/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.89 - (hide annotations)
Tue Dec 16 12:59:14 2025 UTC (3 months ago) by sysadm
Branch: MAIN
Changes since 1.88: +143 -50 lines
Content type: text/x-csrc
Refine cleanup code for errors
Add error handling of fcntl()

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14 sysadm 1.83 #include "bbs_net.h"
15 sysadm 1.1 #include "common.h"
16 sysadm 1.55 #include "io.h"
17 sysadm 1.15 #include "log.h"
18 sysadm 1.55 #include "login.h"
19     #include "menu.h"
20 sysadm 1.15 #include "screen.h"
21 sysadm 1.84 #include "str_process.h"
22 sysadm 1.55 #include <errno.h>
23     #include <fcntl.h>
24     #include <netdb.h>
25     #include <stdarg.h>
26 sysadm 1.1 #include <stdio.h>
27 sysadm 1.55 #include <stdlib.h>
28 sysadm 1.29 #include <string.h>
29     #include <time.h>
30     #include <unistd.h>
31 sysadm 1.55 #include <arpa/inet.h>
32 sysadm 1.84 #include <ctype.h>
33 sysadm 1.55 #include <libssh/libssh.h>
34     #include <libssh/server.h>
35     #include <libssh/callbacks.h>
36     #include <netinet/in.h>
37     #include <netinet/ip.h>
38 sysadm 1.29 #include <sys/select.h>
39 sysadm 1.1 #include <sys/ioctl.h>
40     #include <sys/socket.h>
41 sysadm 1.82
42     #ifdef HAVE_SYS_EPOLL_H
43 sysadm 1.38 #include <sys/epoll.h>
44 sysadm 1.82 #else
45     #include <poll.h>
46     #endif
47 sysadm 1.1
48 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
49 sysadm 1.26
50 sysadm 1.80 enum _bbs_net_constant_t
51     {
52     MAX_PROCESS_BAR_LEN = 30,
53     MAXSTATION = 26 * 2,
54     STATION_PER_LINE = 4,
55 sysadm 1.84 USERNAME_MAX_LEN = 20,
56     PASSWORD_MAX_LEN = 20,
57 sysadm 1.80 };
58 sysadm 1.1
59     struct _bbsnet_conf
60     {
61 sysadm 1.86 char org_name[40];
62     char site_name[40];
63     char host_name[IP_ADDR_LEN];
64 sysadm 1.24 in_port_t port;
65 sysadm 1.84 int8_t use_ssh;
66 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
67 sysadm 1.1 } bbsnet_conf[MAXSTATION];
68    
69 sysadm 1.74 static MENU_SET bbsnet_menu;
70 sysadm 1.1
71 sysadm 1.89 static void unload_bbsnet_conf(void);
72    
73 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
74 sysadm 1.1 {
75 sysadm 1.14 FILE *fp;
76     MENU *p_menu;
77 sysadm 1.41 MENU_ITEM *p_menu_item;
78     MENU_ITEM_ID menu_item_id;
79 sysadm 1.86 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
80 sysadm 1.89 int port;
81 sysadm 1.14
82 sysadm 1.89 unload_bbsnet_conf();
83 sysadm 1.14
84 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
85     if (bbsnet_menu.p_menu_pool == NULL)
86     {
87     log_error("calloc(p_menu_pool) error\n");
88 sysadm 1.89 return -1;
89 sysadm 1.41 }
90     bbsnet_menu.menu_count = 1;
91    
92     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
93     if (bbsnet_menu.p_menu_item_pool == NULL)
94     {
95     log_error("calloc(p_menu_item_pool) error\n");
96 sysadm 1.89 unload_bbsnet_conf();
97     return -1;
98 sysadm 1.41 }
99     bbsnet_menu.menu_item_count = MAXSTATION;
100    
101     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
102 sysadm 1.40
103 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
104     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
105 sysadm 1.14 p_menu->title.show = 0;
106 sysadm 1.41 p_menu->screen_show = 0;
107 sysadm 1.1
108 sysadm 1.89 fp = fopen(file_config, "r");
109     if (fp == NULL)
110     {
111     unload_bbsnet_conf();
112     return -2;
113     }
114    
115 sysadm 1.41 menu_item_id = 0;
116 sysadm 1.86 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
117 sysadm 1.14 {
118 sysadm 1.86 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
119 sysadm 1.26 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
120     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
121     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
122 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
123 sysadm 1.84 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
124 sysadm 1.14
125 sysadm 1.84 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
126 sysadm 1.86 t5 == NULL || t6 == NULL || line[0] == '#' || line[0] == '*')
127 sysadm 1.18 {
128 sysadm 1.14 continue;
129 sysadm 1.18 }
130    
131 sysadm 1.86 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
132     bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
133     strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
134     bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
135     strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
136     bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
137 sysadm 1.89 port = atoi(t4);
138     if (port <= 0 || port > 65535)
139     {
140     log_error("Invalid port value %d of menu item %d\n", port, menu_item_id);
141     fclose(fp);
142     unload_bbsnet_conf();
143     return -3;
144     }
145     bbsnet_conf[menu_item_id].port = (in_port_t)port;
146 sysadm 1.84 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
147     strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
148 sysadm 1.60 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
149 sysadm 1.14
150 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
151     if (p_menu_item == NULL)
152     {
153     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
154 sysadm 1.89 fclose(fp);
155     unload_bbsnet_conf();
156     return -3;
157 sysadm 1.41 }
158 sysadm 1.14
159 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
160     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
161     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
162     p_menu_item->submenu = 0;
163     p_menu_item->priv = 0;
164     p_menu_item->level = 0;
165     p_menu_item->name[0] =
166     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
167     p_menu_item->name[1] = '\0';
168 sysadm 1.89 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "\033[1;36m%c.\033[m %s",
169 sysadm 1.86 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
170 sysadm 1.41
171     p_menu->items[p_menu->item_count] = menu_item_id;
172     p_menu->item_count++;
173     menu_item_id++;
174     }
175    
176     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
177     bbsnet_menu.menu_id_path[0] = 0;
178     bbsnet_menu.menu_item_pos[0] = 0;
179     bbsnet_menu.choose_step = 0;
180 sysadm 1.14
181 sysadm 1.41 fclose(fp);
182 sysadm 1.14
183     return 0;
184 sysadm 1.1 }
185    
186 sysadm 1.74 static void unload_bbsnet_conf(void)
187 sysadm 1.40 {
188 sysadm 1.41 bbsnet_menu.menu_count = 0;
189     bbsnet_menu.menu_item_count = 0;
190    
191 sysadm 1.89 if (bbsnet_menu.p_menu_pool)
192     {
193     free(bbsnet_menu.p_menu_pool);
194     bbsnet_menu.p_menu_pool = NULL;
195     }
196    
197     if (bbsnet_menu.p_menu_item_pool)
198     {
199     free(bbsnet_menu.p_menu_item_pool);
200     bbsnet_menu.p_menu_item_pool = NULL;
201     }
202 sysadm 1.40 }
203    
204 sysadm 1.74 static void process_bar(int n, int len)
205 sysadm 1.1 {
206 sysadm 1.27 char buf[LINE_BUFFER_LEN];
207     char buf2[LINE_BUFFER_LEN];
208    
209 sysadm 1.89 if (len <= 0)
210     {
211     len = 1;
212     }
213     else if (len > LINE_BUFFER_LEN)
214 sysadm 1.27 {
215     len = LINE_BUFFER_LEN - 1;
216     }
217     if (n < 0)
218     {
219     n = 0;
220     }
221     else if (n > len)
222     {
223     n = len;
224     }
225 sysadm 1.14
226 sysadm 1.84 moveto(4, 1);
227 sysadm 1.23 prints(" ------------------------------ \r\n");
228 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
229 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
230 sysadm 1.27 buf2[n] = '\0';
231     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
232 sysadm 1.23 prints(" ------------------------------ \r\n");
233 sysadm 1.14 iflush();
234 sysadm 1.1 }
235    
236 sysadm 1.74 static int bbsnet_connect(int n)
237 sysadm 1.1 {
238 sysadm 1.89 int sock = -1;
239     int ret;
240     int loop;
241     int error;
242 sysadm 1.38 int sock_connected = 0;
243 sysadm 1.89 int flags_sock = -1;
244     int flags_stdin = -1;
245     int flags_stdout = -1;
246 sysadm 1.14 struct sockaddr_in sin;
247 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
248     char output_buf[LINE_BUFFER_LEN];
249     int input_buf_len = 0;
250     int output_buf_len = 0;
251     int input_buf_offset = 0;
252     int output_buf_offset = 0;
253 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
254     char output_conv[LINE_BUFFER_LEN * 2];
255     int input_conv_len = 0;
256     int output_conv_len = 0;
257     int input_conv_offset = 0;
258     int output_conv_offset = 0;
259 sysadm 1.89 iconv_t input_cd = (iconv_t)(-1);
260     iconv_t output_cd = (iconv_t)(-1);
261     char tocode[CHARSET_MAX_LEN + 20];
262 sysadm 1.82
263     #ifdef HAVE_SYS_EPOLL_H
264 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
265 sysadm 1.89 int epollfd = -1;
266 sysadm 1.82 #else
267     struct pollfd pfds[3];
268     #endif
269    
270     int nfds;
271 sysadm 1.38 int stdin_read_wait = 0;
272     int stdout_write_wait = 0;
273     int sock_read_wait = 0;
274     int sock_write_wait = 0;
275 sysadm 1.26 struct hostent *p_host = NULL;
276 sysadm 1.31 int tos;
277 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
278 sysadm 1.14 int remote_port;
279 sysadm 1.63 char local_addr[IP_ADDR_LEN];
280     int local_port;
281     socklen_t sock_len;
282 sysadm 1.56 time_t t_used = time(NULL);
283 sysadm 1.14 struct tm *tm_used;
284 sysadm 1.26 int ch;
285 sysadm 1.84 char remote_user[USERNAME_MAX_LEN + 1];
286     char remote_pass[PASSWORD_MAX_LEN + 1];
287     ssh_session session = NULL;
288     ssh_channel channel = NULL;
289     int ssh_process_config = 0;
290 sysadm 1.88 int ssh_log_level = SSH_LOG_NOLOG;
291 sysadm 1.89 long ssh_timeout = 0;
292 sysadm 1.14
293 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
294     {
295     log_error("user_online_update(BBS_NET) error\n");
296     }
297    
298 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
299     {
300     clearscr();
301    
302     if (!SSH_v2)
303     {
304     moveto(1, 1);
305     prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
306     press_any_key();
307     return 0;
308     }
309    
310     moveto(1, 1);
311 sysadm 1.86 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
312 sysadm 1.84 moveto(2, 1);
313     prints("请输入用户名: ");
314     iflush();
315     if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
316     {
317     return -1;
318     }
319     if (remote_user[0] == '\0')
320     {
321     return 0;
322     }
323    
324     moveto(3, 1);
325     prints("请输入密码: ");
326     iflush();
327     if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
328     {
329     return -1;
330     }
331     if (remote_pass[0] == '\0')
332     {
333     return 0;
334     }
335     }
336    
337 sysadm 1.14 clearscr();
338    
339 sysadm 1.84 moveto(1, 1);
340 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
341 sysadm 1.86 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
342 sysadm 1.14 iflush();
343    
344 sysadm 1.86 p_host = gethostbyname(bbsnet_conf[n].host_name);
345 sysadm 1.14
346 sysadm 1.26 if (p_host == NULL)
347 sysadm 1.1 {
348 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
349 sysadm 1.14 press_any_key();
350 sysadm 1.89 goto cleanup;
351 sysadm 1.1 }
352 sysadm 1.14
353     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
354    
355     if (sock < 0)
356 sysadm 1.1 {
357 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
358 sysadm 1.14 press_any_key();
359 sysadm 1.89 goto cleanup;
360 sysadm 1.1 }
361    
362 sysadm 1.14 sin.sin_family = AF_INET;
363 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
364 sysadm 1.14 sin.sin_port = 0;
365    
366     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
367     {
368 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
369     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
370 sysadm 1.89 goto cleanup;
371 sysadm 1.14 }
372 sysadm 1.1
373 sysadm 1.49 memset(&sin, 0, sizeof(sin));
374 sysadm 1.14 sin.sin_family = AF_INET;
375 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
376 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
377    
378 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
379     remote_addr[sizeof(remote_addr) - 1] = '\0';
380 sysadm 1.14 remote_port = ntohs(sin.sin_port);
381    
382 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
383 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
384 sysadm 1.29
385 sysadm 1.39 // Set socket as non-blocking
386 sysadm 1.89 if ((flags_sock = fcntl(sock, F_GETFL, 0)) == -1)
387     {
388     log_error("fcntl(F_GETFL) error (%d)\n", errno);
389     goto cleanup;
390     }
391     if ((fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK)) == -1)
392     {
393     log_error("fcntl(F_SETFL) error (%d)\n", errno);
394     goto cleanup;
395     }
396 sysadm 1.39
397     // Set STDIN/STDOUT as non-blocking
398 sysadm 1.89 if ((flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0)) == -1)
399     {
400     log_error("fcntl(F_GETFL) error (%d)\n", errno);
401     goto cleanup;
402     }
403     if ((flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0)) == -1)
404     {
405     log_error("fcntl(F_GETFL) error (%d)\n", errno);
406     goto cleanup;
407     }
408     if ((fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK)) == -1)
409     {
410     log_error("fcntl(F_SETFL) error (%d)\n", errno);
411     goto cleanup;
412     }
413     if ((fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK)) == -1)
414     {
415     log_error("fcntl(F_SETFL) error (%d)\n", errno);
416     goto cleanup;
417     }
418 sysadm 1.39
419 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
420 sysadm 1.38 epollfd = epoll_create1(0);
421     if (epollfd < 0)
422     {
423     log_error("epoll_create1() error (%d)\n", errno);
424 sysadm 1.89 goto cleanup;
425 sysadm 1.38 }
426    
427 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
428 sysadm 1.38 ev.data.fd = sock;
429     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
430     {
431     log_error("epoll_ctl(socket) error (%d)\n", errno);
432 sysadm 1.39 goto cleanup;
433 sysadm 1.38 }
434    
435 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
436 sysadm 1.38 ev.data.fd = STDIN_FILENO;
437     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
438     {
439     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
440 sysadm 1.39 goto cleanup;
441 sysadm 1.38 }
442 sysadm 1.82 #endif
443 sysadm 1.38
444     while (!SYS_server_exit)
445 sysadm 1.29 {
446 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
447 sysadm 1.29 {
448 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
449     {
450     // Use select / epoll to check writability of the socket,
451     // then use getsockopt to check the status of the socket.
452     // See man connect(2)
453     break;
454     }
455     else if (errno == EINTR)
456     {
457     continue;
458     }
459     else
460     {
461     log_error("connect(socket) error (%d)\n", errno);
462 sysadm 1.39
463 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
464 sysadm 1.38 press_any_key();
465 sysadm 1.39
466     goto cleanup;
467 sysadm 1.38 }
468 sysadm 1.29 }
469     }
470    
471 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
472 sysadm 1.1 {
473 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
474 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
475 sysadm 1.82 ret = nfds;
476     #else
477     pfds[0].fd = sock;
478     pfds[0].events = POLLOUT;
479     pfds[1].fd = STDIN_FILENO;
480     pfds[1].events = POLLIN;
481     nfds = 2;
482     ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
483     #endif
484 sysadm 1.29
485 sysadm 1.82 if (ret < 0)
486 sysadm 1.20 {
487 sysadm 1.29 if (errno != EINTR)
488     {
489 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
490 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
491 sysadm 1.82 #else
492     log_error("poll() error (%d)\n", errno);
493     #endif
494 sysadm 1.39 break;
495 sysadm 1.29 }
496 sysadm 1.20 }
497 sysadm 1.82 else if (ret == 0) // timeout
498 sysadm 1.38 {
499     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
500     }
501     else // ret > 0
502 sysadm 1.14 {
503 sysadm 1.38 for (int i = 0; i < nfds; i++)
504 sysadm 1.29 {
505 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
506 sysadm 1.38 if (events[i].data.fd == sock)
507 sysadm 1.82 #else
508     if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
509     #endif
510 sysadm 1.38 {
511 sysadm 1.89 socklen_t len = sizeof(error);
512     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
513 sysadm 1.38 {
514 sysadm 1.89 log_error("getsockopt() error (%d) !\n", errno);
515 sysadm 1.39 goto cleanup;
516 sysadm 1.38 }
517     if (error == 0)
518     {
519     sock_connected = 1;
520     }
521     }
522 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
523 sysadm 1.38 else if (events[i].data.fd == STDIN_FILENO)
524 sysadm 1.82 #else
525     else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
526     #endif
527 sysadm 1.38 {
528 sysadm 1.84 do
529     {
530     ch = igetch(0);
531     } while (ch == 0);
532 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
533 sysadm 1.38 {
534 sysadm 1.39 goto cleanup;
535 sysadm 1.38 }
536     }
537 sysadm 1.29 }
538 sysadm 1.14 }
539 sysadm 1.12 }
540 sysadm 1.38 if (SYS_server_exit)
541     {
542 sysadm 1.39 goto cleanup;
543 sysadm 1.38 }
544     if (!sock_connected)
545 sysadm 1.12 {
546 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
547 sysadm 1.14 press_any_key();
548 sysadm 1.39
549     goto cleanup;
550 sysadm 1.12 }
551 sysadm 1.29
552 sysadm 1.31 tos = IPTOS_LOWDELAY;
553     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
554     {
555     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
556     }
557 sysadm 1.14
558 sysadm 1.63 sock_len = sizeof(sin);
559     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
560     {
561     log_error("getsockname() error: %d", errno);
562     goto cleanup;
563     }
564    
565     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
566     local_addr[sizeof(local_addr) - 1] = '\0';
567     local_port = ntohs(sin.sin_port);
568    
569 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
570     {
571     session = ssh_new();
572     if (session == NULL)
573     {
574     log_error("ssh_new() error\n");
575     goto cleanup;
576     }
577    
578     if (ssh_options_set(session, SSH_OPTIONS_FD, &sock) < 0 ||
579     ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
580 sysadm 1.85 ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
581 sysadm 1.86 ssh_options_set(session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
582 sysadm 1.84 ssh_options_set(session, SSH_OPTIONS_USER, remote_user) < 0 ||
583     ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "+ssh-rsa") < 0 ||
584     ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
585     {
586     log_error("Error setting SSH options: %s\n", ssh_get_error(session));
587     goto cleanup;
588     }
589    
590 sysadm 1.89 ssh_timeout = 5; // second
591     if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
592     {
593     log_error("Error setting SSH options: %s\n", ssh_get_error(session));
594     goto cleanup;
595     }
596 sysadm 1.85
597 sysadm 1.84 while (!SYS_server_exit)
598     {
599     ret = ssh_connect(session);
600     if (ret == SSH_OK)
601     {
602     break;
603     }
604     else if (ret == SSH_ERROR)
605     {
606     log_error("ssh_connect() error\n");
607     goto cleanup;
608     }
609     }
610    
611 sysadm 1.85 ret = ssh_session_is_known_server(session);
612     switch (ret)
613     {
614     case SSH_KNOWN_HOSTS_NOT_FOUND:
615     case SSH_KNOWN_HOSTS_UNKNOWN:
616     if (ssh_session_update_known_hosts(session) != SSH_OK)
617     {
618 sysadm 1.86 log_error("ssh_session_update_known_hosts(%s) error\n", bbsnet_conf[n].host_name);
619 sysadm 1.85 prints("\033[1;31m无法添加服务器证书\033[m");
620     press_any_key();
621     goto cleanup;
622     }
623 sysadm 1.86 log_common("SSH key of (%s) is added into %s\n", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
624 sysadm 1.85 case SSH_KNOWN_HOSTS_OK:
625     break;
626     case SSH_KNOWN_HOSTS_CHANGED:
627     case SSH_KNOWN_HOSTS_OTHER:
628 sysadm 1.86 log_error("ssh_session_is_known_server(%s) error: %d\n", bbsnet_conf[n].host_name, ret);
629 sysadm 1.85 prints("\033[1;31m服务器证书已变更\033[m");
630     press_any_key();
631     goto cleanup;
632     }
633 sysadm 1.84
634     for (int i = 0; !SYS_server_exit;)
635     {
636     ret = ssh_userauth_password(session, NULL, remote_pass);
637     if (ret == SSH_AUTH_SUCCESS)
638     {
639     break;
640     }
641     else if (ret == SSH_AUTH_AGAIN)
642     {
643     #ifdef _DEBUG
644     log_error("ssh_userauth_password() error: SSH_AUTH_AGAIN\n");
645     #endif
646     }
647     else if (ret == SSH_AUTH_ERROR)
648     {
649     log_error("ssh_userauth_password() error: %d\n", ret);
650     goto cleanup;
651     }
652     else // if (ret == SSH_AUTH_DENIED)
653     {
654     prints("\033[1;31m身份验证失败!\033[m\r\n");
655     i++;
656     if (i < BBS_login_retry_times)
657     {
658     prints("请输入密码: ");
659     iflush();
660     if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
661     {
662     goto cleanup;
663     }
664     if (remote_pass[0] == '\0')
665     {
666     goto cleanup;
667     }
668     }
669     else
670     {
671     goto cleanup;
672     }
673     }
674     }
675    
676     channel = ssh_channel_new(session);
677     if (channel == NULL)
678     {
679     log_error("ssh_channel_new() error\n");
680     goto cleanup;
681     }
682    
683     while (!SYS_server_exit)
684     {
685     ret = ssh_channel_open_session(channel);
686     if (ret == SSH_OK)
687     {
688     break;
689     }
690     else if (ret == SSH_ERROR)
691     {
692     log_error("ssh_channel_open_session() error\n");
693     goto cleanup;
694     }
695     }
696    
697     while (!SYS_server_exit)
698     {
699     ret = ssh_channel_request_pty(channel);
700     if (ret == SSH_OK)
701     {
702     break;
703     }
704     else if (ret == SSH_ERROR)
705     {
706     log_error("ssh_channel_request_pty() error\n");
707     goto cleanup;
708     }
709     }
710    
711     while (!SYS_server_exit)
712     {
713     ret = ssh_channel_request_shell(channel);
714     if (ret == SSH_OK)
715     {
716     break;
717     }
718     else if (ret == SSH_ERROR)
719     {
720     log_error("ssh_channel_request_shell() error\n");
721     goto cleanup;
722     }
723     }
724 sysadm 1.89
725     ssh_timeout = 0; // second
726     if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
727     {
728     log_error("Error setting SSH options: %s\n", ssh_get_error(session));
729     goto cleanup;
730     }
731    
732     ssh_set_blocking(session, 0);
733 sysadm 1.84 }
734    
735 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
736 sysadm 1.33 iflush();
737 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
738     remote_addr, remote_port, local_addr, local_port, BBS_username);
739 sysadm 1.14
740 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
741     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
742 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
743 sysadm 1.60 if (input_cd == (iconv_t)(-1))
744     {
745 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
746 sysadm 1.60 goto cleanup;
747     }
748 sysadm 1.68
749 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
750     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
751 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
752 sysadm 1.67 if (output_cd == (iconv_t)(-1))
753 sysadm 1.60 {
754 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
755 sysadm 1.60 goto cleanup;
756     }
757    
758 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
759 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
760     ev.data.fd = sock;
761     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
762     {
763     log_error("epoll_ctl(socket) error (%d)\n", errno);
764 sysadm 1.39 goto cleanup;
765 sysadm 1.38 }
766    
767 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
768 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
769     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
770     {
771     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
772 sysadm 1.39 goto cleanup;
773 sysadm 1.38 }
774 sysadm 1.82 #endif
775 sysadm 1.38
776 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
777 sysadm 1.14 loop = 1;
778    
779 sysadm 1.26 while (loop && !SYS_server_exit)
780 sysadm 1.12 {
781 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
782     {
783     log_error("SSH channel is closed\n");
784     loop = 0;
785     break;
786     }
787    
788 sysadm 1.84 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(channel))
789     {
790     log_error("Remote SSH channel is closed\n");
791     loop = 0;
792     break;
793     }
794    
795 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
796 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
797 sysadm 1.82 ret = nfds;
798     #else
799     pfds[0].fd = STDIN_FILENO;
800     pfds[0].events = POLLIN;
801     pfds[1].fd = sock;
802     pfds[1].events = POLLIN | POLLOUT;
803     pfds[2].fd = STDOUT_FILENO;
804     pfds[2].events = POLLOUT;
805     nfds = 3;
806     ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
807     #endif
808 sysadm 1.33
809 sysadm 1.82 if (ret < 0)
810 sysadm 1.14 {
811 sysadm 1.38 if (errno != EINTR)
812 sysadm 1.14 {
813 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
814 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
815 sysadm 1.82 #else
816     log_error("poll() error (%d)\n", errno);
817     #endif
818 sysadm 1.38 break;
819 sysadm 1.14 }
820 sysadm 1.38 continue;
821 sysadm 1.14 }
822 sysadm 1.82 else if (ret == 0) // timeout
823 sysadm 1.1 {
824 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
825 sysadm 1.28 {
826 sysadm 1.38 break;
827 sysadm 1.28 }
828 sysadm 1.1 }
829 sysadm 1.38
830     for (int i = 0; i < nfds; i++)
831 sysadm 1.1 {
832 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
833 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
834 sysadm 1.82 #else
835     if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
836     #endif
837 sysadm 1.14 {
838 sysadm 1.38 stdin_read_wait = 1;
839 sysadm 1.59 }
840    
841 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
842 sysadm 1.59 if (events[i].data.fd == sock)
843 sysadm 1.82 #else
844     if (pfds[i].fd == sock)
845     #endif
846 sysadm 1.59 {
847 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
848 sysadm 1.59 if (events[i].events & EPOLLIN)
849 sysadm 1.82 #else
850     if (pfds[i].revents & POLLIN)
851     #endif
852 sysadm 1.59 {
853     sock_read_wait = 1;
854     }
855 sysadm 1.82
856     #ifdef HAVE_SYS_EPOLL_H
857 sysadm 1.59 if (events[i].events & EPOLLOUT)
858 sysadm 1.82 #else
859     if (pfds[i].revents & POLLOUT)
860     #endif
861 sysadm 1.59 {
862     sock_write_wait = 1;
863     }
864     }
865    
866 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
867 sysadm 1.59 if (events[i].data.fd == STDOUT_FILENO)
868 sysadm 1.82 #else
869     if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
870 sysadm 1.84 #endif
871 sysadm 1.59 {
872     stdout_write_wait = 1;
873     }
874     }
875    
876     if (stdin_read_wait)
877     {
878     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
879     {
880     if (SSH_v2)
881 sysadm 1.33 {
882 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
883     if (ret == SSH_ERROR)
884 sysadm 1.47 {
885 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
886     loop = 0;
887     break;
888 sysadm 1.47 }
889 sysadm 1.59 else if (ret == SSH_EOF)
890 sysadm 1.47 {
891 sysadm 1.59 stdin_read_wait = 0;
892     loop = 0;
893     break;
894 sysadm 1.47 }
895 sysadm 1.59 else if (ret == 0)
896 sysadm 1.33 {
897 sysadm 1.72 // Send NO-OP to remote server
898     input_buf[input_buf_len] = '\0';
899     input_buf_len++;
900 sysadm 1.73 BBS_last_access_tm = time(NULL);
901 sysadm 1.72
902 sysadm 1.59 stdin_read_wait = 0;
903     break; // Check whether channel is still open
904 sysadm 1.38 }
905 sysadm 1.59 }
906     else
907     {
908     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
909     }
910     if (ret < 0)
911     {
912     if (errno == EAGAIN || errno == EWOULDBLOCK)
913 sysadm 1.38 {
914     stdin_read_wait = 0;
915     break;
916     }
917 sysadm 1.59 else if (errno == EINTR)
918     {
919     continue;
920     }
921 sysadm 1.38 else
922     {
923 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
924     loop = 0;
925     break;
926     }
927     }
928     else if (ret == 0) // broken pipe
929     {
930     #ifdef _DEBUG
931     log_error("read(STDIN) EOF\n");
932     #endif
933     stdin_read_wait = 0;
934     loop = 0;
935     break;
936     }
937     else
938     {
939     input_buf_len += ret;
940     BBS_last_access_tm = time(NULL);
941 sysadm 1.58
942 sysadm 1.59 // Refresh current action while user input
943     if (user_online_update("BBS_NET") < 0)
944     {
945     log_error("user_online_update(BBS_NET) error\n");
946     }
947 sysadm 1.58
948 sysadm 1.59 continue;
949 sysadm 1.33 }
950 sysadm 1.36 }
951 sysadm 1.59 }
952 sysadm 1.29
953 sysadm 1.59 if (sock_write_wait)
954     {
955 sysadm 1.60 if (input_buf_offset < input_buf_len)
956 sysadm 1.36 {
957 sysadm 1.72 // For debug
958     #ifdef _DEBUG
959     for (int j = input_buf_offset; j < input_buf_len; j++)
960     {
961     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
962     }
963     #endif
964    
965 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
966 sysadm 1.60 if (ret < 0)
967     {
968 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
969 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
970 sysadm 1.60 }
971 sysadm 1.72
972     // For debug
973     #ifdef _DEBUG
974     for (int j = input_conv_offset; j < input_conv_len; j++)
975     {
976     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
977     }
978     #endif
979 sysadm 1.60 }
980    
981     while (input_conv_offset < input_conv_len && !SYS_server_exit)
982     {
983 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
984     {
985     ret = ssh_channel_write(channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
986     if (ret == SSH_ERROR)
987     {
988     log_error("ssh_channel_write() error: %s\n", ssh_get_error(session));
989     loop = 0;
990     break;
991     }
992     }
993     else
994     {
995     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
996     }
997 sysadm 1.59 if (ret < 0)
998 sysadm 1.36 {
999 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1000 sysadm 1.36 {
1001 sysadm 1.59 sock_write_wait = 0;
1002     break;
1003 sysadm 1.38 }
1004 sysadm 1.59 else if (errno == EINTR)
1005 sysadm 1.38 {
1006 sysadm 1.59 continue;
1007     }
1008     else
1009     {
1010     log_error("write(socket) error (%d)\n", errno);
1011 sysadm 1.36 loop = 0;
1012 sysadm 1.38 break;
1013     }
1014 sysadm 1.59 }
1015     else if (ret == 0) // broken pipe
1016     {
1017     #ifdef _DEBUG
1018     log_error("write(socket) EOF\n");
1019     #endif
1020     sock_write_wait = 0;
1021     loop = 0;
1022     break;
1023     }
1024     else
1025     {
1026 sysadm 1.60 input_conv_offset += ret;
1027     if (input_conv_offset >= input_conv_len) // Output buffer complete
1028 sysadm 1.38 {
1029 sysadm 1.60 input_conv_offset = 0;
1030     input_conv_len = 0;
1031 sysadm 1.59 break;
1032 sysadm 1.36 }
1033 sysadm 1.59 continue;
1034 sysadm 1.36 }
1035 sysadm 1.14 }
1036 sysadm 1.59 }
1037 sysadm 1.36
1038 sysadm 1.59 if (sock_read_wait)
1039     {
1040     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
1041 sysadm 1.14 {
1042 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1043     {
1044     ret = ssh_channel_read_nonblocking(channel, output_buf + output_buf_len,
1045     (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
1046     if (ret == SSH_ERROR)
1047     {
1048     log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(session));
1049     loop = 0;
1050     break;
1051     }
1052     else if (ret == SSH_EOF)
1053     {
1054     sock_read_wait = 0;
1055     loop = 0;
1056     break;
1057     }
1058     else if (ret == 0)
1059     {
1060     sock_read_wait = 0;
1061     break;
1062     }
1063     }
1064     else
1065     {
1066     ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
1067     }
1068 sysadm 1.59 if (ret < 0)
1069 sysadm 1.14 {
1070 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1071 sysadm 1.38 {
1072 sysadm 1.59 sock_read_wait = 0;
1073     break;
1074 sysadm 1.38 }
1075 sysadm 1.59 else if (errno == EINTR)
1076 sysadm 1.33 {
1077 sysadm 1.59 continue;
1078 sysadm 1.38 }
1079     else
1080     {
1081 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
1082     loop = 0;
1083     break;
1084 sysadm 1.33 }
1085     }
1086 sysadm 1.59 else if (ret == 0) // broken pipe
1087     {
1088     #ifdef _DEBUG
1089     log_error("read(socket) EOF\n");
1090     #endif
1091     sock_read_wait = 0;
1092     loop = 0;
1093     break;
1094     }
1095     else
1096     {
1097     output_buf_len += ret;
1098     continue;
1099     }
1100 sysadm 1.36 }
1101 sysadm 1.59 }
1102 sysadm 1.36
1103 sysadm 1.59 if (stdout_write_wait)
1104     {
1105 sysadm 1.60 if (output_buf_offset < output_buf_len)
1106     {
1107 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1108 sysadm 1.60 if (ret < 0)
1109     {
1110 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
1111 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
1112 sysadm 1.60 }
1113     }
1114    
1115     while (output_conv_offset < output_conv_len && !SYS_server_exit)
1116 sysadm 1.36 {
1117 sysadm 1.59 if (SSH_v2)
1118 sysadm 1.36 {
1119 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1120 sysadm 1.59 if (ret == SSH_ERROR)
1121 sysadm 1.47 {
1122 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
1123     loop = 0;
1124     break;
1125 sysadm 1.47 }
1126 sysadm 1.59 }
1127     else
1128     {
1129 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1130 sysadm 1.59 }
1131     if (ret < 0)
1132     {
1133     if (errno == EAGAIN || errno == EWOULDBLOCK)
1134 sysadm 1.47 {
1135 sysadm 1.59 stdout_write_wait = 0;
1136     break;
1137 sysadm 1.47 }
1138 sysadm 1.59 else if (errno == EINTR)
1139 sysadm 1.38 {
1140 sysadm 1.59 continue;
1141 sysadm 1.38 }
1142 sysadm 1.59 else
1143 sysadm 1.33 {
1144 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
1145 sysadm 1.36 loop = 0;
1146 sysadm 1.38 break;
1147     }
1148 sysadm 1.59 }
1149     else if (ret == 0) // broken pipe
1150     {
1151     #ifdef _DEBUG
1152     log_error("write(STDOUT) EOF\n");
1153     #endif
1154     stdout_write_wait = 0;
1155     loop = 0;
1156     break;
1157     }
1158     else
1159     {
1160 sysadm 1.60 output_conv_offset += ret;
1161     if (output_conv_offset >= output_conv_len) // Output buffer complete
1162 sysadm 1.38 {
1163 sysadm 1.60 output_conv_offset = 0;
1164     output_conv_len = 0;
1165 sysadm 1.59 break;
1166 sysadm 1.36 }
1167 sysadm 1.59 continue;
1168 sysadm 1.36 }
1169 sysadm 1.14 }
1170 sysadm 1.1 }
1171     }
1172    
1173 sysadm 1.89 cleanup:
1174     if (input_cd != (iconv_t)(-1))
1175     {
1176     iconv_close(input_cd);
1177     }
1178     if (output_cd != (iconv_t)(-1))
1179     {
1180     iconv_close(output_cd);
1181     }
1182 sysadm 1.60
1183 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1184 sysadm 1.89 if (epollfd != -1 && close(epollfd) < 0)
1185 sysadm 1.39 {
1186     log_error("close(epoll) error (%d)\n");
1187     }
1188 sysadm 1.82 #endif
1189 sysadm 1.39
1190 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1191     {
1192 sysadm 1.89 if (channel != NULL)
1193     {
1194     ssh_channel_free(channel);
1195     }
1196     if (session != NULL)
1197     {
1198     ssh_disconnect(session);
1199     ssh_free(session);
1200     }
1201 sysadm 1.84 }
1202    
1203 sysadm 1.36 // Restore STDIN/STDOUT flags
1204 sysadm 1.89 if (flags_stdin != -1 &&fcntl(STDIN_FILENO, F_SETFL, flags_stdin) == -1)
1205     {
1206     log_error("fcntl(F_SETFL) error (%d)\n", errno);
1207     }
1208     if (flags_stdout != -1 && fcntl(STDOUT_FILENO, F_SETFL, flags_stdout) == -1)
1209     {
1210     log_error("fcntl(F_SETFL) error (%d)\n", errno);
1211     }
1212 sysadm 1.36
1213 sysadm 1.89 if (sock != -1 && close(sock) == -1)
1214 sysadm 1.14 {
1215     log_error("Close socket failed\n");
1216     }
1217 sysadm 1.1
1218 sysadm 1.50 t_used = time(NULL) - t_used;
1219 sysadm 1.14 tm_used = gmtime(&t_used);
1220 sysadm 1.8
1221 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
1222 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
1223     tm_used->tm_sec);
1224 sysadm 1.8
1225 sysadm 1.72 BBS_last_access_tm = time(NULL);
1226    
1227 sysadm 1.14 return 0;
1228 sysadm 1.1 }
1229    
1230 sysadm 1.74 static int bbsnet_refresh()
1231 sysadm 1.1 {
1232 sysadm 1.14 clearscr();
1233 sysadm 1.84
1234     moveto(1, 1);
1235     prints(" ------------------------------------------------------------------------------ ");
1236 sysadm 1.20 for (int i = 2; i < 19; i++)
1237 sysadm 1.14 {
1238 sysadm 1.84 moveto(i, 1);
1239 sysadm 1.23 prints("|");
1240 sysadm 1.84 moveto(i, 80);
1241 sysadm 1.23 prints("|");
1242 sysadm 1.14 }
1243 sysadm 1.84 moveto(19, 1);
1244     prints("|------------------------------------------------------------------------------|");
1245     moveto(22, 1);
1246     prints(" ------------------------------------------------------------------------------ ");
1247     moveto(23, 1);
1248     prints(" [\033[1;32mCtrl+C\033[m]退出");
1249 sysadm 1.13
1250 sysadm 1.14 iflush();
1251 sysadm 1.1
1252 sysadm 1.14 return 0;
1253 sysadm 1.1 }
1254    
1255 sysadm 1.74 static int bbsnet_selchange()
1256 sysadm 1.1 {
1257 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
1258    
1259 sysadm 1.84 moveto(20, 1);
1260 sysadm 1.14 clrtoeol();
1261 sysadm 1.87 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1262     bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1263     bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1264     (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1265 sysadm 1.84 moveto(20, 80);
1266 sysadm 1.23 prints("|");
1267 sysadm 1.84 moveto(21, 1);
1268 sysadm 1.14 clrtoeol();
1269 sysadm 1.87 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5d\033[m 编码: \033[1;33m%s\033[m",
1270     bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1271 sysadm 1.84 moveto(21, 80);
1272 sysadm 1.23 prints("|");
1273 sysadm 1.14 iflush();
1274 sysadm 1.1
1275 sysadm 1.14 return 0;
1276 sysadm 1.1 }
1277    
1278 sysadm 1.83 int bbs_net()
1279 sysadm 1.1 {
1280 sysadm 1.43 int ch, i;
1281 sysadm 1.1
1282 sysadm 1.89 if (load_bbsnet_conf(CONF_BBSNET) < 0)
1283     {
1284     clearscr();
1285     moveto(1, 1);
1286     prints("加载穿梭配置失败!");
1287     press_any_key();
1288     return -1;
1289     }
1290 sysadm 1.1
1291 sysadm 1.14 bbsnet_refresh();
1292 sysadm 1.41 display_menu(&bbsnet_menu);
1293 sysadm 1.43 bbsnet_selchange();
1294 sysadm 1.14
1295 sysadm 1.26 while (!SYS_server_exit)
1296 sysadm 1.1 {
1297 sysadm 1.39 ch = igetch(100);
1298 sysadm 1.52
1299 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1300     {
1301     BBS_last_access_tm = time(NULL);
1302     }
1303 sysadm 1.64
1304 sysadm 1.14 switch (ch)
1305     {
1306 sysadm 1.47 case KEY_NULL: // broken pipe
1307 sysadm 1.64 log_error("KEY_NULL\n");
1308 sysadm 1.40 goto cleanup;
1309 sysadm 1.14 case KEY_TIMEOUT:
1310 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1311 sysadm 1.14 {
1312 sysadm 1.64 log_error("User input timeout\n");
1313 sysadm 1.40 goto cleanup;
1314 sysadm 1.14 }
1315 sysadm 1.29 continue;
1316 sysadm 1.64 case KEY_ESC:
1317     case Ctrl('C'): // user cancel
1318     goto cleanup;
1319 sysadm 1.14 case CR:
1320 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
1321 sysadm 1.84 // Force cleanup anything remaining in the output buffer
1322     clearscr();
1323     iflush();
1324     // Clear screen and redraw menu
1325 sysadm 1.14 bbsnet_refresh();
1326 sysadm 1.41 display_menu(&bbsnet_menu);
1327 sysadm 1.43 bbsnet_selchange();
1328 sysadm 1.14 break;
1329     case KEY_UP:
1330     for (i = 0; i < STATION_PER_LINE; i++)
1331 sysadm 1.20 {
1332 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
1333 sysadm 1.20 }
1334 sysadm 1.43 bbsnet_selchange();
1335 sysadm 1.14 break;
1336     case KEY_DOWN:
1337     for (i = 0; i < STATION_PER_LINE; i++)
1338 sysadm 1.20 {
1339 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
1340 sysadm 1.20 }
1341 sysadm 1.43 bbsnet_selchange();
1342 sysadm 1.14 break;
1343     case KEY_LEFT:
1344     menu_control(&bbsnet_menu, KEY_UP);
1345 sysadm 1.43 bbsnet_selchange();
1346 sysadm 1.14 break;
1347     case KEY_RIGHT:
1348     menu_control(&bbsnet_menu, KEY_DOWN);
1349 sysadm 1.43 bbsnet_selchange();
1350     break;
1351 sysadm 1.44 case KEY_HOME:
1352 sysadm 1.43 case KEY_PGUP:
1353     menu_control(&bbsnet_menu, KEY_PGUP);
1354     bbsnet_selchange();
1355 sysadm 1.14 break;
1356 sysadm 1.44 case KEY_END:
1357     case KEY_PGDN:
1358     menu_control(&bbsnet_menu, KEY_PGDN);
1359     bbsnet_selchange();
1360     break;
1361 sysadm 1.14 default:
1362     menu_control(&bbsnet_menu, ch);
1363 sysadm 1.43 bbsnet_selchange();
1364 sysadm 1.14 break;
1365     }
1366 sysadm 1.1 }
1367    
1368 sysadm 1.40 cleanup:
1369     unload_bbsnet_conf();
1370    
1371 sysadm 1.14 return 0;
1372 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1