Files

72 lines
4.7 KiB
Docker
Raw Permalink Normal View History

FROM debian:bookworm-slim
LABEL description="dante SOCKS5 + purevpn-cli exit node"
# ── System dependencies ───────────────────────────────────────────────────────
RUN apt-get update && apt-get install -y --no-install-recommends \
dante-server \
sudo \
curl wget ca-certificates \
iproute2 iptables iputils-ping \
netcat-openbsd procps dnsutils \
expect \
openvpn wireguard wireguard-tools \
net-tools openresolv \
&& rm -rf /var/lib/apt/lists/*
# ── Non-root vpnuser ─────────────────────────────────────────────────────────
# purevpn-cli is designed to run as non-root; it calls sudo internally for
# privileged VPN setup. Home is /root so login tokens written by root are shared.
RUN useradd -M -d /root -s /bin/bash vpnuser
# ── Sudoers: passwordless + correct PATH for vpnuser ─────────────────────────
RUN echo "vpnuser ALL=(ALL:ALL) NOPASSWD: ALL" >> /etc/sudoers \
&& echo 'Defaults:vpnuser secure_path="/opt/purevpn-cli/bin:/opt/purevpn-cli:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"' >> /etc/sudoers
# ── Stub openvpn-systemd-resolved ────────────────────────────────────────────
RUN mkdir -p /usr/lib/openvpn \
&& printf '#!/bin/sh\nexit 0\n' \
| tee /usr/local/bin/openvpn-systemd-resolved \
/usr/lib/openvpn/openvpn-systemd-resolved > /dev/null \
&& chmod +x /usr/local/bin/openvpn-systemd-resolved \
/usr/lib/openvpn/openvpn-systemd-resolved
# ── Install purevpn-cli ───────────────────────────────────────────────────────
RUN curl -fsSL https://apps.purevpn-tools.com/cross-platform/linux-cli/production/cli-install.sh \
-o /tmp/cli-install.sh \
&& bash /tmp/cli-install.sh \
&& rm -f /tmp/cli-install.sh
# ── Pre-download pured daemon + patch wrong URL in purevpn-cli binary ────────
# The binary hardcodes /cross-platform/linux-cli/production/pured-linux-x64.gz
# which returns HTTP 403. The correct URL (from the installer script) is under
# /cross-platform/linux-daemon/1.4.1/. Same-length replacement (54 bytes each).
RUN curl -fsSL "https://apps.purevpn-tools.com/cross-platform/linux-daemon/1.4.1/pured-linux-x64.gz" \
-o /opt/purevpn-cli/pured-linux-x64.gz \
&& gzip -d /opt/purevpn-cli/pured-linux-x64.gz \
&& chmod +x /opt/purevpn-cli/pured-linux-x64
RUN python3 -c "data=open('/opt/purevpn-cli/bin/purevpn-cli','rb').read();old=b'cross-platform/linux-cli/production/pured-linux-x64.gz';new=b'cross-platform/linux-daemon/1.4.1/pured-linux-x64.gz?x';assert len(old)==len(new),f'{len(old)} vs {len(new)}';n=data.count(old);assert n>0,'pattern not found';open('/opt/purevpn-cli/bin/purevpn-cli','wb').write(data.replace(old,new));print(f'Patched {n} occurrence(s)')"
# ── Fake systemctl (pured.service) ───────────────────────────────────────────
# purevpn-cli checks `systemctl is-active pured.service` to detect missing
# components. Without systemd, this always returns inactive → endless sudo loop.
# Fake systemctl returns "active" when the daemon is reachable on :9485.
COPY systemctl.sh /usr/local/bin/systemctl
RUN chmod +x /usr/local/bin/systemctl \
&& mkdir -p /etc/systemd/system \
&& cp /opt/purevpn-cli/pured.service /etc/systemd/system/pured.service
# ── PATH ──────────────────────────────────────────────────────────────────────
ENV PATH=/opt/purevpn-cli/bin:/opt/purevpn-cli:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
# ── Location list ─────────────────────────────────────────────────────────────
COPY servers.txt /etc/vpndock/servers.txt
# ── Entrypoint ────────────────────────────────────────────────────────────────
COPY entrypoint.sh /entrypoint.sh
RUN chmod +x /entrypoint.sh
EXPOSE 1080
ENTRYPOINT ["/entrypoint.sh"]