LIBEXPECT

Section: C Library Functions (3)
Updated: 12 December 1991
Index Return to Main Contents
 

NAME

libexpect - programmed dialogue with interactive programs - C functions  

SYNOPSIS

#include <expect.h>

int
exp_spawnl(file, arg0 [, arg1, ..., argn] (char *)0);
char *file;
char *arg0, *arg1, ... *argn;

int
exp_spawnv(file,argv);
char *file, *argv[ ];

FILE *
exp_popen(command);
char *command;

extern int exp_pid;
extern char *exp_stty_init;

cc files... -lexpect

 

DESCRIPTION

exp_spawnl and exp_spawnv fork a new process so that its stdin, stdout, and stderr can be written and read by the current process. file is the name of a file to be executed. The arg pointers are null-terminated strings. Following the style of execve(), arg0 (or argv[0]) is customarily a duplicate of the name of the file.

Three interfaces are available, exp_spawnl is useful when the number of arguments is known at compile time. exp_spawnv is useful when the number of arguments is not known at compile time. exp_popen is explained later on.

If the process is successfully created, a file descriptor is returned which corresponds to the process's stdin, stdout and stderr. A stream may be associated with the file descriptor by using fdopen(). (This should almost certainly be followed by setbuf() to unbuffer the I/O.)

Closing the file descriptor will typically be detected by the process as an EOF. Once such a process exits, it should be waited upon (via wait) in order to free up the kernel process slot. (Some systems allow you to avoid this if you ignore the SIGCHLD signal).

exp_popen is yet another interface, styled after popen(). It takes a Bourne shell command line, and returns a stream that corresponds to the process's stdin, stdout and stderr. The actual implementation of exp_popen below demonstrates exp_spawnl.

FILE *
exp_popen(program)
char *program;
{
        FILE *fp;
        int ec;

        if (0 > (ec = exp_spawnl("sh","sh","-c",program,(char *)0)))
                return(0);
        if (NULL == (fp = fdopen(ec,"r+")) return(0);
        setbuf(fp,(char *)0);
        return(fp);
}

After a process is started, the variable exp_pid is set to the process-id of the new process.

The spawn functions uses a pty to communicate with the process. By default, the pty is initialized the same way as the user's tty. When this is not possible (i.e., expect was not started with a controlling terminal), spawn uses the tty settings that correspond to "stty sane". If the variable exp_stty_init is defined, it is interpreted in the style of stty arguments as further configuration for any pty used by future spawn commands. For example, exp_stty_init = "sane"; repeats the default initialization.

 

IF YOU WANT TO ALLOCATE YOUR OWN PTY

extern int exp_autoallocpty;
extern int exp_pty[2];

The spawn functions use a pty to communicate with the process. By default, a pty is automatically allocated each time a process is spawned. If you want to allocate ptys yourself, before calling one of the spawn functions, set exp_autoallocpty to 0, exp_pty[0] to the master pty file descriptor and exp_pty[1] to the slave pty file descriptor. The expect library will not do any pty initializations (e.g., exp_stty_init will not be used). The slave pty file descriptor will be automatically closed when the process is spawned. After the process is started, all further communication takes place with the master pty file descriptor.

exp_spawnl and exp_spawnv duplicate the shell's actions in searching for an executable file in a list of directories. The directory list is obtained from the environment.  

EXPECT PROCESSING

While it is possible to use read() to read information from a process spawned by exp_spawnl or exp_spawnv, more convenient functions are provided. They are as follows:
int
exp_expectl(fd,pattern1,value1,pattern2,value2,....,(char *)0);
int fd;
char pattern1, pattern2, ...;
int value1, value2, ...;

int
exp_fexpectl(fp,pattern1,value1,pattern2,value2,....,(char *)0);
FILE *fp;
char pattern1, pattern2, ...;
int value1, value2, ...;

struct exp_case {
};

int
exp_expectv(fd,cases);
int fd;
struct exp_case *cases;

int
exp_fexpectv(fp,cases);
FILE *fp;
struct exp_case *cases;

extern unsigned int exp_timeout;
extern char *exp_match;
extern int exp_match_max;

The functions wait until the output from a process matches one of the patterns, a specified time period has passed, or an EOF is seen.

The first argument to each function is either a file descriptor or a stream. Successive arguments are pairs of patterns and associated integer values. exp_expectv and exp_fexpectv are useful when the number of patterns is not known in advance. In this case, the pairs are provided in an array. The end of the array is denoted by a pair with pattern (char *)0. For the rest of this discussion, these functions will be referred to generically as expect.

If a pattern matches, then the corresponding value is returned. Values need not be unique. Upon EOF or timeout, the value EXP_EOF or EXP_TIMEOUT is returned. The default timeout period is 10 seconds but may be changed by setting the variable exp_timeout. The exact string that matched (or had been read if a timeout or EOF occurred) is saved in the variable exp_match.

Each time new input arrives, it is compared to each pattern in the order they are listed. Thus, you may test for absence of a match by making the last pattern something guaranteed to appear, such as a prompt. In situations where there is no prompt, you must check for EXP_TIMEOUT (just like you would if you were interacting manually). More philosophy and strategies on specifying expect patterns can be found in the documentation on the expect program, itself. See SEE ALSO below.

Patterns are the usual C-shell-style regular expressions. For example, the following fragment looks for a successful login, such as from a telnet dialogue.

        switch (exp_expectl(
                "*connected*",CONN,
                "*busy*",BUSY,
                "*failed*",ABORT,
                "*invalid password*",ABORT)) {
        case CONN:      /* logged in successfully */
                break;
        case BUSY:      /* couldn't log in at the moment */
                break;
        case EXP_TIMEOUT:
        case ABORT:     /* can't log in at any moment! */
                break;
        default: /* problem with expect */
        }

Asterisks (as in the example above) are a useful shorthand for omitting line-termination characters and other detail. Patterns must match the entire output of the current process (since the previous read on the descriptor or stream). More than 2000 bytes of output can force earlier bytes to be "forgotten". This may be changed by setting the variable exp_match_max. Note that excessively large values can slow down the pattern matcher.  

RUNNING IN THE BACKGROUND

extern int exp_disconnected;
int disconnect();

It is possible to move a process into the background after it has begun running. A typical use for this is to read passwords and then go into the background to sleep before using the passwords to do real work.

To move a process into the background, fork, call disconnect() in the child process and exit() in the parent process. This disassociates your process from the controlling terminal. If you wish to move a process into the background in a different way, you must set the variable exp_disconnect to 1. This allows processes spawned after this point to be started correctly.  

ERRORS

All functions indicate errors by returning -1 and setting errno.

Errors that occur after the spawn functions fork (e.g., attempting to spawn a non-existent program) are written to the process's stderr, and will be read by the first expect.  

SIGNALS

extern int exp_reading;
extern jmp_buf exp_readenv;

expect uses alarm() to timeout, thus if you generate alarms during expect, it will timeout prematurely.

Internally, expect calls read() which can be interrupted by signals. If you define signal handlers, you can choose to restart or abort expect's internal read. The variable, exp_reading, is true iff expect's read has been interrupted. longjmp(exp_readenv,1) will abort the read. longjmp(exp_readenv,2) will restart the read.  

DEBUGGING

While I consider the library to be easy to use, I think that the standalone expect program is much, much, easier to use than working with the C compiler and its usual edit, compile, debug cycle. Unlike typical C programs, most of the debugging isn't getting the C compiler to accept your programs - rather, it is getting the dialogue correct. Also, translating scripts from expect to C is usually not necessary. For example, the speed of interactive dialogues is virtually never an issue. So please try the standalone 'expect' program first. I suspect it is a more appropriate solution for most people than the library.

Nonetheless, if you feel compelled to debug in C, here are some tools to help you.

extern int exp_loguser;
extern int exp_logfile_all
extern FILE *exp_logfile;
extern int exp_is_debugging;
extern FILE *exp_debugfile;

While expect dialogues seem very intuitive, trying to codify them in a program can reveal many surprises in a program's interface. Therefore a variety of debugging aids are available. They are controlled by the above variables, all 0 by default.

If exp_loguser is nonzero, expect sends any output from exp_pty to stdout. Since interactive programs typically echo their input, this usually suffices to show both sides of the conversation. If exp_logfile is also nonzero, this same output is written to the stream defined by exp_logfile. If exp_logfile_all is non-zero, exp_logfile is written regardless of the value of exp_loguser.

Debugging information internal to expect is sent to stderr when exp_is_debugging is non-zero. The debugging information includes every character received, and every attempt made to match the current input against the patterns. In addition, non-printable characters are translated to a printable form. For example, a control-C appears as a caret followed by a C. If exp_logfile is non-zero, this information is also written to that stream.

If exp_debugfile is non-zero, all normal and debugging information is written to that stream, regardless of the value of exp_is_debugging.  

CAVEATS

The expect functions automatically remove nulls from incoming streams before doing pattern matching. This allows the programmer (i.e., you) to use C-style strings in the arguments.

The stream versions of the expect functions are much slower than the file descriptor versions because there is no way to portably read an unknown number of bytes without the potential of timing out. Thus, characters are read one at a time. You are therefore strongly encouraged to use the file descriptor versions of expect (although, automated versions of interactive programs don't usually demand high speed anyway).

You can actually get the best of both worlds, writing with the usual stream functions and reading with the file descriptor versions of expect as long as you don't attempt to intermix other stream input functions (e.g., fgetc). To do this, pass fileno(stream) as the file descriptor each time. Fortunately, there is little reason to use anything but the expect functions when reading from interactive programs.

There is no matching exp_pclose to exp_popen (unlike popen and pclose). It only takes two functions to close down a connection (fclose() followed by waiting on the pid), but it is not uncommon to separate these two actions by large time intervals, so the function seems of little value.

If you are running on a Cray running Unicos (all I know for sure from experience), you must run your compiled program as root or setuid. The problem is that the Cray only allows root processes to open ptys. You should observe as much precautions as possible: If you don't need permissions, setuid(0) only immediately before calling one of the spawn functions and immediately set it back afterwards.

Normally, spawn takes little time to execute. If you notice spawn taking a significant amount of time, it is probably encountering ptys that are wedged. A number of tests are run on ptys to avoid entanglements with errant processes. (These take 10 seconds per wedged pty.) Running expect with the -d option will show if expect is encountering many ptys in odd states. If you cannot kill the processes to which these ptys are attached, your only recourse may be to reboot.  

BUGS

The exp_fexpect functions don't work at all under HP-UX. Follow the advice (above) about using the exp_expect functions. If you fix the problem (before I do - please check the latest release) let me know.  

SEE ALSO

An alternative to this library is the expect program. expect interprets scripts written in a high-level language which direct the dialogue. In addition, the user can take control and interact directly when desired. If it is not absolutely necessary to write your own C program, it is much easier to use expect to perform the entire interaction. It is described further in the following references:

"expect: Curing Those Uncontrollable Fits of Interactivity" by Don Libes, Proceedings of the Summer 1990 USENIX Conference, Anaheim, California, June 11-15, 1990.

"Using expect to Automate System Administration Tasks" by Don Libes, Proceedings of the 1990 USENIX Large Installation Systems Administration Conference, Colorado Springs, Colorado, October 17-19, 1990.

expect(1), alarm(3), read(2), write(2), fdopen(3), execve(2), execvp(3), longjmp(3), pty(4).

There are several examples C programs in the test directory of expect's source distribution which use the expect library.

 

AUTHOR

Don Libes, libes@cme.nist.gov, National Institute of Standards and Technology  

ACKNOWLEDGEMENTS

Thanks to John Ousterhout (UCBerkeley) for supplying the pattern matcher.

Design and implementation of the expect library was paid for by the U.S. government and is therefore in the public domain. However the author and NIST would like credit if this program and documentation or portions of them are used.


 

Index

NAME
SYNOPSIS
DESCRIPTION
IF YOU WANT TO ALLOCATE YOUR OWN PTY
EXPECT PROCESSING
RUNNING IN THE BACKGROUND
ERRORS
SIGNALS
DEBUGGING
CAVEATS
BUGS
SEE ALSO
AUTHOR
ACKNOWLEDGEMENTS

This document was created by man2html, using the manual pages.
Time: 17:13:34 GMT, January 16, 2023