/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Contents of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.87 - (show annotations)
Mon Dec 1 02:10:34 2025 UTC (3 months, 2 weeks ago) by sysadm
Branch: MAIN
Changes since 1.86: +6 -4 lines
Content type: text/x-csrc
Display encoding in bbs_net menu

1 /* SPDX-License-Identifier: GPL-3.0-or-later */
2 /*
3 * bbs_net
4 * - user interactive feature of site shuttle
5 *
6 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 */
8
9 #ifdef HAVE_CONFIG_H
10 #include "config.h"
11 #endif
12
13 #include "bbs.h"
14 #include "bbs_net.h"
15 #include "common.h"
16 #include "io.h"
17 #include "log.h"
18 #include "login.h"
19 #include "menu.h"
20 #include "screen.h"
21 #include "str_process.h"
22 #include <errno.h>
23 #include <fcntl.h>
24 #include <netdb.h>
25 #include <stdarg.h>
26 #include <stdio.h>
27 #include <stdlib.h>
28 #include <string.h>
29 #include <time.h>
30 #include <unistd.h>
31 #include <arpa/inet.h>
32 #include <ctype.h>
33 #include <libssh/libssh.h>
34 #include <libssh/server.h>
35 #include <libssh/callbacks.h>
36 #include <netinet/in.h>
37 #include <netinet/ip.h>
38 #include <sys/select.h>
39 #include <sys/ioctl.h>
40 #include <sys/socket.h>
41
42 #ifdef HAVE_SYS_EPOLL_H
43 #include <sys/epoll.h>
44 #else
45 #include <poll.h>
46 #endif
47
48 static const char MENU_CONF_DELIM[] = " \t\r\n";
49
50 enum _bbs_net_constant_t
51 {
52 MAX_PROCESS_BAR_LEN = 30,
53 MAXSTATION = 26 * 2,
54 STATION_PER_LINE = 4,
55 USERNAME_MAX_LEN = 20,
56 PASSWORD_MAX_LEN = 20,
57 };
58
59 struct _bbsnet_conf
60 {
61 char org_name[40];
62 char site_name[40];
63 char host_name[IP_ADDR_LEN];
64 in_port_t port;
65 int8_t use_ssh;
66 char charset[CHARSET_MAX_LEN + 1];
67 } bbsnet_conf[MAXSTATION];
68
69 static MENU_SET bbsnet_menu;
70
71 static int load_bbsnet_conf(const char *file_config)
72 {
73 FILE *fp;
74 MENU *p_menu;
75 MENU_ITEM *p_menu_item;
76 MENU_ITEM_ID menu_item_id;
77 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
78
79 fp = fopen(file_config, "r");
80 if (fp == NULL)
81 {
82 return -1;
83 }
84
85 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
86 if (bbsnet_menu.p_menu_pool == NULL)
87 {
88 log_error("calloc(p_menu_pool) error\n");
89 return -3;
90 }
91 bbsnet_menu.menu_count = 1;
92
93 bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
94 if (bbsnet_menu.p_menu_item_pool == NULL)
95 {
96 log_error("calloc(p_menu_item_pool) error\n");
97 return -3;
98 }
99 bbsnet_menu.menu_item_count = MAXSTATION;
100
101 p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
102
103 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
104 p_menu->name[sizeof(p_menu->name) - 1] = '\0';
105 p_menu->title.show = 0;
106 p_menu->screen_show = 0;
107
108 menu_item_id = 0;
109 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
110 {
111 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
112 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
113 t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
114 t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
115 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
116 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
117
118 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
119 t5 == NULL || t6 == NULL || line[0] == '#' || line[0] == '*')
120 {
121 continue;
122 }
123
124 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
125 bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
126 strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
127 bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
128 strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
129 bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
130 bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
131 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
132 strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
133 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
134
135 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
136 if (p_menu_item == NULL)
137 {
138 log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
139 return -1;
140 }
141
142 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
143 p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
144 snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
145 p_menu_item->submenu = 0;
146 p_menu_item->priv = 0;
147 p_menu_item->level = 0;
148 p_menu_item->name[0] =
149 (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
150 p_menu_item->name[1] = '\0';
151 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
152 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
153
154 p_menu->items[p_menu->item_count] = menu_item_id;
155 p_menu->item_count++;
156 menu_item_id++;
157 }
158
159 bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
160 bbsnet_menu.menu_id_path[0] = 0;
161 bbsnet_menu.menu_item_pos[0] = 0;
162 bbsnet_menu.choose_step = 0;
163
164 fclose(fp);
165
166 return 0;
167 }
168
169 static void unload_bbsnet_conf(void)
170 {
171 bbsnet_menu.menu_count = 0;
172 bbsnet_menu.menu_item_count = 0;
173
174 free(bbsnet_menu.p_menu_pool);
175 bbsnet_menu.p_menu_pool = NULL;
176 free(bbsnet_menu.p_menu_item_pool);
177 bbsnet_menu.p_menu_item_pool = NULL;
178 }
179
180 static void process_bar(int n, int len)
181 {
182 char buf[LINE_BUFFER_LEN];
183 char buf2[LINE_BUFFER_LEN];
184
185 if (len > LINE_BUFFER_LEN)
186 {
187 len = LINE_BUFFER_LEN - 1;
188 }
189 if (n < 0)
190 {
191 n = 0;
192 }
193 else if (n > len)
194 {
195 n = len;
196 }
197
198 moveto(4, 1);
199 prints(" ------------------------------ \r\n");
200 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
201 memcpy(buf2, buf, (size_t)n);
202 buf2[n] = '\0';
203 prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
204 prints(" ------------------------------ \r\n");
205 iflush();
206 }
207
208 static int bbsnet_connect(int n)
209 {
210 int sock, ret, loop, error;
211 int sock_connected = 0;
212 int flags_sock;
213 int flags_stdin;
214 int flags_stdout;
215 int len;
216 struct sockaddr_in sin;
217 char input_buf[LINE_BUFFER_LEN];
218 char output_buf[LINE_BUFFER_LEN];
219 int input_buf_len = 0;
220 int output_buf_len = 0;
221 int input_buf_offset = 0;
222 int output_buf_offset = 0;
223 char input_conv[LINE_BUFFER_LEN * 2];
224 char output_conv[LINE_BUFFER_LEN * 2];
225 int input_conv_len = 0;
226 int output_conv_len = 0;
227 int input_conv_offset = 0;
228 int output_conv_offset = 0;
229 iconv_t input_cd = NULL;
230 iconv_t output_cd = NULL;
231 char tocode[32];
232
233 #ifdef HAVE_SYS_EPOLL_H
234 struct epoll_event ev, events[MAX_EVENTS];
235 int epollfd;
236 #else
237 struct pollfd pfds[3];
238 #endif
239
240 int nfds;
241 int stdin_read_wait = 0;
242 int stdout_write_wait = 0;
243 int sock_read_wait = 0;
244 int sock_write_wait = 0;
245 struct hostent *p_host = NULL;
246 int tos;
247 char remote_addr[IP_ADDR_LEN];
248 int remote_port;
249 char local_addr[IP_ADDR_LEN];
250 int local_port;
251 socklen_t sock_len;
252 time_t t_used = time(NULL);
253 struct tm *tm_used;
254 int ch;
255 char remote_user[USERNAME_MAX_LEN + 1];
256 char remote_pass[PASSWORD_MAX_LEN + 1];
257 ssh_session session = NULL;
258 ssh_channel channel = NULL;
259 int ssh_process_config = 0;
260 int ssh_log_level = SSH_LOG_PROTOCOL;
261
262 if (user_online_update("BBS_NET") < 0)
263 {
264 log_error("user_online_update(BBS_NET) error\n");
265 }
266
267 if (bbsnet_conf[n].use_ssh)
268 {
269 clearscr();
270
271 if (!SSH_v2)
272 {
273 moveto(1, 1);
274 prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
275 press_any_key();
276 return 0;
277 }
278
279 moveto(1, 1);
280 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
281 moveto(2, 1);
282 prints("请输入用户名: ");
283 iflush();
284 if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
285 {
286 return -1;
287 }
288 if (remote_user[0] == '\0')
289 {
290 return 0;
291 }
292
293 moveto(3, 1);
294 prints("请输入密码: ");
295 iflush();
296 if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
297 {
298 return -1;
299 }
300 if (remote_pass[0] == '\0')
301 {
302 return 0;
303 }
304 }
305
306 clearscr();
307
308 moveto(1, 1);
309 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
310 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
311 iflush();
312
313 p_host = gethostbyname(bbsnet_conf[n].host_name);
314
315 if (p_host == NULL)
316 {
317 prints("\033[1;31m查找主机名失败!\033[m\r\n");
318 press_any_key();
319 return -1;
320 }
321
322 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
323
324 if (sock < 0)
325 {
326 prints("\033[1;31m无法创建socket!\033[m\r\n");
327 press_any_key();
328 return -1;
329 }
330
331 sin.sin_family = AF_INET;
332 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
333 sin.sin_port = 0;
334
335 if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
336 {
337 log_error("Bind address %s:%u failed (%d)\n",
338 inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
339 return -2;
340 }
341
342 memset(&sin, 0, sizeof(sin));
343 sin.sin_family = AF_INET;
344 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
345 sin.sin_port = htons(bbsnet_conf[n].port);
346
347 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
348 remote_addr[sizeof(remote_addr) - 1] = '\0';
349 remote_port = ntohs(sin.sin_port);
350
351 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
352 process_bar(0, MAX_PROCESS_BAR_LEN);
353
354 // Set socket as non-blocking
355 flags_sock = fcntl(sock, F_GETFL, 0);
356 fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
357
358 // Set STDIN/STDOUT as non-blocking
359 flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
360 flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
361 fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
362 fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
363
364 #ifdef HAVE_SYS_EPOLL_H
365 epollfd = epoll_create1(0);
366 if (epollfd < 0)
367 {
368 log_error("epoll_create1() error (%d)\n", errno);
369 return -1;
370 }
371
372 ev.events = EPOLLOUT | EPOLLET;
373 ev.data.fd = sock;
374 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
375 {
376 log_error("epoll_ctl(socket) error (%d)\n", errno);
377 goto cleanup;
378 }
379
380 ev.events = EPOLLIN | EPOLLET;
381 ev.data.fd = STDIN_FILENO;
382 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
383 {
384 log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
385 goto cleanup;
386 }
387 #endif
388
389 while (!SYS_server_exit)
390 {
391 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
392 {
393 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
394 {
395 // Use select / epoll to check writability of the socket,
396 // then use getsockopt to check the status of the socket.
397 // See man connect(2)
398 break;
399 }
400 else if (errno == EINTR)
401 {
402 continue;
403 }
404 else
405 {
406 log_error("connect(socket) error (%d)\n", errno);
407
408 prints("\033[1;31m连接失败!\033[m\r\n");
409 press_any_key();
410
411 goto cleanup;
412 }
413 }
414 }
415
416 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
417 {
418 #ifdef HAVE_SYS_EPOLL_H
419 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
420 ret = nfds;
421 #else
422 pfds[0].fd = sock;
423 pfds[0].events = POLLOUT;
424 pfds[1].fd = STDIN_FILENO;
425 pfds[1].events = POLLIN;
426 nfds = 2;
427 ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
428 #endif
429
430 if (ret < 0)
431 {
432 if (errno != EINTR)
433 {
434 #ifdef HAVE_SYS_EPOLL_H
435 log_error("epoll_wait() error (%d)\n", errno);
436 #else
437 log_error("poll() error (%d)\n", errno);
438 #endif
439 break;
440 }
441 }
442 else if (ret == 0) // timeout
443 {
444 process_bar(j + 1, MAX_PROCESS_BAR_LEN);
445 }
446 else // ret > 0
447 {
448 for (int i = 0; i < nfds; i++)
449 {
450 #ifdef HAVE_SYS_EPOLL_H
451 if (events[i].data.fd == sock)
452 #else
453 if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
454 #endif
455 {
456 len = sizeof(error);
457 if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
458 {
459 log_error("getsockopt() error (%d) !\n", error);
460 goto cleanup;
461 }
462 if (error == 0)
463 {
464 sock_connected = 1;
465 }
466 }
467 #ifdef HAVE_SYS_EPOLL_H
468 else if (events[i].data.fd == STDIN_FILENO)
469 #else
470 else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
471 #endif
472 {
473 do
474 {
475 ch = igetch(0);
476 } while (ch == 0);
477 if (ch == Ctrl('C') || ch == KEY_ESC)
478 {
479 goto cleanup;
480 }
481 }
482 }
483 }
484 }
485 if (SYS_server_exit)
486 {
487 goto cleanup;
488 }
489 if (!sock_connected)
490 {
491 prints("\033[1;31m连接失败!\033[m\r\n");
492 press_any_key();
493
494 goto cleanup;
495 }
496
497 tos = IPTOS_LOWDELAY;
498 if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
499 {
500 log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
501 }
502
503 sock_len = sizeof(sin);
504 if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
505 {
506 log_error("getsockname() error: %d", errno);
507 goto cleanup;
508 }
509
510 strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
511 local_addr[sizeof(local_addr) - 1] = '\0';
512 local_port = ntohs(sin.sin_port);
513
514 if (bbsnet_conf[n].use_ssh)
515 {
516 session = ssh_new();
517 if (session == NULL)
518 {
519 log_error("ssh_new() error\n");
520 goto cleanup;
521 }
522
523 if (ssh_options_set(session, SSH_OPTIONS_FD, &sock) < 0 ||
524 ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
525 ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
526 ssh_options_set(session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
527 ssh_options_set(session, SSH_OPTIONS_USER, remote_user) < 0 ||
528 ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "+ssh-rsa") < 0 ||
529 ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
530 {
531 log_error("Error setting SSH options: %s\n", ssh_get_error(session));
532 goto cleanup;
533 }
534
535 ssh_set_blocking(session, 0);
536
537 while (!SYS_server_exit)
538 {
539 ret = ssh_connect(session);
540 if (ret == SSH_OK)
541 {
542 break;
543 }
544 else if (ret == SSH_ERROR)
545 {
546 log_error("ssh_connect() error\n");
547 goto cleanup;
548 }
549 }
550
551 ret = ssh_session_is_known_server(session);
552 switch (ret)
553 {
554 case SSH_KNOWN_HOSTS_NOT_FOUND:
555 case SSH_KNOWN_HOSTS_UNKNOWN:
556 if (ssh_session_update_known_hosts(session) != SSH_OK)
557 {
558 log_error("ssh_session_update_known_hosts(%s) error\n", bbsnet_conf[n].host_name);
559 prints("\033[1;31m无法添加服务器证书\033[m");
560 press_any_key();
561 goto cleanup;
562 }
563 log_common("SSH key of (%s) is added into %s\n", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
564 case SSH_KNOWN_HOSTS_OK:
565 break;
566 case SSH_KNOWN_HOSTS_CHANGED:
567 case SSH_KNOWN_HOSTS_OTHER:
568 log_error("ssh_session_is_known_server(%s) error: %d\n", bbsnet_conf[n].host_name, ret);
569 prints("\033[1;31m服务器证书已变更\033[m");
570 press_any_key();
571 goto cleanup;
572 }
573
574 for (int i = 0; !SYS_server_exit;)
575 {
576 ret = ssh_userauth_password(session, NULL, remote_pass);
577 if (ret == SSH_AUTH_SUCCESS)
578 {
579 break;
580 }
581 else if (ret == SSH_AUTH_AGAIN)
582 {
583 #ifdef _DEBUG
584 log_error("ssh_userauth_password() error: SSH_AUTH_AGAIN\n");
585 #endif
586 }
587 else if (ret == SSH_AUTH_ERROR)
588 {
589 log_error("ssh_userauth_password() error: %d\n", ret);
590 goto cleanup;
591 }
592 else // if (ret == SSH_AUTH_DENIED)
593 {
594 prints("\033[1;31m身份验证失败!\033[m\r\n");
595 i++;
596 if (i < BBS_login_retry_times)
597 {
598 prints("请输入密码: ");
599 iflush();
600 if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
601 {
602 goto cleanup;
603 }
604 if (remote_pass[0] == '\0')
605 {
606 goto cleanup;
607 }
608 }
609 else
610 {
611 goto cleanup;
612 }
613 }
614 }
615
616 channel = ssh_channel_new(session);
617 if (channel == NULL)
618 {
619 log_error("ssh_channel_new() error\n");
620 goto cleanup;
621 }
622
623 while (!SYS_server_exit)
624 {
625 ret = ssh_channel_open_session(channel);
626 if (ret == SSH_OK)
627 {
628 break;
629 }
630 else if (ret == SSH_ERROR)
631 {
632 log_error("ssh_channel_open_session() error\n");
633 goto cleanup;
634 }
635 }
636
637 while (!SYS_server_exit)
638 {
639 ret = ssh_channel_request_pty(channel);
640 if (ret == SSH_OK)
641 {
642 break;
643 }
644 else if (ret == SSH_ERROR)
645 {
646 log_error("ssh_channel_request_pty() error\n");
647 goto cleanup;
648 }
649 }
650
651 while (!SYS_server_exit)
652 {
653 ret = ssh_channel_request_shell(channel);
654 if (ret == SSH_OK)
655 {
656 break;
657 }
658 else if (ret == SSH_ERROR)
659 {
660 log_error("ssh_channel_request_shell() error\n");
661 goto cleanup;
662 }
663 }
664 }
665
666 prints("\033[1;31m连接成功!\033[m\r\n");
667 iflush();
668 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
669 remote_addr, remote_port, local_addr, local_port, BBS_username);
670
671 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
672 (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
673 input_cd = iconv_open(tocode, stdio_charset);
674 if (input_cd == (iconv_t)(-1))
675 {
676 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
677 goto cleanup;
678 }
679
680 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
681 (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
682 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
683 if (output_cd == (iconv_t)(-1))
684 {
685 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
686 iconv_close(input_cd);
687 goto cleanup;
688 }
689
690 #ifdef HAVE_SYS_EPOLL_H
691 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
692 ev.data.fd = sock;
693 if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
694 {
695 log_error("epoll_ctl(socket) error (%d)\n", errno);
696 goto cleanup;
697 }
698
699 ev.events = EPOLLOUT | EPOLLET;
700 ev.data.fd = STDOUT_FILENO;
701 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
702 {
703 log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
704 goto cleanup;
705 }
706 #endif
707
708 BBS_last_access_tm = t_used = time(NULL);
709 loop = 1;
710
711 while (loop && !SYS_server_exit)
712 {
713 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
714 {
715 log_error("SSH channel is closed\n");
716 loop = 0;
717 break;
718 }
719
720 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(channel))
721 {
722 log_error("Remote SSH channel is closed\n");
723 loop = 0;
724 break;
725 }
726
727 #ifdef HAVE_SYS_EPOLL_H
728 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
729 ret = nfds;
730 #else
731 pfds[0].fd = STDIN_FILENO;
732 pfds[0].events = POLLIN;
733 pfds[1].fd = sock;
734 pfds[1].events = POLLIN | POLLOUT;
735 pfds[2].fd = STDOUT_FILENO;
736 pfds[2].events = POLLOUT;
737 nfds = 3;
738 ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
739 #endif
740
741 if (ret < 0)
742 {
743 if (errno != EINTR)
744 {
745 #ifdef HAVE_SYS_EPOLL_H
746 log_error("epoll_wait() error (%d)\n", errno);
747 #else
748 log_error("poll() error (%d)\n", errno);
749 #endif
750 break;
751 }
752 continue;
753 }
754 else if (ret == 0) // timeout
755 {
756 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
757 {
758 break;
759 }
760 }
761
762 for (int i = 0; i < nfds; i++)
763 {
764 #ifdef HAVE_SYS_EPOLL_H
765 if (events[i].data.fd == STDIN_FILENO)
766 #else
767 if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
768 #endif
769 {
770 stdin_read_wait = 1;
771 }
772
773 #ifdef HAVE_SYS_EPOLL_H
774 if (events[i].data.fd == sock)
775 #else
776 if (pfds[i].fd == sock)
777 #endif
778 {
779 #ifdef HAVE_SYS_EPOLL_H
780 if (events[i].events & EPOLLIN)
781 #else
782 if (pfds[i].revents & POLLIN)
783 #endif
784 {
785 sock_read_wait = 1;
786 }
787
788 #ifdef HAVE_SYS_EPOLL_H
789 if (events[i].events & EPOLLOUT)
790 #else
791 if (pfds[i].revents & POLLOUT)
792 #endif
793 {
794 sock_write_wait = 1;
795 }
796 }
797
798 #ifdef HAVE_SYS_EPOLL_H
799 if (events[i].data.fd == STDOUT_FILENO)
800 #else
801 if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
802 #endif
803 {
804 stdout_write_wait = 1;
805 }
806 }
807
808 if (stdin_read_wait)
809 {
810 while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
811 {
812 if (SSH_v2)
813 {
814 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
815 if (ret == SSH_ERROR)
816 {
817 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
818 loop = 0;
819 break;
820 }
821 else if (ret == SSH_EOF)
822 {
823 stdin_read_wait = 0;
824 loop = 0;
825 break;
826 }
827 else if (ret == 0)
828 {
829 // Send NO-OP to remote server
830 input_buf[input_buf_len] = '\0';
831 input_buf_len++;
832 BBS_last_access_tm = time(NULL);
833
834 stdin_read_wait = 0;
835 break; // Check whether channel is still open
836 }
837 }
838 else
839 {
840 ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
841 }
842 if (ret < 0)
843 {
844 if (errno == EAGAIN || errno == EWOULDBLOCK)
845 {
846 stdin_read_wait = 0;
847 break;
848 }
849 else if (errno == EINTR)
850 {
851 continue;
852 }
853 else
854 {
855 log_error("read(STDIN) error (%d)\n", errno);
856 loop = 0;
857 break;
858 }
859 }
860 else if (ret == 0) // broken pipe
861 {
862 #ifdef _DEBUG
863 log_error("read(STDIN) EOF\n");
864 #endif
865 stdin_read_wait = 0;
866 loop = 0;
867 break;
868 }
869 else
870 {
871 input_buf_len += ret;
872 BBS_last_access_tm = time(NULL);
873
874 // Refresh current action while user input
875 if (user_online_update("BBS_NET") < 0)
876 {
877 log_error("user_online_update(BBS_NET) error\n");
878 }
879
880 continue;
881 }
882 }
883 }
884
885 if (sock_write_wait)
886 {
887 if (input_buf_offset < input_buf_len)
888 {
889 // For debug
890 #ifdef _DEBUG
891 for (int j = input_buf_offset; j < input_buf_len; j++)
892 {
893 log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
894 }
895 #endif
896
897 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
898 if (ret < 0)
899 {
900 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
901 input_buf_len = input_buf_offset; // Discard invalid sequence
902 }
903
904 // For debug
905 #ifdef _DEBUG
906 for (int j = input_conv_offset; j < input_conv_len; j++)
907 {
908 log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
909 }
910 #endif
911 }
912
913 while (input_conv_offset < input_conv_len && !SYS_server_exit)
914 {
915 if (bbsnet_conf[n].use_ssh)
916 {
917 ret = ssh_channel_write(channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
918 if (ret == SSH_ERROR)
919 {
920 log_error("ssh_channel_write() error: %s\n", ssh_get_error(session));
921 loop = 0;
922 break;
923 }
924 }
925 else
926 {
927 ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
928 }
929 if (ret < 0)
930 {
931 if (errno == EAGAIN || errno == EWOULDBLOCK)
932 {
933 sock_write_wait = 0;
934 break;
935 }
936 else if (errno == EINTR)
937 {
938 continue;
939 }
940 else
941 {
942 log_error("write(socket) error (%d)\n", errno);
943 loop = 0;
944 break;
945 }
946 }
947 else if (ret == 0) // broken pipe
948 {
949 #ifdef _DEBUG
950 log_error("write(socket) EOF\n");
951 #endif
952 sock_write_wait = 0;
953 loop = 0;
954 break;
955 }
956 else
957 {
958 input_conv_offset += ret;
959 if (input_conv_offset >= input_conv_len) // Output buffer complete
960 {
961 input_conv_offset = 0;
962 input_conv_len = 0;
963 break;
964 }
965 continue;
966 }
967 }
968 }
969
970 if (sock_read_wait)
971 {
972 while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
973 {
974 if (bbsnet_conf[n].use_ssh)
975 {
976 ret = ssh_channel_read_nonblocking(channel, output_buf + output_buf_len,
977 (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
978 if (ret == SSH_ERROR)
979 {
980 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(session));
981 loop = 0;
982 break;
983 }
984 else if (ret == SSH_EOF)
985 {
986 sock_read_wait = 0;
987 loop = 0;
988 break;
989 }
990 else if (ret == 0)
991 {
992 sock_read_wait = 0;
993 break;
994 }
995 }
996 else
997 {
998 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
999 }
1000 if (ret < 0)
1001 {
1002 if (errno == EAGAIN || errno == EWOULDBLOCK)
1003 {
1004 sock_read_wait = 0;
1005 break;
1006 }
1007 else if (errno == EINTR)
1008 {
1009 continue;
1010 }
1011 else
1012 {
1013 log_error("read(socket) error (%d)\n", errno);
1014 loop = 0;
1015 break;
1016 }
1017 }
1018 else if (ret == 0) // broken pipe
1019 {
1020 #ifdef _DEBUG
1021 log_error("read(socket) EOF\n");
1022 #endif
1023 sock_read_wait = 0;
1024 loop = 0;
1025 break;
1026 }
1027 else
1028 {
1029 output_buf_len += ret;
1030 continue;
1031 }
1032 }
1033 }
1034
1035 if (stdout_write_wait)
1036 {
1037 if (output_buf_offset < output_buf_len)
1038 {
1039 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1040 if (ret < 0)
1041 {
1042 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
1043 output_buf_len = output_buf_offset; // Discard invalid sequence
1044 }
1045 }
1046
1047 while (output_conv_offset < output_conv_len && !SYS_server_exit)
1048 {
1049 if (SSH_v2)
1050 {
1051 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1052 if (ret == SSH_ERROR)
1053 {
1054 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
1055 loop = 0;
1056 break;
1057 }
1058 }
1059 else
1060 {
1061 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1062 }
1063 if (ret < 0)
1064 {
1065 if (errno == EAGAIN || errno == EWOULDBLOCK)
1066 {
1067 stdout_write_wait = 0;
1068 break;
1069 }
1070 else if (errno == EINTR)
1071 {
1072 continue;
1073 }
1074 else
1075 {
1076 log_error("write(STDOUT) error (%d)\n", errno);
1077 loop = 0;
1078 break;
1079 }
1080 }
1081 else if (ret == 0) // broken pipe
1082 {
1083 #ifdef _DEBUG
1084 log_error("write(STDOUT) EOF\n");
1085 #endif
1086 stdout_write_wait = 0;
1087 loop = 0;
1088 break;
1089 }
1090 else
1091 {
1092 output_conv_offset += ret;
1093 if (output_conv_offset >= output_conv_len) // Output buffer complete
1094 {
1095 output_conv_offset = 0;
1096 output_conv_len = 0;
1097 break;
1098 }
1099 continue;
1100 }
1101 }
1102 }
1103 }
1104
1105 iconv_close(input_cd);
1106 iconv_close(output_cd);
1107
1108 cleanup:
1109 #ifdef HAVE_SYS_EPOLL_H
1110 if (close(epollfd) < 0)
1111 {
1112 log_error("close(epoll) error (%d)\n");
1113 }
1114 #endif
1115
1116 if (bbsnet_conf[n].use_ssh)
1117 {
1118 ssh_channel_free(channel);
1119 ssh_disconnect(session);
1120 ssh_free(session);
1121 }
1122
1123 // Restore STDIN/STDOUT flags
1124 fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
1125 fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
1126
1127 if (close(sock) == -1)
1128 {
1129 log_error("Close socket failed\n");
1130 }
1131
1132 t_used = time(NULL) - t_used;
1133 tm_used = gmtime(&t_used);
1134
1135 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
1136 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
1137 tm_used->tm_sec);
1138
1139 BBS_last_access_tm = time(NULL);
1140
1141 return 0;
1142 }
1143
1144 static int bbsnet_refresh()
1145 {
1146 clearscr();
1147
1148 moveto(1, 1);
1149 prints(" ------------------------------------------------------------------------------ ");
1150 for (int i = 2; i < 19; i++)
1151 {
1152 moveto(i, 1);
1153 prints("|");
1154 moveto(i, 80);
1155 prints("|");
1156 }
1157 moveto(19, 1);
1158 prints("|------------------------------------------------------------------------------|");
1159 moveto(22, 1);
1160 prints(" ------------------------------------------------------------------------------ ");
1161 moveto(23, 1);
1162 prints(" [\033[1;32mCtrl+C\033[m]退出");
1163
1164 iflush();
1165
1166 return 0;
1167 }
1168
1169 static int bbsnet_selchange()
1170 {
1171 int i = bbsnet_menu.menu_item_pos[0];
1172
1173 moveto(20, 1);
1174 clrtoeol();
1175 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1176 bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1177 bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1178 (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1179 moveto(20, 80);
1180 prints("|");
1181 moveto(21, 1);
1182 clrtoeol();
1183 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5d\033[m 编码: \033[1;33m%s\033[m",
1184 bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1185 moveto(21, 80);
1186 prints("|");
1187 iflush();
1188
1189 return 0;
1190 }
1191
1192 int bbs_net()
1193 {
1194 int ch, i;
1195
1196 load_bbsnet_conf(CONF_BBSNET);
1197
1198 bbsnet_refresh();
1199 display_menu(&bbsnet_menu);
1200 bbsnet_selchange();
1201
1202 while (!SYS_server_exit)
1203 {
1204 ch = igetch(100);
1205
1206 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1207 {
1208 BBS_last_access_tm = time(NULL);
1209 }
1210
1211 switch (ch)
1212 {
1213 case KEY_NULL: // broken pipe
1214 log_error("KEY_NULL\n");
1215 goto cleanup;
1216 case KEY_TIMEOUT:
1217 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1218 {
1219 log_error("User input timeout\n");
1220 goto cleanup;
1221 }
1222 continue;
1223 case KEY_ESC:
1224 case Ctrl('C'): // user cancel
1225 goto cleanup;
1226 case CR:
1227 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
1228 // Force cleanup anything remaining in the output buffer
1229 clearscr();
1230 iflush();
1231 // Clear screen and redraw menu
1232 bbsnet_refresh();
1233 display_menu(&bbsnet_menu);
1234 bbsnet_selchange();
1235 break;
1236 case KEY_UP:
1237 for (i = 0; i < STATION_PER_LINE; i++)
1238 {
1239 menu_control(&bbsnet_menu, KEY_UP);
1240 }
1241 bbsnet_selchange();
1242 break;
1243 case KEY_DOWN:
1244 for (i = 0; i < STATION_PER_LINE; i++)
1245 {
1246 menu_control(&bbsnet_menu, KEY_DOWN);
1247 }
1248 bbsnet_selchange();
1249 break;
1250 case KEY_LEFT:
1251 menu_control(&bbsnet_menu, KEY_UP);
1252 bbsnet_selchange();
1253 break;
1254 case KEY_RIGHT:
1255 menu_control(&bbsnet_menu, KEY_DOWN);
1256 bbsnet_selchange();
1257 break;
1258 case KEY_HOME:
1259 case KEY_PGUP:
1260 menu_control(&bbsnet_menu, KEY_PGUP);
1261 bbsnet_selchange();
1262 break;
1263 case KEY_END:
1264 case KEY_PGDN:
1265 menu_control(&bbsnet_menu, KEY_PGDN);
1266 bbsnet_selchange();
1267 break;
1268 default:
1269 menu_control(&bbsnet_menu, ch);
1270 bbsnet_selchange();
1271 break;
1272 }
1273 }
1274
1275 cleanup:
1276 unload_bbsnet_conf();
1277
1278 return 0;
1279 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1