1
0
mirror of https://github.com/pi-hole/pi-hole synced 2024-12-23 07:18:07 +00:00
pi-hole/gravity.sh

172 lines
6.1 KiB
Bash
Raw Normal View History

#!/usr/bin/env bash
2015-05-19 18:31:37 +00:00
# http://pi-hole.net
# Compiles a list of ad-serving domains by downloading them from multiple sources
2015-11-15 13:59:51 +00:00
piholeIPfile=/tmp/piholeIP
if [[ -f $piholeIPfile ]];then
# If the file exists, it means it was exported from the installation script and we should use that value instead of detecting it in this script
piholeIP=$(cat $piholeIPfile)
rm $piholeIPfile
else
# Otherwise, the IP address can be taken directly from the machine, which will happen when the script is run by the user and not the installation script
piholeIP=$(ip -4 addr show | awk '{match($0,/[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/); ip = substr($0,RSTART,RLENGTH); print ip}' | sed '/^\s*$/d' | grep -v "127.0.0.1")
fi
2015-05-19 18:31:37 +00:00
# Ad-list sources--one per line in single quotes
2015-11-15 13:59:51 +00:00
# The mahakala source is commented out due to many users having issues with it blocking legitimate domains. Uncomment at your own risk
2015-05-19 18:31:37 +00:00
sources=('https://adaway.org/hosts.txt'
'http://adblock.gjtech.net/?format=unix-hosts'
#'http://adblock.mahakala.is/'
'http://hosts-file.net/ad_servers.txt'
2015-05-19 18:31:37 +00:00
'http://www.malwaredomainlist.com/hostslist/hosts.txt'
'http://pgl.yoyo.org/adservers/serverlist.php?'
'http://someonewhocares.org/hosts/hosts'
'http://winhelp2002.mvps.org/hosts.txt')
2014-06-08 15:03:56 +00:00
2015-05-19 18:31:37 +00:00
# Variables for various stages of downloading and formatting the list
adList=/etc/pihole/gravity.list
origin=/etc/pihole
2015-05-19 18:31:37 +00:00
piholeDir=/etc/pihole
justDomainsExtension=domains
matter=pihole.0.matter.txt
andLight=pihole.1.andLight.txt
supernova=pihole.2.supernova.txt
eventHorizon=pihole.3.eventHorizon.txt
accretionDisc=pihole.4.accretionDisc.txt
eyeOfTheNeedle=pihole.5.wormhole.txt
blacklist=$piholeDir/blacklist.txt
whitelist=$piholeDir/whitelist.txt
latentWhitelist=$origin/latentWhitelist.txt
2014-06-08 15:03:56 +00:00
# After setting defaults, check if there's local overrides
if [[ -r $piholeDir/pihole.conf ]];then
echo "** Local calibration requested..."
. $piholeDir/pihole.conf
fi
2015-05-19 18:31:37 +00:00
echo "** Neutrino emissions detected..."
2014-06-08 15:03:56 +00:00
2015-05-19 18:31:37 +00:00
# Create the pihole resource directory if it doesn't exist. Future files will be stored here
if [[ -d $piholeDir ]];then
2015-05-19 18:31:37 +00:00
:
else
echo "** Creating pihole directory..."
sudo mkdir $piholeDir
2015-05-19 18:31:37 +00:00
fi
# Loop through domain list. Download each one and remove commented lines (lines beginning with '# 'or '/') and blank lines
for ((i = 0; i < "${#sources[@]}"; i++))
do
url=${sources[$i]}
2015-05-19 18:31:37 +00:00
# Get just the domain from the URL
domain=$(echo "$url" | cut -d'/' -f3)
2015-05-19 18:31:37 +00:00
# Save the file as list.#.domain
saveLocation=$origin/list.$i.$domain.$justDomainsExtension
2015-10-10 18:51:21 +00:00
2015-11-06 02:11:34 +00:00
agent="Mozilla/10.0"
2015-11-06 02:11:34 +00:00
echo -n "Getting $domain list... "
2015-05-19 18:31:37 +00:00
# Use a case statement to download lists that need special cURL commands
2015-11-06 02:11:34 +00:00
# to complete properly and reset the user agent when required
case "$domain" in
"adblock.mahakala.is")
2015-11-06 02:11:34 +00:00
agent='Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0'
cmd="curl -e http://forum.xda-developers.com/"
;;
"pgl.yoyo.org")
2015-11-06 02:11:34 +00:00
cmd="curl -d mimetype=plaintext -d hostformat=hosts"
;;
# Default is a simple curl request
*) cmd="curl"
2015-05-19 18:31:37 +00:00
esac
2015-10-10 18:51:21 +00:00
# tmp file, so we don't have to store the (long!) lists in RAM
2015-11-06 23:14:05 +00:00
patternBuffer=$(mktemp)
2015-11-06 02:22:17 +00:00
heisenbergCompensator=""
2015-11-06 23:14:05 +00:00
if [[ -r $saveLocation ]]; then
2015-11-06 02:22:17 +00:00
heisenbergCompensator="-z $saveLocation"
2015-11-06 02:11:34 +00:00
fi
2015-11-06 02:22:17 +00:00
CMD="$cmd -s $heisenbergCompensator -A '$agent' $url > $patternBuffer"
$cmd -s $heisenbergCompensator -A "$agent" $url > $patternBuffer
2015-11-06 02:11:34 +00:00
2015-11-06 02:22:17 +00:00
if [[ -s "$patternBuffer" ]];then
2015-05-19 18:31:37 +00:00
# Remove comments and print only the domain name
# Most of the lists downloaded are already in hosts file format but the spacing/formating is not contigious
# This helps with that and makes it easier to read
# It also helps with debugging so each stage of the script can be researched more in depth
2015-11-06 02:22:17 +00:00
awk '($1 !~ /^#/) { if (NF>1) {print $2} else {print $1}}' $patternBuffer | \
2015-11-06 02:11:34 +00:00
sed -nr -e 's/\.{2,}/./g' -e '/\./p' > $saveLocation
echo "Done."
2015-05-19 18:31:37 +00:00
else
2015-11-06 02:33:05 +00:00
echo "Skipping pattern because transporter logic detected no changes..."
2015-05-19 18:31:37 +00:00
fi
2015-11-06 02:11:34 +00:00
2015-11-06 23:14:05 +00:00
# Cleanup
2015-11-06 02:22:17 +00:00
rm -f $patternBuffer
2015-05-19 18:31:37 +00:00
done
2014-06-08 15:03:56 +00:00
# Find all files with the .domains extension and compile them into one file and remove CRs
2015-05-19 18:31:37 +00:00
echo "** Aggregating list of domains..."
find $origin/ -type f -name "*.$justDomainsExtension" -exec cat {} \; | tr -d '\r' > $origin/$matter
2015-05-19 18:31:37 +00:00
# Append blacklist entries if they exist
2015-11-06 02:11:34 +00:00
if [[ -r $blacklist ]];then
numberOf=$(cat $blacklist | sed '/^\s*$/d' | wc -l)
echo "** Blacklisting $numberOf domain(s)..."
cat $blacklist >> $origin/$matter
2014-06-08 15:03:56 +00:00
fi
2015-05-19 18:31:37 +00:00
###########################
2015-11-06 02:11:34 +00:00
function gravity_advanced() {
numberOf=$(wc -l < $origin/$andLight)
echo "** $numberOf domains being pulled in by gravity..."
2015-11-06 02:11:34 +00:00
2015-05-19 18:31:37 +00:00
# Remove carriage returns and preceding whitespace
2015-11-06 02:11:34 +00:00
# not really needed anymore?
cp $origin/$andLight $origin/$supernova
2015-11-06 02:11:34 +00:00
2015-05-19 18:31:37 +00:00
# Sort and remove duplicates
2015-11-06 02:11:34 +00:00
sort -u $origin/$supernova > $origin/$eventHorizon
numberOf=$(wc -l < $origin/$eventHorizon)
2015-05-19 18:31:37 +00:00
echo "** $numberOf unique domains trapped in the event horizon."
2015-11-06 02:11:34 +00:00
# Format domain list as "192.168.x.x domain.com"
2015-05-19 18:31:37 +00:00
echo "** Formatting domains into a HOSTS file..."
2015-11-15 13:59:51 +00:00
cat $origin/$eventHorizon | awk '{sub(/\r$/,""); print "'"$piholeIP"' " $0}' > $origin/$accretionDisc
# Copy the file over as /etc/pihole/gravity.list so dnsmasq can use it
2015-05-19 18:31:37 +00:00
sudo cp $origin/$accretionDisc $adList
kill -HUP $(pidof dnsmasq)
2015-11-06 02:11:34 +00:00
}
2015-05-19 18:31:37 +00:00
# Whitelist (if applicable) then remove duplicates and format for dnsmasq
2015-11-06 02:11:34 +00:00
if [[ -r $whitelist ]];then
2015-05-19 18:31:37 +00:00
# Remove whitelist entries
numberOf=$(cat $whitelist | sed '/^\s*$/d' | wc -l)
plural=; [[ "$numberOf" != "1" ]] && plural=s
echo "** Whitelisting $numberOf domain${plural}..."
2015-11-06 02:11:34 +00:00
# Append a "$" to the end, prepend a "^" to the beginning, and
# replace "." with "\." of each line to turn each entry into a
# regexp so it can be parsed out with grep -x
awk -F '[# \t]' 'NF>0&&$1!="" {print "^"$1"$"}' $whitelist | sed 's/\./\\./g' > $latentWhitelist
2015-05-19 18:31:37 +00:00
else
rm $latentWhitelist
fi
# Prevent our sources from being pulled into the hole
plural=; [[ "${#sources[@]}" != "1" ]] && plural=s
echo "** Whitelisting ${#sources[@]} ad list source${plural}..."
for url in ${sources[@]}
do
echo "$url" | awk -F '/' '{print "^"$3"$"}' | sed 's/\./\\./g' >> $latentWhitelist
done
2015-11-06 02:11:34 +00:00
# Remove whitelist entries from deduped list
grep -vxf $latentWhitelist $origin/$matter > $origin/$andLight
gravity_advanced