docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
func newSystemResolvers(_ HostGenFunc) (sr SystemResolvers) { | <mask> addrs []string
<mask> addrsLock sync.RWMutex
<mask> }
<mask>
<mask> func newSystemResolvers(refreshIvl time.Duration, _ HostGenFunc) (sr SystemResolvers) {
<mask> return &systemResolvers{}
<mask> }
<mask>
<mask> func (sr *systemResolvers) Get() (rs []string) {
<mask> sr.addrsLock.RLock()
</s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c | internal/aghnet/systemresolvers_windows.go |
<mask> IP address HW type Flags HW address Mask Device
<mask> 192.168.1.2 0x1 0x2 ab:cd:ef:ab:cd:ef * wan
<mask> ::ffff:ffff 0x1 0x0 ef:cd:ab:ef:cd:ab * br-lan
<mask> 0.0.0.0 0x0 0x0 00:00:00:00:00:00 ... | [
"keep",
"keep",
"keep",
"replace"
] | https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c | internal/aghnet/testdata/proc_net_arp | |
s.sysResolvers, err = aghnet.NewSystemResolvers(nil) | <mask> }
<mask>
<mask> // TODO(e.burkov): Enable the refresher after the actual implementation
<mask> // passes the public testing.
<mask> s.sysResolvers, err = aghnet.NewSystemResolvers(0, nil)
<mask> if err != nil {
<mask> return nil, fmt.Errorf("initializing system resolvers: %w", err)
<mask> }
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c | internal/dnsforward/dnsforward.go |
defer log.OnPanic("clients container")
| <mask> return objs
<mask> }
<mask>
<mask> func (clients *clientsContainer) periodicUpdate() {
<mask> for {
<mask> clients.Reload()
<mask> time.Sleep(clientsUpdatePeriod)
<mask> }
</s> Pull request: 2846 cover aghnet vol.2
Merge in DNS/adguard-home from 2846-cover-aghnet-vol.2 to master
Updates #2846.... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c | internal/home/clients.go |
arpdb := aghnet.NewARPDB() | <mask> return err
<mask> }
<mask> }
<mask>
<mask> var arpdb aghnet.ARPDB
<mask> arpdb, err = aghnet.NewARPDB()
<mask> if err != nil {
<mask> log.Info("warning: creating arpdb: %s; using stub", err)
<mask>
<mask> arpdb = aghnet.EmptyARPDB{}
<mask> }
<mask>
<mask> Context.clients.Init(confi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/82505566f87fe10b80b2961456ed0150baed716c | internal/home/home.go |
<mask> "version": "3.2.0",
<mask> "resolved": "https://registry.npmjs.org/ajv-keywords/-/ajv-keywords-3.2.0.tgz",
<mask> "integrity": "sha1-6GuBnGAs+IIa1jdBNpjx3sAhhHo="
<mask> },
<mask> "alertifyjs": {
<mask> "version": "1.11.1",
<mask> "resolved": "https://registry.npmjs.o... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/package-lock.json | |
"dom-helpers": {
"version": "3.3.1",
"resolved": "https://registry.npmjs.org/dom-helpers/-/dom-helpers-3.3.1.tgz",
"integrity": "sha512-2Sm+JaYn74OiTM2wHvxJOo3roiq/h25Yi69Fqk269cNUwIXsCvATB6CRSFC9Am/20G2b28hGv/+7NiWydIrPvg=="
}, | <mask> "dev": true
<mask> }
<mask> }
<mask> },
<mask> "dom-serializer": {
<mask> "version": "0.1.0",
<mask> "resolved": "https://registry.npmjs.org/dom-serializer/-/dom-serializer-0.1.0.tgz",
<mask> "integrity": "sha1-BzxpdUbOB4DOI75KKOKT5AvDDII=",
<mask> ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/package-lock.json |
"nanoid": {
"version": "1.2.3",
"resolved": "https://registry.npmjs.org/nanoid/-/nanoid-1.2.3.tgz",
"integrity": "sha512-BAnxAdaihzMoszwhqRy8FPOX+dijs7esUEUYTIQ1KsOSKmCVNYnitAMmBDFxYzA6VQYvuUKw7o2K1AcMBTGzIg=="
}, | <mask> "integrity": "sha512-F4miItu2rGnV2ySkXOQoA8FKz/SR2Q2sWP0sbTxNxz/tuokeC8WxOhPMcwi0qIyGtVn/rrSeLbvVkznqCdwYnw==",
<mask> "dev": true,
<mask> "optional": true
<mask> },
<mask> "nanomatch": {
<mask> "version": "1.2.13",
<mask> "resolved": "https://registry.npmjs.org/nanom... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/package-lock.json |
"react-transition-group": {
"version": "2.4.0",
"resolved": "https://registry.npmjs.org/react-transition-group/-/react-transition-group-2.4.0.tgz",
"integrity": "sha512-Xv5d55NkJUxUzLCImGSanK8Cl/30sgpOEMGc5m86t8+kZwrPxPCPcFqyx83kkr+5Lz5gs6djuvE5By+gce+VjA==",
"requires": {
"dom-helpe... | <mask> }
<mask> },
<mask> "read-cache": {
<mask> "version": "1.0.0",
<mask> "resolved": "https://registry.npmjs.org/read-cache/-/read-cache-1.0.0.tgz",
<mask> "integrity": "sha1-5mTvMRYRZsl1HNvo28+GtftY93Q=",
<mask> "dev": true,
<mask> "requires": {
</s> Show toast o... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/package-lock.json |
<mask> "lint": "eslint frontend/"
<mask> },
<mask> "dependencies": {
<mask> "@nivo/line": "^0.42.1",
<mask> "alertifyjs": "^1.11.1",
<mask> "axios": "^0.18.0",
<mask> "classnames": "^2.2.6",
<mask> "date-fns": "^1.29.0",
<mask> "file-saver": "^1.3.8",
<mask> "lodash": "^4.1... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/package.json | |
"nanoid": "^1.2.3", | <mask> "file-saver": "^1.3.8",
<mask> "lodash": "^4.17.10",
<mask> "prop-types": "^15.6.1",
<mask> "react": "^16.4.0",
<mask> "react-click-outside": "^3.0.1",
<mask> "react-dom": "^16.4.0",
<mask> "react-modal": "^3.4.5",
</s> Show toast on failed request </s> remove "alertifyjs"... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/package.json |
"react-transition-group": "^2.4.0", | <mask> "react-modal": "^3.4.5",
<mask> "react-redux": "^5.0.7",
<mask> "react-router-dom": "^4.2.2",
<mask> "react-table": "^6.8.6",
<mask> "redux": "^4.0.0",
<mask> "redux-actions": "^2.4.0",
<mask> "redux-thunk": "^2.3.0",
<mask> "svg-url-loader": "^2.3.2",
<mask> "tabler-... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/package.json |
<mask> import { createAction } from 'redux-actions';
<mask> import round from 'lodash/round';
<mask> import alertify from 'alertifyjs';
<mask>
<mask> import { normalizeHistory, normalizeFilteringStatus, normalizeLogs } from '../helpers/helpers';
<mask> import Api from '../api/Api';
<mask>
<mask> const apiClie... | [
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js | |
export const addErrorToast = createAction('ADD_ERROR_TOAST');
export const addSuccessToast = createAction('ADD_SUCCESS_TOAST');
export const removeToast = createAction('REMOVE_TOAST');
| <mask> const apiClient = new Api();
<mask>
<mask> export const toggleSettingStatus = createAction('SETTING_STATUS_TOGGLE');
<mask> export const showSettingsFailure = createAction('SETTINGS_FAILURE_SHOW');
<mask>
<mask> export const toggleSetting = (settingKey, status) => async (dispatch) => {
<mask> switch... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> };
<mask> dispatch(initSettingsSuccess({ settingsList: newSettingsList }));
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(initSettingsFailure());
<mask> }
<mask> };
<mask>
<mask> export const dnsStatusRequest = createAction('DNS_STATUS_REQ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> const dnsStatus = await apiClient.getGlobalStatus();
<mask> dispatch(dnsStatusSuccess(dnsStatus));
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(initSettingsFailure());
<mask> }
<mask> };
<mask>
<mask> export const enableDnsRequest = creat... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> await apiClient.startGlobalFiltering();
<mask> dispatch(enableDnsSuccess());
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(enableDnsFailure());
<mask> }
<mask> };
<mask>
<mask> export const disableDnsRequest = createAction('DISABLE_DNS_REQ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(disableDnsFailure(error));
dispatch(addErrorToast({ error })); | <mask> await apiClient.stopGlobalFiltering();
<mask> dispatch(disableDnsSuccess());
<mask> } catch (error) {
<mask> console.error(error);
<mask> alertify.error(`Failed to disable DNS with status code ${error.response.status}`);
<mask> dispatch(disableDnsFailure());
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask>
<mask> dispatch(getStatsSuccess(processedStats));
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(getStatsFailure());
<mask> }
<mask> };
<mask>
<mask> export const getTopStatsRequest = createAction('GET_TOP_STATS_REQUEST');
</s> Show toast on fail... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
console.error(error);
dispatch(addErrorToast({ error }));
dispatch(getTopStatsFailure(error)); | <mask> try {
<mask> const stats = await apiClient.getGlobalStatsTop();
<mask> dispatch(getTopStatsSuccess(stats));
<mask> } catch (error) {
<mask> alertify.error(`Failed to load statistics with status code ${error.response.status}`);
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
console.error(error);
dispatch(addErrorToast({ error }));
dispatch(getLogsFailure(error)); | <mask> try {
<mask> const logs = normalizeLogs(await apiClient.getQueryLog());
<mask> dispatch(getLogsSuccess(logs));
<mask> } catch (error) {
<mask> alertify.error(`Failed to load query log with status code ${error.response.status}`);
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> dispatch(toggleLogStatusSuccess());
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(toggleLogStatusFailure());
<mask> }
<mask> };
<mask>
<mask> export const setRulesRequest = createAction('SET_RULES_REQUEST');
</s> Show toast on failed request | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(setRulesFailure());
<mask> }
<mask> };
<mask>
<mask> export const getFilteringStatusRequest = createAction('GET_FILTERING_STATUS_REQUEST');
</s> Show toast on failed request | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(getFilteringStatusFailure());
<mask> }
<mask> };
<mask>
</s> Show toast on failed request | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> dispatch(getFilteringStatus());
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(toggleFilterFailure());
<mask> }
<mask> };
<mask>
<mask> export const refreshFiltersRequest = createAction('FILTERING_REFRESH_REQUEST');
</s> Show toast on failed reques... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(refreshFiltersFailure());
<mask> }
<mask> };
<mask>
</s> Show toast on failed request | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> const normalizedHistory = normalizeHistory(statsHistory);
<mask> dispatch(getStatsHistorySuccess(normalizedHistory));
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(getStatsHistoryFailure());
<mask> }
<mask> };
<mask>
<mask> export const ad... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> dispatch(addFilterSuccess(url));
<mask> dispatch(getFilteringStatus());
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(addFilterFailure());
<mask> }
<mask> };
<mask>
</s> Show toast on failed request | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> dispatch(removeFilterSuccess(url));
<mask> dispatch(getFilteringStatus());
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(removeFilterFailure());
<mask> }
<mask> };
<mask>
</s> Show toast on failed request | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> data = await apiClient.downloadQueryLog();
<mask> dispatch(downloadQueryLogSuccess());
<mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(downloadQueryLogFailure());
<mask> }
<mask> return data;
<mask> };
<mask>
<mask> export const handleU... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
dispatch(addErrorToast({ error })); | <mask> } catch (error) {
<mask> console.error(error);
<mask> dispatch(setUpstreamFailure());
<mask> }
<mask> };
</s> Show toast on failed request | [
"keep",
"add",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/actions/index.js |
try {
const response = await axios({
url: `${this.baseUrl}/${path}`,
method,
...config,
});
return response.data;
} catch (error) {
throw new Error(`${this.baseUrl}/${path} | ${error.response.data} | ${error.... | <mask> export default class Api {
<mask> baseUrl = 'control';
<mask>
<mask> async makeRequest(path, method = 'POST', config) {
<mask> const response = await axios({
<mask> url: `${this.baseUrl}/${path}`,
<mask> method,
<mask> ...config,
<mask> });
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/api/Api.js |
<mask> import { HashRouter, Route } from 'react-router-dom';
<mask> import PropTypes from 'prop-types';
<mask>
<mask> import 'react-table/react-table.css';
<mask> import 'alertifyjs/build/css/alertify.min.css';
<mask> import '../ui/Tabler.css';
<mask> import '../ui/ReactTable.css';
<mask> import '../ui/Alertif... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/components/App/index.js | |
<mask> import 'react-table/react-table.css';
<mask> import 'alertifyjs/build/css/alertify.min.css';
<mask> import '../ui/Tabler.css';
<mask> import '../ui/ReactTable.css';
<mask> import '../ui/Alertify.css';
<mask> import './index.css';
<mask>
<mask> import Header from '../../containers/Header';
<mask> import... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/components/App/index.js | |
import Toasts from '../Toasts'; | <mask> import Settings from '../../containers/Settings';
<mask> import Filters from '../../containers/Filters';
<mask> import Logs from '../../containers/Logs';
<mask> import Footer from '../ui/Footer';
<mask>
<mask> import Status from '../ui/Status';
<mask>
<mask> class App extends Component {
<mask> co... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/components/App/index.js |
<Toasts /> | <mask> </div>
<mask> <Footer />
<mask> </Fragment>
<mask> </HashRouter>
<mask> );
<mask> }
<mask> }
</s> Show toast on failed request </s> remove {disableButton}
</s> add | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/components/App/index.js |
error: PropTypes.string, | <mask> dashboard: PropTypes.object,
<mask> isCoreRunning: PropTypes.bool,
<mask> };
<mask>
<mask> export default App;
</s> Show toast on failed request </s> remove const response = await axios({
url: `${this.baseUrl}/${path}`,
method,
...config,
});
... | [
"keep",
"add",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/components/App/index.js |
<mask> dashboard.processingStats ||
<mask> dashboard.processingStatsHistory ||
<mask> dashboard.processingTopStats;
<mask>
<mask> const disableButton = <button type="button" className="btn btn-outline-secondary btn-sm mr-2" onClick={() => this.props.disableDns()}>Disabl... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/components/Dashboard/index.js | |
<mask> return (
<mask> <Fragment>
<mask> <PageTitle title="Dashboard">
<mask> <div className="page-title__actions">
<mask> {disableButton}
<mask> {refreshFullButton}
<mask> </div>
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/components/Dashboard/index.js | |
import nanoid from 'nanoid'; | <mask> import { combineReducers } from 'redux';
<mask> import { handleActions } from 'redux-actions';
<mask>
<mask> import * as actions from '../actions';
<mask>
<mask> const settings = handleActions({
<mask> [actions.initSettingsRequest]: state => ({ ...state, processing: true }),
</s> Show toast on fail... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/reducers/index.js |
toasts, | <mask> settings,
<mask> dashboard,
<mask> queryLogs,
<mask> filtering,
<mask> });
</s> Show toast on failed request </s> remove const response = await axios({
url: `${this.baseUrl}/${path}`,
method,
...config,
});
return response.data;
<... | [
"keep",
"keep",
"keep",
"add",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/828bb40084963436aeb2c39fa2f5c75a8b17e983 | client/src/reducers/index.js |
"github.com/AdguardTeam/urlfilter" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/bluele/gcache"
<mask> "golang.org/x/net/publicsuffix"
<mask> )
<mask>
</s> * dnsfilter: use urlfilter package
+ new config setting 'filtering_temp_filename'
* remove Add... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c | dnsfilter/dnsfilter.go |
FilteringTempFilename string `yaml:"filtering_temp_filename"` // temporary file for storing unused filtering rules
ParentalSensitivity int `yaml:"parental_sensitivity"` // must be either 3, 10, 13 or 17
ParentalEnabled bool `yaml:"parental_enabled"`
SafeSearchEnabled bool `yaml:"safesearch_ena... | <mask> const enableDelayedCompilation = true // flag for debugging, must be true in production for faster performance
<mask>
<mask> // Config allows you to configure DNS filtering with New() or just change variables directly.
<mask> type Config struct {
<mask> ParentalSensitivity int `yaml:"parental_sensitivi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c | dnsfilter/dnsfilter.go |
rulesStorage *urlfilter.RulesStorage
filteringEngine *urlfilter.DNSEngine
| <mask>
<mask> // Dnsfilter holds added rules and performs hostname matches against the rules
<mask> type Dnsfilter struct {
<mask> // HTTP lookups for safebrowsing and parental
<mask> client http.Client // handle for http client -- single instance as recommended by docs
<mask> transport *http.Transport... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c | dnsfilter/dnsfilter.go |
// Initialize urlfilter objects
func (d *Dnsfilter) initFiltering(filters map[int]string) error {
var err error
d.rulesStorage, err = urlfilter.NewRuleStorage(d.FilteringTempFilename)
if err != nil {
return err
}
d.filteringEngine = urlfilter.NewDNSEngine(filters, d.rulesStorage) | <mask> //
<mask> // Adding rule and matching against the rules
<mask> //
<mask>
<mask> // AddRules is a convinience function to add an array of filters in one call
<mask> func (d *Dnsfilter) AddRules(filters []Filter) error {
<mask> return nil
<mask> }
<mask>
<mask> // matchHost is a low-level way to check... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c | dnsfilter/dnsfilter.go |
func New(c *Config, filters map[int]string) *Dnsfilter { | <mask> }
<mask> }
<mask>
<mask> // New creates properly initialized DNS Filter that is ready to be used
<mask> func New(c *Config) *Dnsfilter {
<mask> d := new(Dnsfilter)
<mask>
<mask> // Customize the Transport to have larger connection pool,
<mask> // We are not (re)using http.DefaultTransport because ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c | dnsfilter/dnsfilter.go |
if filters != nil {
err := d.initFiltering(filters)
if err != nil {
log.Error("Can't initialize filtering subsystem: %s", err)
d.Destroy()
return nil
}
}
| <mask> if c != nil {
<mask> d.Config = *c
<mask> }
<mask>
<mask> return d
<mask> }
<mask>
<mask> // Destroy is optional if you want to tidy up goroutines without waiting for them to die off
<mask> // right now it closes idle HTTP connections if there are any
</s> * dnsfilter: use urlfilter package
+ n... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c | dnsfilter/dnsfilter.go |
if d.rulesStorage != nil {
d.rulesStorage.Close()
d.rulesStorage = nil
} | <mask> d.transport.CloseIdleConnections()
<mask> }
<mask> }
<mask>
<mask> //
<mask> // config manipulation helpers
<mask> //
</s> * dnsfilter: use urlfilter package
+ new config setting 'filtering_temp_filename'
* remove AddRules(), modify New() </s> remove func New(c *Config) *Dnsfilter {
</s> add func ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/829415da5b714b83d07c28728f3ba12e85b6692c | dnsfilter/dnsfilter.go |
import whotracksmeWebsites from './whotracksme_web.json'; | <mask> import whotracksmeDb from './whotracksme.json';
<mask> import adguardDb from './adguard.json';
<mask> import { REPOSITORY } from '../constants';
<mask>
<mask> /**
<mask> @typedef TrackerData
</s> Pull request: whotracksme tracker links
Merge in DNS/adguard-home from 4416-ui-tracker-href to master
Squa... | [
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/82af43039c78b49908151c09175a5161dd911601 | client/src/helpers/trackers/trackers.js |
/**
* Gets link to tracker page on whotracks.me.
*
* @param trackerId
* @return {string}
*/
const getWhotracksmeUrl = (trackerId) => {
const websiteId = whotracksmeWebsites.websites[trackerId];
if (websiteId) {
// Overrides links to websites.
return `https://whotracks.me/websites/${websiteI... | <mask> ADGUARD: 2,
<mask> };
<mask>
<mask> /**
<mask> * Gets the source metadata for the specified tracker
<mask> * @param {TrackerData} trackerData tracker data
<mask> * @returns {source} source metadata or null if no matching tracker found
<mask> */
<mask> export const getSourceData = (trackerData) ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/82af43039c78b49908151c09175a5161dd911601 | client/src/helpers/trackers/trackers.js |
url: getWhotracksmeUrl(trackerData.id), | <mask>
<mask> if (trackerData.source === sources.WHOTRACKSME) {
<mask> return {
<mask> name: 'Whotracks.me',
<mask> url: `https://whotracks.me/trackers/${trackerData.id}.html`,
<mask> };
<mask> }
<mask> if (trackerData.source === sources.ADGUARD) {
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/82af43039c78b49908151c09175a5161dd911601 | client/src/helpers/trackers/trackers.js |
binaryFile string
coreFile string
Filters []filter `yaml:"-"`
Port int `yaml:"port"`
dnsforward.FilteringConfig `yaml:",inline"`
QueryLogEnabled bool `yaml:"querylog_enabled"`
Ratelimit int `yaml:"ratelimit"`
RefuseAny bool `yaml:"refuse_any"`
Pprof string ... | <mask> }
<mask>
<mask> // field ordering is important -- yaml fields will mirror ordering from here
<mask> type coreDNSConfig struct {
<mask> binaryFile string
<mask> coreFile string
<mask> Filters []filter `yaml:"-"`
<mask> Port int `yaml:"port"`
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
... | https://github.com/AdguardTeam/AdGuardHome/commit/8316d39b4282599681a827a50d6541c5cb4987ed | config.go |
Port: 53,
binaryFile: "coredns", // only filename, no path
coreFile: "Corefile", // only filename, no path
FilteringConfig: dnsforward.FilteringConfig{
ProtectionEnabled: true,
FilteringEnabled: true,
SafeBrowsingEnabled: false,
BlockedResponseTTL: 10, // in seconds
},
QueryLogEna... | <mask> ourConfigFilename: "AdGuardHome.yaml",
<mask> BindPort: 3000,
<mask> BindHost: "127.0.0.1",
<mask> CoreDNS: coreDNSConfig{
<mask> Port: 53,
<mask> binaryFile: "coredns", // only filename, no path
<mask> coreFile: "Corefile", // only filename,... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8316d39b4282599681a827a50d6541c5cb4987ed | config.go |
type FilteringConfig struct {
ProtectionEnabled bool `yaml:"protection_enabled"`
FilteringEnabled bool `yaml:"filtering_enabled"`
SafeBrowsingEnabled bool `yaml:"safebrowsing_enabled"`
SafeSearchEnabled bool `yaml:"safesearch_enabled"`
ParentalEnabled bool `yaml:"parental_enabled"`
ParentalSe... | <mask> fmt.Fprintf(os.Stderr, "%s:%d %s() -> RUnlock() -> done\n", path.Base(file), line, path.Base(f.Name()))
<mask> }
<mask> */
<mask>
<mask> // The zero ServerConfig is empty and ready for use.
<mask> type ServerConfig struct {
<mask> UDPListenAddr *net.UDPAddr // if nil, then default is is used (port... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8316d39b4282599681a827a50d6541c5cb4987ed | dnsforward/dnsforward.go |
FilteringConfig | <mask> UDPListenAddr *net.UDPAddr // if nil, then default is is used (port 53 on *)
<mask> BlockedResponseTTL uint32 // if 0, then default is used (3600)
<mask> Upstreams []Upstream
<mask> Filters []Filter
<mask> }
<mask>
<mask> var defaultValues = ServerConfig{
<mask> UDPLi... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8316d39b4282599681a827a50d6541c5cb4987ed | dnsforward/dnsforward.go |
// Server is the main way to start a DNS server.
// | <mask> "github.com/joomcode/errorx"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // Server is the main way to start a DNS server
<mask> // Example:
<mask> // s := dnsforward.Server{}
<mask> // err := s.Start(nil) // will start a DNS server listening on default port 53, in a goroutine
<mask> // err :... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8396dc2fdb90711ba3394b975347a262afe22ae7 | dnsforward/dnsforward.go |
// s := dnsforward.Server{}
// err := s.Start(nil) // will start a DNS server listening on default port 53, in a goroutine
// err := s.Reconfigure(ServerConfig{UDPListenAddr: &net.UDPAddr{Port: 53535}}) // will reconfigure running DNS server to listen on UDP port 53535
// err := s.Stop() // will stop listening on p... | <mask> )
<mask>
<mask> // Server is the main way to start a DNS server
<mask> // Example:
<mask> // s := dnsforward.Server{}
<mask> // err := s.Start(nil) // will start a DNS server listening on default port 53, in a goroutine
<mask> // err := s.Reconfigure(ServerConfig{UDPListenAddr: &net.UDPAddr{Port: 53535}}... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8396dc2fdb90711ba3394b975347a262afe22ae7 | dnsforward/dnsforward.go |
// Upstream TLS pool. | <mask>
<mask> "github.com/joomcode/errorx"
<mask> )
<mask>
<mask> // upstream TLS pool.
<mask> //
<mask> // Example:
<mask> // pool := TLSPool{Address: "tls://1.1.1.1:853"}
<mask> // netConn, err := pool.Get()
<mask> // if err != nil {panic(err)}
</s> Update docs for formatting in godoc. </s> remove // po... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8396dc2fdb90711ba3394b975347a262afe22ae7 | dnsforward/upstream_pool.go |
// pool := TLSPool{Address: "tls://1.1.1.1:853"}
// netConn, err := pool.Get()
// if err != nil {panic(err)}
// c := dns.Conn{Conn: netConn}
// q := dns.Msg{}
// q.SetQuestion("google.com.", dns.TypeA)
// log.Println(q)
// err = c.WriteMsg(&q)
// if err != nil {panic(err)}
// r, err := c.ReadMsg()
// if err ... | <mask>
<mask> // upstream TLS pool.
<mask> //
<mask> // Example:
<mask> // pool := TLSPool{Address: "tls://1.1.1.1:853"}
<mask> // netConn, err := pool.Get()
<mask> // if err != nil {panic(err)}
<mask> // c := dns.Conn{Conn: netConn}
<mask> // q := dns.Msg{}
<mask> // q.SetQuestion("google.com.", dns.TypeA)
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8396dc2fdb90711ba3394b975347a262afe22ae7 | dnsforward/upstream_pool.go |
<mask> package dnsforward
<mask>
<mask> import (
<mask> "crypto/tls"
<mask> "fmt"
<mask> "net"
<mask> "path"
<mask> "strings"
<mask> "time"
<mask>
</s> Pull request: dnsforward: do not check client srv name unless asked
Merge in DNS/adguard-home from 2664-non-strict-sni to master
Updates #2664.
Sq... | [
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/841bb9bc35786c710414706ef38c2830024fbfed | internal/dnsforward/dns.go | |
<mask> import (
<mask> "crypto/tls"
<mask> "fmt"
<mask> "net"
<mask> "path"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
</s> Pull request: dnsforward: do not check client srv name unle... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/841bb9bc35786c710414706ef38c2830024fbfed | internal/dnsforward/dns.go | |
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/lucas-clemente/quic-go"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/841bb9bc35786c710414706ef38c2830024fbfed | internal/dnsforward/dns.go | |
<mask> ctx.proxyCtx.Res = resp
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> const maxDomainPartLen = 64
<mask>
<mask> // ValidateClientID returns an error if clientID is not a valid client ID.
<mask> func ValidateClientID(clientID string) (err error) {
<mask> if len(clientID) > maxDomainPartLen ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/841bb9bc35786c710414706ef38c2830024fbfed | internal/dnsforward/dns.go | |
// JoinHostPort is a convinient wrapper for net.JoinHostPort with port of type
// int.
func JoinHostPort(host string, port int) (hostport string) {
return net.JoinHostPort(host, strconv.Itoa(port))
}
| <mask> (r >= 'A' && r <= 'Z') ||
<mask> (r >= '0' && r <= '9')
<mask> }
<mask>
<mask> // isValidHostRune returns true if r is a valid rune for a hostname label.
<mask> func isValidHostRune(r rune) (ok bool) {
<mask> return r == '-' || IsValidHostOuterRune(r)
<mask> }
<mask>
</s> Pull request: dhcpd: ad... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/aghnet/addr.go |
func TestJoinHostPort(t *testing.T) {
assert.Equal(t, ":0", JoinHostPort("", 0))
assert.Equal(t, "host:12345", JoinHostPort("host", 12345))
assert.Equal(t, "1.2.3.4:12345", JoinHostPort("1.2.3.4", 12345))
assert.Equal(t, "[1234::5678]:12345", JoinHostPort("1234::5678", 12345))
assert.Equal(t, "[1234::5678%lo]:1234... | <mask> }
<mask> }
<mask>
<mask> func repeatStr(b *strings.Builder, s string, n int) {
<mask> for i := 0; i < n; i++ {
<mask> _, _ = b.WriteString(s)
<mask> }
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashed commit of the following:
commit 2ce6cc005d09ac7d63e4e575705d86e92046697f
Au... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/aghnet/addr_test.go |
<mask> }
<mask>
<mask> return addrs, nil
<mask> }
<mask>
<mask> // JoinHostPort is a convinient wrapper for net.JoinHostPort with port of type
<mask> // int.
<mask> func JoinHostPort(host string, port int) (hostport string) {
<mask> return net.JoinHostPort(host, strconv.Itoa(port))
<mask> }
</s> Pull re... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/aghnet/net.go | |
"fmt" | <mask> package dhcpd
<mask>
<mask> import (
<mask> "encoding/json"
<mask> "net"
<mask> "os"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashed commit of the following:
c... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
func (s *Server) dbLoad() (err error) { | <mask> return ip
<mask> }
<mask>
<mask> // Load lease table from DB
<mask> func (s *Server) dbLoad() {
<mask> dynLeases := []*Lease{}
<mask> staticLeases := []*Lease{}
<mask> v6StaticLeases := []*Lease{}
<mask> v6DynLeases := []*Lease{}
<mask>
</s> Pull request: dhcpd: add purge, imp code
Updates #16... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
return fmt.Errorf("reading db: %w", err) | <mask>
<mask> data, err := os.ReadFile(s.conf.DBFilePath)
<mask> if err != nil {
<mask> if !errors.Is(err, os.ErrNotExist) {
<mask> log.Error("dhcp: can't read file %q: %v", s.conf.DBFilePath, err)
<mask> }
<mask>
<mask> return
<mask> }
<mask>
</s> Pull request: dhcpd: add purge, imp code
Upd... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
return nil | <mask> if !errors.Is(err, os.ErrNotExist) {
<mask> log.Error("dhcp: can't read file %q: %v", s.conf.DBFilePath, err)
<mask> }
<mask>
<mask> return
<mask> }
<mask>
<mask> obj := []leaseJSON{}
<mask> err = json.Unmarshal(data, &obj)
<mask> if err != nil {
</s> Pull request: dhcpd: add purge, imp... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
return fmt.Errorf("decoding db: %w", err) | <mask>
<mask> obj := []leaseJSON{}
<mask> err = json.Unmarshal(data, &obj)
<mask> if err != nil {
<mask> log.Error("dhcp: invalid DB: %v", err)
<mask> return
<mask> }
<mask>
<mask> numLeases := len(obj)
<mask> for i := range obj {
<mask> obj[i].IP = normalizeIP(obj[i].IP)
</s> Pull request: dh... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
err = s.srv4.ResetLeases(leases4)
if err != nil {
return fmt.Errorf("resetting dhcpv4 leases: %w", err)
} | <mask> }
<mask> }
<mask>
<mask> leases4 := normalizeLeases(staticLeases, dynLeases)
<mask> s.srv4.ResetLeases(leases4)
<mask>
<mask> leases6 := normalizeLeases(v6StaticLeases, v6DynLeases)
<mask> if s.srv6 != nil {
<mask> s.srv6.ResetLeases(leases6)
<mask> }
</s> Pull request: dhcpd: add purge, i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
err = s.srv6.ResetLeases(leases6)
if err != nil {
return fmt.Errorf("resetting dhcpv6 leases: %w", err)
} | <mask> s.srv4.ResetLeases(leases4)
<mask>
<mask> leases6 := normalizeLeases(v6StaticLeases, v6DynLeases)
<mask> if s.srv6 != nil {
<mask> s.srv6.ResetLeases(leases6)
<mask> }
<mask>
<mask> log.Info("dhcp: loaded leases v4:%d v6:%d total-read:%d from DB",
<mask> len(leases4), len(leases6), numLease... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
return nil | <mask> log.Info("dhcp: loaded leases v4:%d v6:%d total-read:%d from DB",
<mask> len(leases4), len(leases6), numLeases)
<mask> }
<mask>
<mask> // Skip duplicate leases
<mask> // Static leases have a priority over dynamic leases
<mask> func normalizeLeases(staticLeases, dynLeases []*Lease) []*Lease {
</s> P... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
func (s *Server) dbStore() (err error) {
// Use an empty slice here as opposed to nil so that it doesn't write
// "null" into the database file if leases are empty.
leases := []leaseJSON{} | <mask> return leases
<mask> }
<mask>
<mask> // Store lease table in DB
<mask> func (s *Server) dbStore() {
<mask> var leases []leaseJSON
<mask>
<mask> leases4 := s.srv4.getLeasesRef()
<mask> for _, l := range leases4 {
<mask> if l.Expiry.Unix() == 0 {
<mask> continue
</s> Pull request: dhcpd: add... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
var data []byte
data, err = json.Marshal(leases) | <mask> leases = append(leases, lease)
<mask> }
<mask> }
<mask>
<mask> data, err := json.Marshal(leases)
<mask> if err != nil {
<mask> log.Error("json.Marshal: %v", err)
<mask> return
<mask> }
<mask>
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashed commit of the following... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
return fmt.Errorf("encoding db: %w", err) | <mask> }
<mask>
<mask> data, err := json.Marshal(leases)
<mask> if err != nil {
<mask> log.Error("json.Marshal: %v", err)
<mask> return
<mask> }
<mask>
<mask> err = maybe.WriteFile(s.conf.DBFilePath, data, 0o644)
<mask> if err != nil {
<mask> log.Error("dhcp: can't store lease table on disk: %v... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
return fmt.Errorf("writing db: %w", err) | <mask> }
<mask>
<mask> err = maybe.WriteFile(s.conf.DBFilePath, data, 0o644)
<mask> if err != nil {
<mask> log.Error("dhcp: can't store lease table on disk: %v filename: %s",
<mask> err, s.conf.DBFilePath)
<mask>
<mask> return
<mask> }
<mask>
<mask> log.Info("dhcp: stored %d leases in DB", le... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
log.Info("dhcp: stored %d leases in db", len(leases))
return nil | <mask>
<mask> return
<mask> }
<mask>
<mask> log.Info("dhcp: stored %d leases in DB", len(leases))
<mask> }
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashed commit of the following:
commit 2ce6cc005d09ac7d63e4e575705d86e92046697f
Author: Ainar Garipov <A.Garipov@AdGuard.COM>
Date: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/db.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> const (
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashed commit of the following:
commit 2ce6cc005d09ac7d63e4e575705d86e92046697f
Author: Ainar Garipov <A.Garipov@AdGuard.COM>
Date: Wed Jun 16 16:... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
// GetLeasesFlags are the flags for GetLeases.
type GetLeasesFlags uint8
// GetLeasesFlags values
const (
LeasesDynamic GetLeasesFlags = 0b0001
LeasesStatic GetLeasesFlags = 0b0010
LeasesAll = LeasesDynamic | LeasesStatic
)
| <mask> onLeaseChanged []OnLeaseChangedT
<mask> }
<mask>
<mask> // ServerInterface is an interface for servers.
<mask> type ServerInterface interface {
<mask> Enabled() (ok bool)
<mask> Leases(flags GetLeasesFlags) (leases []*Lease)
<mask> SetOnLeaseChanged(onLeaseChanged OnLeaseChangedT)
</s> Pull request... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
Leases(flags GetLeasesFlags) (leases []*Lease) | <mask>
<mask> // ServerInterface is an interface for servers.
<mask> type ServerInterface interface {
<mask> Enabled() (ok bool)
<mask> Leases(flags int) []Lease
<mask> SetOnLeaseChanged(onLeaseChanged OnLeaseChangedT)
<mask> }
<mask>
<mask> // Create - create object
<mask> func Create(conf ServerConfig)... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
func Create(conf ServerConfig) (s *Server, err error) {
s = &Server{} | <mask> SetOnLeaseChanged(onLeaseChanged OnLeaseChangedT)
<mask> }
<mask>
<mask> // Create - create object
<mask> func Create(conf ServerConfig) *Server {
<mask> s := &Server{}
<mask>
<mask> s.conf.Enabled = conf.Enabled
<mask> s.conf.InterfaceName = conf.InterfaceName
<mask> s.conf.HTTPRegister = conf.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
<mask>
<mask> webHandlersRegistered = true
<mask> }
<mask>
<mask> var err4, err6 error
<mask> v4conf := conf.Conf4
<mask> v4conf.Enabled = s.conf.Enabled
<mask> if len(v4conf.RangeStart) == 0 {
<mask> v4conf.Enabled = false
<mask> }
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
S... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go | |
s.srv4, err = v4Create(v4conf)
if err != nil {
return nil, fmt.Errorf("creating dhcpv4 srv: %w", err)
} | <mask> v4conf.Enabled = false
<mask> }
<mask> v4conf.InterfaceName = s.conf.InterfaceName
<mask> v4conf.notify = s.onNotify
<mask> s.srv4, err4 = v4Create(v4conf)
<mask>
<mask> v6conf := conf.Conf6
<mask> v6conf.Enabled = s.conf.Enabled
<mask> if len(v6conf.RangeStart) == 0 {
<mask> v6conf.Enabled... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
s.srv6, err = v6Create(v6conf)
if err != nil {
return nil, fmt.Errorf("creating dhcpv6 srv: %w", err) | <mask> v6conf.Enabled = false
<mask> }
<mask> v6conf.InterfaceName = s.conf.InterfaceName
<mask> v6conf.notify = s.onNotify
<mask> s.srv6, err6 = v6Create(v6conf)
<mask>
<mask> if err4 != nil {
<mask> log.Error("%s", err4)
<mask> return nil
<mask> }
<mask> if err6 != nil {
<mask> log.Error("... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
return nil, fmt.Errorf("neither dhcpv4 nor dhcpv6 srv is configured") | <mask> s.conf.Conf4 = conf.Conf4
<mask> s.conf.Conf6 = conf.Conf6
<mask>
<mask> if s.conf.Enabled && !v4conf.Enabled && !v6conf.Enabled {
<mask> log.Error("Can't enable DHCP server because neither DHCPv4 nor DHCPv6 servers are configured")
<mask> return nil
<mask> }
<mask>
<mask> // we can't delay d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
// Don't delay database loading until the DHCP server is started,
// because we need static leases functionality available beforehand.
err = s.dbLoad()
if err != nil {
return nil, fmt.Errorf("loading db: %w", err)
}
return s, nil | <mask> log.Error("Can't enable DHCP server because neither DHCPv4 nor DHCPv6 servers are configured")
<mask> return nil
<mask> }
<mask>
<mask> // we can't delay database loading until DHCP server is started,
<mask> // because we need static leases functionality available beforehand
<mask> s.dbLoad()
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
err := s.dbStore()
if err != nil {
log.Error("updating db: %s", err)
} | <mask>
<mask> // server calls this function after DB is updated
<mask> func (s *Server) onNotify(flags uint32) {
<mask> if flags == LeaseChangedDBStore {
<mask> s.dbStore()
<mask>
<mask> return
<mask> }
<mask>
<mask> s.notify(int(flags))
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
func (s *Server) Stop() (err error) {
err = s.srv4.Stop()
if err != nil {
return err
} | <mask> return nil
<mask> }
<mask>
<mask> // Stop closes the listening UDP socket
<mask> func (s *Server) Stop() {
<mask> s.srv4.Stop()
<mask> s.srv6.Stop()
<mask> }
<mask>
<mask> // flags for Leases() function
<mask> const (
<mask> LeasesDynamic = 1
<mask> LeasesStatic = 2
</s> Pull request: dhcpd... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
err = s.srv6.Stop()
if err != nil {
return err
}
return nil
} | <mask> s.srv4.Stop()
<mask> s.srv6.Stop()
<mask> }
<mask>
<mask> // flags for Leases() function
<mask> const (
<mask> LeasesDynamic = 1
<mask> LeasesStatic = 2
<mask> LeasesAll = LeasesDynamic | LeasesStatic
<mask> )
<mask>
<mask> // Leases returns the list of active IPv4 and IPv6 DHCP leases. ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
func (s *Server) Leases(flags GetLeasesFlags) (leases []*Lease) { | <mask> )
<mask>
<mask> // Leases returns the list of active IPv4 and IPv6 DHCP leases. It's safe for
<mask> // concurrent use.
<mask> func (s *Server) Leases(flags int) (leases []Lease) {
<mask> return append(s.srv4.GetLeases(flags), s.srv6.GetLeases(flags)...)
<mask> }
<mask>
<mask> // FindMACbyIP - find ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
func (s *Server) AddStaticLease(l *Lease) error {
return s.srv4.AddStaticLease(l) | <mask> return s.srv6.FindMACbyIP(ip)
<mask> }
<mask>
<mask> // AddStaticLease - add static v4 lease
<mask> func (s *Server) AddStaticLease(lease Lease) error {
<mask> return s.srv4.AddStaticLease(lease)
<mask> }
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashed commit of the following:
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd.go |
leases := []*Lease{{ | <mask>
<mask> s.srv6, err = v6Create(V6ServerConf{})
<mask> require.NoError(t, err)
<mask>
<mask> leases := []Lease{{
<mask> Expiry: time.Now().Add(time.Hour),
<mask> Hostname: "static-1.local",
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
<mask> IP: net.IP{192, 1... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd_test.go |
err = srv4.addLease(leases[0]) | <mask>
<mask> srv4, ok := s.srv4.(*v4Server)
<mask> require.True(t, ok)
<mask>
<mask> err = srv4.addLease(&leases[0])
<mask> require.NoError(t, err)
<mask>
<mask> err = s.srv4.AddStaticLease(leases[1])
<mask> require.NoError(t, err)
<mask>
</s> Pull request: dhcpd: add purge, imp code
Updates #169... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd_test.go |
err = s.dbStore()
require.NoError(t, err)
| <mask>
<mask> err = s.srv4.AddStaticLease(leases[1])
<mask> require.NoError(t, err)
<mask>
<mask> s.dbStore()
<mask> t.Cleanup(func() {
<mask> assert.NoError(t, os.Remove(dbFilename))
<mask> })
<mask> s.srv4.ResetLeases(nil)
<mask> s.dbLoad()
</s> Pull request: dhcpd: add purge, imp code
Updates ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd_test.go |
err = s.srv4.ResetLeases(nil)
require.NoError(t, err)
err = s.dbLoad()
require.NoError(t, err) | <mask> s.dbStore()
<mask> t.Cleanup(func() {
<mask> assert.NoError(t, os.Remove(dbFilename))
<mask> })
<mask> s.srv4.ResetLeases(nil)
<mask> s.dbLoad()
<mask>
<mask> ll := s.srv4.GetLeases(LeasesAll)
<mask> require.Len(t, ll, len(leases))
<mask>
<mask> assert.Equal(t, leases[1].HWAddr, ll[0].HWAd... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/dhcpd_test.go |
<mask> }
<mask>
<mask> // dhcpStatusResponse is the response for /control/dhcp/status endpoint.
<mask> type dhcpStatusResponse struct {
<mask> Enabled bool `json:"enabled"`
<mask> IfaceName string `json:"interface_name"`
<mask> V4 V4ServerConf `json:"v4"`
<mask> V6 ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/http.go | |
Leases []*Lease `json:"leases"`
StaticLeases []*Lease `json:"static_leases"`
Enabled bool `json:"enabled"` | <mask> Enabled bool `json:"enabled"`
<mask> IfaceName string `json:"interface_name"`
<mask> V4 V4ServerConf `json:"v4"`
<mask> V6 V6ServerConf `json:"v6"`
<mask> Leases []Lease `json:"leases"`
<mask> StaticLeases []Lease `json:"static_leases"`
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/http.go |
conf := &dhcpServerConfigJSON{} | <mask> Enabled nullBool `json:"enabled"`
<mask> }
<mask>
<mask> func (s *Server) handleDHCPSetConfig(w http.ResponseWriter, r *http.Request) {
<mask> conf := dhcpServerConfigJSON{}
<mask> conf.Enabled = boolToNullBool(s.conf.Enabled)
<mask> conf.InterfaceName = s.conf.InterfaceName
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/http.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.