docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
<mask> }, {
<mask> name: "edns_cs_enabled",
<mask> req: "{\"edns_cs_enabled\":true}",
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> }, {
<mask> name: "dnssec_enabled",
<mask> req: "{\"dnssec_enabled\":true}",
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_e... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> }, {
<mask> name: "cache_size",
<mask> req: "{\"cache_size\":1024}",
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\"... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> }, {
<mask> name: "upstream_mode_parallel",
<mask> req: "{\"upstream_mode\":\"parallel\"}",
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"]... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> }, {
<mask> name: "upstream_mode_fastest_addr",
<mask> req: "{\"upstream_mode\":\"fastest_addr\"}",
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> wantSet: "",
<mask> wantGet: "{\"upstream_dns\":[\"8.8.8.8:53\",\"8.8.4.4:53\"],\"upstream_dns_file\":\"\",\"bootstrap_dns\":[\"9.9.9.10\",\"149.112.112.10\",\"2620:fe::10\",\"2620:fe::fe:10\"],\"protection_enabled\":true,\"ratelimit\":0,\"blocking_mode\":\"\",\"blocking_ipv4\":\"\",\"blocking_ipv6\":\"\",... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> }, {
<mask> name: "upstream_dns_bad",
<mask> req: "{\"upstream_dns\":[\"\"]}",
<mask> wantSet: "wrong upstreams specification: missing port in address\n",
<mask> wantGet: defaultConfJSON,
<mask> }, {
<mask> name: "bootstraps_bad",
<mask> req: "{\"bootstrap_dns\":[\"a\"]}",
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> wantSet: "wrong upstreams specification: missing port in address\n",
<mask> wantGet: defaultConfJSON,
<mask> }, {
<mask> name: "bootstraps_bad",
<mask> req: "{\"bootstrap_dns\":[\"a\"]}",
<mask> wantSet: "a can not be used as bootstrap dns cause: invalid bootstrap server address: Resolver... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> }, {
<mask> name: "bootstraps_bad",
<mask> req: "{\"bootstrap_dns\":[\"a\"]}",
<mask> wantSet: "a can not be used as bootstrap dns cause: invalid bootstrap server address: Resolver a is not eligible to be a bootstrap DNS server\n",
<mask> wantGet: defaultConfJSON,
<mask> }, {
<mask> nam... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> wantSet: "a can not be used as bootstrap dns cause: invalid bootstrap server address: Resolver a is not eligible to be a bootstrap DNS server\n",
<mask> wantGet: defaultConfJSON,
<mask> }, {
<mask> name: "cache_bad_ttl",
<mask> req: "{\"cache_ttl_min\":1024,\"cache_ttl_max\":512}",
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> }, {
<mask> name: "cache_bad_ttl",
<mask> req: "{\"cache_ttl_min\":1024,\"cache_ttl_max\":512}",
<mask> wantSet: "cache_ttl_min must be less or equal than cache_ttl_max\n",
<mask> wantGet: defaultConfJSON,
<mask> }, {
<mask> name: "upstream_mode_bad",
<mask> req: "{\"upstream_... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
<mask> wantSet: "cache_ttl_min must be less or equal than cache_ttl_max\n",
<mask> wantGet: defaultConfJSON,
<mask> }, {
<mask> name: "upstream_mode_bad",
<mask> req: "{\"upstream_mode\":\"somethingelse\"}",
<mask> wantSet: "upstream_mode: incorrect value\n",
<mask> wantGet: defaultConfJSON,
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go | |
}, {
name: "local_ptr_upstreams_good",
wantSet: "",
}, {
name: "local_ptr_upstreams_null",
wantSet: "", | <mask> }, {
<mask> name: "upstream_mode_bad",
<mask> req: "{\"upstream_mode\":\"somethingelse\"}",
<mask> wantSet: "upstream_mode: incorrect value\n",
<mask> wantGet: defaultConfJSON,
<mask> }}
<mask>
<mask> for _, tc := range testCases {
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go |
var data map[string]struct {
Req json.RawMessage `json:"req"`
Want json.RawMessage `json:"want"`
}
loadTestData(t, t.Name()+jsonExt, &data)
| <mask> }}
<mask>
<mask> for _, tc := range testCases {
<mask> caseData, ok := data[tc.name]
<mask> require.True(t, ok)
<mask>
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> t.Cleanup(func() {
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-addresses-vol.... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go |
caseData, ok := data[tc.name]
require.True(t, ok)
| <mask> }
<mask> loadTestData(t, t.Name()+jsonExt, &data)
<mask>
<mask> for _, tc := range testCases {
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> t.Cleanup(func() {
<mask> s.conf = defaultConf
<mask> })
<mask>
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go |
rBody := ioutil.NopCloser(bytes.NewReader(caseData.Req)) | <mask> t.Cleanup(func() {
<mask> s.conf = defaultConf
<mask> })
<mask>
<mask> rBody := ioutil.NopCloser(strings.NewReader(tc.req))
<mask> var r *http.Request
<mask> r, err = http.NewRequest(http.MethodPost, "http://example.com", rBody)
<mask> require.Nil(t, err)
<mask>
<mask> s.hand... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go |
assert.JSONEq(t, string(caseData.Want), w.Body.String()) | <mask> assert.Equal(t, tc.wantSet, w.Body.String())
<mask> w.Body.Reset()
<mask>
<mask> s.handleGetConfig(w, nil)
<mask> assert.Equal(t, tc.wantGet, w.Body.String())
<mask> w.Body.Reset()
<mask> })
<mask> }
<mask> }
<mask>
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguar... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/http_test.go |
<mask>
<mask> return ""
<mask> }
<mask>
<mask> func stringArrayDup(a []string) []string {
<mask> a2 := make([]string, len(a))
<mask> copy(a2, a)
<mask> return a2
<mask> }
<mask>
<mask> // Find value in a sorted array
<mask> func findSorted(ar []string, val string) int {
<mask> i := sort.SearchStrin... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/dnsforward/util.go | |
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/clients.go |
cy.Tags = aghstrings.CloneSlice(cli.Tags)
cy.IDs = aghstrings.CloneSlice(cli.IDs)
cy.BlockedServices = aghstrings.CloneSlice(cli.BlockedServices)
cy.Upstreams = aghstrings.CloneSlice(cli.Upstreams) | <mask> SafeBrowsingEnabled: cli.SafeBrowsingEnabled,
<mask> UseGlobalBlockedServices: !cli.UseOwnBlockedServices,
<mask> }
<mask>
<mask> cy.Tags = copyStrings(cli.Tags)
<mask> cy.IDs = copyStrings(cli.IDs)
<mask> cy.BlockedServices = copyStrings(cli.BlockedServices)
<mask> cy.Upstreams = c... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/clients.go |
<mask> // Return false if the new source has higher priority.
<mask> return source <= rc.Source
<mask> }
<mask>
<mask> func copyStrings(a []string) (b []string) {
<mask> return append(b, a...)
<mask> }
<mask>
<mask> func toQueryLogWhois(wi *RuntimeClientWhoisInfo) (cw *querylog.ClientWhois) {
<mask> if ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/clients.go | |
c.IDs = aghstrings.CloneSlice(c.IDs)
c.Tags = aghstrings.CloneSlice(c.Tags)
c.BlockedServices = aghstrings.CloneSlice(c.BlockedServices)
c.Upstreams = aghstrings.CloneSlice(c.Upstreams) | <mask> if !ok {
<mask> return nil, false
<mask> }
<mask>
<mask> c.IDs = copyStrings(c.IDs)
<mask> c.Tags = copyStrings(c.Tags)
<mask> c.BlockedServices = copyStrings(c.BlockedServices)
<mask> c.Upstreams = copyStrings(c.Upstreams)
<mask> return c, true
<mask> }
<mask>
<mask> // FindUpstreams look... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/clients.go |
// ResolveClients enables and disables resolving clients with RDNS.
ResolveClients bool `yaml:"resolve_clients"`
// LocalPTRResolvers is the slice of addresses to be used as upstreams
// for PTR queries for locally-served networks.
LocalPTRResolvers []string `yaml:"local_ptr_upstreams"` | <mask> // "myhost.lan" when AutohostTLD is "lan".
<mask> AutohostTLD string `yaml:"autohost_tld"`
<mask> }
<mask>
<mask> type tlsConfigSettings struct {
<mask> Enabled bool `yaml:"enabled" json:"enabled"` // Enabled is the encryption (DOT/DOH/HTTPS) status
</s> Pull ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/config.go |
ResolveClients: true, | <mask> FilteringEnabled: true, // whether or not use filter lists
<mask> FiltersUpdateIntervalHours: 24,
<mask> AutohostTLD: "lan",
<mask> },
<mask> TLS: tlsConfigSettings{
<mask> PortHTTPS: 443,
<mask> PortDNSOverTLS: 853, // needs to be passed through to dnsproxy
<m... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/config.go |
if s := Context.dnsServer; s != nil { | <mask> Context.dnsFilter.WriteDiskConfig(&c)
<mask> config.DNS.DnsfilterConf = c
<mask> }
<mask>
<mask> if Context.dnsServer != nil {
<mask> c := dnsforward.FilteringConfig{}
<mask> Context.dnsServer.WriteDiskConfig(&c)
<mask> config.DNS.FilteringConfig = c
<mask> }
<mask>
</s> Pull request: 2... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/config.go |
s.WriteDiskConfig(&c) | <mask> }
<mask>
<mask> if Context.dnsServer != nil {
<mask> c := dnsforward.FilteringConfig{}
<mask> Context.dnsServer.WriteDiskConfig(&c)
<mask> config.DNS.FilteringConfig = c
<mask> }
<mask>
<mask> if Context.dhcpServer != nil {
<mask> c := dhcpd.ServerConfig{}
</s> Pull request: 2704 local a... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/config.go |
config.DNS.LocalPTRResolvers, config.DNS.ResolveClients = s.RDNSSettings() | <mask> s.WriteDiskConfig(&c)
<mask> config.DNS.FilteringConfig = c
<mask> }
<mask>
<mask> if Context.dhcpServer != nil {
<mask> c := dhcpd.ServerConfig{}
<mask> Context.dhcpServer.WriteDiskConfig(&c)
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-addresses-vo... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/config.go |
<mask> DNSFilter: Context.dnsFilter,
<mask> Stats: Context.stats,
<mask> QueryLog: Context.queryLog,
<mask> SubnetDetector: Context.subnetDetector,
<mask> LocalResolvers: Context.localResolvers,
<mask> AutohostTLD: config.DNS.AutohostTLD,
<mask> }
<mask> if Context.dhcpServe... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/dns.go | |
Context.rdns = NewRDNS(Context.dnsServer, &Context.clients) | <mask> closeDNSServer()
<mask> return fmt.Errorf("dnsServer.Prepare: %w", err)
<mask> }
<mask>
<mask> Context.rdns = NewRDNS(Context.dnsServer, &Context.clients, Context.subnetDetector, Context.localResolvers)
<mask> Context.whois = initWhois(&Context.clients)
<mask>
<mask> Context.filters.Init()
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/dns.go |
if config.DNS.ResolveClients && !ip.IsLoopback() { | <mask> // This would be quite weird if we get here.
<mask> return
<mask> }
<mask>
<mask> if !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Context.subnetDetector.IsSpecialNetwork(ip) {
<mask> Context.whois.Begin(ip)
<mask> }
</s> Pull request: 2704 local addresses vol.3
M... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/dns.go |
newConf.ResolveClients = dnsConf.ResolveClients
newConf.LocalPTRResolvers = dnsConf.LocalPTRResolvers
| <mask> newConf.GetCustomUpstreamByClient = Context.clients.FindUpstreams
<mask>
<mask> return newConf, nil
<mask> }
<mask>
<mask> func newDNSCrypt(hosts []net.IP, tlsConf tlsConfigSettings) (dnscc dnsforward.DNSCryptConfig, err error) {
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/dns.go |
if config.DNS.ResolveClients && !ip.IsLoopback() { | <mask> Context.queryLog.Start()
<mask>
<mask> const topClientsNumber = 100 // the number of clients to get
<mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) {
<mask> if !Context.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Con... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/dns.go |
subnetDetector *aghnet.SubnetDetector | <mask> tls *TLSMod // TLS module
<mask> autoHosts util.AutoHosts // IP-hostname pairs taken from system configuration (e.g. /etc/hosts) files
<mask> updater *updater.Updater
<mask>
<mask> subnetDetector *aghnet.SubnetDetector
<mask> systemResolvers aghnet.SystemResolvers
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/home.go |
<mask> Context.pidFileName = args.pidFile
<mask> }
<mask> }
<mask>
<mask> const defaultLocalTimeout = 5 * time.Second
<mask>
<mask> // stringsSetSubtract subtracts b from a interpreted as sets.
<mask> //
<mask> // TODO(e.burkov): Move into our internal package for working with strings.
<mask> func string... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/home.go | |
<mask> if err != nil {
<mask> log.Fatal(err)
<mask> }
<mask>
<mask> setupResolvers()
<mask>
<mask> if !Context.firstRun {
<mask> err = initDNSServer()
<mask> if err != nil {
<mask> log.Fatalf("%s", err)
<mask> }
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/home.go | |
<mask> package home
<mask>
<mask> import (
<mask> "encoding/binary"
<mask> "fmt"
<mask> "net"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go | |
<mask> import (
<mask> "encoding/binary"
<mask> "fmt"
<mask> "net"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
</s> Pull r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go | |
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go | |
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // RDNS resolves clients' addresses to en... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go | |
exchanger dnsforward.RDNSExchanger
clients *clientsContainer | <mask> )
<mask>
<mask> // RDNS resolves clients' addresses to enrich their metadata.
<mask> type RDNS struct {
<mask> dnsServer *dnsforward.Server
<mask> clients *clientsContainer
<mask> subnetDetector *aghnet.SubnetDetector
<mask> localResolvers aghnet.Exchanger
<mask>
<mask> // ipCh used ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go |
exchanger dnsforward.RDNSExchanger, | <mask> )
<mask>
<mask> // NewRDNS creates and returns initialized RDNS.
<mask> func NewRDNS(
<mask> dnsServer *dnsforward.Server,
<mask> clients *clientsContainer,
<mask> snd *aghnet.SubnetDetector,
<mask> lr aghnet.Exchanger,
<mask> ) (rDNS *RDNS) {
<mask> rDNS = &RDNS{
</s> Pull request: 2704 local a... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go |
<mask> // NewRDNS creates and returns initialized RDNS.
<mask> func NewRDNS(
<mask> dnsServer *dnsforward.Server,
<mask> clients *clientsContainer,
<mask> snd *aghnet.SubnetDetector,
<mask> lr aghnet.Exchanger,
<mask> ) (rDNS *RDNS) {
<mask> rDNS = &RDNS{
<mask> dnsServer: dnsServer,
<mask> clie... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go | |
exchanger: exchanger,
clients: clients, | <mask> snd *aghnet.SubnetDetector,
<mask> lr aghnet.Exchanger,
<mask> ) (rDNS *RDNS) {
<mask> rDNS = &RDNS{
<mask> dnsServer: dnsServer,
<mask> clients: clients,
<mask> subnetDetector: snd,
<mask> localResolvers: lr,
<mask> ipCache: cache.New(cache.Config{
<mask> EnableLRU: true,
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go |
<mask> log.Tracef("rdns: queue is full")
<mask> }
<mask> }
<mask>
<mask> const (
<mask> // rDNSEmptyAnswerErr is returned by RDNS resolve method when the answer
<mask> // section of respond is empty.
<mask> rDNSEmptyAnswerErr agherr.Error = "the answer section is empty"
<mask>
<mask> // rDNSNotPTRErr... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go | |
host, err := r.exchanger.Exchange(ip) | <mask> func (r *RDNS) workerLoop() {
<mask> defer agherr.LogPanic("rdns")
<mask>
<mask> for ip := range r.ipCh {
<mask> host, err := r.resolve(ip)
<mask> if err != nil {
<mask> log.Error("rdns: resolving %q: %s", ip, err)
<mask>
<mask> continue
<mask> }
</s> Pull request: 2704 local addresses... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go |
if host != "" {
// Don't handle any errors since AddHost doesn't return non-nil
// errors for now.
_, _ = r.clients.AddHost(ip.String(), host, ClientSourceRDNS)
} | <mask>
<mask> continue
<mask> }
<mask>
<mask> // Don't handle any errors since AddHost doesn't return non-nil
<mask> // errors for now.
<mask> _, _ = r.clients.AddHost(ip.String(), host, ClientSourceRDNS)
<mask> }
<mask> }
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns.go |
<mask> "sync"
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go | |
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go | |
"github.com/miekg/dns" | <mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func TestRDNS_Begin(t *testing.T) {
<mask> aghtest.ReplaceLogLevel(t, log.DEBUG)
</s> Pull request: ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
<mask> func TestRDNS_Begin(t *testing.T) {
<mask> aghtest.Rep... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go | |
// rDNSExchanger is a mock dnsforward.RDNSExchanger implementation for tests.
type rDNSExchanger struct {
aghtest.Exchanger
} | <mask> })
<mask> }
<mask> }
<mask>
<mask> func TestRDNS_Resolve(t *testing.T) {
<mask> extUpstream := &aghtest.TestUpstream{
<mask> Reverse: map[string][]string{
<mask> "1.1.1.1.in-addr.arpa.": {"one.one.one.one"},
<mask> },
<mask> }
<mask> locUpstream := &aghtest.TestUpstream{
<mask> Revers... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
// Exchange implements dnsforward.RDNSExchanger interface for *RDNSExchanger.
func (e *rDNSExchanger) Exchange(ip net.IP) (host string, err error) {
req := &dns.Msg{
Question: []dns.Question{{
Name: ip.String(),
Qtype: dns.TypePTR,
}},
} | <mask>
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask>
<mask> localIP := net.IP{192, 168, 1, 1}
<mask> testCases := []struct {
<mask> name string
<mask> want string
<mask> wantErr error
<mask> locUpstream upstream.Upstream
<mask> req ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
resp, err := e.Exchanger.Exchange(req)
if err != nil {
return "", err
} | <mask> locUpstream: nonPtrUpstream,
<mask> req: localIP,
<mask> }}
<mask>
<mask> for _, tc := range testCases {
<mask> rdns := NewRDNS(dns, cc, snd, &aghtest.Exchanger{
<mask> Ups: tc.locUpstream,
<mask> })
<mask>
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> r, rerr := rdns.r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
if len(resp.Answer) == 0 {
return "", nil | <mask> rdns := NewRDNS(dns, cc, snd, &aghtest.Exchanger{
<mask> Ups: tc.locUpstream,
<mask> })
<mask>
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> r, rerr := rdns.resolve(tc.req)
<mask> require.ErrorIs(t, rerr, tc.wantErr)
<mask> assert.Equal(t, tc.want, r)
<mask> })
<mask> }
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
return resp.Answer[0].Header().Name, nil | <mask> return "", nil
<mask> }
<mask> }
<mask>
<mask> func TestRDNS_WorkerLoop(t *testing.T) {
<mask> aghtest.ReplaceLogLevel(t, log.DEBUG)
<mask> w := &bytes.Buffer{}
<mask> aghtest.ReplaceLogWriter(t, w)
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-addresses... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
"192.168.1.1": {"local.domain"}, | <mask> aghtest.ReplaceLogWriter(t, w)
<mask>
<mask> locUpstream := &aghtest.TestUpstream{
<mask> Reverse: map[string][]string{
<mask> "1.1.168.192.in-addr.arpa.": {"local.domain"},
<mask> },
<mask> }
<mask>
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
</s> Pull r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
errUpstream := &aghtest.TestErrUpstream{
Err: errors.New("1234"),
} | <mask> Reverse: map[string][]string{
<mask> "1.1.168.192.in-addr.arpa.": {"local.domain"},
<mask> },
<mask> }
<mask>
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask>
<mask> testCases := []struct {
<mask> wantLog string
<mask> name string
<mask> cliIP ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
ups upstream.Upstream | <mask>
<mask> testCases := []struct {
<mask> wantLog string
<mask> name string
<mask> cliIP net.IP
<mask> }{{
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master
Updates #2704.
Updates #2829.
Updates #2928.
Squashed commit of the foll... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
ups: locUpstream, | <mask> cliIP net.IP
<mask> }{{
<mask> wantLog: "",
<mask> name: "all_good",
<mask> cliIP: net.IP{192, 168, 1, 1},
<mask> }, {
<mask> ups: errUpstream,
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master
Updates #2704.
Updates... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
ups: errUpstream,
wantLog: `rdns: resolving "192.168.1.2": errupstream: 1234`,
name: "resolve_error",
cliIP: net.IP{192, 168, 1, 2}, | <mask> wantLog: "",
<mask> name: "all_good",
<mask> cliIP: net.IP{192, 168, 1, 1},
<mask> }, {
<mask> wantLog: `rdns: resolving "192.168.1.2": lookup for "2.1.168.192.in-addr.arpa.": ` +
<mask> string(rDNSEmptyAnswerErr),
<mask> name: "resolve_error",
<mask> cliIP: net.IP{192, 168, 1, 2},
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
<mask>
<mask> for _, tc := range testCases {
<mask> w.Reset()
<mask>
<mask> lr := &aghtest.Exchanger{
<mask> Ups: locUpstream,
<mask> }
<mask> cc := &clientsContainer{
<mask> list: map[string]*Client{},
<mask> idIndex: map[string]*Client{},
<mask> ipToRC: map[string]*RuntimeClient{... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go | |
exchanger: &rDNSExchanger{
Exchanger: aghtest.Exchanger{
Ups: tc.ups,
},
},
clients: cc,
ipCh: ch, | <mask> allTags: map[string]bool{},
<mask> }
<mask> ch := make(chan net.IP)
<mask> rdns := &RDNS{
<mask> dnsServer: nil,
<mask> clients: cc,
<mask> subnetDetector: snd,
<mask> localResolvers: lr,
<mask> ipCh: ch,
<mask> }
<mask>
<mask> t.Run(tc.name, func(t ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/rdns_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings" | <mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghio"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> const (
</s> Pull request: 2704 loc... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/whois.go |
ln := aghstrings.SplitNext(&data, '\n') | <mask> m := map[string]string{}
<mask> descr := ""
<mask> netname := ""
<mask> for len(data) != 0 {
<mask> ln := util.SplitNext(&data, '\n')
<mask> if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' {
<mask> continue
<mask> }
<mask>
<mask> kv := strings.SplitN(ln, ":", 2)
</s> Pull request: 2704... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/home/whois.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/jsonutil"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> type qlogConfig struct {
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master
Updates #2704.
Updates #2829.
U... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/querylog/http.go |
<mask> }
<mask> return false
<mask> }
<mask>
<mask> // inStr checks if string is in the slice of strings.
<mask> func inStr(strs []string, str string) (ok bool) {
<mask> for _, s := range strs {
<mask> if s == str {
<mask> return true
<mask> }
<mask> }
<mask>
<mask> return false
<mask> }
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/querylog/http.go | |
if ct == ctFilteringStatus && !aghstrings.InSlice(filteringStatusValues, c.value) { | <mask> if getDoubleQuotesEnclosedValue(&c.value) {
<mask> c.strict = true
<mask> }
<mask>
<mask> if ct == ctFilteringStatus && !inStr(filteringStatusValues, c.value) {
<mask> return false, c, fmt.Errorf("invalid value %s", c.value)
<mask> }
<mask>
<mask> return true, c, nil
<mask> }
</s> Pull requ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/querylog/http.go |
<mask> "runtime"
<mask> "strings"
<mask> )
<mask>
<mask> // SplitNext - split string by a byte and return the first chunk
<mask> // Skip empty chunks
<mask> // Whitespace is trimmed
<mask> func SplitNext(str *string, splitBy byte) string {
<mask> i := strings.IndexByte(*str, splitBy)
<mask> s := ""
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/util/helpers.go | |
"github.com/AdguardTeam/AdGuardHome/internal/aghstrings" | <mask> "strconv"
<mask> "strings"
<mask> )
<mask>
<mask> // Channel constants.
<mask> const (
<mask> ChannelDevelopment = "development"
<mask> ChannelEdge = "edge"
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-addresses-vol.3 to master
Updates #2704.
Upda... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
<mask> tb = "\t"
<mask> nltb = nl + tb
<mask> )
<mask>
<mask> // writeStrings is a convenient wrapper for strings.(*Builder).WriteString that
<mask> // deals with multiple strings and ignores errors that are guaranteed to be nil.
<mask> func writeStrings(b *strings.Builder, strs ...string) {
<mask> for _,... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go | |
aghstrings.WriteToBuilder(b, m.Path) | <mask> }
<mask>
<mask> b := &strings.Builder{}
<mask>
<mask> writeStrings(b, m.Path)
<mask> if ver := m.Version; ver != "" {
<mask> sep := modInfoAtSep
<mask> if ver == "(devel)" {
<mask> sep = modInfoDevSep
<mask> }
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, sep, ver) | <mask> sep := modInfoAtSep
<mask> if ver == "(devel)" {
<mask> sep = modInfoDevSep
<mask> }
<mask> writeStrings(b, sep, ver)
<mask> }
<mask> if sum := m.Sum; sum != "" {
<mask> writeStrings(b, modInfoSumLeft, sum, modInfoSumRight)
<mask> }
<mask>
</s> Pull request: 2704 local addresses vol.3... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, modInfoSumLeft, sum, modInfoSumRight) | <mask> }
<mask> writeStrings(b, sep, ver)
<mask> }
<mask> if sum := m.Sum; sum != "" {
<mask> writeStrings(b, modInfoSumLeft, sum, modInfoSumRight)
<mask> }
<mask>
<mask> return b.String()
<mask> }
<mask>
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-add... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder( | <mask> // TODO(e.burkov): Make it write into passed io.Writer.
<mask> func Verbose() (v string) {
<mask> b := &strings.Builder{}
<mask>
<mask> writeStrings(
<mask> b,
<mask> vFmtAGHHdr,
<mask> nl,
<mask> vFmtVerHdr,
<mask> version,
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adgu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, nl, vFmtTimeHdr, buildtime) | <mask> vFmtGoHdr,
<mask> runtime.Version(),
<mask> )
<mask> if buildtime != "" {
<mask> writeStrings(b, nl, vFmtTimeHdr, buildtime)
<mask> }
<mask> writeStrings(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr)
<mask> if goarm != "" {
<mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm)
<mask> } else if go... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr) | <mask> )
<mask> if buildtime != "" {
<mask> writeStrings(b, nl, vFmtTimeHdr, buildtime)
<mask> }
<mask> writeStrings(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr)
<mask> if goarm != "" {
<mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm)
<mask> } else if gomips != "" {
<mask> writeStrings(b, nl, vFmtGOM... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, nl, vFmtGOARMHdr, "v", goarm) | <mask> writeStrings(b, nl, vFmtTimeHdr, buildtime)
<mask> }
<mask> writeStrings(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr)
<mask> if goarm != "" {
<mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm)
<mask> } else if gomips != "" {
<mask> writeStrings(b, nl, vFmtGOMIPSHdr, gomips)
<mask> }
<mask> write... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, nl, vFmtGOMIPSHdr, gomips) | <mask> writeStrings(b, nl, vFmtGOOSHdr, nl, vFmtGOARCHHdr)
<mask> if goarm != "" {
<mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm)
<mask> } else if gomips != "" {
<mask> writeStrings(b, nl, vFmtGOMIPSHdr, gomips)
<mask> }
<mask> writeStrings(b, nl, vFmtRaceHdr, strconv.FormatBool(isRace))
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, nl, vFmtRaceHdr, strconv.FormatBool(isRace)) | <mask> writeStrings(b, nl, vFmtGOARMHdr, "v", goarm)
<mask> } else if gomips != "" {
<mask> writeStrings(b, nl, vFmtGOMIPSHdr, gomips)
<mask> }
<mask> writeStrings(b, nl, vFmtRaceHdr, strconv.FormatBool(isRace))
<mask>
<mask> info, ok := debug.ReadBuildInfo()
<mask> if !ok {
<mask> return b.String(... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, nl, vFmtMainHdr, nltb, fmtModule(&info.Main)) | <mask> if !ok {
<mask> return b.String()
<mask> }
<mask>
<mask> writeStrings(b, nl, vFmtMainHdr, nltb, fmtModule(&info.Main))
<mask>
<mask> if len(info.Deps) == 0 {
<mask> return b.String()
<mask> }
<mask>
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adguard-home from 2704-local-ad... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, nl, vFmtDepsHdr) | <mask> if len(info.Deps) == 0 {
<mask> return b.String()
<mask> }
<mask>
<mask> writeStrings(b, nl, vFmtDepsHdr)
<mask> for _, dep := range info.Deps {
<mask> if depStr := fmtModule(dep); depStr != "" {
<mask> writeStrings(b, nltb, depStr)
<mask> }
<mask> }
</s> Pull request: 2704 local addres... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
aghstrings.WriteToBuilder(b, nltb, depStr) | <mask>
<mask> writeStrings(b, nl, vFmtDepsHdr)
<mask> for _, dep := range info.Deps {
<mask> if depStr := fmtModule(dep); depStr != "" {
<mask> writeStrings(b, nltb, depStr)
<mask> }
<mask> }
<mask>
<mask> return b.String()
<mask> }
</s> Pull request: 2704 local addresses vol.3
Merge in DNS/adg... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | internal/version/version.go |
'resolve_clients':
'type': 'boolean'
'local_ptr_upstreams':
'type': 'array'
'description': >
Upstream servers, port is optional after colon. Empty value will
reset it to default values.
'items':
'type': 'string'
'exam... | <mask> 'enum':
<mask> - ''
<mask> - 'parallel'
<mask> - 'fastest_addr'
<mask> 'UpstreamsConfig':
<mask> 'type': 'object'
<mask> 'description': 'Upstreams configuration'
<mask> 'required':
<mask> - 'bootstrap_dns'
<mask> - 'upstream_dns'... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | openapi/openapi.yaml |
'private_upstream':
'type': 'array'
'description': >
Local PTR resolvers, port is optional after colon. Empty value will
reset it to default values.
'items':
'type': 'string'
'example':
- 'tls://1.1.1.1'
- 'tls://1.... | <mask> 'example':
<mask> - 'tls://1.1.1.1'
<mask> - 'tls://1.0.0.1'
<mask> 'UpstreamsConfigResponse':
<mask> 'type': 'object'
<mask> 'description': 'Upstreams configuration response'
<mask> 'additionalProperties':
<mask> 'type': 'string'
<mask> 'F... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/80ed8be14538418a1faa3fd52e84e391b2f53f55 | openapi/openapi.yaml |
"github.com/AdguardTeam/AdGuardHome/querylog" | <mask>
<mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/stats"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/log"
</s> * querylog: move code to a separate package
+ conf... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go |
queryLog querylog.QueryLog // Query log instance | <mask> // The zero Server is empty and ready for use.
<mask> type Server struct {
<mask> dnsProxy *proxy.Proxy // DNS proxy instance
<mask> dnsFilter *dnsfilter.Dnsfilter // DNS filter instance
<mask> queryLog *queryLog // Query log instance
<mask> stats stats.Stats
<mask>
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go |
<mask> conf ServerConfig
<mask> }
<mask>
<mask> // NewServer creates a new instance of the dnsforward.Server
<mask> // baseDir is the base directory for query logs
<mask> // Note: this function must be called only once
<mask> func NewServer(baseDir string, stats stats.Stats) *Server {
<mask> s := &Server{
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go | |
func NewServer(stats stats.Stats, queryLog querylog.QueryLog) *Server {
s := &Server{} | <mask>
<mask> // NewServer creates a new instance of the dnsforward.Server
<mask> // baseDir is the base directory for query logs
<mask> // Note: this function must be called only once
<mask> func NewServer(baseDir string, stats stats.Stats) *Server {
<mask> s := &Server{
<mask> queryLog: newQueryLog(baseDir... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go |
s.queryLog = queryLog | <mask> s := &Server{
<mask> queryLog: newQueryLog(baseDir),
<mask> }
<mask> s.stats = stats
<mask>
<mask> log.Printf("Start DNS server periodic jobs")
<mask> go s.queryLog.periodicQueryLogRotate()
<mask> return s
<mask> }
<mask>
<mask> // FilteringConfig represents the DNS filtering configuration o... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go |
QueryLogInterval uint32 `yaml:"querylog_interval"` // time interval for query log (in days) | <mask> BlockingMode string `yaml:"blocking_mode"` // mode how to answer filtered requests
<mask> BlockedResponseTTL uint32 `yaml:"blocked_response_ttl"` // if 0, then default is used (3600)
<mask> QueryLogEnabled bool `yaml:"querylog_enabled"` // if true, query log is enabled
<mask> ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go |
return nil | <mask> s.dnsFilter.Destroy()
<mask> s.dnsFilter = nil
<mask> }
<mask>
<mask> // flush remainder to file
<mask> return s.queryLog.flushLogBuffer(true)
<mask> }
<mask>
<mask> // IsRunning returns true if the DNS server is running
<mask> func (s *Server) IsRunning() bool {
<mask> s.RLock()
</s> * que... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go |
<mask> s.dnsProxy.ServeHTTP(w, r)
<mask> s.RUnlock()
<mask> }
<mask>
<mask> // GetQueryLog returns a map with the current query log ready to be converted to a JSON
<mask> func (s *Server) GetQueryLog() []map[string]interface{} {
<mask> s.RLock()
<mask> defer s.RUnlock()
<mask> return s.queryLog.getQueryL... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go | |
if s.conf.QueryLogEnabled && shouldLog && s.queryLog != nil { | <mask> shouldLog = false
<mask> }
<mask>
<mask> elapsed := time.Since(start)
<mask> if s.conf.QueryLogEnabled && shouldLog {
<mask> upstreamAddr := ""
<mask> if d.Upstream != nil {
<mask> upstreamAddr = d.Upstream.Address()
<mask> }
<mask> _ = s.queryLog.logRequest(msg, d.Res, res, elapsed, d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go |
s.queryLog.Add(msg, d.Res, res, elapsed, d.Addr, upstreamAddr) | <mask> upstreamAddr := ""
<mask> if d.Upstream != nil {
<mask> upstreamAddr = d.Upstream.Address()
<mask> }
<mask> _ = s.queryLog.logRequest(msg, d.Res, res, elapsed, d.Addr, upstreamAddr)
<mask> }
<mask>
<mask> s.updateStats(d, elapsed, *res)
<mask>
<mask> return nil
</s> * querylog: move co... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward.go |
<mask> "crypto/x509/pkix"
<mask> "encoding/pem"
<mask> "math/big"
<mask> "net"
<mask> "os"
<mask> "sync"
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter"
</s> * querylog: move code to a separate package
+ config: "querylog_interval" setting
/control/query... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward_test.go | |
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> const (
<mask> tlsServerName = "testdns.adguard.com"
<mask> dataDir = "testData"
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7 | dnsforward/dnsforward_test.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.