/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.59 - (hide annotations)
Sat Oct 4 10:11:44 2025 UTC (5 months, 1 week ago) by sysadm
Branch: MAIN
Changes since 1.58: +180 -163 lines
Content type: text/x-csrc
Fix bug in epoll event handling

1 sysadm 1.1 /***************************************************************************
2 sysadm 1.14 bbs_net.c - description
3     -------------------
4 sysadm 1.25 Copyright : (C) 2004-2025 by Leaflet
5     Email : leaflet@leafok.com
6 sysadm 1.1 ***************************************************************************/
7    
8     /***************************************************************************
9     * *
10     * This program is free software; you can redistribute it and/or modify *
11     * it under the terms of the GNU General Public License as published by *
12 sysadm 1.25 * the Free Software Foundation; either version 3 of the License, or *
13 sysadm 1.1 * (at your option) any later version. *
14     * *
15     ***************************************************************************/
16    
17     #include "bbs.h"
18     #include "common.h"
19 sysadm 1.55 #include "io.h"
20 sysadm 1.15 #include "log.h"
21 sysadm 1.55 #include "login.h"
22     #include "menu.h"
23 sysadm 1.15 #include "screen.h"
24 sysadm 1.55 #include <errno.h>
25     #include <fcntl.h>
26     #include <netdb.h>
27     #include <stdarg.h>
28 sysadm 1.1 #include <stdio.h>
29 sysadm 1.55 #include <stdlib.h>
30 sysadm 1.29 #include <string.h>
31     #include <time.h>
32     #include <unistd.h>
33 sysadm 1.55 #include <arpa/inet.h>
34     #include <libssh/libssh.h>
35     #include <libssh/server.h>
36     #include <libssh/callbacks.h>
37     #include <netinet/in.h>
38     #include <netinet/ip.h>
39 sysadm 1.29 #include <sys/select.h>
40 sysadm 1.1 #include <sys/ioctl.h>
41     #include <sys/socket.h>
42 sysadm 1.38 #include <sys/epoll.h>
43 sysadm 1.1
44 sysadm 1.26 #define MENU_CONF_DELIM " \t\r\n"
45    
46 sysadm 1.14 #define MAX_PROCESS_BAR_LEN 30
47     #define MAXSTATION 26 * 2
48     #define STATION_PER_LINE 4
49 sysadm 1.1
50     struct _bbsnet_conf
51     {
52 sysadm 1.14 char host1[20];
53     char host2[40];
54     char ip[40];
55 sysadm 1.24 in_port_t port;
56 sysadm 1.1 } bbsnet_conf[MAXSTATION];
57    
58     MENU_SET bbsnet_menu;
59    
60 sysadm 1.14 int load_bbsnet_conf(const char *file_config)
61 sysadm 1.1 {
62 sysadm 1.14 FILE *fp;
63     MENU *p_menu;
64 sysadm 1.41 MENU_ITEM *p_menu_item;
65     MENU_ITEM_ID menu_item_id;
66 sysadm 1.18 char t[256], *t1, *t2, *t3, *t4, *saveptr;
67 sysadm 1.14
68     fp = fopen(file_config, "r");
69     if (fp == NULL)
70 sysadm 1.20 {
71 sysadm 1.14 return -1;
72 sysadm 1.20 }
73 sysadm 1.14
74 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
75     if (bbsnet_menu.p_menu_pool == NULL)
76     {
77     log_error("calloc(p_menu_pool) error\n");
78     return -3;
79     }
80     bbsnet_menu.menu_count = 1;
81    
82     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
83     if (bbsnet_menu.p_menu_item_pool == NULL)
84     {
85     log_error("calloc(p_menu_item_pool) error\n");
86     return -3;
87     }
88     bbsnet_menu.menu_item_count = MAXSTATION;
89    
90     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
91 sysadm 1.40
92 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
93     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
94 sysadm 1.14 p_menu->title.show = 0;
95 sysadm 1.41 p_menu->screen_show = 0;
96 sysadm 1.1
97 sysadm 1.41 menu_item_id = 0;
98     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
99 sysadm 1.14 {
100 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
101     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
102     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
103     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
104 sysadm 1.14
105 sysadm 1.26 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t[0] == '#' || t[0] == '*')
106 sysadm 1.18 {
107 sysadm 1.14 continue;
108 sysadm 1.18 }
109    
110 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
111     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
112     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
113     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
114     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
115     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
116     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
117 sysadm 1.14
118 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
119     if (p_menu_item == NULL)
120     {
121     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
122     return -1;
123     }
124 sysadm 1.14
125 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
126     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
127     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
128     p_menu_item->submenu = 0;
129     p_menu_item->priv = 0;
130     p_menu_item->level = 0;
131     p_menu_item->name[0] =
132     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
133     p_menu_item->name[1] = '\0';
134     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
135     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
136    
137     p_menu->items[p_menu->item_count] = menu_item_id;
138     p_menu->item_count++;
139     menu_item_id++;
140     }
141    
142     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
143     bbsnet_menu.menu_id_path[0] = 0;
144     bbsnet_menu.menu_item_pos[0] = 0;
145     bbsnet_menu.choose_step = 0;
146 sysadm 1.14
147 sysadm 1.41 fclose(fp);
148 sysadm 1.14
149     return 0;
150 sysadm 1.1 }
151    
152 sysadm 1.40 void unload_bbsnet_conf(void)
153     {
154 sysadm 1.41 bbsnet_menu.menu_count = 0;
155     bbsnet_menu.menu_item_count = 0;
156    
157     free(bbsnet_menu.p_menu_pool);
158     bbsnet_menu.p_menu_pool = NULL;
159     free(bbsnet_menu.p_menu_item_pool);
160     bbsnet_menu.p_menu_item_pool = NULL;
161 sysadm 1.40 }
162    
163     void process_bar(int n, int len)
164 sysadm 1.1 {
165 sysadm 1.27 char buf[LINE_BUFFER_LEN];
166     char buf2[LINE_BUFFER_LEN];
167    
168     if (len > LINE_BUFFER_LEN)
169     {
170     len = LINE_BUFFER_LEN - 1;
171     }
172     if (n < 0)
173     {
174     n = 0;
175     }
176     else if (n > len)
177     {
178     n = len;
179     }
180 sysadm 1.14
181     moveto(4, 0);
182 sysadm 1.23 prints(" ------------------------------ \r\n");
183 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
184 sysadm 1.30 strncpy(buf2, buf, (size_t)n);
185 sysadm 1.27 buf2[n] = '\0';
186     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
187 sysadm 1.23 prints(" ------------------------------ \r\n");
188 sysadm 1.14 iflush();
189 sysadm 1.1 }
190    
191 sysadm 1.14 int bbsnet_connect(int n)
192 sysadm 1.1 {
193 sysadm 1.36 int sock, ret, loop, error;
194 sysadm 1.38 int sock_connected = 0;
195 sysadm 1.36 int flags_sock;
196     int flags_stdin;
197     int flags_stdout;
198     int len;
199 sysadm 1.14 struct sockaddr_in sin;
200 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
201     char output_buf[LINE_BUFFER_LEN];
202     int input_buf_len = 0;
203     int output_buf_len = 0;
204     int input_buf_offset = 0;
205     int output_buf_offset = 0;
206 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
207     int nfds, epollfd;
208     int stdin_read_wait = 0;
209     int stdout_write_wait = 0;
210     int sock_read_wait = 0;
211     int sock_write_wait = 0;
212 sysadm 1.26 struct hostent *p_host = NULL;
213 sysadm 1.31 int tos;
214 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
215 sysadm 1.14 int remote_port;
216 sysadm 1.56 time_t t_used = time(NULL);
217 sysadm 1.14 struct tm *tm_used;
218 sysadm 1.26 int ch;
219 sysadm 1.14
220 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
221     {
222     log_error("user_online_update(BBS_NET) error\n");
223     }
224    
225 sysadm 1.14 clearscr();
226    
227     moveto(0, 0);
228 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
229 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
230     iflush();
231    
232 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
233 sysadm 1.14
234 sysadm 1.26 if (p_host == NULL)
235 sysadm 1.1 {
236 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
237 sysadm 1.14 press_any_key();
238     return -1;
239 sysadm 1.1 }
240 sysadm 1.14
241     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
242    
243     if (sock < 0)
244 sysadm 1.1 {
245 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
246 sysadm 1.14 press_any_key();
247     return -1;
248 sysadm 1.1 }
249    
250 sysadm 1.14 sin.sin_family = AF_INET;
251 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
252 sysadm 1.14 sin.sin_port = 0;
253    
254     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
255     {
256 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
257     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
258 sysadm 1.14 return -2;
259     }
260 sysadm 1.1
261 sysadm 1.49 memset(&sin, 0, sizeof(sin));
262 sysadm 1.14 sin.sin_family = AF_INET;
263 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
264 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
265    
266 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
267     remote_addr[sizeof(remote_addr) - 1] = '\0';
268 sysadm 1.14 remote_port = ntohs(sin.sin_port);
269    
270 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
271 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
272 sysadm 1.29
273 sysadm 1.39 // Set socket as non-blocking
274     flags_sock = fcntl(sock, F_GETFL, 0);
275     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
276    
277     // Set STDIN/STDOUT as non-blocking
278     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
279     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
280     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
281     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
282    
283 sysadm 1.38 epollfd = epoll_create1(0);
284     if (epollfd < 0)
285     {
286     log_error("epoll_create1() error (%d)\n", errno);
287     return -1;
288     }
289    
290 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
291 sysadm 1.38 ev.data.fd = sock;
292     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
293     {
294     log_error("epoll_ctl(socket) error (%d)\n", errno);
295 sysadm 1.39 goto cleanup;
296 sysadm 1.38 }
297    
298 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
299 sysadm 1.38 ev.data.fd = STDIN_FILENO;
300     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
301     {
302     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
303 sysadm 1.39 goto cleanup;
304 sysadm 1.38 }
305    
306     while (!SYS_server_exit)
307 sysadm 1.29 {
308 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
309 sysadm 1.29 {
310 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
311     {
312     // Use select / epoll to check writability of the socket,
313     // then use getsockopt to check the status of the socket.
314     // See man connect(2)
315     break;
316     }
317     else if (errno == EINTR)
318     {
319     continue;
320     }
321     else
322     {
323     log_error("connect(socket) error (%d)\n", errno);
324 sysadm 1.39
325 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
326 sysadm 1.38 press_any_key();
327 sysadm 1.39
328     goto cleanup;
329 sysadm 1.38 }
330 sysadm 1.29 }
331     }
332    
333 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
334 sysadm 1.1 {
335 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
336 sysadm 1.29
337 sysadm 1.38 if (nfds < 0)
338 sysadm 1.20 {
339 sysadm 1.29 if (errno != EINTR)
340     {
341 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
342 sysadm 1.39 break;
343 sysadm 1.29 }
344 sysadm 1.20 }
345 sysadm 1.38 else if (nfds == 0) // timeout
346     {
347     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
348     }
349     else // ret > 0
350 sysadm 1.14 {
351 sysadm 1.38 for (int i = 0; i < nfds; i++)
352 sysadm 1.29 {
353 sysadm 1.38 if (events[i].data.fd == sock)
354     {
355     len = sizeof(error);
356     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
357     {
358     log_error("getsockopt() error (%d) !\n", error);
359 sysadm 1.39 goto cleanup;
360 sysadm 1.38 }
361     if (error == 0)
362     {
363     sock_connected = 1;
364     }
365     }
366     else if (events[i].data.fd == STDIN_FILENO)
367     {
368     ch = igetch(0);
369 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
370 sysadm 1.38 {
371 sysadm 1.39 goto cleanup;
372 sysadm 1.38 }
373     }
374 sysadm 1.29 }
375 sysadm 1.14 }
376 sysadm 1.12 }
377 sysadm 1.38 if (SYS_server_exit)
378     {
379 sysadm 1.39 goto cleanup;
380 sysadm 1.38 }
381     if (!sock_connected)
382 sysadm 1.12 {
383 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
384 sysadm 1.14 press_any_key();
385 sysadm 1.39
386     goto cleanup;
387 sysadm 1.12 }
388 sysadm 1.29
389 sysadm 1.31 tos = IPTOS_LOWDELAY;
390     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
391     {
392     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
393     }
394 sysadm 1.14
395 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
396 sysadm 1.33 iflush();
397 sysadm 1.46 log_common("BBSNET connect to %s:%d\n", remote_addr, remote_port);
398 sysadm 1.14
399 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
400     ev.data.fd = sock;
401     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
402     {
403     log_error("epoll_ctl(socket) error (%d)\n", errno);
404 sysadm 1.39 goto cleanup;
405 sysadm 1.38 }
406    
407 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
408 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
409     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
410     {
411     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
412 sysadm 1.39 goto cleanup;
413 sysadm 1.38 }
414    
415 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
416 sysadm 1.14 loop = 1;
417    
418 sysadm 1.26 while (loop && !SYS_server_exit)
419 sysadm 1.12 {
420 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
421     {
422     log_error("SSH channel is closed\n");
423     loop = 0;
424     break;
425     }
426    
427 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
428 sysadm 1.33
429 sysadm 1.38 if (nfds < 0)
430 sysadm 1.14 {
431 sysadm 1.38 if (errno != EINTR)
432 sysadm 1.14 {
433 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
434     break;
435 sysadm 1.14 }
436 sysadm 1.38 continue;
437 sysadm 1.14 }
438 sysadm 1.38 else if (nfds == 0) // timeout
439 sysadm 1.1 {
440 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
441 sysadm 1.28 {
442 sysadm 1.38 break;
443 sysadm 1.28 }
444 sysadm 1.1 }
445 sysadm 1.38
446     for (int i = 0; i < nfds; i++)
447 sysadm 1.1 {
448 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
449 sysadm 1.14 {
450 sysadm 1.38 stdin_read_wait = 1;
451 sysadm 1.59 }
452    
453     if (events[i].data.fd == sock)
454     {
455     if (events[i].events & EPOLLIN)
456     {
457     sock_read_wait = 1;
458     }
459     if (events[i].events & EPOLLOUT)
460     {
461     sock_write_wait = 1;
462     }
463     }
464    
465     if (events[i].data.fd == STDOUT_FILENO)
466     {
467     stdout_write_wait = 1;
468     }
469     }
470    
471     if (stdin_read_wait)
472     {
473     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
474     {
475     if (SSH_v2)
476 sysadm 1.33 {
477 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
478     if (ret == SSH_ERROR)
479 sysadm 1.47 {
480 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
481     loop = 0;
482     break;
483 sysadm 1.47 }
484 sysadm 1.59 else if (ret == SSH_EOF)
485 sysadm 1.47 {
486 sysadm 1.59 stdin_read_wait = 0;
487     loop = 0;
488     break;
489 sysadm 1.47 }
490 sysadm 1.59 else if (ret == 0)
491 sysadm 1.33 {
492 sysadm 1.59 stdin_read_wait = 0;
493     break; // Check whether channel is still open
494 sysadm 1.38 }
495 sysadm 1.59 }
496     else
497     {
498     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
499     }
500     if (ret < 0)
501     {
502     if (errno == EAGAIN || errno == EWOULDBLOCK)
503 sysadm 1.38 {
504     stdin_read_wait = 0;
505     break;
506     }
507 sysadm 1.59 else if (errno == EINTR)
508     {
509     continue;
510     }
511 sysadm 1.38 else
512     {
513 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
514     loop = 0;
515     break;
516     }
517     }
518     else if (ret == 0) // broken pipe
519     {
520     #ifdef _DEBUG
521     log_error("read(STDIN) EOF\n");
522     #endif
523     stdin_read_wait = 0;
524     loop = 0;
525     break;
526     }
527     else
528     {
529     input_buf_len += ret;
530     BBS_last_access_tm = time(NULL);
531 sysadm 1.58
532 sysadm 1.59 // Refresh current action while user input
533     if (user_online_update("BBS_NET") < 0)
534     {
535     log_error("user_online_update(BBS_NET) error\n");
536     }
537 sysadm 1.58
538 sysadm 1.59 continue;
539 sysadm 1.33 }
540 sysadm 1.36 }
541 sysadm 1.59 }
542 sysadm 1.29
543 sysadm 1.59 if (sock_write_wait)
544     {
545     while (input_buf_offset < input_buf_len && !SYS_server_exit)
546 sysadm 1.36 {
547 sysadm 1.59 ret = (int)write(sock, input_buf + input_buf_offset, (size_t)(input_buf_len - input_buf_offset));
548     if (ret < 0)
549 sysadm 1.36 {
550 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
551 sysadm 1.36 {
552 sysadm 1.59 sock_write_wait = 0;
553     break;
554 sysadm 1.38 }
555 sysadm 1.59 else if (errno == EINTR)
556 sysadm 1.38 {
557 sysadm 1.59 continue;
558     }
559     else
560     {
561     log_error("write(socket) error (%d)\n", errno);
562 sysadm 1.36 loop = 0;
563 sysadm 1.38 break;
564     }
565 sysadm 1.59 }
566     else if (ret == 0) // broken pipe
567     {
568     #ifdef _DEBUG
569     log_error("write(socket) EOF\n");
570     #endif
571     sock_write_wait = 0;
572     loop = 0;
573     break;
574     }
575     else
576     {
577     input_buf_offset += ret;
578     if (input_buf_offset >= input_buf_len) // Output buffer complete
579 sysadm 1.38 {
580 sysadm 1.59 input_buf_offset = 0;
581     input_buf_len = 0;
582     break;
583 sysadm 1.36 }
584 sysadm 1.59 continue;
585 sysadm 1.36 }
586 sysadm 1.14 }
587 sysadm 1.59 }
588 sysadm 1.36
589 sysadm 1.59 if (sock_read_wait)
590     {
591     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
592 sysadm 1.14 {
593 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
594     if (ret < 0)
595 sysadm 1.14 {
596 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
597 sysadm 1.38 {
598 sysadm 1.59 sock_read_wait = 0;
599     break;
600 sysadm 1.38 }
601 sysadm 1.59 else if (errno == EINTR)
602 sysadm 1.33 {
603 sysadm 1.59 continue;
604 sysadm 1.38 }
605     else
606     {
607 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
608     loop = 0;
609     break;
610 sysadm 1.33 }
611     }
612 sysadm 1.59 else if (ret == 0) // broken pipe
613     {
614     #ifdef _DEBUG
615     log_error("read(socket) EOF\n");
616     #endif
617     sock_read_wait = 0;
618     loop = 0;
619     break;
620     }
621     else
622     {
623     output_buf_len += ret;
624     continue;
625     }
626 sysadm 1.36 }
627 sysadm 1.59 }
628 sysadm 1.36
629 sysadm 1.59 if (stdout_write_wait)
630     {
631     while (output_buf_offset < output_buf_len && !SYS_server_exit)
632 sysadm 1.36 {
633 sysadm 1.59 if (SSH_v2)
634 sysadm 1.36 {
635 sysadm 1.59 ret = ssh_channel_write(SSH_channel, output_buf + output_buf_offset, (uint32_t)(output_buf_len - output_buf_offset));
636     if (ret == SSH_ERROR)
637 sysadm 1.47 {
638 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
639     loop = 0;
640     break;
641 sysadm 1.47 }
642 sysadm 1.59 }
643     else
644     {
645     ret = (int)write(STDOUT_FILENO, output_buf + output_buf_offset, (size_t)(output_buf_len - output_buf_offset));
646     }
647     if (ret < 0)
648     {
649     if (errno == EAGAIN || errno == EWOULDBLOCK)
650 sysadm 1.47 {
651 sysadm 1.59 stdout_write_wait = 0;
652     break;
653 sysadm 1.47 }
654 sysadm 1.59 else if (errno == EINTR)
655 sysadm 1.38 {
656 sysadm 1.59 continue;
657 sysadm 1.38 }
658 sysadm 1.59 else
659 sysadm 1.33 {
660 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
661 sysadm 1.36 loop = 0;
662 sysadm 1.38 break;
663     }
664 sysadm 1.59 }
665     else if (ret == 0) // broken pipe
666     {
667     #ifdef _DEBUG
668     log_error("write(STDOUT) EOF\n");
669     #endif
670     stdout_write_wait = 0;
671     loop = 0;
672     break;
673     }
674     else
675     {
676     output_buf_offset += ret;
677     if (output_buf_offset >= output_buf_len) // Output buffer complete
678 sysadm 1.38 {
679 sysadm 1.59 output_buf_offset = 0;
680     output_buf_len = 0;
681     break;
682 sysadm 1.36 }
683 sysadm 1.59 continue;
684 sysadm 1.36 }
685 sysadm 1.14 }
686 sysadm 1.1 }
687     }
688    
689 sysadm 1.39 cleanup:
690     if (close(epollfd) < 0)
691     {
692     log_error("close(epoll) error (%d)\n");
693     }
694    
695 sysadm 1.36 // Restore STDIN/STDOUT flags
696     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
697     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
698    
699     // Restore socket flags
700     fcntl(sock, F_SETFL, flags_sock);
701    
702 sysadm 1.14 if (close(sock) == -1)
703     {
704     log_error("Close socket failed\n");
705     }
706 sysadm 1.1
707 sysadm 1.50 t_used = time(NULL) - t_used;
708 sysadm 1.14 tm_used = gmtime(&t_used);
709 sysadm 1.8
710 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
711 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
712     tm_used->tm_sec);
713 sysadm 1.8
714 sysadm 1.14 return 0;
715 sysadm 1.1 }
716    
717     static int
718 sysadm 1.14 bbsnet_refresh()
719 sysadm 1.1 {
720 sysadm 1.14 clearscr();
721     moveto(1, 0);
722 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
723 sysadm 1.20 for (int i = 2; i < 19; i++)
724 sysadm 1.14 {
725     moveto(i, 0);
726 sysadm 1.23 prints("|");
727 sysadm 1.14 moveto(i, 79);
728 sysadm 1.23 prints("|");
729 sysadm 1.14 }
730     moveto(19, 0);
731 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
732 sysadm 1.14 moveto(22, 0);
733 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
734 sysadm 1.14 moveto(23, 0);
735 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
736 sysadm 1.13
737 sysadm 1.14 iflush();
738 sysadm 1.1
739 sysadm 1.14 return 0;
740 sysadm 1.1 }
741    
742 sysadm 1.43 int bbsnet_selchange()
743 sysadm 1.1 {
744 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
745    
746 sysadm 1.14 moveto(20, 0);
747     clrtoeol();
748 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
749 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
750 sysadm 1.14 moveto(20, 79);
751 sysadm 1.23 prints("|");
752 sysadm 1.14 moveto(21, 0);
753     clrtoeol();
754 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
755 sysadm 1.43 if (bbsnet_conf[i].port != 23)
756 sysadm 1.20 {
757 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
758 sysadm 1.20 }
759 sysadm 1.14 prints("\x1b[m");
760     moveto(21, 79);
761 sysadm 1.23 prints("|");
762 sysadm 1.14 iflush();
763 sysadm 1.1
764 sysadm 1.14 return 0;
765 sysadm 1.1 }
766    
767 sysadm 1.14 int bbs_net()
768 sysadm 1.1 {
769 sysadm 1.43 int ch, i;
770 sysadm 1.1
771 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
772 sysadm 1.1
773 sysadm 1.50 BBS_last_access_tm = time(NULL);
774 sysadm 1.14
775     clearscr();
776     bbsnet_refresh();
777 sysadm 1.41 display_menu(&bbsnet_menu);
778 sysadm 1.43 bbsnet_selchange();
779 sysadm 1.14
780 sysadm 1.26 while (!SYS_server_exit)
781 sysadm 1.1 {
782 sysadm 1.39 ch = igetch(100);
783 sysadm 1.52
784 sysadm 1.14 switch (ch)
785     {
786 sysadm 1.47 case KEY_NULL: // broken pipe
787 sysadm 1.45 case KEY_ESC:
788 sysadm 1.35 case Ctrl('C'): // user cancel
789 sysadm 1.40 goto cleanup;
790 sysadm 1.14 case KEY_TIMEOUT:
791 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
792 sysadm 1.14 {
793 sysadm 1.40 goto cleanup;
794 sysadm 1.14 }
795 sysadm 1.29 continue;
796 sysadm 1.14 case CR:
797 sysadm 1.41 igetch_reset();
798 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
799 sysadm 1.14 bbsnet_refresh();
800 sysadm 1.41 display_menu(&bbsnet_menu);
801 sysadm 1.43 bbsnet_selchange();
802 sysadm 1.14 break;
803     case KEY_UP:
804     for (i = 0; i < STATION_PER_LINE; i++)
805 sysadm 1.20 {
806 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
807 sysadm 1.20 }
808 sysadm 1.43 bbsnet_selchange();
809 sysadm 1.14 break;
810     case KEY_DOWN:
811     for (i = 0; i < STATION_PER_LINE; i++)
812 sysadm 1.20 {
813 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
814 sysadm 1.20 }
815 sysadm 1.43 bbsnet_selchange();
816 sysadm 1.14 break;
817     case KEY_LEFT:
818     menu_control(&bbsnet_menu, KEY_UP);
819 sysadm 1.43 bbsnet_selchange();
820 sysadm 1.14 break;
821     case KEY_RIGHT:
822     menu_control(&bbsnet_menu, KEY_DOWN);
823 sysadm 1.43 bbsnet_selchange();
824     break;
825 sysadm 1.44 case KEY_HOME:
826 sysadm 1.43 case KEY_PGUP:
827     menu_control(&bbsnet_menu, KEY_PGUP);
828     bbsnet_selchange();
829 sysadm 1.14 break;
830 sysadm 1.44 case KEY_END:
831     case KEY_PGDN:
832     menu_control(&bbsnet_menu, KEY_PGDN);
833     bbsnet_selchange();
834     break;
835 sysadm 1.14 default:
836     menu_control(&bbsnet_menu, ch);
837 sysadm 1.43 bbsnet_selchange();
838 sysadm 1.14 break;
839     }
840 sysadm 1.50 BBS_last_access_tm = time(NULL);
841 sysadm 1.1 }
842    
843 sysadm 1.40 cleanup:
844     unload_bbsnet_conf();
845    
846 sysadm 1.14 return 0;
847 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1