1package config
2
3import (
4 "context"
5 "encoding/json"
6 "fmt"
7 "io"
8 "log/slog"
9 "maps"
10 "os"
11 "os/exec"
12 "path/filepath"
13 "runtime"
14 "slices"
15 "strconv"
16 "strings"
17
18 "git.secluded.site/crush/internal/csync"
19 "git.secluded.site/crush/internal/env"
20 "git.secluded.site/crush/internal/fsext"
21 "git.secluded.site/crush/internal/home"
22 "git.secluded.site/crush/internal/log"
23 "github.com/charmbracelet/catwalk/pkg/catwalk"
24 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
25)
26
27const defaultCatwalkURL = "https://catwalk.charm.sh"
28
29// LoadReader config via io.Reader.
30func LoadReader(fd io.Reader) (*Config, error) {
31 data, err := io.ReadAll(fd)
32 if err != nil {
33 return nil, err
34 }
35
36 var config Config
37 err = json.Unmarshal(data, &config)
38 if err != nil {
39 return nil, err
40 }
41 return &config, err
42}
43
44// Load loads the configuration from the default paths.
45func Load(workingDir, dataDir string, debug bool) (*Config, error) {
46 configPaths := lookupConfigs(workingDir)
47
48 cfg, err := loadFromConfigPaths(configPaths)
49 if err != nil {
50 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
51 }
52
53 cfg.dataConfigDir = GlobalConfigData()
54
55 cfg.setDefaults(workingDir, dataDir)
56
57 if debug {
58 cfg.Options.Debug = true
59 }
60
61 // Setup logs
62 log.Setup(
63 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
64 cfg.Options.Debug,
65 )
66
67 if !isInsideWorktree() {
68 const depth = 2
69 const items = 100
70 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
71 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
72 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
73 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
74 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
75 }
76
77 // Load known providers, this loads the config from catwalk
78 providers, err := Providers(cfg)
79 if err != nil {
80 return nil, err
81 }
82 cfg.knownProviders = providers
83
84 env := env.New()
85 // Configure providers
86 valueResolver := NewShellVariableResolver(env)
87 cfg.resolver = valueResolver
88 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
89 return nil, fmt.Errorf("failed to configure providers: %w", err)
90 }
91
92 if !cfg.IsConfigured() {
93 slog.Warn("No providers configured")
94 return cfg, nil
95 }
96
97 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
98 return nil, fmt.Errorf("failed to configure selected models: %w", err)
99 }
100 cfg.SetupAgents()
101 return cfg, nil
102}
103
104func PushPopCrushEnv() func() {
105 found := []string{}
106 for _, ev := range os.Environ() {
107 if strings.HasPrefix(ev, "CRUSH_") {
108 pair := strings.SplitN(ev, "=", 2)
109 if len(pair) != 2 {
110 continue
111 }
112 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
113 }
114 }
115 backups := make(map[string]string)
116 for _, ev := range found {
117 backups[ev] = os.Getenv(ev)
118 }
119
120 for _, ev := range found {
121 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
122 }
123
124 restore := func() {
125 for k, v := range backups {
126 os.Setenv(k, v)
127 }
128 }
129 return restore
130}
131
132func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
133 knownProviderNames := make(map[string]bool)
134 restore := PushPopCrushEnv()
135 defer restore()
136 for _, p := range knownProviders {
137 knownProviderNames[string(p.ID)] = true
138 config, configExists := c.Providers.Get(string(p.ID))
139 // if the user configured a known provider we need to allow it to override a couple of parameters
140 if configExists {
141 if config.BaseURL != "" {
142 p.APIEndpoint = config.BaseURL
143 }
144 if config.APIKey != "" {
145 p.APIKey = config.APIKey
146 }
147 if len(config.Models) > 0 {
148 models := []catwalk.Model{}
149 seen := make(map[string]bool)
150
151 for _, model := range config.Models {
152 if seen[model.ID] {
153 continue
154 }
155 seen[model.ID] = true
156 if model.Name == "" {
157 model.Name = model.ID
158 }
159 models = append(models, model)
160 }
161 for _, model := range p.Models {
162 if seen[model.ID] {
163 continue
164 }
165 seen[model.ID] = true
166 if model.Name == "" {
167 model.Name = model.ID
168 }
169 models = append(models, model)
170 }
171
172 p.Models = models
173 }
174 }
175
176 headers := map[string]string{}
177 if len(p.DefaultHeaders) > 0 {
178 maps.Copy(headers, p.DefaultHeaders)
179 }
180 if len(config.ExtraHeaders) > 0 {
181 maps.Copy(headers, config.ExtraHeaders)
182 }
183 prepared := ProviderConfig{
184 ID: string(p.ID),
185 Name: p.Name,
186 BaseURL: p.APIEndpoint,
187 APIKey: p.APIKey,
188 Type: p.Type,
189 Disable: config.Disable,
190 SystemPromptPrefix: config.SystemPromptPrefix,
191 ExtraHeaders: headers,
192 ExtraBody: config.ExtraBody,
193 ExtraParams: make(map[string]string),
194 Models: p.Models,
195 }
196
197 switch p.ID {
198 // Handle specific providers that require additional configuration
199 case catwalk.InferenceProviderVertexAI:
200 if !hasVertexCredentials(env) {
201 if configExists {
202 slog.Warn("Skipping Vertex AI provider due to missing credentials")
203 c.Providers.Del(string(p.ID))
204 }
205 continue
206 }
207 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
208 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
209 case catwalk.InferenceProviderAzure:
210 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
211 if err != nil || endpoint == "" {
212 if configExists {
213 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
214 c.Providers.Del(string(p.ID))
215 }
216 continue
217 }
218 prepared.BaseURL = endpoint
219 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
220 case catwalk.InferenceProviderBedrock:
221 if !hasAWSCredentials(env) {
222 if configExists {
223 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
224 c.Providers.Del(string(p.ID))
225 }
226 continue
227 }
228 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
229 if prepared.ExtraParams["region"] == "" {
230 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
231 }
232 for _, model := range p.Models {
233 if !strings.HasPrefix(model.ID, "anthropic.") {
234 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
235 }
236 }
237 default:
238 // if the provider api or endpoint are missing we skip them
239 v, err := resolver.ResolveValue(p.APIKey)
240 if v == "" || err != nil {
241 if configExists {
242 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
243 c.Providers.Del(string(p.ID))
244 }
245 continue
246 }
247 }
248 c.Providers.Set(string(p.ID), prepared)
249 }
250
251 // validate the custom providers
252 for id, providerConfig := range c.Providers.Seq2() {
253 if knownProviderNames[id] {
254 continue
255 }
256
257 // Make sure the provider ID is set
258 providerConfig.ID = id
259 if providerConfig.Name == "" {
260 providerConfig.Name = id // Use ID as name if not set
261 }
262 // default to OpenAI if not set
263 if providerConfig.Type == "" {
264 providerConfig.Type = catwalk.TypeOpenAICompat
265 }
266 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) {
267 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
268 c.Providers.Del(id)
269 continue
270 }
271
272 if providerConfig.Disable {
273 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
274 c.Providers.Del(id)
275 continue
276 }
277 if providerConfig.APIKey == "" {
278 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
279 }
280 if providerConfig.BaseURL == "" {
281 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
282 c.Providers.Del(id)
283 continue
284 }
285 if len(providerConfig.Models) == 0 {
286 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
287 c.Providers.Del(id)
288 continue
289 }
290 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
291 if apiKey == "" || err != nil {
292 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
293 }
294 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
295 if baseURL == "" || err != nil {
296 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
297 c.Providers.Del(id)
298 continue
299 }
300
301 c.Providers.Set(id, providerConfig)
302 }
303 return nil
304}
305
306func (c *Config) setDefaults(workingDir, dataDir string) {
307 c.workingDir = workingDir
308 if c.Options == nil {
309 c.Options = &Options{}
310 }
311 if c.Options.TUI == nil {
312 c.Options.TUI = &TUIOptions{}
313 }
314 if c.Options.ContextPaths == nil {
315 c.Options.ContextPaths = []string{}
316 }
317 if c.Options.MemoryPaths == nil {
318 crushConfigDir := filepath.Dir(GlobalConfig())
319 c.Options.MemoryPaths = []string{
320 filepath.Join(crushConfigDir, "CRUSH.md"),
321 filepath.Join(filepath.Dir(crushConfigDir), "AGENTS.md"),
322 }
323 }
324 slices.Sort(c.Options.MemoryPaths)
325 c.Options.MemoryPaths = slices.Compact(c.Options.MemoryPaths)
326
327 if dataDir != "" {
328 c.Options.DataDirectory = dataDir
329 } else if c.Options.DataDirectory == "" {
330 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
331 c.Options.DataDirectory = path
332 } else {
333 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
334 }
335 }
336 if c.Providers == nil {
337 c.Providers = csync.NewMap[string, ProviderConfig]()
338 }
339 if c.Models == nil {
340 c.Models = make(map[SelectedModelType]SelectedModel)
341 }
342 if c.RecentModels == nil {
343 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
344 }
345 if c.MCP == nil {
346 c.MCP = make(map[string]MCPConfig)
347 }
348 if c.LSP == nil {
349 c.LSP = make(map[string]LSPConfig)
350 }
351
352 // Apply defaults to LSP configurations
353 c.applyLSPDefaults()
354
355 // Add the default context paths if they are not already present
356 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
357 slices.Sort(c.Options.ContextPaths)
358 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
359
360 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
361 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
362 }
363
364 if c.Options.Attribution == nil {
365 c.Options.Attribution = &Attribution{
366 TrailerStyle: TrailerStyleCoAuthoredBy,
367 GeneratedWith: true,
368 }
369 } else if c.Options.Attribution.TrailerStyle == "" {
370 // Migrate deprecated co_authored_by or apply default
371 if c.Options.Attribution.CoAuthoredBy != nil && !*c.Options.Attribution.CoAuthoredBy {
372 c.Options.Attribution.TrailerStyle = TrailerStyleNone
373 } else {
374 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
375 }
376 }
377 if c.Options.InitializeAs == "" {
378 c.Options.InitializeAs = defaultInitializeAs
379 }
380}
381
382// applyLSPDefaults applies default values from powernap to LSP configurations
383func (c *Config) applyLSPDefaults() {
384 // Get powernap's default configuration
385 configManager := powernapConfig.NewManager()
386 configManager.LoadDefaults()
387
388 // Apply defaults to each LSP configuration
389 for name, cfg := range c.LSP {
390 // Try to get defaults from powernap based on name or command name.
391 base, ok := configManager.GetServer(name)
392 if !ok {
393 base, ok = configManager.GetServer(cfg.Command)
394 if !ok {
395 continue
396 }
397 }
398 if cfg.Options == nil {
399 cfg.Options = base.Settings
400 }
401 if cfg.InitOptions == nil {
402 cfg.InitOptions = base.InitOptions
403 }
404 if len(cfg.FileTypes) == 0 {
405 cfg.FileTypes = base.FileTypes
406 }
407 if len(cfg.RootMarkers) == 0 {
408 cfg.RootMarkers = base.RootMarkers
409 }
410 if cfg.Command == "" {
411 cfg.Command = base.Command
412 }
413 if len(cfg.Args) == 0 {
414 cfg.Args = base.Args
415 }
416 if len(cfg.Env) == 0 {
417 cfg.Env = base.Environment
418 }
419 // Update the config in the map
420 c.LSP[name] = cfg
421 }
422}
423
424func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
425 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
426 err = fmt.Errorf("no providers configured, please configure at least one provider")
427 return largeModel, smallModel, err
428 }
429
430 // Use the first provider enabled based on the known providers order
431 // if no provider found that is known use the first provider configured
432 for _, p := range knownProviders {
433 providerConfig, ok := c.Providers.Get(string(p.ID))
434 if !ok || providerConfig.Disable {
435 continue
436 }
437 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
438 if defaultLargeModel == nil {
439 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
440 return largeModel, smallModel, err
441 }
442 largeModel = SelectedModel{
443 Provider: string(p.ID),
444 Model: defaultLargeModel.ID,
445 MaxTokens: defaultLargeModel.DefaultMaxTokens,
446 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
447 }
448
449 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
450 if defaultSmallModel == nil {
451 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
452 return largeModel, smallModel, err
453 }
454 smallModel = SelectedModel{
455 Provider: string(p.ID),
456 Model: defaultSmallModel.ID,
457 MaxTokens: defaultSmallModel.DefaultMaxTokens,
458 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
459 }
460 return largeModel, smallModel, err
461 }
462
463 enabledProviders := c.EnabledProviders()
464 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
465 return strings.Compare(a.ID, b.ID)
466 })
467
468 if len(enabledProviders) == 0 {
469 err = fmt.Errorf("no providers configured, please configure at least one provider")
470 return largeModel, smallModel, err
471 }
472
473 providerConfig := enabledProviders[0]
474 if len(providerConfig.Models) == 0 {
475 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
476 return largeModel, smallModel, err
477 }
478 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
479 largeModel = SelectedModel{
480 Provider: providerConfig.ID,
481 Model: defaultLargeModel.ID,
482 MaxTokens: defaultLargeModel.DefaultMaxTokens,
483 }
484 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
485 smallModel = SelectedModel{
486 Provider: providerConfig.ID,
487 Model: defaultSmallModel.ID,
488 MaxTokens: defaultSmallModel.DefaultMaxTokens,
489 }
490 return largeModel, smallModel, err
491}
492
493func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
494 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
495 if err != nil {
496 return fmt.Errorf("failed to select default models: %w", err)
497 }
498 large, small := defaultLarge, defaultSmall
499
500 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
501 if largeModelConfigured {
502 if largeModelSelected.Model != "" {
503 large.Model = largeModelSelected.Model
504 }
505 if largeModelSelected.Provider != "" {
506 large.Provider = largeModelSelected.Provider
507 }
508 model := c.GetModel(large.Provider, large.Model)
509 if model == nil {
510 large = defaultLarge
511 // override the model type to large
512 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
513 if err != nil {
514 return fmt.Errorf("failed to update preferred large model: %w", err)
515 }
516 } else {
517 if largeModelSelected.MaxTokens > 0 {
518 large.MaxTokens = largeModelSelected.MaxTokens
519 } else {
520 large.MaxTokens = model.DefaultMaxTokens
521 }
522 if largeModelSelected.ReasoningEffort != "" {
523 large.ReasoningEffort = largeModelSelected.ReasoningEffort
524 }
525 large.Think = largeModelSelected.Think
526 if largeModelSelected.Temperature != nil {
527 large.Temperature = largeModelSelected.Temperature
528 }
529 if largeModelSelected.TopP != nil {
530 large.TopP = largeModelSelected.TopP
531 }
532 if largeModelSelected.TopK != nil {
533 large.TopK = largeModelSelected.TopK
534 }
535 if largeModelSelected.FrequencyPenalty != nil {
536 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
537 }
538 if largeModelSelected.PresencePenalty != nil {
539 large.PresencePenalty = largeModelSelected.PresencePenalty
540 }
541 }
542 }
543 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
544 if smallModelConfigured {
545 if smallModelSelected.Model != "" {
546 small.Model = smallModelSelected.Model
547 }
548 if smallModelSelected.Provider != "" {
549 small.Provider = smallModelSelected.Provider
550 }
551
552 model := c.GetModel(small.Provider, small.Model)
553 if model == nil {
554 small = defaultSmall
555 // override the model type to small
556 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
557 if err != nil {
558 return fmt.Errorf("failed to update preferred small model: %w", err)
559 }
560 } else {
561 if smallModelSelected.MaxTokens > 0 {
562 small.MaxTokens = smallModelSelected.MaxTokens
563 } else {
564 small.MaxTokens = model.DefaultMaxTokens
565 }
566 if smallModelSelected.ReasoningEffort != "" {
567 small.ReasoningEffort = smallModelSelected.ReasoningEffort
568 }
569 if smallModelSelected.Temperature != nil {
570 small.Temperature = smallModelSelected.Temperature
571 }
572 if smallModelSelected.TopP != nil {
573 small.TopP = smallModelSelected.TopP
574 }
575 if smallModelSelected.TopK != nil {
576 small.TopK = smallModelSelected.TopK
577 }
578 if smallModelSelected.FrequencyPenalty != nil {
579 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
580 }
581 if smallModelSelected.PresencePenalty != nil {
582 small.PresencePenalty = smallModelSelected.PresencePenalty
583 }
584 small.Think = smallModelSelected.Think
585 }
586 }
587 c.Models[SelectedModelTypeLarge] = large
588 c.Models[SelectedModelTypeSmall] = small
589 return nil
590}
591
592// lookupConfigs searches config files recursively from CWD up to FS root
593func lookupConfigs(cwd string) []string {
594 // prepend default config paths
595 configPaths := []string{
596 GlobalConfig(),
597 GlobalConfigData(),
598 }
599
600 configNames := []string{appName + ".json", "." + appName + ".json"}
601
602 foundConfigs, err := fsext.Lookup(cwd, configNames...)
603 if err != nil {
604 // returns at least default configs
605 return configPaths
606 }
607
608 // reverse order so last config has more priority
609 slices.Reverse(foundConfigs)
610
611 return append(configPaths, foundConfigs...)
612}
613
614func loadFromConfigPaths(configPaths []string) (*Config, error) {
615 var configs []io.Reader
616
617 for _, path := range configPaths {
618 fd, err := os.Open(path)
619 if err != nil {
620 if os.IsNotExist(err) {
621 continue
622 }
623 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
624 }
625 defer fd.Close()
626
627 configs = append(configs, fd)
628 }
629
630 return loadFromReaders(configs)
631}
632
633func loadFromReaders(readers []io.Reader) (*Config, error) {
634 if len(readers) == 0 {
635 return &Config{}, nil
636 }
637
638 merged, err := Merge(readers)
639 if err != nil {
640 return nil, fmt.Errorf("failed to merge configuration readers: %w", err)
641 }
642
643 return LoadReader(merged)
644}
645
646func hasVertexCredentials(env env.Env) bool {
647 hasProject := env.Get("VERTEXAI_PROJECT") != ""
648 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
649 return hasProject && hasLocation
650}
651
652func hasAWSCredentials(env env.Env) bool {
653 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
654 return true
655 }
656
657 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
658 return true
659 }
660
661 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
662 return true
663 }
664
665 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
666 return true
667 }
668
669 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
670 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
671 return true
672 }
673
674 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil {
675 return true
676 }
677
678 return false
679}
680
681// GlobalConfig returns the global configuration file path for the application.
682func GlobalConfig() string {
683 xdgConfigHome := os.Getenv("XDG_CONFIG_HOME")
684 if xdgConfigHome != "" {
685 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
686 }
687
688 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
689}
690
691// GlobalConfigData returns the path to the main data directory for the application.
692// this config is used when the app overrides configurations instead of updating the global config.
693func GlobalConfigData() string {
694 xdgDataHome := os.Getenv("XDG_DATA_HOME")
695 if xdgDataHome != "" {
696 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
697 }
698
699 // return the path to the main data directory
700 // for windows, it should be in `%LOCALAPPDATA%/crush/`
701 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
702 if runtime.GOOS == "windows" {
703 localAppData := os.Getenv("LOCALAPPDATA")
704 if localAppData == "" {
705 localAppData = filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local")
706 }
707 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
708 }
709
710 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
711}
712
713func assignIfNil[T any](ptr **T, val T) {
714 if *ptr == nil {
715 *ptr = &val
716 }
717}
718
719func isInsideWorktree() bool {
720 bts, err := exec.CommandContext(
721 context.Background(),
722 "git", "rev-parse",
723 "--is-inside-work-tree",
724 ).CombinedOutput()
725 return err == nil && strings.TrimSpace(string(bts)) == "true"
726}