|  | #!/usr/bin/expect -- | 
|  |  | 
|  | # ssh using the parms provided by the caller.  The benefit provided by this | 
|  | # program is that it will enter the password for you (i.e. non-interactively). | 
|  |  | 
|  | # Description of arguments: | 
|  | # Arg0: The password. | 
|  | # Arg1: The ssh parm string.  This is the totality of ssh parms you wish to | 
|  | #       specify (e.g. userid, host, etc.). | 
|  |  | 
|  |  | 
|  | ############################################################################### | 
|  | # Main | 
|  |  | 
|  | # Get arguments. | 
|  | set password [lindex $argv 0] | 
|  | set ssh_parms [lreplace $argv 0 0] | 
|  |  | 
|  | eval spawn ssh ${ssh_parms} | 
|  |  | 
|  | set timeout 30 | 
|  |  | 
|  | set max_attempts 3 | 
|  |  | 
|  | set attempts 0 | 
|  | while { 1 } { | 
|  | incr attempts 1 | 
|  | expect { | 
|  | -re "Offending RSA key in (.*?)\[\r\n\]" { | 
|  | # We have been informed by ssh that we have a bad key. | 
|  | # Retreive the file path and line number from the ssh output. | 
|  | set fields [split $expect_out(1,string) ":"] | 
|  | set file_path [lindex $fields 0] | 
|  | set line_num [lindex $fields 1] | 
|  | # Use sed to delete the bad key. | 
|  | set cmd_buf "sed -i ${line_num}d ${file_path}" | 
|  | puts "Issuing: ${cmd_buf}" | 
|  | eval exec bash -c {$cmd_buf} | 
|  | # Kill the failed spawned ssh process. | 
|  | exec kill -9 [exp_pid] | 
|  | # Start a new process now that our stale key problem is fixed. | 
|  | eval spawn ssh ${ssh_parms} | 
|  | continue | 
|  | } | 
|  | -re "assword:" { | 
|  | send "$password\r" | 
|  | break | 
|  | } | 
|  | -re "Are you sure you want to continue connecting" { | 
|  | if { $attempts > $max_attempts } { | 
|  | puts stderr "**ERROR** Exceeded $max_attempts attempts to ssh." | 
|  | exit 1 | 
|  | } | 
|  | send "yes\r" | 
|  | } | 
|  | timeout { | 
|  | puts stderr "**ERROR** Timed out waiting for password prompt." | 
|  | exit 1 | 
|  | } | 
|  | eof { | 
|  | puts stderr "**ERROR** End of data waiting for password prompt." | 
|  | exit 1 | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | set timeout 3 | 
|  | expect { | 
|  | "Permission denied, please try again." { | 
|  | puts "" | 
|  | puts "**ERROR** Incorrect userid or password provided to this program." | 
|  | exit 1 | 
|  | } | 
|  | } | 
|  |  | 
|  | set timeout -1 | 
|  |  | 
|  | # We don't ever expect to see this string.  This will keep this program | 
|  | # running indefinitely. | 
|  | set never_string "When in the course of human events, it becomes :" | 
|  | if { [ catch {expect { "${never_string}" {send "whatever\r"} }} result ] } { | 
|  | set child_died {expect:[ ]spawn[ ]id[ ]exp4[ ]not[ ]open} | 
|  | if { [regexp -expanded ${child_died} $result] } { | 
|  | # The child died.  This is not necessarily an error (for example, the | 
|  | # user may have included a command string to run on the target). | 
|  | exit 0 | 
|  | } else { | 
|  | puts $result | 
|  | exit 1 | 
|  | } | 
|  | } | 
|  |  | 
|  | exit 0 | 
|  |  | 
|  | ############################################################################### | 
|  |  |