blob: 53ae5e9a9661ae3a85906bc50c77c6e79cbb3995 [file] [log] [blame]
#!/usr/bin/expect --
# ssh using the parms provided by the caller. The benefit provided by this
# program is that it will enter the password for you (i.e. non-interactively).
# Description of arguments:
# Arg0: The password.
# Arg1: The ssh parm string. This is the totality of ssh parms you wish to
# specify (e.g. userid, host, etc.).
###############################################################################
# Main
# Get arguments.
set password [lindex $argv 0]
set ssh_parms [lreplace $argv 0 0]
eval spawn ssh ${ssh_parms}
set timeout 30
set max_attempts 3
set attempts 0
while { 1 } {
incr attempts 1
expect {
-re "Offending RSA key in (.*?)\[\r\n\]" {
# We have been informed by ssh that we have a bad key.
# Retreive the file path and line number from the ssh output.
set fields [split $expect_out(1,string) ":"]
set file_path [lindex $fields 0]
set line_num [lindex $fields 1]
# Use sed to delete the bad key.
set cmd_buf "sed -i ${line_num}d ${file_path}"
puts "Issuing: ${cmd_buf}"
eval exec bash -c {$cmd_buf}
# Kill the failed spawned ssh process.
exec kill -9 [exp_pid]
# Start a new process now that our stale key problem is fixed.
eval spawn ssh ${ssh_parms}
continue
}
-re "assword:" {
send "$password\r"
break
}
-re "Are you sure you want to continue connecting" {
if { $attempts > $max_attempts } {
puts stderr "**ERROR** Exceeded $max_attempts attempts to ssh."
exit 1
}
send "yes\r"
}
timeout {
puts stderr "**ERROR** Timed out waiting for password prompt."
exit 1
}
eof {
puts stderr "**ERROR** End of data waiting for password prompt."
exit 1
}
}
}
set timeout 3
expect {
"Permission denied, please try again." {
puts ""
puts "**ERROR** Incorrect userid or password provided to this program."
exit 1
}
}
set timeout -1
# We don't ever expect to see this string. This will keep this program
# running indefinitely.
set never_string "When in the course of human events, it becomes :"
if { [ catch {expect { "${never_string}" {send "whatever\r"} }} result ] } {
set child_died {expect:[ ]spawn[ ]id[ ]exp4[ ]not[ ]open}
if { [regexp -expanded ${child_died} $result] } {
# The child died. This is not necessarily an error (for example, the
# user may have included a command string to run on the target).
exit 0
} else {
puts $result
exit 1
}
}
exit 0
###############################################################################