Commit graph

56 commits

Author SHA1 Message Date
Stan Grishin
30aefce999 https-dns-proxy: 2022-10-15-11 update
* config file update
* introduce boot() function

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-02-22 20:36:06 +00:00
Stan Grishin
75ac50ca89 https-dns-proxy: fix restart
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-10 05:32:20 +00:00
Stan Grishin
ee37d0ec86 https-dns-proxy: add mdns service records
* add mdns records for started instances
* Makefile: use $(PKG_VERSION) as a value for PKG_SOURCE_DATE instead of
  hard-coding it

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-07 21:00:08 +00:00
Stan Grishin
e6d746a0ba https-dns-proxy: improve performance on restart
* instead of doing stop/start which involves restarting dnsmasq twice,
  kill the existing service instances on restart instead

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-11-28 21:13:40 +00:00
Stan Grishin
0765fb0790 https-dns-proxy: update Makefile package descrition
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-11-22 01:14:13 +00:00
Stan Grishin
6bd055284c https-dns-proxy: rename options
* rename wan6_trigger to procd_trigger_wan6
* rename update_dnsmasq_config to dnsmasq_config_update
* add the uci-defaults file to run sed on config file
* update Makefile to include uci-defaults file

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-25 21:36:15 +00:00
Stan Grishin
61ca2f4d16 https-dns-proxy: add version information to binary
* add patches/020-cmakelists-add-version.patch (thanks @baranyaib90)
  to add version information to the binary and fix https://github.com/aarond10/https_dns_proxy/issues/149
* modify Makefile to add version information for the binary
* rename patches/010-fix-cmakelists.patch for better readability
* revert back to service restart in WAN/WAN6 trigger
* update test.sh to test both init script and binary versions

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-24 21:46:51 +00:00
Stan Grishin
fbc63cb9f6 https-dns-proxy: bugfix: restore empty server; misc improvements
* bugfix: properly restore empty server config for dnsmasq (to
  address issue brought up in https://github.com/stangri/source.openwrt.melmac.net/pull/162)
* better handling of non-existant wan/wan6 interface for triggers
* add resolver url to ubus data for future-proofing WebUI js move

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-24 04:19:36 +00:00
Stan Grishin
425cef2f8c https-dns-proxy: bugfix: prevent creation of empty interface trigger
* When $wan/$wan6 are empty but double-quoted, it leads to creation
  of an interface trigger with empty interface

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-21 11:57:29 +00:00
Stan Grishin
92a45c3985 https-dns-proxy: bugfix: remove canary domains
* bugfix: canary domains persistence (as described in
  https://forum.openwrt.org/t/https-dns-proxy-canary-domain-persistance/139967)
* minor: remove global variables and make them local in
  service_start/service_stop/service_triggers
* minor: split DEFAULT_BOOTSTRAP into BOOTSTRAP_CF and BOOTSTRAP_GOOGLE for
  better code readability

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-20 02:32:05 +00:00
Stan Grishin
409ce0f14f https-dns-proxy: bugfix: remove wan6 from procd triggers
* fixes https://github.com/openwrt/packages/issues/19631

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-19 09:02:18 +00:00
Stan Grishin
bca5d0ed8e https-dns-proxy: upstream bugfix for ca_info
* upstream bugfix: Add a forgotten 'NULL' initialize for ca_info
  if not manually set
* make init script PKG_VERSION variable readonly so that a
  shellcheck excettion can be removed
* add procd interface trigger to 'wan6' if IPv6 wan interface name
  cannot be obtained on start

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-16 12:06:55 +00:00
Stan Grishin
796a3dda80 https-dns-proxy: update to 2022-08-12-1
* update to upstream version 2022-08-12
* add ca_certs_file option for CA certs file for curl
* add procd_add_interface_trigger for wan6 (hopefully fixes
  https://github.com/openwrt/packages/issues/19531)

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-07 06:29:40 +00:00
Stan Grishin
4ff71d8e4c https-dns-proxy: add settings for canary domains
* add setting to enable/disable blocking access to iCloud Private Relay resolvers
* add setting to enable/disable blocking access to Mozilla resolvers
* rename variables loaded from config in the init script

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-04 22:08:00 +00:00
Stan Grishin
f99ada410f https-dns-proxy: bugfix: prevent canary domains duplicates
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-10-04 21:25:42 +00:00
Stan Grishin
749b03ffbf https-dns-proxy: uci wrappers & iCloud canary domains
* switch to using uci wrappers instead of direct uci calls
* add support for iCloud canary domains
  https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-09-30 00:00:01 +00:00
Stan Grishin
5347139ee7 https-dns-proxy: 2021-11-22-3: add support for Canary Domains
Fixes https://github.com/stangri/source.openwrt.melmac.net/issues/155.
Background: https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-04-25 01:13:48 +00:00
Stan Grishin
88265c4fb9 https-dns-proxy: init script refactoring
* consolidate dnsmasq config manipulation into one function
* more elegant code for PROCD data processing (Thanks @jow-!)

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-02-06 06:00:03 +00:00
Stan Grishin
1e5e7ce469 https-dns-proxy: update to 2021-11-22-1
* update to 2021-11-22 upstream source
* update patch file
* update init script to preserve manual entries
	(fixes https://github.com/stangri/source.openwrt.melmac.net/issues/149)
* update init script service_triggers

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-01-31 22:15:04 +00:00
Stan Grishin
f8d16338da https-dns-proxy: update to 2021-09-27
* update to [2021-09-27](da2501f542)
* fixes https://github.com/aarond10/https_dns_proxy/issues/125
* restart instead of reload on interface hotplug
* fixes https://github.com/openwrt/packages/issues/16794
* produce output and log entries on service start/stop
* prevent unnecessary dnsmasq restarts if service has previously updated dnsmasq settings
* allow both named and typed dnsmasq instance settings to be updated
* update 010-fix-cmakelists patch file

Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-10-14 04:23:17 +00:00
Etienne Champetier
374e1dd56e https-dns-proxy: patch CMakeList.txt to use OpenWrt CFLAGS
This fixes compilation issues with ASLR PIE enabled

We were compiling with '-g -DDEBUG'

https-dns-proxy_2021-07-29-*_arm_cortex-a9_vfpv3-d16.ipk
shrink from 19514 to 19095

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
2021-08-20 15:45:44 -04:00
Stan Grishin
062e8f4fb3 https-dns-proxy: update to 2021-07-29-01
* update binary to the latest commit (2021-07-29) to fix #16222 and #16239
* add hotplug.d/iface file and update Makefile to install it
* use Cloudflare's and Google's bootstrap DNS if bootstrap DNS is missing
* minor improvements in append_bool function
* add append_counter function for verbosity setting
* add append_bootstrap function (and supporting functions) to parse/sanitize bootstrap setting
* move firewall array from 'main' instance to the first proxy instance
* delete useless 'main' instace

Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-07-30 13:10:54 +00:00
Rosen Penev
2e654b19f3 treewide: back to cmake.mk
Ninja was merged to base and therefore we can now use normal cmake.mk

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-06-12 21:05:01 -07:00
Stan Grishin
7ed7e701f6 https-dns-proxy: update to 2021-06-03-1
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-06-05 06:52:41 +02:00
Stan Grishin
12b4ab3491 https-dns-proxy: 2021-05-14 bugfix: fallback to HTTP/1 by default
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-06-02 04:32:11 +00:00
Stan Grishin
cf75ad2e6c https-dns-proxy: update to 2021-05-14-1; bugfixes for dhcp server backup
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-05-29 20:12:08 +00:00
Stan Grishin
cd11d8821f https-dns-proxy: bugfix: race condition with dnsmasq
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-04-10 16:58:51 -10:00
Stan Grishin
84fc5dfad4 https-dns-proxy: bugfix: correct PROCD firewall object
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-03-25 16:46:01 -07:00
Stan Grishin
35461a3c5d https-dns-proxy: support for additional Force DNS ports
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-03-22 07:28:50 +00:00
Stan Grishin
c28a526fe4 https-dns-proxy: support for force DNS/DNS hijacking
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-02-10 05:59:10 +00:00
Stan Grishin
379d97b70c https-dns-proxy: bugfix: high CPU utilization
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-01-18 15:27:42 +00:00
Stan Grishin
e948d41622 https-dns-proxy: update to 2020-11-25: add HTTP auth and DSCP codepoint support
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-01-06 11:48:07 -10:00
Stan Grishin
822939f537 https-dns-proxy: update binary to 2020-08-21
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-12-09 23:32:19 -10:00
Stan Grishin
d2f4454fe6 https-dns-proxy: re-add conffiles and add description to Makefile
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-06-26 03:09:26 +00:00
Stan Grishin
e039bd4da7 https-dns-proxy: bugfix: remove eDNS support
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-06-25 19:40:38 +00:00
Huangbin Zhan
0ec746ccb6 treewide: add conffiles
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2020-05-09 06:06:43 +08:00
Stan Grishin
6fd3476d9e https-dns-proxy: bugfix: memory leak
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-04-11 00:25:11 +00:00
Stan Grishin
de572880c4 https-dns-proxy: support for dnsmasq noresolv option
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-03-20 21:22:29 +00:00
Gerard Ryan
3d9b512685 https-dns-proxy: Update for reverted commit
* Reapplied daf538d8c6
* Updated README
* Replaced the ipv4_resolvers option with a ipv6_resolvers_only option

Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2020-03-12 19:03:06 +10:00
Stan Grishin
03606eddee https-dns-proxy: fix deleting server items, configurable dnsmasq settings change
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-01-25 21:14:38 -07:00
Gerard Ryan
daf538d8c6 https_dns_proxy: Added optional ipv4 resolvers
* Added optional ipv4 resolvers UCI config option
* Added logging to logd
* Refactored verbosity UCI config option
* Filtered out any address from being added to dnsmasq

Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2019-12-18 19:36:23 +10:00
Stan Grishin
da30fe7e90 https-dns-proxy: switch to https-dns-proxy package name
Signed-off-by: Stan Grishin <stangri@melmac.net>
2019-12-17 14:48:51 -07:00
Kevin Darbyshire-Bryant
0b30945de0 net/https-dns-proxy: Update to 2019-10-09
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2019-11-21 21:05:44 +00:00
Stan Grishin
338dc52e5c https-dns-proxy: implement dnsmasq integration
Signed-off-by: Stan Grishin <stangri@melmac.net>
2019-10-31 12:55:08 -07:00
Eneas U de Queiroz
5db7867ba7
https-dns-proxy: avoid picking up host clang-tidy
Otherwise compilation fails when clang-tidy is found in the host:

-- clang-tidy found: /usr/lib/llvm/7/bin/clang-tidy

error: unknown argument: '-fhonour-copts' [clang-diagnostic-error]
error: unknown argument:'-iremap[...]:https_dns_proxy-2018-04-23'
[clang-diagnostic-error]

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2019-08-14 09:21:26 -03:00
Stan Grishin
ccb5de4436 https-dns-proxy: new init script and config files
Signed-off-by: Stan Grishin <stangri@melmac.net>
2018-09-02 18:35:45 -07:00
Jemy Zhang
f74f517b9a net/https-dns-proxy: Update to 2018-04-23
+ add option for resolver_url_prefix

Signed-off-by: Jemy Zhang <jemy.zhang@gmail.com>
2018-04-26 18:19:54 +08:00
Jemy Zhang
1831d97cf1 net/https-dns-proxy: Update to 2018-01-28
+ initial DNS resolve via proxy
+ option of subnet address
+ option of proxy server

Signed-off-by: Jemy Zhang <jemy.zhang@gmail.com>
2018-03-07 17:26:56 +08:00
Darren Tucker
c962ab62f8 net/https-dns-proxy: Update to 2018-01-24.
Add dependency on ca-bundle without which the HTTPS fetches fail.
Add "-x" option to force HTTP/1.1 instead of HTTP/2.0
Add a workaround for bug in libcurl <7.530 that prevents it from
working at all when built with mbedtls.

Signed-off-by: Darren Tucker <dtucker@dtucker.net>
Acked-by: Aaron Drew <aarond10@gmail.com>
2018-01-26 10:04:02 +11:00
Etienne Champetier
4006865ae8 treewide: run "make check FIXUP=1"
fix Makefile chmod (644)
replace MD5SUM with HASH
add PKG_MIRROR_HASH when PKG_SOURCE_PROTO:=git

(PKG_SOURCE_PROTO:=svn tarballs are not reproducible for now)

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
2017-08-29 21:41:14 -07:00