1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
|
Common problems
===============
Threads
-------
On Linux (RH 8) you cannot spawn a child from a different thread and pass the
handle back to a worker thread. The child is successfully spawned but you can't
interact with it. The only way to make it work is to spawn and interact with the
child all in the same thread. [Adam Kerrison]
Blocking Child
--------------
A child process that writes to its standard out will eventually block unless
you continue to call :meth:`~pexpect.spawn.expect` or some family of read
methods. Once the pipe buffer is filled, the child's call to write(2)
will block. If this child provides other services, such as a network server,
such services will be unavailable until the write(2) call returns.
There are many solutions, the simplest is to simply expect ``pexpect.EOF``,
perhaps in a background thread, this ensures that all child process output
is read until the program exits, for example::
import pexpect, threading
class DiscardOutput(threading.Thread):
def __init__(self, child):
self.child = child
threading.Thread.__init__(self)
def run(self):
# discard all output, expecting to program exit
self.child.expect(pexpect.EOF)
bash = pexpect.spawn('bash', echo=False)
bash.sendline('n=0; while [ $n -lt 10000 ]; do echo $n; '
'let n="$n + 1"; done; exit')
# in this example, we care only that we've reached #100,
bash.expect(re.compile('\s100\s'))
# after which, we don't care what happens; we begin discarding output
thread = DiscardOutput(bash)
thread.start()
thread.join()
You may also use the "disown" facility of bash(1) to put the child process in
the background, then detatch it from the parent process::
from pexpect import spawn, EOF
# first, start bash
jot = spawn('bash')
# then start the process that will run for long time
jot.sendline('jot 100000 1')
# Look for a marker (here, 220 surrounded by newlines)
jot.expect(re.compile('\s220\s'))
# stop the jot(1) process (SIGSTOP)
jot.sendcontrol('z')
# wait for bash to return to prompt
jot.expect(u'Stopped')
# put jot(1) in background,
# disown process ownership,
# exit bash.
jot.sendline('bg; disown; exit')
# wait for bash to exit
jot.expect(EOF)
# the program jot(1) has continued and completed
# without requiring read from parent.
Timing issue with send() and sendline()
---------------------------------------
This problem has been addressed and should not affect most users.
It is sometimes possible to read an echo of the string sent with
:meth:`~pexpect.spawn.send` and :meth:`~pexpect.spawn.sendline`. If you call
:meth:`~pexpect.spawn.send` and then immediately call :meth:`~pexpect.spawn.readline`,
you may get part of your output echoed back. You may read back what you just
wrote even if the child application does not explicitly echo it. Timing is
critical. This could be a security issue when talking to an application that
asks for a password; otherwise, this does not seem like a big deal. But why do
TTYs do this?
People usually report this when they are trying to control SSH or some other
login. For example, if your code looks something like this::
child.expect ('[pP]assword:')
child.sendline (my_password)
1. SSH prints "password:" prompt to the user.
2. SSH turns off echo on the TTY device.
3. SSH waits for user to enter a password.
When scripting with Pexpect what can happen is that Pexpect will respond to the
"password:" prompt before SSH has had time to turn off TTY echo. In other words,
Pexpect sends the password between steps 1. and 2., so the password gets echoed
back to the TTY. I would call this an SSH bug.
Pexpect now automatically adds a short delay before sending data to a child
process. This more closely mimics what happens in the usual human-to-app
interaction. The delay can be tuned with the ``delaybeforesend`` attribute of the
spawn class. In general, this fixes the problem for everyone and so this should
not be an issue for most users. For some applications you might with to turn it
off::
child = pexpect.spawn ("ssh user@example.com")
child.delaybeforesend = 0
Timing issue with isalive()
---------------------------
Reading the state of :meth:`~pexpect.spawn.isalive` immediately after a child
exits may sometimes return 1. This is a race condition. The child has closed its
file descriptor, but has not yet fully exited before Pexpect's
:meth:`~pexpect.spawn.isalive` executes. Addings a slight delay before the
:meth:`~pexpect.spawn.isalive` call will help. For example::
child = pexpect.spawn('ls')
child.expect(pexpect.EOF)
time.sleep(0.1)
print child.isalive()
Truncated output just before child exits
----------------------------------------
So far I have seen this only on older versions of Apple's MacOS X. If the child
application quits it may not flush its output buffer. This means that your
Pexpect application will receive an EOF even though it should have received a
little more data before the child died. This is not generally a problem when
talking to interactive child applications. One example where it is a problem is
when trying to read output from a program like *ls*. You may receive most of the
directory listing, but the last few lines will get lost before you receive an EOF.
The reason for this is that *ls* runs; completes its task; and then exits. The
buffer is not flushed before exit so the last few lines are lost. The following
example demonstrates the problem::
child = pexpect.spawn('ls -l')
child.expect(pexpect.EOF)
print child.before
Controlling SSH on Solaris
--------------------------
Pexpect does not yet work perfectly on Solaris. One common problem is that SSH
sometimes will not allow TTY password authentication. For example, you may
expect SSH to ask you for a password using code like this::
child = pexpect.spawn('ssh user@example.com')
child.expect('password')
child.sendline('mypassword')
You may see the following error come back from a spawned child SSH::
Permission denied (publickey,keyboard-interactive).
This means that SSH thinks it can't access the TTY to ask you for your password.
The only solution I have found is to use public key authentication with SSH.
This bypasses the need for a password. I'm not happy with this solution. The
problem is due to poor support for Solaris Pseudo TTYs in the Python Standard
Library.
child does not receive full input, emits BEL
--------------------------------------------
You may notice when running for example cat(1) or base64(1), when sending a
very long input line, that it is not fully received, and the BEL ('\a') may
be found in output.
By default the child terminal matches the parent, which is often in "canonical
mode processing". You may wish to disable this mode. The exact limit of a line
varies by operating system, and details of disabling canonical mode may be
found in the docstring of :meth:`~pexpect.spawn.send`.
|