pub struct Config {Show 16 fields
pub http_proxy: String,
pub https_proxy: String,
pub proxy_auth: Option<ProxyAuth>,
pub proxy_auth_encrypted: Option<String>,
pub headless_auth: bool,
pub provider: String,
pub providers: ProviderConfigs,
pub server: ServerConfig,
pub keyword_masking: KeywordMaskingConfig,
pub anthropic_model_mapping: AnthropicModelMapping,
pub gemini_model_mapping: GeminiModelMapping,
pub hooks: HooksConfig,
pub tools: ToolsConfig,
pub env_vars: Vec<EnvVarEntry>,
pub mcp: McpConfig,
pub extra: BTreeMap<String, Value>,
}Expand description
Main configuration structure for Bamboo agent
Contains all settings needed to run the agent, including provider credentials, proxy settings, model selection, and server configuration.
Fields§
§http_proxy: StringHTTP proxy URL (e.g., http://proxy.example.com:8080)
https_proxy: StringHTTPS proxy URL (e.g., https://proxy.example.com:8080)
proxy_auth: Option<ProxyAuth>Proxy authentication credentials
Note: this is kept in-memory only. On disk we store proxy_auth_encrypted.
proxy_auth_encrypted: Option<String>Encrypted proxy authentication credentials (nonce:ciphertext)
This is the at-rest storage representation. When present, Bamboo will
decrypt it into proxy_auth at load time.
headless_auth: boolDeprecated: Use providers.copilot.headless_auth instead
provider: StringDefault LLM provider to use (e.g., “anthropic”, “openai”, “gemini”, “copilot”)
providers: ProviderConfigsProvider-specific configurations
server: ServerConfigHTTP server configuration
keyword_masking: KeywordMaskingConfigGlobal keyword masking configuration.
Previously persisted in keyword_masking.json (now unified into config.json).
anthropic_model_mapping: AnthropicModelMappingAnthropic model mapping configuration.
Previously persisted in anthropic-model-mapping.json (now unified into config.json).
gemini_model_mapping: GeminiModelMappingGemini model mapping configuration.
Previously persisted in gemini-model-mapping.json (now unified into config.json).
hooks: HooksConfigRequest preflight hooks.
These hooks can inspect and rewrite outgoing requests before they are sent upstream (e.g. image fallback behavior for text-only models).
tools: ToolsConfigGlobal tool toggles.
Any tool listed in disabled is omitted from the tool schemas sent to the LLM.
env_vars: Vec<EnvVarEntry>User-managed environment variables injected into Bash tool processes.
Secret entries are encrypted at rest; plaintext values are hydrated in memory.
mcp: McpConfigMCP server configuration.
Previously persisted in mcp.json (now unified into config.json).
extra: BTreeMap<String, Value>Extension fields stored at the root of config.json.
This keeps the config forward-compatible and allows unrelated subsystems (e.g. setup UI state) to persist their own keys without getting dropped by typed (de)serialization.
Implementations§
Source§impl Config
impl Config
Sourcepub fn new() -> Self
pub fn new() -> Self
Load configuration from file with environment variable overrides
Configuration loading order:
- Try loading from
config.json({data_dir}/config.json) - Use defaults
- Apply environment variable overrides (highest priority)
§Environment Variables
BAMBOO_PORT: Override server portBAMBOO_BIND: Override bind addressBAMBOO_DATA_DIR: Override data directoryBAMBOO_PROVIDER: Override default providerBAMBOO_HEADLESS: Enable headless authentication mode
Sourcepub fn from_data_dir(data_dir: Option<PathBuf>) -> Self
pub fn from_data_dir(data_dir: Option<PathBuf>) -> Self
Load configuration from a specific data directory
§Arguments
data_dir- Optional data directory path. If None, uses default (BAMBOO_DATA_DIRor${HOME}/.bamboo)
Sourcepub fn get_model(&self) -> Option<String>
pub fn get_model(&self) -> Option<String>
Get the effective default model for the currently active provider.
Note: for most providers this is a required config value (returns None when absent). Copilot has a built-in fallback when no model is configured.
Sourcepub fn get_fast_model(&self) -> Option<String>
pub fn get_fast_model(&self) -> Option<String>
Get the fast/cheap model for the currently active provider.
Used for lightweight tasks like title generation and summarization.
Falls back to get_model() when no fast_model is configured.
Sourcepub fn get_vision_model(&self) -> Option<String>
pub fn get_vision_model(&self) -> Option<String>
Get the vision-capable model for the currently active provider.
Used for image understanding tasks.
Falls back to get_model() when no vision_model is configured.
Sourcepub fn get_reasoning_effort(&self) -> Option<ReasoningEffort>
pub fn get_reasoning_effort(&self) -> Option<ReasoningEffort>
Get the default reasoning effort for the currently active provider.
Sourcepub fn disabled_tool_names(&self) -> BTreeSet<String>
pub fn disabled_tool_names(&self) -> BTreeSet<String>
Get normalized disabled tool names.
Sourcepub fn normalize_tool_settings(&mut self)
pub fn normalize_tool_settings(&mut self)
Normalize tool settings (trim / dedupe / sort).
Sourcepub fn hydrate_proxy_auth_from_encrypted(&mut self)
pub fn hydrate_proxy_auth_from_encrypted(&mut self)
Populate proxy_auth (plaintext) from proxy_auth_encrypted if present.
Many parts of the code rely on proxy_auth being hydrated in-memory so
we can re-encrypt deterministically on save without ever persisting
plaintext credentials.
Sourcepub fn refresh_proxy_auth_encrypted(&mut self) -> Result<()>
pub fn refresh_proxy_auth_encrypted(&mut self) -> Result<()>
Refresh proxy_auth_encrypted from the current in-memory proxy_auth.
This is used both when persisting the config to disk and when generating API responses that should never include plaintext proxy credentials.
pub fn hydrate_provider_api_keys_from_encrypted(&mut self)
pub fn refresh_provider_api_keys_encrypted(&mut self) -> Result<()>
pub fn hydrate_mcp_secrets_from_encrypted(&mut self)
pub fn refresh_mcp_secrets_encrypted(&mut self) -> Result<()>
Sourcepub fn hydrate_env_vars_from_encrypted(&mut self)
pub fn hydrate_env_vars_from_encrypted(&mut self)
Decrypt secret env vars into in-memory plaintext after loading config.
Sourcepub fn refresh_env_vars_encrypted(&mut self) -> Result<()>
pub fn refresh_env_vars_encrypted(&mut self) -> Result<()>
Re-encrypt secret env vars before persisting to disk.
Sourcepub fn sanitize_env_vars_for_disk(&mut self)
pub fn sanitize_env_vars_for_disk(&mut self)
Clear plaintext values for secrets before serialization to disk.
Sourcepub fn env_vars_as_map(&self) -> HashMap<String, String>
pub fn env_vars_as_map(&self) -> HashMap<String, String>
Build a flat map of all env vars with non-empty values (for process injection).
Sourcepub fn publish_env_vars(&self)
pub fn publish_env_vars(&self)
Update the global env vars cache (called on config load / reload).
Sourcepub fn current_env_vars() -> HashMap<String, String>
pub fn current_env_vars() -> HashMap<String, String>
Read the current env vars snapshot (called by Bash tool at process spawn time).
Sourcepub fn server_addr(&self) -> String
pub fn server_addr(&self) -> String
Get the full server address (bind:port)
Sourcepub fn save_to_dir(&self, data_dir: PathBuf) -> Result<()>
pub fn save_to_dir(&self, data_dir: PathBuf) -> Result<()>
Save configuration to disk under the provided data directory.
Configuration is always stored as {data_dir}/config.json.