最近編程中用到sftp上傳檔案,且需要用crontab預設定時上傳事件。而sftp不同於ftp,沒有提供選項如 -i 可以將密碼直接編碼進程式。使用sftp指令,會自動請求使用者輸入密碼。
總結一下可以避免sftp輸入密碼的三種方式:
1. lftp方式
LFTP是一款非常著名的字元介面的檔案傳輸工具。支援FTP、HTTP、FISH、SFTP、HTTPS和FTPS協議。
例子:(本例為下載192.168.107.132伺服器/home/huangmr下所有檔案的例子)
#!/bin/sh HOST=192.168.107.132 USER=huangmrPASS=huangmr echo "Starting to sftp..." lftp -u ${USER},${PASS} sftp://${HOST}:22 <<EOF cd /home/huangmrmget *.* bye EOF echo "done"
2. expect方式
Expect是一個免費的編程工具語言,用來實現自動和互動式任務進行通訊,而無需人的幹預。
要使用expect需要預先安裝tcl這個東西,然後再安裝expect包。
tcl: http://prdownloads.sourceforge.net/tcl/tcl8.4.16-src.tar.gz
expect: http://sourceforge.net/projects/expect/files/Expect/5.45/expect5.45.tar.gz/download
例子:
[plain] view plain copy #!/usr/local/bin/expect -f #<---insert here your expect program location #procedure to attempt connecting; result 0 if OK, 1 elsewhere proc connect {passw} { expect { "(yes/no)?" {send "yes/r";exp_continue} #第一次使用SFTP時候會要求輸入yes/no "password:" {send "$passw/r" #自動輸入密碼 expect { "sftp*" { #檢測返回sftp> return 0 } } } } # timed out return 1 } #read the input parameters set user [lindex $argv 0] set passw [lindex $argv 1] set host [lindex $argv 2] set location [lindex $argv 3] set file1 [lindex $argv 4] #puts "Am citit:/n"; #puts "user: $user"; #puts "passw: $passw"; #puts "host: $host"; #puts "location: $location"; #puts "file1: $file1"; #check if all were provided if { $user == "" || $passw == "" || $host == "" || $location == "" || $file1 == "" } { puts "Usage: <user> <passw> <host> <location> <file1 to send>/n" exit 1 } #sftp to specified host and send the files spawn sftp $user@$host set rez [connect $passw] if { $rez == 0 } { send "cd $location/r" set timeout -1 send "put $file1/r" #send "ls -l/r" #send "quit/r" #send "mkdir testsftp/r" send "quit/r" expect eof exit 0 } puts "/nCMD_ERR: connecting to server: $host!/n" exit 1 0
expect也可以用兩種形式調用
1 ./my.exp $usr $pwd $host $local $file
2. 代碼中直接插入
expect<<!
...
!
3. (推薦)產生金鑰組
因為這種方式不用把密鑰卸載程式裡,所以更安全 第一步:產生密匙對,我用的是rsa的密鑰。使用命令 "ssh-keygen -t rsa" [user1@rh user1]$ ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to save the key (/home/user1/.ssh/id_rsa): Created directory '/home/user1/.ssh'. Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/user1/.ssh/id_rsa. Your public key has been saved in /home/user1/.ssh/id_rsa.pub. The key fingerprint is: e0:f0:3b:d3:0a:3d:da:42:01:6a:61:2f:6c:a0:c6:e7 user1@rh.test.com [user1@rh user1]$
產生的過程中提示輸入金鑰組儲存位置,直接斷行符號,接受預設值就行了。接著會提示輸入一個不同於你的password的密碼,直接斷行符號,讓它空著。
當然,也可以輸入一個。(我比較懶,不想每次都要輸入密碼。) 這樣,金鑰組就產生完了。
其中公用密鑰儲存在 ~/.ssh/id_rsa.pub
私人密鑰儲存在 ~/.ssh/id_rsa 然後改一下 .ssh 目錄的許可權,使用命令 "chmod 755 ~/.ssh"
[user1@rh user1]$ chmod 755 ~/.ssh