1
1
mirror of https://github.com/dnscrypt/dnscrypt-server-docker synced 2024-11-22 19:42:03 +01:00
dnscrypt-server-docker/entrypoint.sh

121 lines
3.3 KiB
Bash
Raw Normal View History

#! /usr/bin/env bash
2015-07-06 01:39:54 +02:00
set -e
action="$1"
KEYS_DIR="/opt/dnscrypt-wrapper/etc/keys"
2018-01-22 20:23:54 +01:00
# -N provider-name -E external-ip-address:port
2015-07-06 01:39:54 +02:00
init() {
if [ "$(is_initialized)" = yes ]; then
2015-07-06 01:39:54 +02:00
start
exit $?
fi
2018-01-22 20:23:54 +01:00
while getopts "h?N:E:" opt; do
2015-07-06 01:39:54 +02:00
case "$opt" in
h | \?) usage ;;
2015-07-06 01:39:54 +02:00
N) provider_name=$(echo "$OPTARG" | sed -e 's/^[ \t]*//' | tr A-Z a-z) ;;
2018-01-22 20:23:54 +01:00
E) ext_address=$(echo "$OPTARG" | sed -e 's/^[ \t]*//' | tr A-Z a-z) ;;
2015-07-06 01:39:54 +02:00
esac
done
[ -z "$provider_name" ] && usage
case "$provider_name" in
.*) usage ;;
2.dnscrypt-cert.*) ;;
*) provider_name="2.dnscrypt-cert.${provider_name}" ;;
2015-07-06 01:39:54 +02:00
esac
2018-01-22 18:21:50 +01:00
2018-01-22 20:23:54 +01:00
[ -z "$ext_address" ] && usage
case "$ext_address" in
2018-01-22 18:21:50 +01:00
.*) usage ;;
0.*)
echo "Do not use 0.0.0.0, use an actual external IP address" >&2
exit 1
;;
2018-01-22 18:21:50 +01:00
esac
2018-01-22 20:23:54 +01:00
2018-01-22 18:21:50 +01:00
echo "Provider name: [$provider_name]"
2015-07-06 01:39:54 +02:00
cd "$KEYS_DIR"
2018-01-22 18:21:50 +01:00
/opt/dnscrypt-wrapper/sbin/dnscrypt-wrapper \
2018-01-31 15:17:12 +01:00
--gen-provider-keypair --nolog --dnssec --nofilter \
--provider-name="$provider_name" --ext-address="$ext_address" |
2015-07-06 01:39:54 +02:00
tee "${KEYS_DIR}/provider-info.txt"
chmod 640 "${KEYS_DIR}/secret.key"
chmod 644 "${KEYS_DIR}/public.key"
chown root:_dnscrypt-signer "${KEYS_DIR}/public.key" "${KEYS_DIR}/secret.key"
echo "$provider_name" > "${KEYS_DIR}/provider_name"
chmod 644 "${KEYS_DIR}/provider_name"
hexdump -ve '1/1 "%.2x"' < "${KEYS_DIR}/public.key" > "${KEYS_DIR}/public.key.txt"
chmod 644 "${KEYS_DIR}/public.key.txt"
echo
echo -----------------------------------------------------------------------
echo
echo "Congratulations! The container has been properly initialized."
echo "Take a look up above at the way dnscrypt-proxy has to be configured in order"
echo "to connect to your resolver. Then, start the container with the default command."
}
provider_info() {
ensure_initialized
echo "Provider name:"
cat "${KEYS_DIR}/provider_name"
echo
echo "Provider public key:"
cat "${KEYS_DIR}/public.key.txt"
echo
}
is_initialized() {
if [ ! -f "${KEYS_DIR}/public.key" ] && [ ! -f "${KEYS_DIR}/secret.key" ] && [ ! -f "${KEYS_DIR}/provider_name" ]; then
2015-07-06 01:39:54 +02:00
echo no
else
echo yes
fi
}
ensure_initialized() {
if [ "$(is_initialized)" = no ]; then
2018-01-22 20:23:54 +01:00
echo "Please provide an initial configuration (init -N <provider_name> -E <external IP>)" >&2
2015-07-06 01:39:54 +02:00
exit 1
fi
}
start() {
ensure_initialized
echo "Starting DNSCrypt service for provider: "
cat "${KEYS_DIR}/provider_name"
2017-04-19 10:56:02 +02:00
exec /sbin/start_runit
2015-07-06 01:39:54 +02:00
}
usage() {
cat << EOT
Commands
========
2018-01-22 20:23:54 +01:00
* init -N <provider_name> -E <external ip>:<port>
2018-01-22 18:21:50 +01:00
initialize the container for a server accessible at ip <external ip> on port
<port>, for a provider named <provider_name>. This is required only once.
2015-07-06 01:39:54 +02:00
* start (default command): start the resolver and the dnscrypt server proxy.
Ports 443/udp and 443/tcp have to be publicly exposed.
2018-01-23 00:31:12 +01:00
* provider-info: prints the provider name and provider public key.
2015-07-06 01:39:54 +02:00
This container has a single volume that you might want to securely keep a
backup of: /opt/dnscrypt-wrapper/etc/keys
EOT
exit 1
}
case "$action" in
start) start ;;
init)
shift
init $*
;;
2015-07-06 01:39:54 +02:00
provider-info) provider_info ;;
*) usage ;;
esac