small-package/luci-app-passwall/root/usr/share/passwall/helper_dnsmasq_add.lua

417 lines
12 KiB
Lua
Raw Normal View History

2022-06-09 20:21:51 +08:00
require "luci.sys"
2023-02-16 23:37:45 +08:00
local api = require "luci.passwall.api"
2022-04-12 09:33:58 +08:00
local var = api.get_args(arg)
local FLAG = var["-FLAG"]
local TMP_DNSMASQ_PATH = var["-TMP_DNSMASQ_PATH"]
local DNSMASQ_CONF_FILE = var["-DNSMASQ_CONF_FILE"]
local DEFAULT_DNS = var["-DEFAULT_DNS"]
local LOCAL_DNS = var["-LOCAL_DNS"]
local TUN_DNS = var["-TUN_DNS"]
local REMOTE_FAKEDNS = var["-REMOTE_FAKEDNS"]
2023-03-09 16:25:44 +08:00
local CHNROUTE_MODE_DEFAULT_DNS = var["-CHNROUTE_MODE_DEFAULT_DNS"]
2022-04-12 09:33:58 +08:00
local CHINADNS_DNS = var["-CHINADNS_DNS"]
local TCP_NODE = var["-TCP_NODE"]
local PROXY_MODE = var["-PROXY_MODE"]
local NO_PROXY_IPV6 = var["-NO_PROXY_IPV6"]
local NO_LOGIC_LOG = var["-NO_LOGIC_LOG"]
2022-10-02 23:46:41 +08:00
local NFTFLAG = var["-NFTFLAG"]
2022-04-14 20:39:04 +08:00
local CACHE_PATH = api.CACHE_PATH
2023-02-21 16:11:17 +08:00
local CACHE_FLAG = "dnsmasq_" .. FLAG
2022-04-12 09:33:58 +08:00
local CACHE_DNS_PATH = CACHE_PATH .. "/" .. CACHE_FLAG
2022-04-14 20:39:04 +08:00
local CACHE_TEXT_FILE = CACHE_DNS_PATH .. ".txt"
2022-04-12 09:33:58 +08:00
local uci = api.uci
local sys = api.sys
local appname = api.appname
local fs = api.fs
local datatypes = api.datatypes
local list1 = {}
local excluded_domain = {}
local excluded_domain_str = "!"
local function log(...)
2023-03-22 09:20:32 +08:00
if NO_LOGIC_LOG == "1" then
return
end
2023-03-30 01:29:55 +08:00
api.log(...)
2022-04-12 09:33:58 +08:00
end
local function check_dns(domain, dns)
2023-03-22 09:20:32 +08:00
if domain == "" or domain:find("#") then
return false
end
if not dns then
return
end
2022-04-12 09:33:58 +08:00
for k,v in ipairs(list1[domain].dns) do
if dns == v then
return true
end
end
2023-03-22 09:20:32 +08:00
return false
2022-04-12 09:33:58 +08:00
end
local function check_ipset(domain, ipset)
2023-03-22 09:20:32 +08:00
if domain == "" or domain:find("#") then
return false
end
if not ipset then
return
end
2022-04-12 09:33:58 +08:00
for k,v in ipairs(list1[domain].ipsets) do
if ipset == v then
return true
end
end
2023-03-22 09:20:32 +08:00
return false
2022-04-12 09:33:58 +08:00
end
local function set_domain_address(domain, address)
2023-03-22 09:20:32 +08:00
if domain == "" or domain:find("#") then
return
end
if not list1[domain] then
list1[domain] = {
dns = {},
ipsets = {}
}
end
if not list1[domain].address then
list1[domain].address = address
end
2022-04-12 09:33:58 +08:00
end
local function set_domain_dns(domain, dns)
2023-03-22 09:20:32 +08:00
if domain == "" or domain:find("#") then
return
end
if not dns then
return
end
if not list1[domain] then
list1[domain] = {
dns = {},
ipsets = {}
}
end
for line in string.gmatch(dns, '[^' .. "," .. ']+') do
if not check_dns(domain, line) then
table.insert(list1[domain].dns, line)
end
end
2022-04-12 09:33:58 +08:00
end
local function set_domain_ipset(domain, ipset)
2023-03-22 09:20:32 +08:00
if domain == "" or domain:find("#") then
return
end
if not ipset then
return
end
if not list1[domain] then
list1[domain] = {
dns = {},
ipsets = {}
}
end
for line in string.gmatch(ipset, '[^' .. "," .. ']+') do
if not check_ipset(domain, line) then
table.insert(list1[domain].ipsets, line)
end
end
2022-04-12 09:33:58 +08:00
end
local function add_excluded_domain(domain)
2023-03-22 09:20:32 +08:00
if domain == "" or domain:find("#") then
return
end
2022-04-12 09:33:58 +08:00
table.insert(excluded_domain, domain)
2023-03-22 09:20:32 +08:00
excluded_domain_str = excluded_domain_str .. "|" .. domain
2022-04-12 09:33:58 +08:00
end
local function check_excluded_domain(domain)
2023-03-22 09:20:32 +08:00
if domain == "" or domain:find("#") then
return false
end
2022-04-12 09:33:58 +08:00
for k,v in ipairs(excluded_domain) do
if domain:find(v) then
return true
end
end
2023-03-22 09:20:32 +08:00
return false
2022-04-12 09:33:58 +08:00
end
2022-04-14 20:39:04 +08:00
local cache_text = ""
2022-06-09 20:21:51 +08:00
local new_rules = luci.sys.exec("echo -n $(find /usr/share/passwall/rules -type f | xargs md5sum)")
2023-03-09 16:25:44 +08:00
local new_text = TMP_DNSMASQ_PATH .. DNSMASQ_CONF_FILE .. DEFAULT_DNS .. LOCAL_DNS .. TUN_DNS .. REMOTE_FAKEDNS .. CHNROUTE_MODE_DEFAULT_DNS .. CHINADNS_DNS .. PROXY_MODE .. NO_PROXY_IPV6 .. new_rules .. NFTFLAG
2022-04-14 20:39:04 +08:00
if fs.access(CACHE_TEXT_FILE) then
2023-03-22 09:20:32 +08:00
for line in io.lines(CACHE_TEXT_FILE) do
cache_text = line
end
2022-04-12 09:33:58 +08:00
end
2022-04-14 20:39:04 +08:00
if cache_text ~= new_text then
2023-03-22 09:20:32 +08:00
api.remove(CACHE_DNS_PATH .. "*")
2022-04-12 09:33:58 +08:00
end
local global = PROXY_MODE:find("global")
local returnhome = PROXY_MODE:find("returnhome")
local chnlist = PROXY_MODE:find("chnroute")
local gfwlist = PROXY_MODE:find("gfwlist")
local only_global
2023-03-09 16:25:44 +08:00
local dnsmasq_default_dns
2023-04-04 13:25:13 +08:00
if CHNROUTE_MODE_DEFAULT_DNS ~= "nil" then
if chnlist and CHNROUTE_MODE_DEFAULT_DNS == "remote" then
2023-03-22 09:20:32 +08:00
dnsmasq_default_dns = TUN_DNS
end
2023-04-04 13:25:13 +08:00
if (chnlist or gfwlist) and CHNROUTE_MODE_DEFAULT_DNS == "chinadns_ng" and CHINADNS_DNS ~= "0" then
2023-03-22 09:20:32 +08:00
dnsmasq_default_dns = CHINADNS_DNS
end
2022-04-12 09:33:58 +08:00
end
2023-03-09 16:25:44 +08:00
2022-04-12 09:33:58 +08:00
if global and (not returnhome and not chnlist and not gfwlist) then
2023-03-22 09:20:32 +08:00
--只有全局模式时
dnsmasq_default_dns = TUN_DNS
only_global = 1
2022-04-12 09:33:58 +08:00
end
2022-10-26 20:27:06 +08:00
local setflag_4= (NFTFLAG == "1") and "4#inet#fw4#" or ""
local setflag_6= (NFTFLAG == "1") and "6#inet#fw4#" or ""
2022-10-02 23:46:41 +08:00
2022-04-12 09:33:58 +08:00
if not fs.access(CACHE_DNS_PATH) then
2023-03-22 09:20:32 +08:00
fs.mkdir("/tmp/dnsmasq.d")
fs.mkdir(CACHE_DNS_PATH)
--屏蔽列表
for line in io.lines("/usr/share/passwall/rules/block_host") do
if line ~= "" and not line:find("#") then
set_domain_address(line, "0.0.0.0")
end
end
--始终用国内DNS解析节点域名
uci:foreach(appname, "nodes", function(t)
local address = t.address
if datatypes.hostname(address) then
set_domain_dns(address, LOCAL_DNS)
set_domain_ipset(address, setflag_4 .. "vpsiplist," .. setflag_6 .. "vpsiplist6")
end
end)
log(string.format(" - 节点列表中的域名(vpsiplist)%s", LOCAL_DNS or "默认"))
--始终用国内DNS解析直连白名单列表
for line in io.lines("/usr/share/passwall/rules/direct_host") do
if line ~= "" and not line:find("#") then
add_excluded_domain(line)
set_domain_dns(line, LOCAL_DNS)
set_domain_ipset(line, setflag_4 .. "whitelist," .. setflag_6 .. "whitelist6")
end
end
log(string.format(" - 域名白名单(whitelist)%s", LOCAL_DNS or "默认"))
local fwd_dns
local ipset_flag
local no_ipv6
--始终使用远程DNS解析代理黑名单列表
for line in io.lines("/usr/share/passwall/rules/proxy_host") do
if line ~= "" and not line:find("#") then
add_excluded_domain(line)
local ipset_flag = setflag_4 .. "blacklist," .. setflag_6 .. "blacklist6"
if NO_PROXY_IPV6 == "1" then
set_domain_address(line, "::")
ipset_flag = setflag_4 .. "blacklist"
end
if REMOTE_FAKEDNS == "1" then
ipset_flag = nil
end
set_domain_dns(line, TUN_DNS)
set_domain_ipset(line, ipset_flag)
end
end
log(string.format(" - 代理域名表(blacklist)%s", TUN_DNS or "默认"))
--分流规则
if uci:get(appname, TCP_NODE, "protocol") == "_shunt" then
local t = uci:get_all(appname, TCP_NODE)
local default_node_id = t["default_node"] or "_direct"
uci:foreach(appname, "shunt_rules", function(s)
local _node_id = t[s[".name"]] or "nil"
if _node_id ~= "nil" and _node_id ~= "_blackhole" then
if _node_id == "_default" then
_node_id = default_node_id
end
fwd_dns = nil
ipset_flag = nil
no_ipv6 = nil
if _node_id == "_direct" then
fwd_dns = LOCAL_DNS
ipset_flag = setflag_4 .. "whitelist," .. setflag_6 .. "whitelist6"
else
fwd_dns = TUN_DNS
ipset_flag = setflag_4 .. "shuntlist," .. setflag_6 .. "shuntlist6"
if NO_PROXY_IPV6 == "1" then
ipset_flag = setflag_4 .. "shuntlist"
no_ipv6 = true
end
if not only_global then
if REMOTE_FAKEDNS == "1" then
ipset_flag = nil
end
end
end
local domain_list = s.domain_list or ""
for line in string.gmatch(domain_list, "[^\r\n]+") do
if line ~= "" and not line:find("#") and not line:find("regexp:") and not line:find("geosite:") and not line:find("ext:") then
if line:find("domain:") or line:find("full:") then
line = string.match(line, ":([^:]+)$")
end
add_excluded_domain(line)
if no_ipv6 then
set_domain_address(line, "::")
end
set_domain_dns(line, fwd_dns)
set_domain_ipset(line, ipset_flag)
end
end
if _node_id ~= "_direct" then
log(string.format(" - V2ray/Xray分流规则(%s)%s", s.remarks, fwd_dns or "默认"))
end
end
end)
end
--如果没有使用回国模式
if not returnhome then
if fs.access("/usr/share/passwall/rules/gfwlist") then
local gfwlist_str = sys.exec('cat /usr/share/passwall/rules/gfwlist | grep -v -E "^#" | grep -v -E "' .. excluded_domain_str .. '"')
for line in string.gmatch(gfwlist_str, "[^\r\n]+") do
if line ~= "" then
local ipset_flag = setflag_4 .. "gfwlist," .. setflag_6 .. "gfwlist6"
if NO_PROXY_IPV6 == "1" then
ipset_flag = setflag_4 .. "gfwlist"
set_domain_address(line, "::")
end
if not only_global then
fwd_dns = TUN_DNS
if CHNROUTE_MODE_DEFAULT_DNS == "chinadns_ng" and CHINADNS_DNS ~= "0" then
fwd_dns = nil
end
if REMOTE_FAKEDNS == "1" then
ipset_flag = nil
end
set_domain_dns(line, fwd_dns)
set_domain_ipset(line, ipset_flag)
end
end
end
log(string.format(" - 防火墙域名表(gfwlist)%s", fwd_dns or "默认"))
end
if chnlist and fs.access("/usr/share/passwall/rules/chnlist") and (CHNROUTE_MODE_DEFAULT_DNS == "remote" or (CHNROUTE_MODE_DEFAULT_DNS == "chinadns_ng" and CHINADNS_DNS ~= "0")) then
fwd_dns = LOCAL_DNS
2023-04-12 16:21:19 +08:00
if CHNROUTE_MODE_DEFAULT_DNS == "chinadns_ng" and CHINADNS_DNS ~= "0" then
fwd_dns = nil
else
local chnlist_str = sys.exec('cat /usr/share/passwall/rules/chnlist | grep -v -E "^#" | grep -v -E "' .. excluded_domain_str .. '"')
for line in string.gmatch(chnlist_str, "[^\r\n]+") do
if line ~= "" then
set_domain_dns(line, fwd_dns)
set_domain_ipset(line, setflag_4 .. "chnroute," .. setflag_6 .. "chnroute6")
2023-03-22 09:20:32 +08:00
end
end
end
log(string.format(" - 中国域名表(chnroute)%s", fwd_dns or "默认"))
end
else
if fs.access("/usr/share/passwall/rules/chnlist") then
local chnlist_str = sys.exec('cat /usr/share/passwall/rules/chnlist | grep -v -E "^#" | grep -v -E "' .. excluded_domain_str .. '"')
for line in string.gmatch(chnlist_str, "[^\r\n]+") do
if line ~= "" then
local ipset_flag = setflag_4 .. "chnroute," .. setflag_6 .. "chnroute6"
if NO_PROXY_IPV6 == "1" then
ipset_flag = setflag_4 .. "chnroute"
set_domain_address(line, "::")
end
if not only_global then
set_domain_dns(line, TUN_DNS)
if REMOTE_FAKEDNS == "1" then
ipset_flag = nil
end
set_domain_ipset(line, ipset_flag)
end
end
end
log(string.format(" - 中国域名表(chnroute)%s", TUN_DNS or "默认"))
end
end
local address_out = io.open(CACHE_DNS_PATH .. "/000-address.conf", "a")
local server_out = io.open(CACHE_DNS_PATH .. "/001-server.conf", "a")
local ipset_out = io.open(CACHE_DNS_PATH .. "/ipset.conf", "a")
local set_name = "ipset"
if NFTFLAG == "1" then
set_name = "nftset"
end
for key, value in pairs(list1) do
if value.address and #value.address > 0 then
address_out:write(string.format("address=/.%s/%s\n", key, value.address))
end
if value.dns and #value.dns > 0 then
for i, dns in ipairs(value.dns) do
server_out:write(string.format("server=/.%s/%s\n", key, dns))
end
end
if value.ipsets and #value.ipsets > 0 then
local ipsets_str = ""
for i, ipset in ipairs(value.ipsets) do
ipsets_str = ipsets_str .. ipset .. ","
end
ipsets_str = ipsets_str:sub(1, #ipsets_str - 1)
ipset_out:write(string.format("%s=/.%s/%s\n", set_name, key, ipsets_str))
end
end
address_out:close()
server_out:close()
ipset_out:close()
local f_out = io.open(CACHE_TEXT_FILE, "a")
f_out:write(new_text)
f_out:close()
2022-04-12 09:33:58 +08:00
end
2023-02-21 16:11:17 +08:00
2022-04-14 20:39:04 +08:00
if api.is_install("procd\\-ujail") then
2023-03-22 09:20:32 +08:00
fs.copyr(CACHE_DNS_PATH, TMP_DNSMASQ_PATH)
2022-04-14 20:39:04 +08:00
else
2023-03-22 09:20:32 +08:00
api.remove(TMP_DNSMASQ_PATH)
fs.symlink(CACHE_DNS_PATH, TMP_DNSMASQ_PATH)
2022-04-14 20:39:04 +08:00
end
2023-02-21 16:11:17 +08:00
2023-03-04 09:27:41 +08:00
if DNSMASQ_CONF_FILE ~= "nil" then
2023-03-22 09:20:32 +08:00
local conf_out = io.open(DNSMASQ_CONF_FILE, "a")
conf_out:write(string.format("conf-dir=%s\n", TMP_DNSMASQ_PATH))
if dnsmasq_default_dns then
conf_out:write(string.format("server=%s\n", dnsmasq_default_dns))
conf_out:write("all-servers\n")
conf_out:write("no-poll\n")
conf_out:write("no-resolv\n")
conf_out:close()
log(string.format(" - 以上所列以外及默认:%s", dnsmasq_default_dns))
if FLAG == "default" then
local f_out = io.open("/tmp/etc/passwall/default_DNS", "a")
f_out:write(DEFAULT_DNS)
f_out:close()
end
end
2022-04-12 09:33:58 +08:00
end
2023-02-21 16:11:17 +08:00
2022-04-12 09:33:58 +08:00
log(" - PassWall必须依赖于Dnsmasq如果你自行配置了错误的DNS流程将会导致域名(直连/代理域名)分流失效!!!")