build-reject-ip-list.ts 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103
  1. // @ts-check
  2. import path from 'path';
  3. import { createRuleset } from './lib/create-file';
  4. import { fetchRemoteTextByLine, readFileIntoProcessedArray } from './lib/fetch-text-by-line';
  5. import { task } from './trace';
  6. import { SHARED_DESCRIPTION } from './lib/constants';
  7. import { isProbablyIpv4, isProbablyIpv6 } from './lib/is-fast-ip';
  8. import { TTL, deserializeArray, fsFetchCache, serializeArray } from './lib/cache-filesystem';
  9. import { fetchAssets } from './lib/fetch-assets';
  10. import { processLine } from './lib/process-line';
  11. import { appendArrayInPlace } from './lib/append-array-in-place';
  12. const BOGUS_NXDOMAIN_URL = 'https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/bogus-nxdomain.china.conf';
  13. const getBogusNxDomainIPsPromise = fsFetchCache.apply(
  14. BOGUS_NXDOMAIN_URL,
  15. async () => {
  16. const result: string[] = [];
  17. for await (const line of await fetchRemoteTextByLine(BOGUS_NXDOMAIN_URL)) {
  18. if (line.startsWith('bogus-nxdomain=')) {
  19. const ip = line.slice(15).trim();
  20. if (isProbablyIpv4(ip)) {
  21. result.push(`IP-CIDR,${ip}/32,no-resolve`);
  22. } else if (isProbablyIpv6(ip)) {
  23. result.push(`IP-CIDR6,${ip}/128,no-resolve`);
  24. }
  25. }
  26. }
  27. return result;
  28. },
  29. {
  30. ttl: TTL.ONE_WEEK(),
  31. serializer: serializeArray,
  32. deserializer: deserializeArray
  33. }
  34. );
  35. const BOTNET_FILTER_URL = 'https://curbengh.github.io/botnet-filter/botnet-filter-dnscrypt-blocked-ips.txt';
  36. const BOTNET_FILTER_MIRROR_URL = [
  37. 'https://curbengh.github.io/malware-filter/botnet-filter-dnscrypt-blocked-ips.txt',
  38. 'https://malware-filter.gitlab.io/malware-filter/botnet-filter-dnscrypt-blocked-ips.txt',
  39. 'https://malware-filter.pages.dev/botnet-filter-dnscrypt-blocked-ips.txt'
  40. ];
  41. const getBotNetFilterIPsPromise = fsFetchCache.apply(
  42. BOTNET_FILTER_URL,
  43. async () => {
  44. const text = await fetchAssets(BOTNET_FILTER_URL, BOTNET_FILTER_MIRROR_URL);
  45. return text.split('\n').reduce<string[]>((acc, cur) => {
  46. const ip = processLine(cur);
  47. if (ip) {
  48. if (isProbablyIpv4(ip)) {
  49. acc.push(`IP-CIDR,${ip}/32,no-resolve`);
  50. } else if (isProbablyIpv6(ip)) {
  51. acc.push(`IP-CIDR6,${ip}/128,no-resolve`);
  52. }
  53. }
  54. return acc;
  55. }, []);
  56. },
  57. {
  58. ttl: TTL.TWLVE_HOURS(),
  59. serializer: serializeArray,
  60. deserializer: deserializeArray
  61. }
  62. );
  63. const localRejectIPSourcesPromise = readFileIntoProcessedArray(path.resolve(import.meta.dir, '../Source/ip/reject.conf'));
  64. export const buildRejectIPList = task(import.meta.path, async (span) => {
  65. const result = await localRejectIPSourcesPromise;
  66. const bogusNxDomainIPs = await span.traceChildPromise('get bogus nxdomain ips', getBogusNxDomainIPsPromise);
  67. const botNetIPs = await span.traceChildPromise('get botnet ips', getBotNetFilterIPsPromise);
  68. appendArrayInPlace(result, bogusNxDomainIPs);
  69. appendArrayInPlace(result, botNetIPs);
  70. const description = [
  71. ...SHARED_DESCRIPTION,
  72. '',
  73. 'This file contains known addresses that are hijacking NXDOMAIN results returned by DNS servers, and botnet controller IPs.',
  74. '',
  75. 'Data from:',
  76. ' - https://github.com/felixonmars/dnsmasq-china-list',
  77. ' - https://github.com/curbengh/botnet-filter'
  78. ];
  79. return createRuleset(
  80. span,
  81. 'Sukka\'s Ruleset - Anti Bogus Domain',
  82. description,
  83. new Date(),
  84. result,
  85. 'ruleset',
  86. path.resolve(import.meta.dir, '../List/ip/reject.conf'),
  87. path.resolve(import.meta.dir, '../Clash/ip/reject.txt')
  88. );
  89. });
  90. if (import.meta.main) {
  91. buildRejectIPList();
  92. }