antizapret-pac-generator-light/generate-pac.sh

227 lines
8.0 KiB
Bash
Raw Permalink Normal View History

2019-12-01 04:58:25 +03:00
#!/bin/bash
set -e
source config/config.sh
echo -n > "$PACFILE"
python3 scripts/topsequences.py result/hostlist_zones.txt temp/replace-common-sequences.awk temp/pacpatterns.js
2019-12-01 04:58:25 +03:00
# .pac header
echo "// ProstoVPN.AntiZapret PAC-host File
// Generated on $(date), by https://bitbucket.org/anticensority/antizapret-pac-generator-light/
// THIS FILE IS NEITHER OBFUSCATED NOR ENCRYPTED, IT'S COMPRESSED TO COMPLY WITH BROWSER PAC FILE SIZE LIMITS.
//
2019-12-01 04:58:25 +03:00
// NOTE 1: Proxy.pac file content varies on User-Agent HTTP header.
// NOTE 2: Some badly behaving User-Agents are banned, they get empty response.
// NOTE 3: Do not request PAC file faster than once a minute, rate limiting is applied.
// NOTE 4: Do not use the proxy servers outside of this file.
" >> "$PACFILE"
awk -f scripts/generate-pac-domains.awk result/hostlist_zones.txt >> "$PACFILE"
2024-03-24 14:32:07 +03:00
awk -v lzp=1 -f scripts/generate-pac-domains.awk result/hostlist_zones.txt > temp/domains-oneline.txt
python3 scripts/lzp.py temp/domains-oneline.txt temp/domains-oneline-data.txt temp/domains-oneline-mask.txt temp/domains-oneline-pac.js
2019-12-01 04:58:25 +03:00
# Collapse IP list
scripts/collapse_blockedbyip_noid2971.py
echo "// This variable now excludes IP addresses blocked by 33a-5536/2019 (since 17.05.2020) and 33-4/2018 (since 14.12.2020)" >> "$PACFILE"
2019-12-01 04:58:25 +03:00
sort -Vu temp/include-ips.txt result/iplist_blockedbyip_noid2971_collapsed.txt | \
grep -v -F -x -f temp/exclude-ips.txt | awk -f scripts/generate-pac-ipaddrs.awk >> "$PACFILE"
SPECIAL="$(cat result/iplist_special_range.txt | xargs -n1 sipcalc | \
awk 'BEGIN {notfirst=0} /Network address/ {n=$4} /Network mask \(bits\)/ {if (notfirst) {printf ","} printf "[\"%s\", %s]", n, $5; notfirst=1;}')"
PATTERNS=$(cat temp/pacpatterns.js)
2024-03-24 14:32:07 +03:00
PATTERNS_LZP=$(cat temp/domains-oneline-pac.js)
DOMAINS_LZP=$(cat temp/domains-oneline-data.txt)
MASK_LZP=$(cat temp/domains-oneline-mask.txt)
2019-12-01 04:58:25 +03:00
echo "var special = [
$SPECIAL
];
2024-03-24 14:32:07 +03:00
// domain name data encoded with LZP, without mask data
var domains_lzp = \"$DOMAINS_LZP\";
// LZP mask data, b64+patternreplace
var mask_lzp = \"$MASK_LZP\";
2019-12-01 04:58:25 +03:00
var az_initialized = 0;
// CIDR to netmask, for special
function nmfc(b) {var m=[];for(var i=0;i<4;i++) {var n=Math.min(b,8); m.push(256-Math.pow(2, 8-n)); b-=n;} return m.join('.');}
// replace repeating sequences in domain
2024-03-24 14:32:07 +03:00
function patternreplace(s, lzpmask) {
var patterns = $PATTERNS;
2024-03-24 14:32:07 +03:00
if (lzpmask)
var patterns = $PATTERNS_LZP;
for (pattern in patterns) {
s = s.split(patterns[pattern]).join(pattern);
}
return s;
}
2024-03-24 14:32:07 +03:00
// LZP as in PPP, different hash func
var TABLE_LEN_BITS = 18;
var HASH_MASK = (1 << TABLE_LEN_BITS) - 1;
var table = Array(1 << TABLE_LEN_BITS);
var hash = 0;
function unlzp(d, m, lim) {
var mask = 0, maskpos = 0, dpos = 0, out = Array(8), outpos = 0, outfinal = '';
2024-03-24 14:32:07 +03:00
for (;;) {
2024-03-24 18:50:40 +03:00
mask = m.charAt(maskpos++);
2024-03-24 14:32:07 +03:00
if (!mask)
break
mask = mask.charCodeAt(0);
outpos = 0;
for (var i = 0; i < 8; i++) {
if (mask & (1 << i)) {
c = table[hash];
} else {
2024-03-24 18:50:40 +03:00
c = d.charAt(dpos++);
2024-03-24 14:32:07 +03:00
if (!c)
break
c = c.charCodeAt(0);
table[hash] = c;
}
out[outpos++] = String.fromCharCode(c);
hash = ( (hash << 7) ^ c ) & HASH_MASK
}
if (outpos == 8)
outfinal += out.join('');
if (outfinal.length >= lim) break;
2024-03-24 14:32:07 +03:00
}
if (outpos < 8)
outfinal += out.slice(0, outpos).join('');
return [outfinal, dpos, maskpos];
2024-03-24 14:32:07 +03:00
}
function a2b(a) {
var b, c, d, e = {}, f = 0, g = 0, h = \"\", i = String.fromCharCode, j = a.length;
for (b = 0; 64 > b; b++) e[\"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\".charAt(b)] = b;
for (c = 0; j > c; c++) for (b = e[a.charAt(c)], f = (f << 6) + b, g += 6; g >= 8; ) ((d = 255 & f >>> (g -= 8)) || j - 2 > c) && (h += i(d));
return h;
}
2019-12-01 04:58:25 +03:00
function FindProxyForURL(url, host) {" >> "$PACFILE"
echo " if (domains.length < 10) return \"DIRECT\"; // list is broken
if (!('indexOf' in Array.prototype)) {
Array.prototype.indexOf= function(find, i /*opt*/) {
if (i===undefined) i= 0;
if (i<0) i+= this.length;
if (i<0) i= 0;
for (var n= this.length; i<n; i++)
if (i in this && this[i]===find)
return i;
return -1;
};
}
if (!az_initialized) {
var prev_ipval = 0;
var cur_ipval = 0;
for (var i = 0; i < d_ipaddr.length; i++) {
cur_ipval = parseInt(d_ipaddr[i], 36) + prev_ipval;
d_ipaddr[i] = cur_ipval;
prev_ipval = cur_ipval;
}
for (var i = 0; i < special.length; i++) {
special[i][1] = nmfc(special[i][1]);
}
mask_lzp = a2b(patternreplace(mask_lzp, true));
2024-03-24 14:32:07 +03:00
var leftover = '';
2024-03-24 14:32:07 +03:00
for (dmn in domains) {
for (dcnt in domains[dmn]) {
dmnl = domains[dmn][dcnt];
if (leftover.length < dmnl) {
var reqd = (dmnl<=8192 ? 8192 : dmnl);
var u = unlzp(domains_lzp, mask_lzp, reqd);
domains_lzp = domains_lzp.slice(u[1]);
mask_lzp = mask_lzp.slice(u[2]);
2024-03-26 15:13:32 +03:00
leftover += u[0];
u = 0;
//if (reqd > leftover.length) alert('requested ' + reqd + ' got ' + leftover.length);
}
2024-03-26 15:13:32 +03:00
domains[dmn][dcnt] = leftover.slice(0, dmnl);
leftover = leftover.slice(dmnl);
//if (domains[dmn][dcnt].length != dmnl) alert('ERR 1');
2024-03-24 14:32:07 +03:00
}
}
table = 0;
2019-12-01 04:58:25 +03:00
az_initialized = 1;
}
var shost;
2024-06-22 16:52:02 +03:00
if (/\.(ru|co|cu|com|info|net|org|gov|edu|int|mil|biz|pp|ne|msk|spb|nnov|od|in|ho|cc|dn|i|tut|v|dp|sl|ddns|dyndns|livejournal|herokuapp|azurewebsites|cloudfront|ucoz|3dn|nov|linode|sl-reverse|kiev|beget|kirov|akadns|scaleway|fastly|hldns|appspot|my1|hwcdn|deviantart|wixmp|wix|netdna-ssl|brightcove|berlogovo|edgecastcdn|trafficmanager|pximg|github|hopto|u-stream|google|keenetic|eu|googleusercontent|3nx|itch|notion|maryno|vercel|pythonanywhere|force|tilda|ggpht|iboards|mybb2|h1n|bdsmlr|narod|sb-cd|4chan|nichost|cv)\.[^.]+$/.test(host))
shost = host.replace(/(.+)\.([^.]+\.[^.]+\.[^.]+$)/, \"\$2\");
2019-12-01 04:58:25 +03:00
else
shost = host.replace(/(.+)\.([^.]+\.[^.]+$)/, \"\$2\");
// remove leading www
shost = shost.replace(/^www\.(.+)/, \"\$1\");" >> "$PACFILE"
cp "$PACFILE" "$PACFILE_NOSSL"
echo "
2024-03-24 19:23:17 +03:00
fbtw = ['twitter.com', 'twimg.com', 't.co', 'x.com',
'facebook.com', 'fbcdn.net',
'instagram.com', 'cdninstagram.com',
'fb.com', 'messenger.com',
'yt3.ggpht.com'
];
if (fbtw.indexOf(shost) !== -1) {
return \"HTTPS ${PACFBTWHOST}; DIRECT\";
}" >> "$PACFILE"
echo "
2019-12-01 04:58:25 +03:00
var curdomain = shost.match(/(.*)\\.([^.]+\$)/);
if (!curdomain || !curdomain[2]) {return \"DIRECT\";}
var curhost = curdomain[1];
var curzone = curdomain[2];
2024-03-24 14:32:07 +03:00
curhost = patternreplace(curhost, false);
2019-12-01 04:58:25 +03:00
var curarr = []; // dummy empty array
if (domains.hasOwnProperty(curzone) && domains[curzone].hasOwnProperty(curhost.length)) {
if (typeof domains[curzone][curhost.length] === 'string') {
var regex = new RegExp('.{' + curhost.length.toString() + '}', 'g');
domains[curzone][curhost.length] = domains[curzone][curhost.length].match(regex);
}
2019-12-01 04:58:25 +03:00
var curarr = domains[curzone][curhost.length];
}
var oip = false;
if (! host.match(/^[0-9a-fA-F:.]*$/)) {
// Do not resolve IPv4/v6 addresses to prevent slowdown
oip = dnsResolve(host);
}
2019-12-01 04:58:25 +03:00
var iphex = \"\";
if (oip) {
iphex = oip.toString().split(\".\");
iphex = parseInt(iphex[3]) + parseInt(iphex[2])*256 + parseInt(iphex[1])*65536 + parseInt(iphex[0])*16777216;
}
var yip = 0;
var rip = 0;
2019-12-01 04:58:25 +03:00
if (iphex && d_ipaddr.indexOf(iphex) !== -1) {yip = 1;}
for (var i = 0; i < special.length; i++) {
if (isInNet(oip, special[i][0], special[i][1])) {rip = 1; break;}
}
if (yip === 1 || rip === 1 || curarr.indexOf(curhost) !== -1) {
2019-12-01 04:58:25 +03:00
// WARNING! WARNING! WARNING!
// You should NOT use these proxy servers outside of PAC file!
// DO NOT enter it manually in any program!
// By doing this, you harm the service!" | tee -a "$PACFILE" "$PACFILE_NOSSL" >/dev/null
2019-12-01 04:58:25 +03:00
echo " return \"HTTPS ${PACHTTPSHOST}; PROXY ${PACPROXYHOST}; DIRECT\";" >> "$PACFILE"
echo " return \"PROXY ${PACPROXYHOST}; DIRECT\";" >> "$PACFILE_NOSSL"
echo " }
return \"DIRECT\";
}" | tee -a "$PACFILE" "$PACFILE_NOSSL" >/dev/null