docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
<mask> b := &strings.Builder{} <mask> encoder := hex.NewEncoder(b) <mask> <mask> for hash := range c.hashToHost { <mask> // Ignore errors, since strings.(*Buffer).Write never returns <mask> // errors. <mask> // <mask> // TODO(e.burkov, a.garipov): Find out and document why exactly <mask> // this ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsfilter/safebrowsing.go
aghstrings.WriteToBuilder(b, hex.EncodeToString(hash[0:2]), ".")
<mask> // errors. <mask> // <mask> // TODO(e.burkov, a.garipov): Find out and document why exactly <mask> // this slice. <mask> _, _ = encoder.Write(hash[0:2]) <mask> _, _ = b.WriteRune('.') <mask> } <mask> <mask> if c.svc == "SafeBrowsing" { <mask> // See comment above. <mask> _, _ = b.Wr...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsfilter/safebrowsing.go
aghstrings.WriteToBuilder(b, sbTXTSuffix)
<mask> _, _ = b.WriteRune('.') <mask> } <mask> <mask> if c.svc == "SafeBrowsing" { <mask> // See comment above. <mask> _, _ = b.WriteString(sbTXTSuffix) <mask> return b.String() <mask> } <mask> <mask> // See comment above. <mask> _, _ = b.WriteString(pcTXTSuffix) </s> Pull request: 2704 local...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsfilter/safebrowsing.go
aghstrings.WriteToBuilder(b, pcTXTSuffix)
<mask> _, _ = b.WriteString(sbTXTSuffix) <mask> return b.String() <mask> } <mask> <mask> // See comment above. <mask> _, _ = b.WriteString(pcTXTSuffix) <mask> return b.String() <mask> } <mask> <mask> // Find the target hash in TXT response <mask> func (c *sbCtx) processTXT(resp *dns.Msg) (bool, [][...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsfilter/safebrowsing.go
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "net/http" <mask> "strings" <mask> "sync" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/AdguardTeam/urlfilter" <mask> "github.com/AdguardTeam/urlfilter/filterlist" <mask> ) <mask> <mask> type accessCtx struct { </s> Pull request: 2704 local addresses vol.3 Merge in DNS/...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/access.go
b := &strings.Builder{}
<mask> if err != nil { <mask> return err <mask> } <mask> <mask> buf := strings.Builder{} <mask> for _, s := range blockedHosts { <mask> buf.WriteString(s) <mask> buf.WriteString("\n") <mask> } <mask> </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-address...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/access.go
aghstrings.WriteToBuilder(b, s, "\n")
<mask> } <mask> <mask> buf := strings.Builder{} <mask> for _, s := range blockedHosts { <mask> buf.WriteString(s) <mask> buf.WriteString("\n") <mask> } <mask> <mask> listArray := []filterlist.RuleList{} <mask> list := &filterlist.StringRuleList{ <mask> ID: int(0), </s> Pull request...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/access.go
RulesText: b.String(),
<mask> <mask> listArray := []filterlist.RuleList{} <mask> list := &filterlist.StringRuleList{ <mask> ID: int(0), <mask> RulesText: buf.String(), <mask> IgnoreCosmetic: true, <mask> } <mask> listArray = append(listArray, list) <mask> rulesStorage, err := filterlist.NewRuleStorage(li...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/access.go
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "sort" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/ameshkov/dnscrypt/v2" <mask> ) </s> Pull request: 2704 local ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/config.go
<mask> "net/http" <mask> "sort" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/log" <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/config.go
// ResolveClients signals if the RDNS should resolve clients' addresses. ResolveClients bool // LocalPTRResolvers is a slice of addresses to be used as upstreams for // resolving PTR queries for local addresses. LocalPTRResolvers []string
<mask> // Register an HTTP handler <mask> HTTPRegister func(string, string, func(http.ResponseWriter, *http.Request)) <mask> } <mask> <mask> // if any of ServerConfig values are zero, then default values from below are used <mask> var defaultValues = ServerConfig{ </s> Pull request: 2704 local addresses vol.3...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/config.go
s := aghstrings.SplitNext(&d, '\n')
<mask> return err <mask> } <mask> d := string(data) <mask> for len(d) != 0 { <mask> s := util.SplitNext(&d, '\n') <mask> upstreams = append(upstreams, s) <mask> } <mask> log.Debug("dns: using %d upstream servers from file %s", len(upstreams), s.conf.UpstreamDNSFileName) <mask> } else { <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/config.go
// Disable redundant filtering. filterSetts := s.getClientRequestFilteringSettings(ctx) filterSetts.ParentalEnabled = false filterSetts.SafeBrowsingEnabled = false filterSetts.SafeSearchEnabled = false filterSetts.ServicesRules = nil ctx.setts = filterSetts
<mask> <mask> // Do not perform unreversing ever again. <mask> ctx.unreversedReqIP = ip <mask> <mask> // Nothing to restrict. <mask> return resultCodeSuccess <mask> } <mask> <mask> // ipToHost tries to get a hostname leased by DHCP. It's safe for concurrent </s> Pull request: 2704 local addresses vol....
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dns.go
if ctx.setts == nil { ctx.setts = s.getClientRequestFilteringSettings(ctx) }
<mask> <mask> var err error <mask> ctx.protectionEnabled = s.conf.ProtectionEnabled && s.dnsFilter != nil <mask> if ctx.protectionEnabled { <mask> ctx.setts = s.getClientRequestFilteringSettings(ctx) <mask> ctx.result, err = s.filterDNSRequest(ctx) <mask> } <mask> s.RUnlock() <mask> <mask> if err ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dns.go
"strings"
<mask> "net/http" <mask> "os" <mask> "runtime" <mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings" </s> Pull request: 2704 local addre...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
"github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardH...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog" <mask...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
<mask> Stats stats.Stats <mask> QueryLog querylog.QueryLog <mask> DHCPServer dhcpd.ServerInterface <mask> SubnetDetector *aghnet.SubnetDetector <mask> LocalResolvers aghnet.Exchanger <mask> AutohostTLD string <mask> } <mask> <mask> // tldToSuffix converts a top-level domain into an...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
<mask> dnsFilter: p.DNSFilter, <mask> stats: p.Stats, <mask> queryLog: p.QueryLog, <mask> subnetDetector: p.SubnetDetector, <mask> localResolvers: p.LocalResolvers, <mask> autohostSuffix: autohostSuffix, <mask> } <mask> <mask> if p.DHCPServer != nil { <mask> s.dhcpServer =...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
c.RatelimitWhitelist = aghstrings.CloneSlice(sc.RatelimitWhitelist) c.BootstrapDNS = aghstrings.CloneSlice(sc.BootstrapDNS) c.AllowedClients = aghstrings.CloneSlice(sc.AllowedClients) c.DisallowedClients = aghstrings.CloneSlice(sc.DisallowedClients) c.BlockedHosts = aghstrings.CloneSlice(sc.BlockedHosts) c.Upstre...
<mask> func (s *Server) WriteDiskConfig(c *FilteringConfig) { <mask> s.RLock() <mask> sc := s.conf.FilteringConfig <mask> *c = sc <mask> c.RatelimitWhitelist = stringArrayDup(sc.RatelimitWhitelist) <mask> c.BootstrapDNS = stringArrayDup(sc.BootstrapDNS) <mask> c.AllowedClients = stringArrayDup(sc.AllowedCl...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
// RDNSSettings returns the copy of actual RDNS configuration. func (s *Server) RDNSSettings() (localPTRResolvers []string, resolveClients bool) { s.RLock() defer s.RUnlock() return aghstrings.CloneSlice(s.conf.LocalPTRResolvers), s.conf.ResolveClients }
<mask> } <mask> <mask> // Resolve - get IP addresses by host name from an upstream server. <mask> // No request/response filtering is performed. <mask> // Query log and Stats are not updated. <mask> // This method may be called before Start(). <mask> func (s *Server) Resolve(host string) ([]net.IPAddr, error) {...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
// RDNSExchanger is a resolver for clients' addresses. type RDNSExchanger interface { // Exchange tries to resolve the ip in a suitable way, e.g. either as // local or as external. Exchange(ip net.IP) (host string, err error) } const ( // rDNSEmptyAnswerErr is returned by Exchange method when the answer // sectio...
<mask> defer s.RUnlock() <mask> return s.internalProxy.LookupIPAddr(host) <mask> } <mask> <mask> // Exchange - send DNS request to an upstream server and receive response <mask> // No request/response filtering is performed. <mask> // Query log and Stats are not updated. <mask> // This method may be called b...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
if !s.conf.ResolveClients { return "", nil } arpa := dns.Fqdn(aghnet.ReverseAddr(ip)) req := &dns.Msg{ MsgHdr: dns.MsgHdr{ Id: dns.Id(), RecursionDesired: true, }, Compress: true, Question: []dns.Question{{ Name: arpa, Qtype: dns.TypePTR, Qclass: dns.ClassINET, }}, } ...
<mask> func (s *Server) Exchange(req *dns.Msg) (*dns.Msg, error) { <mask> s.RLock() <mask> defer s.RUnlock() <mask> <mask> ctx := &proxy.DNSContext{ <mask> Proto: "udp", <mask> Req: req, <mask> StartTime: time.Now(), <mask> } <mask> err := s.internalProxy.Resolve(ctx) <mask> if err != ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
<mask> Proto: "udp", <mask> Req: req, <mask> StartTime: time.Now(), <mask> } <mask> err := s.internalProxy.Resolve(ctx) <mask> if err != nil { <mask> return nil, err <mask> } <mask> return ctx.Res, nil <mask> } </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home fr...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
return "", err
<mask> StartTime: time.Now(), <mask> } <mask> err := s.internalProxy.Resolve(ctx) <mask> if err != nil { <mask> return nil, err <mask> } <mask> return ctx.Res, nil <mask> } <mask> <mask> // Start starts the DNS server. </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 27...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
if len(resp.Answer) == 0 { return "", fmt.Errorf("lookup for %q: %w", arpa, rDNSEmptyAnswerErr) } ptr, ok := resp.Answer[0].(*dns.PTR) if !ok { return "", fmt.Errorf("type checking: %w", rDNSNotPTRErr) } return strings.TrimSuffix(ptr.Ptr, "."), nil
<mask> err := s.internalProxy.Resolve(ctx) <mask> if err != nil { <mask> return nil, err <mask> } <mask> return ctx.Res, nil <mask> } <mask> <mask> // Start starts the DNS server. <mask> func (s *Server) Start() error { <mask> s.Lock() </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adgua...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
err = s.setupResolvers(s.conf.LocalPTRResolvers) if err != nil { return fmt.Errorf("setting up resolvers: %w", err) }
<mask> <mask> // Create the main DNS proxy instance <mask> // -- <mask> s.dnsProxy = &proxy.Proxy{Config: proxyConfig} <mask> return nil <mask> } <mask> <mask> // Stop stops the DNS server. <mask> func (s *Server) Stop() error { <mask> s.Lock() </s> Pull request: 2704 local addresses vol.3 Merge in D...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward.go
"github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "testing" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/Adgu...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward_test.go
<mask> var s *Server <mask> s, err = NewServer(DNSCreateParams{ <mask> DNSFilter: f, <mask> SubnetDetector: snd, <mask> LocalResolvers: &aghtest.Exchanger{}, <mask> }) <mask> require.NoError(t, err) <mask> <mask> s.conf = forwardConf <mask> </s> Pull request: 2704 local addresses vol.3 Mer...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward_test.go
s.Lock() defer s.Unlock() s.localResolvers = &aghtest.Exchanger{}
<mask> err = s.Prepare(nil) <mask> require.NoError(t, err) <mask> <mask> return s <mask> } <mask> <mask> func createServerTLSConfig(t *testing.T) (*tls.Config, []byte, []byte) { <mask> t.Helper() <mask> </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-v...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward_test.go
<mask> var s *Server <mask> s, err = NewServer(DNSCreateParams{ <mask> DNSFilter: dnsfilter.New(&dnsfilter.Config{}, filters), <mask> SubnetDetector: snd, <mask> LocalResolvers: &aghtest.Exchanger{}, <mask> }) <mask> require.NoError(t, err) <mask> <mask> conf := &ServerConfig{ <mask> UDPLis...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward_test.go
<mask> var s *Server <mask> s, err = NewServer(DNSCreateParams{ <mask> DNSFilter: f, <mask> SubnetDetector: snd, <mask> LocalResolvers: &aghtest.Exchanger{}, <mask> }) <mask> require.NoError(t, err) <mask> <mask> assert.NoError(t, s.Prepare(&ServerConfig{ <mask> UDPListenAddrs: []*net.UDPAd...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward_test.go
<mask> s, err = NewServer(DNSCreateParams{ <mask> DNSFilter: dnsfilter.New(&dnsfilter.Config{}, nil), <mask> DHCPServer: &testDHCP{}, <mask> SubnetDetector: snd, <mask> LocalResolvers: &aghtest.Exchanger{}, <mask> }) <mask> require.NoError(t, err) <mask> <mask> s.conf.UDPListenAddrs = []*...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward_test.go
<mask> var s *Server <mask> s, err = NewServer(DNSCreateParams{ <mask> DNSFilter: dnsfilter.New(&c, nil), <mask> SubnetDetector: snd, <mask> LocalResolvers: &aghtest.Exchanger{}, <mask> }) <mask> require.NoError(t, err) <mask> <mask> s.conf.UDPListenAddrs = []*net.UDPAddr{{}} <mask> s.conf.T...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/dnsforward_test.go
// filterDNSRequest applies the dnsFilter and sets d.Res if the request was // filtered.
<mask> <mask> return &setts <mask> } <mask> <mask> // filterDNSRequest applies the dnsFilter and sets d.Res if the request <mask> // was filtered. <mask> func (s *Server) filterDNSRequest(ctx *dnsContext) (*dnsfilter.Result, error) { <mask> d := ctx.proxyCtx <mask> // TODO(e.burkov): Consistently use req ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/filter.go
res, err := s.dnsFilter.CheckHost(host, req.Question[0].Qtype, ctx.setts)
<mask> // TODO(e.burkov): Consistently use req instead of d.Req since it is <mask> // declared. <mask> req := d.Req <mask> host := strings.TrimSuffix(req.Question[0].Name, ".") <mask> res, err := s.dnsFilter.CheckHost(host, d.Req.Question[0].Qtype, ctx.setts) <mask> if err != nil { <mask> // Return immed...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/filter.go
ctx.origQuestion = req.Question[0] req.Question[0].Name = dns.Fqdn(res.CanonName)
<mask> len(res.IPList) == 0 { <mask> // Resolve the new canonical name, not the original host <mask> // name. The original question is readded in <mask> // processFilteringAfterResponse. <mask> ctx.origQuestion = d.Req.Question[0] <mask> d.Req.Question[0].Name = dns.Fqdn(res.CanonName) <mask> } els...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/filter.go
} else if res.Reason.In(dnsfilter.Rewritten, dnsfilter.RewrittenAutoHosts) {
<mask> resp.Answer = append(resp.Answer, ptr) <mask> } <mask> <mask> d.Res = resp <mask> } else if res.Reason == dnsfilter.Rewritten || res.Reason == dnsfilter.RewrittenAutoHosts { <mask> resp := s.makeResponse(req) <mask> <mask> name := host <mask> if len(res.CanonName) != 0 { <mask> resp....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/filter.go
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "strings" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/m...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
ProtectionEnabled *bool `json:"protection_enabled"` RateLimit *uint32 `json:"ratelimit"` BlockingMode *string `json:"blocking_mode"` BlockingIPv4 net.IP `json:"blocking_ipv4"` BlockingIPv6 net.IP `json:"blocking_ipv6"` EDNSCSEnabled *bool `json:"edns_cs_enabled"` DNSS...
<mask> Upstreams *[]string `json:"upstream_dns"` <mask> UpstreamsFile *string `json:"upstream_dns_file"` <mask> Bootstraps *[]string `json:"bootstrap_dns"` <mask> <mask> ProtectionEnabled *bool `json:"protection_enabled"` <mask> RateLimit *uint32 `json:"ratelimit"` <mask> BlockingMode ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
defer s.RUnlock() upstreams := aghstrings.CloneSliceOrEmpty(s.conf.UpstreamDNS)
<mask> } <mask> <mask> func (s *Server) getDNSConfig() dnsConfig { <mask> s.RLock() <mask> upstreams := stringArrayDup(s.conf.UpstreamDNS) <mask> upstreamFile := s.conf.UpstreamDNSFileName <mask> bootstraps := stringArrayDup(s.conf.BootstrapDNS) <mask> protectionEnabled := s.conf.ProtectionEnabled <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
bootstraps := aghstrings.CloneSliceOrEmpty(s.conf.BootstrapDNS)
<mask> func (s *Server) getDNSConfig() dnsConfig { <mask> s.RLock() <mask> upstreams := stringArrayDup(s.conf.UpstreamDNS) <mask> upstreamFile := s.conf.UpstreamDNSFileName <mask> bootstraps := stringArrayDup(s.conf.BootstrapDNS) <mask> protectionEnabled := s.conf.ProtectionEnabled <mask> blockingMode := s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
blockingIPv4 := s.conf.BlockingIPv4 blockingIPv6 := s.conf.BlockingIPv6 ratelimit := s.conf.Ratelimit enableEDNSClientSubnet := s.conf.EnableEDNSClientSubnet enableDNSSEC := s.conf.EnableDNSSEC aaaaDisabled := s.conf.AAAADisabled cacheSize := s.conf.CacheSize cacheMinTTL := s.conf.CacheMinTTL cacheMaxTTL := s....
<mask> upstreamFile := s.conf.UpstreamDNSFileName <mask> bootstraps := stringArrayDup(s.conf.BootstrapDNS) <mask> protectionEnabled := s.conf.ProtectionEnabled <mask> blockingMode := s.conf.BlockingMode <mask> BlockingIPv4 := s.conf.BlockingIPv4 <mask> BlockingIPv6 := s.conf.BlockingIPv6 <mask> Ratelimit ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
<mask> upstreamMode = "fastest_addr" <mask> } else if s.conf.AllServers { <mask> upstreamMode = "parallel" <mask> } <mask> s.RUnlock() <mask> return dnsConfig{ <mask> Upstreams: &upstreams, <mask> UpstreamsFile: &upstreamFile, <mask> Bootstraps: &bootstraps, <mask> Protectio...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
BlockingIPv4: blockingIPv4, BlockingIPv6: blockingIPv6, RateLimit: &ratelimit, EDNSCSEnabled: &enableEDNSClientSubnet, DNSSECEnabled: &enableDNSSEC, DisableIPv6: &aaaaDisabled, CacheSize: &cacheSize, CacheMinTTL: &cacheMinTTL, CacheMaxTTL: &cacheMaxT...
<mask> UpstreamsFile: &upstreamFile, <mask> Bootstraps: &bootstraps, <mask> ProtectionEnabled: &protectionEnabled, <mask> BlockingMode: &blockingMode, <mask> BlockingIPv4: BlockingIPv4, <mask> BlockingIPv6: BlockingIPv6, <mask> RateLimit: &Ratelimit, <mask> EDNS...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
ResolveClients: &resolveClients, LocalPTRUpstreams: &localPTRUpstreams,
<mask> CacheMaxTTL: &cacheMaxTTL, <mask> UpstreamMode: &upstreamMode, <mask> } <mask> } <mask> <mask> func (s *Server) handleGetConfig(w http.ResponseWriter, r *http.Request) { <mask> resp := s.getDNSConfig() <mask> </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home fro...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
if dc.LocalPTRUpstreams != nil { s.conf.LocalPTRResolvers = *dc.LocalPTRUpstreams restart = true }
<mask> s.conf.UpstreamDNS = *dc.Upstreams <mask> restart = true <mask> } <mask> <mask> if dc.UpstreamsFile != nil { <mask> s.conf.UpstreamDNSFileName = *dc.UpstreamsFile <mask> restart = true <mask> } <mask> <mask> if dc.Bootstraps != nil { </s> Pull request: 2704 local addresses vol.3 Merge i...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
if dc.ResolveClients != nil { s.conf.ResolveClients = *dc.ResolveClients }
<mask> s.conf.AllServers = *dc.UpstreamMode == "parallel" <mask> s.conf.FastestAddr = *dc.UpstreamMode == "fastest_addr" <mask> } <mask> <mask> return s.setConfigRestartable(dc) <mask> } <mask> <mask> // upstreamJSON is a request body for handleTestUpstreamDNS endpoint. </s> Pull request: 2704 local ad...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
// upstreamJSON is a request body for handleTestUpstreamDNS endpoint.
<mask> <mask> return s.setConfigRestartable(dc) <mask> } <mask> <mask> type upstreamJSON struct { <mask> Upstreams []string `json:"upstream_dns"` <mask> BootstrapDNS []string `json:"bootstrap_dns"` <mask> PrivateUpstreams []string `json:"private_upstream"` </s> Pull request: 2704 local address...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
Upstreams []string `json:"upstream_dns"` BootstrapDNS []string `json:"bootstrap_dns"` PrivateUpstreams []string `json:"private_upstream"`
<mask> return s.setConfigRestartable(dc) <mask> } <mask> <mask> type upstreamJSON struct { <mask> Upstreams []string `json:"upstream_dns"` // Upstreams <mask> BootstrapDNS []string `json:"bootstrap_dns"` // Bootstrap DNS <mask> } <mask> <mask> // ValidateUpstreams validates each upstream and returns a...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
// ValidateUpstreams validates each upstream and returns an error if any // upstream is invalid or if there are no default upstreams specified. // // TODO(e.burkov): Move into aghnet or even into dnsproxy.
<mask> Upstreams []string `json:"upstream_dns"` // Upstreams <mask> BootstrapDNS []string `json:"bootstrap_dns"` // Bootstrap DNS <mask> } <mask> <mask> // ValidateUpstreams validates each upstream and returns an error if any upstream is invalid or if there are no default upstreams specified <mask> func Va...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
// excFunc is a signature of function to check if upstream exchanges correctly. type excFunc func(u upstream.Upstream) (err error) // checkDNSUpstreamExc checks if the DNS upstream exchanges correctly. func checkDNSUpstreamExc(u upstream.Upstream) (err error) { req := &dns.Msg{ MsgHdr: dns.MsgHdr{ Id: ...
<mask> <mask> return nil <mask> } <mask> <mask> func (s *Server) handleTestUpstreamDNS(w http.ResponseWriter, r *http.Request) { <mask> req := upstreamJSON{} <mask> err := json.NewDecoder(r.Body).Decode(&req) <mask> if err != nil { <mask> httpError(r, w, http.StatusBadRequest, "Failed to read request b...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
return fmt.Errorf("couldn't communicate with upstream: %w", err)
<mask> func (s *Server) handleTestUpstreamDNS(w http.ResponseWriter, r *http.Request) { <mask> req := upstreamJSON{} <mask> err := json.NewDecoder(r.Body).Decode(&req) <mask> if err != nil { <mask> httpError(r, w, http.StatusBadRequest, "Failed to read request body: %s", err) <mask> return <mask> } <mas...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
if len(reply.Answer) != 1 { return fmt.Errorf("wrong response") }
<mask> httpError(r, w, http.StatusBadRequest, "Failed to read request body: %s", err) <mask> return <mask> } <mask> <mask> result := map[string]string{} <mask> <mask> for _, host := range req.Upstreams { <mask> err = checkDNS(host, req.BootstrapDNS) <mask> if err != nil { <mask> log.Info("%v",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
if t, ok := reply.Answer[0].(*dns.A); ok { if !net.IPv4(8, 8, 8, 8).Equal(t.A) { return fmt.Errorf("wrong response")
<mask> } <mask> <mask> result := map[string]string{} <mask> <mask> for _, host := range req.Upstreams { <mask> err = checkDNS(host, req.BootstrapDNS) <mask> if err != nil { <mask> log.Info("%v", err) <mask> result[host] = err.Error() <mask> } else { <mask> result[host] = "OK" <mask> } ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
return nil } // checkPrivateUpstreamExc checks if the upstream for resolving private // addresses exchanges correctly. func checkPrivateUpstreamExc(u upstream.Upstream) (err error) { req := &dns.Msg{ MsgHdr: dns.MsgHdr{ Id: dns.Id(), RecursionDesired: true, }, Question: []dns.Question{{ ...
<mask> result[host] = "OK" <mask> } <mask> } <mask> <mask> jsonVal, err := json.Marshal(result) <mask> if err != nil { <mask> httpError(r, w, http.StatusInternalServerError, "Unable to marshal status json: %s", err) <mask> return <mask> } <mask> <mask> w.Header().Set("Content-Type", "applicat...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
if _, err = u.Exchange(req); err != nil { return fmt.Errorf("couldn't communicate with upstream: %w", err)
<mask> httpError(r, w, http.StatusInternalServerError, "Unable to marshal status json: %s", err) <mask> return <mask> } <mask> <mask> w.Header().Set("Content-Type", "application/json") <mask> _, err = w.Write(jsonVal) <mask> if err != nil { <mask> httpError(r, w, http.StatusInternalServerError, "Coul...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
return nil
<mask> <mask> if _, err = u.Exchange(req); err != nil { <mask> return fmt.Errorf("couldn't communicate with upstream: %w", err) <mask> } <mask> } <mask> <mask> func checkDNS(input string, bootstrap []string, ef excFunc) (err error) { <mask> if !isUpstream(input) { </s> Pull request: 2704 local addresses...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
func checkDNS(input string, bootstrap []string, ef excFunc) (err error) {
<mask> return <mask> } <mask> } <mask> <mask> func checkDNS(input string, bootstrap []string) error { <mask> if !isUpstream(input) { <mask> return nil <mask> } <mask> <mask> // separate upstream from domains list </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-loc...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
// Separate upstream from domains list. var useDefault bool if input, useDefault, err = separateUpstream(input); err != nil {
<mask> if !isUpstream(input) { <mask> return nil <mask> } <mask> <mask> // separate upstream from domains list <mask> input, useDefault, err := separateUpstream(input) <mask> if err != nil { <mask> return fmt.Errorf("wrong upstream format: %w", err) <mask> } <mask> <mask> // No need to check thi...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
// No need to check this DNS server.
<mask> if err != nil { <mask> return fmt.Errorf("wrong upstream format: %w", err) <mask> } <mask> <mask> // No need to check this DNS server <mask> if !useDefault { <mask> return nil <mask> } <mask> <mask> if _, err = validateUpstream(input); err != nil { </s> Pull request: 2704 local addresses v...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
log.Debug("checking if dns server %q works...", input) var u upstream.Upstream u, err = upstream.AddressToUpstream(input, upstream.Options{ Bootstrap: bootstrap, Timeout: DefaultTimeout, })
<mask> if len(bootstrap) == 0 { <mask> bootstrap = defaultBootstrap <mask> } <mask> <mask> log.Debug("checking if dns %s works...", input) <mask> u, err := upstream.AddressToUpstream(input, upstream.Options{Bootstrap: bootstrap, Timeout: DefaultTimeout}) <mask> if err != nil { <mask> return fmt.Errorf...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
return fmt.Errorf("failed to choose upstream for %q: %w", input, err)
<mask> <mask> log.Debug("checking if dns %s works...", input) <mask> u, err := upstream.AddressToUpstream(input, upstream.Options{Bootstrap: bootstrap, Timeout: DefaultTimeout}) <mask> if err != nil { <mask> return fmt.Errorf("failed to choose upstream for %s: %w", input, err) <mask> } <mask> <mask> re...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
if err = ef(u); err != nil { return fmt.Errorf("upstream %q fails to exchange: %w", input, err)
<mask> if err != nil { <mask> return fmt.Errorf("failed to choose upstream for %s: %w", input, err) <mask> } <mask> <mask> req := dns.Msg{} <mask> req.Id = dns.Id() <mask> req.RecursionDesired = true <mask> req.Question = []dns.Question{ <mask> {Name: "google-public-dns-a.google.com.", Qtype: dns.Ty...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
log.Debug("dns %s works OK", input) return nil } func (s *Server) handleTestUpstreamDNS(w http.ResponseWriter, r *http.Request) { req := &upstreamJSON{} err := json.NewDecoder(r.Body).Decode(req)
<mask> req.RecursionDesired = true <mask> req.Question = []dns.Question{ <mask> {Name: "google-public-dns-a.google.com.", Qtype: dns.TypeA, Qclass: dns.ClassINET}, <mask> } <mask> reply, err := u.Exchange(&req) <mask> if err != nil { <mask> return fmt.Errorf("couldn't communicate with dns server %s: %w"...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
httpError(r, w, http.StatusBadRequest, "Failed to read request body: %s", err) return
<mask> {Name: "google-public-dns-a.google.com.", Qtype: dns.TypeA, Qclass: dns.ClassINET}, <mask> } <mask> reply, err := u.Exchange(&req) <mask> if err != nil { <mask> return fmt.Errorf("couldn't communicate with dns server %s: %w", input, err) <mask> } <mask> if len(reply.Answer) != 1 { <mask> retur...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
result := map[string]string{} bootstraps := req.BootstrapDNS for _, host := range req.Upstreams { err = checkDNS(host, bootstraps, checkDNSUpstreamExc) if err != nil { log.Info("%v", err) result[host] = err.Error() continue } result[host] = "OK"
<mask> reply, err := u.Exchange(&req) <mask> if err != nil { <mask> return fmt.Errorf("couldn't communicate with dns server %s: %w", input, err) <mask> } <mask> if len(reply.Answer) != 1 { <mask> return fmt.Errorf("dns server %s returned wrong answer", input) <mask> } <mask> if t, ok := reply.Answer[0...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
for _, host := range req.PrivateUpstreams { err = checkDNS(host, bootstraps, checkPrivateUpstreamExc) if err != nil { log.Info("%v", err) // TODO(e.burkov): If passed upstream have already // written an error above, we rewriting the error for // it. These cases should be handled properly instead. r...
<mask> } <mask> if len(reply.Answer) != 1 { <mask> return fmt.Errorf("dns server %s returned wrong answer", input) <mask> } <mask> if t, ok := reply.Answer[0].(*dns.A); ok { <mask> if !net.IPv4(8, 8, 8, 8).Equal(t.A) { <mask> return fmt.Errorf("dns server %s returned wrong answer: %v", input, t.A) <m...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
result[host] = "OK"
<mask> result[host] = err.Error() <mask> <mask> continue <mask> } <mask> } <mask> <mask> jsonVal, err := json.Marshal(result) <mask> if err != nil { <mask> httpError(r, w, http.StatusInternalServerError, "Unable to marshal status json: %s", err) <mask> </s> Pull request: 2704 local addresses ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
jsonVal, err := json.Marshal(result) if err != nil { httpError(r, w, http.StatusInternalServerError, "Unable to marshal status json: %s", err) return } w.Header().Set("Content-Type", "application/json") _, err = w.Write(jsonVal) if err != nil { httpError(r, w, http.StatusInternalServerError, "Couldn't wri...
<mask> return fmt.Errorf("dns server %s returned wrong answer: %v", input, t.A) <mask> } <mask> } <mask> <mask> log.Debug("dns %s works OK", input) <mask> return nil <mask> } <mask> <mask> // Control flow: <mask> // web <mask> // -> dnsforward.handleDOH -> dnsforward.ServeHTTP </s> Pull request: ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http.go
"bytes" "encoding/json"
<mask> package dnsforward <mask> <mask> import ( <mask> "io/ioutil" <mask> "net" <mask> "net/http" <mask> "net/http/httptest" <mask> "os" </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master Updates #2704. Updates #2829. Updates #2928. Squas...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
"os" "path/filepath"
<mask> "io/ioutil" <mask> "net" <mask> "net/http" <mask> "net/http/httptest" <mask> "strings" <mask> "testing" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" </s> Pull request: 2704 local...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
func loadTestData(t *testing.T, casesFileName string, cases interface{}) { t.Helper() var f *os.File f, err := os.Open(filepath.Join("testdata", casesFileName)) require.NoError(t, err) t.Cleanup(func() { require.NoError(t, f.Close()) }) err = json.NewDecoder(f).Decode(cases) require.NoError(t, err) } const...
<mask> ) <mask> <mask> func TestDNSForwardHTTTP_handleGetConfig(t *testing.T) { <mask> filterConf := &dnsfilter.Config{ <mask> SafeBrowsingEnabled: true, <mask> SafeBrowsingCacheSize: 1000, <mask> SafeSearchEnabled: true, </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home fro...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> <mask> w := httptest.NewRecorder() <mask> <mask> testCases := []struct { <mask> name string <mask> conf func() ServerConfig <mask> want string <mask> }{{ <mask> name: "all_right", <mask> conf: func() ServerConfig { </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
name string
<mask> <mask> testCases := []struct { <mask> name string <mask> conf func() ServerConfig <mask> want string <mask> }{{ <mask> name: "all_right", <mask> conf: func() ServerConfig { <mask> return defaultConf <mask> }, </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home fr...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> name string <mask> conf func() ServerConfig <mask> want string <mask> }{{ <mask> name: "all_right", <mask> conf: func() ServerConfig { <mask> return defaultConf <mask> }, <mask> want: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
name: "all_right",
<mask> name: "all_right", <mask> conf: func() ServerConfig { <mask> return defaultConf <mask> }, <mask> want: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> return defaultConf <mask> }, <mask> want: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"bloc...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
name: "fastest_addr",
<mask> conf.FastestAddr = true <mask> <mask> return conf <mask> }, <mask> want: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> return conf <mask> }, <mask> want: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ip...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
name: "parallel",
<mask> conf.AllServers = true <mask> <mask> return conf <mask> }, <mask> want: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
var data map[string]json.RawMessage loadTestData(t, t.Name()+jsonExt, &data)
<mask> }, <mask> name: "parallel", <mask> }} <mask> <mask> for _, tc := range testCases { <mask> caseWant, ok := data[tc.name] <mask> require.True(t, ok) <mask> <mask> t.Run(tc.name, func(t *testing.T) { </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-add...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
caseWant, ok := data[tc.name] require.True(t, ok)
<mask> var data map[string]json.RawMessage <mask> loadTestData(t, t.Name()+jsonExt, &data) <mask> <mask> for _, tc := range testCases { <mask> t.Run(tc.name, func(t *testing.T) { <mask> t.Cleanup(w.Body.Reset) <mask> <mask> s.conf = tc.conf() <mask> s.handleGetConfig(w, nil) </s> Pull request:...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
assert.JSONEq(t, string(caseWant), w.Body.String())
<mask> s.conf = tc.conf() <mask> s.handleGetConfig(w, nil) <mask> <mask> assert.Equal(t, "application/json", w.Header().Get("Content-Type")) <mask> assert.Equal(t, tc.want, w.Body.String()) <mask> }) <mask> } <mask> } <mask> <mask> func TestDNSForwardHTTTP_handleSetConfig(t *testing.T) { </s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
t.Cleanup(func() {
<mask> defaultConf := s.conf <mask> <mask> err := s.Start() <mask> assert.Nil(t, err) <mask> defer func() { <mask> assert.Nil(t, s.Stop()) <mask> }() <mask> <mask> w := httptest.NewRecorder() <mask> </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
})
<mask> err := s.Start() <mask> assert.Nil(t, err) <mask> defer func() { <mask> assert.Nil(t, s.Stop()) <mask> }() <mask> <mask> w := httptest.NewRecorder() <mask> <mask> const defaultConfJSON = "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }() <mask> <mask> w := httptest.NewRecorder() <mask> <mask> const defaultConfJSON = "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> <mask> const defaultConfJSON = "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> testCases := []struct { <mask> name string <mask> req string <mask> wantSet string <mask> wantGet string <mask> }{{ <mask> name: "upstream_dns", <mask> req: "{\"upstream_dns\":[\"8.8.8.8:77\",\"8.8.4.4:77\"]}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet string <mask> wantGet string <mask> }{{ <mask> name: "upstream_dns", <mask> req: "{\"upstream_dns\":[\"8.8.8.8:77\",\"8.8.4.4:77\"]}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:77\",\"8.8.4.4:77\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }{{ <mask> name: "upstream_dns", <mask> req: "{\"upstream_dns\":[\"8.8.8.8:77\",\"8.8.4.4:77\"]}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:77\",\"8.8.4.4:77\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::f...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:77\",\"8.8.4.4:77\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "bootstraps", <mask> req: "{\"bootstrap_dns\":[\"9.9.9.10\"]}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",\"edns_cs_enabled\":false,\"dnssec_enabled\":false,\"d...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "blocking_mode_good", <mask> req: "{\"blocking_mode\":\"refused\"}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"pr...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"refused\",\"blocking_ipv4\":\"\",\"blocking_ipv6\...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "blocking_mode_bad", <mask> req: "{\"blocking_mode\":\"custom_ip\"}", <mask> wantSet: "blocking_mode: incorrect value\n", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "blocking_mode: incorrect value\n", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "ratelimit", <mask> req: "{\"ratelimit\":6}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":6,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go