Update README.md
This commit is contained in:
29
README.md
29
README.md
@@ -1,2 +1,31 @@
|
||||
# catchall-webbrowsing
|
||||
Flask app for catching web requests and recording them
|
||||
I have created this app to redirect all blocked DNS queries from Adguard Home, to the ip of docker container.
|
||||
The app will record what website was used, and it will also return information the website was blocked.
|
||||
- default Adguard Home behaviour is to return non existent response, if you do not pay attention, you may miss that it was your DNS filter.
|
||||
It will listen on port 80 and 443, 443 port need certificate, i have added script to create certificate with CA signing.
|
||||
If you need, you can add the CA certificate to trusted certificates for easier use ( will work only on the IP, unless you make it for all hostnames)
|
||||
|
||||
The application is started by using `startup.sh`
|
||||
```
|
||||
#!/bin/bash
|
||||
pip install -r requirements.txt
|
||||
|
||||
export FLASK_RUN_EXTRA_FILES="startup.sh"
|
||||
export FLASK_DEBUG=True
|
||||
export FLASK_RUN_HOST="0.0.0.0"
|
||||
export FLASK_RUN_PORT=80
|
||||
|
||||
flask run & python app.py
|
||||
```
|
||||
This will first run the app on port 80 and all interfaces and last command it will run on the port 443 as per the `app.py` code
|
||||
|
||||
This app is using [Interactive Bootstrap 5 DataTables](https://www.datatables.net/) for easier data lookup.
|
||||
|
||||

|
||||
## List all blocked attempts
|
||||

|
||||
|
||||
You can deploy it with docker-compose, as per the docker-compose.yml example
|
||||
I am using static IP address of the catchall container to send all blocked queries there from [Adguard Home in DNS Settings](https://adguard.com/kb/adguard-for-ios/solving-problems/low-level-settings/#:~:text=Blocking%20mode%E2%80%8B,REFUSED%20%E2%80%94%20respond%20with%20REFUSED%20code):
|
||||

|
||||
|
||||
Reference in New Issue
Block a user