-
Notifications
You must be signed in to change notification settings - Fork 911
/
build.sh
executable file
·433 lines (369 loc) · 17.3 KB
/
build.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
#!/usr/bin/env bash
# bomb on any error
set -e
# globals
CWD=$(cd -P -- "$(dirname -- "$0")" && pwd -P)
[ -e "${CWD}/scripts/globals" ] && . ${CWD}/scripts/globals
# import functions
[ -e "/lib/lsb/init-functions" ] && . /lib/lsb/init-functions
[ -e "${CWD}/scripts/functions" ] && . ${CWD}/scripts/functions
# display usage
usage() {
echo "Usage: $0 [-b 0|1] [-c <ip>]" 1>&2;\
printf "\t-b\tgrab docker images from repository (0) or build locally (1) (default: 0)\n";\
printf "\t-c\tspecify client-ip instead of being taken from ssh_connection\n";\
exit 1;
}
# fix terminfo
# http://ashberlin.co.uk/blog/2010/08/24/color-in-ubuntu-init-scripts/
if [[ $(infocmp | grep 'hpa=') == "" ]]; then
(infocmp; printf '\thpa=\\E[%sG,\n' %i%p1%d) > tmp-${$}.tic\
&& tic -s tmp-$$.tic -o /etc/terminfo\
&& rm tmp-$$.tic\
&& exec $0 $*
fi
# process options
printf "$0: $*\n"
while getopts "b:c:" o; do
case "${o}" in
b)
b=${OPTARG}
((b == 0|| b == 1)) || usage
;;
c)
c=${OPTARG}
;;
*)
usage
;;
esac
done
shift $((OPTIND-1))
if [ ${b} ]; then DOCKER_BUILD=${b}; fi
if [ ${c} ]; then CLIENTIP=${c}; fi
log_action_begin_msg "checking OS compatibility"
if [[ $(cat /etc/os-release | grep '^ID=') =~ ubuntu ]]\
|| [[ $(cat /etc/os-release | grep '^ID=') =~ debian ]]; then
true
log_action_end_msg $?
else
false
log_action_end_msg $?
exit 1
fi
log_action_begin_msg "checking if cURL is installed"
which curl > /dev/null
log_action_end_msg $?
log_action_begin_msg "checking if Docker is installed"
which docker > /dev/null
log_action_end_msg $?
log_action_begin_msg "checking if sudo is installed"
which sudo > /dev/null
log_action_end_msg $?
log_action_begin_msg "checking if dig is installed"
which dig > /dev/null
log_action_end_msg $?
log_action_begin_msg "checking if netstat is installed"
which netstat > /dev/null
log_action_end_msg $?
log_action_begin_msg "testing available ports"
for port in 80 443 53; do
! netstat -a -n -p | grep LISTEN | grep -P '\d+\.\d+\.\d+\.\d+::${port}' > /dev/null\
|| (printf "required port ${port} already in use\n" && exit 1)
done
log_action_end_msg $?
log_action_begin_msg "disabling ufw"
if which ufw > /dev/null; then ufw disable &>> ${CWD}/netflix-proxy.log; fi
log_action_end_msg $?
if [[ $(cat /proc/swaps | wc -l) -le 1 ]]; then
log_action_begin_msg "setting up swapfile"
fallocate -l 2G /swapfile && \
chmod 600 /swapfile && \
mkswap /swapfile && \
swapon /swapfile && \
printf "/swapfile none swap sw 0 0\n" >> /etc/fstab
log_action_end_msg $?
fi
log_action_begin_msg "installing net-tools"
sudo apt-get -y update &>> ${CWD}/netflix-proxy.log\
&& sudo apt-get -y install net-tools &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
# obtain the interface with the default gateway
IFACE=$(get_iface 4)
# obtain IP address of the Internet facing interface
IPADDR=$(get_ipaddr)
EXTIP=$(get_ext_ipaddr 4)
IPV6=0
if cat /proc/net/if_inet6 | grep -v lo | grep -v fe80 > /dev/null\
&& $(which curl) mgmt.unzoner.com --fail --silent -6 > /dev/null; then
IPV6=1
IPADDR6=$(get_ipaddr6)
EXTIP6=$(get_ext_ipaddr 6)
fi
# obtain client (home) ip address and address family
if ! [ ${CLIENTIP} ]; then
CLIENTIP=$(get_client_ipaddr)
fi
IS_CLIENT_IPV4=0
if ! is_ipv4 ${CLIENTIP}; then IS_CLIENT_IPV4=1; fi
IS_CLIENT_IPV6=1
if [[ "${IPV6}" == '1' ]]; then
if is_ipv6 ${CLIENTIP}; then
IS_CLIENT_IPV6=0
fi
fi
# diagnostics info
debug="$0: build=${DOCKER_BUILD} client=${CLIENTIP} is_client_ipv4=${IS_CLIENT_IPV4} ipaddr=${IPADDR} extip=${EXTIP}"
if [[ "${IPV6}" == '1' ]]; then
debug_v6="$0: is_client_ipv6=${IS_CLIENT_IPV6} ipaddr6=${IPADDR6} extip6=${EXTIP6}"
fi
sudo touch ${CWD}/netflix-proxy.log
log_action_begin_msg "log diagnostics info"
printf "build=${DOCKER_BUILD} client=${CLIENTIP} local=${IPADDR} public=${EXTIP}\n"
printf "${debug}\n" &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
if [[ ${debug_v6} ]]; then
log_action_begin_msg "log diagnostics info (IPv6)"
printf "local6=${IPADDR6} public6=${EXTIP6}\n"
printf "${debug_v6}\n" &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
fi
# switch to working directory
pushd ${CWD} &>> ${CWD}/netflix-proxy.log
# configure iptables
if [[ -n "${CLIENTIP}" ]]; then
log_action_begin_msg "authorising clientip=${CLIENTIP} on iface=${IFACE}"
if [[ "${IS_CLIENT_IPV4}" == '0' ]]; then
sudo iptables -t nat -A PREROUTING -s ${CLIENTIP}/32 -i ${IFACE} -j ACCEPT
fi
if [[ "${IS_CLIENT_IPV6}" == '0' ]]; then
sudo ip6tables -t nat -A PREROUTING -s ${CLIENTIP}/128 -i ${IFACE} -j ACCEPT
fi
log_action_end_msg $?
else
log_action_cont_msg "unable to resolve and authorise client ip"
fi
log_action_begin_msg "adding IPv4 iptables rules"
sudo iptables -t nat -A PREROUTING -i ${IFACE} -p tcp --dport 80 -j REDIRECT --to-port 8080\
&& sudo iptables -t nat -A PREROUTING -i ${IFACE} -p tcp --dport 443 -j REDIRECT --to-port 8080\
&& sudo iptables -t nat -A PREROUTING -i ${IFACE} -p udp --dport 53 -j REDIRECT --to-port 5353\
&& sudo iptables -t nat -A POSTROUTING -o ${IFACE} -j MASQUERADE\
&& sudo iptables -A INPUT -p icmp -j ACCEPT\
&& sudo iptables -A INPUT -i lo -j ACCEPT\
&& sudo iptables -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT\
&& sudo iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT\
&& sudo iptables -A INPUT -p udp -m udp --dport 53 -j ACCEPT\
&& sudo iptables -A INPUT -p udp -m udp --dport 5353 -j ACCEPT\
&& sudo iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT\
&& sudo iptables -A INPUT -p tcp -m tcp --dport 8080 -j ACCEPT\
&& sudo iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT\
&& sudo iptables -A INPUT -j REJECT --reject-with icmp-host-prohibited
log_action_end_msg $?
log_action_begin_msg "adding IPv6 iptables rules"
sudo ip6tables -t nat -A PREROUTING -i ${IFACE} -p tcp --dport 80 -j REDIRECT --to-port 8080\
&& sudo ip6tables -t nat -A PREROUTING -i ${IFACE} -p tcp --dport 443 -j REDIRECT --to-port 8080\
&& sudo ip6tables -t nat -A PREROUTING -i ${IFACE} -p udp --dport 53 -j REDIRECT --to-port 5353\
&& sudo iptables -t nat -A POSTROUTING -o ${IFACE} -j MASQUERADE\
&& sudo ip6tables -A INPUT -p ipv6-icmp -j ACCEPT\
&& sudo ip6tables -A INPUT -i lo -j ACCEPT\
&& sudo ip6tables -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT\
&& sudo ip6tables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT\
&& sudo ip6tables -A INPUT -p udp -m udp --dport 53 -j ACCEPT\
&& sudo ip6tables -A INPUT -p udp -m udp --dport 5353 -j ACCEPT\
&& sudo ip6tables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT\
&& sudo ip6tables -A INPUT -p tcp -m tcp --dport 8080 -j ACCEPT\
&& sudo ip6tables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT\
&& sudo ip6tables -A INPUT -j REJECT --reject-with icmp6-adm-prohibited
log_action_end_msg $?
# check if public IPv6 access is available
log_action_begin_msg "creating Docker and sniproxy configuration templates"
sudo cp ${CWD}/docker-sniproxy/sniproxy.conf.template ${CWD}/docker-sniproxy/sniproxy.conf &>> ${CWD}/netflix-proxy.log\
&& sudo cp ${CWD}/docker-compose.yml.template ${CWD}/docker-compose.yml &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
log_action_begin_msg "disabling Docker iptables control"
cp ${CWD}/daemon.json /etc/docker/
log_action_end_msg $?
if [[ "${IPV6}" == '1' ]]; then
log_action_begin_msg "enabling sniproxy IPv6 priority"
printf "\nresolver {\n nameserver ${RESOLVER_PRI}\n nameserver ${RESOLVER_SEC}\n mode ipv6_first\n}\n"\
| sudo tee -a ${CWD}/docker-sniproxy/sniproxy.conf &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
else
log_action_begin_msg "configuring sniproxy and Docker"
printf "\nresolver {\n nameserver ${RESOLVER_PRI}\n nameserver ${RESOLVER_SEC}\n mode ipv4_only\n}\n"\
| sudo tee -a ${CWD}/docker-sniproxy/sniproxy.conf &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
fi
log_action_begin_msg "installing iptables|netfilter-persistent service"
echo iptables-persistent iptables-persistent/autosave_v4 boolean true\
| sudo debconf-set-selections &>> ${CWD}/netflix-proxy.log\
&& echo iptables-persistent iptables-persistent/autosave_v6 boolean true\
| sudo debconf-set-selections &>> ${CWD}/netflix-proxy.log\
&& sudo apt-get -y install iptables-persistent &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
# Ubuntu and Debian have different service names for iptables-persistent service
if [ -f "/etc/init.d/iptables-persistent" ]; then
SERVICE=iptables
elif [ -f "/etc/init.d/netfilter-persistent" ]; then
SERVICE=netfilter
fi
# socialise Docker with iptables-persistent
# https://groups.google.com/forum/#!topic/docker-dev/4SfOwCOmw-E
if [ ! -f "/etc/init/docker.conf.bak" ] && [ -f "/etc/init/docker.conf" ]; then
log_action_begin_msg "socialising Docker with iptables-persistent service"
sudo $(which sed) -i.bak "s/ and net-device-up IFACE!=lo)/ and net-device-up IFACE!=lo and started ${SERVICE}-persistent)/" /etc/init/docker.conf || true &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
fi
if [[ ${SERVICE} == "iptables" ]]; then
if [ ! -f "/etc/init.d/iptables-persistent.bak" ] && [ -f "/etc/init.d/iptables-persistent" ]; then
log_action_begin_msg "updating iptables-persistent init script"
sudo $(which sed) -i.bak '/load_rules$/{N;s/load_rules\n\t;;/load_rules\n\tinitctl emit -n started JOB=iptables-persistent\n\t;;/}' /etc/init.d/iptables-persistent || true &>> ${CWD}/netflix-proxy.log\
&& sudo $(which sed) -i'' 's/stop)/stop)\n\tinitctl emit stopping JOB=iptables-persistent/' /etc/init.d/iptables-persistent &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
fi
fi
log_action_begin_msg "saving iptables rules"
sudo service ${SERVICE}-persistent save &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
log_action_begin_msg "creating dnsmasq.conf from template"
sudo cp ${CWD}/dnsmasq.conf.template ${CWD}/dnsmasq.conf &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
if [[ "${IPV6}" == '1' ]] && [[ ${EXTIP6} ]]; then
log_action_begin_msg "updating dnsmasq.conf extip=${EXTIP} extip6=${EXTIP6}"
else
log_action_begin_msg "updating dnsmasq.conf extip=${EXTIP}"
fi
if [[ -n "${EXTIP}" ]]; then
for domain in $(cat ${CWD}/proxy-domains.txt); do
printf "address=/${domain}/${EXTIP}\n"\
| sudo tee -a ${CWD}/dnsmasq.conf &>> ${CWD}/netflix-proxy.log
done
fi
for domain in $(cat ${CWD}/bypass-domains.txt); do
printf "server=/${domain}/${RESOLVER_PRI}\n"\
| sudo tee -a ${CWD}/dnsmasq.conf &>> ${CWD}/netflix-proxy.log
printf "server=/${domain}/${RESOLVER_SEC}\n"\
| sudo tee -a ${CWD}/dnsmasq.conf &>> ${CWD}/netflix-proxy.log
done
if [[ "${IPV6}" == '1' ]] && [[ -n "${EXTIP6}" ]]; then
for domain in $(cat ${CWD}/proxy-domains.txt); do
printf "address=/${domain}/${EXTIP6}\n"\
| sudo tee -a ${CWD}/dnsmasq.conf &>> ${CWD}/netflix-proxy.log
done
fi
log_action_end_msg $?
log_action_begin_msg "installing Python3 and requirements"
sudo apt-get -y update &>> ${CWD}/netflix-proxy.log\
&& sudo apt-get -y install git python3.6 python3-venv python3-pip sqlite3 &>> ${CWD}/netflix-proxy.log\
&& python3 -m venv venv &>> ${CWD}/netflix-proxy.log\
&& source venv/bin/activate &>> ${CWD}/netflix-proxy.log\
&& pip3 install pip --upgrade &>> ${CWD}/netflix-proxy.log\
&& pip3 install -r requirements.txt &>> ${CWD}/netflix-proxy.log\
&& pip3 install -r ${CWD}/auth/requirements.txt &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
log_action_begin_msg "configuring admin backend"
PLAINTEXT=$(${CWD}/auth/pbkdf2_sha256_hash.py | awk '{print $1}')\
&& HASH=$(${CWD}/auth/pbkdf2_sha256_hash.py ${PLAINTEXT} | awk '{print $2}')\
&& sudo cp ${CWD}/auth/db/auth.default.db ${CWD}/auth/db/auth.db &>> ${CWD}/netflix-proxy.log\
&& sudo $(which sqlite3) ${CWD}/auth/db/auth.db "UPDATE users SET password = '${HASH}' WHERE ID = 1;" &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
log_action_begin_msg "configuring admin frontend"
sudo cp ${CWD}/Caddyfile.template ${CWD}/Caddyfile &>> ${CWD}/netflix-proxy.log\
&& printf "proxy / localhost:${SDNS_ADMIN_PORT} {\n except /static\n header_upstream Host {host}\n header_upstream X-Forwarded-For {remote}\n header_upstream X-Real-IP {remote}\n header_upstream X-Forwarded-Proto {scheme}\n}\n"\
| sudo tee -a ${CWD}/Caddyfile &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
log_action_begin_msg "creating cron scripts"
sudo cp ${CWD}/crond.template /etc/cron.d/netflix-proxy &>> ${CWD}/netflix-proxy.log\
&& sudo $(which sed) -i'' "s#{{CWD}}#${CWD}#g" /etc/cron.d/netflix-proxy &>> ${CWD}/netflix-proxy.log\
&& sudo service cron restart &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
if [[ "${DOCKER_BUILD}" == '1' ]]; then
log_action_begin_msg "pulling and building docker containers from source"
sudo $(which docker-compose) build &>> ${CWD}/netflix-proxy.log
for service in dnsmasq-service dnsmasq-bogus-service caddy-service; do
sudo $(which docker-compose) pull ${service} &>> ${CWD}/netflix-proxy.log
done
log_action_end_msg $?
else
log_action_begin_msg "pulling Docker containers"
sudo $(which docker-compose) pull &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
fi
log_action_begin_msg "creating and starting Docker containers"
EXTIP=${EXTIP} EXTIP6=${EXTIP6}\
$(which docker-compose) up -d &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
# configure appropriate init system
log_action_begin_msg "configuring init system"
if [[ `/sbin/init --version` =~ upstart ]]; then
sudo cp ${CWD}/init/*.conf /etc/init/ &>> ${CWD}/netflix-proxy.log\
&& sudo $(which sed) -i'' "s#{{CWD}}#${CWD}#g" /etc/init/netflix-proxy-admin.conf &>> ${CWD}/netflix-proxy.log\
&& sudo service netflix-proxy-admin restart &>> ${CWD}/netflix-proxy.log
fi
if [[ `systemctl` =~ -\.mount ]]; then
sudo cp ${CWD}/init/*.service /lib/systemd/system/ &>> ${CWD}/netflix-proxy.log\
&& sudo $(which sed) -i'' "s#{{CWD}}#${CWD}#g" /lib/systemd/system/netflix-proxy-admin.service &>> ${CWD}/netflix-proxy.log\
&& sudo systemctl daemon-reload &>> ${CWD}/netflix-proxy.log\
&& sudo systemctl enable netflix-proxy-admin &>> ${CWD}/netflix-proxy.log\
&& sudo systemctl enable systemd-networkd &>> ${CWD}/netflix-proxy.log\
&& sudo systemctl enable systemd-networkd-wait-online &>> ${CWD}/netflix-proxy.log\
&& sudo systemctl restart netflix-proxy-admin &>> ${CWD}/netflix-proxy.log
fi
log_action_end_msg $?
log_action_begin_msg "reloading ipables rules"
sudo service ${SERVICE}-persistent reload &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
log_action_begin_msg "testing DNS"
with_backoff $(which dig) -4\
+time=${TIMEOUT} ${NETFLIX_HOST} @${EXTIP} &>> ${CWD}/netflix-proxy.log\
|| with_backoff $(which dig) -4\
+time=${TIMEOUT} ${NETFLIX_HOST} @${IPADDR} &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
if [[ -n "${EXTIP6}" ]] && [[ -n "${IPADDR6}" ]]; then
log_action_begin_msg "testing DNS ipv6"
with_backoff $(which dig) -6\
+time=${TIMEOUT} ${NETFLIX_HOST} @${EXTIP6} &>> ${CWD}/netflix-proxy.log\
|| with_backoff $(which dig) -6\
+time=${TIMEOUT} ${NETFLIX_HOST} @${IPADDR6} &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
fi
log_action_begin_msg "testing proxy (cURL)"
with_backoff $(which curl) -v -4 -L --fail -o /dev/null https://${NETFLIX_HOST}\
--resolve ${NETFLIX_HOST}:443:${EXTIP} &>> ${CWD}/netflix-proxy.log\
|| with_backoff $(which curl) -v -4 -L --fail -o /dev/null https://${NETFLIX_HOST}\
--resolve ${NETFLIX_HOST}:443:${IPADDR} &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
if [[ -n "${EXTIP6}" ]] || [[ -n "${IPADDR6}" ]]; then
log_action_begin_msg "testing proxy (cURL) ipv6"
with_backoff $(which curl) -v -6 -L --fail -o /dev/null https://${NETFLIX_HOST}\
--resolve ${NETFLIX_HOST}:443:::1 &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
fi
printf "\nnetflix-proxy-admin site=http://${EXTIP}:8080/ credentials=\e[1madmin:${PLAINTEXT}\033[0m\n"
log_action_begin_msg "testing netflix-proxy admin site"
(with_backoff $(which curl) --silent -4\
--fail http://${EXTIP}:8080/ &>> ${CWD}/netflix-proxy.log\
|| with_backoff $(which curl) --silent -4\
--fail http://${IPADDR}:8080/) &>> ${CWD}/netflix-proxy.log\
&& with_backoff $(which curl) --silent -4\
--fail http://localhost:${SDNS_ADMIN_PORT}/ &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
if [[ -n "${EXTIP6}" ]] && [[ -n "${IPADDR6}" ]]; then
printf "\nnetflix-proxy-admin site=http://${EXTIP6}:8080/ credentials=\e[1madmin:${PLAINTEXT}\033[0m\n"
log_action_begin_msg "testing netflix-proxy admin site ipv6"
with_backoff $(which curl) --silent -6\
--fail http://ip6-localhost:8080/ &>> ${CWD}/netflix-proxy.log
log_action_end_msg $?
fi
# change back to original directory
popd &>> ${CWD}/netflix-proxy.log
if [[ "${IPV6}" == '1' ]]; then
printf "IPv6=\e[32mEnabled\033[0m\n"
else
printf "\e[1mWARNING:\033[0m IPv6=\e[31mDisabled\033[0m\n"
fi
# DO NOT change the text between these lines
printf "Change your DNS to ${EXTIP} and start watching Netflix out of region.\n"
# DO NOT change the text between these lines
printf "\e[33mNote\033[0m: get \e[1mhttp://unzoner.com\033[0m if your app/service no longer works with DNS based solutions.\n"
printf "\e[32mDone.\033[0m\n"