@jojoxd/bypass
v1.0.2
Published
PiHole Companion to bypass ad redirects
Downloads
16
Readme
@jojoxd/bypass
Adds bypasses for PiHole so you can still use ad services (without ads) if you so desire.
For example, you can bypass adfoc.us
and adf.ly
with this app.
This also works for HTTPS Sites, as we use SNI to auto-generate certificates. note that you need cache/authority.pem
in your system trust store.
To disable HTTPS entirely, set environment variable APP_HTTPS_PORT
to empty.
Usage:
- Run in some way (See Running Bypass)
- Copy CA certificate from
cache/authority.pem
into your system's trust storeon linux, copy that file into /etc/pki/ca-trust/anchors and run
sudo update-ca-trust
. You may need to restart your browser afterwards. - In PiHole, set the IP of all the apps you want to bypass (e.g. redirect services, googleads etc.) to the IP of the server.
Running Bypass
Docker
Note: You need to specify --dns as a public DNS server, or else we can't resolve the IP addresses.
docker run -d \
-v ./cache:/app/cache \
-p 80:80 -p 443:443 \
-e APP_HOSTNAME=bypass.example.com \
--dns 8.8.8.8 \
docker.jojoxd.nl:5005/jojoxd-homelab/bypass:<version>
On your system (using npx)
NOTE: Take a look at the Dockerfile and Environment.ts for configuration reference.
You can also run this server using npx, but beware that your system DNS should allow resolving of all IP's (e.g. using a public DNS service)
npx @jojoxd/bypass