通过python连接Linux命令行代码实例

通过python连接Linux命令行代码实例,第1张

通过python连接Linux命令行代码实例

这篇文章主要介绍了通过python连接Linux命令行代码实例,文中通过示例代码介绍的非常详细,对大家的学习或者工作具有一定的参考学习价值,需要的朋友可以参考下

代码如下

#!/usr/bin/python
# -*- coding: utf-8 -*-

'''https://www.ibm.com/developerworks/cn/linux/l-cn-pexpect2/index.html'''

import pexpect
import types


username = "root"
ip = "192.168.***.***"
password = "****"
pex = pexpect.spawn('ssh %s@%s' % (username, ip))


def _check(pattern, timeout=120):
  i = pex.expect(pattern, timeout=timeout)
  return i


def sendcr(cmd):
  if pex == None:
    return 0
  n = pex.send("%sr" % cmd)
  return n


def getexec(cmd):

  child = pexpect.spawn(cmd)
  child.expect(pexpect.EOF)
  return child.before


if __name__ == '__main__':

  checklist1 = [["(?i)Connection refused", False],
  ["(?i)Host key verification failed.", False],
  ["(?i)VENUSTECH AUDIT SYSTEM MA1000", True],
  # ["(?i)#[/]",True],    # hpux
  ["(?i).+>", True], # windows
  [".+[>$#]s*$", True], # debian
  ["(?i)Last login", True],
  ["(?i)access denied", False],
  ["(?i)NT_STATUS_LOGON_FAILURE", False],
  ["(?i)are you sure you want to continue connecting", "yes"],
  ["(?i)authentication fail(?!ure)", False],
  ["(?i)connection closed by remote host", False],
  ["(?i)login failed", False],
  ["(?i)login incorrect", False],
  ["(?i)need to be root", False],
  ["(?i)no route to host", False],
  ["(?i)not found", False],
  ["(?i)Bad secrets", False],
  ["(?i)incorrect password", False],
  ["(?i)permission denied", False],
  # ["(?i)terminal type",terminal_type],
  ["This private key will be ignored.", False],
  ["(?i)no route to host", False],
  ["(?i)press 'Enter' key to proceed", "r"],
  ["(?i)Y/N", 'Y'],
  [pexpect.EOF, False],
  [pexpect.TIMEOUT, False],
  ["(?i)Enter passphrase for key .*:", password],
  ["(?i)assword", password],
  ["(?i)passwd", password],
  ["(?i)sername", username],
  ["(?i)(?

打印结果:

26 ['(?i)assword', '***'] ***
5 ['(?i)Last login', True] True
result -rw-r--r--. 1 root root 3167 Mar 13 11:24 /etc/rsyslog.conf

以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持考高分网。

欢迎分享,转载请注明来源:内存溢出

原文地址: http://outofmemory.cn/zaji/3236877.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022-10-04
下一篇 2022-10-04

发表评论

登录后才能评论

评论列表(0条)

保存