2020-05-26 13:37:37 +01:00
|
|
|
package querylog
|
|
|
|
|
|
|
|
import (
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/AdguardTeam/AdGuardHome/dnsfilter"
|
|
|
|
)
|
|
|
|
|
|
|
|
type criteriaType int
|
|
|
|
|
|
|
|
const (
|
2020-05-28 15:14:50 +01:00
|
|
|
ctDomainOrClient criteriaType = iota // domain name or client IP address
|
2020-05-26 13:37:37 +01:00
|
|
|
ctFilteringStatus // filtering status
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
filteringStatusAll = "all"
|
|
|
|
filteringStatusFiltered = "filtered" // all kinds of filtering
|
|
|
|
|
|
|
|
filteringStatusBlocked = "blocked" // blocked or blocked service
|
|
|
|
filteringStatusBlockedSafebrowsing = "blocked_safebrowsing" // blocked by safebrowsing
|
|
|
|
filteringStatusBlockedParental = "blocked_parental" // blocked by parental control
|
|
|
|
filteringStatusWhitelisted = "whitelisted" // whitelisted
|
|
|
|
filteringStatusRewritten = "rewritten" // all kinds of rewrites
|
|
|
|
filteringStatusSafeSearch = "safe_search" // enforced safe search
|
2020-05-28 15:14:50 +01:00
|
|
|
filteringStatusProcessed = "processed" // not blocked, not white-listed entries
|
2020-05-26 13:37:37 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// filteringStatusValues -- array with all possible filteringStatus values
|
|
|
|
var filteringStatusValues = []string{
|
|
|
|
filteringStatusAll, filteringStatusFiltered, filteringStatusBlocked,
|
|
|
|
filteringStatusBlockedSafebrowsing, filteringStatusBlockedParental,
|
|
|
|
filteringStatusWhitelisted, filteringStatusRewritten, filteringStatusSafeSearch,
|
2020-05-28 15:14:50 +01:00
|
|
|
filteringStatusProcessed,
|
2020-05-26 13:37:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// searchCriteria - every search request may contain a list of different search criteria
|
|
|
|
// we use each of them to match the query
|
|
|
|
type searchCriteria struct {
|
|
|
|
criteriaType criteriaType // type of the criteria
|
|
|
|
strict bool // should we strictly match (equality) or not (indexOf)
|
|
|
|
value string // search criteria value
|
|
|
|
}
|
|
|
|
|
|
|
|
// quickMatch - quickly checks if the log entry matches this search criteria
|
|
|
|
// the reason is to do it as quickly as possible without de-serializing the entry
|
|
|
|
func (c *searchCriteria) quickMatch(line string) bool {
|
|
|
|
// note that we do this only for a limited set of criteria
|
|
|
|
|
|
|
|
switch c.criteriaType {
|
2020-05-28 15:14:50 +01:00
|
|
|
case ctDomainOrClient:
|
|
|
|
return c.quickMatchJSONValue(line, "QH") ||
|
|
|
|
c.quickMatchJSONValue(line, "IP")
|
2020-05-26 13:37:37 +01:00
|
|
|
default:
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// quickMatchJSONValue - helper used by quickMatch
|
|
|
|
func (c *searchCriteria) quickMatchJSONValue(line string, propertyName string) bool {
|
|
|
|
val := readJSONValue(line, propertyName)
|
|
|
|
if len(val) == 0 {
|
|
|
|
return false
|
|
|
|
}
|
2020-07-03 10:21:09 +01:00
|
|
|
val = strings.ToLower(val)
|
|
|
|
searchVal := strings.ToLower(c.value)
|
2020-05-26 13:37:37 +01:00
|
|
|
|
2020-07-03 10:21:09 +01:00
|
|
|
if c.strict && searchVal == val {
|
2020-05-26 13:37:37 +01:00
|
|
|
return true
|
|
|
|
}
|
2020-07-03 10:21:09 +01:00
|
|
|
if !c.strict && strings.Contains(val, searchVal) {
|
2020-05-26 13:37:37 +01:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// match - checks if the log entry matches this search criteria
|
|
|
|
// nolint (gocyclo)
|
|
|
|
func (c *searchCriteria) match(entry *logEntry) bool {
|
|
|
|
switch c.criteriaType {
|
2020-05-28 15:14:50 +01:00
|
|
|
case ctDomainOrClient:
|
2020-07-03 10:21:09 +01:00
|
|
|
qhost := strings.ToLower(entry.QHost)
|
|
|
|
searchVal := strings.ToLower(c.value)
|
|
|
|
if c.strict && qhost == searchVal {
|
2020-05-26 13:37:37 +01:00
|
|
|
return true
|
|
|
|
}
|
2020-07-03 10:21:09 +01:00
|
|
|
if !c.strict && strings.Contains(qhost, searchVal) {
|
2020-05-26 13:37:37 +01:00
|
|
|
return true
|
|
|
|
}
|
2020-05-28 15:14:50 +01:00
|
|
|
|
2020-05-26 13:37:37 +01:00
|
|
|
if c.strict && entry.IP == c.value {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
if !c.strict && strings.Contains(entry.IP, c.value) {
|
|
|
|
return true
|
|
|
|
}
|
2020-05-28 15:14:50 +01:00
|
|
|
|
2020-05-26 13:37:37 +01:00
|
|
|
return false
|
2020-05-28 15:14:50 +01:00
|
|
|
|
2020-05-26 13:37:37 +01:00
|
|
|
case ctFilteringStatus:
|
|
|
|
res := entry.Result
|
|
|
|
|
|
|
|
switch c.value {
|
|
|
|
case filteringStatusAll:
|
|
|
|
return true
|
|
|
|
case filteringStatusFiltered:
|
2020-06-16 09:47:26 +01:00
|
|
|
return res.IsFiltered ||
|
|
|
|
res.Reason == dnsfilter.NotFilteredWhiteList ||
|
|
|
|
res.Reason == dnsfilter.ReasonRewrite ||
|
|
|
|
res.Reason == dnsfilter.RewriteEtcHosts
|
2020-05-26 13:37:37 +01:00
|
|
|
case filteringStatusBlocked:
|
|
|
|
return res.IsFiltered &&
|
|
|
|
(res.Reason == dnsfilter.FilteredBlackList ||
|
|
|
|
res.Reason == dnsfilter.FilteredBlockedService)
|
|
|
|
case filteringStatusBlockedParental:
|
|
|
|
return res.IsFiltered && res.Reason == dnsfilter.FilteredParental
|
|
|
|
case filteringStatusBlockedSafebrowsing:
|
|
|
|
return res.IsFiltered && res.Reason == dnsfilter.FilteredSafeBrowsing
|
|
|
|
case filteringStatusWhitelisted:
|
2020-06-16 09:47:26 +01:00
|
|
|
return res.Reason == dnsfilter.NotFilteredWhiteList
|
2020-05-26 13:37:37 +01:00
|
|
|
case filteringStatusRewritten:
|
2020-06-16 09:47:26 +01:00
|
|
|
return (res.Reason == dnsfilter.ReasonRewrite ||
|
|
|
|
res.Reason == dnsfilter.RewriteEtcHosts)
|
2020-05-26 13:37:37 +01:00
|
|
|
case filteringStatusSafeSearch:
|
|
|
|
return res.IsFiltered && res.Reason == dnsfilter.FilteredSafeSearch
|
2020-05-28 15:14:50 +01:00
|
|
|
|
|
|
|
case filteringStatusProcessed:
|
|
|
|
return !(res.Reason == dnsfilter.FilteredBlackList ||
|
|
|
|
res.Reason == dnsfilter.FilteredBlockedService ||
|
|
|
|
res.Reason == dnsfilter.NotFilteredWhiteList)
|
|
|
|
|
2020-05-26 13:37:37 +01:00
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|