|
#!/bin/sh /etc/rc.common
|
|
# Copyright 2019-2022 Stan Grishin (stangri@melmac.ca)
|
|
# shellcheck disable=SC1091,SC2039,SC3043,SC3060
|
|
PKG_VERSION='dev-test'
|
|
|
|
# shellcheck disable=SC2034
|
|
START=80
|
|
# shellcheck disable=SC2034
|
|
USE_PROCD=1
|
|
|
|
if type extra_command 1>/dev/null 2>&1; then
|
|
extra_command 'version' 'Show version information'
|
|
else
|
|
# shellcheck disable=SC2034
|
|
EXTRA_COMMANDS='version'
|
|
fi
|
|
|
|
readonly packageName='https-dns-proxy'
|
|
readonly serviceName="$packageName $PKG_VERSION"
|
|
readonly sharedMemoryOutput="/dev/shm/$packageName-output"
|
|
readonly _OK_='\033[0;32m\xe2\x9c\x93\033[0m'
|
|
readonly _FAIL_='\033[0;31m\xe2\x9c\x97\033[0m'
|
|
readonly PROG=/usr/sbin/https-dns-proxy
|
|
readonly DEFAULT_BOOTSTRAP='1.1.1.1,1.0.0.1,2606:4700:4700::1111,2606:4700:4700::1001,8.8.8.8,8.8.4.4,2001:4860:4860::8888,2001:4860:4860::8844'
|
|
readonly canaryDomainsMozilla='use-application-dns.net'
|
|
readonly canaryDomainsiCloud='mask.icloud.com mask-h2.icloud.com'
|
|
canaryDomains=
|
|
canary_domains_icloud=
|
|
canary_domains_mozilla=
|
|
update_dnsmasq_config=
|
|
force_dns=
|
|
force_dns_port=
|
|
|
|
str_contains() { [ -n "$1" ] &&[ -n "$2" ] && [ "${1//$2}" != "$1" ]; }
|
|
is_mac_address() { expr "$1" : '[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]:[0-9A-F][0-9A-F]$' >/dev/null; }
|
|
is_ipv4() { expr "$1" : '[0-9][0-9]*\.[0-9][0-9]*\.[0-9][0-9]*\.[0-9][0-9]*$' >/dev/null; }
|
|
is_ipv6() { ! is_mac_address "$1" && str_contains "$1" ":"; }
|
|
output() {
|
|
local msg memmsg logmsg
|
|
[ -t 1 ] && printf "%b" "$@"
|
|
msg="${1//$serviceName /service }";
|
|
if [ "$(printf "%b" "$msg" | wc -l)" -gt 0 ]; then
|
|
[ -s "$sharedMemoryOutput" ] && memmsg="$(cat "$sharedMemoryOutput")"
|
|
logmsg="$(printf "%b" "${memmsg}${msg}" | sed 's/\x1b\[[0-9;]*m//g')"
|
|
logger -t "$packageName" "$(printf "%b" "$logmsg")"
|
|
rm -f "$sharedMemoryOutput"
|
|
else
|
|
printf "%b" "$msg" >> "$sharedMemoryOutput"
|
|
fi
|
|
}
|
|
output_ok() { output "$_OK_"; }
|
|
output_okn() { output "${_OK_}\\n"; }
|
|
output_fail() { output "$_FAIL_"; }
|
|
output_failn() { output "${_FAIL_}\\n"; }
|
|
uci_add_list_if_new() {
|
|
local PACKAGE="$1"
|
|
local CONFIG="$2"
|
|
local OPTION="$3"
|
|
local VALUE="$4"
|
|
local i
|
|
[ -n "$PACKAGE" ] && [ -n "$CONFIG" ] && [ -n "$OPTION" ] && [ -n "$VALUE" ] || return 1
|
|
for i in $(uci_get "$PACKAGE" "$CONFIG" "$OPTION"); do
|
|
[ "$i" = "$VALUE" ] && return 0
|
|
done
|
|
uci_add_list "$PACKAGE" "$CONFIG" "$OPTION" "$VALUE"
|
|
}
|
|
uci_changes() {
|
|
local PACKAGE="$1"
|
|
local CONFIG="$2"
|
|
local OPTION="$3"
|
|
/sbin/uci ${UCI_CONFIG_DIR:+-c $UCI_CONFIG_DIR} changes "$PACKAGE${CONFIG:+.$CONFIG}${OPTION:+.$OPTION}"
|
|
}
|
|
|
|
dnsmasq_restart() { [ -x /etc/init.d/dnsmasq ] || return 0; /etc/init.d/dnsmasq restart >/dev/null 2>&1; }
|
|
|
|
version() { echo "$PKG_VERSION"; }
|
|
|
|
xappend() { param="$param $1"; }
|
|
|
|
append_bool() {
|
|
local section="$1"
|
|
local option="$2"
|
|
local value="$3"
|
|
local default="${4:-0}"
|
|
local _loctmp
|
|
config_get_bool _loctmp "$section" "$option" "$default"
|
|
[ "$_loctmp" -ne 0 ] && xappend "$value"
|
|
}
|
|
|
|
append_parm() {
|
|
local section="$1"
|
|
local option="$2"
|
|
local switch="$3"
|
|
local default="$4"
|
|
local _loctmp
|
|
config_get _loctmp "$section" "$option" "$default"
|
|
[ -n "$_loctmp" ] && xappend "$switch $_loctmp"
|
|
}
|
|
|
|
append_counter() {
|
|
local section="$1"
|
|
local option="$2"
|
|
local switch="$3"
|
|
local default="${4:-0}"
|
|
local _loctmp i
|
|
config_get _loctmp "$section" "$option" "$default"
|
|
# shellcheck disable=SC2086,SC2154
|
|
for i in $(seq 1 $_loctmp); do
|
|
xappend '-v'
|
|
done
|
|
}
|
|
|
|
append_bootstrap() {
|
|
local section="$1"
|
|
local option="$2"
|
|
local switch="$3"
|
|
local default="$4"
|
|
local _old_ifs="$IFS"
|
|
local _loctmp _newtmp i
|
|
config_get _loctmp "$section" "$option" "$default"
|
|
[ -z "$_loctmp" ] && return 0
|
|
IFS=" ,"
|
|
for i in $_loctmp; do
|
|
if { [ "$ipv6_resolvers_only" -eq 0 ] && is_ipv4 "$i"; } || \
|
|
{ [ "$ipv6_resolvers_only" -ne 0 ] && is_ipv6 "$i"; }; then
|
|
[ -z "$_newtmp" ] && _newtmp="$i" || _newtmp="${_newtmp},${i}"
|
|
fi
|
|
done
|
|
IFS="$_old_ifs"
|
|
[ -n "$_newtmp" ] && xappend "$switch $_newtmp"
|
|
[ "$ipv6_resolvers_only" -eq 0 ] && xappend '-4'
|
|
}
|
|
|
|
start_instance() {
|
|
local cfg="$1" param listen_addr listen_port ipv6_resolvers_only p
|
|
config_get_bool ipv6_resolvers_only "$cfg" 'use_ipv6_resolvers_only' '0'
|
|
append_parm "$cfg" 'resolver_url' '-r'
|
|
append_parm "$cfg" 'polling_interval' '-i'
|
|
append_parm "$cfg" 'listen_addr' '-a' '127.0.0.1'
|
|
append_parm "$cfg" 'listen_port' '-p' "$port"
|
|
append_parm "$cfg" 'dscp_codepoint' '-c'
|
|
append_bootstrap "$cfg" 'bootstrap_dns' '-b' "$DEFAULT_BOOTSTRAP"
|
|
append_parm "$cfg" 'user' '-u' 'nobody'
|
|
append_parm "$cfg" 'group' '-g' 'nogroup'
|
|
append_parm "$cfg" 'proxy_server' '-t'
|
|
append_parm "$cfg" 'logfile' '-l'
|
|
append_bool "$cfg" 'use_http1' '-x'
|
|
append_counter "$cfg" 'verbosity' '-v' '0'
|
|
|
|
procd_open_instance
|
|
# shellcheck disable=SC2086
|
|
procd_set_param command $PROG $param
|
|
procd_set_param stderr 1
|
|
procd_set_param stdout 1
|
|
procd_set_param respawn
|
|
if [ "$force_dns" -ne 0 ]; then
|
|
procd_open_data
|
|
json_add_array firewall
|
|
for p in $force_dns_port; do
|
|
if netstat -tuln | grep 'LISTEN' | grep ":${p}" >/dev/null 2>&1 || [ "$p" = '53' ]; then
|
|
json_add_object ''
|
|
json_add_string type redirect
|
|
json_add_string target DNAT
|
|
json_add_string src lan
|
|
json_add_string proto 'tcp udp'
|
|
json_add_string src_dport "$p"
|
|
json_add_string dest_port "$p"
|
|
json_add_boolean reflection 0
|
|
json_close_object
|
|
else
|
|
json_add_object ''
|
|
json_add_string type rule
|
|
json_add_string src lan
|
|
json_add_string dest '*'
|
|
json_add_string proto 'tcp udp'
|
|
json_add_string dest_port "$p"
|
|
json_add_string target REJECT
|
|
json_close_object
|
|
fi
|
|
done
|
|
json_close_array
|
|
procd_close_data
|
|
fi
|
|
procd_close_instance
|
|
|
|
if [ "$?" ]; then
|
|
config_get listen_addr "$cfg" 'listen_addr' '127.0.0.1'
|
|
config_get listen_port "$cfg" 'listen_port' "$port"
|
|
if [ "$update_dnsmasq_config" = '*' ]; then
|
|
config_load 'dhcp'
|
|
config_foreach dnsmasq_doh_server 'dnsmasq' 'add' "${listen_addr}" "${listen_port}"
|
|
elif [ -n "$update_dnsmasq_config" ]; then
|
|
for i in $update_dnsmasq_config; do
|
|
if [ -n "$(uci_get 'dhcp' "@dnsmasq[$i]")" ]; then
|
|
dnsmasq_doh_server "@dnsmasq[$i]" 'add' "${listen_addr}" "${listen_port}"
|
|
elif [ -n "$(uci_get 'dhcp' "$i")" ]; then
|
|
dnsmasq_doh_server "${i}" 'add' "${listen_addr}" "${listen_port}"
|
|
fi
|
|
done
|
|
fi
|
|
output_ok
|
|
port="$((port+1))"
|
|
force_dns=0
|
|
else
|
|
output_fail
|
|
fi
|
|
}
|
|
|
|
start_service() {
|
|
local port=5053
|
|
output "Starting $serviceName "
|
|
config_load "$packageName"
|
|
config_get update_dnsmasq_config 'config' 'update_dnsmasq_config' '*'
|
|
config_get_bool canary_domains_icloud 'config' 'canary_domains_icloud' '1'
|
|
config_get_bool canary_domains_mozilla 'config' 'canary_domains_mozilla' '1'
|
|
config_get_bool force_dns 'config' 'force_dns' '1'
|
|
config_get force_dns_port 'config' 'force_dns_port' '53 853'
|
|
if [ "$canary_domains_icloud" -ne 0 ]; then
|
|
canaryDomains="${canaryDomains:+$canaryDomains }${canaryDomainsiCloud}"
|
|
fi
|
|
if [ "$canary_domains_mozilla" -ne 0 ]; then
|
|
canaryDomains="${canaryDomains:+$canaryDomains }${canaryDomainsMozilla}"
|
|
fi
|
|
dhcp_backup 'create'
|
|
config_load "$packageName"
|
|
config_foreach start_instance "$packageName"
|
|
if [ -n "$(uci_changes dhcp)" ]; then
|
|
uci_commit 'dhcp'
|
|
dnsmasq_restart
|
|
fi
|
|
output "\\n"
|
|
}
|
|
|
|
stop_service() {
|
|
local s=0
|
|
output "Stopping $serviceName "
|
|
config_load "$packageName"
|
|
config_get update_dnsmasq_config 'config' 'update_dnsmasq_config' '*'
|
|
dhcp_backup 'restore'
|
|
if [ -n "$(uci_changes dhcp)" ]; then
|
|
uci_commit 'dhcp'
|
|
dnsmasq_restart || s=1
|
|
fi
|
|
# shellcheck disable=SC2015
|
|
[ "$s" -eq 0 ] && output_okn || output_failn
|
|
}
|
|
|
|
# shellcheck disable=SC1091
|
|
service_triggers() {
|
|
local iface
|
|
. /lib/functions/network.sh
|
|
network_flush_cache
|
|
network_find_wan iface
|
|
iface="${iface:-wan}"
|
|
if [ -n "$iface" ]; then
|
|
procd_add_interface_trigger "interface.*" "$iface" "/etc/init.d/${packageName}" restart
|
|
fi
|
|
procd_add_config_trigger "config.change" "$packageName" "/etc/init.d/${packageName}" restart
|
|
}
|
|
|
|
service_started() { procd_set_config_changed firewall; }
|
|
service_stopped() { procd_set_config_changed firewall; }
|
|
|
|
dnsmasq_doh_server() {
|
|
local cfg="$1" param="$2" address="${3:-127.0.0.1}" port="$4" i
|
|
case "$param" in
|
|
add)
|
|
if [ "$force_dns" -ne 0 ]; then
|
|
for i in $canaryDomains; do
|
|
uci_add_list_if_new 'dhcp' "$cfg" 'server' "/${i}/"
|
|
done
|
|
fi
|
|
case $address in
|
|
0.0.0.0|::ffff:0.0.0.0) address='127.0.0.1';;
|
|
::) address='::1';;
|
|
esac
|
|
uci_add_list_if_new 'dhcp' "$cfg" 'server' "${address}#${port}"
|
|
;;
|
|
remove)
|
|
eval "$(ubus call service list "{ 'verbose': true, 'name': '$packageName' }" | jsonfilter -F '# ' -e 'TUPLES=@[*].instances[*].command[4,6]')"
|
|
for i in $TUPLES; do
|
|
uci_remove_list 'dhcp' "$cfg" 'server' "$i"
|
|
done
|
|
for i in $canaryDomains; do
|
|
uci_remove_list 'dhcp' "$cfg" 'server' "/${i}/"
|
|
done
|
|
;;
|
|
esac
|
|
}
|
|
|
|
dnsmasq_create_server_backup() {
|
|
local cfg="$1" i
|
|
[ -n "$(uci_get 'dhcp' "$cfg")" ] || return 1
|
|
if [ -z "$(uci_get 'dhcp' "$cfg" 'doh_backup_noresolv')" ]; then
|
|
if [ -z "$(uci_get 'dhcp' "$cfg" 'noresolv')" ]; then
|
|
uci_set 'dhcp' "$cfg" 'doh_backup_noresolv' '-1'
|
|
else
|
|
uci_set 'dhcp' "$cfg" 'doh_backup_noresolv' "$(uci_get 'dhcp' "$cfg" noresolv)"
|
|
fi
|
|
uci_set 'dhcp' "$cfg" 'noresolv' 1
|
|
fi
|
|
if [ -z "$(uci_get 'dhcp' "$cfg" 'doh_backup_server')" ]; then
|
|
if [ -z "$(uci_get 'dhcp' "$cfg" 'server')" ]; then
|
|
uci_add_list 'dhcp' "$cfg" 'doh_backup_server' ""
|
|
fi
|
|
for i in $(uci_get 'dhcp' "$cfg" 'server'); do
|
|
uci_add_list 'dhcp' "$cfg" 'doh_backup_server' "$i"
|
|
if [ "$i" = "$(echo "$i" | tr -d /\#)" ]; then
|
|
uci_remove_list 'dhcp' "$cfg" 'server' "$i"
|
|
fi
|
|
done
|
|
fi
|
|
return 0
|
|
}
|
|
|
|
dnsmasq_restore_server_backup() {
|
|
local cfg="$1" i
|
|
[ -n "$(uci_get 'dhcp' "$cfg")" ] || return 0
|
|
if [ -n "$(uci_get 'dhcp' "$cfg" 'doh_backup_noresolv')" ]; then
|
|
if [ "$(uci_get 'dhcp' "$cfg" 'doh_backup_noresolv')" = "-1" ]; then
|
|
uci_remove 'dhcp' "$cfg" 'noresolv'
|
|
else
|
|
uci_set 'dhcp' "$cfg" 'noresolv' "$(uci_get 'dhcp' "$cfg" 'doh_backup_noresolv')"
|
|
fi
|
|
uci_remove 'dhcp' "$cfg" 'doh_backup_noresolv'
|
|
fi
|
|
if [ -n "$(uci_get 'dhcp' "$cfg" 'doh_backup_server')" ]; then
|
|
dnsmasq_doh_server "$cfg" 'remove'
|
|
for i in $(uci_get 'dhcp' "$cfg" 'doh_backup_server'); do
|
|
uci_add_list_if_new 'dhcp' "$cfg" 'server' "$i"
|
|
done
|
|
uci_remove 'dhcp' "$cfg" 'doh_backup_server'
|
|
fi
|
|
}
|
|
|
|
dhcp_backup() {
|
|
local i
|
|
config_load 'dhcp'
|
|
case "$1" in
|
|
create)
|
|
if [ "$update_dnsmasq_config" = "*" ]; then
|
|
config_foreach dnsmasq_create_server_backup 'dnsmasq'
|
|
elif [ -n "$update_dnsmasq_config" ]; then
|
|
for i in $update_dnsmasq_config; do
|
|
if [ -n "$(uci_get 'dhcp' "@dnsmasq[$i]")" ]; then
|
|
dnsmasq_create_server_backup "@dnsmasq[$i]"
|
|
elif [ -n "$(uci_get 'dhcp' "$i")" ]; then
|
|
dnsmasq_create_server_backup "$i"
|
|
fi
|
|
done
|
|
fi
|
|
;;
|
|
restore)
|
|
config_foreach dnsmasq_restore_server_backup 'dnsmasq'
|
|
;;
|
|
esac
|
|
}
|