|
@@ -2,7 +2,6 @@ package main
|
|
|
|
|
|
import (
|
|
|
"encoding/json"
|
|
|
- "log"
|
|
|
"net/http"
|
|
|
"path/filepath"
|
|
|
"sort"
|
|
@@ -25,33 +24,33 @@ func ReverseProxtInit() {
|
|
|
inboundPort := 80
|
|
|
if sysdb.KeyExists("settings", "inbound") {
|
|
|
sysdb.Read("settings", "inbound", &inboundPort)
|
|
|
- log.Println("Serving inbound port ", inboundPort)
|
|
|
+ SystemWideLogger.Println("Serving inbound port ", inboundPort)
|
|
|
} else {
|
|
|
- log.Println("Inbound port not set. Using default (80)")
|
|
|
+ SystemWideLogger.Println("Inbound port not set. Using default (80)")
|
|
|
}
|
|
|
|
|
|
useTls := false
|
|
|
sysdb.Read("settings", "usetls", &useTls)
|
|
|
if useTls {
|
|
|
- log.Println("TLS mode enabled. Serving proxxy request with TLS")
|
|
|
+ SystemWideLogger.Println("TLS mode enabled. Serving proxxy request with TLS")
|
|
|
} else {
|
|
|
- log.Println("TLS mode disabled. Serving proxy request with plain http")
|
|
|
+ SystemWideLogger.Println("TLS mode disabled. Serving proxy request with plain http")
|
|
|
}
|
|
|
|
|
|
forceLatestTLSVersion := false
|
|
|
sysdb.Read("settings", "forceLatestTLS", &forceLatestTLSVersion)
|
|
|
if forceLatestTLSVersion {
|
|
|
- log.Println("Force latest TLS mode enabled. Minimum TLS LS version is set to v1.2")
|
|
|
+ SystemWideLogger.Println("Force latest TLS mode enabled. Minimum TLS LS version is set to v1.2")
|
|
|
} else {
|
|
|
- log.Println("Force latest TLS mode disabled. Minimum TLS version is set to v1.0")
|
|
|
+ SystemWideLogger.Println("Force latest TLS mode disabled. Minimum TLS version is set to v1.0")
|
|
|
}
|
|
|
|
|
|
forceHttpsRedirect := false
|
|
|
sysdb.Read("settings", "redirect", &forceHttpsRedirect)
|
|
|
if forceHttpsRedirect {
|
|
|
- log.Println("Force HTTPS mode enabled")
|
|
|
+ SystemWideLogger.Println("Force HTTPS mode enabled")
|
|
|
} else {
|
|
|
- log.Println("Force HTTPS mode disabled")
|
|
|
+ SystemWideLogger.Println("Force HTTPS mode disabled")
|
|
|
}
|
|
|
|
|
|
dprouter, err := dynamicproxy.NewDynamicProxy(dynamicproxy.RouterOption{
|
|
@@ -67,7 +66,7 @@ func ReverseProxtInit() {
|
|
|
WebDirectory: *staticWebServerRoot,
|
|
|
})
|
|
|
if err != nil {
|
|
|
- log.Println(err.Error())
|
|
|
+ SystemWideLogger.PrintAndLog("Proxy", "Unable to create dynamic proxy router", err)
|
|
|
return
|
|
|
}
|
|
|
|
|
@@ -78,7 +77,7 @@ func ReverseProxtInit() {
|
|
|
for _, conf := range confs {
|
|
|
record, err := LoadReverseProxyConfig(conf)
|
|
|
if err != nil {
|
|
|
- log.Println("Failed to load "+filepath.Base(conf), err.Error())
|
|
|
+ SystemWideLogger.PrintAndLog("Proxy", "Failed to load config file: "+filepath.Base(conf), err)
|
|
|
return
|
|
|
}
|
|
|
|
|
@@ -110,7 +109,7 @@ func ReverseProxtInit() {
|
|
|
BasicAuthExceptionRules: record.BasicAuthExceptionRules,
|
|
|
})
|
|
|
} else {
|
|
|
- log.Println("Unsupported endpoint type: " + record.ProxyType + ". Skipping " + filepath.Base(conf))
|
|
|
+ SystemWideLogger.PrintAndLog("Proxy", "Unsupported endpoint type: "+record.ProxyType+". Skipping "+filepath.Base(conf), nil)
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -119,7 +118,7 @@ func ReverseProxtInit() {
|
|
|
//reverse proxy server in front of this service
|
|
|
time.Sleep(300 * time.Millisecond)
|
|
|
dynamicProxyRouter.StartProxyService()
|
|
|
- log.Println("Dynamic Reverse Proxy service started")
|
|
|
+ SystemWideLogger.Println("Dynamic Reverse Proxy service started")
|
|
|
|
|
|
//Add all proxy services to uptime monitor
|
|
|
//Create a uptime monitor service
|
|
@@ -130,7 +129,7 @@ func ReverseProxtInit() {
|
|
|
Interval: 300, //5 minutes
|
|
|
MaxRecordsStore: 288, //1 day
|
|
|
})
|
|
|
- log.Println("Uptime Monitor background service started")
|
|
|
+ SystemWideLogger.Println("Uptime Monitor background service started")
|
|
|
}()
|
|
|
|
|
|
}
|
|
@@ -763,11 +762,11 @@ func HandleUpdateHttpsRedirect(w http.ResponseWriter, r *http.Request) {
|
|
|
}
|
|
|
if useRedirect == "true" {
|
|
|
sysdb.Write("settings", "redirect", true)
|
|
|
- log.Println("Updating force HTTPS redirection to true")
|
|
|
+ SystemWideLogger.Println("Updating force HTTPS redirection to true")
|
|
|
dynamicProxyRouter.UpdateHttpToHttpsRedirectSetting(true)
|
|
|
} else if useRedirect == "false" {
|
|
|
sysdb.Write("settings", "redirect", false)
|
|
|
- log.Println("Updating force HTTPS redirection to false")
|
|
|
+ SystemWideLogger.Println("Updating force HTTPS redirection to false")
|
|
|
dynamicProxyRouter.UpdateHttpToHttpsRedirectSetting(false)
|
|
|
}
|
|
|
|