AdGuardHome/dnsfilter/dnsfilter.go

795 lines
22 KiB
Go
Raw Normal View History

2018-08-30 17:25:33 +03:00
package dnsfilter
import (
"bufio"
"bytes"
"context"
2018-08-30 17:25:33 +03:00
"crypto/sha256"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net"
2018-08-30 17:25:33 +03:00
"net/http"
"strings"
"sync/atomic"
"time"
"github.com/AdguardTeam/dnsproxy/upstream"
"github.com/AdguardTeam/golibs/log"
"github.com/AdguardTeam/urlfilter"
"github.com/bluele/gcache"
"github.com/miekg/dns"
2018-08-30 17:25:33 +03:00
"golang.org/x/net/publicsuffix"
)
const defaultCacheSize = 64 * 1024 // in number of elements
2018-10-20 19:58:39 +03:00
const defaultCacheTime = 30 * time.Minute
2018-08-30 17:25:33 +03:00
2018-10-20 19:58:39 +03:00
const defaultHTTPTimeout = 5 * time.Minute
2018-08-30 17:25:33 +03:00
const defaultHTTPMaxIdleConnections = 100
const defaultSafebrowsingServer = "sb.adtidy.org"
const defaultSafebrowsingURL = "%s://%s/safebrowsing-lookup-hash.html?prefixes=%s"
const defaultParentalServer = "pctrl.adguard.com"
const defaultParentalURL = "%s://%s/check-parental-control-hash?prefixes=%s&sensitivity=%d"
2019-05-15 12:03:20 +03:00
const maxDialCacheSize = 2 // the number of host names for safebrowsing and parental control
2018-08-30 17:25:33 +03:00
2018-10-29 16:17:18 +03:00
// ErrInvalidSyntax is returned by AddRule when the rule is invalid
2018-08-30 17:25:33 +03:00
var ErrInvalidSyntax = errors.New("dnsfilter: invalid rule syntax")
2019-01-24 20:11:01 +03:00
// ErrAlreadyExists is returned by AddRule when the rule was already added to the filter
2018-10-29 16:17:18 +03:00
var ErrAlreadyExists = errors.New("dnsfilter: rule was already added")
2018-08-30 17:25:33 +03:00
const shortcutLength = 6 // used for rule search optimization, 6 hits the sweet spot
const enableFastLookup = true // flag for debugging, must be true in production for faster performance
const enableDelayedCompilation = true // flag for debugging, must be true in production for faster performance
// Custom filtering settings
type RequestFilteringSettings struct {
FilteringEnabled bool
SafeSearchEnabled bool
SafeBrowsingEnabled bool
ParentalEnabled bool
}
2018-11-30 13:32:51 +03:00
// Config allows you to configure DNS filtering with New() or just change variables directly.
type Config struct {
FilteringTempFilename string `yaml:"filtering_temp_filename"` // temporary file for storing unused filtering rules
ParentalSensitivity int `yaml:"parental_sensitivity"` // must be either 3, 10, 13 or 17
ParentalEnabled bool `yaml:"parental_enabled"`
UsePlainHTTP bool `yaml:"-"` // use plain HTTP for requests to parental and safe browsing servers
SafeSearchEnabled bool `yaml:"safesearch_enabled"`
SafeBrowsingEnabled bool `yaml:"safebrowsing_enabled"`
ResolverAddress string // DNS server address
// Filtering callback function
FilterHandler func(clientAddr string, settings *RequestFilteringSettings) `yaml:"-"`
2018-11-30 13:32:51 +03:00
}
type privateConfig struct {
parentalServer string // access via methods
safeBrowsingServer string // access via methods
2018-08-30 17:25:33 +03:00
}
// LookupStats store stats collected during safebrowsing or parental checks
2018-08-30 17:25:33 +03:00
type LookupStats struct {
Requests uint64 // number of HTTP requests that were sent
CacheHits uint64 // number of lookups that didn't need HTTP requests
Pending int64 // number of currently pending HTTP requests
PendingMax int64 // maximum number of pending HTTP requests
}
2019-02-22 16:34:36 +03:00
// Stats store LookupStats for safebrowsing, parental and safesearch
2018-08-30 17:25:33 +03:00
type Stats struct {
Safebrowsing LookupStats
Parental LookupStats
2019-02-22 16:34:36 +03:00
Safesearch LookupStats
2018-08-30 17:25:33 +03:00
}
// Dnsfilter holds added rules and performs hostname matches against the rules
type Dnsfilter struct {
rulesStorage *urlfilter.RulesStorage
filteringEngine *urlfilter.DNSEngine
2018-08-30 17:25:33 +03:00
// HTTP lookups for safebrowsing and parental
client http.Client // handle for http client -- single instance as recommended by docs
transport *http.Transport // handle for http transport used by http client
2018-11-30 13:32:51 +03:00
Config // for direct access by library users, even a = assignment
privateConfig
2018-08-30 17:25:33 +03:00
}
2019-01-24 20:11:01 +03:00
// Filter represents a filter list
type Filter struct {
ID int64 `json:"id"` // auto-assigned when filter is added (see nextFilterID), json by default keeps ID uppercase but we need lowercase
Data []byte `json:"-" yaml:"-"` // List of rules divided by '\n'
}
2018-08-30 17:25:33 +03:00
//go:generate stringer -type=Reason
// Reason holds an enum detailing why it was filtered or not filtered
2018-08-30 17:25:33 +03:00
type Reason int
const (
// reasons for not filtering
2019-01-24 20:11:01 +03:00
// NotFilteredNotFound - host was not find in any checks, default value for result
NotFilteredNotFound Reason = iota
// NotFilteredWhiteList - the host is explicitly whitelisted
NotFilteredWhiteList
// NotFilteredError - there was a transitive error during check
NotFilteredError
2018-08-30 17:25:33 +03:00
// reasons for filtering
2019-01-24 20:11:01 +03:00
// FilteredBlackList - the host was matched to be advertising host
FilteredBlackList
// FilteredSafeBrowsing - the host was matched to be malicious/phishing
FilteredSafeBrowsing
// FilteredParental - the host was matched to be outside of parental control settings
FilteredParental
// FilteredInvalid - the request was invalid and was not processed
FilteredInvalid
// FilteredSafeSearch - the host was replaced with safesearch variant
FilteredSafeSearch
2018-08-30 17:25:33 +03:00
)
// these variables need to survive coredns reload
var (
stats Stats
2019-05-13 14:47:55 +03:00
dialCache gcache.Cache // "host" -> "IP" cache for safebrowsing and parental control servers
safebrowsingCache gcache.Cache
parentalCache gcache.Cache
2019-02-22 16:34:36 +03:00
safeSearchCache gcache.Cache
2018-08-30 17:25:33 +03:00
)
// Result holds state of hostname check
2018-08-30 17:25:33 +03:00
type Result struct {
IsFiltered bool `json:",omitempty"` // True if the host name is filtered
Reason Reason `json:",omitempty"` // Reason for blocking / unblocking
Rule string `json:",omitempty"` // Original rule text
2019-01-24 20:11:01 +03:00
IP net.IP `json:",omitempty"` // Not nil only in the case of a hosts file syntax
FilterID int64 `json:",omitempty"` // Filter ID the rule belongs to
2018-08-30 17:25:33 +03:00
}
// Matched can be used to see if any match at all was found, no matter filtered or not
2018-08-30 17:25:33 +03:00
func (r Reason) Matched() bool {
return r != NotFilteredNotFound
}
// CheckHost tries to match host against rules, then safebrowsing and parental if they are enabled
func (d *Dnsfilter) CheckHost(host string, qtype uint16, clientAddr string) (Result, error) {
// sometimes DNS clients will try to resolve ".", which is a request to get root servers
2018-08-30 17:25:33 +03:00
if host == "" {
return Result{Reason: NotFilteredNotFound}, nil
2018-08-30 17:25:33 +03:00
}
host = strings.ToLower(host)
// prevent recursion
if host == d.parentalServer || host == d.safeBrowsingServer {
return Result{}, nil
}
2018-08-30 17:25:33 +03:00
var setts RequestFilteringSettings
setts.FilteringEnabled = true
setts.SafeSearchEnabled = d.SafeSearchEnabled
setts.SafeBrowsingEnabled = d.SafeBrowsingEnabled
setts.ParentalEnabled = d.ParentalEnabled
if len(clientAddr) != 0 && d.FilterHandler != nil {
d.FilterHandler(clientAddr, &setts)
2018-08-30 17:25:33 +03:00
}
var result Result
var err error
// try filter lists first
if setts.FilteringEnabled {
result, err = d.matchHost(host, qtype)
if err != nil {
return result, err
}
if result.Reason.Matched() {
return result, nil
}
2018-08-30 17:25:33 +03:00
}
2019-02-22 16:34:36 +03:00
// check safeSearch if no match
if setts.SafeSearchEnabled {
2019-02-22 16:34:36 +03:00
result, err = d.checkSafeSearch(host)
if err != nil {
log.Printf("Failed to safesearch HTTP lookup, ignoring check: %v", err)
return Result{}, nil
}
if result.Reason.Matched() {
return result, nil
}
}
2018-08-30 17:25:33 +03:00
// check safebrowsing if no match
if setts.SafeBrowsingEnabled {
2018-08-30 17:25:33 +03:00
result, err = d.checkSafeBrowsing(host)
if err != nil {
// failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache
log.Printf("Failed to do safebrowsing HTTP lookup, ignoring check: %v", err)
return Result{}, nil
}
if result.Reason.Matched() {
return result, nil
}
}
// check parental if no match
if setts.ParentalEnabled {
2018-08-30 17:25:33 +03:00
result, err = d.checkParental(host)
if err != nil {
// failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache
log.Printf("Failed to do parental HTTP lookup, ignoring check: %v", err)
return Result{}, nil
}
if result.Reason.Matched() {
return result, nil
}
}
// nothing matched, return nothing
return Result{}, nil
}
func getCachedReason(cache gcache.Cache, host string) (result Result, isFound bool, err error) {
isFound = false // not found yet
// get raw value
rawValue, err := cache.Get(host)
if err == gcache.KeyNotFoundError {
// not a real error, just not found
err = nil
return
}
if err != nil {
// real error
return
}
// since it can be something else, validate that it belongs to proper type
cachedValue, ok := rawValue.(Result)
if !ok {
2018-08-30 17:25:33 +03:00
// this is not our type -- error
text := "SHOULD NOT HAPPEN: entry with invalid type was found in lookup cache"
log.Println(text)
err = errors.New(text)
return
}
isFound = ok
return cachedValue, isFound, err
}
// for each dot, hash it and add it to string
func hostnameToHashParam(host string, addslash bool) (string, map[string]bool) {
var hashparam bytes.Buffer
hashes := map[string]bool{}
tld, icann := publicsuffix.PublicSuffix(host)
if !icann {
2018-08-30 17:25:33 +03:00
// private suffixes like cloudfront.net
tld = ""
}
curhost := host
for {
if curhost == "" {
// we've reached end of string
break
}
if tld != "" && curhost == tld {
// we've reached the TLD, don't hash it
break
}
tohash := []byte(curhost)
if addslash {
tohash = append(tohash, '/')
}
sum := sha256.Sum256(tohash)
hexhash := fmt.Sprintf("%X", sum)
hashes[hexhash] = true
hashparam.WriteString(fmt.Sprintf("%02X%02X%02X%02X/", sum[0], sum[1], sum[2], sum[3]))
pos := strings.IndexByte(curhost, byte('.'))
if pos < 0 {
break
}
curhost = curhost[pos+1:]
}
return hashparam.String(), hashes
}
2019-02-22 16:34:36 +03:00
func (d *Dnsfilter) checkSafeSearch(host string) (Result, error) {
2019-03-18 14:50:33 +03:00
if log.GetLevel() >= log.DEBUG {
timer := log.StartTimer()
defer timer.LogElapsed("SafeSearch HTTP lookup for %s", host)
}
2019-02-22 16:34:36 +03:00
if safeSearchCache == nil {
safeSearchCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build()
}
// Check cache. Return cached result if it was found
cachedValue, isFound, err := getCachedReason(safeSearchCache, host)
if isFound {
atomic.AddUint64(&stats.Safesearch.CacheHits, 1)
2019-03-18 14:50:33 +03:00
log.Tracef("%s: found in SafeSearch cache", host)
2019-02-22 16:34:36 +03:00
return cachedValue, nil
}
if err != nil {
return Result{}, err
}
safeHost, ok := d.SafeSearchDomain(host)
if !ok {
return Result{}, nil
}
2019-02-22 16:41:30 +03:00
res := Result{IsFiltered: true, Reason: FilteredSafeSearch}
2019-02-22 16:34:36 +03:00
if ip := net.ParseIP(safeHost); ip != nil {
res.IP = ip
err = safeSearchCache.Set(host, res)
if err != nil {
return Result{}, nil
}
return res, nil
}
2019-02-25 17:15:50 +03:00
// TODO this address should be resolved with upstream that was configured in dnsforward
2019-02-22 16:34:36 +03:00
addrs, err := net.LookupIP(safeHost)
if err != nil {
log.Tracef("SafeSearchDomain for %s was found but failed to lookup for %s cause %s", host, safeHost, err)
return Result{}, err
}
for _, i := range addrs {
2019-04-23 15:08:41 +03:00
if ipv4 := i.To4(); ipv4 != nil {
2019-02-22 16:34:36 +03:00
res.IP = ipv4
break
}
}
2019-04-23 15:08:41 +03:00
if len(res.IP) == 0 {
return Result{}, fmt.Errorf("no ipv4 addresses in safe search response for %s", safeHost)
}
2019-02-22 16:34:36 +03:00
// Cache result
err = safeSearchCache.Set(host, res)
if err != nil {
return Result{}, nil
}
return res, nil
}
2018-08-30 17:25:33 +03:00
func (d *Dnsfilter) checkSafeBrowsing(host string) (Result, error) {
2019-03-18 14:50:33 +03:00
if log.GetLevel() >= log.DEBUG {
timer := log.StartTimer()
defer timer.LogElapsed("SafeBrowsing HTTP lookup for %s", host)
}
2018-08-30 17:25:33 +03:00
format := func(hashparam string) string {
schema := "https"
if d.UsePlainHTTP {
schema = "http"
}
url := fmt.Sprintf(defaultSafebrowsingURL, schema, d.safeBrowsingServer, hashparam)
2018-08-30 17:25:33 +03:00
return url
}
handleBody := func(body []byte, hashes map[string]bool) (Result, error) {
result := Result{}
scanner := bufio.NewScanner(strings.NewReader(string(body)))
for scanner.Scan() {
line := scanner.Text()
splitted := strings.Split(line, ":")
if len(splitted) < 3 {
continue
}
hash := splitted[2]
if _, ok := hashes[hash]; ok {
// it's in the hash
result.IsFiltered = true
result.Reason = FilteredSafeBrowsing
result.Rule = splitted[0]
break
}
}
if err := scanner.Err(); err != nil {
// error, don't save cache
return Result{}, err
}
return result, nil
}
if safebrowsingCache == nil {
safebrowsingCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build()
}
2018-08-30 17:25:33 +03:00
result, err := d.lookupCommon(host, &stats.Safebrowsing, safebrowsingCache, true, format, handleBody)
return result, err
}
func (d *Dnsfilter) checkParental(host string) (Result, error) {
2019-03-18 14:50:33 +03:00
if log.GetLevel() >= log.DEBUG {
timer := log.StartTimer()
defer timer.LogElapsed("Parental HTTP lookup for %s", host)
}
2018-09-07 16:10:43 +03:00
format := func(hashparam string) string {
schema := "https"
if d.UsePlainHTTP {
schema = "http"
}
url := fmt.Sprintf(defaultParentalURL, schema, d.parentalServer, hashparam, d.ParentalSensitivity)
2018-08-30 17:25:33 +03:00
return url
}
2018-09-07 16:10:43 +03:00
handleBody := func(body []byte, hashes map[string]bool) (Result, error) {
2018-08-30 17:25:33 +03:00
// parse json
var m []struct {
Blocked bool `json:"blocked"`
ClientTTL int `json:"clientTtl"`
Reason string `json:"reason"`
Hash string `json:"hash"`
2018-08-30 17:25:33 +03:00
}
err := json.Unmarshal(body, &m)
if err != nil {
// error, don't save cache
log.Printf("Couldn't parse json '%s': %s", body, err)
return Result{}, err
}
result := Result{}
for i := range m {
if !hashes[m[i].Hash] {
continue
}
2018-08-30 17:25:33 +03:00
if m[i].Blocked {
result.IsFiltered = true
result.Reason = FilteredParental
result.Rule = fmt.Sprintf("parental %s", m[i].Reason)
break
}
}
return result, nil
}
if parentalCache == nil {
parentalCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build()
}
2018-09-07 16:10:43 +03:00
result, err := d.lookupCommon(host, &stats.Parental, parentalCache, false, format, handleBody)
2018-08-30 17:25:33 +03:00
return result, err
}
2019-01-24 20:11:01 +03:00
type formatHandler func(hashparam string) string
2019-01-25 12:21:57 +03:00
type bodyHandler func(body []byte, hashes map[string]bool) (Result, error)
2019-01-24 20:11:01 +03:00
2018-08-30 17:25:33 +03:00
// real implementation of lookup/check
2019-01-25 12:21:57 +03:00
func (d *Dnsfilter) lookupCommon(host string, lookupstats *LookupStats, cache gcache.Cache, hashparamNeedSlash bool, format formatHandler, handleBody bodyHandler) (Result, error) {
2018-08-30 17:25:33 +03:00
// if host ends with a dot, trim it
host = strings.ToLower(strings.Trim(host, "."))
// check cache
cachedValue, isFound, err := getCachedReason(cache, host)
if isFound {
atomic.AddUint64(&lookupstats.CacheHits, 1)
2019-03-18 14:50:33 +03:00
log.Tracef("%s: found in the lookup cache", host)
2018-08-30 17:25:33 +03:00
return cachedValue, nil
}
if err != nil {
return Result{}, err
}
// convert hostname to hash parameters
hashparam, hashes := hostnameToHashParam(host, hashparamNeedSlash)
// format URL with our hashes
url := format(hashparam)
// do HTTP request
atomic.AddUint64(&lookupstats.Requests, 1)
atomic.AddInt64(&lookupstats.Pending, 1)
updateMax(&lookupstats.Pending, &lookupstats.PendingMax)
resp, err := d.client.Get(url)
atomic.AddInt64(&lookupstats.Pending, -1)
if resp != nil && resp.Body != nil {
defer resp.Body.Close()
}
if err != nil {
// error, don't save cache
return Result{}, err
}
// get body text
body, err := ioutil.ReadAll(resp.Body)
if err != nil {
// error, don't save cache
return Result{}, err
}
// handle status code
switch {
case resp.StatusCode == 204:
// empty result, save cache
err = cache.Set(host, Result{})
if err != nil {
return Result{}, err
}
2018-08-30 17:25:33 +03:00
return Result{}, nil
case resp.StatusCode != 200:
// error, don't save cache
return Result{}, nil
}
result, err := handleBody(body, hashes)
if err != nil {
// error, don't save cache
return Result{}, err
}
err = cache.Set(host, result)
if err != nil {
return Result{}, err
}
2018-08-30 17:25:33 +03:00
return result, nil
}
//
// Adding rule and matching against the rules
//
// Initialize urlfilter objects
func (d *Dnsfilter) initFiltering(filters map[int]string) error {
var err error
d.rulesStorage, err = urlfilter.NewRuleStorage(d.FilteringTempFilename)
if err != nil {
return err
}
d.filteringEngine = urlfilter.NewDNSEngine(filters, d.rulesStorage)
return nil
}
2018-08-30 17:25:33 +03:00
// matchHost is a low-level way to check only if hostname is filtered by rules, skipping expensive safebrowsing and parental lookups
func (d *Dnsfilter) matchHost(host string, qtype uint16) (Result, error) {
if d.filteringEngine == nil {
return Result{}, nil
}
rules, ok := d.filteringEngine.Match(host)
if !ok {
return Result{}, nil
}
log.Tracef("%d rules matched for host '%s'", len(rules), host)
for _, rule := range rules {
log.Tracef("Found rule for host '%s': '%s' list_id: %d",
host, rule.Text(), rule.GetFilterListID())
res := Result{}
res.Reason = FilteredBlackList
res.IsFiltered = true
res.FilterID = int64(rule.GetFilterListID())
res.Rule = rule.Text()
if netRule, ok := rule.(*urlfilter.NetworkRule); ok {
if netRule.Whitelist {
res.Reason = NotFilteredWhiteList
res.IsFiltered = false
}
return res, nil
} else if hostRule, ok := rule.(*urlfilter.HostRule); ok {
if qtype == dns.TypeA && hostRule.IP.To4() != nil {
// either IPv4 or IPv4-mapped IPv6 address
res.IP = hostRule.IP.To4()
return res, nil
} else if qtype == dns.TypeAAAA {
ip4 := hostRule.IP.To4()
if ip4 == nil {
res.IP = hostRule.IP
return res, nil
}
if bytes.Equal(ip4, []byte{0, 0, 0, 0}) {
// send IP="::" response for a rule "0.0.0.0 blockdomain"
res.IP = net.IPv6zero
return res, nil
}
}
continue
} else {
log.Tracef("Rule type is unsupported: '%s' list_id: %d",
rule.Text(), rule.GetFilterListID())
}
}
2018-08-30 17:25:33 +03:00
return Result{}, nil
}
//
// lifecycle helper functions
//
// Return TRUE if this host's IP should be cached
2019-05-13 14:47:55 +03:00
func (d *Dnsfilter) shouldBeInDialCache(host string) bool {
return host == d.safeBrowsingServer ||
host == d.parentalServer
}
// Search for an IP address by host name
2019-05-13 14:47:55 +03:00
func searchInDialCache(host string) string {
rawValue, err := dialCache.Get(host)
if err != nil {
return ""
}
ip, _ := rawValue.(string)
log.Debug("Found in cache: %s -> %s", host, ip)
return ip
}
// Add "hostname" -> "IP address" entry to cache
2019-05-13 14:47:55 +03:00
func addToDialCache(host, ip string) {
dialCache.Set(host, ip)
log.Debug("Added to cache: %s -> %s", host, ip)
}
type dialFunctionType func(ctx context.Context, network, addr string) (net.Conn, error)
// Connect to a remote server resolving hostname using our own DNS server
func (d *Dnsfilter) createCustomDialContext(resolverAddr string) dialFunctionType {
return func(ctx context.Context, network, addr string) (net.Conn, error) {
log.Tracef("network:%v addr:%v", network, addr)
host, port, err := net.SplitHostPort(addr)
if err != nil {
return nil, err
}
dialer := &net.Dialer{
Timeout: time.Minute * 5,
}
if net.ParseIP(host) != nil {
con, err := dialer.DialContext(ctx, network, addr)
return con, err
}
2019-05-13 14:47:55 +03:00
cache := d.shouldBeInDialCache(host)
if cache {
2019-05-13 14:47:55 +03:00
ip := searchInDialCache(host)
if len(ip) != 0 {
addr = fmt.Sprintf("%s:%s", ip, port)
return dialer.DialContext(ctx, network, addr)
}
}
r := upstream.NewResolver(resolverAddr, 30*time.Second)
addrs, e := r.LookupIPAddr(ctx, host)
log.Tracef("LookupIPAddr: %s: %v", host, addrs)
if e != nil {
return nil, e
}
var firstErr error
firstErr = nil
for _, a := range addrs {
addr = fmt.Sprintf("%s:%s", a.String(), port)
con, err := dialer.DialContext(ctx, network, addr)
if err != nil {
if firstErr == nil {
firstErr = err
}
continue
}
if cache {
2019-05-13 14:47:55 +03:00
addToDialCache(host, a.String())
}
return con, err
}
return nil, firstErr
}
}
// New creates properly initialized DNS Filter that is ready to be used
func New(c *Config, filters map[int]string) *Dnsfilter {
2018-08-30 17:25:33 +03:00
d := new(Dnsfilter)
// Customize the Transport to have larger connection pool,
// We are not (re)using http.DefaultTransport because of race conditions found by tests
d.transport = &http.Transport{
Proxy: http.ProxyFromEnvironment,
MaxIdleConns: defaultHTTPMaxIdleConnections, // default 100
MaxIdleConnsPerHost: defaultHTTPMaxIdleConnections, // default 2
IdleConnTimeout: 90 * time.Second,
TLSHandshakeTimeout: 10 * time.Second,
ExpectContinueTimeout: 1 * time.Second,
2018-08-30 17:25:33 +03:00
}
2019-04-23 15:09:23 +03:00
if c != nil && len(c.ResolverAddress) != 0 {
2019-05-15 12:03:20 +03:00
dialCache = gcache.New(maxDialCacheSize).LRU().Expiration(defaultCacheTime).Build()
d.transport.DialContext = d.createCustomDialContext(c.ResolverAddress)
}
2018-08-30 17:25:33 +03:00
d.client = http.Client{
Transport: d.transport,
Timeout: defaultHTTPTimeout,
}
2018-11-30 13:32:51 +03:00
d.safeBrowsingServer = defaultSafebrowsingServer
d.parentalServer = defaultParentalServer
if c != nil {
d.Config = *c
}
if filters != nil {
err := d.initFiltering(filters)
if err != nil {
log.Error("Can't initialize filtering subsystem: %s", err)
d.Destroy()
return nil
}
}
2018-08-30 17:25:33 +03:00
return d
}
// Destroy is optional if you want to tidy up goroutines without waiting for them to die off
// right now it closes idle HTTP connections if there are any
2018-08-30 17:25:33 +03:00
func (d *Dnsfilter) Destroy() {
if d != nil && d.transport != nil {
d.transport.CloseIdleConnections()
}
if d.rulesStorage != nil {
d.rulesStorage.Close()
d.rulesStorage = nil
}
2018-08-30 17:25:33 +03:00
}
//
// config manipulation helpers
//
// SetSafeBrowsingServer lets you optionally change hostname of safesearch lookup
2018-08-30 17:25:33 +03:00
func (d *Dnsfilter) SetSafeBrowsingServer(host string) {
if len(host) == 0 {
2018-11-30 13:32:51 +03:00
d.safeBrowsingServer = defaultSafebrowsingServer
2018-08-30 17:25:33 +03:00
} else {
2018-11-30 13:32:51 +03:00
d.safeBrowsingServer = host
2018-08-30 17:25:33 +03:00
}
}
// SetHTTPTimeout lets you optionally change timeout during lookups
2018-08-30 17:25:33 +03:00
func (d *Dnsfilter) SetHTTPTimeout(t time.Duration) {
d.client.Timeout = t
}
// ResetHTTPTimeout resets lookup timeouts
2018-08-30 17:25:33 +03:00
func (d *Dnsfilter) ResetHTTPTimeout() {
d.client.Timeout = defaultHTTPTimeout
}
// SafeSearchDomain returns replacement address for search engine
2018-08-30 17:25:33 +03:00
func (d *Dnsfilter) SafeSearchDomain(host string) (string, bool) {
2018-11-30 13:32:51 +03:00
if d.SafeSearchEnabled {
val, ok := safeSearchDomains[host]
return val, ok
2018-08-30 17:25:33 +03:00
}
return "", false
2018-08-30 17:25:33 +03:00
}
//
// stats
//
// GetStats return dns filtering stats since startup
2018-08-30 17:25:33 +03:00
func (d *Dnsfilter) GetStats() Stats {
return stats
}