generated from mietzen/docker-ci-template
-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathentrypoint.sh
executable file
·192 lines (176 loc) · 7.43 KB
/
entrypoint.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
#!/bin/bash
set -eo pipefail
# Variables
# DNSCrypt
export DNSCrypt_Active=${DNSCrypt_Active:-'true'}
DOH_SERVERS=${DOH_SERVERS:-"quad9-doh-ip4-port443-nofilter-ecs-pri, quad9-doh-ip4-port443-nofilter-pri"}
export FALL_BACK_DNS="'${FALL_BACK_DNS:-9.9.9.9}:53'"
# FIREWALL
ALLOW_DOCKER_CIDR=${ALLOW_DOCKER_CIDR:-true}
REDIRECT_PORTS=${REDIRECT_PORTS:-'all'}
LIMIT_UDP=${LIMIT_UDP:-true}
# REDSOCKS
export LOG_DEBUG=${LOG_DEBUG:-off}
export LOG_INFO=${LOG_INFO:-on}
export LOCAL_IP=${LOCAL_IP:-127.0.0.1}
export LOCAL_PORT=${LOCAL_PORT:-8081}
export PROXY_TYPE=${PROXY_TYPE:-socks5}
export TCP_KEEPALIVE_TIME=${TCP_KEEPALIVE_TIME:-0}
export TCP_KEEPALIVE_PROBES=${TCP_KEEPALIVE_PROBES:-0}
export TCP_KEEPALIVE_INTVL=${TCP_KEEPALIVE_INTVL:-0}
export RLIMIT_NOFILE=${RLIMIT_NOFILE:-0}
export REDSOCKS_CONN_MAX=${REDSOCKS_CONN_MAX:-0}
export CONNPRES_IDLE_TIMEOUT=${CONNPRES_IDLE_TIMEOUT:-7440} # Default is 2 hours 4 minutes (RFC 5382)
export MAX_ACCEPT_BACKOFF=${MAX_ACCEPT_BACKOFF:-60000}
export ON_PROXY_FAIL=${ON_PROXY_FAIL:-close}
export DISCLOSE_SRC=${DISCLOSE_SRC:-false}
export LISTENQ=${LISTENQ:-128}
export SPLICE=${SPLICE:-false}
is_valid_port() {
local port="$1"
[[ "$port" =~ ^[0-9]+$ ]] && [ "$port" -ge 1 ] && [ "$port" -le 65535 ]
}
setup_dnscrypt() {
if [[ $DNSCrypt_Active == true ]]; then
echo "DNSCrypt:"
echo " - Generating DNSCrypt configuration"
echo " - Servers: $DOH_SERVERS"
RESOLVERS_JSON=$(curl -s https://download.dnscrypt.info/dnscrypt-resolvers/json/public-resolvers.json)
DOH_SERVERS=$(echo "$DOH_SERVERS" | sed 's/[[:space:]]//g')
export DOH_SERVER_LIST=$(echo "$DOH_SERVERS" | sed "s/\([^,]*\)/'\1'/g" | sed 's/,/, /g')
envsubst < /opt/dnscrypt/dnscrypt-config.toml.template > /opt/dnscrypt/dnscrypt-config.toml
STATIC_BUFFER=""
IFS=',' read -ra SERVERS <<< "$DOH_SERVERS"
echo " - Querying dns static stamps:"
for SERVER in "${SERVERS[@]}"; do
SERVER=$(echo "$SERVER" | xargs) # Trim spaces
STAMP=$(echo "$RESOLVERS_JSON" | jq -r ".[] | select(.name == \"$SERVER\") | .stamp")
if [[ -n "$STAMP" ]]; then
echo " - Found stamp for server $SERVER"
STATIC_BUFFER+=" [static.'$SERVER']\n"
STATIC_BUFFER+=" stamp = '$STAMP'\n"
else
echo " - Warning: Stamp not found for server $SERVER"
fi
done
if [[ -n "$STATIC_BUFFER" ]]; then
echo "[static]" >> /opt/dnscrypt/dnscrypt-config.toml
echo -e "$STATIC_BUFFER" >> /opt/dnscrypt/dnscrypt-config.toml
else
echo " - No valid stamps found; skipping [static] block."
fi
echo " - DNSCrypt configuration:"
sed '$d' /opt/dnscrypt/dnscrypt-config.toml | sed 's/^/ /'
su -s /bin/sh -c "touch /opt/dnscrypt/dnscrypt.log" dnscrypt
echo " - Starting DNSCrypt"
su -s /bin/sh -c "/opt/dnscrypt/dnscrypt-proxy -loglevel 2 -logfile /opt/dnscrypt/dnscrypt.log -pidfile /opt/dnscrypt/dnscrypt.pid -config /opt/dnscrypt/dnscrypt-config.toml" dnscrypt &
chmod 744 /opt/dnscrypt/*.*
echo ""
fi
}
configure_iptables() {
echo "Firewall:"
echo " - Generating firewall rules"
iptables -t nat -N REDSOCKS
if [[ ! $PROXY_SERVER =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]]; then
PROXY_IP=$(dig +short ${PROXY_SERVER} | head -n1)
else
PROXY_IP=$PROXY_SERVER
fi
echo " - Whitelisting proxy server"
echo " - Proxy IP: $PROXY_IP"
iptables -t nat -A REDSOCKS -d 127.0.0.0/8 -j RETURN
iptables -t nat -A REDSOCKS -p tcp -d ${PROXY_IP} --dport ${PROXY_PORT} -j RETURN
if [[ $ALLOW_DOCKER_CIDR == true ]]; then
echo " - Whitelisting docker network"
DOCKER_CIDR=$(sipcalc eth0 | grep -E 'Network address|Network mask \(bits\)' | awk -F'- ' '{print $2}' | paste -sd '/' -)
echo " - Docker CIDR: $DOCKER_CIDR"
iptables -t nat -A REDSOCKS -d ${DOCKER_CIDR} -j RETURN
fi
if [[ $REDIRECT_PORTS == "all" ]]; then
echo " - Redirecting all TCP traffic"
iptables -t nat -A REDSOCKS -p tcp -j REDIRECT --to-port "$LOCAL_PORT"
else
REDIRECT_PORTS=$(echo "$REDIRECT_PORTS" | sed 's/[[:space:]]//g')
IFS=',' read -ra PORTS <<< "$REDIRECT_PORTS"
echo " - Redirecting TCP Ports:"
for PORT in "${PORTS[@]}"; do
if is_valid_port "$PORT"; then
echo " - $PORT"
iptables -t nat -A REDSOCKS -p tcp --dport "$PORT" -j REDIRECT --to-port "$LOCAL_PORT"
else
echo ""
echo "Error: Invalid port: $PORT"
exit 1
fi
done
fi
iptables -t nat -A OUTPUT -p tcp -j REDSOCKS
if [[ $DNSCrypt_Active == true ]]; then
iptables -t nat -A OUTPUT -p udp --dport 53 -j REDIRECT --to-port 5533
iptables -t nat -A PREROUTING -p udp --dport 53 -j REDIRECT --to-port 5533
fi
if [[ $LIMIT_UDP == true ]]; then
echo " - Limiting UDP Traffic:"
echo -n " - Allowing outgoing DNS requests "
if [[ $DNSCrypt_Active == true ]]; then
echo "to DNSCrypt server on local Port 5533 and on Port 53 as fallback"
iptables -A OUTPUT -o eth0 -p udp --dport 53 -j ACCEPT
iptables -A OUTPUT -o eth0 -p udp ! --dport 5533 -j DROP
else
echo "on Port 53"
iptables -A OUTPUT -o eth0 -p udp ! --dport 53 -j DROP
fi
echo " - Dropping all other outgoing UDP traffic"
fi
echo ""
}
setup_redsocks() {
echo "Redsocks:"
if [ -z "$PROXY_SERVER" ] || [ -z "$PROXY_PORT" ]; then
echo ""
echo "Error: PROXY_SERVER and PROXY_PORT must be set."
exit 1
fi
echo " - Generating Redsocks configuration"
envsubst < /opt/redsocks/redsocks.conf.template > /opt/redsocks/redsocks.conf
# Remove both login and password if either is unset
if [ -z "$LOGIN" ] || [ -z "$PASSWORD" ]; then
sed -i '/login = /d' /opt/redsocks/redsocks.conf
sed -i '/password = /d' /opt/redsocks/redsocks.conf
fi
echo " - Redsocks configuration (sensitive data redacted):"
sed -e 's/\(login = \).*/\1***;/' -e 's/\(password = \).*/\1***;/' /opt/redsocks/redsocks.conf | sed '$d' | sed 's/^/ /'
su -s /bin/sh -c "touch /opt/redsocks/redsocks.log" redsocks
echo " - Starting redsocks"
su -s /bin/sh -c "/opt/redsocks/redsocks -c /opt/redsocks/redsocks.conf -p /opt/redsocks/redsocks.pid" redsocks &
chmod 744 /opt/redsocks/*.*
echo ""
}
echo "============= Initial Setup ============="
echo ""
setup_dnscrypt
setup_redsocks
configure_iptables
echo "================== Log =================="
echo ""
exec 3</opt/redsocks/redsocks.log
if [[ $DNSCrypt_Active == true ]]; then
exec 4</opt/dnscrypt/dnscrypt.log
fi
while true; do
if read -r line <&3; then
timestamp=$(echo "$line" | awk '{print $1}')
log_level=$(echo "$line" | awk '{print $2}' | tr 'a-z' 'A-Z')
formatted_date=$(date -d @$timestamp '+[%Y-%m-%d %H:%M:%S]')
padded_log_level="[$log_level]"
padded_log_level=$(printf "%-8s" "$padded_log_level") # Pad to ensure total width of 9 characters (6 chars + 3 spaces)
echo "[Redsocks] $formatted_date $padded_log_level ${line#* * }"
fi
if [[ $DNSCrypt_Active == true ]]; then
if read -r line <&4; then
echo "[DNSCrypt] $line"
fi
fi
sleep 0.1
done