
The current default is to use SOCKS4a when socks is specified as protocol in $ALL_PROXY. However, not all socks servers support SOCKS4a. By allowing socks4 as an additional protocol, this script will happily work with SOCKS4 only servers. (From OE-Core rev: da9ddf48ed4a13cdc47649e22ab6ef7e36e01fdf) Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
3.1 KiB
Executable File
#!/bin/bash
oe-git-proxy is a simple tool to be via GIT_PROXY_COMMAND. It uses socat
to make SOCKS5 or HTTPS proxy connections. It uses ALL_PROXY to determine the
proxy server, protocol, and port. It uses NO_PROXY to skip using the proxy for
a comma delimited list of hosts, host globs (*.example.com), IPs, or CIDR
masks (192.168.1.0/24). It is known to work with both bash and dash shells.
Example ALL_PROXY values:
ALL_PROXY=socks://socks.example.com:1080
ALL_PROXY=https://proxy.example.com:8080
Copyright (c) 2013, Intel Corporation.
All rights reserved.
AUTHORS
Darren Hart dvhart@linux.intel.com
Locate the netcat binary
SOCAT=$(which socat 2>/dev/null) if [ $? -ne 0 ]; then echo "ERROR: socat binary not in PATH" 1>&2 exit 1 fi METHOD=""
Test for a valid IPV4 quad with optional bitmask
valid_ipv4() { echo $1 | egrep -q "^([1-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(.([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])){3}(/(3[0-2]|[1-2]?[0-9]))?$" return $? }
Convert an IPV4 address into a 32bit integer
ipv4_val() { IP="$1" SHIFT=24 VAL=0 for B in ${IP//./ }; do VAL=$(($VAL+$(($B<<$SHIFT)))) SHIFT=$(($SHIFT-8)) done echo "$VAL" }
Determine if two IPs are equivalent, or if the CIDR contains the IP
match_ipv4() { CIDR=$1 IP=$2
if [ -z "${IP%%$CIDR}" ]; then
return 0
fi
# Determine the mask bitlength
BITS=${CIDR##*/}
[ "$BITS" != "$CIDR" ] || BITS=32
if [ -z "$BITS" ]; then
return 1
fi
IPVAL=$(ipv4_val $IP)
IP2VAL=$(ipv4_val ${CIDR%%/*})
# OR in the unmasked bits
for i in $(seq 0 $((32-$BITS))); do
IP2VAL=$(($IP2VAL|$((1<<$i))))
IPVAL=$(($IPVAL|$((1<<$i))))
done
if [ $IPVAL -eq $IP2VAL ]; then
return 0
fi
return 1
}
Test to see if GLOB matches HOST
match_host() { HOST=$1 GLOB=$2
if [ -z "${HOST%%$GLOB}" ]; then
return 0
fi
# Match by netmask
if valid_ipv4 $GLOB; then
HOST_IP=$(gethostip -d $HOST)
if valid_ipv4 $HOST_IP; then
match_ipv4 $GLOB $HOST_IP
if [ $? -eq 0 ]; then
return 0
fi
fi
fi
return 1
}
If no proxy is set or needed, just connect directly
METHOD="TCP:$1:$2"
if [ -z "$ALL_PROXY" ]; then exec $SOCAT STDIO $METHOD fi
Connect directly to hosts in NO_PROXY
for H in ${NO_PROXY//,/ }; do if match_host $1 $H; then exec $SOCAT STDIO $METHOD fi done
Proxy is necessary, determine protocol, server, and port
PROTO=$(echo $ALL_PROXY | sed -e 's/[^:]*
://./\1/')
PROXY=$(echo $ALL_PROXY | sed -e 's/.://[^:]*
.*/\1/')
For backwards compatibility, this allows the port number to be followed by /?
in addition to the customary optional /
PORT=$(echo $ALL_PROXY | sed -e 's/.:([0-9])(/??)?$/\1/') if [ "$PORT" = "$ALL_PROXY" ]; then PORT="" fi
if [ "$PROTO" = "socks" ] || [ "$PROTO" = "socks4a" ]; then if [ -z "$PORT" ]; then PORT="1080" fi METHOD="SOCKS4A:$PROXY:$1:$2,socksport=$PORT" elif [ "$PROTO" = "socks4" ]; then if [ -z "$PORT" ]; then PORT="1080" fi METHOD="SOCKS4:$PROXY:$1:$2,socksport=$PORT" else # Assume PROXY (http, https, etc) if [ -z "$PORT" ]; then PORT="8080" fi METHOD="PROXY:$PROXY:$1:$2,proxyport=$PORT" fi
exec $SOCAT STDIO $METHOD