#!/usr/bin/env python3 # -*- coding: utf-8 -*- # # Tunnelmon is an AutoSSH tunnel monitor # It gives a curses user interface to monitor existing SSH tunnel that are managed with autossh. # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . # # Author : nojhan # ################################################################################################# # CORE ################################################################################################# import signal import time import curses import os import subprocess import logging import psutil import socket import re import collections import itertools class Tunnel: def __init__(self, ssh_pid=None, in_port=None, via_host=None, target_host=None, out_port=None, forward=None): # assert ssh_pid is not None self.ssh_pid = ssh_pid assert in_port is not None self.in_port = in_port assert via_host is not None self.via_host = via_host assert target_host is not None self.target_host = target_host assert out_port is not None self.out_port = out_port assert forward is not None self.forwards = {'L':'local', 'R':'remote', 'D': 'dynamic'} if forward in self.forwards: self.forward = self.forwards[forward] else: self.forward = "unknown" self.connections = [] def repr_tunnel(self): return "%s\t%i\t%i\t%s\t%s\t%i" % ( self.forward, self.ssh_pid, self.in_port, self.via_host, self.target_host, self.out_port) def repr_connections(self): # list of tunnels linked to this process rep = "" for c in self.connections: rep += "\n\t↳ %s" % c return rep def __repr__(self): return self.repr_tunnel() + self.repr_connections() class AutoTunnel(Tunnel): def __init__(self, autossh_pid=None, *args, **kwargs): super().__init__(*args, **kwargs) assert autossh_pid is not None self.autossh_pid = autossh_pid def repr_tunnel(self): rep = super().repr_tunnel() return "auto\t" + rep class RawTunnel(Tunnel): def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) def repr_tunnel(self): rep = super().repr_tunnel() return "ssh\t" + rep class Connection: """A dictionary that stores an SSH connection related to a tunnel""" def __init__(self, local_address=None, in_port=None, foreign_address=None, out_port=None, status=None, family=None): # informations available with netstat assert local_address is not None self.local_address = local_address assert in_port is not None self.in_port = in_port self.foreign_address = foreign_address self.out_port = out_port assert status is not None self.status = status assert family is not None self.family = family self.family_rep = {socket.AddressFamily.AF_INET: "INET", socket.AddressFamily.AF_INET6: "INET6", socket.AddressFamily.AF_UNIX: "UNIX"} # FIXME would be nice to have an estimation of the connections latency #self.latency = 0 def __repr__(self): # do not logging.debug all the informations by default if self.foreign_address and self.out_port: return "%s\t%s\t%s:%i → %s:%i" % ( self.family_rep[self.family], self.status, self.local_address, self.in_port, self.foreign_address, self.out_port, ) else: return "%s\t%s\t%s:%i" % ( self.family_rep[self.family], self.status, self.local_address, self.in_port, ) class TunnelsParser: def __init__(self): """Warning: the initialization does not gather tunnels informations, use update() to do so""" # { ssh_pid : Tunnel } self.tunnels = collections.OrderedDict() # do not perform update by default # this is necessary because one may want # only a list of connections OR autossh processes # self.update() self.re_forwarding = re.compile(r"-\w*([LRD])\w*\s*(\d+):(.*):(\d+)") self.header = 'TYPE\tFORWARD\tSSHPID\tINPORT\tVIA\tTARGET\tOUTPORT' def get_tunnel(self, pos): pid = list(self.tunnels.keys())[pos] return self.tunnels[pid] def parse(self, cmd): try: cmdline = " ".join(cmd) except TypeError: cmdline = cmd logging.debug('autossh cmd line: %s', cmdline) logging.debug('forwarding regexp: %s', self.re_forwarding) match = self.re_forwarding.findall(cmdline) logging.debug(match) if match: assert len(match) == 1 forward, in_port, target_host, out_port = match[0] logging.debug("matches: %s", match) else: raise ValueError("is not a ssh tunnel") # Find the hostname on wich the tunnel is built. via_host = "unknown" # Search backward and take the first parameter argument. # FIXME this is an ugly hack i = 1 while i < len(cmd): logging.debug("ici: %i %s", i, cmd[i]) if cmd[i][0] == '-': if cmd[i][1] in '46AaCfGgKkMNnqsTtVvXxYy': # flag without argument pass elif len(cmd[i]) == 2: # the argument is likely the next one if (i < len(cmd) - 1) and (cmd[i + 1][0] != '-'): # not another flag (this should always be true) i += 1 # skip the argument # skip the argument i += 1 else: via_host = cmd[i] break return int(in_port), via_host, target_host, int(out_port), forward def update(self): """Gather and parse informations from the operating system""" self.tunnels.clear() # Browse the SSH processes handling a tunnel. for proc in psutil.process_iter(): try: process = proc.as_dict(attrs=['pid', 'ppid', 'name', 'cmdline', 'connections']) cmd = process['cmdline'] except psutil.NoSuchProcess: pass else: if process['name'] == 'ssh': logging.debug(process) try: in_port, via_host, target_host, out_port, forward = self.parse(cmd) except ValueError: continue logging.debug("%s %s %s %s %s", in_port, via_host, target_host, out_port, forward) # Check if this ssh tunnel is managed by autossh. parent = psutil.Process(process['ppid']) if parent.name() == 'autossh': # Add an autossh tunnel. pid = parent.pid # autossh pid self.tunnels[pid] = AutoTunnel(pid, process['pid'], in_port, via_host, target_host, out_port, forward) else: # Add a raw tunnel. pid = process['pid'] self.tunnels[pid] = RawTunnel(pid, in_port, via_host, target_host, out_port, forward) for c in process['connections']: logging.debug(c) laddr, lport = c.laddr if c.raddr: raddr, rport = c.raddr else: raddr, rport = (None, None) connection = Connection(laddr, lport, raddr, rport, c.status, c.family) logging.debug(connection) self.tunnels[pid].connections.append(connection) logging.debug(self.tunnels) def __repr__(self): reps = [self.header] for t in self.tunnels: reps.append(str(self.tunnels[t])) return "\n".join(reps) ################################################################################################# # INTERFACES ################################################################################################# class CursesMonitor: """Textual user interface to display up-to-date informations about current tunnels""" def __init__(self, scr): # hide cursor curses.curs_set(0) # curses screen self.scr = scr # tunnels monitor self.tp = TunnelsParser() # selected line self.cur_line = -1 # selected pid self.cur_pid = -1 # switch to show only autoss processes (False) or ssh connections also (True) self.show_connections = False # FIXME pass as parameters+options self.update_delay = 1 # seconds of delay between two data updates self.ui_delay = 0.05 # seconds between two screen update # colors # 0:black, 1:red, 2:green, 3:yellow, 4:blue, 5:magenta, 6:cyan, and 7:white. self.colors_tunnel = { 'kind_auto' : curses.COLOR_CYAN, 'kind_raw' : curses.COLOR_BLUE, 'ssh_pid' : curses.COLOR_WHITE, 'in_port' : curses.COLOR_YELLOW, 'out_port' : curses.COLOR_YELLOW, 'in_port_priv' : curses.COLOR_RED, 'out_port_priv' : curses.COLOR_RED, 'via_host' : curses.COLOR_GREEN, 'target_host' : curses.COLOR_GREEN, 'via_local' : curses.COLOR_BLUE, 'target_local' : curses.COLOR_BLUE, 'via_priv' : curses.COLOR_CYAN, 'target_priv' : curses.COLOR_CYAN, 'tunnels_nb' : curses.COLOR_RED, 'tunnels_nb_none': curses.COLOR_RED, 'forward_local' : curses.COLOR_BLUE, 'forward_remote' : curses.COLOR_CYAN, 'forward_dynamic': curses.COLOR_YELLOW, 'forward_unknown': curses.COLOR_WHITE, } self.colors_highlight = { 'kind_auto' : 9, 'kind_raw' : 9, 'ssh_pid' : 9, 'in_port' : 9, 'out_port' : 9, 'in_port_priv' : 9, 'out_port_priv' : 9, 'via_host' : 9, 'target_host' : 9, 'via_local' : 9, 'target_local' : 9, 'via_priv' : 9, 'target_priv' : 9, 'tunnels_nb' : 9, 'tunnels_nb_none': 9, 'forward_local' : 9, 'forward_remote' : 9, 'forward_dynamic': 9, 'forward_unknown': 9, } self.colors_connection = { 'ssh_pid' : curses.COLOR_WHITE, 'autossh_pid' : curses.COLOR_WHITE, 'status' : curses.COLOR_CYAN, 'status_out' : curses.COLOR_RED, 'local_address' : curses.COLOR_BLUE, 'foreign_address': curses.COLOR_GREEN, 'in_port' : curses.COLOR_YELLOW, 'out_port' : curses.COLOR_YELLOW, 'in_port_priv' : curses.COLOR_RED, 'out_port_priv' : curses.COLOR_RED, } self.header = ("TYPE", "FORWARD", "SSHPID", "INPORT", "VIA", "TARGET", "OUTPORT") def do_Q(self): """Quit""" logging.debug("Waited: %s" % self.log_ticks) self.log_ticks = "" logging.debug("Key pushed: Q") return False def do_R(self): """Reload autossh tunnel""" logging.debug("Waited: %s" % self.log_ticks) self.log_ticks = "" logging.debug("Key pushed: R") # if a pid is selected if self.cur_pid != -1: # send the SIGUSR1 signal if type(self.tp.get_tunnel(self.cur_line)) == AutoTunnel: # autossh performs a reload of existing tunnels that it manages logging.debug("SIGUSR1 on PID: %i" % self.cur_pid) os.kill(self.cur_pid, signal.SIGUSR1) else: logging.debug("Cannot reload a RAW tunnel") return True def do_C(self): """Close tunnel""" logging.debug("Waited: %s" % self.log_ticks) self.log_ticks = "" logging.debug("Key pushed: C") if self.cur_pid != -1: # send a SIGKILL # the related process is stopped # FIXME SIGTERM or SIGKILL ? tunnel = self.tp.get_tunnel(self.cur_line) if type(tunnel) == AutoTunnel: logging.debug("SIGKILL on autossh PID: %i" % self.cur_pid) try: os.kill(self.cur_pid, signal.SIGKILL) except OSError: logging.error("No such process: %i" % self.cur_pid) logging.debug("SIGKILL on ssh PID: %i" % tunnel.ssh_pid) try: os.kill(tunnel.ssh_pid, signal.SIGKILL) except OSError: logging.error("No such process: %i" % tunnel.ssh_pid) self.cur_line -= 1 self.cur_pid = -1 # FIXME update cur_pid or get rid of it everywhere return True def do_N(self): """Show connections""" logging.debug("Waited: %s" % self.log_ticks) self.log_ticks = "" logging.debug("Key pushed: N") self.show_connections = not self.show_connections return True def do_258(self): """Move down""" logging.debug("Waited: %s" % self.log_ticks) self.log_ticks = "" logging.debug("Key pushed: down") # if not the end of the list if self.cur_line < len(self.tp.tunnels)-1: self.cur_line += 1 # get the pid if type(self.tp.get_tunnel(self.cur_line)) == AutoTunnel: self.cur_pid = self.tp.get_tunnel(self.cur_line).autossh_pid else: self.cur_pid = self.tp.get_tunnel(self.cur_line).ssh_pid return True def do_259(self): """Move up""" logging.debug("Waited: %s" % self.log_ticks) self.log_ticks = "" logging.debug("Key pushed: up") if self.cur_line > -1: self.cur_line -= 1 if self.cur_line > 0: self.cur_pid = self.tp.get_tunnel(self.cur_line).ssh_pid return True def __call__(self): """Start the interface""" self.scr.clear() # clear all self.scr.nodelay(1) # non-bloking getch # first display self.display() # first update counter self.last_update = time.perf_counter() self.last_state = None self.log_ticks = "" # infinite loop notquit = True while(notquit): # wait some time # necessary to not overload the system with unnecessary calls time.sleep(self.ui_delay) # if its time to update if time.time() > self.last_update + self.update_delay: self.tp.update() # reset the counter self.last_update = time.time() state = "%s" % self.tp if state != self.last_state: logging.debug("Waited: %s" % self.log_ticks) self.log_ticks = "" logging.debug("----- Time of screen update: %s -----" % time.time()) logging.debug("State of tunnels:\n%s" % self.tp) self.last_state = state else: self.log_ticks += "." kc = self.scr.getch() # keycode if kc != -1: # if keypress pass ch = chr(0) if 0 < kc < 256: # if ascii key # ascii character from the keycode ch = chr(kc) # Call the do_* handler. fch = "do_%s" % ch.capitalize() fkc = "do_%i" % kc logging.debug("key func: %s / %s" % (fch, fkc)) if fch in dir(self): notquit = eval("self."+fch+"()") elif fkc in dir(self): notquit = eval("self."+fkc+"()") logging.debug("notquit = %s" % notquit) # update the display self.display() # force a screen refresh self.scr.refresh() # end of the loop def format(self): """Prepare formating strings to pad with spaces up to the tolumn header width.""" reps = [self.tp.tunnels[t].repr_tunnel() for t in self.tp.tunnels] tuns = [t.split() for t in reps] tuns.append(self.header) cols = itertools.zip_longest(*tuns, fillvalue='') widths = [max(len(s) for s in col) for col in cols] logging.debug(widths) fmt = ['{{: <{}}}'.format(w) for w in widths] logging.debug(fmt) return fmt def display(self): """Generate the interface screen""" # Automagically format help line with available do_* handlers. h = [] for f in dir(self): if "do_" in f: key = f.replace("do_", "") if key.isalpha(): # We do not want arrows. msg = "[%s] %s" % (key, eval("self.%s.__doc__" % f)) h.append(msg) help_msg = ", ".join(h) help_msg += "\n" self.scr.addstr(0, 0, help_msg, curses.color_pair(4)) self.scr.clrtoeol() # Second line self.scr.addstr("Active tunnels: ", curses.color_pair(6)) self.scr.addstr(str(len(self.tp.tunnels)), curses.color_pair(1)) self.scr.addstr(" / Active connections: ", curses.color_pair(6)) self.scr.addstr(str(sum([len(self.tp.tunnels[t].connections) for t in self.tp.tunnels])), curses.color_pair(1)) self.scr.addstr('\n', curses.color_pair(1)) self.scr.clrtoeol() # if no line is selected color = 0 if self.cur_line == -1: # selected color for the header color = 9 self.cur_pid = -1 # header line header_msg = " ".join(self.format()).format(*self.header) header_msg += " CONNECTIONS" self.scr.addstr(header_msg, curses.color_pair(color)) self.scr.clrtoeol() # for each tunnel processes available in the monitor for l in range(len(self.tp.tunnels)): # add a line for the l-th autossh process self.add_tunnel(l) # if one want to show connections if self.show_connections: # and os.getuid() == 0: self.add_connection(l) self.scr.clrtobot() def add_connection(self, line): """Add lines for each connections related to the l-th autossh process""" colors = self.colors_connection # for each connections related to te line-th autossh process for t in sorted(self.tp.get_tunnel(line).connections, key=lambda c: c.status): # FIXME fail if the screen's height is too small. self.scr.addstr('\n\t+ ') color = self.colors_connection['status'] # if the connections is established # TODO avoid hard-coded constants if t.status != 'ESTABLISHED' and t.status != 'LISTEN': color = self.colors_connection['status_out'] self.scr.addstr(t.status, curses.color_pair(color)) self.scr.addstr('\t') # self.scr.addstr( str( t['ssh_pid'] ), curses.color_pair(colors['ssh_pid'] ) ) # self.scr.addstr( '\t' ) self.scr.addstr(str(t.local_address), curses.color_pair(colors['local_address'])) self.scr.addstr(':') self.scr.addstr(str(t.in_port), curses.color_pair(colors['in_port'])) if t.foreign_address and t.out_port: self.scr.addstr(' -> ') self.scr.addstr(str(t.foreign_address), curses.color_pair(colors['foreign_address'])) self.scr.addstr(':') self.scr.addstr(str(t.out_port), curses.color_pair(colors['out_port'])) self.scr.clrtoeol() def add_tunnel(self, line): """Add line corresponding to the line-th autossh process""" self.scr.addstr('\n') # Handle on the current tunnel object. t = self.tp.get_tunnel(line) # Highlight selected line. colors = self.colors_tunnel if self.cur_line == line: colors = self.colors_highlight # TYPE if type(self.tp.get_tunnel(line)) == AutoTunnel: # Format 'auto' using the 0th column format string and the related color.. self.scr.addstr(self.format()[0].format('auto'), curses.color_pair(colors['kind_auto'])) # Trailing space. self.scr.addstr(' ', curses.color_pair(colors['kind_auto'])) else: self.scr.addstr(self.format()[0].format('ssh'), curses.color_pair(colors['kind_raw'])) self.scr.addstr(' ', curses.color_pair(colors['kind_raw'])) # FORWARD fwd = t.forward self.scr.addstr(self.format()[1].format(fwd), curses.color_pair(colors['forward_'+fwd])) self.scr.addstr(' ', curses.color_pair(colors['forward_'+fwd])) # SSHPID self.add_tunnel_info('ssh_pid' , line, 2) # INPORT if t.in_port <= 1024: self.scr.addstr(self.format()[3].format(t.in_port), curses.color_pair(colors['in_port_priv'])) self.scr.addstr(' ', curses.color_pair(colors['in_port_priv'])) else: self.add_tunnel_info('in_port' , line, 3) # VIA if any(re.match(p,t.via_host) for p in ["^127\..*", "::1", "localhost"]): # loopback self.scr.addstr(self.format()[4].format(t.via_host), curses.color_pair(colors['via_local'])) self.scr.addstr(' ', curses.color_pair(colors['via_local'])) elif any(re.match(p,t.via_host) for p in ["^10\..*", "^172\.[123][0-9]*\..*", "^192\.0\.0\.[0-9]+", "^192\.168\..*", "64:ff9b:1:.*", "fc00::.*"]): # private network self.scr.addstr(self.format()[4].format(t.via_host), curses.color_pair(colors['via_priv'])) self.scr.addstr(' ', curses.color_pair(colors['via_priv'])) else: self.add_tunnel_info('via_host' , line, 4) # TARGET if any(re.match(p,t.target_host) for p in ["^127\..*", "::1", "localhost"]): # loopback self.scr.addstr(self.format()[5].format(t.target_host), curses.color_pair(colors['target_local'])) self.scr.addstr(' ', curses.color_pair(colors['target_local'])) elif any(re.match(p,t.target_host) for p in ["^10\..*", "^172\.[123][0-9]*\..*", "^192\.0\.0\.[0-9]+", "^192\.168\..*", "64:ff9b:1:.*", "fc00::.*"]): # private network self.scr.addstr(self.format()[5].format(t.target_host), curses.color_pair(colors['target_priv'])) self.scr.addstr(' ', curses.color_pair(colors['target_priv'])) else: self.add_tunnel_info('target_host' , line, 5) # OUTPORT if t.out_port <= 1024: self.scr.addstr(self.format()[6].format(t.out_port), curses.color_pair(colors['out_port_priv'])) self.scr.addstr(' ', curses.color_pair(colors['out_port_priv'])) else: self.add_tunnel_info('out_port' , line, 6) # CONNECTIONS nb = len(self.tp.get_tunnel(line).connections) if nb > 0: # for each connection related to this process for i in self.tp.get_tunnel(line).connections: # add a vertical bar | # the color change according to the status of the connection if i.status == 'ESTABLISHED' or i.status == 'LISTEN': self.scr.addstr('|', curses.color_pair(self.colors_connection['status'])) else: self.scr.addstr('|', curses.color_pair(self.colors_connection['status_out'])) else: # if os.geteuid() == 0: # if there is no connection, display a "None" self.scr.addstr('None', curses.color_pair(self.colors_tunnel['tunnels_nb_none'])) self.scr.clrtoeol() def add_tunnel_info(self, key, line, col): """Add an information of an autossh process, in the configured color""" colors = self.colors_tunnel # if the line is selected if self.cur_line == line: # set the color to the highlight one colors = self.colors_highlight txt = eval("str(self.tp.get_tunnel(line).%s)" % key) if key == 'target_host' or key == 'via_host': txt = eval("str(self.tp.get_tunnel(line).%s)" % key) self.scr.addstr(self.format()[col].format(txt), curses.color_pair(colors[key])) self.scr.addstr(' ', curses.color_pair(colors[key])) if __name__ == "__main__": import sys from optparse import OptionParser import configparser usage = """%prog [options] A user interface to monitor existing SSH tunnel that are managed with autossh. Called without options, Tunnelmon displays a list of tunnels on the standard output. Note: Users other than root will not see tunnels connections. Version 0.3""" parser = OptionParser(usage=usage) parser.add_option("-c", "--curses", action="store_true", default=False, help="Start the user interface in text mode.") parser.add_option("-n", "--connections", action="store_true", default=False, help="Display only SSH connections related to a tunnel.") parser.add_option("-u", "--tunnels", action="store_true", default=False, help="Display only the list of tunnels processes.") LOG_LEVELS = {'error': logging.ERROR, 'warning': logging.WARNING, 'debug': logging.DEBUG} parser.add_option('-l', '--log-level', choices=list(LOG_LEVELS), default='error', metavar='LEVEL', help='Log level (%s), default: %s.' % (", ".join(LOG_LEVELS), 'error')) parser.add_option('-g', '--log-file', default=None, metavar='FILE', help="Log to this file, default to standard output. \ If you use the curses interface, you may want to set this to actually see logs.") parser.add_option('-f', '--config-file', default=None, metavar='FILE', help="Use this configuration file (default: '~/.tunnelmon.conf')") (asked_for, args) = parser.parse_args() logmsg = "----- Started Tunnelmon -----" if asked_for.log_file: logfile = asked_for.log_file logging.basicConfig(filename=logfile, level=LOG_LEVELS[asked_for.log_level]) logging.debug(logmsg) logging.debug("Log in %s" % logfile) else: if asked_for.curses: logging.warning("It's a bad idea to log to stdout while in the curses interface.") logging.basicConfig(level=LOG_LEVELS[asked_for.log_level]) logging.debug(logmsg) logging.debug("Log to stdout") logging.debug("Asked for: %s", asked_for) # unfortunately, asked_for class has no __len__ method in python 2.4.3 (bug?) # if len(asked_for) > 1: # parser.error("asked_for are mutually exclusive") config = configparser.ConfigParser() if asked_for.config_file: try: config.read(asked_for.config_file) except configparser.MissingSectionHeaderError: logging.error("'%s' contains no known configuration", asked_for.config_file) else: try: config.read('~/.tunnelmon.conf') except configparser.MissingSectionHeaderError: logging.error("'%s' contains no known configuration", asked_for.config_file) # Load autossh instances by sections: [expected] # if config['expected']: if asked_for.curses: logging.debug("Entering curses mode") import curses import traceback try: scr = curses.initscr() curses.start_color() # 0:black, 1:red, 2:green, 3:yellow, 4:blue, 5:magenta, 6:cyan, 7:white curses.init_pair(1, curses.COLOR_RED, curses.COLOR_BLACK) curses.init_pair(2, curses.COLOR_GREEN, curses.COLOR_BLACK) curses.init_pair(3, curses.COLOR_YELLOW, curses.COLOR_BLACK) curses.init_pair(4, curses.COLOR_BLUE, curses.COLOR_BLACK) curses.init_pair(5, curses.COLOR_MAGENTA, curses.COLOR_BLACK) curses.init_pair(6, curses.COLOR_CYAN, curses.COLOR_BLACK) curses.init_pair(7, curses.COLOR_WHITE, curses.COLOR_BLACK) curses.init_pair(8, curses.COLOR_WHITE, curses.COLOR_GREEN) curses.init_pair(9, curses.COLOR_WHITE, curses.COLOR_BLUE) curses.noecho() curses.cbreak() scr.keypad(1) # create the monitor mc = CursesMonitor(scr) # call the monitor mc() scr.keypad(0) curses.echo() curses.nocbreak() curses.endwin() except: # end cleanly scr.keypad(0) curses.echo() curses.nocbreak() curses.endwin() # print the traceback traceback.print_exc() elif asked_for.connections: logging.debug("Entering connections mode") tp = TunnelsParser() tp.update() # do not call update() but only get connections logging.debug("UID: %i.", os.geteuid()) # if os.geteuid() == 0: for t in tp.tunnels: for c in tp.tunnels[t].connections: print(tp.tunnels[t].ssh_pid, c) # else: # logging.error("Only root can see SSH tunnels connections.") elif asked_for.tunnels: logging.debug("Entering tunnel mode") tp = TunnelsParser() tp.update() # do not call update() bu only get autossh processes print(tp.header) for t in tp.tunnels: print(tp.tunnels[t].repr_tunnel()) else: logging.debug("Entering default mode") tp = TunnelsParser() # call update tp.update() # call the default __repr__ print(tp)