelected.PresencePenalty != nil {
594 small.PresencePenalty = smallModelSelected.PresencePenalty
595 }
596 small.Think = smallModelSelected.Think
597 }
598 }
599 c.Models[SelectedModelTypeLarge] = large
600 c.Models[SelectedModelTypeSmall] = small
601 return nil
602}
603
604// lookupConfigs searches config files recursively from CWD up to FS root
605func lookupConfigs(cwd string) []string {
606 // prepend default config paths
607 configPaths := []string{
608 GlobalConfig(),
609 GlobalConfigData(),
610 }
611
612 configNames := []string{appName + ".json", "." + appName + ".json"}
613
614 foundConfigs, err := fsext.Lookup(cwd, configNames...)
615 if err != nil {
616 // returns at least default configs
617 return configPaths
618 }
619
620 // reverse order so last config has more priority
621 slices.Reverse(foundConfigs)
622
623 return append(configPaths, foundConfigs...)
624}
625
626func loadFromConfigPaths(configPaths []string) (*Config, error) {
627 var configs []io.Reader
628
629 for _, path := range configPaths {
630 fd, err := os.Open(path)
631 if err != nil {
632 if os.IsNotExist(err) {
633 continue
634 }
635 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
636 }
637 defer fd.Close()
638
639 configs = append(configs, fd)
640 }
641
642 return loadFromReaders(configs)
643}
644
645func loadFromReaders(readers []io.Reader) (*Config, error) {
646 if len(readers) == 0 {
647 return &Config{}, nil
648 }
649
650 merged, err := Merge(readers)
651 if err != nil {
652 return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
653 }
654
655 return LoadReader(merged)
656}
657
658func hasVertexCredentials(env env.Env) bool {
659 hasProject := env.Get("VERTEXAI_PROJECT") != ""
660 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
661 return hasProject && hasLocation
662}
663
664func hasAWSCredentials(env env.Env) bool {
665 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
666 return true
667 }
668
669 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
670 return true
671 }
672
673 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
674 return true
675 }
676
677 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
678 return true
679 }
680
681 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
682 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
683 return true
684 }
685
686 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil && !testing.Testing() {
687 return true
688 }
689
690 return false
691}
692
693// GlobalConfig returns the global configuration file path for the application.
694func GlobalConfig() string {
695 xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
696 if xdgConfigHome != "" {
697 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
698 }
699
700 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
701}
702
703// GlobalConfigData returns the path to the main data directory for the application.
704// this config is used when the app overrides configurations instead of updating the global config.
705func GlobalConfigData() string {
706 xdgDataHome := os.Getenv("XDG_DATA_HOME")
707 if xdgDataHome != "" {
708 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
709 }
710
711 // return the path to the main data directory
712 // for windows, it should be in `%LOCALAPPDATA%/crush/`
713 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
714 if runtime.GOOS == "windows" {
715 localAppData := os.Getenv("LOCALAPPDATA")
716 if localAppData == "" {
717 localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
718 }
719 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
720 }
721
722 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
723}
724
725func assignIfNil[T any](ptr **T, val T) {
726 if *ptr == nil {
727 *ptr = &val
728 }
729}
730
731func isInsideWorktree() bool {
732 bts, err := exec.CommandContext(
733 context.Background(),
734 "git", "rev-parse",
735 "--is-inside-work-tree",
736 ).CombinedOutput()
737 return err == nil && strings.TrimSpace(string(bts)) == "true"
738}