2018-10-15 06:02:19 -07:00
|
|
|
# AdGuard Home's DNS filtering go library
|
2018-08-30 07:25:33 -07:00
|
|
|
|
|
|
|
Example use:
|
|
|
|
```bash
|
|
|
|
[ -z "$GOPATH" ] && export GOPATH=$HOME/go
|
2021-05-21 06:15:47 -07:00
|
|
|
go get -d github.com/AdguardTeam/AdGuardHome/filtering
|
2018-08-30 07:25:33 -07:00
|
|
|
```
|
|
|
|
|
|
|
|
Create file filter.go
|
|
|
|
```filter.go
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2021-05-21 06:15:47 -07:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/filtering"
|
2018-08-30 07:25:33 -07:00
|
|
|
"log"
|
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
2021-05-21 06:15:47 -07:00
|
|
|
filter := filtering.New()
|
2018-08-30 07:25:33 -07:00
|
|
|
filter.AddRule("||dou*ck.net^")
|
|
|
|
host := "www.doubleclick.net"
|
|
|
|
res, err := filter.CheckHost(host)
|
|
|
|
if err != nil {
|
|
|
|
// temporary failure
|
2020-11-05 05:20:57 -07:00
|
|
|
log.Fatalf("Failed to check host %q: %s", host, err)
|
2018-08-30 07:25:33 -07:00
|
|
|
}
|
|
|
|
if res.IsFiltered {
|
2020-11-05 05:20:57 -07:00
|
|
|
log.Printf("Host %s is filtered, reason - %q, matched rule: %q", host, res.Reason, res.Rule)
|
2018-08-30 07:25:33 -07:00
|
|
|
} else {
|
2020-11-05 05:20:57 -07:00
|
|
|
log.Printf("Host %s is not filtered, reason - %q", host, res.Reason)
|
2018-08-30 07:25:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
And then run it:
|
|
|
|
```bash
|
|
|
|
go run filter.go
|
|
|
|
```
|
|
|
|
|
|
|
|
You will get:
|
|
|
|
```
|
|
|
|
2000/01/01 00:00:00 Host www.doubleclick.net is filtered, reason - 'FilteredBlackList', matched rule: '||dou*ck.net^'
|
|
|
|
```
|
|
|
|
|
|
|
|
You can also enable checking against AdGuard's SafeBrowsing:
|
|
|
|
|
|
|
|
```go
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2021-05-21 06:15:47 -07:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/filtering"
|
2018-08-30 07:25:33 -07:00
|
|
|
"log"
|
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
2021-05-21 06:15:47 -07:00
|
|
|
filter := filtering.New()
|
2018-08-30 07:25:33 -07:00
|
|
|
filter.EnableSafeBrowsing()
|
|
|
|
host := "wmconvirus.narod.ru" // hostname for testing safebrowsing
|
|
|
|
res, err := filter.CheckHost(host)
|
|
|
|
if err != nil {
|
|
|
|
// temporary failure
|
2020-11-05 05:20:57 -07:00
|
|
|
log.Fatalf("Failed to check host %q: %s", host, err)
|
2018-08-30 07:25:33 -07:00
|
|
|
}
|
|
|
|
if res.IsFiltered {
|
2020-11-05 05:20:57 -07:00
|
|
|
log.Printf("Host %s is filtered, reason - %q, matched rule: %q", host, res.Reason, res.Rule)
|
2018-08-30 07:25:33 -07:00
|
|
|
} else {
|
2020-11-05 05:20:57 -07:00
|
|
|
log.Printf("Host %s is not filtered, reason - %q", host, res.Reason)
|
2018-08-30 07:25:33 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|