1.0.2 • Published 2 years ago

@jojoxd/bypass v1.0.2

Weekly downloads
-
License
MIT
Repository
gitlab
Last release
2 years ago

@jojoxd/bypass

Adds bypasses for PiHole so you can still use ad services (without ads) if you so desire.

For example, you can bypass adfoc.us and adf.ly with this app.

This also works for HTTPS Sites, as we use SNI to auto-generate certificates. note that you need cache/authority.pem in your system trust store.

To disable HTTPS entirely, set environment variable APP_HTTPS_PORT to empty.

Usage:

  1. Run in some way (See Running Bypass)
  2. Copy CA certificate from cache/authority.pem into your system's trust store

    on linux, copy that file into /etc/pki/ca-trust/anchors and run sudo update-ca-trust. You may need to restart your browser afterwards.

  3. In PiHole, set the IP of all the apps you want to bypass (e.g. redirect services, googleads etc.) to the IP of the server.

Running Bypass

Docker

Note: You need to specify --dns as a public DNS server, or else we can't resolve the IP addresses.

docker run -d \
  -v ./cache:/app/cache \
  -p 80:80 -p 443:443 \
  -e APP_HOSTNAME=bypass.example.com \
  --dns 8.8.8.8 \
    docker.jojoxd.nl:5005/jojoxd-homelab/bypass:<version>

On your system (using npx)

NOTE: Take a look at the Dockerfile and Environment.ts for configuration reference.

You can also run this server using npx, but beware that your system DNS should allow resolving of all IP's (e.g. using a public DNS service)

npx @jojoxd/bypass