2015-11-11 08:43:00 +00:00
#!/usr/bin/env bash
2015-05-19 18:31:37 +00:00
# http://pi-hole.net
2015-11-06 23:03:55 +00:00
# Compiles a list of ad-serving domains by downloading them from multiple sources
2015-11-15 13:59:51 +00:00
piholeIPfile = /tmp/piholeIP
if [ [ -f $piholeIPfile ] ] ; then
# If the file exists, it means it was exported from the installation script and we should use that value instead of detecting it in this script
piholeIP = $( cat $piholeIPfile )
rm $piholeIPfile
else
# Otherwise, the IP address can be taken directly from the machine, which will happen when the script is run by the user and not the installation script
piholeIP = $( ip -4 addr show | awk '{match($0,/[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/); ip = substr($0,RSTART,RLENGTH); print ip}' | sed '/^\s*$/d' | grep -v "127.0.0.1" )
fi
2015-06-14 03:01:12 +00:00
2015-10-28 01:35:37 +00:00
#Checks if the script is being run as root and sets sudo accordingly
2015-11-06 04:47:56 +00:00
echo "Checking if running as root..."
if ( ( $EUID = = 0 ) ) ; then SUDO = ''
echo "WE ARE ROOT!"
elif [ $( dpkg-query -s -f= '${Status}' sudo 2>/dev/null | grep -c "ok installed" ) -eq 1 ] ; then SUDO = 'sudo'
echo "sudo IS installed... setting SUDO to sudo!"
else echo "Sudo NOT found AND not ROOT! Must run script as root!"
exit 1
2015-10-28 01:35:37 +00:00
fi
2015-05-19 18:31:37 +00:00
# Ad-list sources--one per line in single quotes
2015-11-15 13:59:51 +00:00
# The mahakala source is commented out due to many users having issues with it blocking legitimate domains. Uncomment at your own risk
2015-05-19 18:31:37 +00:00
sources = ( 'https://adaway.org/hosts.txt'
'http://adblock.gjtech.net/?format=unix-hosts'
2015-11-06 23:03:55 +00:00
#'http://adblock.mahakala.is/'
2015-11-06 23:05:04 +00:00
'http://hosts-file.net/ad_servers.txt'
2015-05-19 18:31:37 +00:00
'http://www.malwaredomainlist.com/hostslist/hosts.txt'
'http://pgl.yoyo.org/adservers/serverlist.php?'
'http://someonewhocares.org/hosts/hosts'
'http://winhelp2002.mvps.org/hosts.txt' )
2014-06-08 15:03:56 +00:00
2015-05-19 18:31:37 +00:00
# Variables for various stages of downloading and formatting the list
2015-07-30 16:24:24 +00:00
adList = /etc/pihole/gravity.list
2015-06-07 04:34:32 +00:00
origin = /etc/pihole
2015-05-19 18:31:37 +00:00
piholeDir = /etc/pihole
justDomainsExtension = domains
matter = pihole.0.matter.txt
andLight = pihole.1.andLight.txt
supernova = pihole.2.supernova.txt
eventHorizon = pihole.3.eventHorizon.txt
accretionDisc = pihole.4.accretionDisc.txt
eyeOfTheNeedle = pihole.5.wormhole.txt
blacklist = $piholeDir /blacklist.txt
whitelist = $piholeDir /whitelist.txt
latentWhitelist = $origin /latentWhitelist.txt
2014-06-08 15:03:56 +00:00
2015-11-06 23:03:55 +00:00
# After setting defaults, check if there's local overrides
if [ [ -r $piholeDir /pihole.conf ] ] ; then
echo "** Local calibration requested..."
. $piholeDir /pihole.conf
fi
2015-05-19 18:31:37 +00:00
echo "** Neutrino emissions detected..."
2014-06-08 15:03:56 +00:00
2015-05-19 18:31:37 +00:00
# Create the pihole resource directory if it doesn't exist. Future files will be stored here
2015-06-14 03:01:12 +00:00
if [ [ -d $piholeDir ] ] ; then
2015-05-19 18:31:37 +00:00
:
else
echo "** Creating pihole directory..."
2015-10-28 01:35:37 +00:00
$SUDO mkdir $piholeDir
2015-05-19 18:31:37 +00:00
fi
# Loop through domain list. Download each one and remove commented lines (lines beginning with '# 'or '/') and blank lines
for ( ( i = 0; i < " ${# sources [@] } " ; i++) )
do
2015-08-22 23:22:07 +00:00
url = ${ sources [ $i ] }
2015-05-19 18:31:37 +00:00
# Get just the domain from the URL
2015-08-22 23:22:07 +00:00
domain = $( echo " $url " | cut -d'/' -f3)
2015-11-06 23:03:55 +00:00
2015-05-19 18:31:37 +00:00
# Save the file as list.#.domain
2015-08-22 23:04:54 +00:00
saveLocation = $origin /list.$i .$domain .$justDomainsExtension
2015-10-10 18:51:21 +00:00
2015-11-06 02:11:34 +00:00
agent = "Mozilla/10.0"
2015-11-06 23:03:55 +00:00
2015-11-06 02:11:34 +00:00
echo -n " Getting $domain list... "
2015-05-19 18:31:37 +00:00
2015-11-06 23:03:55 +00:00
# Use a case statement to download lists that need special cURL commands
2015-11-06 02:11:34 +00:00
# to complete properly and reset the user agent when required
case " $domain " in
2015-11-06 23:03:55 +00:00
"adblock.mahakala.is" )
2015-11-06 02:11:34 +00:00
agent = 'Mozilla/5.0 (X11; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0'
cmd = "curl -e http://forum.xda-developers.com/"
; ;
2015-11-06 23:03:55 +00:00
"pgl.yoyo.org" )
2015-11-06 02:11:34 +00:00
cmd = "curl -d mimetype=plaintext -d hostformat=hosts"
; ;
# Default is a simple curl request
*) cmd = "curl"
2015-05-19 18:31:37 +00:00
esac
2015-10-10 18:51:21 +00:00
2015-11-06 23:17:14 +00:00
# tmp file, so we don't have to store the (long!) lists in RAM
2015-11-06 23:14:05 +00:00
patternBuffer = $( mktemp)
2015-11-06 02:22:17 +00:00
heisenbergCompensator = ""
2015-11-06 23:14:05 +00:00
if [ [ -r $saveLocation ] ] ; then
2015-11-06 02:22:17 +00:00
heisenbergCompensator = " -z $saveLocation "
2015-11-06 02:11:34 +00:00
fi
2015-11-06 02:22:17 +00:00
CMD = " $cmd -s $heisenbergCompensator -A ' $agent ' $url > $patternBuffer "
$cmd -s $heisenbergCompensator -A " $agent " $url > $patternBuffer
2015-11-06 02:11:34 +00:00
2015-11-06 23:03:55 +00:00
2015-11-06 02:22:17 +00:00
if [ [ -s " $patternBuffer " ] ] ; then
2015-05-19 18:31:37 +00:00
# Remove comments and print only the domain name
2015-06-04 13:21:44 +00:00
# Most of the lists downloaded are already in hosts file format but the spacing/formating is not contigious
# This helps with that and makes it easier to read
# It also helps with debugging so each stage of the script can be researched more in depth
2015-11-06 02:22:17 +00:00
awk '($1 !~ /^#/) { if (NF>1) {print $2} else {print $1}}' $patternBuffer | \
2015-11-06 02:11:34 +00:00
sed -nr -e 's/\.{2,}/./g' -e '/\./p' > $saveLocation
2015-08-23 00:33:30 +00:00
echo "Done."
2015-05-19 18:31:37 +00:00
else
2015-11-06 02:33:05 +00:00
echo "Skipping pattern because transporter logic detected no changes..."
2015-05-19 18:31:37 +00:00
fi
2015-11-06 02:11:34 +00:00
2015-11-06 23:14:05 +00:00
# Cleanup
2015-11-06 02:22:17 +00:00
rm -f $patternBuffer
2015-05-19 18:31:37 +00:00
done
2014-06-08 15:03:56 +00:00
2015-07-13 11:59:22 +00:00
# Find all files with the .domains extension and compile them into one file and remove CRs
2015-05-19 18:31:37 +00:00
echo "** Aggregating list of domains..."
2015-06-22 20:03:15 +00:00
find $origin / -type f -name " *. $justDomainsExtension " -exec cat { } \; | tr -d '\r' > $origin /$matter
2015-05-19 18:31:37 +00:00
# Append blacklist entries if they exist
2015-11-06 02:11:34 +00:00
if [ [ -r $blacklist ] ] ; then
2015-08-22 22:56:32 +00:00
numberOf = $( cat $blacklist | sed '/^\s*$/d' | wc -l)
echo " ** Blacklisting $numberOf domain(s)... "
cat $blacklist >> $origin /$matter
2014-06-08 15:03:56 +00:00
fi
2015-05-19 18:31:37 +00:00
###########################
2015-11-06 02:11:34 +00:00
function gravity_advanced( ) {
2015-11-06 18:24:12 +00:00
numberOf = $( wc -l < $origin /$andLight )
2015-11-06 23:03:55 +00:00
echo " ** $numberOf domains being pulled in by gravity... "
2015-11-06 02:11:34 +00:00
2015-05-19 18:31:37 +00:00
# Remove carriage returns and preceding whitespace
2015-11-06 02:11:34 +00:00
# not really needed anymore?
2015-11-06 23:03:55 +00:00
cp $origin /$andLight $origin /$supernova
2015-11-06 02:11:34 +00:00
2015-05-19 18:31:37 +00:00
# Sort and remove duplicates
2015-11-06 02:11:34 +00:00
sort -u $origin /$supernova > $origin /$eventHorizon
2015-11-06 18:24:12 +00:00
numberOf = $( wc -l < $origin /$eventHorizon )
2015-05-19 18:31:37 +00:00
echo " ** $numberOf unique domains trapped in the event horizon. "
2015-11-06 02:11:34 +00:00
2015-06-14 03:01:12 +00:00
# Format domain list as "192.168.x.x domain.com"
2015-05-19 18:31:37 +00:00
echo "** Formatting domains into a HOSTS file..."
2015-11-15 13:59:51 +00:00
cat $origin /$eventHorizon | awk '{sub(/\r$/,""); print "' " $piholeIP " ' " $0}' > $origin /$accretionDisc
2015-07-30 16:24:24 +00:00
# Copy the file over as /etc/pihole/gravity.list so dnsmasq can use it
2015-10-28 01:35:37 +00:00
$SUDO cp $origin /$accretionDisc $adList
2015-07-17 18:05:38 +00:00
kill -HUP $( pidof dnsmasq)
2015-11-06 02:11:34 +00:00
}
2015-11-06 23:03:55 +00:00
2015-05-19 18:31:37 +00:00
# Whitelist (if applicable) then remove duplicates and format for dnsmasq
2015-11-06 02:11:34 +00:00
if [ [ -r $whitelist ] ] ; then
2015-05-19 18:31:37 +00:00
# Remove whitelist entries
2015-07-18 01:49:03 +00:00
numberOf = $( cat $whitelist | sed '/^\s*$/d' | wc -l)
2015-08-23 04:44:41 +00:00
plural = ; [ [ " $numberOf " != "1" ] ] && plural = s
2015-11-06 23:03:55 +00:00
echo " ** Whitelisting $numberOf domain ${ plural } ... "
2015-11-06 02:11:34 +00:00
2015-08-23 06:37:01 +00:00
# Append a "$" to the end, prepend a "^" to the beginning, and
# replace "." with "\." of each line to turn each entry into a
# regexp so it can be parsed out with grep -x
awk -F '[# \t]' 'NF>0&&$1!="" {print "^"$1"$"}' $whitelist | sed 's/\./\\./g' > $latentWhitelist
2015-05-19 18:31:37 +00:00
else
2015-08-23 04:44:41 +00:00
rm $latentWhitelist
2015-06-19 20:31:51 +00:00
fi
2015-08-23 04:44:41 +00:00
# Prevent our sources from being pulled into the hole
plural = ; [ [ " ${# sources [@] } " != "1" ] ] && plural = s
echo " ** Whitelisting ${# sources [@] } ad list source ${ plural } ... "
for url in ${ sources [@] }
do
2015-08-23 06:37:01 +00:00
echo " $url " | awk -F '/' '{print "^"$3"$"}' | sed 's/\./\\./g' >> $latentWhitelist
2015-08-23 04:44:41 +00:00
done
2015-08-23 06:37:01 +00:00
2015-11-06 02:11:34 +00:00
# Remove whitelist entries from deduped list
2015-08-23 06:37:01 +00:00
grep -vxf $latentWhitelist $origin /$matter > $origin /$andLight
2015-08-23 04:44:41 +00:00
gravity_advanced