docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
<mask> }, { <mask> name: "edns_cs_enabled", <mask> req: "{\"edns_cs_enabled\":true}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "dnssec_enabled", <mask> req: "{\"dnssec_enabled\":true}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_e...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "cache_size", <mask> req: "{\"cache_size\":1024}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\"...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "upstream_mode_parallel", <mask> req: "{\"upstream_mode\":\"parallel\"}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"]...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "upstream_mode_fastest_addr", <mask> req: "{\"upstream_mode\":\"fastest_addr\"}", <mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "", <mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "upstream_dns_bad", <mask> req: "{\"upstream_dns\":[\"\"]}", <mask> wantSet: "wrong upstreams specification: missing port in address\n", <mask> wantGet: defaultConfJSON, <mask> }, { <mask> name: "bootstraps_bad", <mask> req: "{\"bootstrap_dns\":[\"a\"]}", <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "wrong upstreams specification: missing port in address\n", <mask> wantGet: defaultConfJSON, <mask> }, { <mask> name: "bootstraps_bad", <mask> req: "{\"bootstrap_dns\":[\"a\"]}", <mask> wantSet: "a can not be used as bootstrap dns cause: invalid bootstrap server address: Resolver...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "bootstraps_bad", <mask> req: "{\"bootstrap_dns\":[\"a\"]}", <mask> wantSet: "a can not be used as bootstrap dns cause: invalid bootstrap server address: Resolver a is not eligible to be a bootstrap DNS server\n", <mask> wantGet: defaultConfJSON, <mask> }, { <mask> nam...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "a can not be used as bootstrap dns cause: invalid bootstrap server address: Resolver a is not eligible to be a bootstrap DNS server\n", <mask> wantGet: defaultConfJSON, <mask> }, { <mask> name: "cache_bad_ttl", <mask> req: "{\"cache_ttl_min\":1024,\"cache_ttl_max\":512}", <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> }, { <mask> name: "cache_bad_ttl", <mask> req: "{\"cache_ttl_min\":1024,\"cache_ttl_max\":512}", <mask> wantSet: "cache_ttl_min must be less or equal than cache_ttl_max\n", <mask> wantGet: defaultConfJSON, <mask> }, { <mask> name: "upstream_mode_bad", <mask> req: "{\"upstream_...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> wantSet: "cache_ttl_min must be less or equal than cache_ttl_max\n", <mask> wantGet: defaultConfJSON, <mask> }, { <mask> name: "upstream_mode_bad", <mask> req: "{\"upstream_mode\":\"somethingelse\"}", <mask> wantSet: "upstream_mode: incorrect value\n", <mask> wantGet: defaultConfJSON, ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
}, { name: "local_ptr_upstreams_good", wantSet: "", }, { name: "local_ptr_upstreams_null", wantSet: "",
<mask> }, { <mask> name: "upstream_mode_bad", <mask> req: "{\"upstream_mode\":\"somethingelse\"}", <mask> wantSet: "upstream_mode: incorrect value\n", <mask> wantGet: defaultConfJSON, <mask> }} <mask> <mask> for _, tc := range testCases { <mask> t.Run(tc.name, func(t *testing.T) { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
var data map[string]struct { Req json.RawMessage `json:"req"` Want json.RawMessage `json:"want"` } loadTestData(t, t.Name()+jsonExt, &data)
<mask> }} <mask> <mask> for _, tc := range testCases { <mask> caseData, ok := data[tc.name] <mask> require.True(t, ok) <mask> <mask> t.Run(tc.name, func(t *testing.T) { <mask> t.Cleanup(func() { </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-vol....
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
caseData, ok := data[tc.name] require.True(t, ok)
<mask> } <mask> loadTestData(t, t.Name()+jsonExt, &data) <mask> <mask> for _, tc := range testCases { <mask> t.Run(tc.name, func(t *testing.T) { <mask> t.Cleanup(func() { <mask> s.conf = defaultConf <mask> }) <mask> </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
rBody := ioutil.NopCloser(bytes.NewReader(caseData.Req))
<mask> t.Cleanup(func() { <mask> s.conf = defaultConf <mask> }) <mask> <mask> rBody := ioutil.NopCloser(strings.NewReader(tc.req)) <mask> var r *http.Request <mask> r, err = http.NewRequest(http.MethodPost, "http://example.com", rBody) <mask> require.Nil(t, err) <mask> <mask> s.hand...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
assert.JSONEq(t, string(caseData.Want), w.Body.String())
<mask> assert.Equal(t, tc.wantSet, w.Body.String()) <mask> w.Body.Reset() <mask> <mask> s.handleGetConfig(w, nil) <mask> assert.Equal(t, tc.wantGet, w.Body.String()) <mask> w.Body.Reset() <mask> }) <mask> } <mask> } <mask> </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguar...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/http_test.go
<mask> <mask> return "" <mask> } <mask> <mask> func stringArrayDup(a []string) []string { <mask> a2 := make([]string, len(a)) <mask> copy(a2, a) <mask> return a2 <mask> } <mask> <mask> // Find value in a sorted array <mask> func findSorted(ar []string, val string) int { <mask> i := sort.SearchStrin...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/dnsforward/util.go
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/clients.go
cy.Tags = aghstrings.CloneSlice(cli.Tags) cy.IDs = aghstrings.CloneSlice(cli.IDs) cy.BlockedServices = aghstrings.CloneSlice(cli.BlockedServices) cy.Upstreams = aghstrings.CloneSlice(cli.Upstreams)
<mask> SafeBrowsingEnabled: cli.SafeBrowsingEnabled, <mask> UseGlobalBlockedServices: !cli.UseOwnBlockedServices, <mask> } <mask> <mask> cy.Tags = copyStrings(cli.Tags) <mask> cy.IDs = copyStrings(cli.IDs) <mask> cy.BlockedServices = copyStrings(cli.BlockedServices) <mask> cy.Upstreams = c...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/clients.go
<mask> // Return false if the new source has higher priority. <mask> return source <= rc.Source <mask> } <mask> <mask> func copyStrings(a []string) (b []string) { <mask> return append(b, a...) <mask> } <mask> <mask> func toQueryLogWhois(wi *RuntimeClientWhoisInfo) (cw *querylog.ClientWhois) { <mask> if ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/clients.go
c.IDs = aghstrings.CloneSlice(c.IDs) c.Tags = aghstrings.CloneSlice(c.Tags) c.BlockedServices = aghstrings.CloneSlice(c.BlockedServices) c.Upstreams = aghstrings.CloneSlice(c.Upstreams)
<mask> if !ok { <mask> return nil, false <mask> } <mask> <mask> c.IDs = copyStrings(c.IDs) <mask> c.Tags = copyStrings(c.Tags) <mask> c.BlockedServices = copyStrings(c.BlockedServices) <mask> c.Upstreams = copyStrings(c.Upstreams) <mask> return c, true <mask> } <mask> <mask> // FindUpstreams look...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/clients.go
// ResolveClients enables and disables resolving clients with RDNS. ResolveClients bool `yaml:"resolve_clients"` // LocalPTRResolvers is the slice of addresses to be used as upstreams // for PTR queries for locally-served networks. LocalPTRResolvers []string `yaml:"local_ptr_upstreams"`
<mask> // "myhost.lan" when AutohostTLD is "lan". <mask> AutohostTLD string `yaml:"autohost_tld"` <mask> } <mask> <mask> type tlsConfigSettings struct { <mask> Enabled bool `yaml:"enabled" json:"enabled"` // Enabled is the encryption (DOT/DOH/HTTPS) status </s> Pull ...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/config.go
ResolveClients: true,
<mask> FilteringEnabled: true, // whether or not use filter lists <mask> FiltersUpdateIntervalHours: 24, <mask> AutohostTLD: "lan", <mask> }, <mask> TLS: tlsConfigSettings{ <mask> PortHTTPS: 443, <mask> PortDNSOverTLS: 853, // needs to be passed through to dnsproxy <m...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/config.go
if s := Context.dnsServer; s != nil {
<mask> Context.dnsFilter.WriteDiskConfig(&c) <mask> config.DNS.DnsfilterConf = c <mask> } <mask> <mask> if Context.dnsServer != nil { <mask> c := dnsforward.FilteringConfig{} <mask> Context.dnsServer.WriteDiskConfig(&c) <mask> config.DNS.FilteringConfig = c <mask> } <mask> </s> Pull request: 2...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/config.go
s.WriteDiskConfig(&c)
<mask> } <mask> <mask> if Context.dnsServer != nil { <mask> c := dnsforward.FilteringConfig{} <mask> Context.dnsServer.WriteDiskConfig(&c) <mask> config.DNS.FilteringConfig = c <mask> } <mask> <mask> if Context.dhcpServer != nil { <mask> c := dhcpd.ServerConfig{} </s> Pull request: 2704 local a...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/config.go
config.DNS.LocalPTRResolvers, config.DNS.ResolveClients = s.RDNSSettings()
<mask> s.WriteDiskConfig(&c) <mask> config.DNS.FilteringConfig = c <mask> } <mask> <mask> if Context.dhcpServer != nil { <mask> c := dhcpd.ServerConfig{} <mask> Context.dhcpServer.WriteDiskConfig(&c) </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-vo...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/config.go
<mask> DNSFilter: Context.dnsFilter, <mask> Stats: Context.stats, <mask> QueryLog: Context.queryLog, <mask> SubnetDetector: Context.subnetDetector, <mask> LocalResolvers: Context.localResolvers, <mask> AutohostTLD: config.DNS.AutohostTLD, <mask> } <mask> if Context.dhcpServe...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/dns.go
Context.rdns = NewRDNS(Context.dnsServer, &Context.clients)
<mask> closeDNSServer() <mask> return fmt.Errorf("dnsServer.Prepare: %w", err) <mask> } <mask> <mask> Context.rdns = NewRDNS(Context.dnsServer, &Context.clients, Context.subnetDetector, Context.localResolvers) <mask> Context.whois = initWhois(&Context.clients) <mask> <mask> Context.filters.Init() <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/dns.go
if config.DNS.ResolveClients && !ip.IsLoopback() {
<mask> // This would be quite weird if we get here. <mask> return <mask> } <mask> <mask> if !ip.IsLoopback() { <mask> Context.rdns.Begin(ip) <mask> } <mask> if !Context.subnetDetector.IsSpecialNetwork(ip) { <mask> Context.whois.Begin(ip) <mask> } </s> Pull request: 2704 local addresses vol.3 M...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/dns.go
newConf.ResolveClients = dnsConf.ResolveClients newConf.LocalPTRResolvers = dnsConf.LocalPTRResolvers
<mask> newConf.GetCustomUpstreamByClient = Context.clients.FindUpstreams <mask> <mask> return newConf, nil <mask> } <mask> <mask> func newDNSCrypt(hosts []net.IP, tlsConf tlsConfigSettings) (dnscc dnsforward.DNSCryptConfig, err error) { </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/dns.go
if config.DNS.ResolveClients && !ip.IsLoopback() {
<mask> Context.queryLog.Start() <mask> <mask> const topClientsNumber = 100 // the number of clients to get <mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) { <mask> if !Context.subnetDetector.IsLocallyServedNetwork(ip) { <mask> Context.rdns.Begin(ip) <mask> } <mask> if !Con...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/dns.go
subnetDetector *aghnet.SubnetDetector
<mask> tls *TLSMod // TLS module <mask> autoHosts util.AutoHosts // IP-hostname pairs taken from system configuration (e.g. /etc/hosts) files <mask> updater *updater.Updater <mask> <mask> subnetDetector *aghnet.SubnetDetector <mask> systemResolvers aghnet.SystemResolvers <mas...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/home.go
<mask> Context.pidFileName = args.pidFile <mask> } <mask> } <mask> <mask> const defaultLocalTimeout = 5 * time.Second <mask> <mask> // stringsSetSubtract subtracts b from a interpreted as sets. <mask> // <mask> // TODO(e.burkov): Move into our internal package for working with strings. <mask> func string...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/home.go
<mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> <mask> setupResolvers() <mask> <mask> if !Context.firstRun { <mask> err = initDNSServer() <mask> if err != nil { <mask> log.Fatalf("%s", err) <mask> } </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/home.go
<mask> package home <mask> <mask> import ( <mask> "encoding/binary" <mask> "fmt" <mask> "net" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
<mask> import ( <mask> "encoding/binary" <mask> "fmt" <mask> "net" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" </s> Pull r...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
<mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/miekg/dns" <mask> ) <mask> <mask> // RDNS resolves clients' addresses to en...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
exchanger dnsforward.RDNSExchanger clients *clientsContainer
<mask> ) <mask> <mask> // RDNS resolves clients' addresses to enrich their metadata. <mask> type RDNS struct { <mask> dnsServer *dnsforward.Server <mask> clients *clientsContainer <mask> subnetDetector *aghnet.SubnetDetector <mask> localResolvers aghnet.Exchanger <mask> <mask> // ipCh used ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
exchanger dnsforward.RDNSExchanger,
<mask> ) <mask> <mask> // NewRDNS creates and returns initialized RDNS. <mask> func NewRDNS( <mask> dnsServer *dnsforward.Server, <mask> clients *clientsContainer, <mask> snd *aghnet.SubnetDetector, <mask> lr aghnet.Exchanger, <mask> ) (rDNS *RDNS) { <mask> rDNS = &RDNS{ </s> Pull request: 2704 local a...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
<mask> // NewRDNS creates and returns initialized RDNS. <mask> func NewRDNS( <mask> dnsServer *dnsforward.Server, <mask> clients *clientsContainer, <mask> snd *aghnet.SubnetDetector, <mask> lr aghnet.Exchanger, <mask> ) (rDNS *RDNS) { <mask> rDNS = &RDNS{ <mask> dnsServer: dnsServer, <mask> clie...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
exchanger: exchanger, clients: clients,
<mask> snd *aghnet.SubnetDetector, <mask> lr aghnet.Exchanger, <mask> ) (rDNS *RDNS) { <mask> rDNS = &RDNS{ <mask> dnsServer: dnsServer, <mask> clients: clients, <mask> subnetDetector: snd, <mask> localResolvers: lr, <mask> ipCache: cache.New(cache.Config{ <mask> EnableLRU: true, ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
<mask> log.Tracef("rdns: queue is full") <mask> } <mask> } <mask> <mask> const ( <mask> // rDNSEmptyAnswerErr is returned by RDNS resolve method when the answer <mask> // section of respond is empty. <mask> rDNSEmptyAnswerErr agherr.Error = "the answer section is empty" <mask> <mask> // rDNSNotPTRErr...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
host, err := r.exchanger.Exchange(ip)
<mask> func (r *RDNS) workerLoop() { <mask> defer agherr.LogPanic("rdns") <mask> <mask> for ip := range r.ipCh { <mask> host, err := r.resolve(ip) <mask> if err != nil { <mask> log.Error("rdns: resolving %q: %s", ip, err) <mask> <mask> continue <mask> } </s> Pull request: 2704 local addresses...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
if host != "" { // Don't handle any errors since AddHost doesn't return non-nil // errors for now. _, _ = r.clients.AddHost(ip.String(), host, ClientSourceRDNS) }
<mask> <mask> continue <mask> } <mask> <mask> // Don't handle any errors since AddHost doesn't return non-nil <mask> // errors for now. <mask> _, _ = r.clients.AddHost(ip.String(), host, ClientSourceRDNS) <mask> } <mask> } </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns.go
<mask> "sync" <mask> "testing" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
<mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <m...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
"github.com/miekg/dns"
<mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/stretchr/testify/assert" <mask> ) <mask> <mask> func TestRDNS_Begin(t *testing.T) { <mask> aghtest.ReplaceLogLevel(t, log.DEBUG) </s> Pull request: ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
<mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) <mask> <mask> func TestRDNS_Begin(t *testing.T) { <mask> aghtest.Rep...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
// rDNSExchanger is a mock dnsforward.RDNSExchanger implementation for tests. type rDNSExchanger struct { aghtest.Exchanger }
<mask> }) <mask> } <mask> } <mask> <mask> func TestRDNS_Resolve(t *testing.T) { <mask> extUpstream := &aghtest.TestUpstream{ <mask> Reverse: map[string][]string{ <mask> "1.1.1.1.in-addr.arpa.": {"one.one.one.one"}, <mask> }, <mask> } <mask> locUpstream := &aghtest.TestUpstream{ <mask> Revers...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
// Exchange implements dnsforward.RDNSExchanger interface for *RDNSExchanger. func (e *rDNSExchanger) Exchange(ip net.IP) (host string, err error) { req := &dns.Msg{ Question: []dns.Question{{ Name: ip.String(), Qtype: dns.TypePTR, }}, }
<mask> <mask> snd, err := aghnet.NewSubnetDetector() <mask> require.NoError(t, err) <mask> <mask> localIP := net.IP{192, 168, 1, 1} <mask> testCases := []struct { <mask> name string <mask> want string <mask> wantErr error <mask> locUpstream upstream.Upstream <mask> req ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
resp, err := e.Exchanger.Exchange(req) if err != nil { return "", err }
<mask> locUpstream: nonPtrUpstream, <mask> req: localIP, <mask> }} <mask> <mask> for _, tc := range testCases { <mask> rdns := NewRDNS(dns, cc, snd, &aghtest.Exchanger{ <mask> Ups: tc.locUpstream, <mask> }) <mask> <mask> t.Run(tc.name, func(t *testing.T) { <mask> r, rerr := rdns.r...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
if len(resp.Answer) == 0 { return "", nil
<mask> rdns := NewRDNS(dns, cc, snd, &aghtest.Exchanger{ <mask> Ups: tc.locUpstream, <mask> }) <mask> <mask> t.Run(tc.name, func(t *testing.T) { <mask> r, rerr := rdns.resolve(tc.req) <mask> require.ErrorIs(t, rerr, tc.wantErr) <mask> assert.Equal(t, tc.want, r) <mask> }) <mask> } <mask...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
return resp.Answer[0].Header().Name, nil
<mask> return "", nil <mask> } <mask> } <mask> <mask> func TestRDNS_WorkerLoop(t *testing.T) { <mask> aghtest.ReplaceLogLevel(t, log.DEBUG) <mask> w := &bytes.Buffer{} <mask> aghtest.ReplaceLogWriter(t, w) </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
"192.168.1.1": {"local.domain"},
<mask> aghtest.ReplaceLogWriter(t, w) <mask> <mask> locUpstream := &aghtest.TestUpstream{ <mask> Reverse: map[string][]string{ <mask> "1.1.168.192.in-addr.arpa.": {"local.domain"}, <mask> }, <mask> } <mask> <mask> snd, err := aghnet.NewSubnetDetector() <mask> require.NoError(t, err) </s> Pull r...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
errUpstream := &aghtest.TestErrUpstream{ Err: errors.New("1234"), }
<mask> Reverse: map[string][]string{ <mask> "1.1.168.192.in-addr.arpa.": {"local.domain"}, <mask> }, <mask> } <mask> <mask> snd, err := aghnet.NewSubnetDetector() <mask> require.NoError(t, err) <mask> <mask> testCases := []struct { <mask> wantLog string <mask> name string <mask> cliIP ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
ups upstream.Upstream
<mask> <mask> testCases := []struct { <mask> wantLog string <mask> name string <mask> cliIP net.IP <mask> }{{ </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master Updates #2704. Updates #2829. Updates #2928. Squashed commit of the foll...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
ups: locUpstream,
<mask> cliIP net.IP <mask> }{{ <mask> wantLog: "", <mask> name: "all_good", <mask> cliIP: net.IP{192, 168, 1, 1}, <mask> }, { <mask> ups: errUpstream, </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master Updates #2704. Updates...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
ups: errUpstream, wantLog: `rdns: resolving "192.168.1.2": errupstream: 1234`, name: "resolve_error", cliIP: net.IP{192, 168, 1, 2},
<mask> wantLog: "", <mask> name: "all_good", <mask> cliIP: net.IP{192, 168, 1, 1}, <mask> }, { <mask> wantLog: `rdns: resolving "192.168.1.2": lookup for "2.1.168.192.in-addr.arpa.": ` + <mask> string(rDNSEmptyAnswerErr), <mask> name: "resolve_error", <mask> cliIP: net.IP{192, 168, 1, 2}, ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
<mask> <mask> for _, tc := range testCases { <mask> w.Reset() <mask> <mask> lr := &aghtest.Exchanger{ <mask> Ups: locUpstream, <mask> } <mask> cc := &clientsContainer{ <mask> list: map[string]*Client{}, <mask> idIndex: map[string]*Client{}, <mask> ipToRC: map[string]*RuntimeClient{...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
exchanger: &rDNSExchanger{ Exchanger: aghtest.Exchanger{ Ups: tc.ups, }, }, clients: cc, ipCh: ch,
<mask> allTags: map[string]bool{}, <mask> } <mask> ch := make(chan net.IP) <mask> rdns := &RDNS{ <mask> dnsServer: nil, <mask> clients: cc, <mask> subnetDetector: snd, <mask> localResolvers: lr, <mask> ipCh: ch, <mask> } <mask> <mask> t.Run(tc.name, func(t ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/rdns_test.go
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghio" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> const ( </s> Pull request: 2704 loc...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/whois.go
ln := aghstrings.SplitNext(&data, '\n')
<mask> m := map[string]string{} <mask> descr := "" <mask> netname := "" <mask> for len(data) != 0 { <mask> ln := util.SplitNext(&data, '\n') <mask> if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' { <mask> continue <mask> } <mask> <mask> kv := strings.SplitN(ln, ":", 2) </s> Pull request: 2704...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/home/whois.go
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/jsonutil" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> type qlogConfig struct { </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master Updates #2704. Updates #2829. U...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/querylog/http.go
<mask> } <mask> return false <mask> } <mask> <mask> // inStr checks if string is in the slice of strings. <mask> func inStr(strs []string, str string) (ok bool) { <mask> for _, s := range strs { <mask> if s == str { <mask> return true <mask> } <mask> } <mask> <mask> return false <mask> } <m...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/querylog/http.go
if ct == ctFilteringStatus && !aghstrings.InSlice(filteringStatusValues, c.value) {
<mask> if getDoubleQuotesEnclosedValue(&c.value) { <mask> c.strict = true <mask> } <mask> <mask> if ct == ctFilteringStatus && !inStr(filteringStatusValues, c.value) { <mask> return false, c, fmt.Errorf("invalid value %s", c.value) <mask> } <mask> <mask> return true, c, nil <mask> } </s> Pull requ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/querylog/http.go
<mask> "runtime" <mask> "strings" <mask> ) <mask> <mask> // SplitNext - split string by a byte and return the first chunk <mask> // Skip empty chunks <mask> // Whitespace is trimmed <mask> func SplitNext(str *string, splitBy byte) string { <mask> i := strings.IndexByte(*str, splitBy) <mask> s := "" <mas...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/util/helpers.go
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "strconv" <mask> "strings" <mask> ) <mask> <mask> // Channel constants. <mask> const ( <mask> ChannelDevelopment = "development" <mask> ChannelEdge = "edge" </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master Updates #2704. Upda...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
<mask> tb = "\t" <mask> nltb = nl + tb <mask> ) <mask> <mask> // writeStrings is a convenient wrapper for strings.(*Builder).WriteString that <mask> // deals with multiple strings and ignores errors that are guaranteed to be nil. <mask> func writeStrings(b *strings.Builder, strs ...string) { <mask> for _,...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, m.Path)
<mask> } <mask> <mask> b := &strings.Builder{} <mask> <mask> writeStrings(b, m.Path) <mask> if ver := m.Version; ver != "" { <mask> sep := modInfoAtSep <mask> if ver == "(devel)" { <mask> sep = modInfoDevSep <mask> } </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, sep, ver)
<mask> sep := modInfoAtSep <mask> if ver == "(devel)" { <mask> sep = modInfoDevSep <mask> } <mask> writeStrings(b, sep, ver) <mask> } <mask> if sum := m.Sum; sum != "" { <mask> writeStrings(b, modInfoSumLeft, sum, modInfoSumRight) <mask> } <mask> </s> Pull request: 2704 local addresses vol.3...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, modInfoSumLeft, sum, modInfoSumRight)
<mask> } <mask> writeStrings(b, sep, ver) <mask> } <mask> if sum := m.Sum; sum != "" { <mask> writeStrings(b, modInfoSumLeft, sum, modInfoSumRight) <mask> } <mask> <mask> return b.String() <mask> } <mask> </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-add...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(
<mask> // TODO(e.burkov): Make it write into passed io.Writer. <mask> func Verbose() (v string) { <mask> b := &strings.Builder{} <mask> <mask> writeStrings( <mask> b, <mask> vFmtAGHHdr, <mask> nl, <mask> vFmtVerHdr, <mask> version, </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adgu...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, nl, vFmtTimeHdr, buildtime)
<mask> vFmtGoHdr, <mask> runtime.Version(), <mask> ) <mask> if buildtime != "" { <mask> writeStrings(b, nl, vFmtTimeHdr, buildtime) <mask> } <mask> writeStrings(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr) <mask> if goarm != "" { <mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm) <mask> } else if go...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr)
<mask> ) <mask> if buildtime != "" { <mask> writeStrings(b, nl, vFmtTimeHdr, buildtime) <mask> } <mask> writeStrings(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr) <mask> if goarm != "" { <mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm) <mask> } else if gomips != "" { <mask> writeStrings(b, nl, vFmtGOM...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, nl, vFmtGOARMHdr, "v", goarm)
<mask> writeStrings(b, nl, vFmtTimeHdr, buildtime) <mask> } <mask> writeStrings(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr) <mask> if goarm != "" { <mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm) <mask> } else if gomips != "" { <mask> writeStrings(b, nl, vFmtGOMIPSHdr, gomips) <mask> } <mask> write...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, nl, vFmtGOMIPSHdr, gomips)
<mask> writeStrings(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr) <mask> if goarm != "" { <mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm) <mask> } else if gomips != "" { <mask> writeStrings(b, nl, vFmtGOMIPSHdr, gomips) <mask> } <mask> writeStrings(b, nl, vFmtRaceHdr, strconv.FormatBool(isRace)) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, nl, vFmtRaceHdr, strconv.FormatBool(isRace))
<mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm) <mask> } else if gomips != "" { <mask> writeStrings(b, nl, vFmtGOMIPSHdr, gomips) <mask> } <mask> writeStrings(b, nl, vFmtRaceHdr, strconv.FormatBool(isRace)) <mask> <mask> info, ok := debug.ReadBuildInfo() <mask> if !ok { <mask> return b.String(...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, nl, vFmtMainHdr, nltb, fmtModule(&info.Main))
<mask> if !ok { <mask> return b.String() <mask> } <mask> <mask> writeStrings(b, nl, vFmtMainHdr, nltb, fmtModule(&info.Main)) <mask> <mask> if len(info.Deps) == 0 { <mask> return b.String() <mask> } <mask> </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adguard-home from 2704-local-ad...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, nl, vFmtDepsHdr)
<mask> if len(info.Deps) == 0 { <mask> return b.String() <mask> } <mask> <mask> writeStrings(b, nl, vFmtDepsHdr) <mask> for _, dep := range info.Deps { <mask> if depStr := fmtModule(dep); depStr != "" { <mask> writeStrings(b, nltb, depStr) <mask> } <mask> } </s> Pull request: 2704 local addres...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
aghstrings.WriteToBuilder(b, nltb, depStr)
<mask> <mask> writeStrings(b, nl, vFmtDepsHdr) <mask> for _, dep := range info.Deps { <mask> if depStr := fmtModule(dep); depStr != "" { <mask> writeStrings(b, nltb, depStr) <mask> } <mask> } <mask> <mask> return b.String() <mask> } </s> Pull request: 2704 local addresses vol.3 Merge in DNS/adg...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
internal/version/version.go
'resolve_clients': 'type': 'boolean' 'local_ptr_upstreams': 'type': 'array' 'description': > Upstream servers, port is optional after colon. Empty value will reset it to default values. 'items': 'type': 'string' 'exam...
<mask> 'enum': <mask> - '' <mask> - 'parallel' <mask> - 'fastest_addr' <mask> 'UpstreamsConfig': <mask> 'type': 'object' <mask> 'description': 'Upstreams configuration' <mask> 'required': <mask> - 'bootstrap_dns' <mask> - 'upstream_dns'...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
openapi/openapi.yaml
'private_upstream': 'type': 'array' 'description': > Local PTR resolvers, port is optional after colon. Empty value will reset it to default values. 'items': 'type': 'string' 'example': - 'tls://1.1.1.1' - 'tls://1....
<mask> 'example': <mask> - 'tls://1.1.1.1' <mask> - 'tls://1.0.0.1' <mask> 'UpstreamsConfigResponse': <mask> 'type': 'object' <mask> 'description': 'Upstreams configuration response' <mask> 'additionalProperties': <mask> 'type': 'string' <mask> 'F...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55
openapi/openapi.yaml
"github.com/AdguardTeam/AdGuardHome/querylog"
<mask> <mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/stats" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/log" </s> * querylog: move code to a separate package + conf...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
queryLog querylog.QueryLog // Query log instance
<mask> // The zero Server is empty and ready for use. <mask> type Server struct { <mask> dnsProxy *proxy.Proxy // DNS proxy instance <mask> dnsFilter *dnsfilter.Dnsfilter // DNS filter instance <mask> queryLog *queryLog // Query log instance <mask> stats stats.Stats <mask> <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
<mask> conf ServerConfig <mask> } <mask> <mask> // NewServer creates a new instance of the dnsforward.Server <mask> // baseDir is the base directory for query logs <mask> // Note: this function must be called only once <mask> func NewServer(baseDir string, stats stats.Stats) *Server { <mask> s := &Server{ <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
func NewServer(stats stats.Stats, queryLog querylog.QueryLog) *Server { s := &Server{}
<mask> <mask> // NewServer creates a new instance of the dnsforward.Server <mask> // baseDir is the base directory for query logs <mask> // Note: this function must be called only once <mask> func NewServer(baseDir string, stats stats.Stats) *Server { <mask> s := &Server{ <mask> queryLog: newQueryLog(baseDir...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
s.queryLog = queryLog
<mask> s := &Server{ <mask> queryLog: newQueryLog(baseDir), <mask> } <mask> s.stats = stats <mask> <mask> log.Printf("Start DNS server periodic jobs") <mask> go s.queryLog.periodicQueryLogRotate() <mask> return s <mask> } <mask> <mask> // FilteringConfig represents the DNS filtering configuration o...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
QueryLogInterval uint32 `yaml:"querylog_interval"` // time interval for query log (in days)
<mask> BlockingMode string `yaml:"blocking_mode"` // mode how to answer filtered requests <mask> BlockedResponseTTL uint32 `yaml:"blocked_response_ttl"` // if 0, then default is used (3600) <mask> QueryLogEnabled bool `yaml:"querylog_enabled"` // if true, query log is enabled <mask> ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
return nil
<mask> s.dnsFilter.Destroy() <mask> s.dnsFilter = nil <mask> } <mask> <mask> // flush remainder to file <mask> return s.queryLog.flushLogBuffer(true) <mask> } <mask> <mask> // IsRunning returns true if the DNS server is running <mask> func (s *Server) IsRunning() bool { <mask> s.RLock() </s> * que...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
<mask> s.dnsProxy.ServeHTTP(w, r) <mask> s.RUnlock() <mask> } <mask> <mask> // GetQueryLog returns a map with the current query log ready to be converted to a JSON <mask> func (s *Server) GetQueryLog() []map[string]interface{} { <mask> s.RLock() <mask> defer s.RUnlock() <mask> return s.queryLog.getQueryL...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
if s.conf.QueryLogEnabled && shouldLog && s.queryLog != nil {
<mask> shouldLog = false <mask> } <mask> <mask> elapsed := time.Since(start) <mask> if s.conf.QueryLogEnabled && shouldLog { <mask> upstreamAddr := "" <mask> if d.Upstream != nil { <mask> upstreamAddr = d.Upstream.Address() <mask> } <mask> _ = s.queryLog.logRequest(msg, d.Res, res, elapsed, d...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
s.queryLog.Add(msg, d.Res, res, elapsed, d.Addr, upstreamAddr)
<mask> upstreamAddr := "" <mask> if d.Upstream != nil { <mask> upstreamAddr = d.Upstream.Address() <mask> } <mask> _ = s.queryLog.logRequest(msg, d.Res, res, elapsed, d.Addr, upstreamAddr) <mask> } <mask> <mask> s.updateStats(d, elapsed, *res) <mask> <mask> return nil </s> * querylog: move co...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward.go
<mask> "crypto/x509/pkix" <mask> "encoding/pem" <mask> "math/big" <mask> "net" <mask> "os" <mask> "sync" <mask> "testing" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter" </s> * querylog: move code to a separate package + config: "querylog_interval" setting /control/query...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> <mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/assert" <mask> ) <mask> <mask> const ( <mask> tlsServerName = "testdns.adguard.com" <mask> dataDir = "testData" <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go