Compare commits

25 Commits
master ... main

Author SHA1 Message Date
5aaaf7e4f0 URL Debugging wegen nichtaufnahme von Anfragen
All checks were successful
release-tag / release-image (push) Successful in 46s
2025-01-20 20:34:20 +01:00
5b7b877474 Neues Build-File nicht nano und net-tools
All checks were successful
release-tag / release-image (push) Successful in 49s
2025-01-17 22:33:31 +01:00
cb8f1f178a Weitere Tests für IPv6
All checks were successful
release-tag / release-image (push) Successful in 45s
2025-01-17 21:58:08 +01:00
ffaa04c46c Änderung des Zeitstempels beim Logging
All checks were successful
release-tag / release-image (push) Successful in 44s
2025-01-16 11:53:36 +01:00
cf50911e80 IP-Auslesen für dns-request hinzugefügt.
All checks were successful
release-tag / release-image (push) Successful in 45s
2025-01-16 09:07:34 +01:00
877e4635ba Type-Any hinzugefügt
All checks were successful
release-tag / release-image (push) Successful in 46s
2025-01-16 02:42:05 +01:00
a1c80dcc07 IPv6-Fix und kleine Bug-Fixes
All checks were successful
release-tag / release-image (push) Successful in 45s
2025-01-16 02:27:00 +01:00
50206677ec bugfix log-function
All checks were successful
release-tag / release-image (push) Successful in 45s
2025-01-16 01:40:44 +01:00
0cb44ad9ba Hinzufügen einer Logging-Funktion
All checks were successful
release-tag / release-image (push) Successful in 44s
2025-01-16 01:36:55 +01:00
ed93d04d7e casesensitive fix
All checks were successful
release-tag / release-image (push) Successful in 42s
2025-01-16 01:24:08 +01:00
130411e58f weiteres logging
All checks were successful
release-tag / release-image (push) Successful in 46s
2025-01-16 01:04:32 +01:00
239add14dd debug-nachrichten ergänzt
All checks were successful
release-tag / release-image (push) Successful in 43s
2025-01-15 08:59:02 +01:00
3bc82edb9a minor bugfix
All checks were successful
release-tag / release-image (push) Successful in 43s
2025-01-15 08:55:39 +01:00
40be13e44d Merge pull request 'prüpflog hinzugefügt' (#6) from master into main
All checks were successful
release-tag / release-image (push) Successful in 44s
Reviewed-on: #6
2025-01-15 07:49:34 +00:00
d174d2a25a Merge pull request 'quickfix-1' (#5) from master into main
All checks were successful
release-tag / release-image (push) Successful in 44s
Reviewed-on: #5
2025-01-14 21:13:25 +00:00
995c6b4d68 Merge pull request 'Weitere Anpassungen und Konsolen-Log verbesserungen' (#4) from master into main
All checks were successful
release-tag / release-image (push) Successful in 1m31s
Reviewed-on: #4
2025-01-14 21:09:22 +00:00
4a9ff7b4f5 Merge pull request 'master' (#3) from master into main
All checks were successful
release-tag / release-image (push) Successful in 44s
Reviewed-on: #3
2025-01-14 07:12:43 +00:00
2d95e92f93 Dockerfile aktualisiert
All checks were successful
release-tag / release-image (push) Successful in 44s
2025-01-13 20:52:18 +00:00
353a525b0c Dockerfile aktualisiert
All checks were successful
release-tag / release-image (push) Successful in 44s
2025-01-13 20:50:04 +00:00
21ec339b2d main.go aktualisiert
All checks were successful
release-tag / release-image (push) Successful in 1m30s
2025-01-13 20:44:41 +00:00
81fff6b9ac Dockerfile aktualisiert
All checks were successful
release-tag / release-image (push) Successful in 44s
2025-01-13 20:40:47 +00:00
f60e808281 Dockerfile aktualisiert
All checks were successful
release-tag / release-image (push) Successful in 42s
2025-01-13 20:21:49 +00:00
2e42bf6e20 Merge pull request 'added dyndns dns function' (#2) from master into main
Some checks failed
release-tag / release-image (push) Failing after 29s
Reviewed-on: #2
2025-01-13 20:19:17 +00:00
2359ff4bd2 Dockerfile aktualisiert
All checks were successful
release-tag / release-image (push) Successful in 1m29s
2025-01-12 18:49:27 +00:00
b8f8c3d0ce Merge pull request 'master' (#1) from master into main
Some checks failed
release-tag / release-image (push) Failing after 59s
Reviewed-on: #1
2025-01-12 18:46:52 +00:00
2 changed files with 199 additions and 49 deletions

View File

@@ -1,4 +1,7 @@
FROM golang:1.23.3
RUN mkdir /data
RUN apt update && apt install net-tools nano -y
COPY data/* /data
WORKDIR /app
COPY go.mod go.sum ./
RUN go mod download

245
main.go
View File

@@ -17,11 +17,18 @@ import (
"github.com/miekg/dns"
)
/*
DNS-Status-Code übersicht: https://pkg.go.dev/github.com/miekg/dns@v1.1.62#TypeSOA
*/
type DB map[string]dns_entry
var D map[string]dns_entry
var DEBUG bool = false
var ERRORLOG_FILE string = "/data/error.log"
type dns_entry struct {
Dns string `json:"dns"`
@@ -37,14 +44,14 @@ func writeToFile(filename string, data DB) error {
// JSON konvertieren
jsonData, err := json.MarshalIndent(data, "", " ")
if err != nil {
fmt.Println("!", "Fehler beim Serialisieren: ", err)
WriteLog("!", "Fehler beim Serialisieren: ", err)
return err
}
// Datei öffnen/erstellen
err = os.WriteFile(filename, jsonData, 0644)
if err != nil {
fmt.Println("!", "Fehler beim Schreiben der Datei: ", err)
WriteLog("!", "Fehler beim Schreiben der Datei: ", err)
return err
}
@@ -56,7 +63,7 @@ func readFromFile(filename string) (DB, error) {
// Datei lesen
jsonData, err := os.ReadFile(filename)
if err != nil {
fmt.Println("!", "Fehler beim Lesen der Datei: ", err)
WriteLog("!", "Fehler beim Lesen der Datei: ", err)
return nil, err
}
@@ -64,7 +71,7 @@ func readFromFile(filename string) (DB, error) {
var data DB
err = json.Unmarshal(jsonData, &data)
if err != nil {
fmt.Println("!", "Fehler beim Parsen von JSON: ", err)
WriteLog("!", "Fehler beim Parsen von JSON: ", err)
return nil, err
}
@@ -118,6 +125,9 @@ func IPv6ToPTR(ipv6 string) (string, error) {
}
func handler(w http.ResponseWriter, r *http.Request) {
WriteLog("~", "Full-URL:", r.URL.String())
Dns := r.URL.Query().Get("DDNS")
Ip := r.URL.Query().Get("IP")
Ip6 := r.URL.Query().Get("IPv6")
@@ -128,9 +138,14 @@ func handler(w http.ResponseWriter, r *http.Request) {
D = make(map[string]dns_entry)
}
if strings.Contains(Ip6, ".") {
WriteLog("!", "IPv6 nicht möglich (IP-Version-Mismatch):", Ip6, "eventuell eine IPv4-Adresse?")
Ip6 = ""
}
if strings.EqualFold(Dns, "") || strings.EqualFold(Ip, "") || strings.EqualFold(User, "") || strings.EqualFold(Token, "") {
/* strings.ToLower(Dns) != strings.ToLower("") && strings.ToLower(Ip) != strings.ToLower("") && strings.ToLower(User) != strings.ToLower("") && strings.ToLower(Token) != strings.ToLower("")*/
fmt.Println("!", "Eintrag unvollständig: ", D[Dns])
WriteLog("!", "Eintrag unvollständig: ", D[Dns])
w.WriteHeader(200)
w.Write([]byte("nochg"))
@@ -139,33 +154,33 @@ func handler(w http.ResponseWriter, r *http.Request) {
if entry, exists := D[Dns+"."]; exists {
if User == entry.User && VerifyToken(Token, entry.Token) {
D[Dns+"."] = dns_entry{Dns: Dns, Ipv4: Ip, Ipv6: Ip6, User: User, Token: entry.Token, LastSeen: time.Now().String()}
fmt.Println("~", "Eintrag aktualisiert: ", entry, D[Dns+"."])
WriteLog("~", "Eintrag aktualisiert: ", entry, D[Dns+"."])
// Datei speichern
filename := "data/data.json"
filename := "/data/data.json"
err := writeToFile(filename, D)
if err != nil {
fmt.Println("!", "Fehler beim Schreiben:", err)
WriteLog("!", "Fehler beim Schreiben:", err)
return
}
fmt.Println("~", "Daten erfolgreich in Datei geschrieben.")
WriteLog("~", "Daten erfolgreich in Datei geschrieben.")
w.WriteHeader(200)
w.Write([]byte("good"))
} else {
fmt.Println("!", "Eintrag aktualisieren abgelehnt (Benutzer/Passwort ungültig): ", entry, D[Dns])
WriteLog("!", "Eintrag aktualisieren abgelehnt (Benutzer/Passwort ungültig): ", entry, D[Dns])
w.WriteHeader(200)
w.Write([]byte("nochg"))
}
} else {
D[Dns+"."] = dns_entry{Dns: Dns, Ipv4: Ip, Ipv6: Ip6, User: User, Token: HashToken(Token), LastSeen: time.Now().String()}
fmt.Println("~", "Eintrag erstellt: ", entry, D[Dns+"."])
WriteLog("~", "Eintrag erstellt: ", entry, D[Dns+"."])
// Datei speichern
filename := "data/data.json"
filename := "/data/data.json"
err := writeToFile(filename, D)
if err != nil {
fmt.Println("!", "Fehler beim Schreiben:", err)
WriteLog("!", "Fehler beim Schreiben:", err)
return
}
fmt.Println("~", "Daten erfolgreich in Datei geschrieben.")
WriteLog("~", "Daten erfolgreich in Datei geschrieben.")
w.WriteHeader(200)
w.Write([]byte("good"))
}
@@ -173,94 +188,222 @@ func handler(w http.ResponseWriter, r *http.Request) {
}
var SysLog = []string{}
func WriteLog(a ...any) error {
if DEBUG {
fmt.Println(time.Now().Format("2006-01-02_15-04-05"), a)
}
SysLog = append(SysLog, fmt.Sprintf("%s %s", time.Now().String(), a))
// JSON konvertieren
jsonData, err := json.MarshalIndent(SysLog, "", " ")
if err != nil {
fmt.Println("!", "Fehler beim Serialisieren: ", err)
return err
}
// Datei öffnen/erstellen
err = os.WriteFile(ERRORLOG_FILE, jsonData, 0644)
if err != nil {
fmt.Println("!", "Fehler beim Schreiben der Datei: ", err)
return err
}
return nil
}
func handlerIP(w http.ResponseWriter, r *http.Request) {
remoteIP := r.Header.Get("X-Forwarded-For")
if remoteIP == "" {
remoteIP = r.RemoteAddr // Fallback, wenn kein Header gesetzt ist
}
if DEBUG {
fmt.Println("~", "Remote-IP:", remoteIP)
WriteLog("~", "Remote-IP:", remoteIP)
}
w.WriteHeader(200)
w.Write([]byte(remoteIP))
}
func handlerIPv6Pro(w http.ResponseWriter, r *http.Request) {
// Funktion zum Extrahieren der IP-Adresse
getIP := func(r *http.Request) string {
// Prüfen, ob X-Forwarded-For vorhanden ist (für Proxys)
xff := r.Header.Get("X-Forwarded-For")
if xff != "" {
// X-Forwarded-For kann mehrere IPs enthalten (Client, Proxy, etc.)
ips := strings.Split(xff, ",")
return strings.TrimSpace(ips[0])
}
// Prüfen, ob X-Real-IP vorhanden ist (eine alternative Proxy-Header-Option)
xRealIP := r.Header.Get("X-Real-IP")
if xRealIP != "" {
return xRealIP
}
// Fallback: RemoteAddr verwenden
host, _, err := net.SplitHostPort(r.RemoteAddr)
if err != nil {
return r.RemoteAddr // Falls SplitHostPort fehlschlägt, gib die Raw-Adresse zurück
}
return host
}
// Die IP-Adresse des Clients auslesen
clientIP := getIP(r)
// Prüfen, ob IPv4 oder IPv6
parsedIP := net.ParseIP(clientIP)
if parsedIP == nil {
http.Error(w, "Ungültige IP-Adresse", http.StatusInternalServerError)
return
}
// Ausgabe der Adresse
if parsedIP.To4() != nil {
fmt.Fprintf(w, "Client IPv4-Adresse: %s\n", clientIP)
} else {
fmt.Fprintf(w, "Client IPv6-Adresse: %s\n", clientIP)
}
// Optionale Ausgabe aller Header (Debugging)
fmt.Fprintln(w, "\nAlle HTTP-Header:")
for name, values := range r.Header {
for _, value := range values {
fmt.Fprintf(w, "%s: %s\n", name, value)
}
}
}
func handleDNSRequest(w dns.ResponseWriter, r *dns.Msg) {
// Bereite die Antwort vor
msg := new(dns.Msg)
msg.SetReply(r)
msg.Authoritative = true
if DEBUG {
WriteLog("~", "handleDNSRequest", "RemotePeer", w.RemoteAddr().String())
}
// Durchlaufe alle Fragen in der Anfrage
for _, q := range r.Question {
if strings.ToLower(q.Name) != q.Name {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "strings.ToLower(q.Name) != q.Name", strings.ToLower(q.Name), q.Name)
}
}
switch q.Qtype {
case dns.TypeA: // IPv4-Anfrage
ip, exists := D[q.Name]
ip, exists := D[strings.ToLower(q.Name)]
if exists {
rr, err := dns.NewRR(q.Name + " A " + ip.Ipv4)
rr, err := dns.NewRR(strings.ToLower(q.Name) + " A " + ip.Ipv4)
if err == nil {
if DEBUG {
fmt.Println("~", "handleDNSRequest", "case dns.TypeA", "D[q.Name]", D[q.Name], "q.Name", q.Name)
WriteLog("~", "handleDNSRequest", "case dns.TypeA", "D[q.Name]", D[strings.ToLower(q.Name)], "q.Name", strings.ToLower(q.Name))
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
fmt.Println("!", "handleDNSRequest", "case dns.TypeA", "IPv4", "error", err)
WriteLog("!", "handleDNSRequest", "case dns.TypeA", "IPv4", "error", err)
}
}
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeA", "not found in D", strings.ToLower(q.Name))
}
}
case dns.TypeAAAA: // IPv6-Anfrage
// Beispielhafte IPv6-Adresse für Demonstration
ip, exists := D[q.Name]
if exists && !strings.EqualFold(ip.Ipv6, "") {
rr, err := dns.NewRR(q.Name + " AAAA " + ip.Ipv6)
ip6, exists := D[strings.ToLower(q.Name)]
if exists && !strings.EqualFold(ip6.Ipv6, "") {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " AAAA " + ip6.Ipv6)
if err == nil {
if DEBUG {
fmt.Println("~", "handleDNSRequest", "case dns.TypeAAAA", "D[q.Name]", D[q.Name], "q.Name", q.Name)
WriteLog("~", "handleDNSRequest", "case dns.TypeAAAA", "D[q.Name]", D[strings.ToLower(q.Name)], "q.Name", strings.ToLower(q.Name))
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
fmt.Println("!", "handleDNSRequest", "case dns.TypeAAAA", "IPv6", "error", err)
WriteLog("!", "handleDNSRequest", "case dns.TypeAAAA", "IPv6", "error", err)
}
}
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeAAAA", "not found in D", strings.ToLower(q.Name))
}
}
case dns.TypePTR:
for a, b := range D {
iptocheck := reverseString(b.Ipv4)
if iptocheck+".in-addr.arpa." == q.Name {
rr, err := dns.NewRR(q.Name + " PTR " + a)
if iptocheck+".in-addr.arpa." == strings.ToLower(q.Name) {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " PTR " + a)
if err == nil {
if DEBUG {
fmt.Println("~", "handleDNSRequest", "case dns.TypePTR", "IPv4", "found match", a, b)
WriteLog("~", "handleDNSRequest", "case dns.TypePTR", "IPv4", "found match", a, b)
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
fmt.Println("!", "handleDNSRequest", "case dns.TypePTR", "IPv4", "error", err)
WriteLog("!", "handleDNSRequest", "case dns.TypePTR", "IPv4", "error", err)
}
}
}
ip6tocheck, _ := IPv6ToPTR(b.Ipv6)
if ip6tocheck == q.Name {
rr, err := dns.NewRR(q.Name + " PTR " + a)
if ip6tocheck == strings.ToLower(q.Name) {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " PTR " + a)
if err == nil {
if DEBUG {
fmt.Println("~", "handleDNSRequest", "case dns.TypePTR", "IPv6", "found match", a, b)
WriteLog("~", "handleDNSRequest", "case dns.TypePTR", "IPv6", "found match", a, b)
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
fmt.Println("!", "handleDNSRequest", "case dns.TypePTR", "IPv6", "error", err)
WriteLog("!", "handleDNSRequest", "case dns.TypePTR", "IPv6", "error", err)
}
}
}
}
case dns.TypeANY:
ip, exists := D[strings.ToLower(q.Name)]
if exists {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " A " + ip.Ipv4)
if err == nil {
if DEBUG {
WriteLog("~", "handleDNSRequest", "case dns.TypeANY", "D[q.Name]", D[strings.ToLower(q.Name)], "q.Name", strings.ToLower(q.Name))
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "IPv4", "error", err)
}
}
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "not found in D", strings.ToLower(q.Name))
}
}
// Beispielhafte IPv6-Adresse für Demonstration
ip6, exists := D[strings.ToLower(q.Name)]
if exists && !strings.EqualFold(ip6.Ipv6, "") {
rr, err := dns.NewRR(strings.ToLower(q.Name) + " AAAA " + ip6.Ipv6)
if err == nil {
if DEBUG {
WriteLog("~", "handleDNSRequest", "case dns.TypeANY", "D[q.Name]", D[strings.ToLower(q.Name)], "q.Name", strings.ToLower(q.Name))
}
msg.Answer = append(msg.Answer, rr)
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "IPv6", "error", err)
}
}
} else {
if DEBUG {
WriteLog("!", "handleDNSRequest", "case dns.TypeANY", "not found in D", strings.ToLower(q.Name))
}
}
default:
if DEBUG {
fmt.Println("+", "unhandledDNSRequest", r.Question, q.Name, q.Qclass, q.Qtype)
WriteLog("+", "unhandledDNSRequest", r.Question, strings.ToLower(q.Name), q.Qclass, q.Qtype)
}
}
}
@@ -270,13 +413,13 @@ func handleDNSRequest(w dns.ResponseWriter, r *dns.Msg) {
}
func prepareExit() {
fmt.Println("~", "Running exit tasks...")
WriteLog("~", "Running exit tasks...")
os.Rename("/data/error.log", "/data/error_"+time.Now().Format("2006-01-02_15-04-05")+".log")
fmt.Println("~", "Exit completed.")
}
func StopServer(e error) {
fmt.Println("~", "Stopping server...")
WriteLog("~", "Stopping server...")
prepareExit()
fmt.Println("~", "Server stopped!")
}
@@ -287,21 +430,24 @@ func main() {
HTTP_TLS := os.Getenv("HTTP_TLS") /* 1/0 */
HTTP_TLS_PRIVATEKEY := os.Getenv("HTTP_TLS_PRIVATEKEY")
HTTP_TLS_CERTIFICATE := os.Getenv("HTTP_TLS_CERTIFICATE")
ERRORLOG_FILE = os.Getenv("ERRORLOG_FILE")
if os.Getenv("DEBUG") == "1" {
DEBUG = true
WriteLog("~", "Debug mode enabled.")
}
if strings.EqualFold(HTTP_TLS, "") || strings.EqualFold(HTTP_PORT, "") || strings.EqualFold(HTTP_TLS_PRIVATEKEY, "") || strings.EqualFold(HTTP_TLS_CERTIFICATE, "") {
fmt.Println("~", "No port or mode defined. Fallback to TLS=0 & Port=8080")
fmt.Println("~", "ENV's: [HTTP_PORT=8080|443], [HTTP_TLS=0|1],[HTTP_TLS_PRIVATEKEY=#],[HTTP_TLS_CERTIFICATE=#]")
fmt.Println("~", "Remember to set unused ENVs like [HTTP_TLS_PRIVATEKEY] or [HTTP_TLS_CERTIFICATE] to '#'")
WriteLog("~", "No port or mode defined. Fallback to TLS=0 & Port=8080")
WriteLog("~", "ENV's: [HTTP_PORT=8080|443], [HTTP_TLS=0|1],[HTTP_TLS_PRIVATEKEY=#],[HTTP_TLS_CERTIFICATE=#]")
WriteLog("~", "Remember to set unused ENVs like [HTTP_TLS_PRIVATEKEY] or [HTTP_TLS_CERTIFICATE] to '#'")
HTTP_PORT = "8080"
HTTP_TLS = "0"
HTTP_TLS_CERTIFICATE = ""
HTTP_TLS_PRIVATEKEY = ""
ERRORLOG_FILE = "/data/error.log"
} else {
fmt.Println("~", "Port and mode defined.")
WriteLog("~", "Port and mode defined.")
}
// Signal-Kanal einrichten
@@ -311,24 +457,25 @@ func main() {
// Goroutine, die auf Signale wartet
go func() {
<-stop
fmt.Println("~", "Received stop signal")
WriteLog("~", "Received stop signal")
prepareExit()
os.Exit(0)
}()
D = make(map[string]dns_entry)
// Datei lesen
filename := "data/data.json"
filename := "/data/data.json"
readData, err := readFromFile(filename)
if err != nil {
fmt.Println("!", "Fehler beim Lesen:", err)
WriteLog("!", "Fehler beim Lesen:", err)
} else {
fmt.Println("~", "Daten erfolgreich aus Datei gelesen.")
WriteLog("~", "Daten erfolgreich aus Datei gelesen.")
D = readData
}
http.HandleFunc("/", handler)
http.HandleFunc("/ip", handlerIP)
http.HandleFunc("/ipv6", handlerIPv6Pro)
/* DNS-PART */
@@ -352,18 +499,18 @@ func main() {
/* HTTP-PART */
fmt.Println("~", "Server listening on port :"+HTTP_PORT)
WriteLog("~", "Server listening on port :"+HTTP_PORT)
if HTTP_TLS == "0" {
fmt.Println("~", "Protocol is http (insecure)")
WriteLog("~", "Protocol is http (insecure)")
StopServer(http.ListenAndServe(":"+HTTP_PORT, nil))
}
if HTTP_TLS == "1" {
fmt.Println("~", "Protocol is https (secure)")
WriteLog("~", "Protocol is https (secure)")
StopServer(http.ListenAndServeTLS(":"+HTTP_PORT, HTTP_TLS_CERTIFICATE, HTTP_TLS_PRIVATEKEY, nil))
}
/*srv_err := http.ListenAndServe(":8080", nil)
if srv_err != nil {
fmt.Println("Starten des Servers fehlgeschlagen!", srv_err)
WriteLog("Starten des Servers fehlgeschlagen!", srv_err)
}*/
}