mirror of
https://github.com/pi-hole/pi-hole
synced 2024-11-15 20:49:01 +00:00
054c7a2c05
Signed-off-by: DL6ER <dl6er@dl6er.de>
248 lines
7.7 KiB
Bash
Executable File
248 lines
7.7 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
# Pi-hole: A black hole for Internet advertisements
|
|
# (c) 2017 Pi-hole, LLC (https://pi-hole.net)
|
|
# Network-wide ad blocking via your own hardware.
|
|
#
|
|
# Whitelist and blacklist domains
|
|
#
|
|
# This file is copyright under the latest version of the EUPL.
|
|
# Please see LICENSE file for your rights under this license.
|
|
|
|
# Globals
|
|
basename=pihole
|
|
piholeDir=/etc/"${basename}"
|
|
gravityDBfile="${piholeDir}/gravity.db"
|
|
|
|
reload=false
|
|
addmode=true
|
|
verbose=true
|
|
wildcard=false
|
|
web=false
|
|
|
|
domList=()
|
|
|
|
listType=""
|
|
listname=""
|
|
|
|
colfile="/opt/pihole/COL_TABLE"
|
|
source ${colfile}
|
|
|
|
|
|
helpFunc() {
|
|
if [[ "${listType}" == "whitelist" ]]; then
|
|
param="w"
|
|
type="whitelist"
|
|
elif [[ "${listType}" == "regex_blacklist" && "${wildcard}" == true ]]; then
|
|
param="-wild"
|
|
type="wildcard blacklist"
|
|
elif [[ "${listType}" == "regex_blacklist" ]]; then
|
|
param="-regex"
|
|
type="regex blacklist filter"
|
|
else
|
|
param="b"
|
|
type="blacklist"
|
|
fi
|
|
|
|
echo "Usage: pihole -${param} [options] <domain> <domain2 ...>
|
|
Example: 'pihole -${param} site.com', or 'pihole -${param} site1.com site2.com'
|
|
${type^} one or more domains
|
|
|
|
Options:
|
|
-d, --delmode Remove domain(s) from the ${type}
|
|
-nr, --noreload Update ${type} without reloading the DNS server
|
|
-q, --quiet Make output less verbose
|
|
-h, --help Show this help dialog
|
|
-l, --list Display all your ${type}listed domains
|
|
--nuke Removes all entries in a list"
|
|
|
|
exit 0
|
|
}
|
|
|
|
Escape
|
|
Regexp() {
|
|
# This way we may safely insert an arbitrary
|
|
# string in our regular expressions
|
|
# This sed is intentionally executed in three steps to ease maintainability
|
|
# The first sed removes any amount of leading dots
|
|
echo $* | sed 's/^\.*//' | sed "s/[]\.|$(){}?+*^]/\\\\&/g" | sed "s/\\//\\\\\//g"
|
|
}
|
|
|
|
HandleOther() {
|
|
# Convert to lowercase
|
|
domain="${1,,}"
|
|
|
|
# Check validity of domain (don't check for regex entries)
|
|
if [[ "${#domain}" -le 253 ]]; then
|
|
if [[ "${listType}" == "regex_blacklist" && "${wildcard}" == false ]]; then
|
|
validDomain="${domain}"
|
|
else
|
|
validDomain=$(grep -P "^((-|_)*[a-z\\d]((-|_)*[a-z\\d])*(-|_)*)(\\.(-|_)*([a-z\\d]((-|_)*[a-z\\d])*))*$" <<< "${domain}") # Valid chars check
|
|
validDomain=$(grep -P "^[^\\.]{1,63}(\\.[^\\.]{1,63})*$" <<< "${validDomain}") # Length of each label
|
|
fi
|
|
fi
|
|
|
|
if [[ -n "${validDomain}" ]]; then
|
|
domList=("${domList[@]}" ${validDomain})
|
|
else
|
|
echo -e " ${CROSS} ${domain} is not a valid argument or domain name!"
|
|
fi
|
|
}
|
|
|
|
ProcessDomainList() {
|
|
if [[ "${listType}" == "regex_blacklist" ]]; then
|
|
# Regex filter list
|
|
listname="regex blacklist filters"
|
|
else
|
|
# Whitelist / Blacklist
|
|
listname="${listType}"
|
|
fi
|
|
|
|
for dom in "${domList[@]}"; do
|
|
# Format domain into regex filter if requested
|
|
if [[ "${wildcard}" == true ]]; then
|
|
dom="(^|\\.)${dom//\./\\.}$"
|
|
fi
|
|
|
|
# Logic: If addmode then add to desired list and remove from the other;
|
|
# if delmode then remove from desired list but do not add to the other
|
|
if ${addmode}; then
|
|
AddDomain "${dom}" "${listType}"
|
|
if [[ ! "${listType}" == "regex_blacklist" ]]; then
|
|
RemoveDomain "${dom}" "${listAlt}"
|
|
fi
|
|
else
|
|
RemoveDomain "${dom}" "${listType}"
|
|
fi
|
|
done
|
|
}
|
|
|
|
AddDomain() {
|
|
local domain list num
|
|
# Use printf to escape domain. %q prints the argument in a form that can be reused as shell input
|
|
domain="$1"
|
|
list="$2"
|
|
|
|
# Is the domain in the list we want to add it to?
|
|
num="$(sqlite3 "${gravityDBfile}" "SELECT COUNT(*) FROM ${list} WHERE domain = '${domain}';")"
|
|
|
|
if [[ "${num}" -ne 0 ]]; then
|
|
if [[ "${verbose}" == true ]]; then
|
|
echo -e " ${INFO} ${1} already exists in ${listname}, no need to add!"
|
|
fi
|
|
return
|
|
fi
|
|
|
|
# Domain not found in the table, add it!
|
|
if [[ "${verbose}" == true ]]; then
|
|
echo -e " ${INFO} Adding ${1} to the ${listname}..."
|
|
fi
|
|
reload=true
|
|
# Insert only the domain here. The enabled and date_added fields will be filled
|
|
# with their default values (enabled = true, date_added = current timestamp)
|
|
sqlite3 "${gravityDBfile}" "INSERT INTO ${list} (domain) VALUES ('${domain}');"
|
|
}
|
|
|
|
RemoveDomain() {
|
|
local domain list num
|
|
# Use printf to escape domain. %q prints the argument in a form that can be reused as shell input
|
|
domain="$1"
|
|
list="$2"
|
|
|
|
# Is the domain in the list we want to remove it from?
|
|
num="$(sqlite3 "${gravityDBfile}" "SELECT COUNT(*) FROM ${list} WHERE domain = '${domain}';")"
|
|
|
|
if [[ "${num}" -eq 0 ]]; then
|
|
if [[ "${verbose}" == true ]]; then
|
|
echo -e " ${INFO} ${1} does not exist in ${list}, no need to remove!"
|
|
fi
|
|
return
|
|
fi
|
|
|
|
# Domain found in the table, remove it!
|
|
if [[ "${verbose}" == true ]]; then
|
|
echo -e " ${INFO} Removing ${1} from the ${listname}..."
|
|
fi
|
|
reload=true
|
|
# Remove it from the current list
|
|
sqlite3 "${gravityDBfile}" "DELETE FROM ${list} WHERE domain = '${domain}';"
|
|
}
|
|
|
|
Displaylist() {
|
|
local list listname count num_pipes domain enabled status nicedate
|
|
|
|
listname="${listType}"
|
|
data="$(sqlite3 "${gravityDBfile}" "SELECT domain,enabled,date_modified FROM ${listType};" 2> /dev/null)"
|
|
|
|
if [[ -z $data ]]; then
|
|
echo -e "Not showing empty ${listname}"
|
|
else
|
|
echo -e "Displaying ${listname}:"
|
|
count=1
|
|
while IFS= read -r line
|
|
do
|
|
# Count number of pipes seen in this line
|
|
# This is necessary because we can only detect the pipe separating the fields
|
|
# from the end backwards as the domain (which is the first field) may contain
|
|
# pipe symbols as they are perfectly valid regex filter control characters
|
|
num_pipes="$(grep -c "^" <<< "$(grep -o "|" <<< "${line}")")"
|
|
|
|
# Extract domain and enabled status based on the obtained number of pipe characters
|
|
domain="$(cut -d'|' -f"-$((num_pipes-1))" <<< "${line}")"
|
|
enabled="$(cut -d'|' -f"$((num_pipes))" <<< "${line}")"
|
|
datemod="$(cut -d'|' -f"$((num_pipes+1))" <<< "${line}")"
|
|
|
|
# Translate boolean status into human readable string
|
|
if [[ "${enabled}" -eq 1 ]]; then
|
|
status="enabled"
|
|
else
|
|
status="disabled"
|
|
fi
|
|
|
|
# Get nice representation of numerical date stored in database
|
|
nicedate=$(date --rfc-2822 -d "@${datemod}")
|
|
|
|
echo " ${count}: ${domain} (${status}, last modified ${nicedate})"
|
|
count=$((count+1))
|
|
done <<< "${data}"
|
|
fi
|
|
exit 0;
|
|
}
|
|
|
|
NukeList() {
|
|
sqlite3 "${gravityDBfile}" "DELETE FROM ${listType};"
|
|
}
|
|
|
|
for var in "$@"; do
|
|
case "${var}" in
|
|
"-w" | "whitelist" ) listType="whitelist"; listAlt="blacklist";;
|
|
"-b" | "blacklist" ) listType="blacklist"; listAlt="whitelist";;
|
|
"--wild" | "wildcard" ) listType="regex_blacklist"; wildcard=true;;
|
|
"--regex" | "regex" ) listType="regex_blacklist";;
|
|
"-nr"| "--noreload" ) reload=false;;
|
|
"-d" | "--delmode" ) addmode=false;;
|
|
"-q" | "--quiet" ) verbose=false;;
|
|
"-h" | "--help" ) helpFunc;;
|
|
"-l" | "--list" ) Displaylist;;
|
|
"--nuke" ) NukeList;;
|
|
"--web" ) web=true;;
|
|
* ) HandleOther "${var}";;
|
|
esac
|
|
done
|
|
|
|
shift
|
|
|
|
if [[ $# = 0 ]]; then
|
|
helpFunc
|
|
fi
|
|
|
|
ProcessDomainList
|
|
|
|
# Used on web interface
|
|
if $web; then
|
|
echo "DONE"
|
|
fi
|
|
|
|
if [[ "${reload}" != false ]]; then
|
|
pihole restartdns reload
|
|
fi
|