1package config
2
3import (
4 "cmp"
5 "context"
6 "encoding/json"
7 "fmt"
8 "log/slog"
9 "maps"
10 "os"
11 "os/exec"
12 "path/filepath"
13 "runtime"
14 "slices"
15 "strconv"
16 "strings"
17 "testing"
18
19 "charm.land/catwalk/pkg/catwalk"
20 "git.secluded.site/crush/internal/agent/hyper"
21 "git.secluded.site/crush/internal/csync"
22 "git.secluded.site/crush/internal/env"
23 "git.secluded.site/crush/internal/fsext"
24 "git.secluded.site/crush/internal/home"
25 "git.secluded.site/crush/internal/log"
26 powernapConfig "github.com/charmbracelet/x/powernap/pkg/config"
27 "github.com/qjebbs/go-jsons"
28)
29
30const defaultCatwalkURL = "https://catwalk.charm.sh"
31
32// Load loads the configuration from the default paths.
33func Load(workingDir, dataDir string, debug bool) (*Config, error) {
34 configPaths := lookupConfigs(workingDir)
35
36 cfg, err := loadFromConfigPaths(configPaths)
37 if err != nil {
38 return nil, fmt.Errorf("failed to load config from paths %v: %w", configPaths, err)
39 }
40
41 cfg.dataConfigDir = GlobalConfigData()
42
43 cfg.setDefaults(workingDir, dataDir)
44
45 if debug {
46 cfg.Options.Debug = true
47 }
48
49 // Setup logs
50 log.Setup(
51 filepath.Join(cfg.Options.DataDirectory, "logs", fmt.Sprintf("%s.log", appName)),
52 cfg.Options.Debug,
53 )
54
55 if !isInsideWorktree() {
56 const depth = 2
57 const items = 100
58 slog.Warn("No git repository detected in working directory, will limit file walk operations", "depth", depth, "items", items)
59 assignIfNil(&cfg.Tools.Ls.MaxDepth, depth)
60 assignIfNil(&cfg.Tools.Ls.MaxItems, items)
61 assignIfNil(&cfg.Options.TUI.Completions.MaxDepth, depth)
62 assignIfNil(&cfg.Options.TUI.Completions.MaxItems, items)
63 }
64
65 if isAppleTerminal() {
66 slog.Warn("Detected Apple Terminal, enabling transparent mode")
67 assignIfNil(&cfg.Options.TUI.Transparent, true)
68 }
69
70 // Load known providers, this loads the config from catwalk
71 providers, err := Providers(cfg)
72 if err != nil {
73 return nil, err
74 }
75 cfg.knownProviders = providers
76
77 env := env.New()
78 // Configure providers
79 valueResolver := NewShellVariableResolver(env)
80 cfg.resolver = valueResolver
81 if err := cfg.configureProviders(env, valueResolver, cfg.knownProviders); err != nil {
82 return nil, fmt.Errorf("failed to configure providers: %w", err)
83 }
84
85 if !cfg.IsConfigured() {
86 slog.Warn("No providers configured")
87 return cfg, nil
88 }
89
90 if err := cfg.configureSelectedModels(cfg.knownProviders); err != nil {
91 return nil, fmt.Errorf("failed to configure selected models: %w", err)
92 }
93 cfg.SetupAgents()
94 return cfg, nil
95}
96
97func PushPopCrushEnv() func() {
98 var found []string
99 for _, ev := range os.Environ() {
100 if strings.HasPrefix(ev, "CRUSH_") {
101 pair := strings.SplitN(ev, "=", 2)
102 if len(pair) != 2 {
103 continue
104 }
105 found = append(found, strings.TrimPrefix(pair[0], "CRUSH_"))
106 }
107 }
108 backups := make(map[string]string)
109 for _, ev := range found {
110 backups[ev] = os.Getenv(ev)
111 }
112
113 for _, ev := range found {
114 os.Setenv(ev, os.Getenv("CRUSH_"+ev))
115 }
116
117 restore := func() {
118 for k, v := range backups {
119 os.Setenv(k, v)
120 }
121 }
122 return restore
123}
124
125func (c *Config) configureProviders(env env.Env, resolver VariableResolver, knownProviders []catwalk.Provider) error {
126 knownProviderNames := make(map[string]bool)
127 restore := PushPopCrushEnv()
128 defer restore()
129
130 // When disable_default_providers is enabled, skip all default/embedded
131 // providers entirely. Users must fully specify any providers they want.
132 // We skip to the custom provider validation loop which handles all
133 // user-configured providers uniformly.
134 if c.Options.DisableDefaultProviders {
135 knownProviders = nil
136 }
137
138 for _, p := range knownProviders {
139 knownProviderNames[string(p.ID)] = true
140 config, configExists := c.Providers.Get(string(p.ID))
141 // if the user configured a known provider we need to allow it to override a couple of parameters
142 if configExists {
143 if config.BaseURL != "" {
144 p.APIEndpoint = config.BaseURL
145 }
146 if config.APIKey != "" {
147 p.APIKey = config.APIKey
148 }
149 if len(config.Models) > 0 {
150 models := []catwalk.Model{}
151 seen := make(map[string]bool)
152
153 for _, model := range config.Models {
154 if seen[model.ID] {
155 continue
156 }
157 seen[model.ID] = true
158 if model.Name == "" {
159 model.Name = model.ID
160 }
161 models = append(models, model)
162 }
163 for _, model := range p.Models {
164 if seen[model.ID] {
165 continue
166 }
167 seen[model.ID] = true
168 if model.Name == "" {
169 model.Name = model.ID
170 }
171 models = append(models, model)
172 }
173
174 p.Models = models
175 }
176 }
177
178 headers := map[string]string{}
179 if len(p.DefaultHeaders) > 0 {
180 maps.Copy(headers, p.DefaultHeaders)
181 }
182 if len(config.ExtraHeaders) > 0 {
183 maps.Copy(headers, config.ExtraHeaders)
184 }
185 for k, v := range headers {
186 resolved, err := resolver.ResolveValue(v)
187 if err != nil {
188 slog.Error("Could not resolve provider header", "err", err.Error())
189 continue
190 }
191 headers[k] = resolved
192 }
193 prepared := ProviderConfig{
194 ID: string(p.ID),
195 Name: p.Name,
196 BaseURL: p.APIEndpoint,
197 APIKey: p.APIKey,
198 APIKeyTemplate: p.APIKey, // Store original template for re-resolution
199 OAuthToken: config.OAuthToken,
200 Type: p.Type,
201 Disable: config.Disable,
202 SystemPromptPrefix: config.SystemPromptPrefix,
203 ExtraHeaders: headers,
204 ExtraBody: config.ExtraBody,
205 ExtraParams: make(map[string]string),
206 Models: p.Models,
207 }
208
209 switch {
210 case p.ID == catwalk.InferenceProviderAnthropic && config.OAuthToken != nil:
211 // Claude Code subscription is not supported anymore. Remove to show onboarding.
212 c.RemoveConfigField("providers.anthropic")
213 c.Providers.Del(string(p.ID))
214 continue
215 case p.ID == catwalk.InferenceProviderCopilot && config.OAuthToken != nil:
216 prepared.SetupGitHubCopilot()
217 }
218
219 switch p.ID {
220 // Handle specific providers that require additional configuration
221 case catwalk.InferenceProviderVertexAI:
222 if !hasVertexCredentials(env) {
223 if configExists {
224 slog.Warn("Skipping Vertex AI provider due to missing credentials")
225 c.Providers.Del(string(p.ID))
226 }
227 continue
228 }
229 prepared.ExtraParams["project"] = env.Get("VERTEXAI_PROJECT")
230 prepared.ExtraParams["location"] = env.Get("VERTEXAI_LOCATION")
231 case catwalk.InferenceProviderAzure:
232 endpoint, err := resolver.ResolveValue(p.APIEndpoint)
233 if err != nil || endpoint == "" {
234 if configExists {
235 slog.Warn("Skipping Azure provider due to missing API endpoint", "provider", p.ID, "error", err)
236 c.Providers.Del(string(p.ID))
237 }
238 continue
239 }
240 prepared.BaseURL = endpoint
241 prepared.ExtraParams["apiVersion"] = env.Get("AZURE_OPENAI_API_VERSION")
242 case catwalk.InferenceProviderBedrock:
243 if !hasAWSCredentials(env) {
244 if configExists {
245 slog.Warn("Skipping Bedrock provider due to missing AWS credentials")
246 c.Providers.Del(string(p.ID))
247 }
248 continue
249 }
250 prepared.ExtraParams["region"] = env.Get("AWS_REGION")
251 if prepared.ExtraParams["region"] == "" {
252 prepared.ExtraParams["region"] = env.Get("AWS_DEFAULT_REGION")
253 }
254 for _, model := range p.Models {
255 if !strings.HasPrefix(model.ID, "anthropic.") {
256 return fmt.Errorf("bedrock provider only supports anthropic models for now, found: %s", model.ID)
257 }
258 }
259 default:
260 // if the provider api or endpoint are missing we skip them
261 v, err := resolver.ResolveValue(p.APIKey)
262 if v == "" || err != nil {
263 if configExists {
264 slog.Warn("Skipping provider due to missing API key", "provider", p.ID)
265 c.Providers.Del(string(p.ID))
266 }
267 continue
268 }
269 }
270 c.Providers.Set(string(p.ID), prepared)
271 }
272
273 // validate the custom providers
274 for id, providerConfig := range c.Providers.Seq2() {
275 if knownProviderNames[id] {
276 continue
277 }
278
279 // Make sure the provider ID is set
280 providerConfig.ID = id
281 if providerConfig.Name == "" {
282 providerConfig.Name = id // Use ID as name if not set
283 }
284 // default to OpenAI if not set
285 if providerConfig.Type == "" {
286 providerConfig.Type = catwalk.TypeOpenAICompat
287 }
288 if !slices.Contains(catwalk.KnownProviderTypes(), providerConfig.Type) && providerConfig.Type != hyper.Name {
289 slog.Warn("Skipping custom provider due to unsupported provider type", "provider", id)
290 c.Providers.Del(id)
291 continue
292 }
293
294 if providerConfig.Disable {
295 slog.Debug("Skipping custom provider due to disable flag", "provider", id)
296 c.Providers.Del(id)
297 continue
298 }
299 if providerConfig.APIKey == "" {
300 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
301 }
302 if providerConfig.BaseURL == "" {
303 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id)
304 c.Providers.Del(id)
305 continue
306 }
307 if len(providerConfig.Models) == 0 {
308 slog.Warn("Skipping custom provider because the provider has no models", "provider", id)
309 c.Providers.Del(id)
310 continue
311 }
312 apiKey, err := resolver.ResolveValue(providerConfig.APIKey)
313 if apiKey == "" || err != nil {
314 slog.Warn("Provider is missing API key, this might be OK for local providers", "provider", id)
315 }
316 baseURL, err := resolver.ResolveValue(providerConfig.BaseURL)
317 if baseURL == "" || err != nil {
318 slog.Warn("Skipping custom provider due to missing API endpoint", "provider", id, "error", err)
319 c.Providers.Del(id)
320 continue
321 }
322
323 for k, v := range providerConfig.ExtraHeaders {
324 resolved, err := resolver.ResolveValue(v)
325 if err != nil {
326 slog.Error("Could not resolve provider header", "err", err.Error())
327 continue
328 }
329 providerConfig.ExtraHeaders[k] = resolved
330 }
331
332 c.Providers.Set(id, providerConfig)
333 }
334
335 if c.Providers.Len() == 0 && c.Options.DisableDefaultProviders {
336 return fmt.Errorf("default providers are disabled and there are no custom providers are configured")
337 }
338
339 return nil
340}
341
342func (c *Config) setDefaults(workingDir, dataDir string) {
343 c.workingDir = workingDir
344 if c.Options == nil {
345 c.Options = &Options{}
346 }
347 if c.Options.TUI == nil {
348 c.Options.TUI = &TUIOptions{}
349 }
350 if c.Options.ContextPaths == nil {
351 c.Options.ContextPaths = []string{}
352 }
353 if c.Options.MemoryPaths == nil {
354 crushConfigDir := filepath.Dir(GlobalConfig())
355 c.Options.MemoryPaths = []string{
356 filepath.Join(crushConfigDir, "CRUSH.md"),
357 filepath.Join(filepath.Dir(crushConfigDir), "AGENTS.md"),
358 }
359 }
360 c.Options.ContextPaths = append(c.Options.ContextPaths, c.Options.MemoryPaths...)
361 if c.Options.SkillsPaths == nil {
362 c.Options.SkillsPaths = []string{}
363 }
364 if dataDir != "" {
365 c.Options.DataDirectory = dataDir
366 } else if c.Options.DataDirectory == "" {
367 if path, ok := fsext.LookupClosest(workingDir, defaultDataDirectory); ok {
368 c.Options.DataDirectory = path
369 } else {
370 c.Options.DataDirectory = filepath.Join(workingDir, defaultDataDirectory)
371 }
372 }
373 if c.Providers == nil {
374 c.Providers = csync.NewMap[string, ProviderConfig]()
375 }
376 if c.Models == nil {
377 c.Models = make(map[SelectedModelType]SelectedModel)
378 }
379 if c.RecentModels == nil {
380 c.RecentModels = make(map[SelectedModelType][]SelectedModel)
381 }
382 if c.MCP == nil {
383 c.MCP = make(map[string]MCPConfig)
384 }
385 if c.LSP == nil {
386 c.LSP = make(map[string]LSPConfig)
387 }
388
389 // Apply defaults to LSP configurations
390 c.applyLSPDefaults()
391
392 // Add the default context paths if they are not already present
393 c.Options.ContextPaths = append(defaultContextPaths, c.Options.ContextPaths...)
394
395 slices.Sort(c.Options.ContextPaths)
396 c.Options.ContextPaths = slices.Compact(c.Options.ContextPaths)
397
398 // Add the default skills directories if not already present.
399 for _, dir := range GlobalSkillsDirs() {
400 if !slices.Contains(c.Options.SkillsPaths, dir) {
401 c.Options.SkillsPaths = append(c.Options.SkillsPaths, dir)
402 }
403 }
404
405 if str, ok := os.LookupEnv("CRUSH_DISABLE_PROVIDER_AUTO_UPDATE"); ok {
406 c.Options.DisableProviderAutoUpdate, _ = strconv.ParseBool(str)
407 }
408
409 if str, ok := os.LookupEnv("CRUSH_DISABLE_DEFAULT_PROVIDERS"); ok {
410 c.Options.DisableDefaultProviders, _ = strconv.ParseBool(str)
411 }
412
413 if c.Options.Attribution == nil {
414 c.Options.Attribution = &Attribution{
415 TrailerStyle: TrailerStyleAssistedBy,
416 GeneratedWith: true,
417 }
418 } else if c.Options.Attribution.TrailerStyle == "" {
419 // Migrate deprecated co_authored_by or apply default
420 if c.Options.Attribution.CoAuthoredBy != nil {
421 if *c.Options.Attribution.CoAuthoredBy {
422 c.Options.Attribution.TrailerStyle = TrailerStyleCoAuthoredBy
423 } else {
424 c.Options.Attribution.TrailerStyle = TrailerStyleNone
425 }
426 } else {
427 c.Options.Attribution.TrailerStyle = TrailerStyleAssistedBy
428 }
429 }
430 if c.Options.InitializeAs == "" {
431 c.Options.InitializeAs = defaultInitializeAs
432 }
433}
434
435// applyLSPDefaults applies default values from powernap to LSP configurations
436func (c *Config) applyLSPDefaults() {
437 // Get powernap's default configuration
438 configManager := powernapConfig.NewManager()
439 configManager.LoadDefaults()
440
441 // Apply defaults to each LSP configuration
442 for name, cfg := range c.LSP {
443 // Try to get defaults from powernap based on name or command name.
444 base, ok := configManager.GetServer(name)
445 if !ok {
446 base, ok = configManager.GetServer(cfg.Command)
447 if !ok {
448 continue
449 }
450 }
451 if cfg.Options == nil {
452 cfg.Options = base.Settings
453 }
454 if cfg.InitOptions == nil {
455 cfg.InitOptions = base.InitOptions
456 }
457 if len(cfg.FileTypes) == 0 {
458 cfg.FileTypes = base.FileTypes
459 }
460 if len(cfg.RootMarkers) == 0 {
461 cfg.RootMarkers = base.RootMarkers
462 }
463 if cfg.Command == "" {
464 cfg.Command = base.Command
465 }
466 if len(cfg.Args) == 0 {
467 cfg.Args = base.Args
468 }
469 if len(cfg.Env) == 0 {
470 cfg.Env = base.Environment
471 }
472 // Update the config in the map
473 c.LSP[name] = cfg
474 }
475}
476
477func (c *Config) defaultModelSelection(knownProviders []catwalk.Provider) (largeModel SelectedModel, smallModel SelectedModel, err error) {
478 if len(knownProviders) == 0 && c.Providers.Len() == 0 {
479 err = fmt.Errorf("no providers configured, please configure at least one provider")
480 return largeModel, smallModel, err
481 }
482
483 // Use the first provider enabled based on the known providers order
484 // if no provider found that is known use the first provider configured
485 for _, p := range knownProviders {
486 providerConfig, ok := c.Providers.Get(string(p.ID))
487 if !ok || providerConfig.Disable {
488 continue
489 }
490 defaultLargeModel := c.GetModel(string(p.ID), p.DefaultLargeModelID)
491 if defaultLargeModel == nil {
492 err = fmt.Errorf("default large model %s not found for provider %s", p.DefaultLargeModelID, p.ID)
493 return largeModel, smallModel, err
494 }
495 largeModel = SelectedModel{
496 Provider: string(p.ID),
497 Model: defaultLargeModel.ID,
498 MaxTokens: defaultLargeModel.DefaultMaxTokens,
499 ReasoningEffort: defaultLargeModel.DefaultReasoningEffort,
500 }
501
502 defaultSmallModel := c.GetModel(string(p.ID), p.DefaultSmallModelID)
503 if defaultSmallModel == nil {
504 err = fmt.Errorf("default small model %s not found for provider %s", p.DefaultSmallModelID, p.ID)
505 return largeModel, smallModel, err
506 }
507 smallModel = SelectedModel{
508 Provider: string(p.ID),
509 Model: defaultSmallModel.ID,
510 MaxTokens: defaultSmallModel.DefaultMaxTokens,
511 ReasoningEffort: defaultSmallModel.DefaultReasoningEffort,
512 }
513 return largeModel, smallModel, err
514 }
515
516 enabledProviders := c.EnabledProviders()
517 slices.SortFunc(enabledProviders, func(a, b ProviderConfig) int {
518 return strings.Compare(a.ID, b.ID)
519 })
520
521 if len(enabledProviders) == 0 {
522 err = fmt.Errorf("no providers configured, please configure at least one provider")
523 return largeModel, smallModel, err
524 }
525
526 providerConfig := enabledProviders[0]
527 if len(providerConfig.Models) == 0 {
528 err = fmt.Errorf("provider %s has no models configured", providerConfig.ID)
529 return largeModel, smallModel, err
530 }
531 defaultLargeModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
532 largeModel = SelectedModel{
533 Provider: providerConfig.ID,
534 Model: defaultLargeModel.ID,
535 MaxTokens: defaultLargeModel.DefaultMaxTokens,
536 }
537 defaultSmallModel := c.GetModel(providerConfig.ID, providerConfig.Models[0].ID)
538 smallModel = SelectedModel{
539 Provider: providerConfig.ID,
540 Model: defaultSmallModel.ID,
541 MaxTokens: defaultSmallModel.DefaultMaxTokens,
542 }
543 return largeModel, smallModel, err
544}
545
546func (c *Config) configureSelectedModels(knownProviders []catwalk.Provider) error {
547 defaultLarge, defaultSmall, err := c.defaultModelSelection(knownProviders)
548 if err != nil {
549 return fmt.Errorf("failed to select default models: %w", err)
550 }
551 large, small := defaultLarge, defaultSmall
552
553 largeModelSelected, largeModelConfigured := c.Models[SelectedModelTypeLarge]
554 if largeModelConfigured {
555 if largeModelSelected.Model != "" {
556 large.Model = largeModelSelected.Model
557 }
558 if largeModelSelected.Provider != "" {
559 large.Provider = largeModelSelected.Provider
560 }
561 model := c.GetModel(large.Provider, large.Model)
562 if model == nil {
563 large = defaultLarge
564 // override the model type to large
565 err := c.UpdatePreferredModel(SelectedModelTypeLarge, large)
566 if err != nil {
567 return fmt.Errorf("failed to update preferred large model: %w", err)
568 }
569 } else {
570 if largeModelSelected.MaxTokens > 0 {
571 large.MaxTokens = largeModelSelected.MaxTokens
572 } else {
573 large.MaxTokens = model.DefaultMaxTokens
574 }
575 if largeModelSelected.ReasoningEffort != "" {
576 large.ReasoningEffort = largeModelSelected.ReasoningEffort
577 }
578 large.Think = largeModelSelected.Think
579 if largeModelSelected.Temperature != nil {
580 large.Temperature = largeModelSelected.Temperature
581 }
582 if largeModelSelected.TopP != nil {
583 large.TopP = largeModelSelected.TopP
584 }
585 if largeModelSelected.TopK != nil {
586 large.TopK = largeModelSelected.TopK
587 }
588 if largeModelSelected.FrequencyPenalty != nil {
589 large.FrequencyPenalty = largeModelSelected.FrequencyPenalty
590 }
591 if largeModelSelected.PresencePenalty != nil {
592 large.PresencePenalty = largeModelSelected.PresencePenalty
593 }
594 }
595 }
596 smallModelSelected, smallModelConfigured := c.Models[SelectedModelTypeSmall]
597 if smallModelConfigured {
598 if smallModelSelected.Model != "" {
599 small.Model = smallModelSelected.Model
600 }
601 if smallModelSelected.Provider != "" {
602 small.Provider = smallModelSelected.Provider
603 }
604
605 model := c.GetModel(small.Provider, small.Model)
606 if model == nil {
607 small = defaultSmall
608 // override the model type to small
609 err := c.UpdatePreferredModel(SelectedModelTypeSmall, small)
610 if err != nil {
611 return fmt.Errorf("failed to update preferred small model: %w", err)
612 }
613 } else {
614 if smallModelSelected.MaxTokens > 0 {
615 small.MaxTokens = smallModelSelected.MaxTokens
616 } else {
617 small.MaxTokens = model.DefaultMaxTokens
618 }
619 if smallModelSelected.ReasoningEffort != "" {
620 small.ReasoningEffort = smallModelSelected.ReasoningEffort
621 }
622 if smallModelSelected.Temperature != nil {
623 small.Temperature = smallModelSelected.Temperature
624 }
625 if smallModelSelected.TopP != nil {
626 small.TopP = smallModelSelected.TopP
627 }
628 if smallModelSelected.TopK != nil {
629 small.TopK = smallModelSelected.TopK
630 }
631 if smallModelSelected.FrequencyPenalty != nil {
632 small.FrequencyPenalty = smallModelSelected.FrequencyPenalty
633 }
634 if smallModelSelected.PresencePenalty != nil {
635 small.PresencePenalty = smallModelSelected.PresencePenalty
636 }
637 small.Think = smallModelSelected.Think
638 }
639 }
640 c.Models[SelectedModelTypeLarge] = large
641 c.Models[SelectedModelTypeSmall] = small
642 return nil
643}
644
645// lookupConfigs searches config files recursively from CWD up to FS root
646func lookupConfigs(cwd string) []string {
647 // prepend default config paths
648 configPaths := []string{
649 GlobalConfig(),
650 GlobalConfigData(),
651 }
652
653 configNames := []string{appName + ".json", "." + appName + ".json"}
654
655 foundConfigs, err := fsext.Lookup(cwd, configNames...)
656 if err != nil {
657 // returns at least default configs
658 return configPaths
659 }
660
661 // reverse order so last config has more priority
662 slices.Reverse(foundConfigs)
663
664 return append(configPaths, foundConfigs...)
665}
666
667func loadFromConfigPaths(configPaths []string) (*Config, error) {
668 var configs [][]byte
669
670 for _, path := range configPaths {
671 data, err := os.ReadFile(path)
672 if err != nil {
673 if os.IsNotExist(err) {
674 continue
675 }
676 return nil, fmt.Errorf("failed to open config file %s: %w", path, err)
677 }
678 if len(data) == 0 {
679 continue
680 }
681 configs = append(configs, data)
682 }
683
684 return loadFromBytes(configs)
685}
686
687func loadFromBytes(configs [][]byte) (*Config, error) {
688 if len(configs) == 0 {
689 return &Config{}, nil
690 }
691
692 data, err := jsons.Merge(configs)
693 if err != nil {
694 return nil, err
695 }
696 var config Config
697 if err := json.Unmarshal(data, &config); err != nil {
698 return nil, err
699 }
700 return &config, nil
701}
702
703func hasVertexCredentials(env env.Env) bool {
704 hasProject := env.Get("VERTEXAI_PROJECT") != ""
705 hasLocation := env.Get("VERTEXAI_LOCATION") != ""
706 return hasProject && hasLocation
707}
708
709func hasAWSCredentials(env env.Env) bool {
710 if env.Get("AWS_BEARER_TOKEN_BEDROCK") != "" {
711 return true
712 }
713
714 if env.Get("AWS_ACCESS_KEY_ID") != "" && env.Get("AWS_SECRET_ACCESS_KEY") != "" {
715 return true
716 }
717
718 if env.Get("AWS_PROFILE") != "" || env.Get("AWS_DEFAULT_PROFILE") != "" {
719 return true
720 }
721
722 if env.Get("AWS_REGION") != "" || env.Get("AWS_DEFAULT_REGION") != "" {
723 return true
724 }
725
726 if env.Get("AWS_CONTAINER_CREDENTIALS_RELATIVE_URI") != "" ||
727 env.Get("AWS_CONTAINER_CREDENTIALS_FULL_URI") != "" {
728 return true
729 }
730
731 if _, err := os.Stat(filepath.Join(home.Dir(), ".aws/credentials")); err == nil && !testing.Testing() {
732 return true
733 }
734
735 return false
736}
737
738// GlobalConfig returns the global configuration file path for the application.
739func GlobalConfig() string {
740 if crushGlobal := os.Getenv("CRUSH_GLOBAL_CONFIG"); crushGlobal != "" {
741 return filepath.Join(crushGlobal, fmt.Sprintf("%s.json", appName))
742 }
743 if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
744 return filepath.Join(xdgConfigHome, appName, fmt.Sprintf("%s.json", appName))
745 }
746 return filepath.Join(home.Dir(), ".config", appName, fmt.Sprintf("%s.json", appName))
747}
748
749// GlobalConfigData returns the path to the main data directory for the application.
750// this config is used when the app overrides configurations instead of updating the global config.
751func GlobalConfigData() string {
752 if crushData := os.Getenv("CRUSH_GLOBAL_DATA"); crushData != "" {
753 return filepath.Join(crushData, fmt.Sprintf("%s.json", appName))
754 }
755 if xdgDataHome := os.Getenv("XDG_DATA_HOME"); xdgDataHome != "" {
756 return filepath.Join(xdgDataHome, appName, fmt.Sprintf("%s.json", appName))
757 }
758
759 // return the path to the main data directory
760 // for windows, it should be in `%LOCALAPPDATA%/crush/`
761 // for linux and macOS, it should be in `$HOME/.local/share/crush/`
762 if runtime.GOOS == "windows" {
763 localAppData := cmp.Or(
764 os.Getenv("LOCALAPPDATA"),
765 filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
766 )
767 return filepath.Join(localAppData, appName, fmt.Sprintf("%s.json", appName))
768 }
769
770 return filepath.Join(home.Dir(), ".local", "share", appName, fmt.Sprintf("%s.json", appName))
771}
772
773func assignIfNil[T any](ptr **T, val T) {
774 if *ptr == nil {
775 *ptr = &val
776 }
777}
778
779func isInsideWorktree() bool {
780 bts, err := exec.CommandContext(
781 context.Background(),
782 "git", "rev-parse",
783 "--is-inside-work-tree",
784 ).CombinedOutput()
785 return err == nil && strings.TrimSpace(string(bts)) == "true"
786}
787
788// GlobalSkillsDirs returns the default directories for Agent Skills.
789// Skills in these directories are auto-discovered and their files can be read
790// without permission prompts.
791func GlobalSkillsDirs() []string {
792 if crushSkills := os.Getenv("CRUSH_SKILLS_DIR"); crushSkills != "" {
793 return []string{crushSkills}
794 }
795
796 // Determine the base config directory.
797 var configBase string
798 if xdgConfigHome := os.Getenv("XDG_CONFIG_HOME"); xdgConfigHome != "" {
799 configBase = xdgConfigHome
800 } else if runtime.GOOS == "windows" {
801 configBase = cmp.Or(
802 os.Getenv("LOCALAPPDATA"),
803 filepath.Join(os.Getenv("USERPROFILE"), "AppData", "Local"),
804 )
805 } else {
806 configBase = filepath.Join(home.Dir(), ".config")
807 }
808
809 return []string{
810 filepath.Join(configBase, appName, "skills"),
811 filepath.Join(configBase, "agents", "skills"),
812 }
813}
814
815func isAppleTerminal() bool { return os.Getenv("TERM_PROGRAM") == "Apple_Terminal" }