Compare commits

...

10 Commits

Author SHA1 Message Date
Star Brilliant
36da908686 Add no_cookies option, update documentation for more instructions on privacy 2018-04-01 23:28:31 +08:00
Star Brilliant
8b45c99dfc Adapt for CloudFlare DNS service 2018-04-01 22:57:18 +08:00
Star Brilliant
68c3f30d14 Merge branch 'launchd' 2018-04-01 22:44:22 +08:00
Star Brilliant
7c4b818967 Merge branch 'clientswap' 2018-04-01 22:44:16 +08:00
Star Brilliant
57c956594f Adapt for macOS 2018-03-31 02:08:19 +08:00
Star Brilliant
542585b1ec Register a new HTTP client whenever an HTTP connection error happens 2018-03-31 01:16:07 +08:00
Star Brilliant
1819deb6c0 Update Readme 2018-03-26 00:48:10 +08:00
Star Brilliant
56973c827d Update Readme 2018-03-26 00:45:48 +08:00
Star Brilliant
c1be2ddd18 Update Readme 2018-03-26 00:44:28 +08:00
Star Brilliant
cb78b9b696 A DNS API server SHOULD respond with HTTP status code 415 (Unsupported Media Type) upon receiving a media type it is unable to process. 2018-03-24 17:33:50 +08:00
12 changed files with 216 additions and 46 deletions

View File

@@ -3,24 +3,41 @@
GOBUILD=go build GOBUILD=go build
GOGET=go get -d -v GOGET=go get -d -v
PREFIX=/usr/local PREFIX=/usr/local
ifeq ($(shell uname),Darwin)
CONFDIR=/usr/local/etc/dns-over-https
else
CONFDIR=/etc/dns-over-https
endif
all: doh-client/doh-client doh-server/doh-server all: doh-client/doh-client doh-server/doh-server
clean: clean:
rm -f doh-client/doh-client doh-server/doh-server rm -f doh-client/doh-client doh-server/doh-server
install: doh-client/doh-client doh-server/doh-server install:
install -Dm0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client" [ -e doh-client/doh-client ] || $(MAKE) doh-client/doh-client
install -Dm0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server" [ -e doh-server/doh-server ] || $(MAKE) doh-server/doh-server
[ -e "$(DESTDIR)/etc/dns-over-https/doh-client.conf" ] || install -Dm0644 doh-client/doh-client.conf "$(DESTDIR)/etc/dns-over-https/doh-client.conf" mkdir -p "$(DESTDIR)$(PREFIX)/bin/"
[ -e "$(DESTDIR)/etc/dns-over-https/doh-server.conf" ] || install -Dm0644 doh-server/doh-server.conf "$(DESTDIR)/etc/dns-over-https/doh-server.conf" install -m0755 doh-client/doh-client "$(DESTDIR)$(PREFIX)/bin/doh-client"
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)" install -m0755 doh-server/doh-server "$(DESTDIR)$(PREFIX)/bin/doh-server"
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)" mkdir -p "$(DESTDIR)$(CONFDIR)/"
[ -e "$(DESTDIR)$(CONFDIR)/doh-client.conf" ] || install -m0644 doh-client/doh-client.conf "$(DESTDIR)$(CONFDIR)/doh-client.conf"
[ -e "$(DESTDIR)$(CONFDIR)/doh-server.conf" ] || install -m0644 doh-server/doh-server.conf "$(DESTDIR)$(CONFDIR)/doh-server.conf"
if [ "`uname`" = "Linux" ]; then \
$(MAKE) -C systemd install "DESTDIR=$(DESTDIR)"; \
$(MAKE) -C NetworkManager install "DESTDIR=$(DESTDIR)"; \
elif [ "`uname`" = "Darwin" ]; then \
$(MAKE) -C launchd install "DESTDIR=$(DESTDIR)"; \
fi
uninstall: uninstall:
rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server" rm -f "$(DESTDIR)$(PREFIX)/bin/doh-client" "$(DESTDIR)$(PREFIX)/bin/doh-server"
$(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)" if [ "`uname`" = "Linux" ]; then \
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)" "PREFIX=$(PREFIX)" $(MAKE) -C systemd uninstall "DESTDIR=$(DESTDIR)"; \
$(MAKE) -C NetworkManager uninstall "DESTDIR=$(DESTDIR)"; \
elif [ "`uname`" = "Darwin" ]; then \
$(MAKE) -C launchd uninstall "DESTDIR=$(DESTDIR)"; \
fi
deps: deps:
$(GOGET) ./doh-client ./doh-server $(GOGET) ./doh-client ./doh-server

View File

@@ -72,11 +72,26 @@ you can host DNS-over-HTTPS along with other HTTPS services.
## DNSSEC ## DNSSEC
DNSSEC validation is not built-in. It is highly recommended that you install DNS-over-HTTPS is compatible with DNSSEC, and requests DNSSEC signatures by
`unbound` or `bind` and pass results for them to validate DNS records. default. However signature validation is not built-in. It is highly recommended
that you install `unbound` or `bind` and pass results for them to validate DNS
records.
If you are running a server without anycast, you probably want to enable EDNS0 ## EDNS0-Client-Subnet (GeoDNS)
Client Subnet during your configuring `unbound` or `bind`.
DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of the
client's IP address (/24 for IPv4, /48 for IPv6 by default) to the upstream
server. This is useful for GeoDNS and CDNs to work, and is exactly the same
configuration as most public DNS servers.
Keep in mind that /24 is not enough to track a single user, although it is
precise enough to know the city where the user is located. If you think
EDNS0-Client-Subnet is affecting your privacy, you can set `no_ecs = true` in
`/etc/dns-over-https/doh-client.conf`, with the cost of slower video streaming
or software downloading speed.
If your server is backed by `unbound` or `bind`, you probably want to enable
the EDNS0-Client-Subnet feature in their configuration files as well.
## Protocol compatibility ## Protocol compatibility
@@ -99,7 +114,7 @@ Currently supported features are:
- [X] IPv4 / IPv6 - [X] IPv4 / IPv6
- [X] EDNS0 large UDP packet (4 KiB by default) - [X] EDNS0 large UDP packet (4 KiB by default)
- [X] EDNS0 Client Subnet (/24 for IPv4, /48 for IPv6 by default) - [X] EDNS0-Client-Subnet (/24 for IPv4, /48 for IPv6 by default)
## License ## License

View File

@@ -31,6 +31,7 @@ import (
"net/http" "net/http"
"net/http/cookiejar" "net/http/cookiejar"
"strings" "strings"
"sync"
"time" "time"
"../json-dns" "../json-dns"
@@ -39,12 +40,15 @@ import (
) )
type Client struct { type Client struct {
conf *config conf *config
bootstrap []string bootstrap []string
udpServer *dns.Server udpServer *dns.Server
tcpServer *dns.Server tcpServer *dns.Server
httpTransport *http.Transport bootstrapResolver *net.Resolver
httpClient *http.Client cookieJar *cookiejar.Jar
httpClientMux *sync.RWMutex
httpTransport *http.Transport
httpClient *http.Client
} }
type DNSRequest struct { type DNSRequest struct {
@@ -71,7 +75,7 @@ func NewClient(conf *config) (c *Client, err error) {
Net: "tcp", Net: "tcp",
Handler: dns.HandlerFunc(c.tcpHandlerFunc), Handler: dns.HandlerFunc(c.tcpHandlerFunc),
} }
bootResolver := net.DefaultResolver c.bootstrapResolver = net.DefaultResolver
if len(conf.Bootstrap) != 0 { if len(conf.Bootstrap) != 0 {
c.bootstrap = make([]string, len(conf.Bootstrap)) c.bootstrap = make([]string, len(conf.Bootstrap))
for i, bootstrap := range conf.Bootstrap { for i, bootstrap := range conf.Bootstrap {
@@ -84,7 +88,7 @@ func NewClient(conf *config) (c *Client, err error) {
} }
c.bootstrap[i] = bootstrapAddr.String() c.bootstrap[i] = bootstrapAddr.String()
} }
bootResolver = &net.Resolver{ c.bootstrapResolver = &net.Resolver{
PreferGo: true, PreferGo: true,
Dial: func(ctx context.Context, network, address string) (net.Conn, error) { Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
var d net.Dialer var d net.Dialer
@@ -95,33 +99,53 @@ func NewClient(conf *config) (c *Client, err error) {
}, },
} }
} }
c.httpTransport = new(http.Transport) // Most CDNs require Cookie support to prevent DDoS attack.
// Disabling Cookie does not effectively prevent tracking,
// so I will leave it on to make anti-DDoS services happy.
if !c.conf.NoCookies {
c.cookieJar, err = cookiejar.New(nil)
if err != nil {
return nil, err
}
}
c.httpClientMux = new(sync.RWMutex)
err = c.newHTTPClient()
if err != nil {
return nil, err
}
return c, nil
}
func (c *Client) newHTTPClient() error {
c.httpClientMux.Lock()
defer c.httpClientMux.Unlock()
if c.httpTransport != nil {
c.httpTransport.CloseIdleConnections()
}
c.httpTransport = &http.Transport{ c.httpTransport = &http.Transport{
DialContext: (&net.Dialer{ DialContext: (&net.Dialer{
Timeout: time.Duration(conf.Timeout) * time.Second, Timeout: time.Duration(c.conf.Timeout) * time.Second,
KeepAlive: 30 * time.Second, KeepAlive: 30 * time.Second,
DualStack: true, DualStack: true,
Resolver: bootResolver, Resolver: c.bootstrapResolver,
}).DialContext, }).DialContext,
ExpectContinueTimeout: 1 * time.Second, ExpectContinueTimeout: 1 * time.Second,
IdleConnTimeout: 90 * time.Second, IdleConnTimeout: 90 * time.Second,
MaxIdleConns: 100, MaxIdleConns: 100,
MaxIdleConnsPerHost: 10, MaxIdleConnsPerHost: 10,
Proxy: http.ProxyFromEnvironment, Proxy: http.ProxyFromEnvironment,
ResponseHeaderTimeout: time.Duration(conf.Timeout) * time.Second, ResponseHeaderTimeout: time.Duration(c.conf.Timeout) * time.Second,
TLSHandshakeTimeout: time.Duration(conf.Timeout) * time.Second, TLSHandshakeTimeout: time.Duration(c.conf.Timeout) * time.Second,
} }
http2.ConfigureTransport(c.httpTransport) err := http2.ConfigureTransport(c.httpTransport)
// Most CDNs require Cookie support to prevent DDoS attack
cookieJar, err := cookiejar.New(nil)
if err != nil { if err != nil {
return nil, err return err
} }
c.httpClient = &http.Client{ c.httpClient = &http.Client{
Transport: c.httpTransport, Transport: c.httpTransport,
Jar: cookieJar, Jar: c.cookieJar,
} }
return c, nil return nil
} }
func (c *Client) Start() error { func (c *Client) Start() error {
@@ -156,21 +180,21 @@ func (c *Client) handlerFunc(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
requestType := "" requestType := ""
if len(c.conf.UpstreamIETF) == 0 { if len(c.conf.UpstreamIETF) == 0 {
requestType = "application/x-www-form-urlencoded" requestType = "application/dns-json"
} else if len(c.conf.UpstreamGoogle) == 0 { } else if len(c.conf.UpstreamGoogle) == 0 {
requestType = "application/dns-udpwireformat" requestType = "application/dns-udpwireformat"
} else { } else {
numServers := len(c.conf.UpstreamGoogle) + len(c.conf.UpstreamIETF) numServers := len(c.conf.UpstreamGoogle) + len(c.conf.UpstreamIETF)
random := rand.Intn(numServers) random := rand.Intn(numServers)
if random < len(c.conf.UpstreamGoogle) { if random < len(c.conf.UpstreamGoogle) {
requestType = "application/x-www-form-urlencoded" requestType = "application/dns-json"
} else { } else {
requestType = "application/dns-udpwireformat" requestType = "application/dns-udpwireformat"
} }
} }
var req *DNSRequest var req *DNSRequest
if requestType == "application/x-www-form-urlencoded" { if requestType == "application/dns-json" {
req = c.generateRequestGoogle(w, r, isTCP) req = c.generateRequestGoogle(w, r, isTCP)
} else if requestType == "application/dns-udpwireformat" { } else if requestType == "application/dns-udpwireformat" {
req = c.generateRequestIETF(w, r, isTCP) req = c.generateRequestIETF(w, r, isTCP)
@@ -189,7 +213,7 @@ func (c *Client) handlerFunc(w dns.ResponseWriter, r *dns.Msg, isTCP bool) {
} else if candidateType == "application/dns-udpwireformat" { } else if candidateType == "application/dns-udpwireformat" {
contentType = "application/dns-udpwireformat" contentType = "application/dns-udpwireformat"
} else { } else {
if requestType == "application/x-www-form-urlencoded" { if requestType == "application/dns-json" {
contentType = "application/json" contentType = "application/json"
} else if requestType == "application/dns-udpwireformat" { } else if requestType == "application/dns-udpwireformat" {
contentType = "application/dns-udpwireformat" contentType = "application/dns-udpwireformat"

View File

@@ -35,6 +35,7 @@ type config struct {
UpstreamIETF []string `toml:"upstream_ietf"` UpstreamIETF []string `toml:"upstream_ietf"`
Bootstrap []string `toml:"bootstrap"` Bootstrap []string `toml:"bootstrap"`
Timeout uint `toml:"timeout"` Timeout uint `toml:"timeout"`
NoCookies bool `toml:"no_cookies"`
NoECS bool `toml:"no_ecs"` NoECS bool `toml:"no_ecs"`
Verbose bool `toml:"verbose"` Verbose bool `toml:"verbose"`
} }

View File

@@ -4,24 +4,56 @@ listen = "127.0.0.1:53"
# HTTP path for upstream resolver # HTTP path for upstream resolver
# If multiple servers are specified, a random one will be chosen each time. # If multiple servers are specified, a random one will be chosen each time.
upstream_google = [ upstream_google = [
# Google's productive resolver, good ECS, bad DNSSEC
"https://dns.google.com/resolve", "https://dns.google.com/resolve",
# CloudFlare's resolver, bad ECS, good DNSSEC
#"https://cloudflare-dns.com/dns-query",
] ]
upstream_ietf = [ upstream_ietf = [
# Google's experimental resolver, good ECS, good DNSSEC
#"https://dns.google.com/experimental", #"https://dns.google.com/experimental",
# CloudFlare's resolver, bad ECS, good DNSSEC
#"https://cloudflare-dns.com/dns-query",
] ]
# Bootstrap DNS server to resolve the address of the upstream resolver # Bootstrap DNS server to resolve the address of the upstream resolver
# If multiple servers are specified, a random one will be chosen each time. # If multiple servers are specified, a random one will be chosen each time.
# If empty, use the system DNS settings. # If empty, use the system DNS settings.
bootstrap = [ bootstrap = [
# Google's resolver, bad ECS, good DNSSEC
"8.8.8.8:53", "8.8.8.8:53",
"8.8.4.4:53", "8.8.4.4:53",
# CloudFlare's resolver, bad ECS, good DNSSEC
#"1.1.1.1:53",
#"1.0.0.1:53",
] ]
# Timeout for upstream request # Timeout for upstream request
timeout = 10 timeout = 10
# Disable EDNS0-Client-Subnet, do not send client's IP address # Disable HTTP Cookies
#
# Cookies may be useful if your upstream resolver is protected by some
# anti-DDoS services to identify clients.
# Note that DNS Cookies (an DNS protocol extension to DNS) also has the ability
# to track uesrs and is not controlled by doh-client.
no_cookies = false
# Disable EDNS0-Client-Subnet (ECS)
#
# DNS-over-HTTPS supports EDNS0-Client-Subnet protocol, which submits part of
# the client's IP address (/24 for IPv4, /48 for IPv6 by default) to the
# upstream server. This is useful for GeoDNS and CDNs to work, and is exactly
# the same configuration as most public DNS servers.
no_ecs = false no_ecs = false
# Enable logging # Enable logging

View File

@@ -66,7 +66,7 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
numServers := len(c.conf.UpstreamGoogle) numServers := len(c.conf.UpstreamGoogle)
upstream := c.conf.UpstreamGoogle[rand.Intn(numServers)] upstream := c.conf.UpstreamGoogle[rand.Intn(numServers)]
requestURL := fmt.Sprintf("%s?name=%s&type=%s", upstream, url.QueryEscape(questionName), url.QueryEscape(questionType)) requestURL := fmt.Sprintf("%s?ct=application/dns-json&name=%s&type=%s", upstream, url.QueryEscape(questionName), url.QueryEscape(questionType))
if r.CheckingDisabled { if r.CheckingDisabled {
requestURL += "&cd=1" requestURL += "&cd=1"
@@ -93,12 +93,17 @@ func (c *Client) generateRequestGoogle(w dns.ResponseWriter, r *dns.Msg, isTCP b
} }
req.Header.Set("Accept", "application/json, application/dns-udpwireformat") req.Header.Set("Accept", "application/json, application/dns-udpwireformat")
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)") req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
c.httpClientMux.RLock()
resp, err := c.httpClient.Do(req) resp, err := c.httpClient.Do(req)
c.httpClientMux.RUnlock()
if err != nil { if err != nil {
log.Println(err) log.Println(err)
reply.Rcode = dns.RcodeServerFailure reply.Rcode = dns.RcodeServerFailure
w.WriteMsg(reply) w.WriteMsg(reply)
c.httpTransport.CloseIdleConnections() err1 := c.newHTTPClient()
if err1 != nil {
log.Fatalln(err1)
}
return &DNSRequest{ return &DNSRequest{
err: err, err: err,
} }

View File

@@ -154,12 +154,17 @@ func (c *Client) generateRequestIETF(w dns.ResponseWriter, r *dns.Msg, isTCP boo
} }
req.Header.Set("Accept", "application/dns-udpwireformat, application/json") req.Header.Set("Accept", "application/dns-udpwireformat, application/json")
req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)") req.Header.Set("User-Agent", "DNS-over-HTTPS/1.1 (+https://github.com/m13253/dns-over-https)")
c.httpClientMux.RLock()
resp, err := c.httpClient.Do(req) resp, err := c.httpClient.Do(req)
c.httpClientMux.RUnlock()
if err != nil { if err != nil {
log.Println(err) log.Println(err)
reply.Rcode = dns.RcodeServerFailure reply.Rcode = dns.RcodeServerFailure
w.WriteMsg(reply) w.WriteMsg(reply)
c.httpTransport.CloseIdleConnections() err1 := c.newHTTPClient()
if err1 != nil {
log.Fatalln(err1)
}
return &DNSRequest{ return &DNSRequest{
err: err, err: err,
} }

View File

@@ -96,7 +96,7 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
if contentType == "" { if contentType == "" {
// Guess request Content-Type based on other parameters // Guess request Content-Type based on other parameters
if r.FormValue("name") != "" { if r.FormValue("name") != "" {
contentType = "application/x-www-form-urlencoded" contentType = "application/dns-json"
} else if r.FormValue("dns") != "" { } else if r.FormValue("dns") != "" {
contentType = "application/dns-udpwireformat" contentType = "application/dns-udpwireformat"
} }
@@ -114,7 +114,7 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
} }
if responseType == "" { if responseType == "" {
// Guess response Content-Type based on request Content-Type // Guess response Content-Type based on request Content-Type
if contentType == "application/x-www-form-urlencoded" { if contentType == "application/dns-json" {
responseType = "application/json" responseType = "application/json"
} else if contentType == "application/dns-udpwireformat" { } else if contentType == "application/dns-udpwireformat" {
responseType = "application/dns-udpwireformat" responseType = "application/dns-udpwireformat"
@@ -122,12 +122,12 @@ func (s *Server) handlerFunc(w http.ResponseWriter, r *http.Request) {
} }
var req *DNSRequest var req *DNSRequest
if contentType == "application/x-www-form-urlencoded" { if contentType == "application/dns-json" {
req = s.parseRequestGoogle(w, r) req = s.parseRequestGoogle(w, r)
} else if contentType == "application/dns-udpwireformat" { } else if contentType == "application/dns-udpwireformat" {
req = s.parseRequestIETF(w, r) req = s.parseRequestIETF(w, r)
} else { } else {
jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 400) jsonDNS.FormatError(w, fmt.Sprintf("Invalid argument value: \"ct\" = %q", contentType), 415)
return return
} }
if req.errcode != 0 { if req.errcode != 0 {

16
launchd/Makefile Normal file
View File

@@ -0,0 +1,16 @@
.PHONY: install uninstall
PREFIX = /usr/local
LAUNCHD_DIR = /Library/LaunchDaemons
install:
mkdir -p "$(DESTDIR)$(LAUNCHD_DIR)"
install -m0644 doh-client.plist "$(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist"
install -m0644 doh-server.plist "$(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist"
@echo
@echo 'Note:'
@echo ' Use "sudo launchctl load $(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist" to start doh-client,'
@echo ' use "sudo launchctl load -w $(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist" to enable doh-server.'
uninstall:
rm -f "$(DESTDIR)$(LAUNCHD_DIR)/doh-client.plist" "$(DESTDIR)$(LAUNCHD_DIR)/doh-server.plist"

27
launchd/doh-client.plist Normal file
View File

@@ -0,0 +1,27 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>Label</key>
<string>org.eu.starlab.doh.client</string>
<key>ProgramArguments</key>
<array>
<string>/usr/local/bin/doh-client</string>
<string>-conf</string>
<string>/usr/local/etc/dns-over-https/doh-client.conf</string>
</array>
<key>RunAtLoad</key>
<true/>
<key>UserName</key>
<string>root</string>
<key>GroupName</key>
<string>wheel</string>
<key>KeepAlive</key>
<dict>
<key>SuccessfulExit</key>
<false/>
</dict>
<key>ThrottleInterval</key>
<integer>5</integer>
</dict>
</plist>

29
launchd/doh-server.plist Normal file
View File

@@ -0,0 +1,29 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>Label</key>
<string>org.eu.starlab.doh.server</string>
<key>ProgramArguments</key>
<array>
<string>/usr/local/bin/doh-server</string>
<string>-conf</string>
<string>/usr/local/etc/dns-over-https/doh-server.conf</string>
</array>
<key>Disabled</key>
<true/>
<key>RunAtLoad</key>
<true/>
<key>UserName</key>
<string>root</string>
<key>GroupName</key>
<string>wheel</string>
<key>KeepAlive</key>
<dict>
<key>SuccessfulExit</key>
<false/>
</dict>
<key>ThrottleInterval</key>
<integer>5</integer>
</dict>
</plist>

View File

@@ -1,6 +1,5 @@
.PHONY: install uninstall .PHONY: install uninstall
PREFIX = /usr/local
SYSTEMD_DIR = /usr/lib/systemd SYSTEMD_DIR = /usr/lib/systemd
SYSTEMD_UNIT_DIR = $(SYSTEMD_DIR)/system SYSTEMD_UNIT_DIR = $(SYSTEMD_DIR)/system