docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
<mask> ) <mask> <mask> const ( <mask> tlsServerName = "testdns.adguard.com" <mask> dataDir = "testData" <mask> testMessagesCount = 10 <mask> ) <mask> <mask> func TestServer(t *testing.T) { <mask> s := createTestServer(t) </s> * querylog: move code to a separate package + config: "querylo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> ) <mask> <mask> func TestServer(t *testing.T) { <mask> s := createTestServer(t) <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> </s> * querylog: move code to a separate package + config: "query...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> t.Fatalf("Couldn't talk to server %s: %s", addr, err) <mask> } <mask> assertGoogleAResponse(t, reply) <mask> <mask> // check query log and stats <mask> log := s.GetQueryLog() <mask> assert.Equal(t, 1, len(log), "Log size") <mask> <mask> // message over TCP <mask> req = createGoogleATestMessa...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> t.Fatalf("Couldn't talk to server %s: %s", addr, err) <mask> } <mask> assertGoogleAResponse(t, reply) <mask> <mask> // check query log and stats again <mask> log = s.GetQueryLog() <mask> assert.Equal(t, 2, len(log), "Log size") <mask> <mask> err = s.Stop() <mask> if err != nil { <mask> t....
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> <mask> func TestServerWithProtectionDisabled(t *testing.T) { <mask> s := createTestServer(t) <mask> s.conf.ProtectionEnabled = false <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> </s> * query...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> t.Fatalf("Couldn't talk to server %s: %s", addr, err) <mask> } <mask> assertGoogleAResponse(t, reply) <mask> <mask> // check query log and stats <mask> log := s.GetQueryLog() <mask> assert.Equal(t, 1, len(log), "Log size") <mask> <mask> err = s.Stop() <mask> if err != nil { <mask> t.Fatal...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> func TestDotServer(t *testing.T) { <mask> // Prepare the proxy server <mask> _, certPem, keyPem := createServerTLSConfig(t) <mask> s := createTestServer(t) <mask> defer removeDataDir(t) <mask> <mask> s.conf.TLSConfig = TLSConfig{ <mask> TLSListenAddr: &net.TCPAddr{Port: 0}, <mask> Certi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> } <mask> <mask> func TestServerRace(t *testing.T) { <mask> s := createTestServer(t) <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> </s> * querylog: move code to a separate package + config: "q...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> <mask> func TestSafeSearch(t *testing.T) { <mask> s := createTestServer(t) <mask> s.conf.SafeSearchEnabled = true <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> </s> * querylog: move code to a...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> } <mask> <mask> func TestInvalidRequest(t *testing.T) { <mask> s := createTestServer(t) <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> </s> * querylog: move code to a separate package + config...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> if err != nil { <mask> t.Fatalf("got a response to an invalid query") <mask> } <mask> <mask> // check query log and stats <mask> // invalid requests aren't written to the query log <mask> log := s.GetQueryLog() <mask> assert.Equal(t, 0, len(log), "Log size") <mask> <mask> err = s.Stop() <ma...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> } <mask> <mask> func TestBlockedRequest(t *testing.T) { <mask> s := createTestServer(t) <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP) </s> * querylog: m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> if reply.Rcode != dns.RcodeNameError { <mask> t.Fatalf("Wrong response: %s", reply.String()) <mask> } <mask> <mask> // check query log and stats <mask> log := s.GetQueryLog() <mask> assert.Equal(t, 1, len(log), "Log size") <mask> <mask> err = s.Stop() <mask> if err != nil { <mask> t.Fatal...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> <mask> func TestNullBlockedRequest(t *testing.T) { <mask> s := createTestServer(t) <mask> s.conf.FilteringConfig.BlockingMode = "null_ip" <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> addr := ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> } else { <mask> t.Fatalf("DNS server %s returned wrong answer type instead of A: %v", addr, reply.Answer[0]) <mask> } <mask> <mask> // check query log and stats <mask> log := s.GetQueryLog() <mask> assert.Equal(t, 1, len(log), "Log size") <mask> <mask> err = s.Stop() <mask> if err != nil { ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> } <mask> <mask> func TestBlockedByHosts(t *testing.T) { <mask> s := createTestServer(t) <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP) </s> * querylog: m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> } else { <mask> t.Fatalf("DNS server %s returned wrong answer type instead of A: %v", addr, reply.Answer[0]) <mask> } <mask> <mask> // check query log and stats <mask> log := s.GetQueryLog() <mask> assert.Equal(t, 1, len(log), "Log size") <mask> <mask> err = s.Stop() <mask> if err != nil { ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> } <mask> <mask> func TestBlockedBySafeBrowsing(t *testing.T) { <mask> s := createTestServer(t) <mask> defer removeDataDir(t) <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP) </s> * quer...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> } else { <mask> t.Fatalf("DNS server %s returned wrong answer type instead of A: %v", addr, reply.Answer[0]) <mask> } <mask> <mask> // check query log and stats <mask> log := s.GetQueryLog() <mask> assert.Equal(t, 1, len(log), "Log size") <mask> <mask> err = s.Stop() <mask> if err != nil { ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
s := NewServer(nil, nil)
<mask> } <mask> } <mask> <mask> func createTestServer(t *testing.T) *Server { <mask> s := NewServer(createDataDir(t), nil) <mask> s.conf.UDPListenAddr = &net.UDPAddr{Port: 0} <mask> s.conf.TCPListenAddr = &net.TCPAddr{Port: 0} <mask> <mask> s.conf.QueryLogEnabled = true <mask> s.conf.FilteringConfig.F...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> <mask> return &tls.Config{Certificates: []tls.Certificate{cert}, ServerName: tlsServerName, MinVersion: tls.VersionTLS12}, certPem, keyPem <mask> } <mask> <mask> func createDataDir(t *testing.T) string { <mask> err := os.MkdirAll(dataDir, 0755) <mask> if err != nil { <mask> t.Fatalf("Cannot create...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> s := createTestServer(t) <mask> s.conf.AllowedClients = []string{"1.1.1.1", "2.2.0.0/16"} <mask> <mask> err := s.Start(nil) <mask> defer removeDataDir(t) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> <mask> if s.isBlockedIP("1.1.1.1") { </s> * que...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> s := createTestServer(t) <mask> s.conf.DisallowedClients = []string{"1.1.1.1", "2.2.0.0/16"} <mask> <mask> err := s.Start(nil) <mask> defer removeDataDir(t) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> <mask> if !s.isBlockedIP("1.1.1.1") { </s> *...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
<mask> s := createTestServer(t) <mask> s.conf.BlockedHosts = []string{"host1", "host2"} <mask> <mask> err := s.Start(nil) <mask> defer removeDataDir(t) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> <mask> if !s.isBlockedDomain("host1") { </s> * querylog:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
dnsforward/dnsforward_test.go
"github.com/AdguardTeam/AdGuardHome/querylog"
<mask> <mask> "github.com/AdguardTeam/AdGuardHome/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/dnsforward" <mask> "github.com/AdguardTeam/AdGuardHome/stats" <mask> "github.com/AdguardTeam/golibs/file" <mask> "github.com/AdguardTeam/golibs/log" <m...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/config.go
queryLog querylog.QueryLog
<mask> client *http.Client <mask> stats stats.Stats <mask> <mask> // cached version.json to avoid hammering github.io for each page reload <mask> versionCheckJSON []byte <mask> versionCheckLastTime time.Time <mask> <mask> dnsctx dnsContext </s> * querylog: move code to a s...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/config.go
QueryLogInterval: 1,
<mask> BlockingMode: "nxdomain", // mode how to answer filtered requests <mask> BlockedResponseTTL: 10, // in seconds <mask> QueryLogEnabled: true, <mask> Ratelimit: 20, <mask> RefuseAny: true, <mask> BootstrapDNS: defaultBootstrap, <mask> AllServers:...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/config.go
if !checkQueryLogInterval(config.DNS.QueryLogInterval) { config.DNS.QueryLogInterval = 1 }
<mask> config.DNS.StatsInterval = 1 <mask> } <mask> <mask> for _, cy := range config.Clients { <mask> cli := Client{ <mask> Name: cy.Name, <mask> IP: cy.IP, <mask> MAC: cy.MAC, <mask> UseOwnSettings: !cy.UseGlobalSettings, </s> * querylog...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/config.go
<mask> config.DNS.ProtectionEnabled = false <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> // ----- <mask> // stats <mask> // ----- <mask> func handleQueryLogEnable(w http.ResponseWriter, r *http.Request) { <mask> config.DNS.QueryLogEnabled = true <mask> httpUpdateConfigReloadDNSRe...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/control.go
<mask> func registerControlHandlers() { <mask> httpRegister(http.MethodGet, "/control/status", handleStatus) <mask> httpRegister(http.MethodPost, "/control/enable_protection", handleProtectionEnable) <mask> httpRegister(http.MethodPost, "/control/disable_protection", handleProtectionDisable) <mask> httpRegiste...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/control.go
RegisterQueryLogHandlers()
<mask> RegisterClientsHandlers() <mask> registerRewritesHandlers() <mask> RegisterBlockedServicesHandlers() <mask> RegisterStatsHandlers() <mask> <mask> http.HandleFunc("/dns-query", postInstall(handleDOH)) <mask> } <mask> <mask> type httpHandlerType func(http.ResponseWriter, *http.Request) </s> * quer...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/control.go
"github.com/AdguardTeam/AdGuardHome/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/dnsforward" <mask> "github.com/AdguardTeam/AdGuardHome/stats" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/log" <mask> ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/dns.go
conf := querylog.Config{ BaseDir: baseDir, Interval: config.DNS.QueryLogInterval * 24, } config.queryLog = querylog.New(conf) config.dnsServer = dnsforward.NewServer(config.stats, config.queryLog)
<mask> config.stats, err = stats.New(statsDBFilename, config.DNS.StatsInterval, nil) <mask> if err != nil { <mask> log.Fatal("Couldn't initialize statistics module") <mask> } <mask> config.dnsServer = dnsforward.NewServer(baseDir, config.stats) <mask> <mask> initRDNS() <mask> } <mask> <mask> func isR...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/dns.go
config.queryLog.Close()
<mask> <mask> config.stats.Close() <mask> <mask> return nil <mask> } </s> * querylog: move code to a separate package + config: "querylog_interval" setting /control/querylog_config, /control/querylog_info + POST /control/querylog_clear </s> remove // flush remainder to file return s.queryLog.flushLogBuffer...
[ "keep", "add", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8104c902eed397d2b34f43be485d49e444ca8cc7
home/dns.go
<mask> "github.com/miekg/dns" <mask> "golang.org/x/net/publicsuffix" <mask> ) <mask> <mask> const defaultCacheSize = 64 * 1024 // in number of elements <mask> const defaultCacheTime = 30 * time.Minute <mask> <mask> const defaultHTTPTimeout = 5 * time.Minute <mask> const defaultHTTPMaxIdleConnections = 100 ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81303b5db74705535b9810b7daddd196891079c5
dnsfilter/dnsfilter.go
SafeBrowsingCacheSize int `yaml:"safebrowsing_cache_size"` SafeSearchCacheSize int `yaml:"safesearch_cache_size"` ParentalCacheSize int `yaml:"parental_cache_size"`
<mask> SafeBrowsingEnabled bool `yaml:"safebrowsing_enabled"` <mask> ResolverAddress string // DNS server address <mask> <mask> // Filtering callback function <mask> FilterHandler func(clientAddr string, settings *RequestFilteringSettings) `yaml:"-"` <mask> } <mask> </s> + config: add cache size set...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81303b5db74705535b9810b7daddd196891079c5
dnsfilter/dnsfilter.go
gctx.safebrowsingCache = gcache.New(c.SafeBrowsingCacheSize).LRU().Expiration(defaultCacheTime).Build()
<mask> <mask> if c != nil { <mask> // initialize objects only once <mask> if gctx.safebrowsingCache == nil { <mask> gctx.safebrowsingCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build() <mask> } <mask> if gctx.safeSearchCache == nil { <mask> gctx.safeSearchCache = gcac...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81303b5db74705535b9810b7daddd196891079c5
dnsfilter/dnsfilter.go
gctx.safeSearchCache = gcache.New(c.SafeSearchCacheSize).LRU().Expiration(defaultCacheTime).Build()
<mask> if gctx.safebrowsingCache == nil { <mask> gctx.safebrowsingCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build() <mask> } <mask> if gctx.safeSearchCache == nil { <mask> gctx.safeSearchCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build() <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81303b5db74705535b9810b7daddd196891079c5
dnsfilter/dnsfilter.go
gctx.parentalCache = gcache.New(c.ParentalCacheSize).LRU().Expiration(defaultCacheTime).Build()
<mask> if gctx.safeSearchCache == nil { <mask> gctx.safeSearchCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build() <mask> } <mask> if gctx.parentalCache == nil { <mask> gctx.parentalCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build() <mask> } <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81303b5db74705535b9810b7daddd196891079c5
dnsfilter/dnsfilter.go
config.DNS.SafeBrowsingCacheSize = 64 * 1024 config.DNS.SafeSearchCacheSize = 64 * 1024 config.DNS.ParentalCacheSize = 64 * 1024
<mask> config.DNS.UpstreamDNS = defaultDNS <mask> } <mask> } <mask> <mask> // getConfigFilename returns path to the current config file <mask> func (c *configuration) getConfigFilename() string { </s> + config: add cache size settings </s> remove gctx.safebrowsingCache = gcache.New(defaultCacheSize).LRU()...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81303b5db74705535b9810b7daddd196891079c5
home/config.go
"path/filepath"
<mask> "net" <mask> "net/http" <mask> "net/url" <mask> "os" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/util" <mask> "github.com/AdguardTeam/golibs/log" </s> + filters: support filters from local disk </s> remove // IsValidURL - return TRUE if URL is valid </s> a...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/control_filtering.go
"github.com/AdguardTeam/AdGuardHome/util"
<mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/miekg/dns" <mask> ) <mask> </s> + filters: support filters from local disk </s> remove // IsValidURL - return TRUE if URL is valid </s> add // IsValidURL - return TRUE if URL or file path is valid </s> remove ...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/control_filtering.go
// IsValidURL - return TRUE if URL or file path is valid
<mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/miekg/dns" <mask> ) <mask> <mask> // IsValidURL - return TRUE if URL is valid <mask> func IsValidURL(rawurl string) bool { <mask> url, err := url.ParseRequestURI(rawurl) <mask> if err != nil { <mask> return false //Couldn't even parse the raw...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/control_filtering.go
if filepath.IsAbs(rawurl) { // this is a file path return util.FileExists(rawurl) }
<mask> // IsValidURL - return TRUE if URL or file path is valid <mask> func IsValidURL(rawurl string) bool { <mask> url, err := url.ParseRequestURI(rawurl) <mask> if err != nil { <mask> return false //Couldn't even parse the rawurl <mask> } <mask> if len(url.Scheme) == 0 { </s> + filters: support filters ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/control_filtering.go
http.Error(w, "Invalid URL or file path", http.StatusBadRequest)
<mask> return <mask> } <mask> <mask> if !IsValidURL(fj.URL) { <mask> http.Error(w, "Invalid URL", http.StatusBadRequest) <mask> return <mask> } <mask> <mask> // Check for duplicates <mask> if filterExists(fj.URL) { </s> + filters: support filters from local disk </s> remove http.Error(w, "inva...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/control_filtering.go
<mask> httpError(w, http.StatusBadRequest, "Failed to parse request body json: %s", err) <mask> return <mask> } <mask> <mask> if !IsValidURL(req.URL) { <mask> http.Error(w, "URL parameter is not valid request URL", http.StatusBadRequest) <mask> return <mask> } <mask> <mask> // go through each el...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/control_filtering.go
http.Error(w, "invalid URL or file path", http.StatusBadRequest)
<mask> return <mask> } <mask> <mask> if !IsValidURL(fj.URL) { <mask> http.Error(w, "invalid URL", http.StatusBadRequest) <mask> return <mask> } <mask> <mask> filt := filter{ <mask> Enabled: fj.Data.Enabled, </s> + filters: support filters from local disk </s> remove http.Error(w, "Invalid URL...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/control_filtering.go
URL string // URL or a file path
<mask> <mask> // field ordering is important -- yaml fields will mirror ordering from here <mask> type filter struct { <mask> Enabled bool <mask> URL string <mask> Name string `yaml:"name"` <mask> RulesCount int `yaml:"-"` <mask> LastUpdated time.Time `yaml:"-"` <mask> check...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/filter.go
// nolint(gocyclo)
<mask> return b, err <mask> } <mask> <mask> func (f *Filtering) updateIntl(filter *filter) (bool, error) { <mask> log.Tracef("Downloading update for filter %d from %s", filter.ID, filter.URL) <mask> <mask> tmpFile, err := ioutil.TempFile(filepath.Join(Context.getDataDir(), filterDir), "") <mask> if err !=...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/filter.go
var reader io.Reader if filepath.IsAbs(filter.URL) { f, err := os.Open(filter.URL) if err != nil { return false, fmt.Errorf("open file: %s", err) } defer f.Close() reader = f } else { resp, err := Context.client.Get(filter.URL) if resp != nil && resp.Body != nil { defer resp.Body.Close() } if...
<mask> _ = os.Remove(tmpFile.Name()) <mask> } <mask> }() <mask> <mask> resp, err := Context.client.Get(filter.URL) <mask> if resp != nil && resp.Body != nil { <mask> defer resp.Body.Close() <mask> } <mask> if err != nil { <mask> log.Printf("Couldn't request filter from URL %s, skipping: %s", fi...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/filter.go
if resp.StatusCode != 200 { log.Printf("Got status code %d from URL %s, skipping", resp.StatusCode, filter.URL) return false, fmt.Errorf("got status code != 200: %d", resp.StatusCode) } reader = resp.Body
<mask> log.Printf("Couldn't request filter from URL %s, skipping: %s", filter.URL, err) <mask> return false, err <mask> } <mask> <mask> if resp.StatusCode != 200 { <mask> log.Printf("Got status code %d from URL %s, skipping", resp.StatusCode, filter.URL) <mask> return false, fmt.Errorf("got status cod...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/filter.go
n, err := reader.Read(buf)
<mask> firstChunkLen := 0 <mask> buf := make([]byte, 64*1024) <mask> total := 0 <mask> for { <mask> n, err := resp.Body.Read(buf) <mask> total += n <mask> <mask> if htmlTest { <mask> // gather full buffer firstChunk and perform its data tests <mask> num := util.MinInt(n, len(firstChunk)-first...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
home/filter.go
summary: 'Add filter URL or an absolute file path'
<mask> post: <mask> tags: <mask> - filtering <mask> operationId: filteringAddURL <mask> summary: 'Add filter URL' <mask> consumes: <mask> - application/json <mask> parameters: <mask> - in: "body" <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
openapi/openapi.yaml
description: "URL or an absolute path to the file containing filtering rules"
<mask> properties: <mask> name: <mask> type: "string" <mask> url: <mask> description: "URL containing filtering rules" <mask> type: "string" <mask> example: "https://filters.adtidy.org/windows/filters/15.txt" <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/81309c707a70ff15a7075fb5906962764b470ca7
openapi/openapi.yaml
now := time.Now() timeWindow := time.Minute * 3 notBefore := now.Add(timeWindow * -1)
<mask> <mask> domains := map[string]int{} <mask> blocked := map[string]int{} <mask> clients := map[string]int{} <mask> <mask> for _, value := range values { <mask> entry, ok := value.(map[string]interface{}) <mask> if !ok { </s> API /stats_top -- show only top entries for last 3 minutes
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8198b65f29f83e2ff51d4c0f89a7b7dcbe9c2fc1
control.go
time := getTime(entry) if time.Before(notBefore) { // skip if the entry is before specified cutoff continue }
<mask> host := getHost(entry) <mask> reason := getReason(entry) <mask> client := getClient(entry) <mask> if len(host) > 0 { <mask> domains[host]++ <mask> } <mask> if len(host) > 0 && strings.HasPrefix(reason, "Filtered") { <mask> blocked[host]++ <mask> } </s> API /stats_top -- show only to...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8198b65f29f83e2ff51d4c0f89a7b7dcbe9c2fc1
control.go
"time"
<mask> "sort" <mask> "strings" <mask> ) <mask> <mask> func clamp(value, low, high int) int { <mask> if value < low { <mask> return low <mask> } </s> API /stats_top -- show only top entries for last 3 minutes
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8198b65f29f83e2ff51d4c0f89a7b7dcbe9c2fc1
helpers.go
func getTime(entry map[string]interface{}) time.Time { t, ok := entry["time"] if !ok { return time.Time{} } tstr, ok := t.(string) if !ok { return time.Time{} } value, err := time.Parse(time.RFC3339, tstr) if err != nil { return time.Time{} } return value }
<mask> } <mask> <mask> // ------------------------------------------------- <mask> // helper functions for parsing parameters from body <mask> // ------------------------------------------------- <mask> func parseParametersFromBody(r io.Reader) (map[string]string, error) { <mask> parameters := map[string]strin...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8198b65f29f83e2ff51d4c0f89a7b7dcbe9c2fc1
helpers.go
func NewARPDB() (arp ARPDB) { return newARPDB()
<mask> Neighbors() (ns []Neighbor) <mask> } <mask> <mask> // NewARPDB returns the ARPDB properly initialized for the OS. <mask> func NewARPDB() (arp ARPDB, err error) { <mask> arp = newARPDB() <mask> <mask> err = arp.Refresh() <mask> if err != nil { <mask> return nil, fmt.Errorf("arpdb initial refresh...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb.go
invalid.mac (1.2.3.4) at 12:34:56:78:910 on el0 ifscope [ethernet] invalid.ip (1.2.3.4.5) at ab:cd:ef:ab:cd:12 on ek0 ifscope [ethernet] invalid.fmt 1 at 12:cd:ef:ab:cd:ef on er0 ifscope [ethernet]
<mask> "net" <mask> ) <mask> <mask> const arpAOutput = ` <mask> hostname.one (192.168.1.2) at ab:cd:ef:ab:cd:ef on en0 ifscope [ethernet] <mask> hostname.two (::ffff:ffff) at ef:cd:ab:ef:cd:ab on em0 expires in 1198 seconds [ethernet] <mask> ? (::1234) at aa:bb:cc:dd:ee:ff on ej0 expires in 1918 seconds [ether...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_bsd_test.go
? (::1234) at aa:bb:cc:dd:ee:ff on ej0 expires in 1918 seconds [ethernet]
<mask> hostname.one (192.168.1.2) at ab:cd:ef:ab:cd:ef on en0 ifscope [ethernet] <mask> hostname.two (::ffff:ffff) at ef:cd:ab:ef:cd:ab on em0 expires in 1198 seconds [ethernet] <mask> ` <mask> <mask> var wantNeighs = []Neighbor{{ <mask> Name: "hostname.one", <mask> IP: net.IPv4(192, 168, 1, 2), </s> Pull ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_bsd_test.go
}, { Name: "", IP: net.ParseIP("::1234"), MAC: net.HardwareAddr{0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF},
<mask> Name: "hostname.two", <mask> IP: net.ParseIP("::ffff:ffff"), <mask> MAC: net.HardwareAddr{0xEF, 0xCD, 0xAB, 0xEF, 0xCD, 0xAB}, <mask> }} </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-cover-aghnet-vol.2 to master Updates #2846. Closes #4408. Squashed commit of the fo...
[ "keep", "keep", "add", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_bsd_test.go
1.2.3.4.5 0x1 0x2 aa:bb:cc:dd:ee:ff * wan 1.2.3.4 0x1 0x2 12:34:56:78:910 * wan
<mask> ) <mask> <mask> const arpAOutputWrt = ` <mask> IP address HW type Flags HW address Mask Device <mask> 192.168.1.2 0x1 0x2 ab:cd:ef:ab:cd:ef * wan <mask> ::ffff:ffff 0x1 0x2 ef:cd:ab:ef:cd:ab * wan` <mask> <mask> const...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_linux_test.go
invalid.mac (1.2.3.4) at 12:34:56:78:910 on el0 ifscope [ethernet] invalid.ip (1.2.3.4.5) at ab:cd:ef:ab:cd:12 on ek0 ifscope [ethernet] invalid.fmt 1 at 12:cd:ef:ab:cd:ef on er0 ifscope [ethernet]
<mask> <mask> const arpAOutput = ` <mask> ? (192.168.1.2) at ab:cd:ef:ab:cd:ef on en0 ifscope [ethernet] <mask> ? (::ffff:ffff) at ef:cd:ab:ef:cd:ab on em0 expires in 100 seconds [ethernet]` <mask> <mask> const ipNeighOutput = ` </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-co...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_linux_test.go
1.2.3.4.5 dev enp0s3 lladdr aa:bb:cc:dd:ee:ff DELAY 1.2.3.4 dev enp0s3 lladdr 12:34:56:78:910 DELAY
<mask> ? (::ffff:ffff) at ef:cd:ab:ef:cd:ab on em0 expires in 100 seconds [ethernet]` <mask> <mask> const ipNeighOutput = ` <mask> 192.168.1.2 dev enp0s3 lladdr ab:cd:ef:ab:cd:ef DELAY <mask> ::ffff:ffff dev enp0s3 lladdr ef:cd:ab:ef:cd:ab router STALE` <mask> <mask> var wantNeighs = []Neighbor{{ <mask> IP: ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_linux_test.go
1.2.3.4.5 aa:bb:cc:dd:ee:ff em0 permanent 1.2.3.4 12:34:56:78:910 em0 permanent
<mask> ) <mask> <mask> const arpAOutput = ` <mask> Host Ethernet Address Netif Expire Flags <mask> 192.168.1.2 ab:cd:ef:ab:cd:ef em0 19m56s <mask> ::ffff:ffff ef:cd:ab:ef:cd:ab em0 permanent l <mask> ` <mask> <mask> var wantNeighs = []Neighbor{{ <mask> IP: net.IPv4(192, 168, 1, 2), </s> Pu...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_openbsd_test.go
"testing/iotest"
<mask> "strings" <mask> "sync" <mask> "testing" <mask> <mask> "github.com/AdguardTeam/golibs/errors" <mask> "github.com/AdguardTeam/golibs/testutil" <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) </s> Pull request: 2846 cover aghnet vol.2 Merge in DN...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_test.go
func TestNewARPDB(t *testing.T) { var a ARPDB require.NotPanics(t, func() { a = NewARPDB() }) assert.NotNil(t, a) }
<mask> "github.com/stretchr/testify/require" <mask> ) <mask> <mask> // TestARPDB is the mock implementation of ARPDB to use in tests. <mask> type TestARPDB struct { <mask> OnRefresh func() (err error) <mask> OnNeighbors func() (ns []Neighbor) <mask> } </s> Pull request: 2846 cover aghnet vol.2 Merge in ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/arpdb_test.go
// writeRules writes the actual rule for the qtype and the PTR for the host-ip // pair into internal builders.
<mask> log.Debug("%s: added ip-host pair %q-%q", hostsContainerPref, ip, h) <mask> } <mask> } <mask> <mask> // writeRules writes the actual rule for the qtype and the PTR for the <mask> // host-ip pair into internal builders. <mask> func (hp *hostsParser) writeRules(host string, ip net.IP) (rule, rulePtr str...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/hostscontainer.go
} else if len(ifaces) == 0 {
<mask> func GetValidNetInterfacesForWeb() ([]*NetInterface, error) { <mask> ifaces, err := net.Interfaces() <mask> if err != nil { <mask> return nil, fmt.Errorf("couldn't get interfaces: %w", err) <mask> } <mask> if len(ifaces) == 0 { <mask> return nil, errors.Error("couldn't find any legible interface")...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/net.go
"github.com/AdguardTeam/golibs/errors"
<mask> "testing" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest" <mask> "github.com/AdguardTeam/golibs/netutil" <mask> "github.com/AdguardTeam/golibs/testutil" <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) <mask> </s> Pull request...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/net_test.go
<mask> package aghnet <mask> <mask> import ( <mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> // DefaultRefreshIvl is the default period of time between refreshing cached <mask> // addresses. <mask> // const DefaultRefreshIvl = 5 * time.Minute <mask> <mask> // Ho...
[ "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers.go
// Get returns the slice of local resolvers' addresses. It must be safe for // concurrent use.
<mask> type HostGenFunc func() (host string) <mask> <mask> // SystemResolvers helps to work with local resolvers' addresses provided by OS. <mask> type SystemResolvers interface { <mask> // Get returns the slice of local resolvers' addresses. It should be <mask> // safe for concurrent use. <mask> Get() (rs ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers.go
// refresh refreshes the local resolvers' addresses cache. It must be safe // for concurrent use.
<mask> type SystemResolvers interface { <mask> // Get returns the slice of local resolvers' addresses. It should be <mask> // safe for concurrent use. <mask> Get() (rs []string) <mask> // refresh refreshes the local resolvers' addresses cache. It should be <mask> // safe for concurrent use. <mask> refres...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers.go
<mask> // safe for concurrent use. <mask> refresh() (err error) <mask> } <mask> <mask> // refreshWithTicker refreshes the cache of sr after each tick form tickCh. <mask> func refreshWithTicker(sr SystemResolvers, tickCh <-chan time.Time) { <mask> defer log.OnPanic("systemResolvers") <mask> <mask> // TODO...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers.go
<mask> // NewSystemResolvers returns a SystemResolvers with the cache refresh rate <mask> // defined by refreshIvl. It disables auto-resfreshing if refreshIvl is 0. If <mask> // nil is passed for hostGenFunc, the default generator will be used. <mask> func NewSystemResolvers( <mask> refreshIvl time.Duration, <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers.go
sr = newSystemResolvers(hostGenFunc)
<mask> func NewSystemResolvers( <mask> refreshIvl time.Duration, <mask> hostGenFunc HostGenFunc, <mask> ) (sr SystemResolvers, err error) { <mask> sr = newSystemResolvers(refreshIvl, hostGenFunc) <mask> <mask> // Fill cache. <mask> err = sr.refresh() <mask> if err != nil { <mask> return nil, err </s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers.go
<mask> if err != nil { <mask> return nil, err <mask> } <mask> <mask> if refreshIvl > 0 { <mask> ticker := time.NewTicker(refreshIvl) <mask> <mask> go refreshWithTicker(sr, ticker.C) <mask> } <mask> <mask> return sr, nil <mask> } </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers.go
// addrsLock protects addrs.
<mask> } <mask> <mask> // systemResolvers is a default implementation of SystemResolvers interface. <mask> type systemResolvers struct { <mask> resolver *net.Resolver <mask> hostGenFunc HostGenFunc <mask> <mask> // addrs is the set that contains cached local resolvers' addresses. <mask> addrs *str...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others.go
// addrs is the set that contains cached local resolvers' addresses. addrs *stringutil.Set // resolver is used to fetch the resolvers' addresses. resolver *net.Resolver // hostGenFunc generates hosts to resolve. hostGenFunc HostGenFunc
<mask> type systemResolvers struct { <mask> // addrsLock protects addrs. <mask> addrsLock sync.RWMutex <mask> } <mask> <mask> const ( <mask> // errBadAddrPassed is returned when dialFunc can't parse an IP address. </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-cover-aghnet-v...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others.go
// refresh implements the SystemResolvers interface for *systemResolvers.
<mask> errUnexpectedHostFormat errors.Error = "unexpected host format" <mask> ) <mask> <mask> func (sr *systemResolvers) refresh() (err error) { <mask> defer func() { err = errors.Annotate(err, "systemResolvers: %w") }() <mask> <mask> _, err = sr.resolver.LookupHost(context.Background(), sr.hostGenFunc()) ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others.go
func newSystemResolvers(hostGenFunc HostGenFunc) (sr SystemResolvers) {
<mask> <mask> return err <mask> } <mask> <mask> func newSystemResolvers(refreshIvl time.Duration, hostGenFunc HostGenFunc) (sr SystemResolvers) { <mask> if hostGenFunc == nil { <mask> hostGenFunc = defaultHostGen <mask> } <mask> s := &systemResolvers{ <mask> resolver: &net.Resolver{ </s> Pull reque...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others.go
<mask> // validateDialedHost validated the host used by resolvers in dialFunc. <mask> func validateDialedHost(host string) (err error) { <mask> defer func() { err = errors.Annotate(err, "parsing %q: %w", host) }() <mask> <mask> var ipStr string <mask> parts := strings.Split(host, "%") <mask> switch len(part...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others.go
// host
<mask> var ipStr string <mask> parts := strings.Split(host, "%") <mask> switch len(parts) { <mask> case 1: <mask> ipStr = host <mask> case 2: <mask> // Remove the zone and check the IP address part. <mask> ipStr = parts[0] <mask> default: <mask> return errUnexpectedHostFormat </s> Pull request:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others.go
host = parts[0]
<mask> case 1: <mask> ipStr = host <mask> case 2: <mask> // Remove the zone and check the IP address part. <mask> ipStr = parts[0] <mask> default: <mask> return errUnexpectedHostFormat <mask> } <mask> <mask> if net.ParseIP(ipStr) == nil { </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others.go
if _, err = netutil.ParseIP(host); err != nil {
<mask> default: <mask> return errUnexpectedHostFormat <mask> } <mask> <mask> if net.ParseIP(ipStr) == nil { <mask> return errBadAddrPassed <mask> } <mask> <mask> return nil <mask> } </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-cover-aghnet-vol.2 to master Update...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others.go
<mask> <mask> import ( <mask> "context" <mask> "testing" <mask> "time" <mask> <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) <mask> </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-cover-aghnet-vol.2 to master Updates ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
func createTestSystemResolversImpl(
<mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) <mask> <mask> func createTestSystemResolversImp( <mask> t *testing.T, <mask> refreshDur time.Duration, <mask> hostGenFunc HostGenFunc, <mask> ) (imp *systemResolvers) { <mask> t.Helper() </s> Pull request...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
<mask> ) <mask> <mask> func createTestSystemResolversImp( <mask> t *testing.T, <mask> refreshDur time.Duration, <mask> hostGenFunc HostGenFunc, <mask> ) (imp *systemResolvers) { <mask> t.Helper() <mask> <mask> sr := createTestSystemResolvers(t, refreshDur, hostGenFunc) </s> Pull request: 2846 cover ag...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
sr := createTestSystemResolvers(t, hostGenFunc) require.IsType(t, (*systemResolvers)(nil), sr)
<mask> hostGenFunc HostGenFunc, <mask> ) (imp *systemResolvers) { <mask> t.Helper() <mask> <mask> sr := createTestSystemResolvers(t, refreshDur, hostGenFunc) <mask> <mask> var ok bool <mask> imp, ok = sr.(*systemResolvers) <mask> require.True(t, ok) <mask> </s> Pull request: 2846 cover aghnet vol.2 ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
return sr.(*systemResolvers)
<mask> t.Helper() <mask> <mask> sr := createTestSystemResolvers(t, refreshDur, hostGenFunc) <mask> <mask> var ok bool <mask> imp, ok = sr.(*systemResolvers) <mask> require.True(t, ok) <mask> <mask> return imp <mask> } <mask> <mask> func TestSystemResolvers_Refresh(t *testing.T) { <mask> t.Run("e...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
sr := createTestSystemResolvers(t, nil)
<mask> } <mask> <mask> func TestSystemResolvers_Refresh(t *testing.T) { <mask> t.Run("expected_error", func(t *testing.T) { <mask> sr := createTestSystemResolvers(t, 0, nil) <mask> <mask> assert.NoError(t, sr.refresh()) <mask> }) <mask> <mask> t.Run("unexpected_error", func(t *testing.T) { </s> Pul...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
_, err := NewSystemResolvers(func() string {
<mask> assert.NoError(t, sr.refresh()) <mask> }) <mask> <mask> t.Run("unexpected_error", func(t *testing.T) { <mask> _, err := NewSystemResolvers(0, func() string { <mask> return "127.0.0.1::123" <mask> }) <mask> assert.Error(t, err) <mask> }) <mask> } </s> Pull request: 2846 cover aghnet vol....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
imp := createTestSystemResolversImpl(t, nil)
<mask> }) <mask> } <mask> <mask> func TestSystemResolvers_DialFunc(t *testing.T) { <mask> imp := createTestSystemResolversImp(t, 0, nil) <mask> <mask> testCases := []struct { <mask> want error <mask> name string <mask> address string </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/a...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
name: "valid_ipv4",
<mask> name string <mask> address string <mask> }{{ <mask> want: errFakeDial, <mask> name: "valid", <mask> address: "127.0.0.1", <mask> }, { <mask> want: errFakeDial, <mask> name: "valid_ipv6_port", <mask> address: "[::1]:53", </s> Pull request: 2846 cover aghnet vol.2 Merge...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_others_test.go
<mask> package aghnet <mask> <mask> import ( <mask> "testing" <mask> "time" <mask> <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) <mask> </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-cover-aghnet-vol.2 to master Upda...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_test.go
<mask> ) <mask> <mask> func createTestSystemResolvers( <mask> t *testing.T, <mask> refreshDur time.Duration, <mask> hostGenFunc HostGenFunc, <mask> ) (sr SystemResolvers) { <mask> t.Helper() <mask> <mask> var err error </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-cov...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_test.go
sr, err = NewSystemResolvers(hostGenFunc)
<mask> ) (sr SystemResolvers) { <mask> t.Helper() <mask> <mask> var err error <mask> sr, err = NewSystemResolvers(refreshDur, hostGenFunc) <mask> require.NoError(t, err) <mask> require.NotNil(t, sr) <mask> <mask> return sr <mask> } </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_test.go
sr := createTestSystemResolvers(t, nil) var rs []string require.NotPanics(t, func() { rs = sr.Get() }) assert.NotEmpty(t, rs)
<mask> return sr <mask> } <mask> <mask> func TestSystemResolvers_Get(t *testing.T) { <mask> sr := createTestSystemResolvers(t, 0, nil) <mask> assert.NotEmpty(t, sr.Get()) <mask> } <mask> <mask> // TODO(e.burkov): Write tests for refreshWithTicker. <mask> // <mask> // See https://github.com/AdguardTeam/A...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_test.go
<mask> "net" <mask> "os/exec" <mask> "strings" <mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/errors" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-cover-aghnet-vol.2 to master Upd...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_windows.go