forked from cokebar/gfwlist2dnsmasq_python
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
This version do not write ipset lines
- Loading branch information
Showing
1 changed file
with
93 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,93 @@ | ||
#!/usr/bin/env python | ||
#coding=utf-8 | ||
# | ||
# Generate a list of dnsmasq rules with ipset for gfwlist | ||
# | ||
# Copyright (C) 2014 http://www.shuyz.com | ||
# Ref https://code.google.com/p/autoproxy-gfwlist/wiki/Rules | ||
|
||
import urllib2 | ||
import re | ||
import os | ||
import datetime | ||
import base64 | ||
import shutil | ||
|
||
mydnsip = '127.0.0.1' | ||
mydnsport = '5300' | ||
ipsetname = 'gfwlist' | ||
# Extra Domain; | ||
EX_DOMAIN=[ \ | ||
'.google.com', \ | ||
'.google.com.hk', \ | ||
'.google.com.tw', \ | ||
'.google.com.sg', \ | ||
'.google.co.jp', \ | ||
'.blogspot.com', \ | ||
'.blogspot.sg', \ | ||
'.blogspot.hk', \ | ||
'.blogspot.jp', \ | ||
'.gvt1.com', \ | ||
'.gvt2.com', \ | ||
'.gvt3.com', \ | ||
'.1e100.net', \ | ||
'.blogspot.tw' \ | ||
] | ||
|
||
# the url of gfwlist | ||
baseurl = 'https://raw.githubusercontent.com/gfwlist/gfwlist/master/gfwlist.txt' | ||
# match comments/title/whitelist/ip address | ||
comment_pattern = '^\!|\[|^@@|^\d+\.\d+\.\d+\.\d+' | ||
domain_pattern = '([\w\-\_]+\.[\w\.\-\_]+)[\/\*]*' | ||
tmpfile = '/tmp/gfwlisttmp' | ||
# do not write to router internal flash directly | ||
#outfile = '/var/www/wordpress/wp-content/uploads/secured_files/foreign_list.conf' | ||
outfile = './foreign_list.conf' | ||
|
||
fs = file(outfile, 'w') | ||
fs.write('# gfw list ipset rules for dnsmasq\n') | ||
fs.write('# updated on ' + datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S") + '\n') | ||
fs.write('#\n') | ||
|
||
print 'fetching list...' | ||
content = urllib2.urlopen(baseurl, timeout=15).read().decode('base64') | ||
|
||
# write the decoded content to file then read line by line | ||
tfs = open(tmpfile, 'w') | ||
tfs.write(content) | ||
tfs.close() | ||
tfs = open(tmpfile, 'r') | ||
|
||
print 'page content fetched, analysis...' | ||
|
||
# remember all blocked domains, in case of duplicate records | ||
domainlist = [] | ||
|
||
|
||
for line in tfs.readlines(): | ||
if re.findall(comment_pattern, line): | ||
print 'this is a comment line: ' + line | ||
#fs.write('#' + line) | ||
else: | ||
domain = re.findall(domain_pattern, line) | ||
if domain: | ||
try: | ||
found = domainlist.index(domain[0]) | ||
print domain[0] + ' exists.' | ||
except ValueError: | ||
print 'saving ' + domain[0] | ||
domainlist.append(domain[0]) | ||
fs.write('server=/.%s/%s#%s\n'%(domain[0],mydnsip,mydnsport)) | ||
else: | ||
print 'no valid domain in this line: ' + line | ||
|
||
tfs.close() | ||
|
||
for each in EX_DOMAIN: | ||
fs.write('server=/%s/%s#%s\n'%(each,mydnsip,mydnsport)) | ||
|
||
print 'write extra domain done' | ||
|
||
fs.close(); | ||
|
||
print 'done!' |