docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
func newSystemResolvers(_ HostGenFunc) (sr SystemResolvers) {
<mask> addrs []string <mask> addrsLock sync.RWMutex <mask> } <mask> <mask> func newSystemResolvers(refreshIvl time.Duration, _ HostGenFunc) (sr SystemResolvers) { <mask> return &systemResolvers{} <mask> } <mask> <mask> func (sr *systemResolvers) Get() (rs []string) { <mask> sr.addrsLock.RLock() </s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/systemresolvers_windows.go
<mask> IP address HW type Flags HW address Mask Device <mask> 192.168.1.2 0x1 0x2 ab:cd:ef:ab:cd:ef * wan <mask> ::ffff:ffff 0x1 0x0 ef:cd:ab:ef:cd:ab * br-lan <mask> 0.0.0.0 0x0 0x0 00:00:00:00:00:00 ...
[ "keep", "keep", "keep", "replace" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/aghnet/testdata/proc_net_arp
s.sysResolvers, err = aghnet.NewSystemResolvers(nil)
<mask> } <mask> <mask> // TODO(e.burkov): Enable the refresher after the actual implementation <mask> // passes the public testing. <mask> s.sysResolvers, err = aghnet.NewSystemResolvers(0, nil) <mask> if err != nil { <mask> return nil, fmt.Errorf("initializing system resolvers: %w", err) <mask> } <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/dnsforward/dnsforward.go
defer log.OnPanic("clients container")
<mask> return objs <mask> } <mask> <mask> func (clients *clientsContainer) periodicUpdate() { <mask> for { <mask> clients.Reload() <mask> time.Sleep(clientsUpdatePeriod) <mask> } </s> Pull request: 2846 cover aghnet vol.2 Merge in DNS/adguard-home from 2846-cover-aghnet-vol.2 to master Updates #2846....
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/home/clients.go
arpdb := aghnet.NewARPDB()
<mask> return err <mask> } <mask> } <mask> <mask> var arpdb aghnet.ARPDB <mask> arpdb, err = aghnet.NewARPDB() <mask> if err != nil { <mask> log.Info("warning: creating arpdb: %s; using stub", err) <mask> <mask> arpdb = aghnet.EmptyARPDB{} <mask> } <mask> <mask> Context.clients.Init(confi...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c
internal/home/home.go
<mask> "version": "3.2.0", <mask> "resolved": "https://registry.npmjs.org/ajv-keywords/-/ajv-keywords-3.2.0.tgz", <mask> "integrity": "sha1-6GuBnGAs+IIa1jdBNpjx3sAhhHo=" <mask> }, <mask> "alertifyjs": { <mask> "version": "1.11.1", <mask> "resolved": "https://registry.npmjs.o...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/package-lock.json
"dom-helpers": { "version": "3.3.1", "resolved": "https://registry.npmjs.org/dom-helpers/-/dom-helpers-3.3.1.tgz", "integrity": "sha512-2Sm+JaYn74OiTM2wHvxJOo3roiq/h25Yi69Fqk269cNUwIXsCvATB6CRSFC9Am/20G2b28hGv/+7NiWydIrPvg==" },
<mask> "dev": true <mask> } <mask> } <mask> }, <mask> "dom-serializer": { <mask> "version": "0.1.0", <mask> "resolved": "https://registry.npmjs.org/dom-serializer/-/dom-serializer-0.1.0.tgz", <mask> "integrity": "sha1-BzxpdUbOB4DOI75KKOKT5AvDDII=", <mask> ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/package-lock.json
"nanoid": { "version": "1.2.3", "resolved": "https://registry.npmjs.org/nanoid/-/nanoid-1.2.3.tgz", "integrity": "sha512-BAnxAdaihzMoszwhqRy8FPOX+dijs7esUEUYTIQ1KsOSKmCVNYnitAMmBDFxYzA6VQYvuUKw7o2K1AcMBTGzIg==" },
<mask> "integrity": "sha512-F4miItu2rGnV2ySkXOQoA8FKz/SR2Q2sWP0sbTxNxz/tuokeC8WxOhPMcwi0qIyGtVn/rrSeLbvVkznqCdwYnw==", <mask> "dev": true, <mask> "optional": true <mask> }, <mask> "nanomatch": { <mask> "version": "1.2.13", <mask> "resolved": "https://registry.npmjs.org/nanom...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/package-lock.json
"react-transition-group": { "version": "2.4.0", "resolved": "https://registry.npmjs.org/react-transition-group/-/react-transition-group-2.4.0.tgz", "integrity": "sha512-Xv5d55NkJUxUzLCImGSanK8Cl/30sgpOEMGc5m86t8+kZwrPxPCPcFqyx83kkr+5Lz5gs6djuvE5By+gce+VjA==", "requires": { "dom-helpe...
<mask> } <mask> }, <mask> "read-cache": { <mask> "version": "1.0.0", <mask> "resolved": "https://registry.npmjs.org/read-cache/-/read-cache-1.0.0.tgz", <mask> "integrity": "sha1-5mTvMRYRZsl1HNvo28+GtftY93Q=", <mask> "dev": true, <mask> "requires": { </s> Show toast o...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/package-lock.json
<mask> "lint": "eslint frontend/" <mask> }, <mask> "dependencies": { <mask> "@nivo/line": "^0.42.1", <mask> "alertifyjs": "^1.11.1", <mask> "axios": "^0.18.0", <mask> "classnames": "^2.2.6", <mask> "date-fns": "^1.29.0", <mask> "file-saver": "^1.3.8", <mask> "lodash": "^4.1...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/package.json
"nanoid": "^1.2.3",
<mask> "file-saver": "^1.3.8", <mask> "lodash": "^4.17.10", <mask> "prop-types": "^15.6.1", <mask> "react": "^16.4.0", <mask> "react-click-outside": "^3.0.1", <mask> "react-dom": "^16.4.0", <mask> "react-modal": "^3.4.5", </s> Show toast on failed request </s> remove "alertifyjs"...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/package.json
"react-transition-group": "^2.4.0",
<mask> "react-modal": "^3.4.5", <mask> "react-redux": "^5.0.7", <mask> "react-router-dom": "^4.2.2", <mask> "react-table": "^6.8.6", <mask> "redux": "^4.0.0", <mask> "redux-actions": "^2.4.0", <mask> "redux-thunk": "^2.3.0", <mask> "svg-url-loader": "^2.3.2", <mask> "tabler-...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/package.json
<mask> import { createAction } from 'redux-actions'; <mask> import round from 'lodash/round'; <mask> import alertify from 'alertifyjs'; <mask> <mask> import { normalizeHistory, normalizeFilteringStatus, normalizeLogs } from '../helpers/helpers'; <mask> import Api from '../api/Api'; <mask> <mask> const apiClie...
[ "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
export const addErrorToast = createAction('ADD_ERROR_TOAST'); export const addSuccessToast = createAction('ADD_SUCCESS_TOAST'); export const removeToast = createAction('REMOVE_TOAST');
<mask> const apiClient = new Api(); <mask> <mask> export const toggleSettingStatus = createAction('SETTING_STATUS_TOGGLE'); <mask> export const showSettingsFailure = createAction('SETTINGS_FAILURE_SHOW'); <mask> <mask> export const toggleSetting = (settingKey, status) => async (dispatch) => { <mask> switch...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> }; <mask> dispatch(initSettingsSuccess({ settingsList: newSettingsList })); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(initSettingsFailure()); <mask> } <mask> }; <mask> <mask> export const dnsStatusRequest = createAction('DNS_STATUS_REQ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> const dnsStatus = await apiClient.getGlobalStatus(); <mask> dispatch(dnsStatusSuccess(dnsStatus)); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(initSettingsFailure()); <mask> } <mask> }; <mask> <mask> export const enableDnsRequest = creat...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> await apiClient.startGlobalFiltering(); <mask> dispatch(enableDnsSuccess()); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(enableDnsFailure()); <mask> } <mask> }; <mask> <mask> export const disableDnsRequest = createAction('DISABLE_DNS_REQ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(disableDnsFailure(error)); dispatch(addErrorToast({ error }));
<mask> await apiClient.stopGlobalFiltering(); <mask> dispatch(disableDnsSuccess()); <mask> } catch (error) { <mask> console.error(error); <mask> alertify.error(`Failed to disable DNS with status code ${error.response.status}`); <mask> dispatch(disableDnsFailure()); <ma...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> <mask> dispatch(getStatsSuccess(processedStats)); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(getStatsFailure()); <mask> } <mask> }; <mask> <mask> export const getTopStatsRequest = createAction('GET_TOP_STATS_REQUEST'); </s> Show toast on fail...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
console.error(error); dispatch(addErrorToast({ error })); dispatch(getTopStatsFailure(error));
<mask> try { <mask> const stats = await apiClient.getGlobalStatsTop(); <mask> dispatch(getTopStatsSuccess(stats)); <mask> } catch (error) { <mask> alertify.error(`Failed to load statistics with status code ${error.response.status}`); <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
console.error(error); dispatch(addErrorToast({ error })); dispatch(getLogsFailure(error));
<mask> try { <mask> const logs = normalizeLogs(await apiClient.getQueryLog()); <mask> dispatch(getLogsSuccess(logs)); <mask> } catch (error) { <mask> alertify.error(`Failed to load query log with status code ${error.response.status}`); <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> dispatch(toggleLogStatusSuccess()); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(toggleLogStatusFailure()); <mask> } <mask> }; <mask> <mask> export const setRulesRequest = createAction('SET_RULES_REQUEST'); </s> Show toast on failed request
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> } catch (error) { <mask> console.error(error); <mask> dispatch(setRulesFailure()); <mask> } <mask> }; <mask> <mask> export const getFilteringStatusRequest = createAction('GET_FILTERING_STATUS_REQUEST'); </s> Show toast on failed request
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> } catch (error) { <mask> console.error(error); <mask> dispatch(getFilteringStatusFailure()); <mask> } <mask> }; <mask> </s> Show toast on failed request
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> dispatch(getFilteringStatus()); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(toggleFilterFailure()); <mask> } <mask> }; <mask> <mask> export const refreshFiltersRequest = createAction('FILTERING_REFRESH_REQUEST'); </s> Show toast on failed reques...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> } catch (error) { <mask> console.error(error); <mask> dispatch(refreshFiltersFailure()); <mask> } <mask> }; <mask> </s> Show toast on failed request
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> const normalizedHistory = normalizeHistory(statsHistory); <mask> dispatch(getStatsHistorySuccess(normalizedHistory)); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(getStatsHistoryFailure()); <mask> } <mask> }; <mask> <mask> export const ad...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> dispatch(addFilterSuccess(url)); <mask> dispatch(getFilteringStatus()); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(addFilterFailure()); <mask> } <mask> }; <mask> </s> Show toast on failed request
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> dispatch(removeFilterSuccess(url)); <mask> dispatch(getFilteringStatus()); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(removeFilterFailure()); <mask> } <mask> }; <mask> </s> Show toast on failed request
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> data = await apiClient.downloadQueryLog(); <mask> dispatch(downloadQueryLogSuccess()); <mask> } catch (error) { <mask> console.error(error); <mask> dispatch(downloadQueryLogFailure()); <mask> } <mask> return data; <mask> }; <mask> <mask> export const handleU...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
dispatch(addErrorToast({ error }));
<mask> } catch (error) { <mask> console.error(error); <mask> dispatch(setUpstreamFailure()); <mask> } <mask> }; </s> Show toast on failed request
[ "keep", "add", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/actions/index.js
try { const response = await axios({ url: `${this.baseUrl}/${path}`, method, ...config, }); return response.data; } catch (error) { throw new Error(`${this.baseUrl}/${path} | ${error.response.data} | ${error....
<mask> export default class Api { <mask> baseUrl = 'control'; <mask> <mask> async makeRequest(path, method = 'POST', config) { <mask> const response = await axios({ <mask> url: `${this.baseUrl}/${path}`, <mask> method, <mask> ...config, <mask> }); <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/api/Api.js
<mask> import { HashRouter, Route } from 'react-router-dom'; <mask> import PropTypes from 'prop-types'; <mask> <mask> import 'react-table/react-table.css'; <mask> import 'alertifyjs/build/css/alertify.min.css'; <mask> import '../ui/Tabler.css'; <mask> import '../ui/ReactTable.css'; <mask> import '../ui/Alertif...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/components/App/index.js
<mask> import 'react-table/react-table.css'; <mask> import 'alertifyjs/build/css/alertify.min.css'; <mask> import '../ui/Tabler.css'; <mask> import '../ui/ReactTable.css'; <mask> import '../ui/Alertify.css'; <mask> import './index.css'; <mask> <mask> import Header from '../../containers/Header'; <mask> import...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/components/App/index.js
import Toasts from '../Toasts';
<mask> import Settings from '../../containers/Settings'; <mask> import Filters from '../../containers/Filters'; <mask> import Logs from '../../containers/Logs'; <mask> import Footer from '../ui/Footer'; <mask> <mask> import Status from '../ui/Status'; <mask> <mask> class App extends Component { <mask> co...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/components/App/index.js
<Toasts />
<mask> </div> <mask> <Footer /> <mask> </Fragment> <mask> </HashRouter> <mask> ); <mask> } <mask> } </s> Show toast on failed request </s> remove {disableButton} </s> add
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/components/App/index.js
error: PropTypes.string,
<mask> dashboard: PropTypes.object, <mask> isCoreRunning: PropTypes.bool, <mask> }; <mask> <mask> export default App; </s> Show toast on failed request </s> remove const response = await axios({ url: `${this.baseUrl}/${path}`, method, ...config, }); ...
[ "keep", "add", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/components/App/index.js
<mask> dashboard.processingStats || <mask> dashboard.processingStatsHistory || <mask> dashboard.processingTopStats; <mask> <mask> const disableButton = <button type="button" className="btn btn-outline-secondary btn-sm mr-2" onClick={() => this.props.disableDns()}>Disabl...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/components/Dashboard/index.js
<mask> return ( <mask> <Fragment> <mask> <PageTitle title="Dashboard"> <mask> <div className="page-title__actions"> <mask> {disableButton} <mask> {refreshFullButton} <mask> </div> <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/components/Dashboard/index.js
import nanoid from 'nanoid';
<mask> import { combineReducers } from 'redux'; <mask> import { handleActions } from 'redux-actions'; <mask> <mask> import * as actions from '../actions'; <mask> <mask> const settings = handleActions({ <mask> [actions.initSettingsRequest]: state => ({ ...state, processing: true }), </s> Show toast on fail...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/reducers/index.js
toasts,
<mask> settings, <mask> dashboard, <mask> queryLogs, <mask> filtering, <mask> }); </s> Show toast on failed request </s> remove const response = await axios({ url: `${this.baseUrl}/${path}`, method, ...config, }); return response.data; <...
[ "keep", "keep", "keep", "add", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983
client/src/reducers/index.js
"github.com/AdguardTeam/urlfilter"
<mask> "time" <mask> <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/bluele/gcache" <mask> "golang.org/x/net/publicsuffix" <mask> ) <mask> </s> * dnsfilter: use urlfilter package + new config setting 'filtering_temp_filename' * remove Add...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c
dnsfilter/dnsfilter.go
FilteringTempFilename string `yaml:"filtering_temp_filename"` // temporary file for storing unused filtering rules ParentalSensitivity int `yaml:"parental_sensitivity"` // must be either 3, 10, 13 or 17 ParentalEnabled bool `yaml:"parental_enabled"` SafeSearchEnabled bool `yaml:"safesearch_ena...
<mask> const enableDelayedCompilation = true // flag for debugging, must be true in production for faster performance <mask> <mask> // Config allows you to configure DNS filtering with New() or just change variables directly. <mask> type Config struct { <mask> ParentalSensitivity int `yaml:"parental_sensitivi...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c
dnsfilter/dnsfilter.go
rulesStorage *urlfilter.RulesStorage filteringEngine *urlfilter.DNSEngine
<mask> <mask> // Dnsfilter holds added rules and performs hostname matches against the rules <mask> type Dnsfilter struct { <mask> // HTTP lookups for safebrowsing and parental <mask> client http.Client // handle for http client -- single instance as recommended by docs <mask> transport *http.Transport...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c
dnsfilter/dnsfilter.go
// Initialize urlfilter objects func (d *Dnsfilter) initFiltering(filters map[int]string) error { var err error d.rulesStorage, err = urlfilter.NewRuleStorage(d.FilteringTempFilename) if err != nil { return err } d.filteringEngine = urlfilter.NewDNSEngine(filters, d.rulesStorage)
<mask> // <mask> // Adding rule and matching against the rules <mask> // <mask> <mask> // AddRules is a convinience function to add an array of filters in one call <mask> func (d *Dnsfilter) AddRules(filters []Filter) error { <mask> return nil <mask> } <mask> <mask> // matchHost is a low-level way to check...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c
dnsfilter/dnsfilter.go
func New(c *Config, filters map[int]string) *Dnsfilter {
<mask> } <mask> } <mask> <mask> // New creates properly initialized DNS Filter that is ready to be used <mask> func New(c *Config) *Dnsfilter { <mask> d := new(Dnsfilter) <mask> <mask> // Customize the Transport to have larger connection pool, <mask> // We are not (re)using http.DefaultTransport because ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c
dnsfilter/dnsfilter.go
if filters != nil { err := d.initFiltering(filters) if err != nil { log.Error("Can't initialize filtering subsystem: %s", err) d.Destroy() return nil } }
<mask> if c != nil { <mask> d.Config = *c <mask> } <mask> <mask> return d <mask> } <mask> <mask> // Destroy is optional if you want to tidy up goroutines without waiting for them to die off <mask> // right now it closes idle HTTP connections if there are any </s> * dnsfilter: use urlfilter package + n...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c
dnsfilter/dnsfilter.go
if d.rulesStorage != nil { d.rulesStorage.Close() d.rulesStorage = nil }
<mask> d.transport.CloseIdleConnections() <mask> } <mask> } <mask> <mask> // <mask> // config manipulation helpers <mask> // </s> * dnsfilter: use urlfilter package + new config setting 'filtering_temp_filename' * remove AddRules(), modify New() </s> remove func New(c *Config) *Dnsfilter { </s> add func ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c
dnsfilter/dnsfilter.go
import whotracksmeWebsites from './whotracksme_web.json';
<mask> import whotracksmeDb from './whotracksme.json'; <mask> import adguardDb from './adguard.json'; <mask> import { REPOSITORY } from '../constants'; <mask> <mask> /** <mask> @typedef TrackerData </s> Pull request: whotracksme tracker links Merge in DNS/adguard-home from 4416-ui-tracker-href to master Squa...
[ "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82af43039c78b49908151c09175a5161dd911601
client/src/helpers/trackers/trackers.js
/** * Gets link to tracker page on whotracks.me. * * @param trackerId * @return {string} */ const getWhotracksmeUrl = (trackerId) => { const websiteId = whotracksmeWebsites.websites[trackerId]; if (websiteId) { // Overrides links to websites. return `https://whotracks.me/websites/${websiteI...
<mask> ADGUARD: 2, <mask> }; <mask> <mask> /** <mask> * Gets the source metadata for the specified tracker <mask> * @param {TrackerData} trackerData tracker data <mask> * @returns {source} source metadata or null if no matching tracker found <mask> */ <mask> export const getSourceData = (trackerData) ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82af43039c78b49908151c09175a5161dd911601
client/src/helpers/trackers/trackers.js
url: getWhotracksmeUrl(trackerData.id),
<mask> <mask> if (trackerData.source === sources.WHOTRACKSME) { <mask> return { <mask> name: 'Whotracks.me', <mask> url: `https://whotracks.me/trackers/${trackerData.id}.html`, <mask> }; <mask> } <mask> if (trackerData.source === sources.ADGUARD) { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/82af43039c78b49908151c09175a5161dd911601
client/src/helpers/trackers/trackers.js
binaryFile string coreFile string Filters []filter `yaml:"-"` Port int `yaml:"port"` dnsforward.FilteringConfig `yaml:",inline"` QueryLogEnabled bool `yaml:"querylog_enabled"` Ratelimit int `yaml:"ratelimit"` RefuseAny bool `yaml:"refuse_any"` Pprof string ...
<mask> } <mask> <mask> // field ordering is important -- yaml fields will mirror ordering from here <mask> type coreDNSConfig struct { <mask> binaryFile string <mask> coreFile string <mask> Filters []filter `yaml:"-"` <mask> Port int `yaml:"port"` <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", ...
https://github.com/AdguardTeam/AdGuardHome/commit/8316d39b4282599681a827a50d6541c5cb4987ed
config.go
Port: 53, binaryFile: "coredns", // only filename, no path coreFile: "Corefile", // only filename, no path FilteringConfig: dnsforward.FilteringConfig{ ProtectionEnabled: true, FilteringEnabled: true, SafeBrowsingEnabled: false, BlockedResponseTTL: 10, // in seconds }, QueryLogEna...
<mask> ourConfigFilename: "AdGuardHome.yaml", <mask> BindPort: 3000, <mask> BindHost: "127.0.0.1", <mask> CoreDNS: coreDNSConfig{ <mask> Port: 53, <mask> binaryFile: "coredns", // only filename, no path <mask> coreFile: "Corefile", // only filename,...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8316d39b4282599681a827a50d6541c5cb4987ed
config.go
type FilteringConfig struct { ProtectionEnabled bool `yaml:"protection_enabled"` FilteringEnabled bool `yaml:"filtering_enabled"` SafeBrowsingEnabled bool `yaml:"safebrowsing_enabled"` SafeSearchEnabled bool `yaml:"safesearch_enabled"` ParentalEnabled bool `yaml:"parental_enabled"` ParentalSe...
<mask> fmt.Fprintf(os.Stderr, "%s:%d %s() -> RUnlock() -> done\n", path.Base(file), line, path.Base(f.Name())) <mask> } <mask> */ <mask> <mask> // The zero ServerConfig is empty and ready for use. <mask> type ServerConfig struct { <mask> UDPListenAddr *net.UDPAddr // if nil, then default is is used (port...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8316d39b4282599681a827a50d6541c5cb4987ed
dnsforward/dnsforward.go
FilteringConfig
<mask> UDPListenAddr *net.UDPAddr // if nil, then default is is used (port 53 on *) <mask> BlockedResponseTTL uint32 // if 0, then default is used (3600) <mask> Upstreams []Upstream <mask> Filters []Filter <mask> } <mask> <mask> var defaultValues = ServerConfig{ <mask> UDPLi...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8316d39b4282599681a827a50d6541c5cb4987ed
dnsforward/dnsforward.go
// Server is the main way to start a DNS server. //
<mask> "github.com/joomcode/errorx" <mask> "github.com/miekg/dns" <mask> ) <mask> <mask> // Server is the main way to start a DNS server <mask> // Example: <mask> // s := dnsforward.Server{} <mask> // err := s.Start(nil) // will start a DNS server listening on default port 53, in a goroutine <mask> // err :...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8396dc2fdb90711ba3394b975347a262afe22ae7
dnsforward/dnsforward.go
// s := dnsforward.Server{} // err := s.Start(nil) // will start a DNS server listening on default port 53, in a goroutine // err := s.Reconfigure(ServerConfig{UDPListenAddr: &net.UDPAddr{Port: 53535}}) // will reconfigure running DNS server to listen on UDP port 53535 // err := s.Stop() // will stop listening on p...
<mask> ) <mask> <mask> // Server is the main way to start a DNS server <mask> // Example: <mask> // s := dnsforward.Server{} <mask> // err := s.Start(nil) // will start a DNS server listening on default port 53, in a goroutine <mask> // err := s.Reconfigure(ServerConfig{UDPListenAddr: &net.UDPAddr{Port: 53535}}...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8396dc2fdb90711ba3394b975347a262afe22ae7
dnsforward/dnsforward.go
// Upstream TLS pool.
<mask> <mask> "github.com/joomcode/errorx" <mask> ) <mask> <mask> // upstream TLS pool. <mask> // <mask> // Example: <mask> // pool := TLSPool{Address: "tls://1.1.1.1:853"} <mask> // netConn, err := pool.Get() <mask> // if err != nil {panic(err)} </s> Update docs for formatting in godoc. </s> remove // po...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8396dc2fdb90711ba3394b975347a262afe22ae7
dnsforward/upstream_pool.go
// pool := TLSPool{Address: "tls://1.1.1.1:853"} // netConn, err := pool.Get() // if err != nil {panic(err)} // c := dns.Conn{Conn: netConn} // q := dns.Msg{} // q.SetQuestion("google.com.", dns.TypeA) // log.Println(q) // err = c.WriteMsg(&q) // if err != nil {panic(err)} // r, err := c.ReadMsg() // if err ...
<mask> <mask> // upstream TLS pool. <mask> // <mask> // Example: <mask> // pool := TLSPool{Address: "tls://1.1.1.1:853"} <mask> // netConn, err := pool.Get() <mask> // if err != nil {panic(err)} <mask> // c := dns.Conn{Conn: netConn} <mask> // q := dns.Msg{} <mask> // q.SetQuestion("google.com.", dns.TypeA) ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/8396dc2fdb90711ba3394b975347a262afe22ae7
dnsforward/upstream_pool.go
<mask> package dnsforward <mask> <mask> import ( <mask> "crypto/tls" <mask> "fmt" <mask> "net" <mask> "path" <mask> "strings" <mask> "time" <mask> </s> Pull request: dnsforward: do not check client srv name unless asked Merge in DNS/adguard-home from 2664-non-strict-sni to master Updates #2664. Sq...
[ "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/841bb9bc35786c710414706ef38c2830024fbfed
internal/dnsforward/dns.go
<mask> import ( <mask> "crypto/tls" <mask> "fmt" <mask> "net" <mask> "path" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" </s> Pull request: dnsforward: do not check client srv name unle...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/841bb9bc35786c710414706ef38c2830024fbfed
internal/dnsforward/dns.go
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/lucas-clemente/quic-go" <mask> "github.com/miekg/dns" <mask> ) <mask> <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/841bb9bc35786c710414706ef38c2830024fbfed
internal/dnsforward/dns.go
<mask> ctx.proxyCtx.Res = resp <mask> return resultCodeSuccess <mask> } <mask> <mask> const maxDomainPartLen = 64 <mask> <mask> // ValidateClientID returns an error if clientID is not a valid client ID. <mask> func ValidateClientID(clientID string) (err error) { <mask> if len(clientID) > maxDomainPartLen ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/841bb9bc35786c710414706ef38c2830024fbfed
internal/dnsforward/dns.go
// JoinHostPort is a convinient wrapper for net.JoinHostPort with port of type // int. func JoinHostPort(host string, port int) (hostport string) { return net.JoinHostPort(host, strconv.Itoa(port)) }
<mask> (r >= 'A' && r <= 'Z') || <mask> (r >= '0' && r <= '9') <mask> } <mask> <mask> // isValidHostRune returns true if r is a valid rune for a hostname label. <mask> func isValidHostRune(r rune) (ok bool) { <mask> return r == '-' || IsValidHostOuterRune(r) <mask> } <mask> </s> Pull request: dhcpd: ad...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/aghnet/addr.go
func TestJoinHostPort(t *testing.T) { assert.Equal(t, ":0", JoinHostPort("", 0)) assert.Equal(t, "host:12345", JoinHostPort("host", 12345)) assert.Equal(t, "1.2.3.4:12345", JoinHostPort("1.2.3.4", 12345)) assert.Equal(t, "[1234::5678]:12345", JoinHostPort("1234::5678", 12345)) assert.Equal(t, "[1234::5678%lo]:1234...
<mask> } <mask> } <mask> <mask> func repeatStr(b *strings.Builder, s string, n int) { <mask> for i := 0; i < n; i++ { <mask> _, _ = b.WriteString(s) <mask> } </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashed commit of the following: commit 2ce6cc005d09ac7d63e4e575705d86e92046697f Au...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/aghnet/addr_test.go
<mask> } <mask> <mask> return addrs, nil <mask> } <mask> <mask> // JoinHostPort is a convinient wrapper for net.JoinHostPort with port of type <mask> // int. <mask> func JoinHostPort(host string, port int) (hostport string) { <mask> return net.JoinHostPort(host, strconv.Itoa(port)) <mask> } </s> Pull re...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/aghnet/net.go
"fmt"
<mask> package dhcpd <mask> <mask> import ( <mask> "encoding/json" <mask> "net" <mask> "os" <mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/errors" <mask> "github.com/AdguardTeam/golibs/log" </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashed commit of the following: c...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
func (s *Server) dbLoad() (err error) {
<mask> return ip <mask> } <mask> <mask> // Load lease table from DB <mask> func (s *Server) dbLoad() { <mask> dynLeases := []*Lease{} <mask> staticLeases := []*Lease{} <mask> v6StaticLeases := []*Lease{} <mask> v6DynLeases := []*Lease{} <mask> </s> Pull request: dhcpd: add purge, imp code Updates #16...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
return fmt.Errorf("reading db: %w", err)
<mask> <mask> data, err := os.ReadFile(s.conf.DBFilePath) <mask> if err != nil { <mask> if !errors.Is(err, os.ErrNotExist) { <mask> log.Error("dhcp: can't read file %q: %v", s.conf.DBFilePath, err) <mask> } <mask> <mask> return <mask> } <mask> </s> Pull request: dhcpd: add purge, imp code Upd...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
return nil
<mask> if !errors.Is(err, os.ErrNotExist) { <mask> log.Error("dhcp: can't read file %q: %v", s.conf.DBFilePath, err) <mask> } <mask> <mask> return <mask> } <mask> <mask> obj := []leaseJSON{} <mask> err = json.Unmarshal(data, &obj) <mask> if err != nil { </s> Pull request: dhcpd: add purge, imp...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
return fmt.Errorf("decoding db: %w", err)
<mask> <mask> obj := []leaseJSON{} <mask> err = json.Unmarshal(data, &obj) <mask> if err != nil { <mask> log.Error("dhcp: invalid DB: %v", err) <mask> return <mask> } <mask> <mask> numLeases := len(obj) <mask> for i := range obj { <mask> obj[i].IP = normalizeIP(obj[i].IP) </s> Pull request: dh...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
err = s.srv4.ResetLeases(leases4) if err != nil { return fmt.Errorf("resetting dhcpv4 leases: %w", err) }
<mask> } <mask> } <mask> <mask> leases4 := normalizeLeases(staticLeases, dynLeases) <mask> s.srv4.ResetLeases(leases4) <mask> <mask> leases6 := normalizeLeases(v6StaticLeases, v6DynLeases) <mask> if s.srv6 != nil { <mask> s.srv6.ResetLeases(leases6) <mask> } </s> Pull request: dhcpd: add purge, i...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
err = s.srv6.ResetLeases(leases6) if err != nil { return fmt.Errorf("resetting dhcpv6 leases: %w", err) }
<mask> s.srv4.ResetLeases(leases4) <mask> <mask> leases6 := normalizeLeases(v6StaticLeases, v6DynLeases) <mask> if s.srv6 != nil { <mask> s.srv6.ResetLeases(leases6) <mask> } <mask> <mask> log.Info("dhcp: loaded leases v4:%d v6:%d total-read:%d from DB", <mask> len(leases4), len(leases6), numLease...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
return nil
<mask> log.Info("dhcp: loaded leases v4:%d v6:%d total-read:%d from DB", <mask> len(leases4), len(leases6), numLeases) <mask> } <mask> <mask> // Skip duplicate leases <mask> // Static leases have a priority over dynamic leases <mask> func normalizeLeases(staticLeases, dynLeases []*Lease) []*Lease { </s> P...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
func (s *Server) dbStore() (err error) { // Use an empty slice here as opposed to nil so that it doesn't write // "null" into the database file if leases are empty. leases := []leaseJSON{}
<mask> return leases <mask> } <mask> <mask> // Store lease table in DB <mask> func (s *Server) dbStore() { <mask> var leases []leaseJSON <mask> <mask> leases4 := s.srv4.getLeasesRef() <mask> for _, l := range leases4 { <mask> if l.Expiry.Unix() == 0 { <mask> continue </s> Pull request: dhcpd: add...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
var data []byte data, err = json.Marshal(leases)
<mask> leases = append(leases, lease) <mask> } <mask> } <mask> <mask> data, err := json.Marshal(leases) <mask> if err != nil { <mask> log.Error("json.Marshal: %v", err) <mask> return <mask> } <mask> </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashed commit of the following...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
return fmt.Errorf("encoding db: %w", err)
<mask> } <mask> <mask> data, err := json.Marshal(leases) <mask> if err != nil { <mask> log.Error("json.Marshal: %v", err) <mask> return <mask> } <mask> <mask> err = maybe.WriteFile(s.conf.DBFilePath, data, 0o644) <mask> if err != nil { <mask> log.Error("dhcp: can't store lease table on disk: %v...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
return fmt.Errorf("writing db: %w", err)
<mask> } <mask> <mask> err = maybe.WriteFile(s.conf.DBFilePath, data, 0o644) <mask> if err != nil { <mask> log.Error("dhcp: can't store lease table on disk: %v filename: %s", <mask> err, s.conf.DBFilePath) <mask> <mask> return <mask> } <mask> <mask> log.Info("dhcp: stored %d leases in DB", le...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
log.Info("dhcp: stored %d leases in db", len(leases)) return nil
<mask> <mask> return <mask> } <mask> <mask> log.Info("dhcp: stored %d leases in DB", len(leases)) <mask> } </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashed commit of the following: commit 2ce6cc005d09ac7d63e4e575705d86e92046697f Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: ...
[ "keep", "keep", "keep", "keep", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/db.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> const ( </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashed commit of the following: commit 2ce6cc005d09ac7d63e4e575705d86e92046697f Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Wed Jun 16 16:...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
// GetLeasesFlags are the flags for GetLeases. type GetLeasesFlags uint8 // GetLeasesFlags values const ( LeasesDynamic GetLeasesFlags = 0b0001 LeasesStatic GetLeasesFlags = 0b0010 LeasesAll = LeasesDynamic | LeasesStatic )
<mask> onLeaseChanged []OnLeaseChangedT <mask> } <mask> <mask> // ServerInterface is an interface for servers. <mask> type ServerInterface interface { <mask> Enabled() (ok bool) <mask> Leases(flags GetLeasesFlags) (leases []*Lease) <mask> SetOnLeaseChanged(onLeaseChanged OnLeaseChangedT) </s> Pull request...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
Leases(flags GetLeasesFlags) (leases []*Lease)
<mask> <mask> // ServerInterface is an interface for servers. <mask> type ServerInterface interface { <mask> Enabled() (ok bool) <mask> Leases(flags int) []Lease <mask> SetOnLeaseChanged(onLeaseChanged OnLeaseChangedT) <mask> } <mask> <mask> // Create - create object <mask> func Create(conf ServerConfig)...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
func Create(conf ServerConfig) (s *Server, err error) { s = &Server{}
<mask> SetOnLeaseChanged(onLeaseChanged OnLeaseChangedT) <mask> } <mask> <mask> // Create - create object <mask> func Create(conf ServerConfig) *Server { <mask> s := &Server{} <mask> <mask> s.conf.Enabled = conf.Enabled <mask> s.conf.InterfaceName = conf.InterfaceName <mask> s.conf.HTTPRegister = conf....
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
<mask> <mask> webHandlersRegistered = true <mask> } <mask> <mask> var err4, err6 error <mask> v4conf := conf.Conf4 <mask> v4conf.Enabled = s.conf.Enabled <mask> if len(v4conf.RangeStart) == 0 { <mask> v4conf.Enabled = false <mask> } </s> Pull request: dhcpd: add purge, imp code Updates #1691. S...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
s.srv4, err = v4Create(v4conf) if err != nil { return nil, fmt.Errorf("creating dhcpv4 srv: %w", err) }
<mask> v4conf.Enabled = false <mask> } <mask> v4conf.InterfaceName = s.conf.InterfaceName <mask> v4conf.notify = s.onNotify <mask> s.srv4, err4 = v4Create(v4conf) <mask> <mask> v6conf := conf.Conf6 <mask> v6conf.Enabled = s.conf.Enabled <mask> if len(v6conf.RangeStart) == 0 { <mask> v6conf.Enabled...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
s.srv6, err = v6Create(v6conf) if err != nil { return nil, fmt.Errorf("creating dhcpv6 srv: %w", err)
<mask> v6conf.Enabled = false <mask> } <mask> v6conf.InterfaceName = s.conf.InterfaceName <mask> v6conf.notify = s.onNotify <mask> s.srv6, err6 = v6Create(v6conf) <mask> <mask> if err4 != nil { <mask> log.Error("%s", err4) <mask> return nil <mask> } <mask> if err6 != nil { <mask> log.Error("...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
return nil, fmt.Errorf("neither dhcpv4 nor dhcpv6 srv is configured")
<mask> s.conf.Conf4 = conf.Conf4 <mask> s.conf.Conf6 = conf.Conf6 <mask> <mask> if s.conf.Enabled && !v4conf.Enabled && !v6conf.Enabled { <mask> log.Error("Can't enable DHCP server because neither DHCPv4 nor DHCPv6 servers are configured") <mask> return nil <mask> } <mask> <mask> // we can't delay d...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
// Don't delay database loading until the DHCP server is started, // because we need static leases functionality available beforehand. err = s.dbLoad() if err != nil { return nil, fmt.Errorf("loading db: %w", err) } return s, nil
<mask> log.Error("Can't enable DHCP server because neither DHCPv4 nor DHCPv6 servers are configured") <mask> return nil <mask> } <mask> <mask> // we can't delay database loading until DHCP server is started, <mask> // because we need static leases functionality available beforehand <mask> s.dbLoad() <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
err := s.dbStore() if err != nil { log.Error("updating db: %s", err) }
<mask> <mask> // server calls this function after DB is updated <mask> func (s *Server) onNotify(flags uint32) { <mask> if flags == LeaseChangedDBStore { <mask> s.dbStore() <mask> <mask> return <mask> } <mask> <mask> s.notify(int(flags)) </s> Pull request: dhcpd: add purge, imp code Updates #1691....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
func (s *Server) Stop() (err error) { err = s.srv4.Stop() if err != nil { return err }
<mask> return nil <mask> } <mask> <mask> // Stop closes the listening UDP socket <mask> func (s *Server) Stop() { <mask> s.srv4.Stop() <mask> s.srv6.Stop() <mask> } <mask> <mask> // flags for Leases() function <mask> const ( <mask> LeasesDynamic = 1 <mask> LeasesStatic = 2 </s> Pull request: dhcpd...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
err = s.srv6.Stop() if err != nil { return err } return nil }
<mask> s.srv4.Stop() <mask> s.srv6.Stop() <mask> } <mask> <mask> // flags for Leases() function <mask> const ( <mask> LeasesDynamic = 1 <mask> LeasesStatic = 2 <mask> LeasesAll = LeasesDynamic | LeasesStatic <mask> ) <mask> <mask> // Leases returns the list of active IPv4 and IPv6 DHCP leases. ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
func (s *Server) Leases(flags GetLeasesFlags) (leases []*Lease) {
<mask> ) <mask> <mask> // Leases returns the list of active IPv4 and IPv6 DHCP leases. It's safe for <mask> // concurrent use. <mask> func (s *Server) Leases(flags int) (leases []Lease) { <mask> return append(s.srv4.GetLeases(flags), s.srv6.GetLeases(flags)...) <mask> } <mask> <mask> // FindMACbyIP - find ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
func (s *Server) AddStaticLease(l *Lease) error { return s.srv4.AddStaticLease(l)
<mask> return s.srv6.FindMACbyIP(ip) <mask> } <mask> <mask> // AddStaticLease - add static v4 lease <mask> func (s *Server) AddStaticLease(lease Lease) error { <mask> return s.srv4.AddStaticLease(lease) <mask> } </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashed commit of the following: ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd.go
leases := []*Lease{{
<mask> <mask> s.srv6, err = v6Create(V6ServerConf{}) <mask> require.NoError(t, err) <mask> <mask> leases := []Lease{{ <mask> Expiry: time.Now().Add(time.Hour), <mask> Hostname: "static-1.local", <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}, <mask> IP: net.IP{192, 1...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd_test.go
err = srv4.addLease(leases[0])
<mask> <mask> srv4, ok := s.srv4.(*v4Server) <mask> require.True(t, ok) <mask> <mask> err = srv4.addLease(&leases[0]) <mask> require.NoError(t, err) <mask> <mask> err = s.srv4.AddStaticLease(leases[1]) <mask> require.NoError(t, err) <mask> </s> Pull request: dhcpd: add purge, imp code Updates #169...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd_test.go
err = s.dbStore() require.NoError(t, err)
<mask> <mask> err = s.srv4.AddStaticLease(leases[1]) <mask> require.NoError(t, err) <mask> <mask> s.dbStore() <mask> t.Cleanup(func() { <mask> assert.NoError(t, os.Remove(dbFilename)) <mask> }) <mask> s.srv4.ResetLeases(nil) <mask> s.dbLoad() </s> Pull request: dhcpd: add purge, imp code Updates ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd_test.go
err = s.srv4.ResetLeases(nil) require.NoError(t, err) err = s.dbLoad() require.NoError(t, err)
<mask> s.dbStore() <mask> t.Cleanup(func() { <mask> assert.NoError(t, os.Remove(dbFilename)) <mask> }) <mask> s.srv4.ResetLeases(nil) <mask> s.dbLoad() <mask> <mask> ll := s.srv4.GetLeases(LeasesAll) <mask> require.Len(t, ll, len(leases)) <mask> <mask> assert.Equal(t, leases[1].HWAddr, ll[0].HWAd...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/dhcpd_test.go
<mask> } <mask> <mask> // dhcpStatusResponse is the response for /control/dhcp/status endpoint. <mask> type dhcpStatusResponse struct { <mask> Enabled bool `json:"enabled"` <mask> IfaceName string `json:"interface_name"` <mask> V4 V4ServerConf `json:"v4"` <mask> V6 ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/http.go
Leases []*Lease `json:"leases"` StaticLeases []*Lease `json:"static_leases"` Enabled bool `json:"enabled"`
<mask> Enabled bool `json:"enabled"` <mask> IfaceName string `json:"interface_name"` <mask> V4 V4ServerConf `json:"v4"` <mask> V6 V6ServerConf `json:"v6"` <mask> Leases []Lease `json:"leases"` <mask> StaticLeases []Lease `json:"static_leases"` <mask...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/http.go
conf := &dhcpServerConfigJSON{}
<mask> Enabled nullBool `json:"enabled"` <mask> } <mask> <mask> func (s *Server) handleDHCPSetConfig(w http.ResponseWriter, r *http.Request) { <mask> conf := dhcpServerConfigJSON{} <mask> conf.Enabled = boolToNullBool(s.conf.Enabled) <mask> conf.InterfaceName = s.conf.InterfaceName <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/http.go