diff --git a/pkg/config/host.go b/pkg/config/host.go index ee0fa5ef6..ae653a83f 100644 --- a/pkg/config/host.go +++ b/pkg/config/host.go @@ -5,113 +5,116 @@ import ( "fmt" "io" "os/user" + "reflect" "strings" composeyaml "github.com/docker/libcompose/yaml" "moul.io/assh/v2/pkg/utils" ) +// EnableEscapeCommandline string `yaml:"enableescapecommandline,omitempty,flow" json:"EnableSSHKeysign,omitempty"` // Host defines the configuration flags of a host type Host struct { // ssh-config fields - AddKeysToAgent string `yaml:"addkeystoagent,omitempty,flow" json:"AddKeysToAgent,omitempty"` - AddressFamily string `yaml:"addressfamily,omitempty,flow" json:"AddressFamily,omitempty"` - AskPassGUI string `yaml:"askpassgui,omitempty,flow" json:"AskPassGUI,omitempty"` - BatchMode string `yaml:"batchmode,omitempty,flow" json:"BatchMode,omitempty"` - BindAddress string `yaml:"bindaddress,omitempty,flow" json:"BindAddress,omitempty"` - CanonicalDomains string `yaml:"canonicaldomains,omitempty,flow" json:"CanonicalDomains,omitempty"` - CanonicalizeFallbackLocal string `yaml:"canonicalizefallbacklocal,omitempty,flow" json:"CanonicalizeFallbackLocal,omitempty"` - CanonicalizeHostname string `yaml:"canonicalizehostname,omitempty,flow" json:"CanonicalizeHostname,omitempty"` - CanonicalizeMaxDots string `yaml:"canonicalizemaxDots,omitempty,flow" json:"CanonicalizeMaxDots,omitempty"` - CanonicalizePermittedCNAMEs string `yaml:"canonicalizepermittedcnames,omitempty,flow" json:"CanonicalizePermittedCNAMEs,omitempty"` - CASignatureAlgorithms composeyaml.Stringorslice `yaml:"casignaturealgorithms,omitempty,flow" json:"CASignatureAlgorithms,omitempty"` - CertificateFile composeyaml.Stringorslice `yaml:"certificatefile,omitempty,flow" json:"CertificateFile,omitempty"` - ChallengeResponseAuthentication string `yaml:"challengeresponseauthentication,omitempty,flow" json:"ChallengeResponseAuthentication,omitempty"` - CheckHostIP string `yaml:"checkhostip,omitempty,flow" json:"CheckHostIP,omitempty"` - Cipher string `yaml:"cipher,omitempty,flow" json:"Cipher,omitempty"` - Ciphers composeyaml.Stringorslice `yaml:"ciphers,omitempty,flow" json:"Ciphers,omitempty"` - ClearAllForwardings string `yaml:"clearallforwardings,omitempty,flow" json:"ClearAllForwardings,omitempty"` - Compression string `yaml:"compression,omitempty,flow" json:"Compression,omitempty"` - CompressionLevel int `yaml:"compressionlevel,omitempty,flow" json:"CompressionLevel,omitempty"` - ConnectionAttempts string `yaml:"connectionattempts,omitempty,flow" json:"ConnectionAttempts,omitempty"` - ConnectTimeout int `yaml:"connecttimeout,omitempty,flow" json:"ConnectTimeout,omitempty"` - ControlMaster string `yaml:"controlmaster,omitempty,flow" json:"ControlMaster,omitempty"` - ControlPath string `yaml:"controlpath,omitempty,flow" json:"ControlPath,omitempty"` - ControlPersist string `yaml:"controlpersist,omitempty,flow" json:"ControlPersist,omitempty"` - DynamicForward composeyaml.Stringorslice `yaml:"dynamicforward,omitempty,flow" json:"DynamicForward,omitempty"` - EnableSSHKeysign string `yaml:"enablesshkeysign,omitempty,flow" json:"EnableSSHKeysign,omitempty"` - EscapeChar string `yaml:"escapechar,omitempty,flow" json:"EscapeChar,omitempty"` - ExitOnForwardFailure string `yaml:"exitonforwardfailure,omitempty,flow" json:"ExitOnForwardFailure,omitempty"` - FingerprintHash string `yaml:"fingerprinthash,omitempty,flow" json:"FingerprintHash,omitempty"` - ForwardAgent string `yaml:"forwardagent,omitempty,flow" json:"ForwardAgent,omitempty"` - ForwardX11 string `yaml:"forwardx11,omitempty,flow" json:"ForwardX11,omitempty"` - ForwardX11Timeout int `yaml:"forwardx11timeout,omitempty,flow" json:"ForwardX11Timeout,omitempty"` - ForwardX11Trusted string `yaml:"forwardx11trusted,omitempty,flow" json:"ForwardX11Trusted,omitempty"` - GatewayPorts string `yaml:"gatewayports,omitempty,flow" json:"GatewayPorts,omitempty"` - GlobalKnownHostsFile composeyaml.Stringorslice `yaml:"globalknownhostsfile,omitempty,flow" json:"GlobalKnownHostsFile,omitempty"` - GSSAPIAuthentication string `yaml:"gssapiauthentication,omitempty,flow" json:"GSSAPIAuthentication,omitempty"` - GSSAPIClientIdentity string `yaml:"gssapiclientidentity,omitempty,flow" json:"GSSAPIClientIdentity,omitempty"` - GSSAPIDelegateCredentials string `yaml:"gssapidelegatecredentials,omitempty,flow" json:"GSSAPIDelegateCredentials,omitempty"` - GSSAPIKeyExchange string `yaml:"gssapikeyexchange,omitempty,flow" json:"GSSAPIKeyExchange,omitempty"` - GSSAPIRenewalForcesRekey string `yaml:"gssapirenewalforcesrekey,omitempty,flow" json:"GSSAPIRenewalForcesRekey,omitempty"` - GSSAPIServerIdentity string `yaml:"gssapiserveridentity,omitempty,flow" json:"GSSAPIServerIdentity,omitempty"` - GSSAPITrustDNS string `yaml:"gssapitrustdns,omitempty,flow" json:"GSSAPITrustDNS,omitempty"` - HashKnownHosts string `yaml:"hashknownhosts,omitempty,flow" json:"HashKnownHosts,omitempty"` - HostbasedAuthentication string `yaml:"hostbasedauthentication,omitempty,flow" json:"HostbasedAuthentication,omitempty"` - HostbasedKeyTypes string `yaml:"hostbasedkeytypes,omitempty,flow" json:"HostbasedKeyTypes,omitempty"` - HostKeyAlgorithms composeyaml.Stringorslice `yaml:"hostkeyalgorithms,omitempty,flow" json:"HostKeyAlgorithms,omitempty"` - HostKeyAlias string `yaml:"hostkeyalias,omitempty,flow" json:"HostKeyAlias,omitempty"` - IdentitiesOnly string `yaml:"identitiesonly,omitempty,flow" json:"IdentitiesOnly,omitempty"` - IdentityAgent string `yaml:"identityagent,omitempty,flow" json:"IdentityAgent,omitempty"` - IdentityFile composeyaml.Stringorslice `yaml:"identityfile,omitempty,flow" json:"IdentityFile,omitempty"` - IgnoreUnknown string `yaml:"ignoreunknown,omitempty,flow" json:"IgnoreUnknown,omitempty"` - IPQoS composeyaml.Stringorslice `yaml:"ipqos,omitempty,flow" json:"IPQoS,omitempty"` - KbdInteractiveAuthentication string `yaml:"kbdinteractiveauthentication,omitempty,flow" json:"KbdInteractiveAuthentication,omitempty"` - KbdInteractiveDevices composeyaml.Stringorslice `yaml:"kbdinteractivedevices,omitempty,flow" json:"KbdInteractiveDevices,omitempty"` - KexAlgorithms composeyaml.Stringorslice `yaml:"kexalgorithms,omitempty,flow" json:"KexAlgorithms,omitempty"` - KeychainIntegration string `yaml:"keychainintegration,omitempty,flow" json:"KeychainIntegration,omitempty"` - LocalCommand string `yaml:"localcommand,omitempty,flow" json:"LocalCommand,omitempty"` - RemoteCommand string `yaml:"remotecommand,omitempty,flow" json:"RemoteCommand,omitempty"` - LocalForward composeyaml.Stringorslice `yaml:"localforward,omitempty,flow" json:"LocalForward,omitempty"` - LogLevel string `yaml:"loglevel,omitempty,flow" json:"LogLevel,omitempty"` - MACs composeyaml.Stringorslice `yaml:"macs,omitempty,flow" json:"MACs,omitempty"` - Match string `yaml:"match,omitempty,flow" json:"Match,omitempty"` - NoHostAuthenticationForLocalhost string `yaml:"nohostauthenticationforlocalhost,omitempty,flow" json:"NoHostAuthenticationForLocalhost,omitempty"` - NumberOfPasswordPrompts string `yaml:"numberofpasswordprompts,omitempty,flow" json:"NumberOfPasswordPrompts,omitempty"` - PasswordAuthentication string `yaml:"passwordauthentication,omitempty,flow" json:"PasswordAuthentication,omitempty"` - PermitLocalCommand string `yaml:"permitlocalcommand,omitempty,flow" json:"PermitLocalCommand,omitempty"` - PKCS11Provider string `yaml:"pkcs11provider,omitempty,flow" json:"PKCS11Provider,omitempty"` - Port string `yaml:"port,omitempty,flow" json:"Port,omitempty"` - PreferredAuthentications string `yaml:"preferredauthentications,omitempty,flow" json:"PreferredAuthentications,omitempty"` - Protocol composeyaml.Stringorslice `yaml:"protocol,omitempty,flow" json:"Protocol,omitempty"` - ProxyJump string `yaml:"proxyjump,omitempty,flow" json:"ProxyJump,omitempty"` - ProxyUseFdpass string `yaml:"proxyusefdpass,omitempty,flow" json:"ProxyUseFdpass,omitempty"` - PubkeyAcceptedAlgorithms string `yaml:"pubkeyacceptedalgorithms,omitempty,flow" json:"PubkeyAcceptedAlgorithms,omitempty"` - PubkeyAcceptedKeyTypes string `yaml:"pubkeyacceptedkeytypes,omitempty,flow" json:"PubkeyAcceptedKeyTypes,omitempty"` - PubkeyAuthentication string `yaml:"pubkeyauthentication,omitempty,flow" json:"PubkeyAuthentication,omitempty"` - RekeyLimit string `yaml:"rekeylimit,omitempty,flow" json:"RekeyLimit,omitempty"` - RemoteForward composeyaml.Stringorslice `yaml:"remoteforward,omitempty,flow" json:"RemoteForward,omitempty"` - RequestTTY string `yaml:"requesttty,omitempty,flow" json:"RequestTTY,omitempty"` - RevokedHostKeys string `yaml:"revokedhostkeys,omitempty,flow" json:"RevokedHostKeys,omitempty"` - RhostsRSAAuthentication string `yaml:"rhostsrsaauthentication,omitempty,flow" json:"RhostsRSAAuthentication,omitempty"` - RSAAuthentication string `yaml:"rsaauthentication,omitempty,flow" json:"RSAAuthentication,omitempty"` - SendEnv composeyaml.Stringorslice `yaml:"sendenv,omitempty,flow" json:"SendEnv,omitempty"` - ServerAliveCountMax int `yaml:"serveralivecountmax,omitempty,flow" json:"ServerAliveCountMax,omitempty"` - ServerAliveInterval int `yaml:"serveraliveinterval,omitempty,flow" json:"ServerAliveInterval,omitempty"` - StreamLocalBindMask string `yaml:"streamlocalbindmask,omitempty,flow" json:"StreamLocalBindMask,omitempty"` - StreamLocalBindUnlink string `yaml:"streamlocalbindunlink,omitempty,flow" json:"StreamLocalBindUnlink,omitempty"` - StrictHostKeyChecking string `yaml:"stricthostkeychecking,omitempty,flow" json:"StrictHostKeyChecking,omitempty"` - TCPKeepAlive string `yaml:"tcpkeepalive,omitempty,flow" json:"TCPKeepAlive,omitempty"` - Tunnel string `yaml:"tunnel,omitempty,flow" json:"Tunnel,omitempty"` - TunnelDevice string `yaml:"tunneldevice,omitempty,flow" json:"TunnelDevice,omitempty"` - UpdateHostKeys string `yaml:"updatehostkeys,omitempty,flow" json:"UpdateHostKeys,omitempty"` - UseKeychain string `yaml:"usekeychain,omitempty,flow" json:"UseKeychain,omitempty"` - UsePrivilegedPort string `yaml:"useprivilegedport,omitempty,flow" json:"UsePrivilegedPort,omitempty"` - User string `yaml:"user,omitempty,flow" json:"User,omitempty"` - UserKnownHostsFile composeyaml.Stringorslice `yaml:"userknownhostsfile,omitempty,flow" json:"UserKnownHostsFile,omitempty"` - VerifyHostKeyDNS string `yaml:"verifyhostkeydns,omitempty,flow" json:"VerifyHostKeyDNS,omitempty"` - VisualHostKey string `yaml:"visualhostkey,omitempty,flow" json:"VisualHostKey,omitempty"` - XAuthLocation string `yaml:"xauthlocation,omitempty,flow" json:"XAuthLocation,omitempty"` + AddKeysToAgent string `yaml:"addkeystoagent,omitempty,flow" json:"AddKeysToAgent,omitempty" passthrough:""` + AddressFamily string `yaml:"addressfamily,omitempty,flow" json:"AddressFamily,omitempty" passthrough:""` + AskPassGUI string `yaml:"askpassgui,omitempty,flow" json:"AskPassGUI,omitempty" passthrough:""` + BatchMode string `yaml:"batchmode,omitempty,flow" json:"BatchMode,omitempty" passthrough:""` + BindAddress string `yaml:"bindaddress,omitempty,flow" json:"BindAddress,omitempty" passthrough:""` + CanonicalDomains string `yaml:"canonicaldomains,omitempty,flow" json:"CanonicalDomains,omitempty" passthrough:""` + CanonicalizeFallbackLocal string `yaml:"canonicalizefallbacklocal,omitempty,flow" json:"CanonicalizeFallbackLocal,omitempty" passthrough:""` + CanonicalizeHostname string `yaml:"canonicalizehostname,omitempty,flow" json:"CanonicalizeHostname,omitempty" passthrough:""` + CanonicalizeMaxDots string `yaml:"canonicalizemaxDots,omitempty,flow" json:"CanonicalizeMaxDots,omitempty" passthrough:""` + CanonicalizePermittedCNAMEs string `yaml:"canonicalizepermittedcnames,omitempty,flow" json:"CanonicalizePermittedCNAMEs,omitempty" passthrough:""` + CASignatureAlgorithms composeyaml.Stringorslice `yaml:"casignaturealgorithms,omitempty,flow" json:"CASignatureAlgorithms,omitempty" passthrough:"joinByComma"` + CertificateFile composeyaml.Stringorslice `yaml:"certificatefile,omitempty,flow" json:"CertificateFile,omitempty" passthrough:"perLine"` + ChallengeResponseAuthentication string `yaml:"challengeresponseauthentication,omitempty,flow" json:"ChallengeResponseAuthentication,omitempty" passthrough:""` + CheckHostIP string `yaml:"checkhostip,omitempty,flow" json:"CheckHostIP,omitempty" passthrough:""` + Cipher string `yaml:"cipher,omitempty,flow" json:"Cipher,omitempty" passthrough:""` + Ciphers composeyaml.Stringorslice `yaml:"ciphers,omitempty,flow" json:"Ciphers,omitempty" passthrough:"joinByComma"` + ClearAllForwardings string `yaml:"clearallforwardings,omitempty,flow" json:"ClearAllForwardings,omitempty" passthrough:""` + Compression string `yaml:"compression,omitempty,flow" json:"Compression,omitempty" passthrough:""` + CompressionLevel int `yaml:"compressionlevel,omitempty,flow" json:"CompressionLevel,omitempty" passthrough:""` + ConnectionAttempts string `yaml:"connectionattempts,omitempty,flow" json:"ConnectionAttempts,omitempty" passthrough:""` + ConnectTimeout int `yaml:"connecttimeout,omitempty,flow" json:"ConnectTimeout,omitempty" passthrough:""` + ControlMaster string `yaml:"controlmaster,omitempty,flow" json:"ControlMaster,omitempty" passthrough:""` + ControlPath string `yaml:"controlpath,omitempty,flow" json:"ControlPath,omitempty" passthrough:""` + ControlPersist string `yaml:"controlpersist,omitempty,flow" json:"ControlPersist,omitempty" passthrough:""` + DynamicForward composeyaml.Stringorslice `yaml:"dynamicforward,omitempty,flow" json:"DynamicForward,omitempty" passthrough:"perLine"` + EnableEscapeCommandline string `yaml:"enableescapecommandline,omitempty,flow" json:"EnableEscapeCommandline,omitempty" passthrough:""` + EnableSSHKeysign string `yaml:"enablesshkeysign,omitempty,flow" json:"EnableSSHKeysign,omitempty" passthrough:""` + EscapeChar string `yaml:"escapechar,omitempty,flow" json:"EscapeChar,omitempty" passthrough:""` + ExitOnForwardFailure string `yaml:"exitonforwardfailure,omitempty,flow" json:"ExitOnForwardFailure,omitempty" passthrough:""` + FingerprintHash string `yaml:"fingerprinthash,omitempty,flow" json:"FingerprintHash,omitempty" passthrough:""` + ForwardAgent string `yaml:"forwardagent,omitempty,flow" json:"ForwardAgent,omitempty" passthrough:""` + ForwardX11 string `yaml:"forwardx11,omitempty,flow" json:"ForwardX11,omitempty" passthrough:""` + ForwardX11Timeout int `yaml:"forwardx11timeout,omitempty,flow" json:"ForwardX11Timeout,omitempty" passthrough:""` + ForwardX11Trusted string `yaml:"forwardx11trusted,omitempty,flow" json:"ForwardX11Trusted,omitempty" passthrough:""` + GatewayPorts string `yaml:"gatewayports,omitempty,flow" json:"GatewayPorts,omitempty" passthrough:""` + GlobalKnownHostsFile composeyaml.Stringorslice `yaml:"globalknownhostsfile,omitempty,flow" json:"GlobalKnownHostsFile,omitempty" passthrough:"joinByComma"` + GSSAPIAuthentication string `yaml:"gssapiauthentication,omitempty,flow" json:"GSSAPIAuthentication,omitempty" passthrough:""` + GSSAPIClientIdentity string `yaml:"gssapiclientidentity,omitempty,flow" json:"GSSAPIClientIdentity,omitempty" passthrough:""` + GSSAPIDelegateCredentials string `yaml:"gssapidelegatecredentials,omitempty,flow" json:"GSSAPIDelegateCredentials,omitempty" passthrough:""` + GSSAPIKeyExchange string `yaml:"gssapikeyexchange,omitempty,flow" json:"GSSAPIKeyExchange,omitempty" passthrough:""` + GSSAPIRenewalForcesRekey string `yaml:"gssapirenewalforcesrekey,omitempty,flow" json:"GSSAPIRenewalForcesRekey,omitempty" passthrough:""` + GSSAPIServerIdentity string `yaml:"gssapiserveridentity,omitempty,flow" json:"GSSAPIServerIdentity,omitempty" passthrough:""` + GSSAPITrustDNS string `yaml:"gssapitrustdns,omitempty,flow" json:"GSSAPITrustDNS,omitempty" passthrough:""` + HashKnownHosts string `yaml:"hashknownhosts,omitempty,flow" json:"HashKnownHosts,omitempty" passthrough:""` + HostbasedAuthentication string `yaml:"hostbasedauthentication,omitempty,flow" json:"HostbasedAuthentication,omitempty" passthrough:""` + HostbasedKeyTypes string `yaml:"hostbasedkeytypes,omitempty,flow" json:"HostbasedKeyTypes,omitempty" passthrough:""` + HostKeyAlgorithms composeyaml.Stringorslice `yaml:"hostkeyalgorithms,omitempty,flow" json:"HostKeyAlgorithms,omitempty" passthrough:"joinByComma"` + HostKeyAlias string `yaml:"hostkeyalias,omitempty,flow" json:"HostKeyAlias,omitempty" passthrough:""` + IdentitiesOnly string `yaml:"identitiesonly,omitempty,flow" json:"IdentitiesOnly,omitempty" passthrough:""` + IdentityAgent string `yaml:"identityagent,omitempty,flow" json:"IdentityAgent,omitempty" passthrough:""` + IdentityFile composeyaml.Stringorslice `yaml:"identityfile,omitempty,flow" json:"IdentityFile,omitempty" passthrough:"perLine"` + IgnoreUnknown string `yaml:"ignoreunknown,omitempty,flow" json:"IgnoreUnknown,omitempty" passthrough:""` + IPQoS composeyaml.Stringorslice `yaml:"ipqos,omitempty,flow" json:"IPQoS,omitempty" passthrough:"joinByComma"` + KbdInteractiveAuthentication string `yaml:"kbdinteractiveauthentication,omitempty,flow" json:"KbdInteractiveAuthentication,omitempty" passthrough:""` + KbdInteractiveDevices composeyaml.Stringorslice `yaml:"kbdinteractivedevices,omitempty,flow" json:"KbdInteractiveDevices,omitempty" passthrough:"joinByComma"` + KexAlgorithms composeyaml.Stringorslice `yaml:"kexalgorithms,omitempty,flow" json:"KexAlgorithms,omitempty" passthrough:"joinByComma"` + KeychainIntegration string `yaml:"keychainintegration,omitempty,flow" json:"KeychainIntegration,omitempty" passthrough:""` + LocalCommand string `yaml:"localcommand,omitempty,flow" json:"LocalCommand,omitempty" passthrough:""` + RemoteCommand string `yaml:"remotecommand,omitempty,flow" json:"RemoteCommand,omitempty" passthrough:""` + LocalForward composeyaml.Stringorslice `yaml:"localforward,omitempty,flow" json:"LocalForward,omitempty" passthrough:"perLine"` + LogLevel string `yaml:"loglevel,omitempty,flow" json:"LogLevel,omitempty" passthrough:""` + MACs composeyaml.Stringorslice `yaml:"macs,omitempty,flow" json:"MACs,omitempty" passthrough:"joinByComma"` + Match string `yaml:"match,omitempty,flow" json:"Match,omitempty" passthrough:""` + NoHostAuthenticationForLocalhost string `yaml:"nohostauthenticationforlocalhost,omitempty,flow" json:"NoHostAuthenticationForLocalhost,omitempty" passthrough:""` + NumberOfPasswordPrompts string `yaml:"numberofpasswordprompts,omitempty,flow" json:"NumberOfPasswordPrompts,omitempty" passthrough:""` + PasswordAuthentication string `yaml:"passwordauthentication,omitempty,flow" json:"PasswordAuthentication,omitempty" passthrough:""` + PermitLocalCommand string `yaml:"permitlocalcommand,omitempty,flow" json:"PermitLocalCommand,omitempty" passthrough:""` + PKCS11Provider string `yaml:"pkcs11provider,omitempty,flow" json:"PKCS11Provider,omitempty" passthrough:""` + Port string `yaml:"port,omitempty,flow" json:"Port,omitempty" passthrough:""` + PreferredAuthentications string `yaml:"preferredauthentications,omitempty,flow" json:"PreferredAuthentications,omitempty" passthrough:""` + Protocol composeyaml.Stringorslice `yaml:"protocol,omitempty,flow" json:"Protocol,omitempty" passthrough:"joinByComma"` + ProxyJump string `yaml:"proxyjump,omitempty,flow" json:"ProxyJump,omitempty" passthrough:""` + ProxyUseFdpass string `yaml:"proxyusefdpass,omitempty,flow" json:"ProxyUseFdpass,omitempty" passthrough:""` + PubkeyAcceptedAlgorithms string `yaml:"pubkeyacceptedalgorithms,omitempty,flow" json:"PubkeyAcceptedAlgorithms,omitempty" passthrough:""` + PubkeyAcceptedKeyTypes string `yaml:"pubkeyacceptedkeytypes,omitempty,flow" json:"PubkeyAcceptedKeyTypes,omitempty" passthrough:""` + PubkeyAuthentication string `yaml:"pubkeyauthentication,omitempty,flow" json:"PubkeyAuthentication,omitempty" passthrough:""` + RekeyLimit string `yaml:"rekeylimit,omitempty,flow" json:"RekeyLimit,omitempty" passthrough:""` + RemoteForward composeyaml.Stringorslice `yaml:"remoteforward,omitempty,flow" json:"RemoteForward,omitempty" passthrough:"perLine"` + RequestTTY string `yaml:"requesttty,omitempty,flow" json:"RequestTTY,omitempty" passthrough:""` + RevokedHostKeys string `yaml:"revokedhostkeys,omitempty,flow" json:"RevokedHostKeys,omitempty" passthrough:""` + RhostsRSAAuthentication string `yaml:"rhostsrsaauthentication,omitempty,flow" json:"RhostsRSAAuthentication,omitempty" passthrough:""` + RSAAuthentication string `yaml:"rsaauthentication,omitempty,flow" json:"RSAAuthentication,omitempty" passthrough:""` + SendEnv composeyaml.Stringorslice `yaml:"sendenv,omitempty,flow" json:"SendEnv,omitempty" passthrough:"perLine"` + ServerAliveCountMax int `yaml:"serveralivecountmax,omitempty,flow" json:"ServerAliveCountMax,omitempty" passthrough:""` + ServerAliveInterval int `yaml:"serveraliveinterval,omitempty,flow" json:"ServerAliveInterval,omitempty" passthrough:""` + StreamLocalBindMask string `yaml:"streamlocalbindmask,omitempty,flow" json:"StreamLocalBindMask,omitempty" passthrough:""` + StreamLocalBindUnlink string `yaml:"streamlocalbindunlink,omitempty,flow" json:"StreamLocalBindUnlink,omitempty" passthrough:""` + StrictHostKeyChecking string `yaml:"stricthostkeychecking,omitempty,flow" json:"StrictHostKeyChecking,omitempty" passthrough:""` + TCPKeepAlive string `yaml:"tcpkeepalive,omitempty,flow" json:"TCPKeepAlive,omitempty" passthrough:""` + Tunnel string `yaml:"tunnel,omitempty,flow" json:"Tunnel,omitempty" passthrough:""` + TunnelDevice string `yaml:"tunneldevice,omitempty,flow" json:"TunnelDevice,omitempty" passthrough:""` + UpdateHostKeys string `yaml:"updatehostkeys,omitempty,flow" json:"UpdateHostKeys,omitempty" passthrough:""` + UseKeychain string `yaml:"usekeychain,omitempty,flow" json:"UseKeychain,omitempty" passthrough:""` + UsePrivilegedPort string `yaml:"useprivilegedport,omitempty,flow" json:"UsePrivilegedPort,omitempty" passthrough:""` + User string `yaml:"user,omitempty,flow" json:"User,omitempty" passthrough:""` + UserKnownHostsFile composeyaml.Stringorslice `yaml:"userknownhostsfile,omitempty,flow" json:"UserKnownHostsFile,omitempty" passthrough:"joinByComma"` + VerifyHostKeyDNS string `yaml:"verifyhostkeydns,omitempty,flow" json:"VerifyHostKeyDNS,omitempty" passthrough:""` + VisualHostKey string `yaml:"visualhostkey,omitempty,flow" json:"VisualHostKey,omitempty" passthrough:""` + XAuthLocation string `yaml:"xauthlocation,omitempty,flow" json:"XAuthLocation,omitempty" passthrough:""` // ssh-config fields with a different behavior HostName string `yaml:"hostname,omitempty,flow" json:"HostName,omitempty"` @@ -237,299 +240,47 @@ func (h *Host) Options() OptionsList { options := make(OptionsList, 0) // ssh-config fields - if h.AddKeysToAgent != "" { - options = append(options, Option{Name: "AddKeysToAgent", Value: h.AddKeysToAgent}) - } - if h.AddressFamily != "" { - options = append(options, Option{Name: "AddressFamily", Value: h.AddressFamily}) - } - if h.AskPassGUI != "" { - options = append(options, Option{Name: "AskPassGUI", Value: h.AskPassGUI}) - } - if h.BatchMode != "" { - options = append(options, Option{Name: "BatchMode", Value: h.BatchMode}) - } - if h.BindAddress != "" { - options = append(options, Option{Name: "BindAddress", Value: h.BindAddress}) - } - if h.CanonicalDomains != "" { - options = append(options, Option{Name: "CanonicalDomains", Value: h.CanonicalDomains}) - } - if h.CanonicalizeFallbackLocal != "" { - options = append(options, Option{Name: "CanonicalizeFallbackLocal", Value: h.CanonicalizeFallbackLocal}) - } - if h.CanonicalizeHostname != "" { - options = append(options, Option{Name: "CanonicalizeHostname", Value: h.CanonicalizeHostname}) - } - if h.CanonicalizeMaxDots != "" { - options = append(options, Option{Name: "CanonicalizeMaxDots", Value: h.CanonicalizeMaxDots}) - } - if h.CanonicalizePermittedCNAMEs != "" { - options = append(options, Option{Name: "CanonicalizePermittedCNAMEs", Value: h.CanonicalizePermittedCNAMEs}) - } - if len(h.CASignatureAlgorithms) > 0 { - options = append(options, Option{Name: "CASignatureAlgorithms", Value: strings.Join(h.CASignatureAlgorithms, ",")}) - } - for _, entry := range h.CertificateFile { - options = append(options, Option{Name: "CertificateFile", Value: entry}) - } - if h.ChallengeResponseAuthentication != "" { - options = append(options, Option{Name: "ChallengeResponseAuthentication", Value: h.ChallengeResponseAuthentication}) - } - if h.CheckHostIP != "" { - options = append(options, Option{Name: "CheckHostIP", Value: h.CheckHostIP}) - } - if h.Cipher != "" { - options = append(options, Option{Name: "Cipher", Value: h.Cipher}) - } - if len(h.Ciphers) > 0 { - options = append(options, Option{Name: "Ciphers", Value: strings.Join(h.Ciphers, ",")}) - } - if h.ClearAllForwardings != "" { - options = append(options, Option{Name: "ClearAllForwardings", Value: h.ClearAllForwardings}) - } - if h.Compression != "" { - options = append(options, Option{Name: "Compression", Value: h.Compression}) - } - if h.CompressionLevel != 0 { - options = append(options, Option{Name: "CompressionLevel", Value: fmt.Sprintf("%d", h.CompressionLevel)}) - } - if h.ConnectionAttempts != "" { - options = append(options, Option{Name: "ConnectionAttempts", Value: h.ConnectionAttempts}) - } - if h.ConnectTimeout != 0 { - options = append(options, Option{Name: "ConnectTimeout", Value: fmt.Sprintf("%d", h.ConnectTimeout)}) - } - if h.ControlMaster != "" { - options = append(options, Option{Name: "ControlMaster", Value: h.ControlMaster}) - } - if h.ControlPath != "" { - options = append(options, Option{Name: "ControlPath", Value: h.ControlPath}) - } - if h.ControlPersist != "" { - options = append(options, Option{Name: "ControlPersist", Value: h.ControlPersist}) - } - for _, entry := range h.DynamicForward { - options = append(options, Option{Name: "DynamicForward", Value: entry}) - } - if h.EnableSSHKeysign != "" { - options = append(options, Option{Name: "EnableSSHKeysign", Value: h.EnableSSHKeysign}) - } - if h.EscapeChar != "" { - options = append(options, Option{Name: "EscapeChar", Value: h.EscapeChar}) - } - if h.ExitOnForwardFailure != "" { - options = append(options, Option{Name: "ExitOnForwardFailure", Value: h.ExitOnForwardFailure}) - } - if h.FingerprintHash != "" { - options = append(options, Option{Name: "FingerprintHash", Value: h.FingerprintHash}) - } - if h.ForwardAgent != "" { - options = append(options, Option{Name: "ForwardAgent", Value: h.ForwardAgent}) - } - if h.ForwardX11 != "" { - options = append(options, Option{Name: "ForwardX11", Value: h.ForwardX11}) - } - if h.ForwardX11Timeout != 0 { - options = append(options, Option{Name: "ForwardX11Timeout", Value: fmt.Sprintf("%d", h.ForwardX11Timeout)}) - } - if h.ForwardX11Trusted != "" { - options = append(options, Option{Name: "ForwardX11Trusted", Value: h.ForwardX11Trusted}) - } - if h.GatewayPorts != "" { - options = append(options, Option{Name: "GatewayPorts", Value: h.GatewayPorts}) - } - if len(h.GlobalKnownHostsFile) > 0 { - options = append(options, Option{Name: "GlobalKnownHostsFile", Value: strings.Join(h.GlobalKnownHostsFile, " ")}) - } - if h.GSSAPIAuthentication != "" { - options = append(options, Option{Name: "GSSAPIAuthentication", Value: h.GSSAPIAuthentication}) - } - if h.GSSAPIClientIdentity != "" { - options = append(options, Option{Name: "GSSAPIClientIdentity", Value: h.GSSAPIClientIdentity}) - } - if h.GSSAPIDelegateCredentials != "" { - options = append(options, Option{Name: "GSSAPIDelegateCredentials", Value: h.GSSAPIDelegateCredentials}) - } - if h.GSSAPIKeyExchange != "" { - options = append(options, Option{Name: "GSSAPIKeyExchange", Value: h.GSSAPIKeyExchange}) - } - if h.GSSAPIRenewalForcesRekey != "" { - options = append(options, Option{Name: "GSSAPIRenewalForcesRekey", Value: h.GSSAPIRenewalForcesRekey}) - } - if h.GSSAPIServerIdentity != "" { - options = append(options, Option{Name: "GSSAPIServerIdentity", Value: h.GSSAPIServerIdentity}) - } - if h.GSSAPITrustDNS != "" { - options = append(options, Option{Name: "GSSAPITrustDNS", Value: h.GSSAPITrustDNS}) - } - if h.HashKnownHosts != "" { - options = append(options, Option{Name: "HashKnownHosts", Value: h.HashKnownHosts}) - } - if h.HostbasedAuthentication != "" { - options = append(options, Option{Name: "HostbasedAuthentication", Value: h.HostbasedAuthentication}) - } - if h.HostbasedKeyTypes != "" { - options = append(options, Option{Name: "HostbasedKeyTypes", Value: h.HostbasedKeyTypes}) - } - if len(h.HostKeyAlgorithms) > 0 { - options = append(options, Option{Name: "HostKeyAlgorithms", Value: strings.Join(h.HostKeyAlgorithms, ",")}) - } - if h.HostKeyAlias != "" { - options = append(options, Option{Name: "HostKeyAlias", Value: h.HostKeyAlias}) - } - if h.IdentitiesOnly != "" { - options = append(options, Option{Name: "IdentitiesOnly", Value: h.IdentitiesOnly}) - } - if h.IdentityAgent != "" { - options = append(options, Option{Name: "IdentityAgent", Value: h.IdentityAgent}) - } - for _, entry := range h.IdentityFile { - options = append(options, Option{Name: "IdentityFile", Value: entry}) - } - if h.IgnoreUnknown != "" { - options = append(options, Option{Name: "IgnoreUnknown", Value: h.IgnoreUnknown}) - } - if len(h.IPQoS) > 0 { - options = append(options, Option{Name: "IPQoS", Value: strings.Join(h.IPQoS, " ")}) - } - if h.KbdInteractiveAuthentication != "" { - options = append(options, Option{Name: "KbdInteractiveAuthentication", Value: h.KbdInteractiveAuthentication}) - } - if len(h.KbdInteractiveDevices) > 0 { - options = append(options, Option{Name: "KbdInteractiveDevices", Value: strings.Join(h.KbdInteractiveDevices, ",")}) - } - if len(h.KexAlgorithms) > 0 { - options = append(options, Option{Name: "KexAlgorithms", Value: strings.Join(h.KexAlgorithms, ",")}) - } - if h.KeychainIntegration != "" { - options = append(options, Option{Name: "KeychainIntegration", Value: h.KeychainIntegration}) - } - if h.LocalCommand != "" { - options = append(options, Option{Name: "LocalCommand", Value: h.LocalCommand}) - } - if h.RemoteCommand != "" { - options = append(options, Option{Name: "RemoteCommand", Value: h.RemoteCommand}) - } - for _, entry := range h.LocalForward { - options = append(options, Option{Name: "LocalForward", Value: entry}) - } - if h.LogLevel != "" { - options = append(options, Option{Name: "LogLevel", Value: h.LogLevel}) - } - if len(h.MACs) > 0 { - options = append(options, Option{Name: "MACs", Value: strings.Join(h.MACs, ",")}) - } - if h.Match != "" { - options = append(options, Option{Name: "Match", Value: h.Match}) - } - if h.NoHostAuthenticationForLocalhost != "" { - options = append(options, Option{Name: "NoHostAuthenticationForLocalhost", Value: h.NoHostAuthenticationForLocalhost}) - } - if h.NumberOfPasswordPrompts != "" { - options = append(options, Option{Name: "NumberOfPasswordPrompts", Value: h.NumberOfPasswordPrompts}) - } - if h.PasswordAuthentication != "" { - options = append(options, Option{Name: "PasswordAuthentication", Value: h.PasswordAuthentication}) - } - if h.PermitLocalCommand != "" { - options = append(options, Option{Name: "PermitLocalCommand", Value: h.PermitLocalCommand}) - } - if h.PKCS11Provider != "" { - options = append(options, Option{Name: "PKCS11Provider", Value: h.PKCS11Provider}) - } - if h.Port != "" { - options = append(options, Option{Name: "Port", Value: h.Port}) - } - if h.PreferredAuthentications != "" { - options = append(options, Option{Name: "PreferredAuthentications", Value: h.PreferredAuthentications}) - } - if len(h.Protocol) > 0 { - options = append(options, Option{Name: "Protocol", Value: strings.Join(h.Protocol, ",")}) - } - if h.ProxyJump != "" { - options = append(options, Option{Name: "ProxyJump", Value: h.ProxyJump}) - } - if h.ProxyUseFdpass != "" { - options = append(options, Option{Name: "ProxyUseFdpass", Value: h.ProxyUseFdpass}) - } - if h.PubkeyAcceptedAlgorithms != "" { - options = append(options, Option{Name: "PubkeyAcceptedAlgorithms", Value: h.PubkeyAcceptedAlgorithms}) - } - if h.PubkeyAcceptedKeyTypes != "" { - options = append(options, Option{Name: "PubkeyAcceptedKeyTypes", Value: h.PubkeyAcceptedKeyTypes}) - } - if h.PubkeyAuthentication != "" { - options = append(options, Option{Name: "PubkeyAuthentication", Value: h.PubkeyAuthentication}) - } - if h.RekeyLimit != "" { - options = append(options, Option{Name: "RekeyLimit", Value: h.RekeyLimit}) - } - for _, entry := range h.RemoteForward { - options = append(options, Option{Name: "RemoteForward", Value: entry}) - } - if h.RequestTTY != "" { - options = append(options, Option{Name: "RequestTTY", Value: h.RequestTTY}) - } - if h.RevokedHostKeys != "" { - options = append(options, Option{Name: "RevokedHostKeys", Value: h.RevokedHostKeys}) - } - if h.RhostsRSAAuthentication != "" { - options = append(options, Option{Name: "RhostsRSAAuthentication", Value: h.RhostsRSAAuthentication}) - } - if h.RSAAuthentication != "" { - options = append(options, Option{Name: "RSAAuthentication", Value: h.RSAAuthentication}) - } - for _, entry := range h.SendEnv { - options = append(options, Option{Name: "SendEnv", Value: entry}) - } - if h.ServerAliveCountMax != 0 { - options = append(options, Option{Name: "ServerAliveCountMax", Value: fmt.Sprintf("%d", h.ServerAliveCountMax)}) - } - if h.ServerAliveInterval != 0 { - options = append(options, Option{Name: "ServerAliveInterval", Value: fmt.Sprintf("%d", h.ServerAliveInterval)}) - } - if h.StreamLocalBindMask != "" { - options = append(options, Option{Name: "StreamLocalBindMask", Value: h.StreamLocalBindMask}) - } - if h.StreamLocalBindUnlink != "" { - options = append(options, Option{Name: "StreamLocalBindUnlink", Value: h.StreamLocalBindUnlink}) - } - if h.StrictHostKeyChecking != "" { - options = append(options, Option{Name: "StrictHostKeyChecking", Value: h.StrictHostKeyChecking}) - } - if h.TCPKeepAlive != "" { - options = append(options, Option{Name: "TCPKeepAlive", Value: h.TCPKeepAlive}) - } - if h.Tunnel != "" { - options = append(options, Option{Name: "Tunnel", Value: h.Tunnel}) - } - if h.TunnelDevice != "" { - options = append(options, Option{Name: "TunnelDevice", Value: h.TunnelDevice}) - } - if h.UpdateHostKeys != "" { - options = append(options, Option{Name: "UpdateHostKeys", Value: h.UpdateHostKeys}) - } - if h.UseKeychain != "" { - options = append(options, Option{Name: "UseKeychain", Value: h.UseKeychain}) - } - if h.UsePrivilegedPort != "" { - options = append(options, Option{Name: "UsePrivilegedPort", Value: h.UsePrivilegedPort}) - } - if h.User != "" { - options = append(options, Option{Name: "User", Value: h.User}) - } - if len(h.UserKnownHostsFile) > 0 { - options = append(options, Option{Name: "UserKnownHostsFile", Value: strings.Join(h.UserKnownHostsFile, " ")}) - } - if h.VerifyHostKeyDNS != "" { - options = append(options, Option{Name: "VerifyHostKeyDNS", Value: h.VerifyHostKeyDNS}) - } - if h.VisualHostKey != "" { - options = append(options, Option{Name: "VisualHostKey", Value: h.VisualHostKey}) - } - if h.XAuthLocation != "" { - options = append(options, Option{Name: "XAuthLocation", Value: h.XAuthLocation}) + + hostReflect := reflect.ValueOf(h).Elem() + hostTypeReflect := reflect.TypeOf(h).Elem() + + // go through each field in Host. If 'passthrough' tag exists, process it. + for i := 0; i < hostReflect.NumField(); i++ { + field := hostReflect.Field(i) + fieldType := hostTypeReflect.Field(i) + + fieldName := fieldType.Name + passthroughTag, found := fieldType.Tag.Lookup("passthrough") + if !found { + continue + } + + switch field.Type().Kind() { + case reflect.String: + if fieldVal := field.String(); fieldVal == "" { + options = append(options, Option{Name: fieldName, Value: fieldVal}) + } + case reflect.Int: + if fieldVal := field.Int(); fieldVal != 0 { + options = append(options, Option{Name: fieldName, Value: fmt.Sprintf("%d", fieldVal)}) + } + case reflect.TypeOf(composeyaml.Stringorslice(nil)).Kind(): + fieldVal := field.Interface().(composeyaml.Stringorslice) + + if passthroughTag == "joinByComma" { + if len(fieldVal) > 0 { + options = append(options, Option{Name: fieldName, Value: strings.Join(fieldVal, " ")}) + } + } else if passthroughTag == "perLine" { + for _, entry := range fieldVal { + options = append(options, Option{Name: fieldName, Value: entry}) + } + } else { + panic(fmt.Sprintf("Undefined Range type for field '%s'.\nIt must contains either of the following value: [ joinByComma, perLine ]", fieldName)) + } + default: + panic(fmt.Sprintf("Unimplemented datatype '%s' for field '%s'", field.Type(), fieldName)) + } } // ssh-config fields with a different behavior @@ -571,507 +322,56 @@ func (h *Host) prepare() { // ApplyDefaults ensures a Host is valid by filling the missing fields with defaults // nolint:gocyclo func (h *Host) ApplyDefaults(defaults *Host) { - // ssh-config fields - if h.AddKeysToAgent == "" { - h.AddKeysToAgent = defaults.AddKeysToAgent - } - h.AddKeysToAgent = utils.ExpandField(h.AddKeysToAgent) - - if h.AddressFamily == "" { - h.AddressFamily = defaults.AddressFamily - } - h.AddressFamily = utils.ExpandField(h.AddressFamily) - - if h.AskPassGUI == "" { - h.AskPassGUI = defaults.AskPassGUI - } - h.AskPassGUI = utils.ExpandField(h.AskPassGUI) - - if h.BatchMode == "" { - h.BatchMode = defaults.BatchMode - } - h.BatchMode = utils.ExpandField(h.BatchMode) - - if h.BindAddress == "" { - h.BindAddress = defaults.BindAddress - } - h.BindAddress = utils.ExpandField(h.BindAddress) - - if h.CanonicalDomains == "" { - h.CanonicalDomains = defaults.CanonicalDomains - } - h.CanonicalDomains = utils.ExpandField(h.CanonicalDomains) - - if h.CanonicalizeFallbackLocal == "" { - h.CanonicalizeFallbackLocal = defaults.CanonicalizeFallbackLocal - } - h.CanonicalizeFallbackLocal = utils.ExpandField(h.CanonicalizeFallbackLocal) - - if h.CanonicalizeHostname == "" { - h.CanonicalizeHostname = defaults.CanonicalizeHostname - } - h.CanonicalizeHostname = utils.ExpandField(h.CanonicalizeHostname) - - if h.CanonicalizeMaxDots == "" { - h.CanonicalizeMaxDots = defaults.CanonicalizeMaxDots - } - h.CanonicalizeMaxDots = utils.ExpandField(h.CanonicalizeMaxDots) - - if h.CanonicalizePermittedCNAMEs == "" { - h.CanonicalizePermittedCNAMEs = defaults.CanonicalizePermittedCNAMEs - } - h.CanonicalizePermittedCNAMEs = utils.ExpandField(h.CanonicalizePermittedCNAMEs) - - if len(h.CASignatureAlgorithms) == 0 { - h.CASignatureAlgorithms = defaults.CASignatureAlgorithms - } - h.CASignatureAlgorithms = utils.ExpandSliceField(h.CASignatureAlgorithms) - - if len(h.CertificateFile) == 0 { - h.CertificateFile = defaults.CertificateFile - } - h.CertificateFile = utils.ExpandSliceField(h.CertificateFile) - - if h.ChallengeResponseAuthentication == "" { - h.ChallengeResponseAuthentication = defaults.ChallengeResponseAuthentication - } - h.ChallengeResponseAuthentication = utils.ExpandField(h.ChallengeResponseAuthentication) - - if h.CheckHostIP == "" { - h.CheckHostIP = defaults.CheckHostIP - } - h.CheckHostIP = utils.ExpandField(h.CheckHostIP) - - if h.Cipher == "" { - h.Cipher = defaults.Cipher - } - h.Cipher = utils.ExpandField(h.Cipher) - - if len(h.Ciphers) == 0 { - h.Ciphers = defaults.Ciphers - } - h.Ciphers = utils.ExpandSliceField(h.Ciphers) - - if h.ClearAllForwardings == "" { - h.ClearAllForwardings = defaults.ClearAllForwardings - } - h.ClearAllForwardings = utils.ExpandField(h.ClearAllForwardings) - - if h.Compression == "" { - h.Compression = defaults.Compression - } - h.Compression = utils.ExpandField(h.Compression) - - if h.CompressionLevel == 0 { - h.CompressionLevel = defaults.CompressionLevel - } - // h.CompressionLevel = utils.ExpandField(h.CompressionLevel) - - if h.ConnectionAttempts == "" { - h.ConnectionAttempts = defaults.ConnectionAttempts - } - h.ConnectionAttempts = utils.ExpandField(h.ConnectionAttempts) - - if h.ConnectTimeout == 0 { - h.ConnectTimeout = defaults.ConnectTimeout - } - // h.ConnectTimeout = utils.ExpandField(h.ConnectTimeout) - - if h.ControlMaster == "" { - h.ControlMaster = defaults.ControlMaster - } - h.ControlMaster = utils.ExpandField(h.ControlMaster) - - if h.ControlPath == "" { - h.ControlPath = defaults.ControlPath - } - h.ControlPath = utils.ExpandField(h.ControlPath) - - if h.ControlPersist == "" { - h.ControlPersist = defaults.ControlPersist - } - h.ControlPersist = utils.ExpandField(h.ControlPersist) - - if len(h.DynamicForward) == 0 { - h.DynamicForward = defaults.DynamicForward - } - h.DynamicForward = utils.ExpandSliceField(h.DynamicForward) - - if h.EnableSSHKeysign == "" { - h.EnableSSHKeysign = defaults.EnableSSHKeysign - } - h.EnableSSHKeysign = utils.ExpandField(h.EnableSSHKeysign) - - if h.EscapeChar == "" { - h.EscapeChar = defaults.EscapeChar - } - h.EscapeChar = utils.ExpandField(h.EscapeChar) - - if h.ExitOnForwardFailure == "" { - h.ExitOnForwardFailure = defaults.ExitOnForwardFailure - } - h.ExitOnForwardFailure = utils.ExpandField(h.ExitOnForwardFailure) - - if h.FingerprintHash == "" { - h.FingerprintHash = defaults.FingerprintHash - } - h.FingerprintHash = utils.ExpandField(h.FingerprintHash) - - if h.ForwardAgent == "" { - h.ForwardAgent = defaults.ForwardAgent - } - h.ForwardAgent = utils.ExpandField(h.ForwardAgent) - if h.ForwardX11 == "" { - h.ForwardX11 = defaults.ForwardX11 - } - h.ForwardX11 = utils.ExpandField(h.ForwardX11) - - if h.ForwardX11Timeout == 0 { - h.ForwardX11Timeout = defaults.ForwardX11Timeout - } - // h.ForwardX11Timeout = utils.ExpandField(h.ForwardX11Timeout) - - if h.ForwardX11Trusted == "" { - h.ForwardX11Trusted = defaults.ForwardX11Trusted - } - h.ForwardX11Trusted = utils.ExpandField(h.ForwardX11Trusted) - - if h.GatewayPorts == "" { - h.GatewayPorts = defaults.GatewayPorts - } - h.GatewayPorts = utils.ExpandField(h.GatewayPorts) - - if len(h.GlobalKnownHostsFile) == 0 { - h.GlobalKnownHostsFile = defaults.GlobalKnownHostsFile - } - h.GlobalKnownHostsFile = utils.ExpandSliceField(h.GlobalKnownHostsFile) - - if h.GSSAPIAuthentication == "" { - h.GSSAPIAuthentication = defaults.GSSAPIAuthentication - } - h.GSSAPIAuthentication = utils.ExpandField(h.GSSAPIAuthentication) - - if h.GSSAPIClientIdentity == "" { - h.GSSAPIClientIdentity = defaults.GSSAPIClientIdentity - } - h.GSSAPIClientIdentity = utils.ExpandField(h.GSSAPIClientIdentity) - - if h.GSSAPIDelegateCredentials == "" { - h.GSSAPIDelegateCredentials = defaults.GSSAPIDelegateCredentials - } - h.GSSAPIDelegateCredentials = utils.ExpandField(h.GSSAPIDelegateCredentials) - - if h.GSSAPIKeyExchange == "" { - h.GSSAPIKeyExchange = defaults.GSSAPIKeyExchange - } - h.GSSAPIKeyExchange = utils.ExpandField(h.GSSAPIKeyExchange) + // ssh-config fields + hostReflect := reflect.ValueOf(h).Elem() + hostTypeReflect := reflect.TypeOf(h).Elem() - if h.GSSAPIRenewalForcesRekey == "" { - h.GSSAPIRenewalForcesRekey = defaults.GSSAPIRenewalForcesRekey - } - h.GSSAPIRenewalForcesRekey = utils.ExpandField(h.GSSAPIRenewalForcesRekey) + defaultsReflecet := reflect.ValueOf(defaults).Elem() - if h.GSSAPIServerIdentity == "" { - h.GSSAPIServerIdentity = defaults.GSSAPIServerIdentity - } - h.GSSAPIServerIdentity = utils.ExpandField(h.GSSAPIServerIdentity) + // go through each field in Host. If 'passthrough' tag exists, process it. + for i := 0; i < hostReflect.NumField(); i++ { + field := hostReflect.Field(i) + fieldType := hostTypeReflect.Field(i) - if h.GSSAPITrustDNS == "" { - h.GSSAPITrustDNS = defaults.GSSAPITrustDNS - } - h.GSSAPITrustDNS = utils.ExpandField(h.GSSAPITrustDNS) - - if h.HashKnownHosts == "" { - h.HashKnownHosts = defaults.HashKnownHosts - } - h.HashKnownHosts = utils.ExpandField(h.HashKnownHosts) + fieldName := fieldType.Name + _, found := fieldType.Tag.Lookup("passthrough") + if !found { + continue + } - if h.HostbasedAuthentication == "" { - h.HostbasedAuthentication = defaults.HostbasedAuthentication - } - h.HostbasedAuthentication = utils.ExpandField(h.HostbasedAuthentication) + switch field.Type().Kind() { + case reflect.String: + fieldVal := field.String() - if h.HostbasedKeyTypes == "" { - h.HostbasedKeyTypes = defaults.HostbasedKeyTypes - } - h.HostbasedKeyTypes = utils.ExpandField(h.HostbasedKeyTypes) + if fieldVal == "" { + fieldVal = defaultsReflecet.FieldByName(fieldName).String() + } + field.SetString(utils.ExpandField(fieldVal)) + case reflect.Int: + fieldVal := field.Int() - if len(h.HostKeyAlgorithms) == 0 { - h.HostKeyAlgorithms = defaults.HostKeyAlgorithms - } - h.HostKeyAlgorithms = utils.ExpandSliceField(h.HostKeyAlgorithms) + if fieldVal == 0 { + field.SetInt(defaultsReflecet.FieldByName(fieldName).Int()) + } + case reflect.TypeOf(composeyaml.Stringorslice(nil)).Kind(): + fieldVal := field.Interface().(composeyaml.Stringorslice) - if h.HostKeyAlias == "" { - h.HostKeyAlias = defaults.HostKeyAlias + if len(fieldVal) == 0 { + fieldVal = defaultsReflecet.FieldByName(fieldName).Interface().(composeyaml.Stringorslice) + } + field.Set(reflect.ValueOf(utils.ExpandSliceField(fieldVal)).Convert(field.Type())) + default: + panic(fmt.Sprintf("Unimplemented datatype '%s' for field '%s'", field.Type(), fieldName)) + } } - h.HostKeyAlias = utils.ExpandField(h.HostKeyAlias) + // ssh-config fields with a different behavior if h.HostName == "" { h.HostName = defaults.HostName } h.HostName = utils.ExpandField(h.HostName) - if h.IdentitiesOnly == "" { - h.IdentitiesOnly = defaults.IdentitiesOnly - } - h.IdentitiesOnly = utils.ExpandField(h.IdentitiesOnly) - - if h.IdentityAgent == "" { - h.IdentityAgent = defaults.IdentityAgent - } - h.IdentityAgent = utils.ExpandField(h.IdentityAgent) - - if len(h.IdentityFile) == 0 { - h.IdentityFile = defaults.IdentityFile - } - h.IdentityFile = utils.ExpandSliceField(h.IdentityFile) - - if h.IgnoreUnknown == "" { - h.IgnoreUnknown = defaults.IgnoreUnknown - } - h.IgnoreUnknown = utils.ExpandField(h.IgnoreUnknown) - - if len(h.IPQoS) == 0 { - h.IPQoS = defaults.IPQoS - } - h.IPQoS = utils.ExpandSliceField(h.IPQoS) - - if h.KbdInteractiveAuthentication == "" { - h.KbdInteractiveAuthentication = defaults.KbdInteractiveAuthentication - } - h.KbdInteractiveAuthentication = utils.ExpandField(h.KbdInteractiveAuthentication) - - if len(h.KbdInteractiveDevices) == 0 { - h.KbdInteractiveDevices = defaults.KbdInteractiveDevices - } - h.KbdInteractiveDevices = utils.ExpandSliceField(h.KbdInteractiveDevices) - - if len(h.KexAlgorithms) == 0 { - h.KexAlgorithms = defaults.KexAlgorithms - } - h.KexAlgorithms = utils.ExpandSliceField(h.KexAlgorithms) - - if h.KeychainIntegration == "" { - h.KeychainIntegration = defaults.KeychainIntegration - } - h.KeychainIntegration = utils.ExpandField(h.KeychainIntegration) - - if h.LocalCommand == "" { - h.LocalCommand = defaults.LocalCommand - } - h.LocalCommand = utils.ExpandField(h.LocalCommand) - if h.RemoteCommand == "" { - h.RemoteCommand = defaults.RemoteCommand - } - h.RemoteCommand = utils.ExpandField(h.RemoteCommand) - - if len(h.LocalForward) == 0 { - h.LocalForward = defaults.LocalForward - } - h.LocalForward = utils.ExpandSliceField(h.LocalForward) - - if h.LogLevel == "" { - h.LogLevel = defaults.LogLevel - } - h.LogLevel = utils.ExpandField(h.LogLevel) - - if len(h.MACs) == 0 { - h.MACs = defaults.MACs - } - h.MACs = utils.ExpandSliceField(h.MACs) - - if h.Match == "" { - h.Match = defaults.Match - } - h.Match = utils.ExpandField(h.Match) - - if h.NoHostAuthenticationForLocalhost == "" { - h.NoHostAuthenticationForLocalhost = defaults.NoHostAuthenticationForLocalhost - } - h.NoHostAuthenticationForLocalhost = utils.ExpandField(h.NoHostAuthenticationForLocalhost) - - if h.NumberOfPasswordPrompts == "" { - h.NumberOfPasswordPrompts = defaults.NumberOfPasswordPrompts - } - h.NumberOfPasswordPrompts = utils.ExpandField(h.NumberOfPasswordPrompts) - - if h.PasswordAuthentication == "" { - h.PasswordAuthentication = defaults.PasswordAuthentication - } - h.PasswordAuthentication = utils.ExpandField(h.PasswordAuthentication) - - if h.PermitLocalCommand == "" { - h.PermitLocalCommand = defaults.PermitLocalCommand - } - h.PermitLocalCommand = utils.ExpandField(h.PermitLocalCommand) - - if h.PKCS11Provider == "" { - h.PKCS11Provider = defaults.PKCS11Provider - } - h.PKCS11Provider = utils.ExpandField(h.PKCS11Provider) - - if h.Port == "" { - h.Port = defaults.Port - } - h.Port = utils.ExpandField(h.Port) - - if h.PreferredAuthentications == "" { - h.PreferredAuthentications = defaults.PreferredAuthentications - } - h.PreferredAuthentications = utils.ExpandField(h.PreferredAuthentications) - - if len(h.Protocol) == 0 { - h.Protocol = defaults.Protocol - } - h.Protocol = utils.ExpandSliceField(h.Protocol) - - if h.ProxyCommand == "" { - h.ProxyCommand = defaults.ProxyCommand - } - h.ProxyCommand = utils.ExpandField(h.ProxyCommand) - - if h.ProxyJump == "" { - h.ProxyJump = defaults.ProxyJump - } - h.ProxyJump = utils.ExpandField(h.ProxyJump) - - if h.ProxyUseFdpass == "" { - h.ProxyUseFdpass = defaults.ProxyUseFdpass - } - h.ProxyUseFdpass = utils.ExpandField(h.ProxyUseFdpass) - - if h.PubkeyAcceptedAlgorithms == "" { - h.PubkeyAcceptedAlgorithms = defaults.PubkeyAcceptedAlgorithms - } - h.PubkeyAcceptedAlgorithms = utils.ExpandField(h.PubkeyAcceptedAlgorithms) - - if h.PubkeyAcceptedKeyTypes == "" { - h.PubkeyAcceptedKeyTypes = defaults.PubkeyAcceptedKeyTypes - } - h.PubkeyAcceptedKeyTypes = utils.ExpandField(h.PubkeyAcceptedKeyTypes) - - if h.PubkeyAuthentication == "" { - h.PubkeyAuthentication = defaults.PubkeyAuthentication - } - h.PubkeyAuthentication = utils.ExpandField(h.PubkeyAuthentication) - - if h.RekeyLimit == "" { - h.RekeyLimit = defaults.RekeyLimit - } - h.RekeyLimit = utils.ExpandField(h.RekeyLimit) - - if len(h.RemoteForward) == 0 { - h.RemoteForward = defaults.RemoteForward - } - h.RemoteForward = utils.ExpandSliceField(h.RemoteForward) - - if h.RequestTTY == "" { - h.RequestTTY = defaults.RequestTTY - } - h.RequestTTY = utils.ExpandField(h.RequestTTY) - - if h.RevokedHostKeys == "" { - h.RevokedHostKeys = defaults.RevokedHostKeys - } - h.RevokedHostKeys = utils.ExpandField(h.RevokedHostKeys) - - if h.RhostsRSAAuthentication == "" { - h.RhostsRSAAuthentication = defaults.RhostsRSAAuthentication - } - h.RhostsRSAAuthentication = utils.ExpandField(h.RhostsRSAAuthentication) - - if h.RSAAuthentication == "" { - h.RSAAuthentication = defaults.RSAAuthentication - } - h.RSAAuthentication = utils.ExpandField(h.RSAAuthentication) - - if len(h.SendEnv) == 0 { - h.SendEnv = defaults.SendEnv - } - h.SendEnv = utils.ExpandSliceField(h.SendEnv) - - if h.ServerAliveCountMax == 0 { - h.ServerAliveCountMax = defaults.ServerAliveCountMax - } - // h.ServerAliveCountMax = utils.ExpandField(h.ServerAliveCountMax) - - if h.ServerAliveInterval == 0 { - h.ServerAliveInterval = defaults.ServerAliveInterval - } - // h.ServerAliveInterval = utils.ExpandField(h.ServerAliveInterval) - - if h.StreamLocalBindMask == "" { - h.StreamLocalBindMask = defaults.StreamLocalBindMask - } - h.StreamLocalBindMask = utils.ExpandField(h.StreamLocalBindMask) - - if h.StreamLocalBindUnlink == "" { - h.StreamLocalBindUnlink = defaults.StreamLocalBindUnlink - } - h.StreamLocalBindUnlink = utils.ExpandField(h.StreamLocalBindUnlink) - - if h.StrictHostKeyChecking == "" { - h.StrictHostKeyChecking = defaults.StrictHostKeyChecking - } - h.StrictHostKeyChecking = utils.ExpandField(h.StrictHostKeyChecking) - - if h.TCPKeepAlive == "" { - h.TCPKeepAlive = defaults.TCPKeepAlive - } - h.TCPKeepAlive = utils.ExpandField(h.TCPKeepAlive) - - if h.Tunnel == "" { - h.Tunnel = defaults.Tunnel - } - h.Tunnel = utils.ExpandField(h.Tunnel) - - if h.TunnelDevice == "" { - h.TunnelDevice = defaults.TunnelDevice - } - h.TunnelDevice = utils.ExpandField(h.TunnelDevice) - - if h.UpdateHostKeys == "" { - h.UpdateHostKeys = defaults.UpdateHostKeys - } - h.UpdateHostKeys = utils.ExpandField(h.UpdateHostKeys) - - if h.UseKeychain == "" { - h.UseKeychain = defaults.UseKeychain - } - h.UseKeychain = utils.ExpandField(h.UseKeychain) - - if h.UsePrivilegedPort == "" { - h.UsePrivilegedPort = defaults.UsePrivilegedPort - } - h.UsePrivilegedPort = utils.ExpandField(h.UsePrivilegedPort) - - if h.User == "" { - h.User = defaults.User - } - h.User = utils.ExpandField(h.User) - - if len(h.UserKnownHostsFile) == 0 { - h.UserKnownHostsFile = defaults.UserKnownHostsFile - } - h.UserKnownHostsFile = utils.ExpandSliceField(h.UserKnownHostsFile) - - if h.VerifyHostKeyDNS == "" { - h.VerifyHostKeyDNS = defaults.VerifyHostKeyDNS - } - h.VerifyHostKeyDNS = utils.ExpandField(h.VerifyHostKeyDNS) - - if h.VisualHostKey == "" { - h.VisualHostKey = defaults.VisualHostKey - } - h.VisualHostKey = utils.ExpandField(h.VisualHostKey) - - if h.XAuthLocation == "" { - h.XAuthLocation = defaults.XAuthLocation - } - h.XAuthLocation = utils.ExpandField(h.XAuthLocation) - - // ssh-config fields with a different behavior if h.ProxyCommand == "" { h.ProxyCommand = defaults.ProxyCommand } @@ -1159,300 +459,48 @@ func (h *Host) WriteSSHConfigTo(w io.Writer) error { _, _ = fmt.Fprintf(w, "Host %s\n", alias) - // ssh-config fields - if h.AddKeysToAgent != "" { - _, _ = fmt.Fprintf(w, " AddKeysToAgent %s\n", h.AddKeysToAgent) - } - if h.AddressFamily != "" { - _, _ = fmt.Fprintf(w, " AddressFamily %s\n", h.AddressFamily) - } - if h.AskPassGUI != "" { - _, _ = fmt.Fprintf(w, " AskPassGUI %s\n", h.AskPassGUI) - } - if h.BatchMode != "" { - _, _ = fmt.Fprintf(w, " BatchMode %s\n", h.BatchMode) - } - if h.BindAddress != "" { - _, _ = fmt.Fprintf(w, " BindAddress %s\n", h.BindAddress) - } - if h.CanonicalDomains != "" { - _, _ = fmt.Fprintf(w, " CanonicalDomains %s\n", h.CanonicalDomains) - } - if h.CanonicalizeFallbackLocal != "" { - _, _ = fmt.Fprintf(w, " CanonicalizeFallbackLocal %s\n", h.CanonicalizeFallbackLocal) - } - if h.CanonicalizeHostname != "" { - _, _ = fmt.Fprintf(w, " CanonicalizeHostname %s\n", h.CanonicalizeHostname) - } - if h.CanonicalizeMaxDots != "" { - _, _ = fmt.Fprintf(w, " CanonicalizeMaxDots %s\n", h.CanonicalizeMaxDots) - } - if h.CanonicalizePermittedCNAMEs != "" { - _, _ = fmt.Fprintf(w, " CanonicalizePermittedCNAMEs %s\n", h.CanonicalizePermittedCNAMEs) - } - if len(h.CASignatureAlgorithms) > 0 { - _, _ = fmt.Fprintf(w, " CASignatureAlgorithms %s\n", strings.Join(h.CASignatureAlgorithms, ",")) - } - for _, entry := range h.CertificateFile { - _, _ = fmt.Fprintf(w, " CertificateFile %s\n", entry) - } - if h.ChallengeResponseAuthentication != "" { - _, _ = fmt.Fprintf(w, " ChallengeResponseAuthentication %s\n", h.ChallengeResponseAuthentication) - } - if h.CheckHostIP != "" { - _, _ = fmt.Fprintf(w, " CheckHostIP %s\n", h.CheckHostIP) - } - if h.Cipher != "" { - _, _ = fmt.Fprintf(w, " Cipher %s\n", h.Cipher) - } - if len(h.Ciphers) > 0 { - _, _ = fmt.Fprintf(w, " Ciphers %s\n", strings.Join(h.Ciphers, ",")) - } - if h.ClearAllForwardings != "" { - _, _ = fmt.Fprintf(w, " ClearAllForwardings %s\n", h.ClearAllForwardings) - } - if h.Compression != "" { - _, _ = fmt.Fprintf(w, " Compression %s\n", h.Compression) - } - if h.CompressionLevel != 0 { - _, _ = fmt.Fprintf(w, " CompressionLevel %d\n", h.CompressionLevel) - } - if h.ConnectionAttempts != "" { - _, _ = fmt.Fprintf(w, " ConnectionAttempts %s\n", h.ConnectionAttempts) - } - if h.ConnectTimeout != 0 { - _, _ = fmt.Fprintf(w, " ConnectTimeout %d\n", h.ConnectTimeout) - } - if h.ControlMaster != "" { - _, _ = fmt.Fprintf(w, " ControlMaster %s\n", h.ControlMaster) - } - if h.ControlPath != "" { - _, _ = fmt.Fprintf(w, " ControlPath %s\n", h.ControlPath) - } - if h.ControlPersist != "" { - _, _ = fmt.Fprintf(w, " ControlPersist %s\n", h.ControlPersist) - } - for _, entry := range h.DynamicForward { - _, _ = fmt.Fprintf(w, " DynamicForward %s\n", entry) - } - if h.EnableSSHKeysign != "" { - _, _ = fmt.Fprintf(w, " EnableSSHKeysign %s\n", h.EnableSSHKeysign) - } - if h.EscapeChar != "" { - _, _ = fmt.Fprintf(w, " EscapeChar %s\n", h.EscapeChar) - } - if h.ExitOnForwardFailure != "" { - _, _ = fmt.Fprintf(w, " ExitOnForwardFailure %s\n", h.ExitOnForwardFailure) - } - if h.FingerprintHash != "" { - _, _ = fmt.Fprintf(w, " FingerprintHash %s\n", h.FingerprintHash) - } - if h.ForwardAgent != "" { - _, _ = fmt.Fprintf(w, " ForwardAgent %s\n", h.ForwardAgent) - } - if h.ForwardX11 != "" { - _, _ = fmt.Fprintf(w, " ForwardX11 %s\n", h.ForwardX11) - } - if h.ForwardX11Timeout != 0 { - _, _ = fmt.Fprintf(w, " ForwardX11Timeout %d\n", h.ForwardX11Timeout) - } - if h.ForwardX11Trusted != "" { - _, _ = fmt.Fprintf(w, " ForwardX11Trusted %s\n", h.ForwardX11Trusted) - } - if h.GatewayPorts != "" { - _, _ = fmt.Fprintf(w, " GatewayPorts %s\n", h.GatewayPorts) - } - if len(h.GlobalKnownHostsFile) > 0 { - _, _ = fmt.Fprintf(w, " GlobalKnownHostsFile %s\n", strings.Join(h.GlobalKnownHostsFile, " ")) - } - if h.GSSAPIAuthentication != "" { - _, _ = fmt.Fprintf(w, " GSSAPIAuthentication %s\n", h.GSSAPIAuthentication) - } - if h.GSSAPIClientIdentity != "" { - _, _ = fmt.Fprintf(w, " GSSAPIClientIdentity %s\n", h.GSSAPIClientIdentity) - } - if h.GSSAPIDelegateCredentials != "" { - _, _ = fmt.Fprintf(w, " GSSAPIDelegateCredentials %s\n", h.GSSAPIDelegateCredentials) - } - if h.GSSAPIKeyExchange != "" { - _, _ = fmt.Fprintf(w, " GSSAPIKeyExchange %s\n", h.GSSAPIKeyExchange) - } - if h.GSSAPIRenewalForcesRekey != "" { - _, _ = fmt.Fprintf(w, " GSSAPIRenewalForcesRekey %s\n", h.GSSAPIRenewalForcesRekey) - } - if h.GSSAPIServerIdentity != "" { - _, _ = fmt.Fprintf(w, " GSSAPIServerIdentity %s\n", h.GSSAPIServerIdentity) - } - if h.GSSAPITrustDNS != "" { - _, _ = fmt.Fprintf(w, " GSSAPITrustDNS %s\n", h.GSSAPITrustDNS) - } - if h.HashKnownHosts != "" { - _, _ = fmt.Fprintf(w, " HashKnownHosts %s\n", h.HashKnownHosts) - } - if h.HostbasedAuthentication != "" { - _, _ = fmt.Fprintf(w, " HostbasedAuthentication %s\n", h.HostbasedAuthentication) - } - if h.HostbasedKeyTypes != "" { - _, _ = fmt.Fprintf(w, " HostbasedKeyTypes %s\n", h.HostbasedKeyTypes) - } - if len(h.HostKeyAlgorithms) > 0 { - _, _ = fmt.Fprintf(w, " HostKeyAlgorithms %s\n", strings.Join(h.HostKeyAlgorithms, ",")) - } - if h.HostKeyAlias != "" { - _, _ = fmt.Fprintf(w, " HostKeyAlias %s\n", h.HostKeyAlias) - } - if h.IdentitiesOnly != "" { - _, _ = fmt.Fprintf(w, " IdentitiesOnly %s\n", h.IdentitiesOnly) - } - if h.IdentityAgent != "" { - _, _ = fmt.Fprintf(w, " IdentityAgent %s\n", h.IdentityAgent) - } - for _, entry := range h.IdentityFile { - _, _ = fmt.Fprintf(w, " IdentityFile %s\n", entry) - } - if h.IgnoreUnknown != "" { - _, _ = fmt.Fprintf(w, " IgnoreUnknown %s\n", h.IgnoreUnknown) - } - if len(h.IPQoS) > 0 { - _, _ = fmt.Fprintf(w, " IPQoS %s\n", strings.Join(h.IPQoS, " ")) - } - if h.KbdInteractiveAuthentication != "" { - _, _ = fmt.Fprintf(w, " KbdInteractiveAuthentication %s\n", h.KbdInteractiveAuthentication) - } - if len(h.KbdInteractiveDevices) > 0 { - _, _ = fmt.Fprintf(w, " KbdInteractiveDevices %s\n", strings.Join(h.KbdInteractiveDevices, ",")) - } - if len(h.KexAlgorithms) > 0 { - _, _ = fmt.Fprintf(w, " KexAlgorithms %s\n", strings.Join(h.KexAlgorithms, ",")) - } - if h.KeychainIntegration != "" { - _, _ = fmt.Fprintf(w, " KeychainIntegration %s\n", h.KeychainIntegration) - } - if h.LocalCommand != "" { - _, _ = fmt.Fprintf(w, " LocalCommand %s\n", h.LocalCommand) - } - if h.RemoteCommand != "" { - _, _ = fmt.Fprintf(w, " RemoteCommand %s\n", h.RemoteCommand) - } - for _, entry := range h.LocalForward { - _, _ = fmt.Fprintf(w, " LocalForward %s\n", entry) - } - if h.LogLevel != "" { - _, _ = fmt.Fprintf(w, " LogLevel %s\n", h.LogLevel) - } - if len(h.MACs) > 0 { - _, _ = fmt.Fprintf(w, " MACs %s\n", strings.Join(h.MACs, ",")) - } - if h.Match != "" { - _, _ = fmt.Fprintf(w, " Match %s\n", h.Match) - } - if h.NoHostAuthenticationForLocalhost != "" { - _, _ = fmt.Fprintf(w, " NoHostAuthenticationForLocalhost %s\n", h.NoHostAuthenticationForLocalhost) - } - if h.NumberOfPasswordPrompts != "" { - _, _ = fmt.Fprintf(w, " NumberOfPasswordPrompts %s\n", h.NumberOfPasswordPrompts) - } - if h.PasswordAuthentication != "" { - _, _ = fmt.Fprintf(w, " PasswordAuthentication %s\n", h.PasswordAuthentication) - } - if h.PermitLocalCommand != "" { - _, _ = fmt.Fprintf(w, " PermitLocalCommand %s\n", h.PermitLocalCommand) - } - if h.PKCS11Provider != "" { - _, _ = fmt.Fprintf(w, " PKCS11Provider %s\n", h.PKCS11Provider) - } - if h.Port != "" { - _, _ = fmt.Fprintf(w, " Port %s\n", h.Port) - } - if h.PreferredAuthentications != "" { - _, _ = fmt.Fprintf(w, " PreferredAuthentications %s\n", h.PreferredAuthentications) - } - if len(h.Protocol) > 0 { - _, _ = fmt.Fprintf(w, " Protocol %s\n", strings.Join(h.Protocol, ",")) - } - if h.ProxyJump != "" { - _, _ = fmt.Fprintf(w, " ProxyJump %s\n", h.ProxyJump) - } - if h.ProxyUseFdpass != "" { - _, _ = fmt.Fprintf(w, " ProxyUseFdpass %s\n", h.ProxyUseFdpass) - } - if h.PubkeyAcceptedAlgorithms != "" { - _, _ = fmt.Fprintf(w, " PubkeyAcceptedAlgorithms %s\n", h.PubkeyAcceptedAlgorithms) - } - if h.PubkeyAcceptedKeyTypes != "" { - _, _ = fmt.Fprintf(w, " PubkeyAcceptedKeyTypes %s\n", h.PubkeyAcceptedKeyTypes) - } - if h.PubkeyAuthentication != "" { - _, _ = fmt.Fprintf(w, " PubkeyAuthentication %s\n", h.PubkeyAuthentication) - } - if h.RekeyLimit != "" { - _, _ = fmt.Fprintf(w, " RekeyLimit %s\n", h.RekeyLimit) - } - for _, entry := range h.RemoteForward { - _, _ = fmt.Fprintf(w, " RemoteForward %s\n", entry) - } - if h.RequestTTY != "" { - _, _ = fmt.Fprintf(w, " RequestTTY %s\n", h.RequestTTY) - } - if h.RevokedHostKeys != "" { - _, _ = fmt.Fprintf(w, " RevokedHostKeys %s\n", h.RevokedHostKeys) - } - if h.RhostsRSAAuthentication != "" { - _, _ = fmt.Fprintf(w, " RhostsRSAAuthentication %s\n", h.RhostsRSAAuthentication) - } - if h.RSAAuthentication != "" { - _, _ = fmt.Fprintf(w, " RSAAuthentication %s\n", h.RSAAuthentication) - } - for _, entry := range h.SendEnv { - _, _ = fmt.Fprintf(w, " SendEnv %s\n", entry) - } - if h.ServerAliveCountMax != 0 { - _, _ = fmt.Fprintf(w, " ServerAliveCountMax %d\n", h.ServerAliveCountMax) - } - if h.ServerAliveInterval != 0 { - _, _ = fmt.Fprintf(w, " ServerAliveInterval %d\n", h.ServerAliveInterval) - } - if h.StreamLocalBindMask != "" { - _, _ = fmt.Fprintf(w, " StreamLocalBindMask %s\n", h.StreamLocalBindMask) - } - if h.StreamLocalBindUnlink != "" { - _, _ = fmt.Fprintf(w, " StreamLocalBindUnlink %s\n", h.StreamLocalBindUnlink) - } - if h.StrictHostKeyChecking != "" { - _, _ = fmt.Fprintf(w, " StrictHostKeyChecking %s\n", h.StrictHostKeyChecking) - } - if h.TCPKeepAlive != "" { - _, _ = fmt.Fprintf(w, " TCPKeepAlive %s\n", h.TCPKeepAlive) - } - if h.Tunnel != "" { - _, _ = fmt.Fprintf(w, " Tunnel %s\n", h.Tunnel) - } - if h.TunnelDevice != "" { - _, _ = fmt.Fprintf(w, " TunnelDevice %s\n", h.TunnelDevice) - } - if h.UpdateHostKeys != "" { - _, _ = fmt.Fprintf(w, " UpdateHostKeys %s\n", h.UpdateHostKeys) - } - if h.UseKeychain != "" { - _, _ = fmt.Fprintf(w, " UseKeychain %s\n", h.UseKeychain) - } - if h.UsePrivilegedPort != "" { - _, _ = fmt.Fprintf(w, " UsePrivilegedPort %s\n", h.UsePrivilegedPort) - } - if h.User != "" { - _, _ = fmt.Fprintf(w, " User %s\n", h.User) - } - if len(h.UserKnownHostsFile) > 0 { - _, _ = fmt.Fprintf(w, " UserKnownHostsFile %s\n", strings.Join(h.UserKnownHostsFile, " ")) - } - if h.VerifyHostKeyDNS != "" { - _, _ = fmt.Fprintf(w, " VerifyHostKeyDNS %s\n", h.VerifyHostKeyDNS) - } - if h.VisualHostKey != "" { - _, _ = fmt.Fprintf(w, " VisualHostKey %s\n", h.VisualHostKey) - } - if h.XAuthLocation != "" { - _, _ = fmt.Fprintf(w, " XAuthLocation %s\n", h.XAuthLocation) + hostReflect := reflect.ValueOf(h).Elem() + hostTypeReflect := reflect.TypeOf(h).Elem() + + // go through each field in Host. If 'passthrough' tag exists, process it. + for i := 0; i < hostReflect.NumField(); i++ { + field := hostReflect.Field(i) + fieldType := hostTypeReflect.Field(i) + + fieldName := fieldType.Name + passthroughTag, found := fieldType.Tag.Lookup("passthrough") + if !found { + continue + } + + switch field.Type().Kind() { + case reflect.String: + fieldVal := field.String() + if fieldVal != "" { + _, _ = fmt.Fprintf(w, " %s %s\n", fieldName, fieldVal) + } + case reflect.Int: + fieldVal := field.Int() + if fieldVal != 0 { + _, _ = fmt.Fprintf(w, " %s %d\n", fieldName, fieldVal) + } + case reflect.TypeOf(composeyaml.Stringorslice(nil)).Kind(): + fieldVal := field.Interface().(composeyaml.Stringorslice) + + if passthroughTag == "joinByComma" { + if len(fieldVal) > 0 { + _, _ = fmt.Fprintf(w, " %s %s\n", fieldName, strings.Join(fieldVal, ",")) + } + } else if passthroughTag == "perLine" { + for _, entry := range fieldVal { + _, _ = fmt.Fprintf(w, " %s %s\n", fieldName, entry) + } + } else { + panic(fmt.Sprintf("Undefined Range type for field '%s'.\nIt must contains either of the following value: [ joinByComma, perLine ]", fieldName)) + } + default: + panic(fmt.Sprintf("Unimplemented datatype '%s' for field '%s'", field.Type(), fieldName)) + } } // ssh-config fields with a different behavior