2015-11-23 07:49:38 +00:00
#!/usr/bin/env bash
2015-11-23 10:52:12 +00:00
# Pi-hole: A black hole for Internet advertisements
# (c) 2015 by Jacob Salmela GPL 2.0
# Network-wide ad blocking via your Raspberry Pi
2015-05-19 18:31:37 +00:00
# http://pi-hole.net
2015-11-06 23:03:55 +00:00
# Compiles a list of ad-serving domains by downloading them from multiple sources
2015-11-23 07:49:38 +00:00
piholeIPfile = /tmp/piholeIP
if [ [ -f $piholeIPfile ] ] ; then
# If the file exists, it means it was exported from the installation script and we should use that value instead of detecting it in this script
piholeIP = $( cat $piholeIPfile )
rm $piholeIPfile
else
# Otherwise, the IP address can be taken directly from the machine, which will happen when the script is run by the user and not the installation script
piholeIP = $( ip -4 addr show | awk '{match($0,/[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/); ip = substr($0,RSTART,RLENGTH); print ip}' | sed '/^\s*$/d' | grep -v "127.0.0.1" | ( head -n1) )
fi
2015-06-14 03:01:12 +00:00
2015-05-19 18:31:37 +00:00
# Ad-list sources--one per line in single quotes
2015-11-23 07:49:38 +00:00
# The mahakala source is commented out due to many users having issues with it blocking legitimate domains. Uncomment at your own risk
2015-05-19 18:31:37 +00:00
sources = ( 'https://adaway.org/hosts.txt'
'http://adblock.gjtech.net/?format=unix-hosts'
2015-11-06 23:03:55 +00:00
#'http://adblock.mahakala.is/'
2015-11-06 23:05:04 +00:00
'http://hosts-file.net/ad_servers.txt'
2015-05-19 18:31:37 +00:00
'http://www.malwaredomainlist.com/hostslist/hosts.txt'
'http://pgl.yoyo.org/adservers/serverlist.php?'
'http://someonewhocares.org/hosts/hosts'
'http://winhelp2002.mvps.org/hosts.txt' )
2014-06-08 15:03:56 +00:00
2015-05-19 18:31:37 +00:00
# Variables for various stages of downloading and formatting the list
2015-11-23 07:49:38 +00:00
basename = pihole
piholeDir = /etc/$basename
adList = $piholeDir /gravity.list
2015-05-19 18:31:37 +00:00
blacklist = $piholeDir /blacklist.txt
whitelist = $piholeDir /whitelist.txt
2015-11-23 07:49:38 +00:00
latentWhitelist = $piholeDir /latentWhitelist.txt
justDomainsExtension = domains
matter = $basename .0.matter.txt
andLight = $basename .1.andLight.txt
supernova = $basename .2.supernova.txt
eventHorizon = $basename .3.eventHorizon.txt
accretionDisc = $basename .4.accretionDisc.txt
eyeOfTheNeedle = $basename .5.wormhole.txt
2014-06-08 15:03:56 +00:00
2015-11-06 23:03:55 +00:00
# After setting defaults, check if there's local overrides
if [ [ -r $piholeDir /pihole.conf ] ] ; then
echo "** Local calibration requested..."
2015-11-23 07:49:38 +00:00
. $piholeDir /pihole.conf
2015-11-06 23:03:55 +00:00
fi
2015-11-23 09:47:24 +00:00
###########################
# collapse - begin formation of pihole
function gravity_collapse( ) {
2015-05-19 18:31:37 +00:00
echo "** Neutrino emissions detected..."
2014-06-08 15:03:56 +00:00
2015-05-19 18:31:37 +00:00
# Create the pihole resource directory if it doesn't exist. Future files will be stored here
2015-06-14 03:01:12 +00:00
if [ [ -d $piholeDir ] ] ; then
2015-11-23 08:36:01 +00:00
# Temporary hack to allow non-root access to pihole directory
# Will update later, needed for existing installs, new installs should
# create this directory as non-root
sudo chmod 777 $piholeDir
find " $piholeDir " -type f -exec sudo chmod 666 { } \;
2015-05-19 18:31:37 +00:00
else
2015-11-23 07:49:38 +00:00
echo "** Creating pihole directory..."
2015-11-23 08:36:01 +00:00
mkdir $piholeDir
2015-05-19 18:31:37 +00:00
fi
2015-11-23 08:36:01 +00:00
}
2015-11-23 07:49:38 +00:00
2015-11-23 10:52:12 +00:00
# patternCheck - check to see if curl downloaded any new files, and then process those
# files so they are in host format.
function gravity_patternCheck( ) {
patternBuffer = $1
# check if the patternbuffer is a non-zero length file
if [ [ -s " $patternBuffer " ] ] ; then
# Some of the blocklists are copyright, they need to be downloaded
# and stored as is. They can be processed for content after they
# have been saved.
cp $patternBuffer $saveLocation
echo "Done."
else
# curl didn't download any host files, probably because of the date check
echo "Transporter logic detected no changes, pattern skipped..."
fi
}
# transport - curl the specified url with any needed command extentions, then patternCheck
function gravity_transport( ) {
url = $1
cmd_ext = $2
agent = $3
# tmp file, so we don't have to store the (long!) lists in RAM
patternBuffer = $( mktemp)
heisenbergCompensator = ""
if [ [ -r $saveLocation ] ] ; then
# if domain has been saved, add file for date check to only download newer
heisenbergCompensator = " -z $saveLocation "
fi
# Silently curl url
curl -s $cmd_ext $heisenbergCompensator -A " $agent " $url > $patternBuffer
gravity_patternCheck $patternBuffer
# Cleanup
rm -f $patternBuffer
}
2015-11-23 09:47:24 +00:00
# spinup - main gravity function
function gravity_spinup( ) {
# Loop through domain list. Download each one and remove commented lines (lines beginning with '# 'or '/') and blank lines
for ( ( i = 0; i < " ${# sources [@] } " ; i++) )
do
url = ${ sources [ $i ] }
# Get just the domain from the URL
2015-11-23 10:52:12 +00:00
domain = $( echo " $url " | cut -d'/' -f3)
# Save the file as list.#.domain
saveLocation = $piholeDir /list.$i .$domain .$justDomainsExtension
2015-11-23 21:12:11 +00:00
activeDomains[ $i ] = $saveLocation
2015-11-23 10:52:12 +00:00
agent = "Mozilla/10.0"
echo -n " Getting $domain list... "
# Use a case statement to download lists that need special cURL commands
# to complete properly and reset the user agent when required
case " $domain " in
"adblock.mahakala.is" )
agent = 'Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0'
cmd_ext = "-e http://forum.xda-developers.com/"
; ;
"pgl.yoyo.org" )
cmd_ext = "-d mimetype=plaintext -d hostformat=hosts"
; ;
# Default is a simple request
*) cmd_ext = ""
esac
gravity_transport $url $cmd_ext $agent
done
}
2015-11-23 11:26:10 +00:00
# Schwarzchild - aggregate domains to one list and add blacklisted domains
2015-11-23 10:52:12 +00:00
function gravity_Schwarzchild( ) {
2015-11-23 21:12:11 +00:00
# Find all active domains and compile them into one file and remove CRs
2015-11-23 10:52:12 +00:00
echo "** Aggregating list of domains..."
2015-11-23 21:12:11 +00:00
truncate -s 0 $piholeDir /$matter
for i in " ${ activeDomains [@] } "
do
cat $i | tr -d '\r' >> $piholeDir /$matter
done
2015-11-23 10:52:12 +00:00
# Append blacklist entries if they exist
if [ [ -r $blacklist ] ] ; then
numberOf = $( cat $blacklist | sed '/^\s*$/d' | wc -l)
echo " ** Blacklisting $numberOf domain(s)... "
cat $blacklist >> $piholeDir /$matter
fi
2015-11-23 11:26:10 +00:00
}
function gravity_pulsar( ) {
2015-11-23 10:52:12 +00:00
2015-11-23 09:47:24 +00:00
# Whitelist (if applicable) domains
if [ [ -r $whitelist ] ] ; then
# Remove whitelist entries
numberOf = $( cat $whitelist | sed '/^\s*$/d' | wc -l)
plural = ; [ [ " $numberOf " != "1" ] ] && plural = s
echo " ** Whitelisting $numberOf domain ${ plural } ... "
# Append a "$" to the end, prepend a "^" to the beginning, and
# replace "." with "\." of each line to turn each entry into a
# regexp so it can be parsed out with grep -x
awk -F '[# \t]' 'NF>0&&$1!="" {print "^"$1"$"}' $whitelist | sed 's/\./\\./g' > $latentWhitelist
else
rm $latentWhitelist
fi
# Prevent our sources from being pulled into the hole
plural = ; [ [ " ${# sources [@] } " != "1" ] ] && plural = s
echo " ** Whitelisting ${# sources [@] } ad list source ${ plural } ... "
for url in ${ sources [@] }
do
echo " $url " | awk -F '/' '{print "^"$3"$"}' | sed 's/\./\\./g' >> $latentWhitelist
2015-11-23 09:16:00 +00:00
done
2015-11-23 09:47:24 +00:00
# Remove whitelist entries from list
grep -vxf $latentWhitelist $piholeDir /$matter > $piholeDir /$andLight
2015-11-23 09:16:00 +00:00
}
2015-11-23 11:11:16 +00:00
function gravity_unique( ) {
# Sort and remove duplicates
sort -u $piholeDir /$supernova > $piholeDir /$eventHorizon
numberOf = $( wc -l < $piholeDir /$eventHorizon )
echo " ** $numberOf unique domains trapped in the event horizon. "
}
function gravity_hostFormat( ) {
# Format domain list as "192.168.x.x domain.com"
echo "** Formatting domains into a HOSTS file..."
cat $piholeDir /$eventHorizon | awk '{sub(/\r$/,""); print "' " $piholeIP " ' " $0}' > $piholeDir /$accretionDisc
# Copy the file over as /etc/pihole/gravity.list so dnsmasq can use it
cp $piholeDir /$accretionDisc $adList
}
2015-11-23 09:16:00 +00:00
function gravity_advanced( ) {
2015-11-23 10:52:12 +00:00
# Remove comments and print only the domain name
# Most of the lists downloaded are already in hosts file format but the spacing/formating is not contigious
# This helps with that and makes it easier to read
# It also helps with debugging so each stage of the script can be researched more in depth
awk '($1 !~ /^#/) { if (NF>1) {print $2} else {print $1}}' $piholeDir /$andLight | \
sed -nr -e 's/\.{2,}/./g' -e '/\./p' > $piholeDir /$supernova
2015-11-23 07:49:38 +00:00
2015-11-23 11:26:10 +00:00
numberOf = $( wc -l < $piholeDir /$supernova )
echo " ** $numberOf domains being pulled in by gravity... "
gravity_unique
2015-11-23 08:36:01 +00:00
sudo kill -HUP $( pidof dnsmasq)
2015-11-06 02:11:34 +00:00
}
2015-11-06 23:03:55 +00:00
2015-11-23 20:39:47 +00:00
gravity_collapse
2015-11-23 08:36:01 +00:00
gravity_spinup
2015-11-23 10:52:12 +00:00
gravity_Schwarzchild
2015-11-23 11:26:10 +00:00
gravity_pulsar
2015-11-23 11:11:16 +00:00
gravity_hostFormat
2015-08-23 04:44:41 +00:00
gravity_advanced
2015-11-23 11:26:10 +00:00