/[LeafOK_CVS]/lbbs/src/login.c
ViewVC logotype

Annotation of /lbbs/src/login.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.73 - (hide annotations)
Tue Dec 2 08:04:29 2025 UTC (3 months, 2 weeks ago) by sysadm
Branch: MAIN
Changes since 1.72: +6 -0 lines
Content type: text/x-csrc
Check update time of EULA while user login

1 sysadm 1.65 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * login
4     * - user authentication and online status manager
5     *
6 sysadm 1.66 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.65 */
8 sysadm 1.1
9 sysadm 1.68 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14     #include "common.h"
15 sysadm 1.48 #include "database.h"
16     #include "io.h"
17 sysadm 1.50 #include "ip_mask.h"
18 sysadm 1.14 #include "log.h"
19 sysadm 1.48 #include "login.h"
20 sysadm 1.14 #include "screen.h"
21 sysadm 1.48 #include "user_priv.h"
22     #include <ctype.h>
23 sysadm 1.34 #include <errno.h>
24 sysadm 1.48 #include <stdlib.h>
25 sysadm 1.14 #include <string.h>
26 sysadm 1.3 #include <regex.h>
27 sysadm 1.14 #include <unistd.h>
28 sysadm 1.69 #include <mysql.h>
29 sysadm 1.56 #include <sys/param.h>
30 sysadm 1.1
31 sysadm 1.64 static const int BBS_username_min_len = 3; // common len = 5, special len = 3
32     static const int BBS_password_min_len = 5; // legacy len = 5, current len = 6
33    
34 sysadm 1.67 static const int BBS_allowed_login_failures_within_interval = 10;
35     static const int BBS_login_failures_count_interval = 10; // minutes
36     static const int BBS_allowed_login_failures_per_account = 3;
37    
38     const int BBS_login_retry_times = 3;
39    
40 sysadm 1.41 int bbs_login(void)
41 sysadm 1.1 {
42 sysadm 1.15 char username[BBS_username_max_len + 1];
43     char password[BBS_password_max_len + 1];
44 sysadm 1.37 int i = 0;
45 sysadm 1.16 int ok = 0;
46 sysadm 1.2
47 sysadm 1.37 for (; !SYS_server_exit && !ok && i < BBS_login_retry_times; i++)
48 sysadm 1.11 {
49 sysadm 1.49 prints("\033[1;33m请输入帐号\033[m(试用请输入`\033[1;36mguest\033[m', "
50     "注册请输入`\033[1;31mnew\033[m'): ");
51 sysadm 1.11 iflush();
52    
53 sysadm 1.24 if (str_input(username, sizeof(username), DOECHO) < 0)
54     {
55     continue;
56     }
57 sysadm 1.11
58     if (strcmp(username, "guest") == 0)
59     {
60 sysadm 1.41 load_guest_info();
61 sysadm 1.14
62 sysadm 1.11 return 0;
63     }
64    
65     if (strcmp(username, "new") == 0)
66     {
67 sysadm 1.42 display_file(DATA_REGISTER, 1);
68 sysadm 1.30
69 sysadm 1.51 return -1;
70 sysadm 1.11 }
71    
72 sysadm 1.17 if (username[0] != '\0')
73 sysadm 1.11 {
74 sysadm 1.49 prints("\033[1;37m请输入密码\033[m: ");
75 sysadm 1.11 iflush();
76    
77 sysadm 1.24 if (str_input(password, sizeof(password), NOECHO) < 0)
78     {
79     continue;
80     }
81 sysadm 1.11
82 sysadm 1.41 ok = (check_user(username, password) == 0);
83 sysadm 1.31 iflush();
84 sysadm 1.11 }
85 sysadm 1.24 }
86    
87     if (!ok)
88     {
89 sysadm 1.42 display_file(DATA_LOGIN_ERROR, 1);
90 sysadm 1.24 return -1;
91 sysadm 1.11 }
92 sysadm 1.2
93 sysadm 1.11 return 0;
94     }
95 sysadm 1.2
96 sysadm 1.41 int check_user(const char *username, const char *password)
97 sysadm 1.11 {
98 sysadm 1.44 MYSQL *db = NULL;
99     MYSQL_RES *rs = NULL;
100 sysadm 1.11 MYSQL_ROW row;
101 sysadm 1.15 char sql[SQL_BUFFER_LEN];
102 sysadm 1.44 int ret = 0;
103 sysadm 1.40 int BBS_uid = 0;
104 sysadm 1.22 char client_addr[IP_ADDR_LEN];
105 sysadm 1.27 int i;
106     int ok = 1;
107 sysadm 1.34 char user_tz_env[BBS_user_tz_max_len + 2];
108 sysadm 1.11
109 sysadm 1.41 db = db_open();
110     if (db == NULL)
111     {
112 sysadm 1.44 ret = -1;
113     goto cleanup;
114 sysadm 1.41 }
115    
116 sysadm 1.11 // Verify format
117 sysadm 1.27 for (i = 0; ok && username[i] != '\0'; i++)
118     {
119 sysadm 1.70 if (!(isalpha((int)username[i]) || (i > 0 && (isdigit((int)username[i]) || username[i] == '_'))))
120 sysadm 1.27 {
121     ok = 0;
122     }
123     }
124 sysadm 1.64 if (ok && (i < BBS_username_min_len || i > BBS_username_max_len))
125 sysadm 1.27 {
126     ok = 0;
127     }
128     for (i = 0; ok && password[i] != '\0'; i++)
129     {
130 sysadm 1.70 if (!isalnum((int)password[i]))
131 sysadm 1.27 {
132     ok = 0;
133     }
134     }
135 sysadm 1.64 if (ok && (i < BBS_password_min_len || i > BBS_password_max_len))
136 sysadm 1.27 {
137     ok = 0;
138     }
139    
140     if (!ok)
141 sysadm 1.5 {
142 sysadm 1.49 prints("\033[1;31m用户名或密码格式错误...\033[m\r\n");
143 sysadm 1.44 ret = 1;
144     goto cleanup;
145 sysadm 1.5 }
146    
147 sysadm 1.13 // Begin transaction
148     if (mysql_query(db, "SET autocommit=0") != 0)
149     {
150 sysadm 1.33 log_error("SET autocommit=0 error: %s\n", mysql_error(db));
151 sysadm 1.44 ret = -1;
152     goto cleanup;
153 sysadm 1.13 }
154    
155     if (mysql_query(db, "BEGIN") != 0)
156     {
157 sysadm 1.33 log_error("Begin transaction error: %s\n", mysql_error(db));
158 sysadm 1.44 ret = -1;
159     goto cleanup;
160 sysadm 1.13 }
161    
162 sysadm 1.22 // Failed login attempts from the same source (subnet /24) during certain time period
163     strncpy(client_addr, hostaddr_client, sizeof(client_addr) - 1);
164     client_addr[sizeof(client_addr) - 1] = '\0';
165    
166     snprintf(sql, sizeof(sql),
167     "SELECT COUNT(*) AS err_count FROM user_err_login_log "
168 sysadm 1.44 "WHERE login_dt >= SUBDATE(NOW(), INTERVAL %d MINUTE) "
169 sysadm 1.22 "AND login_ip LIKE '%s'",
170 sysadm 1.44 BBS_login_failures_count_interval,
171 sysadm 1.22 ip_mask(client_addr, 1, '%'));
172     if (mysql_query(db, sql) != 0)
173     {
174 sysadm 1.33 log_error("Query user_list error: %s\n", mysql_error(db));
175 sysadm 1.44 ret = -1;
176     goto cleanup;
177 sysadm 1.22 }
178     if ((rs = mysql_store_result(db)) == NULL)
179     {
180     log_error("Get user_list data failed\n");
181 sysadm 1.44 ret = -1;
182     goto cleanup;
183 sysadm 1.22 }
184     if ((row = mysql_fetch_row(rs)))
185     {
186 sysadm 1.52 if (atoi(row[0]) >= BBS_allowed_login_failures_within_interval)
187 sysadm 1.22 {
188 sysadm 1.52 prints("\033[1;31m来源存在多次失败登陆尝试,请稍后再试,或使用Web方式访问\033[m\r\n");
189 sysadm 1.44 ret = 1;
190     goto cleanup;
191 sysadm 1.22 }
192     }
193     mysql_free_result(rs);
194 sysadm 1.44 rs = NULL;
195 sysadm 1.22
196 sysadm 1.52 // Failed login attempts against the current username since last successful login
197 sysadm 1.22 snprintf(sql, sizeof(sql),
198     "SELECT COUNT(*) AS err_count FROM user_err_login_log "
199 sysadm 1.52 "LEFT JOIN user_list ON user_err_login_log.username = user_list.username "
200     "LEFT JOIN user_pubinfo ON user_list.UID = user_pubinfo.UID "
201     "WHERE user_err_login_log.username = '%s' "
202     "AND (user_err_login_log.login_dt >= user_pubinfo.last_login_dt "
203     "OR user_pubinfo.last_login_dt IS NULL)",
204 sysadm 1.22 username);
205     if (mysql_query(db, sql) != 0)
206     {
207 sysadm 1.33 log_error("Query user_list error: %s\n", mysql_error(db));
208 sysadm 1.44 ret = -1;
209     goto cleanup;
210 sysadm 1.22 }
211     if ((rs = mysql_store_result(db)) == NULL)
212     {
213     log_error("Get user_list data failed\n");
214 sysadm 1.44 ret = -1;
215     goto cleanup;
216 sysadm 1.22 }
217     if ((row = mysql_fetch_row(rs)))
218     {
219 sysadm 1.53 if (atoi(row[0]) >= BBS_allowed_login_failures_per_account)
220 sysadm 1.22 {
221 sysadm 1.52 prints("\033[1;31m账户存在多次失败登陆尝试,请使用Web方式登录解锁\033[m\r\n");
222 sysadm 1.44 ret = 1;
223     goto cleanup;
224 sysadm 1.22 }
225     }
226     mysql_free_result(rs);
227 sysadm 1.44 rs = NULL;
228 sysadm 1.22
229 sysadm 1.18 snprintf(sql, sizeof(sql),
230 sysadm 1.22 "SELECT UID, username, p_login FROM user_list "
231     "WHERE username = '%s' AND password = SHA2('%s', 256) AND enable",
232     username, password);
233 sysadm 1.11 if (mysql_query(db, sql) != 0)
234     {
235 sysadm 1.33 log_error("Query user_list error: %s\n", mysql_error(db));
236 sysadm 1.44 ret = -1;
237     goto cleanup;
238 sysadm 1.11 }
239     if ((rs = mysql_store_result(db)) == NULL)
240 sysadm 1.2 {
241 sysadm 1.11 log_error("Get user_list data failed\n");
242 sysadm 1.44 ret = -1;
243     goto cleanup;
244 sysadm 1.11 }
245 sysadm 1.15 if ((row = mysql_fetch_row(rs)))
246 sysadm 1.11 {
247 sysadm 1.40 BBS_uid = atoi(row[0]);
248 sysadm 1.17 strncpy(BBS_username, row[1], sizeof(BBS_username) - 1);
249     BBS_username[sizeof(BBS_username) - 1] = '\0';
250 sysadm 1.13 int p_login = atoi(row[2]);
251    
252     mysql_free_result(rs);
253 sysadm 1.44 rs = NULL;
254 sysadm 1.13
255     // Add user login log
256 sysadm 1.18 snprintf(sql, sizeof(sql),
257 sysadm 1.22 "INSERT INTO user_login_log(UID, login_dt, login_ip) "
258 sysadm 1.40 "VALUES(%d, NOW(), '%s')",
259 sysadm 1.22 BBS_uid, hostaddr_client);
260 sysadm 1.13 if (mysql_query(db, sql) != 0)
261     {
262 sysadm 1.33 log_error("Insert into user_login_log error: %s\n", mysql_error(db));
263 sysadm 1.44 ret = -1;
264     goto cleanup;
265 sysadm 1.13 }
266    
267     // Commit transaction
268     if (mysql_query(db, "COMMIT") != 0)
269     {
270 sysadm 1.33 log_error("Commit transaction error: %s\n", mysql_error(db));
271 sysadm 1.44 ret = -1;
272     goto cleanup;
273 sysadm 1.13 }
274    
275     if (p_login == 0)
276 sysadm 1.11 {
277 sysadm 1.49 prints("\033[1;31m您目前无权登陆...\033[m\r\n");
278 sysadm 1.44 ret = 1;
279     goto cleanup;
280 sysadm 1.11 }
281     }
282     else
283     {
284     mysql_free_result(rs);
285 sysadm 1.44 rs = NULL;
286 sysadm 1.2
287 sysadm 1.18 snprintf(sql, sizeof(sql),
288 sysadm 1.22 "INSERT INTO user_err_login_log(username, password, login_dt, login_ip) "
289     "VALUES('%s', '%s', NOW(), '%s')",
290     username, password, hostaddr_client);
291 sysadm 1.11 if (mysql_query(db, sql) != 0)
292     {
293 sysadm 1.33 log_error("Insert into user_err_login_log error: %s\n", mysql_error(db));
294 sysadm 1.44 ret = -1;
295     goto cleanup;
296 sysadm 1.11 }
297    
298 sysadm 1.13 // Commit transaction
299     if (mysql_query(db, "COMMIT") != 0)
300     {
301 sysadm 1.33 log_error("Commit transaction error: %s\n", mysql_error(db));
302 sysadm 1.44 ret = -1;
303     goto cleanup;
304 sysadm 1.13 }
305    
306 sysadm 1.49 prints("\033[1;31m错误的用户名或密码...\033[m\r\n");
307 sysadm 1.44 ret = 1;
308     goto cleanup;
309 sysadm 1.11 }
310 sysadm 1.13
311     // Set AUTOCOMMIT = 1
312     if (mysql_query(db, "SET autocommit=1") != 0)
313     {
314 sysadm 1.33 log_error("SET autocommit=1 error: %s\n", mysql_error(db));
315 sysadm 1.44 ret = -1;
316     goto cleanup;
317 sysadm 1.13 }
318 sysadm 1.2
319 sysadm 1.11 ret = load_user_info(db, BBS_uid);
320    
321     switch (ret)
322 sysadm 1.2 {
323 sysadm 1.11 case 0: // Login successfully
324     break;
325     case -1: // Load data error
326 sysadm 1.49 prints("\033[1;31m读取用户数据错误...\033[m\r\n");
327 sysadm 1.44 ret = -1;
328     goto cleanup;
329 sysadm 1.11 case -2: // Unused
330 sysadm 1.49 prints("\033[1;31m请通过Web登录更新用户许可协议...\033[m\r\n");
331 sysadm 1.44 ret = 1;
332     goto cleanup;
333 sysadm 1.11 case -3: // Dead
334 sysadm 1.49 prints("\033[1;31m很遗憾,您已经永远离开了我们的世界!\033[m\r\n");
335 sysadm 1.44 ret = 1;
336     goto cleanup;
337 sysadm 1.11 default:
338 sysadm 1.44 ret = -2;
339     goto cleanup;
340 sysadm 1.2 }
341    
342 sysadm 1.71 if (!SSH_v2 && checklevel2(&BBS_priv, P_MAN_S))
343     {
344     prints("\033[1;31m非普通账户必须使用SSH方式登录\033[m\r\n");
345     ret = 1;
346     goto cleanup;
347     }
348    
349 sysadm 1.18 snprintf(sql, sizeof(sql),
350 sysadm 1.22 "UPDATE user_pubinfo SET visit_count = visit_count + 1, "
351 sysadm 1.40 "last_login_dt = NOW() WHERE UID = %d",
352 sysadm 1.22 BBS_uid);
353 sysadm 1.13 if (mysql_query(db, sql) != 0)
354     {
355 sysadm 1.33 log_error("Update user_pubinfo error: %s\n", mysql_error(db));
356 sysadm 1.44 ret = -1;
357     goto cleanup;
358 sysadm 1.13 }
359    
360 sysadm 1.15 if (user_online_add(db) != 0)
361     {
362 sysadm 1.44 ret = -1;
363     goto cleanup;
364 sysadm 1.15 }
365    
366 sysadm 1.45 BBS_last_access_tm = BBS_login_tm = time(NULL);
367 sysadm 1.13
368 sysadm 1.34 // Set user tz to process env
369     if (BBS_user_tz[0] != '\0')
370     {
371     user_tz_env[0] = ':';
372     strncpy(user_tz_env + 1, BBS_user_tz, sizeof(user_tz_env) - 2);
373     user_tz_env[sizeof(user_tz_env) - 1] = '\0';
374    
375     if (setenv("TZ", user_tz_env, 1) == -1)
376     {
377     log_error("setenv(TZ = %s) error %d\n", user_tz_env, errno);
378     return -3;
379     }
380    
381     tzset();
382     }
383    
384 sysadm 1.44 cleanup:
385     mysql_free_result(rs);
386 sysadm 1.41 mysql_close(db);
387    
388 sysadm 1.44 return ret;
389 sysadm 1.1 }
390 sysadm 1.2
391 sysadm 1.40 int load_user_info(MYSQL *db, int BBS_uid)
392 sysadm 1.3 {
393 sysadm 1.44 MYSQL_RES *rs = NULL;
394 sysadm 1.11 MYSQL_ROW row;
395 sysadm 1.15 char sql[SQL_BUFFER_LEN];
396 sysadm 1.11 int life;
397     time_t last_login_dt;
398 sysadm 1.44 int ret = 0;
399 sysadm 1.11
400 sysadm 1.18 snprintf(sql, sizeof(sql),
401 sysadm 1.43 "SELECT life, UNIX_TIMESTAMP(last_login_dt), user_timezone, exp, nickname "
402 sysadm 1.40 "FROM user_pubinfo WHERE UID = %d",
403 sysadm 1.22 BBS_uid);
404 sysadm 1.11 if (mysql_query(db, sql) != 0)
405     {
406 sysadm 1.33 log_error("Query user_pubinfo error: %s\n", mysql_error(db));
407 sysadm 1.44 ret = -1;
408     goto cleanup;
409 sysadm 1.11 }
410     if ((rs = mysql_store_result(db)) == NULL)
411     {
412     log_error("Get user_pubinfo data failed\n");
413 sysadm 1.44 ret = -1;
414     goto cleanup;
415 sysadm 1.11 }
416 sysadm 1.15 if ((row = mysql_fetch_row(rs)))
417 sysadm 1.11 {
418     life = atoi(row[0]);
419     last_login_dt = (time_t)atol(row[1]);
420 sysadm 1.34
421     strncpy(BBS_user_tz, row[2], sizeof(BBS_user_tz) - 1);
422     BBS_user_tz[sizeof(BBS_user_tz) - 1] = '\0';
423 sysadm 1.43
424     BBS_user_exp = atoi(row[3]);
425    
426     strncpy(BBS_nickname, row[4], sizeof(BBS_nickname));
427     BBS_nickname[sizeof(BBS_nickname) - 1] = '\0';
428 sysadm 1.11 }
429     else
430     {
431 sysadm 1.44 ret = -1; // Data not found
432     goto cleanup;
433 sysadm 1.11 }
434     mysql_free_result(rs);
435 sysadm 1.44 rs = NULL;
436 sysadm 1.3
437 sysadm 1.13 if (life != 333 && life != 365 && life != 666 && life != 999 && // Not immortal
438 sysadm 1.45 time(NULL) - last_login_dt > 60 * 60 * 24 * life)
439 sysadm 1.11 {
440 sysadm 1.44 ret = -3; // Dead
441     goto cleanup;
442 sysadm 1.11 }
443 sysadm 1.5
444 sysadm 1.15 if (load_priv(db, &BBS_priv, BBS_uid) != 0)
445     {
446 sysadm 1.44 ret = -1;
447     goto cleanup;
448 sysadm 1.15 }
449 sysadm 1.11
450 sysadm 1.73 if (last_login_dt < BBS_eula_tm)
451     {
452     ret = -2; // require update agreement first
453     goto cleanup;
454     }
455    
456 sysadm 1.44 cleanup:
457     mysql_free_result(rs);
458    
459     return ret;
460 sysadm 1.2 }
461 sysadm 1.5
462 sysadm 1.41 int load_guest_info(void)
463 sysadm 1.5 {
464 sysadm 1.44 MYSQL *db = NULL;
465     int ret = 0;
466 sysadm 1.41
467     db = db_open();
468     if (db == NULL)
469     {
470 sysadm 1.44 ret = -1;
471     goto cleanup;
472 sysadm 1.41 }
473    
474 sysadm 1.17 strncpy(BBS_username, "guest", sizeof(BBS_username) - 1);
475     BBS_username[sizeof(BBS_username) - 1] = '\0';
476 sysadm 1.5
477 sysadm 1.43 BBS_user_exp = 0;
478    
479     strncpy(BBS_nickname, "Guest", sizeof(BBS_nickname));
480     BBS_nickname[sizeof(BBS_nickname) - 1] = '\0';
481    
482 sysadm 1.15 if (load_priv(db, &BBS_priv, 0) != 0)
483     {
484 sysadm 1.44 ret = -1;
485     goto cleanup;
486 sysadm 1.15 }
487 sysadm 1.6
488 sysadm 1.15 if (user_online_add(db) != 0)
489     {
490 sysadm 1.44 ret = -1;
491     goto cleanup;
492 sysadm 1.15 }
493 sysadm 1.5
494 sysadm 1.45 BBS_last_access_tm = BBS_login_tm = time(NULL);
495 sysadm 1.5
496 sysadm 1.44 cleanup:
497 sysadm 1.41 mysql_close(db);
498 sysadm 1.44
499     return ret;
500 sysadm 1.5 }
501 sysadm 1.15
502     int user_online_add(MYSQL *db)
503     {
504     char sql[SQL_BUFFER_LEN];
505    
506 sysadm 1.60 snprintf(sql, sizeof(sql),
507     "INSERT INTO visit_log(dt, IP) VALUES(NOW(), '%s')",
508     hostaddr_client);
509     if (mysql_query(db, sql) != 0)
510     {
511     log_error("Add visit log error: %s\n", mysql_error(db));
512     return -1;
513     }
514    
515 sysadm 1.15 if (user_online_del(db) != 0)
516     {
517 sysadm 1.60 return -2;
518 sysadm 1.15 }
519    
520 sysadm 1.18 snprintf(sql, sizeof(sql),
521 sysadm 1.61 "INSERT INTO user_online(SID, UID, ip, current_action, login_tm, last_tm) "
522     "VALUES('Telnet_Process_%d', %d, '%s', 'LOGIN', NOW(), NOW())",
523 sysadm 1.22 getpid(), BBS_priv.uid, hostaddr_client);
524 sysadm 1.15 if (mysql_query(db, sql) != 0)
525     {
526 sysadm 1.33 log_error("Add user_online error: %s\n", mysql_error(db));
527 sysadm 1.60 return -3;
528 sysadm 1.15 }
529    
530     return 0;
531     }
532    
533     int user_online_del(MYSQL *db)
534     {
535     char sql[SQL_BUFFER_LEN];
536    
537 sysadm 1.57 snprintf(sql, sizeof(sql),
538     "DELETE FROM user_online WHERE SID = 'Telnet_Process_%d'",
539     getpid());
540     if (mysql_query(db, sql) != 0)
541     {
542     log_error("Delete user_online error: %s\n", mysql_error(db));
543     return -1;
544     }
545    
546     return 0;
547     }
548    
549     int user_online_exp(MYSQL *db)
550     {
551     char sql[SQL_BUFFER_LEN];
552    
553 sysadm 1.56 // +1 exp for every 5 minutes online since last logout
554     // but at most 24 hours worth of exp can be gained in Telnet session
555     snprintf(sql, sizeof(sql),
556 sysadm 1.60 "UPDATE user_pubinfo SET exp = exp + FLOOR(LEAST(TIMESTAMPDIFF("
557     "SECOND, GREATEST(last_login_dt, IF(last_logout_dt IS NULL, last_login_dt, last_logout_dt)), NOW()"
558     ") / 60 / 5, 12 * 24)), last_logout_dt = NOW() "
559     "WHERE UID = %d",
560     BBS_priv.uid);
561 sysadm 1.56 if (mysql_query(db, sql) != 0)
562     {
563     log_error("Update user_pubinfo error: %s\n", mysql_error(db));
564     return -1;
565     }
566 sysadm 1.15
567     return 0;
568     }
569 sysadm 1.47
570     int user_online_update(const char *action)
571     {
572     MYSQL *db = NULL;
573     char sql[SQL_BUFFER_LEN];
574    
575 sysadm 1.55 if ((action == NULL || strcmp(BBS_current_action, action) == 0) &&
576 sysadm 1.54 time(NULL) - BBS_current_action_tm < BBS_current_action_refresh_interval) // No change
577 sysadm 1.47 {
578     return 0;
579     }
580    
581 sysadm 1.55 if (action != NULL)
582     {
583     strncpy(BBS_current_action, action, sizeof(BBS_current_action) - 1);
584     BBS_current_action[sizeof(BBS_current_action) - 1] = '\0';
585     }
586    
587 sysadm 1.54 BBS_current_action_tm = time(NULL);
588 sysadm 1.47
589     db = db_open();
590     if (db == NULL)
591     {
592     log_error("db_open() error: %s\n", mysql_error(db));
593     return -1;
594     }
595    
596     snprintf(sql, sizeof(sql),
597 sysadm 1.62 "UPDATE user_online SET current_action = '%s', last_tm = NOW() "
598 sysadm 1.47 "WHERE SID = 'Telnet_Process_%d'",
599     BBS_current_action, getpid());
600     if (mysql_query(db, sql) != 0)
601     {
602     log_error("Update user_online error: %s\n", mysql_error(db));
603     return -2;
604     }
605    
606     mysql_close(db);
607    
608     return 1;
609     }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1