mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-11-24 05:55:43 +03:00
54a975f584
Squashed commit of the following: commit 8d93f660087f5a08c3775f69a79978da6176e41a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Mon Sep 30 19:49:47 2024 +0300 all: imp chlog commit 858765e7a5e5e668db43cc4e4753a71d022c3034 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Mon Sep 30 19:36:39 2024 +0300 all: upd i18n, lists, tools |
||
---|---|---|
.. | ||
hashprefix | ||
rewrite | ||
rulelist | ||
safesearch | ||
tests | ||
blocked.go | ||
dnsrewrite.go | ||
dnsrewrite_test.go | ||
filter.go | ||
filter_test.go | ||
filtering.go | ||
filtering_test.go | ||
hosts.go | ||
hosts_test.go | ||
http.go | ||
http_test.go | ||
idgenerator.go | ||
idgenerator_internal_test.go | ||
README.md | ||
rewritehttp.go | ||
rewritehttp_test.go | ||
rewrites.go | ||
rewrites_test.go | ||
safesearch.go | ||
safesearchhttp.go | ||
servicelist.go |
AdGuard Home's DNS filtering go library
Example use:
[ -z "$GOPATH" ] && export GOPATH=$HOME/go
go get -d github.com/AdguardTeam/AdGuardHome/filtering
Create file filter.go
package main
import (
"github.com/AdguardTeam/AdGuardHome/filtering"
"log"
)
func main() {
filter := filtering.New()
filter.AddRule("||dou*ck.net^")
host := "www.doubleclick.net"
res, err := filter.CheckHost(host)
if err != nil {
// temporary failure
log.Fatalf("Failed to check host %q: %s", host, err)
}
if res.IsFiltered {
log.Printf("Host %s is filtered, reason - %q, matched rule: %q", host, res.Reason, res.Rule)
} else {
log.Printf("Host %s is not filtered, reason - %q", host, res.Reason)
}
}
And then run it:
go run filter.go
You will get:
2000/01/01 00:00:00 Host www.doubleclick.net is filtered, reason - 'FilteredBlackList', matched rule: '||dou*ck.net^'
You can also enable checking against AdGuard's SafeBrowsing:
package main
import (
"github.com/AdguardTeam/AdGuardHome/filtering"
"log"
)
func main() {
filter := filtering.New()
filter.EnableSafeBrowsing()
host := "wmconvirus.narod.ru" // hostname for testing safebrowsing
res, err := filter.CheckHost(host)
if err != nil {
// temporary failure
log.Fatalf("Failed to check host %q: %s", host, err)
}
if res.IsFiltered {
log.Printf("Host %s is filtered, reason - %q, matched rule: %q", host, res.Reason, res.Rule)
} else {
log.Printf("Host %s is not filtered, reason - %q", host, res.Reason)
}
}