Compare commits

...

23 Commits

Author SHA1 Message Date
5aaaf7e4f0 URL Debugging wegen nichtaufnahme von Anfragen
All checks were successful
release-tag / release-image (push) Successful in 46s
2025-01-20 20:34:20 +01:00
5b7b877474 Neues Build-File nicht nano und net-tools
All checks were successful
release-tag / release-image (push) Successful in 49s
2025-01-17 22:33:31 +01:00
cb8f1f178a Weitere Tests für IPv6
All checks were successful
release-tag / release-image (push) Successful in 45s
2025-01-17 21:58:08 +01:00
ffaa04c46c Änderung des Zeitstempels beim Logging
All checks were successful
release-tag / release-image (push) Successful in 44s
2025-01-16 11:53:36 +01:00
cf50911e80 IP-Auslesen für dns-request hinzugefügt.
All checks were successful
release-tag / release-image (push) Successful in 45s
2025-01-16 09:07:34 +01:00
877e4635ba Type-Any hinzugefügt
All checks were successful
release-tag / release-image (push) Successful in 46s
2025-01-16 02:42:05 +01:00
a1c80dcc07 IPv6-Fix und kleine Bug-Fixes
All checks were successful
release-tag / release-image (push) Successful in 45s
2025-01-16 02:27:00 +01:00
50206677ec bugfix log-function
All checks were successful
release-tag / release-image (push) Successful in 45s
2025-01-16 01:40:44 +01:00
0cb44ad9ba Hinzufügen einer Logging-Funktion
All checks were successful
release-tag / release-image (push) Successful in 44s
2025-01-16 01:36:55 +01:00
ed93d04d7e casesensitive fix
All checks were successful
release-tag / release-image (push) Successful in 42s
2025-01-16 01:24:08 +01:00
130411e58f weiteres logging
All checks were successful
release-tag / release-image (push) Successful in 46s
2025-01-16 01:04:32 +01:00
239add14dd debug-nachrichten ergänzt
All checks were successful
release-tag / release-image (push) Successful in 43s
2025-01-15 08:59:02 +01:00
3bc82edb9a minor bugfix
All checks were successful
release-tag / release-image (push) Successful in 43s
2025-01-15 08:55:39 +01:00
40be13e44d Merge pull request 'prüpflog hinzugefügt' (#6) from master into main
All checks were successful
release-tag / release-image (push) Successful in 44s
Reviewed-on: #6
2025-01-15 07:49:34 +00:00
c5fd6d9cc9 prüpflog hinzugefügt 2025-01-15 08:48:53 +01:00
d174d2a25a Merge pull request 'quickfix-1' (#5) from master into main
All checks were successful
release-tag / release-image (push) Successful in 44s
Reviewed-on: #5
2025-01-14 21:13:25 +00:00
70d9354e17 quickfix-1 2025-01-14 22:12:37 +01:00
995c6b4d68 Merge pull request 'Weitere Anpassungen und Konsolen-Log verbesserungen' (#4) from master into main
All checks were successful
release-tag / release-image (push) Successful in 1m31s
Reviewed-on: #4
2025-01-14 21:09:22 +00:00
0c7aac0430 Weitere Anpassungen und Konsolen-Log verbesserungen 2025-01-14 22:07:06 +01:00
4a9ff7b4f5 Merge pull request 'master' (#3) from master into main
All checks were successful
release-tag / release-image (push) Successful in 44s
Reviewed-on: #3
2025-01-14 07:12:43 +00:00
jbergner
025466f9d8 PTR Fix + IPv6 Fix 2025-01-14 08:12:13 +01:00
6c30aa2274 main.go aktualisiert 2025-01-14 06:44:56 +00:00
a9a3331a0a PTR test 2025-01-14 06:54:47 +01:00
3 changed files with 292 additions and 42 deletions

View File

@@ -1,5 +1,6 @@
FROM golang:1.23.3
RUN mkdir /data
RUN apt update && apt install net-tools nano -y
COPY data/* /data
WORKDIR /app
COPY go.mod go.sum ./

View File

@@ -1 +1,10 @@
{}
{
"friedhof8.hilden.de.": {
"dns": "friedhof8.hilden.de",
"ipv4": "1.1.1.2",
"ipv6": "2001::5b:41",
"user": "friedhof",
"token": "ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f",
"lastseen": "2025-01-14 06:53:45.7690632 +0100 CET m=+27.298316601"
}
}

322
main.go
View File

@@ -6,6 +6,7 @@ import (
"encoding/json"
"fmt"
"log"
"net"
"net/http"
"os"
"os/signal"
@@ -16,10 +17,19 @@ import (
"github.com/miekg/dns"
)
/*
DNS-Status-Code übersicht: https://pkg.go.dev/github.com/miekg/dns@v1.1.62#TypeSOA
*/
type DB map[string]dns_entry
var D map[string]dns_entry
var DEBUG bool = false
var ERRORLOG_FILE string = "/data/error.log"
type dns_entry struct {
Dns string `json:"dns"`
Ipv4 string `json:"ipv4"`
@@ -34,14 +44,14 @@ func writeToFile(filename string, data DB) error {
// JSON konvertieren
jsonData, err := json.MarshalIndent(data, "", " ")
if err != nil {
fmt.Println("Fehler beim Serialisieren: ", err)
WriteLog("!", "Fehler beim Serialisieren: ", err)
return err
}
// Datei öffnen/erstellen
err = os.WriteFile(filename, jsonData, 0644)
if err != nil {
fmt.Println("Fehler beim Schreiben der Datei: ", err)
WriteLog("!", "Fehler beim Schreiben der Datei: ", err)
return err
}
@@ -53,7 +63,7 @@ func readFromFile(filename string) (DB, error) {
// Datei lesen
jsonData, err := os.ReadFile(filename)
if err != nil {
fmt.Println("Fehler beim Lesen der Datei: ", err)
WriteLog("!", "Fehler beim Lesen der Datei: ", err)
return nil, err
}
@@ -61,7 +71,7 @@ func readFromFile(filename string) (DB, error) {
var data DB
err = json.Unmarshal(jsonData, &data)
if err != nil {
fmt.Println("Fehler beim Parsen von JSON: ", err)
WriteLog("!", "Fehler beim Parsen von JSON: ", err)
return nil, err
}
@@ -79,7 +89,45 @@ func VerifyToken(token, storedHash string) bool {
return HashToken(token) == storedHash
}
func reverseString(s string) string {
// Konvertiere den String in eine Rune-Slice, um Unicode-Zeichen zu unterstützen
runes := []rune(s)
n := len(runes)
// Tausche die Elemente, um den String umzudrehen
for i := 0; i < n/2; i++ {
runes[i], runes[n-1-i] = runes[n-1-i], runes[i]
}
// Konvertiere die Rune-Slice zurück in einen String
return string(runes)
}
func IPv6ToPTR(ipv6 string) (string, error) {
// Parse the IPv6 address to validate it
parsedIP := net.ParseIP(ipv6)
if parsedIP == nil || parsedIP.To16() == nil || parsedIP.To4() != nil {
return "", fmt.Errorf("invalid IPv6 address: %s", ipv6)
}
// Expand the IPv6 address to its full form
expanded := parsedIP.To16()
// Convert to a reversed nibble format for PTR
var nibbles []string
for i := len(expanded) - 1; i >= 0; i-- {
hexByte := fmt.Sprintf("%02x", expanded[i])
// Add the nibbles in reverse order
nibbles = append(nibbles, string(hexByte[1]), string(hexByte[0]))
}
// Join the nibbles with dots and append the reverse domain
reversed := strings.Join(nibbles, ".")
return reversed + ".ip6.arpa.", nil
}
func handler(w http.ResponseWriter, r *http.Request) {
WriteLog("~", "Full-URL:", r.URL.String())
Dns := r.URL.Query().Get("DDNS")
Ip := r.URL.Query().Get("IP")
Ip6 := r.URL.Query().Get("IPv6")
@@ -90,9 +138,14 @@ func handler(w http.ResponseWriter, r *http.Request) {
D = make(map[string]dns_entry)
}
if strings.Contains(Ip6, ".") {
WriteLog("!", "IPv6 nicht möglich (IP-Version-Mismatch):", Ip6, "eventuell eine IPv4-Adresse?")
Ip6 = ""
}
if strings.EqualFold(Dns, "") || strings.EqualFold(Ip, "") || strings.EqualFold(User, "") || strings.EqualFold(Token, "") {
/* strings.ToLower(Dns) != strings.ToLower("") && strings.ToLower(Ip) != strings.ToLower("") && strings.ToLower(User) != strings.ToLower("") && strings.ToLower(Token) != strings.ToLower("")*/
fmt.Println("Eintrag unvollständig: ", D[Dns])
WriteLog("!", "Eintrag unvollständig: ", D[Dns])
w.WriteHeader(200)
w.Write([]byte("nochg"))
@@ -101,33 +154,33 @@ func handler(w http.ResponseWriter, r *http.Request) {
if entry, exists := D[Dns+"."]; exists {
if User == entry.User && VerifyToken(Token, entry.Token) {
D[Dns+"."] = dns_entry{Dns: Dns, Ipv4: Ip, Ipv6: Ip6, User: User, Token: entry.Token, LastSeen: time.Now().String()}
fmt.Println("Eintrag aktualisiert: ", entry, D[Dns+"."])
WriteLog("~", "Eintrag aktualisiert: ", entry, D[Dns+"."])
// Datei speichern
filename := "/data/data.json"
err := writeToFile(filename, D)
if err != nil {
fmt.Println("Fehler beim Schreiben:", err)
WriteLog("!", "Fehler beim Schreiben:", err)
return
}
fmt.Println("Daten erfolgreich in Datei geschrieben.")
WriteLog("~", "Daten erfolgreich in Datei geschrieben.")
w.WriteHeader(200)
w.Write([]byte("good"))
} else {
fmt.Println("Eintrag aktualisieren abgelehnt (Benutzer/Passwort ungültig): ", entry, D[Dns])
WriteLog("!", "Eintrag aktualisieren abgelehnt (Benutzer/Passwort ungültig): ", entry, D[Dns])
w.WriteHeader(200)
w.Write([]byte("nochg"))
}
} else {
D[Dns+"."] = dns_entry{Dns: Dns, Ipv4: Ip, Ipv6: Ip6, User: User, Token: HashToken(Token), LastSeen: time.Now().String()}
fmt.Println("Eintrag erstellt: ", entry, D[Dns+"."])
WriteLog("~", "Eintrag erstellt: ", entry, D[Dns+"."])
// Datei speichern
filename := "/data/data.json"
err := writeToFile(filename, D)
if err != nil {
fmt.Println("Fehler beim Schreiben:", err)
WriteLog("!", "Fehler beim Schreiben:", err)
return
}
fmt.Println("Daten erfolgreich in Datei geschrieben.")
WriteLog("~", "Daten erfolgreich in Datei geschrieben.")
w.WriteHeader(200)
w.Write([]byte("good"))
}
@@ -135,8 +188,89 @@ func handler(w http.ResponseWriter, r *http.Request) {
}
func handlerIP(w http.ResponseWriter, r *http.Request) {
var SysLog = []string{}
func WriteLog(a ...any) error {
if DEBUG {
fmt.Println(time.Now().Format("2006-01-02_15-04-05"), a)
}
SysLog = append(SysLog, fmt.Sprintf("%s %s", time.Now().String(), a))
// JSON konvertieren
jsonData, err := json.MarshalIndent(SysLog, "", " ")
if err != nil {
fmt.Println("!", "Fehler beim Serialisieren: ", err)
return err
}
// Datei öffnen/erstellen
err = os.WriteFile(ERRORLOG_FILE, jsonData, 0644)
if err != nil {
fmt.Println("!", "Fehler beim Schreiben der Datei: ", err)
return err
}
return nil
}
func handlerIP(w http.ResponseWriter, r *http.Request) {
remoteIP := r.Header.Get("X-Forwarded-For")
if remoteIP == "" {
remoteIP = r.RemoteAddr // Fallback, wenn kein Header gesetzt ist
}
if DEBUG {
WriteLog("~", "Remote-IP:", remoteIP)
}
w.WriteHeader(200)
w.Write([]byte(remoteIP))
}
func handlerIPv6Pro(w http.ResponseWriter, r *http.Request) {
// Funktion zum Extrahieren der IP-Adresse
getIP := func(r *http.Request) string {
// Prüfen, ob X-Forwarded-For vorhanden ist (für Proxys)
xff := r.Header.Get("X-Forwarded-For")
if xff != "" {
// X-Forwarded-For kann mehrere IPs enthalten (Client, Proxy, etc.)
ips := strings.Split(xff, ",")
return strings.TrimSpace(ips[0])
}
// Prüfen, ob X-Real-IP vorhanden ist (eine alternative Proxy-Header-Option)
xRealIP := r.Header.Get("X-Real-IP")
if xRealIP != "" {
return xRealIP
}
// Fallback: RemoteAddr verwenden
host, _, err := net.SplitHostPort(r.RemoteAddr)
if err != nil {
return r.RemoteAddr // Falls SplitHostPort fehlschlägt, gib die Raw-Adresse zurück
}
return host
}
// Die IP-Adresse des Clients auslesen
clientIP := getIP(r)
// Prüfen, ob IPv4 oder IPv6
parsedIP := net.ParseIP(clientIP)
if parsedIP == nil {
http.Error(w, "Ungültige IP-Adresse", http.StatusInternalServerError)
return
}
// Ausgabe der Adresse
if parsedIP.To4() != nil {
fmt.Fprintf(w, "Client IPv4-Adresse: %s\n", clientIP)
} else {
fmt.Fprintf(w, "Client IPv6-Adresse: %s\n", clientIP)
}
// Optionale Ausgabe aller Header (Debugging)
fmt.Fprintln(w, "\nAlle HTTP-Header:")
for name, values := range r.Header {
for _, value := range values {
fmt.Fprintf(w, "%s: %s\n", name, value)
}
}
}
func handleDNSRequest(w dns.ResponseWriter, r *dns.Msg) {
@@ -145,34 +279,132 @@ func handleDNSRequest(w dns.ResponseWriter, r *dns.Msg) {
msg.SetReply(r)
msg.Authoritative = true
if DEBUG {
WriteLog("~", "handleDNSRequest", "RemotePeer", w.RemoteAddr().String())
}
// Durchlaufe alle Fragen in der Anfrage
for _, q := range r.Question {
if strings.ToLower(q.Name) != q.Name {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "strings.ToLower(q.Name) != q.Name", strings.ToLower(q.Name), q.Name)
}
}
switch q.Qtype {
case dns.TypeA: // IPv4-Anfrage
ip, exists := D[q.Name]
ip, exists := D[strings.ToLower(q.Name)]
if exists {
rr, err := dns.NewRR(q.Name + " A " + ip.Ipv4)
rr, err := dns.NewRR(strings.ToLower(q.Name) + " A " + ip.Ipv4)
if err == nil {
fmt.Println("Antwort (IPv4):", rr, q.Name)
if DEBUG {
WriteLog("~", "handleDNSRequest", "case dns.TypeA", "D[q.Name]", D[strings.ToLower(q.Name)], "q.Name", strings.ToLower(q.Name))
}
msg.Answer = append(msg.Answer, rr)
} else {
fmt.Println("Fehler beim Erstellen der Antwort (4):", err)
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeA", "IPv4", "error", err)
}
}
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeA", "not found in D", strings.ToLower(q.Name))
}
}
case dns.TypeAAAA: // IPv6-Anfrage
// Beispielhafte IPv6-Adresse für Demonstration
ip, exists := D[q.Name]
if exists && !strings.EqualFold(ip.Ipv6, "") {
rr, err := dns.NewRR(q.Name + " AAAA " + ip.Ipv6)
ip6, exists := D[strings.ToLower(q.Name)]
if exists && !strings.EqualFold(ip6.Ipv6, "") {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " AAAA " + ip6.Ipv6)
if err == nil {
fmt.Println("Antwort (IPv6):", rr, q.Name)
if DEBUG {
WriteLog("~", "handleDNSRequest", "case dns.TypeAAAA", "D[q.Name]", D[strings.ToLower(q.Name)], "q.Name", strings.ToLower(q.Name))
}
msg.Answer = append(msg.Answer, rr)
} else {
fmt.Println("Fehler beim Erstellen der Antwort (6):", err)
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeAAAA", "IPv6", "error", err)
}
}
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeAAAA", "not found in D", strings.ToLower(q.Name))
}
}
case dns.TypePTR:
for a, b := range D {
iptocheck := reverseString(b.Ipv4)
if iptocheck+".in-addr.arpa." == strings.ToLower(q.Name) {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " PTR " + a)
if err == nil {
if DEBUG {
WriteLog("~", "handleDNSRequest", "case dns.TypePTR", "IPv4", "found match", a, b)
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypePTR", "IPv4", "error", err)
}
}
}
ip6tocheck, _ := IPv6ToPTR(b.Ipv6)
if ip6tocheck == strings.ToLower(q.Name) {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " PTR " + a)
if err == nil {
if DEBUG {
WriteLog("~", "handleDNSRequest", "case dns.TypePTR", "IPv6", "found match", a, b)
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypePTR", "IPv6", "error", err)
}
}
}
}
case dns.TypeANY:
ip, exists := D[strings.ToLower(q.Name)]
if exists {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " A " + ip.Ipv4)
if err == nil {
if DEBUG {
WriteLog("~", "handleDNSRequest", "case dns.TypeANY", "D[q.Name]", D[strings.ToLower(q.Name)], "q.Name", strings.ToLower(q.Name))
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "IPv4", "error", err)
}
}
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "not found in D", strings.ToLower(q.Name))
}
}
// Beispielhafte IPv6-Adresse für Demonstration
ip6, exists := D[strings.ToLower(q.Name)]
if exists && !strings.EqualFold(ip6.Ipv6, "") {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " AAAA " + ip6.Ipv6)
if err == nil {
if DEBUG {
WriteLog("~", "handleDNSRequest", "case dns.TypeANY", "D[q.Name]", D[strings.ToLower(q.Name)], "q.Name", strings.ToLower(q.Name))
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "IPv6", "error", err)
}
}
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "not found in D", strings.ToLower(q.Name))
}
}
default:
// Ignoriere nicht unterstützte Typen
if DEBUG {
WriteLog("+", "unhandledDNSRequest", r.Question, strings.ToLower(q.Name), q.Qclass, q.Qtype)
}
}
}
@@ -181,15 +413,15 @@ func handleDNSRequest(w dns.ResponseWriter, r *dns.Msg) {
}
func prepareExit() {
fmt.Println("Running exit tasks...")
fmt.Println("Exit completed.")
WriteLog("~", "Running exit tasks...")
os.Rename("/data/error.log", "/data/error_"+time.Now().Format("2006-01-02_15-04-05")+".log")
fmt.Println("~", "Exit completed.")
}
func StopServer(e error) {
fmt.Println("Stopping server...")
WriteLog("~", "Stopping server...")
prepareExit()
fmt.Println("Server stopped!")
fmt.Println("~", "Server stopped!")
}
func main() {
@@ -198,17 +430,24 @@ func main() {
HTTP_TLS := os.Getenv("HTTP_TLS") /* 1/0 */
HTTP_TLS_PRIVATEKEY := os.Getenv("HTTP_TLS_PRIVATEKEY")
HTTP_TLS_CERTIFICATE := os.Getenv("HTTP_TLS_CERTIFICATE")
ERRORLOG_FILE = os.Getenv("ERRORLOG_FILE")
if os.Getenv("DEBUG") == "1" {
DEBUG = true
WriteLog("~", "Debug mode enabled.")
}
if strings.EqualFold(HTTP_TLS, "") || strings.EqualFold(HTTP_PORT, "") || strings.EqualFold(HTTP_TLS_PRIVATEKEY, "") || strings.EqualFold(HTTP_TLS_CERTIFICATE, "") {
fmt.Println("No port or mode defined. Fallback to TLS=0 & Port=8080")
fmt.Println("ENV's: [HTTP_PORT=8080|443], [HTTP_TLS=0|1],[HTTP_TLS_PRIVATEKEY=#],[HTTP_TLS_CERTIFICATE=#]")
fmt.Println("Remember to set unused ENVs like [HTTP_TLS_PRIVATEKEY] or [HTTP_TLS_CERTIFICATE] to '#'")
WriteLog("~", "No port or mode defined. Fallback to TLS=0 & Port=8080")
WriteLog("~", "ENV's: [HTTP_PORT=8080|443], [HTTP_TLS=0|1],[HTTP_TLS_PRIVATEKEY=#],[HTTP_TLS_CERTIFICATE=#]")
WriteLog("~", "Remember to set unused ENVs like [HTTP_TLS_PRIVATEKEY] or [HTTP_TLS_CERTIFICATE] to '#'")
HTTP_PORT = "8080"
HTTP_TLS = "0"
HTTP_TLS_CERTIFICATE = ""
HTTP_TLS_PRIVATEKEY = ""
ERRORLOG_FILE = "/data/error.log"
} else {
fmt.Println("Port and mode defined.")
WriteLog("~", "Port and mode defined.")
}
// Signal-Kanal einrichten
@@ -218,7 +457,7 @@ func main() {
// Goroutine, die auf Signale wartet
go func() {
<-stop
fmt.Println("Received stop signal")
WriteLog("~", "Received stop signal")
prepareExit()
os.Exit(0)
}()
@@ -228,14 +467,15 @@ func main() {
filename := "/data/data.json"
readData, err := readFromFile(filename)
if err != nil {
fmt.Println("Fehler beim Lesen:", err)
WriteLog("!", "Fehler beim Lesen:", err)
} else {
fmt.Println("Daten erfolgreich aus Datei gelesen.")
WriteLog("~", "Daten erfolgreich aus Datei gelesen.")
D = readData
}
http.HandleFunc("/", handler)
http.HandleFunc("/ip", handlerIP)
http.HandleFunc("/ipv6", handlerIPv6Pro)
/* DNS-PART */
@@ -243,7 +483,7 @@ func main() {
serverUDP := &dns.Server{Addr: ":53", Net: "udp"}
go func() {
log.Println("Starting DNS server on UDP :53")
log.Println("~", "Starting DNS server on UDP :53")
if err := serverUDP.ListenAndServe(); err != nil {
log.Fatalf("Failed to start UDP server: %v", err)
}
@@ -251,7 +491,7 @@ func main() {
serverTCP := &dns.Server{Addr: ":53", Net: "tcp"}
go func() {
log.Println("Starting DNS server on TCP :53")
log.Println("~", "Starting DNS server on TCP :53")
if err := serverTCP.ListenAndServe(); err != nil {
log.Fatalf("Failed to start TCP server: %v", err)
}
@@ -259,18 +499,18 @@ func main() {
/* HTTP-PART */
fmt.Println("Server listening on port :" + HTTP_PORT)
WriteLog("~", "Server listening on port :"+HTTP_PORT)
if HTTP_TLS == "0" {
fmt.Println("Protocol is http (insecure)")
WriteLog("~", "Protocol is http (insecure)")
StopServer(http.ListenAndServe(":"+HTTP_PORT, nil))
}
if HTTP_TLS == "1" {
fmt.Println("Protocol is https (secure)")
WriteLog("~", "Protocol is https (secure)")
StopServer(http.ListenAndServeTLS(":"+HTTP_PORT, HTTP_TLS_CERTIFICATE, HTTP_TLS_PRIVATEKEY, nil))
}
/*srv_err := http.ListenAndServe(":8080", nil)
if srv_err != nil {
fmt.Println("Starten des Servers fehlgeschlagen!", srv_err)
WriteLog("Starten des Servers fehlgeschlagen!", srv_err)
}*/
}