| #!/usr/bin/expect -- | 
 |  | 
 | # ssh using the parms provided by the caller.  The benefit provided by this | 
 | # program is that it will enter the password for you (i.e. non-interactively). | 
 |  | 
 | # Description of arguments: | 
 | # Arg0: The password. | 
 | # Arg1: The ssh parm string.  This is the totality of ssh parms you wish to | 
 | #       specify (e.g. userid, host, etc.). | 
 |  | 
 |  | 
 | # Main | 
 |  | 
 |   # Get arguments. | 
 |   set password [lindex $argv 0] | 
 |   set ssh_parms [lreplace $argv 0 0] | 
 |  | 
 |   eval spawn ssh ${ssh_parms} | 
 |  | 
 |   set timeout 30 | 
 |  | 
 |   set max_attempts 3 | 
 |  | 
 |   set attempts 0 | 
 |   while { 1 } { | 
 |     incr attempts 1 | 
 |     expect { | 
 |       -re "Offending RSA key in (.*?)\[\r\n\]" { | 
 |         # We have been informed by ssh that we have a bad key. | 
 |         # Retrieve the file path and line number from the ssh output. | 
 |         set fields [split $expect_out(1,string) ":"] | 
 |         set file_path [lindex $fields 0] | 
 |         set line_num [lindex $fields 1] | 
 |         # Use sed to delete the bad key. | 
 |         set cmd_buf "sed -i ${line_num}d ${file_path}" | 
 |         puts "Issuing: ${cmd_buf}" | 
 |         eval exec bash -c {$cmd_buf} | 
 |         # Kill the failed spawned ssh process. | 
 |         exec kill -9 [exp_pid] | 
 |         # Start a new process now that our stale key problem is fixed. | 
 |         eval spawn ssh ${ssh_parms} | 
 |         continue | 
 |       } | 
 |       -re "assword:" { | 
 |         send "$password\r" | 
 |         break | 
 |       } | 
 |       -re "Are you sure you want to continue connecting" { | 
 |         if { $attempts > $max_attempts } { | 
 |           puts stderr "**ERROR** Exceeded $max_attempts attempts to ssh." | 
 |           exit 1 | 
 |         } | 
 |         send "yes\r" | 
 |       } | 
 |       timeout { | 
 |         puts stderr "**ERROR** Timed out waiting for password prompt." | 
 |         exit 1 | 
 |       } | 
 |       eof { | 
 |         puts stderr "**ERROR** End of data waiting for password prompt." | 
 |         exit 1 | 
 |       } | 
 |     } | 
 |   } | 
 |  | 
 |   set timeout 3 | 
 |   expect { | 
 |     "Permission denied, please try again." { | 
 |       puts "" | 
 |       puts "**ERROR** Incorrect userid or password provided to this program." | 
 |       exit 1 | 
 |     } | 
 |   } | 
 |  | 
 |   set timeout -1 | 
 |  | 
 |   # We don't ever expect to see this string.  This will keep this program | 
 |   # running indefinitely. | 
 |   set never_string "When in the course of human events, it becomes :" | 
 |   if { [ catch {expect { "${never_string}" {send "whatever\r"} }} result ] } { | 
 |     set child_died {expect:[ ]spawn[ ]id[ ]exp4[ ]not[ ]open} | 
 |     if { [regexp -expanded ${child_died} $result] } { | 
 |       # The child died.  This is not necessarily an error (for example, the | 
 |       # user may have included a command string to run on the target). | 
 |       exit 0 | 
 |     } else { | 
 |       puts $result | 
 |       exit 1 | 
 |     } | 
 |   } | 
 |  | 
 |   exit 0 | 
 |  | 
 |  |