使用python通过SSH登陆linux并操作
用的昨天刚接触到的库,在windows下通过paramiko来登录linux系统并执行了几个命令,基本算是初试成功,后面会接着学习的。
代码:
>>> import paramiko
>>> ssh = paramiko.SSHClient()
>>> ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
>>> ssh.connect(\'10.104.6.8\',username = \'xiaopeng\',password=\'******\')
>>> cmd = \'cd\' #进入用户目录home
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> cmd = \'ls >test\' #管道,ls命名的输出到文件test里面
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> cmd = \'cat test\' # 显示test的内容,即ls命名的结果
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> print stdout.readlines() #结果 汉字用的字符显示
[\'code\n\', \'Desktop\n\', \'order.cpp\n\', \'python\n\', \'test\n\', \'\xe5\x85\xac\xe5\x85\xb1\xe7\x9a\x84\n\', \'\xe6\xa8\xa1\xe6\x9d\xbf\n\', \'\xe8\xa7\x86\xe9\xa2\x91\n\', \'\xe5\x9b\xbe\xe7\x89\x87\n\', \'\xe6\x96\x87\xe6\xa1\xa3\n\', \'\xe4\xb8\x8b\xe8\xbd\xbd\n\', \'\xe9\x9f\xb3\xe4\xb9\x90\n\']
这里我们都会发现,使用exec_command(\'cd dirname\')时并不会切换目录,execute_command() 是a single session,每次执行完后都要回到缺省目录。所以可以 .execute_command(\'cd /var; pwd\')。
python里面的paramiko模块,用这个实现ssh登录更加简单。看下面的代码:
- #-*- coding: utf-8 -*-
- #!/usr/bin/python
- import paramiko
- import threading
- def ssh2(ip,username,passwd,cmd):
- try:
- ssh = paramiko.SSHClient()
- ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
- ssh.connect(ip,22,username,passwd,timeout=5)
- for m in cmd:
- stdin, stdout, stderr = ssh.exec_command(m)
- # stdin.write("Y") #简单交互,输入 ‘Y’
- out = stdout.readlines()
- #屏幕输出
- for o in out:
- print o,
- print \'%s\tOK\n\'%(ip)
- ssh.close()
- except :
- print \'%s\tError\n\'%(ip)
- if __name__==\'__main__\':
- cmd = [\'cal\',\'echo hello!\']#你要执行的命令列表
- username = "" #用户名
- passwd = "" #密码
- threads = [] #多线程
- print "Begin......"
- for i in range(1,254):
- ip = \'192.168.1.\'+str(i)
- a=threading.Thread(target=ssh2,args=(ip,username,passwd,cmd))
- a.start()
上面的程序还是有些技巧的:
1.利用多线程,同时发出登录请求,同时去连接电脑,这样速度快很多,我试了一下,如果不用多线程,直接一个一个挨着执行的话,大约5~10秒钟才能对一台电脑操作完,具体时间要根据命令的来决定,如果是软件安装或者卸载时间要更长一些。这样下来怎么也要一二十分钟,用多线程后就快多了,所有的命令执行完用了不到2分钟!
2.最好用root用户登录,因为安装或者卸载软件的时候如果用普通用户又会提示输入密码,这样又多了一次交互,处理起来就比较麻烦!安装软件时apt-get install xxx 最好加上“-y”参数,因为有时安装或删除软件时提示是否继续安装或卸载,这又是一次自动交互!加上那个参数后就没有人机交互了。
3. 循环时循环所有ip,因为计算机的ip是路由器自动分配的,保险起见,最好全部都执行,保证没有遗漏的主机
4.远端执行命令时如果有交互,可以这样用 stdin.write("Y")来完成交互,“Y”就是输入“Y”。
5.把所有的命令放到一个列表里面,遍历列表可以依次执行列表里面的命令
6.为了更好的进行控制,最好在电脑上提前把root用户打开,装好ssh服务器并让其开机自动执行。
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh.connect(\'10.111.43.18\',22,\'root\',\'12345\',timeout=5)
stdin, stdout, stderr = ssh.exec_command(\'cd /root/epoll/\')
stdin, stdout, stderr = ssh.exec_command(\'pwd\')
上边的代码输出应该是 /root/epoll/,但结果却是 /root ,即使用root登陆的缺省目录
原因是exec_command为单个会话,执行完成之后会回到登录时的缺省目录
修改为这样执行结果则为预期的 /root/epoll 目录
stdin, stdout, stderr = ssh.exec_command(\'cd /root/epoll/;pwd\')
最近闲着学习python,看到有个paramiko模块,貌似很强大,学着写了个一个小程序,可以直接在window下登录到linux,执行并返回执行结果。
下面直接贴代码:
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
#!/usr/bin/env python import paramiko
#hostname=\'192.168.0.102\' hostname=\'172.28.102.250\'
username=\'root\'
password=\'abc\'
#port=22 if __name__==\'__main__\':
paramiko.util.log_to_file(\'paramiko.log\')
s=paramiko.SSHClient()
#s.load_system_host_keys()
s.set_missing_host_key_policy(paramiko.AutoAddPolicy())
s.connect(hostname = hostname,username=username, password=password)
stdin,stdout,stderr=s.exec_command(\'ifconfig;free;df -h\')
print stdout.read()
s.close()
|
下面看下效果,呵呵:
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
s501914252.HCA-FW9CX2XDesktop学习资料python paramiko-ssh.py"
eth0 Link encap:Ethernet HWaddr 00:24:01:01:EA:5C
inet addr:172.32.34.240 Bcast:172.32.255.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1428 errors:0 dropped:0 overruns:0 frame:0
TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:190928 (186.4 KiB) TX bytes:128 (128.0 b)
Interrupt:20
eth1 Link encap:Ethernet HWaddr 00:1F:29:03:54:3D
inet addr:172.28.102.250 Bcast:172.28.255.255 Mask:255.255.0.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:99698 errors:0 dropped:0 overruns:0 frame:0
TX packets:12305 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:36420324 (34.7 MiB) TX bytes:923630 (901.9 KiB)
lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
peth1 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF UP BROADCAST RUNNING NOARP MTU:1500 Metric:1
RX packets:99686 errors:0 dropped:0 overruns:0 frame:0
TX packets:12333 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:36818715 (35.1 MiB) TX bytes:1006230 (982.6 KiB)
Interrupt:20 Memory:f3000000-f3010000
vif0.1 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:1500 Metric:1
RX packets:12305 errors:0 dropped:0 overruns:0 frame:0
TX packets:99702 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:923630 (901.9 KiB) TX bytes:36420811 (34.7 MiB)
vif1.0 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:1500 Metric:1
RX packets:5 errors:0 dropped:0 overruns:0 frame:0
TX packets:85175 errors:0 dropped:542 overruns:0 carrier:0
collisions:0 txqueuelen:500
RX bytes:140 (140.0 b) TX bytes:20377326 (19.4 MiB)
vif2.0 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:1500 Metric:1
RX packets:5 errors:0 dropped:0 overruns:0 frame:0
TX packets:84859 errors:0 dropped:411 overruns:0 carrier:0
collisions:0 txqueuelen:500
RX bytes:140 (140.0 b) TX bytes:20301953 (19.3 MiB)
vif3.0 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:1500 Metric:1
RX packets:5 errors:0 dropped:0 overruns:0 frame:0
TX packets:84337 errors:0 dropped:546 overruns:0 carrier:0
collisions:0 txqueuelen:500
RX bytes:140 (140.0 b) TX bytes:20174994 (19.2 MiB)
virbr0 Link encap:Ethernet HWaddr 00:00:00:00:00:00
inet addr:192.168.122.1 Bcast:192.168.122.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
xenbr1 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF UP BROADCAST RUNNING NOARP MTU:1500 Metric:1
RX packets:86405 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:19498121 (18.5 MiB) TX bytes:0 (0.0 b)
total used free shared buffers cached
Mem: 3359744 464724 2895020 0 31096 246296
-/+ buffers/cache: 187332 3172412
Swap: 5406712 0 5406712
Filesystem Size Used Avail Use% Mounted on
/dev/mapper/VolGroup00-LogVol00
221G 25G 185G 12% /
/dev/sda1 99M 22M 73M 23% /boot
tmpfs 1.8G 0 1.8G 0% /dev/shm
none 1.8G 152K 1.8G 1% /var/lib/xenstored<br><br><br><br><br>
|
|
1
|
<br><br><br>-、执行远程命令:<br>#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br>port =22<br>ssh = paramiko.SSHClient()<br>ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())<br>ssh.connect("*.*.*.*",port,"username", "password")<br>stdin, stdout, stderr = ssh.exec_command("你的命令")<br>print stdout.readlines()<br>ssh.close()<br><br>二、上传文件到远程<br>#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br><br>port =22<br>t = paramiko.Transport(("IP",port))<br>t.connect(username = "username", password = "password")<br>sftp = paramiko.SFTPClient.from_transport(t)<br>remotepath=\'/tmp/test.txt\'<br>localpath=\'/tmp/test.txt\'<br>sftp.put(localpath,remotepath)<br>t.close()<br><br>三、从远程下载文件<br>#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br><br>port =22<br>t = paramiko.Transport(("IP",port))<br>t.connect(username = "username", password = "password")<br>sftp = paramiko.SFTPClient.from_transport(t)<br>remotepath=\'/tmp/test.txt\'<br>localpath=\'/tmp/test.txt\'<br>sftp.get(remotepath, localpath)<br>t.close()<br><br>四、执行多个命令<br>#!/usr/bin/python<br>#coding:utf-8<br><br>import sys<br>sys.stderr = open(\'/dev/null\') # Silence silly warnings from paramiko<br>import paramiko as pm<br>sys.stderr = sys.__stderr__<br>import os<br><br>class AllowAllKeys(pm.MissingHostKeyPolicy):<br> def missing_host_key(self, client, hostname, key):<br> return<br><br>HOST = \'127.0.0.1\'<br>USER = \'\'<br>PASSWORD = \'\'<br><br>client = pm.SSHClient()<br>client.load_system_host_keys()<br>client.load_host_keys(os.path.expanduser(\'~/.ssh/known_hosts\'))<br>client.set_missing_host_key_policy(AllowAllKeys())<br>client.connect(HOST, username=USER, password=PASSWORD)<br><br>channel = client.invoke_shell()<br>stdin = channel.makefile(\'wb\')<br>stdout = channel.makefile(\'rb\')<br><br>stdin.write(\'\'\'<br>cd tmp<br>ls<br>exit<br>\'\'\')<br>print stdout.read()<br><br>stdout.close()<br>stdin.close()<br>client.close()<br><br>五、获取多个文件<br>#!/usr/bin/python<br>#coding:utf-8<br><br>import paramiko<br>import os<br><br>ssh = paramiko.SSHClient()<br>ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())<br>ssh.connect(\'localhost\',username=\'****\') <br><br>apath = \'/var/log\'<br>apattern = \'"*.log"\'<br>rawcommand = \'find {path} -name {pattern}\'<br>command = rawcommand.format(path=apath, pattern=apattern)<br>stdin, stdout, stderr = ssh.exec_command(command)<br>filelist = stdout.read().splitlines()<br><br>ftp = ssh.open_sftp()<br>for afile in filelist:<br> (head, filename) = os.path.split(afile)<br> print(filename)<br> ftp.get(afile, \'./\'+filename)<br>ftp.close()<br>ssh.close()<br><br><br>
|
|
1
|
|
paramiko模块是基于Python实现的ssh远程安全链接,实现命令远程、文件传输、SSH代理等功能。本文详细介绍了paramiko模块常用的方法,且实用价值非常高,稍作修改就能做出一个实用的运维工具。
安装
letong@me:~$ sudo pip install paramiko
简单的远程执行命令实例
#!/usr/bin/env python import paramiko hostname=\'127.0.0.1\' username=\'root\' password=\'123456\' port=2222 ssh=paramiko.SSHClient() ssh.load_system_host_keys() ssh.connect(hostname=hostname,port=port,username=username,password=password) stdin,stdout,stderr=ssh.exec_command(\'ls /\') print stdout.read() ssh.close()
SSHClient类
SSHClient类是SSH服务会话的高级表示,封装了传输、通道以及SFTPClient的校验、建立方法,通常用于执行命令。
connect方法
connect(self, hostname, port=22, username=None, password=None, pkey=None, Key_filename=None, timeout=None, allow_agent=True, look_for_keys=True, compress=False)
参数说明:
hostname,连接目标的主机地址 port,连接目标的端口,默认22 username,用户名 password,用户密码 pkey,私钥方式用户验证 key_filename,私钥文件名 timeout,超时时间 allow_agent,是否允许ssh代理 look_for_keys,是否允许搜索私钥文件 compress,打开时是否压缩
exec_command方法
exec_command(self, command, bufzise=-1)
参数说明:
command,执行的命令 bufsize,文件缓冲区大小,-1不限制
load_system_host_keys方法
load_system_host_keys(self, filename=None)
参数说明:
filename,指定远程主机公钥文件
set_missing_host_key_policy方法
ssh=paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
参数说明:
AutoAddPolicy,自动添加主机名及密钥到本地并保存,不依赖load_system_host_keys()配置 RejectPolicy,自动拒绝未知主机名和密钥,依赖load_system_host_keys()配置 WarnningPolicy,功能与AutoAddPolicy相同,但是未知主机会报警
SFTPClient类
根据SSH传输协议的sftp会话,实现远程文件上传、下载等操作。
from_transport方法
from_transport(cls, t)
参数说明:
t,一个已通过验证的传输对象
例:
>>> import paramiko >>> a = paramiko.Transport((“127.0.0.1″,2222)) >>> a.connect(username=”root”, password=’123456′) >>> sftp = paramiko.SFTPClient.from_transport(a)
put方法
put(self, localpath, remotepath, callback=None, confirm=True)
参数说明:
localpath,上传源文件的本地路径 remotepath,目标路径 callback,获取接收与总传输字节数 confirm,上传完毕后是否调用stat()方法,以便确认文件大小
例:
>>> localpath=’ftp-test.log’ >>> remotepath=’/data/ftp-test.log’ >>> sftp.put(localpath,remotepath)
get方法
get(self, remotepath, localpath, callback=None)
参数说明:
remotepath,需要下载的远程文件 localpath,本地存储路径 callback,同put方法
其他方法
mkdir,用于创建目录 remove,删除目录 rename,重命名 stat,获取文件信息 listdir,获取目录列表