2003-12-30 02:18:20 -05:00
|
|
|
#!/usr/bin/python
|
|
|
|
|
2005-02-28 03:06:08 -05:00
|
|
|
# Copyright (C) 2003-2005 Robey Pointer <robey@lag.net>
|
|
|
|
#
|
|
|
|
# This file is part of paramiko.
|
|
|
|
#
|
|
|
|
# Paramiko is free software; you can redistribute it and/or modify it under the
|
|
|
|
# terms of the GNU Lesser General Public License as published by the Free
|
|
|
|
# Software Foundation; either version 2.1 of the License, or (at your option)
|
|
|
|
# any later version.
|
|
|
|
#
|
|
|
|
# Paramiko is distrubuted in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
# A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more
|
|
|
|
# details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
|
|
# along with Paramiko; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
# 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
|
|
|
|
|
2004-04-06 04:16:02 -04:00
|
|
|
import sys, os, base64, getpass, socket, traceback, termios, tty, select
|
2003-12-30 02:18:20 -05:00
|
|
|
import paramiko
|
|
|
|
|
|
|
|
|
|
|
|
##### utility functions
|
|
|
|
|
|
|
|
def load_host_keys():
|
2005-04-17 20:11:34 -04:00
|
|
|
# this file won't exist on windows, but windows doesn't have a standard
|
|
|
|
# location for this file anyway.
|
|
|
|
filename = os.path.expanduser('~/.ssh/known_hosts')
|
2003-12-30 02:18:20 -05:00
|
|
|
keys = {}
|
|
|
|
try:
|
|
|
|
f = open(filename, 'r')
|
|
|
|
except Exception, e:
|
|
|
|
print '*** Unable to open host keys file (%s)' % filename
|
|
|
|
return
|
|
|
|
for line in f:
|
|
|
|
keylist = line.split(' ')
|
|
|
|
if len(keylist) != 3:
|
|
|
|
continue
|
|
|
|
hostlist, keytype, key = keylist
|
|
|
|
hosts = hostlist.split(',')
|
|
|
|
for host in hosts:
|
|
|
|
if not keys.has_key(host):
|
|
|
|
keys[host] = {}
|
2004-10-18 00:54:27 -04:00
|
|
|
if keytype == 'ssh-rsa':
|
|
|
|
keys[host][keytype] = paramiko.RSAKey(data=base64.decodestring(key))
|
|
|
|
elif keytype == 'ssh-dss':
|
|
|
|
keys[host][keytype] = paramiko.DSSKey(data=base64.decodestring(key))
|
2003-12-30 02:18:20 -05:00
|
|
|
f.close()
|
|
|
|
return keys
|
|
|
|
|
|
|
|
|
|
|
|
# setup logging
|
2004-11-06 15:32:08 -05:00
|
|
|
paramiko.util.log_to_file('demo_simple.log')
|
2003-12-30 02:18:20 -05:00
|
|
|
|
|
|
|
# get hostname
|
|
|
|
username = ''
|
|
|
|
if len(sys.argv) > 1:
|
|
|
|
hostname = sys.argv[1]
|
|
|
|
if hostname.find('@') >= 0:
|
|
|
|
username, hostname = hostname.split('@')
|
|
|
|
else:
|
|
|
|
hostname = raw_input('Hostname: ')
|
|
|
|
if len(hostname) == 0:
|
|
|
|
print '*** Hostname required.'
|
|
|
|
sys.exit(1)
|
|
|
|
port = 22
|
|
|
|
if hostname.find(':') >= 0:
|
|
|
|
hostname, portstr = hostname.split(':')
|
|
|
|
port = int(portstr)
|
|
|
|
|
|
|
|
|
|
|
|
# get username
|
|
|
|
if username == '':
|
|
|
|
default_username = getpass.getuser()
|
|
|
|
username = raw_input('Username [%s]: ' % default_username)
|
|
|
|
if len(username) == 0:
|
|
|
|
username = default_username
|
|
|
|
password = getpass.getpass('Password for %s@%s: ' % (username, hostname))
|
|
|
|
|
|
|
|
|
|
|
|
# get host key, if we know one
|
|
|
|
hostkeytype = None
|
|
|
|
hostkey = None
|
|
|
|
hkeys = load_host_keys()
|
|
|
|
if hkeys.has_key(hostname):
|
|
|
|
hostkeytype = hkeys[hostname].keys()[0]
|
|
|
|
hostkey = hkeys[hostname][hostkeytype]
|
|
|
|
print 'Using host key of type %s' % hostkeytype
|
|
|
|
|
|
|
|
|
2004-04-05 15:36:40 -04:00
|
|
|
# now, connect and use paramiko Transport to negotiate SSH2 across the connection
|
2003-12-30 02:18:20 -05:00
|
|
|
try:
|
2004-04-05 15:36:40 -04:00
|
|
|
t = paramiko.Transport((hostname, port))
|
2004-10-18 00:54:27 -04:00
|
|
|
t.connect(username=username, password=password, hostkey=hostkey)
|
2003-12-30 02:18:20 -05:00
|
|
|
chan = t.open_session()
|
|
|
|
chan.get_pty()
|
|
|
|
chan.invoke_shell()
|
|
|
|
print '*** Here we go!'
|
|
|
|
print
|
|
|
|
|
|
|
|
try:
|
|
|
|
oldtty = termios.tcgetattr(sys.stdin)
|
|
|
|
tty.setraw(sys.stdin.fileno())
|
|
|
|
tty.setcbreak(sys.stdin.fileno())
|
|
|
|
chan.settimeout(0.0)
|
|
|
|
|
|
|
|
while 1:
|
|
|
|
r, w, e = select.select([chan, sys.stdin], [], [])
|
|
|
|
if chan in r:
|
|
|
|
try:
|
|
|
|
x = chan.recv(1024)
|
|
|
|
if len(x) == 0:
|
|
|
|
print '\r\n*** EOF\r\n',
|
|
|
|
break
|
|
|
|
sys.stdout.write(x)
|
|
|
|
sys.stdout.flush()
|
|
|
|
except socket.timeout:
|
|
|
|
pass
|
|
|
|
if sys.stdin in r:
|
|
|
|
# FIXME: reading 1 byte at a time is incredibly dumb.
|
|
|
|
x = sys.stdin.read(1)
|
|
|
|
if len(x) == 0:
|
|
|
|
print
|
|
|
|
print '*** Bye.\r\n',
|
|
|
|
break
|
|
|
|
chan.send(x)
|
|
|
|
|
|
|
|
finally:
|
|
|
|
termios.tcsetattr(sys.stdin, termios.TCSADRAIN, oldtty)
|
|
|
|
|
|
|
|
chan.close()
|
|
|
|
t.close()
|
|
|
|
|
|
|
|
except Exception, e:
|
|
|
|
print '*** Caught exception: ' + str(e.__class__) + ': ' + str(e)
|
|
|
|
traceback.print_exc()
|
|
|
|
try:
|
|
|
|
t.close()
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
sys.exit(1)
|