mirror of
https://github.com/go-gitea/gitea
synced 2024-12-28 08:14:39 +01:00
792b4dba2c
* update github.com/blevesearch/bleve v2.0.2 -> v2.0.3 * github.com/denisenkom/go-mssqldb v0.9.0 -> v0.10.0 * github.com/editorconfig/editorconfig-core-go v2.4.1 -> v2.4.2 * github.com/go-chi/cors v1.1.1 -> v1.2.0 * github.com/go-git/go-billy v5.0.0 -> v5.1.0 * github.com/go-git/go-git v5.2.0 -> v5.3.0 * github.com/go-ldap/ldap v3.2.4 -> v3.3.0 * github.com/go-redis/redis v8.6.0 -> v8.8.2 * github.com/go-sql-driver/mysql v1.5.0 -> v1.6.0 * github.com/go-swagger/go-swagger v0.26.1 -> v0.27.0 * github.com/lib/pq v1.9.0 -> v1.10.1 * github.com/mattn/go-sqlite3 v1.14.6 -> v1.14.7 * github.com/go-testfixtures/testfixtures v3.5.0 -> v3.6.0 * github.com/issue9/identicon v1.0.1 -> v1.2.0 * github.com/klauspost/compress v1.11.8 -> v1.12.1 * github.com/mgechev/revive v1.0.3 -> v1.0.6 * github.com/microcosm-cc/bluemonday v1.0.7 -> v1.0.8 * github.com/niklasfasching/go-org v1.4.0 -> v1.5.0 * github.com/olivere/elastic v7.0.22 -> v7.0.24 * github.com/pelletier/go-toml v1.8.1 -> v1.9.0 * github.com/prometheus/client_golang v1.9.0 -> v1.10.0 * github.com/xanzy/go-gitlab v0.44.0 -> v0.48.0 * github.com/yuin/goldmark v1.3.3 -> v1.3.5 * github.com/6543/go-version v1.2.4 -> v1.3.1 * do github.com/lib/pq v1.10.0 -> v1.10.1 again ...
186 lines
8.8 KiB
Go
Vendored
186 lines
8.8 KiB
Go
Vendored
package ssh_config
|
|
|
|
import (
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
)
|
|
|
|
// Default returns the default value for the given keyword, for example "22" if
|
|
// the keyword is "Port". Default returns the empty string if the keyword has no
|
|
// default, or if the keyword is unknown. Keyword matching is case-insensitive.
|
|
//
|
|
// Default values are provided by OpenSSH_7.4p1 on a Mac.
|
|
func Default(keyword string) string {
|
|
return defaults[strings.ToLower(keyword)]
|
|
}
|
|
|
|
// Arguments where the value must be "yes" or "no" and *only* yes or no.
|
|
var yesnos = map[string]bool{
|
|
strings.ToLower("BatchMode"): true,
|
|
strings.ToLower("CanonicalizeFallbackLocal"): true,
|
|
strings.ToLower("ChallengeResponseAuthentication"): true,
|
|
strings.ToLower("CheckHostIP"): true,
|
|
strings.ToLower("ClearAllForwardings"): true,
|
|
strings.ToLower("Compression"): true,
|
|
strings.ToLower("EnableSSHKeysign"): true,
|
|
strings.ToLower("ExitOnForwardFailure"): true,
|
|
strings.ToLower("ForwardAgent"): true,
|
|
strings.ToLower("ForwardX11"): true,
|
|
strings.ToLower("ForwardX11Trusted"): true,
|
|
strings.ToLower("GatewayPorts"): true,
|
|
strings.ToLower("GSSAPIAuthentication"): true,
|
|
strings.ToLower("GSSAPIDelegateCredentials"): true,
|
|
strings.ToLower("HostbasedAuthentication"): true,
|
|
strings.ToLower("IdentitiesOnly"): true,
|
|
strings.ToLower("KbdInteractiveAuthentication"): true,
|
|
strings.ToLower("NoHostAuthenticationForLocalhost"): true,
|
|
strings.ToLower("PasswordAuthentication"): true,
|
|
strings.ToLower("PermitLocalCommand"): true,
|
|
strings.ToLower("PubkeyAuthentication"): true,
|
|
strings.ToLower("RhostsRSAAuthentication"): true,
|
|
strings.ToLower("RSAAuthentication"): true,
|
|
strings.ToLower("StreamLocalBindUnlink"): true,
|
|
strings.ToLower("TCPKeepAlive"): true,
|
|
strings.ToLower("UseKeychain"): true,
|
|
strings.ToLower("UsePrivilegedPort"): true,
|
|
strings.ToLower("VisualHostKey"): true,
|
|
}
|
|
|
|
var uints = map[string]bool{
|
|
strings.ToLower("CanonicalizeMaxDots"): true,
|
|
strings.ToLower("CompressionLevel"): true, // 1 to 9
|
|
strings.ToLower("ConnectionAttempts"): true,
|
|
strings.ToLower("ConnectTimeout"): true,
|
|
strings.ToLower("NumberOfPasswordPrompts"): true,
|
|
strings.ToLower("Port"): true,
|
|
strings.ToLower("ServerAliveCountMax"): true,
|
|
strings.ToLower("ServerAliveInterval"): true,
|
|
}
|
|
|
|
func mustBeYesOrNo(lkey string) bool {
|
|
return yesnos[lkey]
|
|
}
|
|
|
|
func mustBeUint(lkey string) bool {
|
|
return uints[lkey]
|
|
}
|
|
|
|
func validate(key, val string) error {
|
|
lkey := strings.ToLower(key)
|
|
if mustBeYesOrNo(lkey) && (val != "yes" && val != "no") {
|
|
return fmt.Errorf("ssh_config: value for key %q must be 'yes' or 'no', got %q", key, val)
|
|
}
|
|
if mustBeUint(lkey) {
|
|
_, err := strconv.ParseUint(val, 10, 64)
|
|
if err != nil {
|
|
return fmt.Errorf("ssh_config: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
var defaults = map[string]string{
|
|
strings.ToLower("AddKeysToAgent"): "no",
|
|
strings.ToLower("AddressFamily"): "any",
|
|
strings.ToLower("BatchMode"): "no",
|
|
strings.ToLower("CanonicalizeFallbackLocal"): "yes",
|
|
strings.ToLower("CanonicalizeHostname"): "no",
|
|
strings.ToLower("CanonicalizeMaxDots"): "1",
|
|
strings.ToLower("ChallengeResponseAuthentication"): "yes",
|
|
strings.ToLower("CheckHostIP"): "yes",
|
|
// TODO is this still the correct cipher
|
|
strings.ToLower("Cipher"): "3des",
|
|
strings.ToLower("Ciphers"): "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc",
|
|
strings.ToLower("ClearAllForwardings"): "no",
|
|
strings.ToLower("Compression"): "no",
|
|
strings.ToLower("CompressionLevel"): "6",
|
|
strings.ToLower("ConnectionAttempts"): "1",
|
|
strings.ToLower("ControlMaster"): "no",
|
|
strings.ToLower("EnableSSHKeysign"): "no",
|
|
strings.ToLower("EscapeChar"): "~",
|
|
strings.ToLower("ExitOnForwardFailure"): "no",
|
|
strings.ToLower("FingerprintHash"): "sha256",
|
|
strings.ToLower("ForwardAgent"): "no",
|
|
strings.ToLower("ForwardX11"): "no",
|
|
strings.ToLower("ForwardX11Timeout"): "20m",
|
|
strings.ToLower("ForwardX11Trusted"): "no",
|
|
strings.ToLower("GatewayPorts"): "no",
|
|
strings.ToLower("GlobalKnownHostsFile"): "/etc/ssh/ssh_known_hosts /etc/ssh/ssh_known_hosts2",
|
|
strings.ToLower("GSSAPIAuthentication"): "no",
|
|
strings.ToLower("GSSAPIDelegateCredentials"): "no",
|
|
strings.ToLower("HashKnownHosts"): "no",
|
|
strings.ToLower("HostbasedAuthentication"): "no",
|
|
|
|
strings.ToLower("HostbasedKeyTypes"): "ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-rsa",
|
|
strings.ToLower("HostKeyAlgorithms"): "ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-rsa",
|
|
// HostName has a dynamic default (the value passed at the command line).
|
|
|
|
strings.ToLower("IdentitiesOnly"): "no",
|
|
strings.ToLower("IdentityFile"): "~/.ssh/identity",
|
|
|
|
// IPQoS has a dynamic default based on interactive or non-interactive
|
|
// sessions.
|
|
|
|
strings.ToLower("KbdInteractiveAuthentication"): "yes",
|
|
|
|
strings.ToLower("KexAlgorithms"): "curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1",
|
|
strings.ToLower("LogLevel"): "INFO",
|
|
strings.ToLower("MACs"): "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1",
|
|
|
|
strings.ToLower("NoHostAuthenticationForLocalhost"): "no",
|
|
strings.ToLower("NumberOfPasswordPrompts"): "3",
|
|
strings.ToLower("PasswordAuthentication"): "yes",
|
|
strings.ToLower("PermitLocalCommand"): "no",
|
|
strings.ToLower("Port"): "22",
|
|
|
|
strings.ToLower("PreferredAuthentications"): "gssapi-with-mic,hostbased,publickey,keyboard-interactive,password",
|
|
strings.ToLower("Protocol"): "2",
|
|
strings.ToLower("ProxyUseFdpass"): "no",
|
|
strings.ToLower("PubkeyAcceptedKeyTypes"): "ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-rsa",
|
|
strings.ToLower("PubkeyAuthentication"): "yes",
|
|
strings.ToLower("RekeyLimit"): "default none",
|
|
strings.ToLower("RhostsRSAAuthentication"): "no",
|
|
strings.ToLower("RSAAuthentication"): "yes",
|
|
|
|
strings.ToLower("ServerAliveCountMax"): "3",
|
|
strings.ToLower("ServerAliveInterval"): "0",
|
|
strings.ToLower("StreamLocalBindMask"): "0177",
|
|
strings.ToLower("StreamLocalBindUnlink"): "no",
|
|
strings.ToLower("StrictHostKeyChecking"): "ask",
|
|
strings.ToLower("TCPKeepAlive"): "yes",
|
|
strings.ToLower("Tunnel"): "no",
|
|
strings.ToLower("TunnelDevice"): "any:any",
|
|
strings.ToLower("UpdateHostKeys"): "no",
|
|
strings.ToLower("UseKeychain"): "no",
|
|
strings.ToLower("UsePrivilegedPort"): "no",
|
|
|
|
strings.ToLower("UserKnownHostsFile"): "~/.ssh/known_hosts ~/.ssh/known_hosts2",
|
|
strings.ToLower("VerifyHostKeyDNS"): "no",
|
|
strings.ToLower("VisualHostKey"): "no",
|
|
strings.ToLower("XAuthLocation"): "/usr/X11R6/bin/xauth",
|
|
}
|
|
|
|
// these identities are used for SSH protocol 2
|
|
var defaultProtocol2Identities = []string{
|
|
"~/.ssh/id_dsa",
|
|
"~/.ssh/id_ecdsa",
|
|
"~/.ssh/id_ed25519",
|
|
"~/.ssh/id_rsa",
|
|
}
|
|
|
|
// these directives support multiple items that can be collected
|
|
// across multiple files
|
|
var pluralDirectives = map[string]bool{
|
|
"CertificateFile": true,
|
|
"IdentityFile": true,
|
|
"DynamicForward": true,
|
|
"RemoteForward": true,
|
|
"SendEnv": true,
|
|
"SetEnv": true,
|
|
}
|
|
|
|
// SupportsMultiple reports whether a directive can be specified multiple times.
|
|
func SupportsMultiple(key string) bool {
|
|
return pluralDirectives[strings.ToLower(key)]
|
|
}
|