2015-11-23 07:49:38 +00:00
#!/usr/bin/env bash
2015-05-19 18:31:37 +00:00
# http://pi-hole.net
2015-11-06 23:03:55 +00:00
# Compiles a list of ad-serving domains by downloading them from multiple sources
2015-11-23 07:49:38 +00:00
piholeIPfile = /tmp/piholeIP
if [ [ -f $piholeIPfile ] ] ; then
# If the file exists, it means it was exported from the installation script and we should use that value instead of detecting it in this script
piholeIP = $( cat $piholeIPfile )
rm $piholeIPfile
else
# Otherwise, the IP address can be taken directly from the machine, which will happen when the script is run by the user and not the installation script
piholeIP = $( ip -4 addr show | awk '{match($0,/[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/); ip = substr($0,RSTART,RLENGTH); print ip}' | sed '/^\s*$/d' | grep -v "127.0.0.1" | ( head -n1) )
fi
2015-06-14 03:01:12 +00:00
2015-05-19 18:31:37 +00:00
# Ad-list sources--one per line in single quotes
2015-11-23 07:49:38 +00:00
# The mahakala source is commented out due to many users having issues with it blocking legitimate domains. Uncomment at your own risk
2015-05-19 18:31:37 +00:00
sources = ( 'https://adaway.org/hosts.txt'
'http://adblock.gjtech.net/?format=unix-hosts'
2015-11-06 23:03:55 +00:00
#'http://adblock.mahakala.is/'
2015-11-06 23:05:04 +00:00
'http://hosts-file.net/ad_servers.txt'
2015-05-19 18:31:37 +00:00
'http://www.malwaredomainlist.com/hostslist/hosts.txt'
'http://pgl.yoyo.org/adservers/serverlist.php?'
'http://someonewhocares.org/hosts/hosts'
'http://winhelp2002.mvps.org/hosts.txt' )
2014-06-08 15:03:56 +00:00
2015-05-19 18:31:37 +00:00
# Variables for various stages of downloading and formatting the list
2015-11-23 07:49:38 +00:00
basename = pihole
piholeDir = /etc/$basename
adList = $piholeDir /gravity.list
2015-05-19 18:31:37 +00:00
blacklist = $piholeDir /blacklist.txt
whitelist = $piholeDir /whitelist.txt
2015-11-23 07:49:38 +00:00
latentWhitelist = $piholeDir /latentWhitelist.txt
justDomainsExtension = domains
matter = $basename .0.matter.txt
andLight = $basename .1.andLight.txt
supernova = $basename .2.supernova.txt
eventHorizon = $basename .3.eventHorizon.txt
accretionDisc = $basename .4.accretionDisc.txt
eyeOfTheNeedle = $basename .5.wormhole.txt
2014-06-08 15:03:56 +00:00
2015-11-06 23:03:55 +00:00
# After setting defaults, check if there's local overrides
if [ [ -r $piholeDir /pihole.conf ] ] ; then
echo "** Local calibration requested..."
2015-11-23 07:49:38 +00:00
. $piholeDir /pihole.conf
2015-11-06 23:03:55 +00:00
fi
2015-11-23 09:47:24 +00:00
###########################
# collapse - begin formation of pihole
function gravity_collapse( ) {
2015-05-19 18:31:37 +00:00
echo "** Neutrino emissions detected..."
2014-06-08 15:03:56 +00:00
2015-05-19 18:31:37 +00:00
# Create the pihole resource directory if it doesn't exist. Future files will be stored here
2015-06-14 03:01:12 +00:00
if [ [ -d $piholeDir ] ] ; then
2015-11-23 08:36:01 +00:00
# Temporary hack to allow non-root access to pihole directory
# Will update later, needed for existing installs, new installs should
# create this directory as non-root
sudo chmod 777 $piholeDir
find " $piholeDir " -type f -exec sudo chmod 666 { } \;
2015-05-19 18:31:37 +00:00
else
2015-11-23 07:49:38 +00:00
echo "** Creating pihole directory..."
2015-11-23 08:36:01 +00:00
mkdir $piholeDir
2015-05-19 18:31:37 +00:00
fi
2015-11-23 08:36:01 +00:00
}
2015-11-23 07:49:38 +00:00
2015-11-23 09:47:24 +00:00
# spinup - main gravity function
function gravity_spinup( ) {
# Loop through domain list. Download each one and remove commented lines (lines beginning with '# 'or '/') and blank lines
for ( ( i = 0; i < " ${# sources [@] } " ; i++) )
do
url = ${ sources [ $i ] }
# Get just the domain from the URL
# Whitelist (if applicable) domains
if [ [ -r $whitelist ] ] ; then
# Remove whitelist entries
numberOf = $( cat $whitelist | sed '/^\s*$/d' | wc -l)
plural = ; [ [ " $numberOf " != "1" ] ] && plural = s
echo " ** Whitelisting $numberOf domain ${ plural } ... "
# Append a "$" to the end, prepend a "^" to the beginning, and
# replace "." with "\." of each line to turn each entry into a
# regexp so it can be parsed out with grep -x
awk -F '[# \t]' 'NF>0&&$1!="" {print "^"$1"$"}' $whitelist | sed 's/\./\\./g' > $latentWhitelist
else
rm $latentWhitelist
fi
# Prevent our sources from being pulled into the hole
plural = ; [ [ " ${# sources [@] } " != "1" ] ] && plural = s
echo " ** Whitelisting ${# sources [@] } ad list source ${ plural } ... "
for url in ${ sources [@] }
do
echo " $url " | awk -F '/' '{print "^"$3"$"}' | sed 's/\./\\./g' >> $latentWhitelist
2015-11-23 09:16:00 +00:00
done
2015-11-23 09:47:24 +00:00
# Remove whitelist entries from list
grep -vxf $latentWhitelist $piholeDir /$matter > $piholeDir /$andLight
2015-11-23 09:16:00 +00:00
}
function gravity_advanced( ) {
numberOf = $( wc -l < $piholeDir /$andLight )
echo " ** $numberOf domains being pulled in by gravity... "
2015-11-23 07:49:38 +00:00
# Remove carriage returns and preceding whitespace
# not really needed anymore?
cp $piholeDir /$andLight $piholeDir /$supernova
# Sort and remove duplicates
sort -u $piholeDir /$supernova > $piholeDir /$eventHorizon
numberOf = $( wc -l < $piholeDir /$eventHorizon )
echo " ** $numberOf unique domains trapped in the event horizon. "
# Format domain list as "192.168.x.x domain.com"
echo "** Formatting domains into a HOSTS file..."
cat $piholeDir /$eventHorizon | awk '{sub(/\r$/,""); print "' " $piholeIP " ' " $0}' > $piholeDir /$accretionDisc
# Copy the file over as /etc/pihole/gravity.list so dnsmasq can use it
2015-11-23 08:36:01 +00:00
cp $piholeDir /$accretionDisc $adList
sudo kill -HUP $( pidof dnsmasq)
2015-11-06 02:11:34 +00:00
}
2015-11-06 23:03:55 +00:00
2015-11-23 08:36:01 +00:00
gravity_spinup
2015-11-23 09:47:24 +00:00
gravity_transport
gravity_Schwartzchild
2015-08-23 04:44:41 +00:00
gravity_advanced