load.go

  1package config
  2
  3import (
  4	"cmp"
  5	"context"
  6	"encoding/json"
  7	"fmt"
  8	"io"
  9	"log/slog"
 10	"maps"
 11	"os"
 12	"os/exec"
 13	"path/filepath"
 14	"runtime"
 15	"slices"
 16	"strconv"
 17	"strings"
 18
 19	"github.com/charmbracelet/catwalk/pkg/catwalk"
 20	"github.com/charmbracelet/crush/internal/csync"
 21	"github.com/charmbracelet/crush/internal/env"
 22	"github.com/charmbracelet/crush/internal/event"
 23	"github.com/charmbracelet/crush/internal/fsext"
 24	"github.com/charmbracelet/crush/internal/home"
 25	"github.com/charmbracelet/crush/internal/log"
 26	"github.com/charmbracelet/crush/internal/oauth/claude"
 27	powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
 28)
 29
 30const defaultCatwalkURL = "https://catwalk.charm.sh"
 31
 32// LoadReader config via io.Reader.
 33func LoadReader(fd io.Reader) (*Config, error) {
 34	data, err := io.ReadAll(fd)
 35	if err != nil {
 36		return nil, err
 37	}
 38
 39	var config Config
 40	err = json.Unmarshal(data, &config)
 41	if err != nil {
 42		return nil, err
 43	}
 44	return &config, err
 45}
 46
 47// Load loads the configuration from the default paths.
 48func Load(workingDir, dataDir string, debug bool) (*Config, error) {
 49	configPaths := lookupConfigs(workingDir)
 50
 51	cfg, err := loadFromConfigPaths(configPaths)
 52	if err != nil {
 53		return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
 54	}
 55
 56	cfg.dataConfigDir = GlobalConfigData()
 57
 58	cfg.setDefaults(workingDir, dataDir)
 59
 60	if debug {
 61		cfg.Options.Debug = true
 62	}
 63
 64	// Setup logs
 65	log.Setup(
 66		filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
 67		cfg.Options.Debug,
 68	)
 69
 70	if !isInsideWorktree() {
 71		const depth = 2
 72		const items = 100
 73		slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
 74		assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
 75		assignIfNil(&cfg.Tools.Ls.MaxItems, items)
 76		assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
 77		assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
 78	}
 79
 80	// Load known providers, this loads the config from catwalk
 81	providers, err := Providers(cfg)
 82	if err != nil {
 83		return nil, err
 84	}
 85	cfg.knownProviders = providers
 86
 87	env := env.New()
 88	// Configure providers
 89	valueResolver := NewShellVariableResolver(env)
 90	cfg.resolver = valueResolver
 91	if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
 92		return nil, fmt.Errorf("failed to configure providers: %w", err)
 93	}
 94
 95	if !cfg.IsConfigured() {
 96		slog.Warn("No providers configured")
 97		return cfg, nil
 98	}
 99
100	if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
101		return nil, fmt.Errorf("failed to configure selected models: %w", err)
102	}
103	cfg.SetupAgents()
104	return cfg, nil
105}
106
107func PushPopCrushEnv() func() {
108	found := []string{}
109	for _, ev := range os.Environ() {
110		if strings.HasPrefix(ev, "CRUSH_") {
111			pair := strings.SplitN(ev, "=", 2)
112			if len(pair) != 2 {
113				continue
114			}
115			found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
116		}
117	}
118	backups := make(map[string]string)
119	for _, ev := range found {
120		backups[ev] = os.Getenv(ev)
121	}
122
123	for _, ev := range found {
124		os.Setenv(ev, os.Getenv("CRUSH_"+ev))
125	}
126
127	restore := func() {
128		for k, v := range backups {
129			os.Setenv(k, v)
130		}
131	}
132	return restore
133}
134
135func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
136	knownProviderNames := make(map[string]bool)
137	restore := PushPopCrushEnv()
138	defer restore()
139
140	for _, p := range knownProviders {
141		knownProviderNames[string(p.ID)] = true
142		config, configExists := c.Providers.Get(string(p.ID))
143		// if the user configured a known provider we need to allow it to override a couple of parameters
144		if configExists {
145			if config.BaseURL != "" {
146				p.APIEndpoint = config.BaseURL
147			}
148			if config.APIKey != "" {
149				p.APIKey = config.APIKey
150			}
151			if len(config.Models) > 0 {
152				models := []catwalk.Model{}
153				seen := make(map[string]bool)
154
155				for _, model := range config.Models {
156					if seen[model.ID] {
157						continue
158					}
159					seen[model.ID] = true
160					if model.Name == "" {
161						model.Name = model.ID
162					}
163					models = append(models, model)
164				}
165				for _, model := range p.Models {
166					if seen[model.ID] {
167						continue
168					}
169					seen[model.ID] = true
170					if model.Name == "" {
171						model.Name = model.ID
172					}
173					models = append(models, model)
174				}
175
176				p.Models = models
177			}
178		}
179
180		headers := map[string]string{}
181		if len(p.DefaultHeaders) > 0 {
182			maps.Copy(headers, p.DefaultHeaders)
183		}
184		if len(config.ExtraHeaders) > 0 {
185			maps.Copy(headers, config.ExtraHeaders)
186		}
187		prepared := ProviderConfig{
188			ID:                 string(p.ID),
189			Name:               p.Name,
190			BaseURL:            p.APIEndpoint,
191			APIKey:             p.APIKey,
192			OAuthToken:         config.OAuthToken,
193			Type:               p.Type,
194			Disable:            config.Disable,
195			SystemPromptPrefix: config.SystemPromptPrefix,
196			ExtraHeaders:       headers,
197			ExtraBody:          config.ExtraBody,
198			ExtraParams:        make(map[string]string),
199			Models:             p.Models,
200		}
201
202		if p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil {
203			if config.OAuthToken.IsExpired() {
204				newToken, err := claude.RefreshToken(context.TODO(), config.OAuthToken.RefreshToken)
205				if err == nil {
206					slog.Info("Successfully refreshed Anthropic OAuth token")
207					config.OAuthToken = newToken
208					prepared.OAuthToken = newToken
209					if err := cmp.Or(
210						c.SetConfigField("providers.anthropic.api_key", newToken.AccessToken),
211						c.SetConfigField("providers.anthropic.oauth", newToken),
212					); err != nil {
213						return err
214					}
215				} else {
216					slog.Error("Failed to refresh Anthropic OAuth token", "error", err)
217					event.Error(err)
218				}
219			} else {
220				slog.Info("Using existing non-expired Anthropic OAuth token")
221			}
222			prepared.SetupClaudeCode()
223		}
224
225		switch p.ID {
226		// Handle specific providers that require additional configuration
227		case catwalk.InferenceProviderVertexAI:
228			if !hasVertexCredentials(env) {
229				if configExists {
230					slog.Warn("Skipping Vertex AI provider due to missing credentials")
231					c.Providers.Del(string(p.ID))
232				}
233				continue
234			}
235			prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
236			prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
237		case catwalk.InferenceProviderAzure:
238			endpoint, err := resolver.ResolveValue(p.APIEndpoint)
239			if err != nil || endpoint == "" {
240				if configExists {
241					slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
242					c.Providers.Del(string(p.ID))
243				}
244				continue
245			}
246			prepared.BaseURL = endpoint
247			prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
248		case catwalk.InferenceProviderBedrock:
249			if !hasAWSCredentials(env) {
250				if configExists {
251					slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
252					c.Providers.Del(string(p.ID))
253				}
254				continue
255			}
256			prepared.ExtraParams["region"] = env.Get("AWS_REGION")
257			if prepared.ExtraParams["region"] == "" {
258				prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
259			}
260			for _, model := range p.Models {
261				if !strings.HasPrefix(model.ID, "anthropic.") {
262					return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
263				}
264			}
265		default:
266			// if the provider api or endpoint are missing we skip them
267			v, err := resolver.ResolveValue(p.APIKey)
268			if v == "" || err != nil {
269				if configExists {
270					slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
271					c.Providers.Del(string(p.ID))
272				}
273				continue
274			}
275		}
276		c.Providers.Set(string(p.ID), prepared)
277	}
278
279	// validate the custom providers
280	for id, providerConfig := range c.Providers.Seq2() {
281		if knownProviderNames[id] {
282			continue
283		}
284
285		// Make sure the provider ID is set
286		providerConfig.ID = id
287		if providerConfig.Name == "" {
288			providerConfig.Name = id // Use ID as name if not set
289		}
290		// default to OpenAI if not set
291		if providerConfig.Type == "" {
292			providerConfig.Type = catwalk.TypeOpenAICompat
293		}
294		if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
295			slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
296			c.Providers.Del(id)
297			continue
298		}
299
300		if providerConfig.Disable {
301			slog.Debug("Skipping custom provider due to disable flag", "provider", id)
302			c.Providers.Del(id)
303			continue
304		}
305		if providerConfig.APIKey == "" {
306			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
307		}
308		if providerConfig.BaseURL == "" {
309			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
310			c.Providers.Del(id)
311			continue
312		}
313		if len(providerConfig.Models) == 0 {
314			slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
315			c.Providers.Del(id)
316			continue
317		}
318		apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
319		if apiKey == "" || err != nil {
320			slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
321		}
322		baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
323		if baseURL == "" || err != nil {
324			slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
325			c.Providers.Del(id)
326			continue
327		}
328
329		c.Providers.Set(id, providerConfig)
330	}
331	return nil
332}
333
334func (c *Config) setDefaults(workingDir, dataDir string) {
335	c.workingDir = workingDir
336	if c.Options == nil {
337		c.Options = &Options{}
338	}
339	if c.Options.TUI == nil {
340		c.Options.TUI = &TUIOptions{}
341	}
342	if c.Options.ContextPaths == nil {
343		c.Options.ContextPaths = []string{}
344	}
345	if dataDir != "" {
346		c.Options.DataDirectory = dataDir
347	} else if c.Options.DataDirectory == "" {
348		if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
349			c.Options.DataDirectory = path
350		} else {
351			c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
352		}
353	}
354	if c.Providers == nil {
355		c.Providers = csync.NewMap[string, ProviderConfig]()
356	}
357	if c.Models == nil {
358		c.Models = make(map[SelectedModelType]SelectedModel)
359	}
360	if c.RecentModels == nil {
361		c.RecentModels = make(map[SelectedModelType][]SelectedModel)
362	}
363	if c.MCP == nil {
364		c.MCP = make(map[string]MCPConfig)
365	}
366	if c.LSP == nil {
367		c.LSP = make(map[string]LSPConfig)
368	}
369
370	// Apply defaults to LSP configurations
371	c.applyLSPDefaults()
372
373	// Add the default context paths if they are not already present
374	c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
375	slices.Sort(c.Options.ContextPaths)
376	c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
377
378	if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
379		c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
380	}
381
382	if c.Options.Attribution == nil {
383		c.Options.Attribution = &Attribution{
384			TrailerStyle:  TrailerStyleAssistedBy,
385			GeneratedWith: true,
386		}
387	} else if c.Options.Attribution.TrailerStyle == "" {
388		// Migrate deprecated co_authored_by or apply default
389		if c.Options.Attribution.CoAuthoredBy != nil {
390			if *c.Options.Attribution.CoAuthoredBy {
391				c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
392			} else {
393				c.Options.Attribution.TrailerStyle = TrailerStyleNone
394			}
395		} else {
396			c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
397		}
398	}
399	if c.Options.InitializeAs == "" {
400		c.Options.InitializeAs = defaultInitializeAs
401	}
402}
403
404// applyLSPDefaults applies default values from powernap to LSP configurations
405func (c *Config) applyLSPDefaults() {
406	// Get powernap's default configuration
407	configManager := powernapConfig.NewManager()
408	configManager.LoadDefaults()
409
410	// Apply defaults to each LSP configuration
411	for name, cfg := range c.LSP {
412		// Try to get defaults from powernap based on name or command name.
413		base, ok := configManager.GetServer(name)
414		if !ok {
415			base, ok = configManager.GetServer(cfg.Command)
416			if !ok {
417				continue
418			}
419		}
420		if cfg.Options == nil {
421			cfg.Options = base.Settings
422		}
423		if cfg.InitOptions == nil {
424			cfg.InitOptions = base.InitOptions
425		}
426		if len(cfg.FileTypes) == 0 {
427			cfg.FileTypes = base.FileTypes
428		}
429		if len(cfg.RootMarkers) == 0 {
430			cfg.RootMarkers = base.RootMarkers
431		}
432		if cfg.Command == "" {
433			cfg.Command = base.Command
434		}
435		if len(cfg.Args) == 0 {
436			cfg.Args = base.Args
437		}
438		if len(cfg.Env) == 0 {
439			cfg.Env = base.Environment
440		}
441		// Update the config in the map
442		c.LSP[name] = cfg
443	}
444}
445
446func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
447	if len(knownProviders) == 0 && c.Providers.Len() == 0 {
448		err = fmt.Errorf("no providers configured, please configure at least one provider")
449		return largeModel, smallModel, err
450	}
451
452	// Use the first provider enabled based on the known providers order
453	// if no provider found that is known use the first provider configured
454	for _, p := range knownProviders {
455		providerConfig, ok := c.Providers.Get(string(p.ID))
456		if !ok || providerConfig.Disable {
457			continue
458		}
459		defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
460		if defaultLargeModel == nil {
461			err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
462			return largeModel, smallModel, err
463		}
464		largeModel = SelectedModel{
465			Provider:        string(p.ID),
466			Model:           defaultLargeModel.ID,
467			MaxTokens:       defaultLargeModel.DefaultMaxTokens,
468			ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
469		}
470
471		defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
472		if defaultSmallModel == nil {
473			err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
474			return largeModel, smallModel, err
475		}
476		smallModel = SelectedModel{
477			Provider:        string(p.ID),
478			Model:           defaultSmallModel.ID,
479			MaxTokens:       defaultSmallModel.DefaultMaxTokens,
480			ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
481		}
482		return largeModel, smallModel, err
483	}
484
485	enabledProviders := c.EnabledProviders()
486	slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
487		return strings.Compare(a.ID, b.ID)
488	})
489
490	if len(enabledProviders) == 0 {
491		err = fmt.Errorf("no providers configured, please configure at least one provider")
492		return largeModel, smallModel, err
493	}
494
495	providerConfig := enabledProviders[0]
496	if len(providerConfig.Models) == 0 {
497		err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
498		return largeModel, smallModel, err
499	}
500	defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
501	largeModel = SelectedModel{
502		Provider:  providerConfig.ID,
503		Model:     defaultLargeModel.ID,
504		MaxTokens: defaultLargeModel.DefaultMaxTokens,
505	}
506	defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
507	smallModel = SelectedModel{
508		Provider:  providerConfig.ID,
509		Model:     defaultSmallModel.ID,
510		MaxTokens: defaultSmallModel.DefaultMaxTokens,
511	}
512	return largeModel, smallModel, err
513}
514
515func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
516	defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
517	if err != nil {
518		return fmt.Errorf("failed to select default models: %w", err)
519	}
520	large, small := defaultLarge, defaultSmall
521
522	largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
523	if largeModelConfigured {
524		if largeModelSelected.Model != "" {
525			large.Model = largeModelSelected.Model
526		}
527		if largeModelSelected.Provider != "" {
528			large.Provider = largeModelSelected.Provider
529		}
530		model := c.GetModel(large.Provider, large.Model)
531		if model == nil {
532			large = defaultLarge
533			// override the model type to large
534			err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
535			if err != nil {
536				return fmt.Errorf("failed to update preferred large model: %w", err)
537			}
538		} else {
539			if largeModelSelected.MaxTokens > 0 {
540				large.MaxTokens = largeModelSelected.MaxTokens
541			} else {
542				large.MaxTokens = model.DefaultMaxTokens
543			}
544			if largeModelSelected.ReasoningEffort != "" {
545				large.ReasoningEffort = largeModelSelected.ReasoningEffort
546			}
547			large.Think = largeModelSelected.Think
548			if largeModelSelected.Temperature != nil {
549				large.Temperature = largeModelSelected.Temperature
550			}
551			if largeModelSelected.TopP != nil {
552				large.TopP = largeModelSelected.TopP
553			}
554			if largeModelSelected.TopK != nil {
555				large.TopK = largeModelSelected.TopK
556			}
557			if largeModelSelected.FrequencyPenalty != nil {
558				large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
559			}
560			if largeModelSelected.PresencePenalty != nil {
561				large.PresencePenalty = largeModelSelected.PresencePenalty
562			}
563		}
564	}
565	smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
566	if smallModelConfigured {
567		if smallModelSelected.Model != "" {
568			small.Model = smallModelSelected.Model
569		}
570		if smallModelSelected.Provider != "" {
571			small.Provider = smallModelSelected.Provider
572		}
573
574		model := c.GetModel(small.Provider, small.Model)
575		if model == nil {
576			small = defaultSmall
577			// override the model type to small
578			err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
579			if err != nil {
580				return fmt.Errorf("failed to update preferred small model: %w", err)
581			}
582		} else {
583			if smallModelSelected.MaxTokens > 0 {
584				small.MaxTokens = smallModelSelected.MaxTokens
585			} else {
586				small.MaxTokens = model.DefaultMaxTokens
587			}
588			if smallModelSelected.ReasoningEffort != "" {
589				small.ReasoningEffort = smallModelSelected.ReasoningEffort
590			}
591			if smallModelSelected.Temperature != nil {
592				small.Temperature = smallModelSelected.Temperature
593			}
594			if smallModelSelected.TopP != nil {
595				small.TopP = smallModelSelected.TopP
596			}
597			if smallModelSelected.TopK != nil {
598				small.TopK = smallModelSelected.TopK
599			}
600			if smallModelSelected.FrequencyPenalty != nil {
601				small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
602			}
603			if smallModelSelected.PresencePenalty != nil {
604				small.PresencePenalty = smallModelSelected.PresencePenalty
605			}
606			small.Think = smallModelSelected.Think
607		}
608	}
609	c.Models[SelectedModelTypeLarge] = large
610	c.Models[SelectedModelTypeSmall] = small
611	return nil
612}
613
614// lookupConfigs searches config files recursively from CWD up to FS root
615func lookupConfigs(cwd string) []string {
616	// prepend default config paths
617	configPaths := []string{
618		GlobalConfig(),
619		GlobalConfigData(),
620	}
621
622	configNames := []string{appName + ".json", "." + appName + ".json"}
623
624	foundConfigs, err := fsext.Lookup(cwd, configNames...)
625	if err != nil {
626		// returns at least default configs
627		return configPaths
628	}
629
630	// reverse order so last config has more priority
631	slices.Reverse(foundConfigs)
632
633	return append(configPaths, foundConfigs...)
634}
635
636func loadFromConfigPaths(configPaths []string) (*Config, error) {
637	var configs []io.Reader
638
639	for _, path := range configPaths {
640		fd, err := os.Open(path)
641		if err != nil {
642			if os.IsNotExist(err) {
643				continue
644			}
645			return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
646		}
647		defer fd.Close()
648
649		configs = append(configs, fd)
650	}
651
652	return loadFromReaders(configs)
653}
654
655func loadFromReaders(readers []io.Reader) (*Config, error) {
656	if len(readers) == 0 {
657		return &Config{}, nil
658	}
659
660	merged, err := Merge(readers)
661	if err != nil {
662		return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
663	}
664
665	return LoadReader(merged)
666}
667
668func hasVertexCredentials(env env.Env) bool {
669	hasProject := env.Get("VERTEXAI_PROJECT") != ""
670	hasLocation := env.Get("VERTEXAI_LOCATION") != ""
671	return hasProject && hasLocation
672}
673
674func hasAWSCredentials(env env.Env) bool {
675	if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
676		return true
677	}
678
679	if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
680		return true
681	}
682
683	if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
684		return true
685	}
686
687	if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
688		return true
689	}
690
691	if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
692		env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
693		return true
694	}
695
696	if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil {
697		return true
698	}
699
700	return false
701}
702
703// GlobalConfig returns the global configuration file path for the application.
704func GlobalConfig() string {
705	xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
706	if xdgConfigHome != "" {
707		return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
708	}
709
710	return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
711}
712
713// GlobalConfigData returns the path to the main data directory for the application.
714// this config is used when the app overrides configurations instead of updating the global config.
715func GlobalConfigData() string {
716	xdgDataHome := os.Getenv("XDG_DATA_HOME")
717	if xdgDataHome != "" {
718		return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
719	}
720
721	// return the path to the main data directory
722	// for windows, it should be in `%LOCALAPPDATA%/crush/`
723	// for linux and macOS, it should be in `$HOME/.local/share/crush/`
724	if runtime.GOOS == "windows" {
725		localAppData := os.Getenv("LOCALAPPDATA")
726		if localAppData == "" {
727			localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
728		}
729		return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
730	}
731
732	return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
733}
734
735func assignIfNil[T any](ptr **T, val T) {
736	if *ptr == nil {
737		*ptr = &val
738	}
739}
740
741func isInsideWorktree() bool {
742	bts, err := exec.CommandContext(
743		context.Background(),
744		"git", "rev-parse",
745		"--is-inside-work-tree",
746	).CombinedOutput()
747	return err == nil && strings.TrimSpace(string(bts)) == "true"
748}