docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
require.NoError(t, err) | <mask> require.Nil(t, err)
<mask>
<mask> assert.True(t, s.process(msg, req, resp))
<mask> })
<mask> require.Nil(t, err)
<mask>
<mask> t.Run("reply", func(t *testing.T) {
<mask> require.Equal(t, dhcpv6.MessageTypeReply, resp.Type())
<mask> oia = resp.Options.OneIANA()
<mask> oiaAddr = oia.Option... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dhcpd/v6_test.go |
func (d *testDHCP) Leases(flags dhcpd.GetLeasesFlags) (leases []*dhcpd.Lease) {
return []*dhcpd.Lease{{ | <mask> type testDHCP struct{}
<mask>
<mask> func (d *testDHCP) Enabled() (ok bool) { return true }
<mask>
<mask> func (d *testDHCP) Leases(flags int) []dhcpd.Lease {
<mask> l := dhcpd.Lease{
<mask> IP: net.IP{192, 168, 12, 34},
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dnsforward/dnsforward_test.go |
}} | <mask> l := dhcpd.Lease{
<mask> IP: net.IP{192, 168, 12, 34},
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
<mask> Hostname: "myhost",
<mask> }
<mask>
<mask> return []dhcpd.Lease{l}
<mask> }
<mask> func (d *testDHCP) SetOnLeaseChanged(onLeaseChanged dhcpd.OnLeaseChanged... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/dnsforward/dnsforward_test.go |
var err error
| <mask>
<mask> t.Run("complicated", func(t *testing.T) {
<mask> testIP := net.IP{1, 2, 3, 4}
<mask>
<mask> // First, init a DHCP server with a single static lease.
<mask> config := dhcpd.ServerConfig{
<mask> Enabled: true,
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashed com... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/home/clients_test.go |
clients.dhcpServer, err = dhcpd.Create(config)
require.NoError(t, err)
| <mask> RangeEnd: net.IP{1, 2, 3, 10},
<mask> },
<mask> }
<mask>
<mask> clients.dhcpServer = dhcpd.Create(config)
<mask> t.Cleanup(func() { _ = os.Remove("leases.db") })
<mask>
<mask> err := clients.dhcpServer.AddStaticLease(dhcpd.Lease{
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/home/clients_test.go |
err = clients.dhcpServer.AddStaticLease(&dhcpd.Lease{ | <mask>
<mask> clients.dhcpServer = dhcpd.Create(config)
<mask> t.Cleanup(func() { _ = os.Remove("leases.db") })
<mask>
<mask> err := clients.dhcpServer.AddStaticLease(dhcpd.Lease{
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
<mask> IP: testIP,
<mask> Hostname: "t... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/home/clients_test.go |
Context.dhcpServer, err = dhcpd.Create(config.DHCP)
if Context.dhcpServer == nil || err != nil { | <mask> config.DHCP.WorkDir = Context.workDir
<mask> config.DHCP.HTTPRegister = httpRegister
<mask> config.DHCP.ConfigModified = onConfigModified
<mask>
<mask> Context.dhcpServer = dhcpd.Create(config.DHCP)
<mask> if Context.dhcpServer == nil {
<mask> // TODO(a.garipov): There are a lot of places in the c... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/home/home.go |
log.Info("stopping AdGuard Home") | <mask> }
<mask>
<mask> // cleanup stops and resets all the modules.
<mask> func cleanup(ctx context.Context) {
<mask> log.Info("Stopping AdGuard Home")
<mask>
<mask> if Context.web != nil {
<mask> Context.web.Close(ctx)
<mask> Context.web = nil
<mask> }
</s> Pull request: dhcpd: add purge, imp code
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/home/home.go |
log.Error("stopping dns server: %s", err) | <mask> }
<mask>
<mask> err := stopDNSServer()
<mask> if err != nil {
<mask> log.Error("Couldn't stop DNS server: %s", err)
<mask> }
<mask>
<mask> if Context.dhcpServer != nil {
<mask> Context.dhcpServer.Stop()
<mask> }
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashed commit... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/home/home.go |
err = Context.dhcpServer.Stop()
if err != nil {
log.Error("stopping dhcp server: %s", err)
} | <mask> log.Error("Couldn't stop DNS server: %s", err)
<mask> }
<mask>
<mask> if Context.dhcpServer != nil {
<mask> Context.dhcpServer.Stop()
<mask> }
<mask>
<mask> Context.etcHosts.Close()
<mask>
<mask> if Context.tls != nil {
</s> Pull request: dhcpd: add purge, imp code
Updates #1691.
Squashe... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | internal/home/home.go |
'/dhcp/reset_leases':
'post':
'tags':
- 'dhcp'
'operationId': 'dhcpResetLeases'
'summary': 'Reset DHCP leases'
'responses':
'200':
'description': 'OK.'
'501':
'content':
'application/json':
'schema':
'$ref'... | <mask> 'application/json':
<mask> 'schema':
<mask> '$ref': '#/components/schemas/Error'
<mask> 'description': 'Not implemented (for example, on Windows).'
<mask> '/filtering/status':
<mask> 'get':
<mask> 'tags':
<mask> - 'filtering'
</s> Pul... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814 | openapi/openapi.yaml |
err = ioutil.WriteFile(configfile+".tmp", yamlText, 0644) | <mask> if err != nil {
<mask> log.Printf("Couldn't generate YAML file: %s", err)
<mask> return err
<mask> }
<mask> err = ioutil.WriteFile(configfile, yamlText, 0644)
<mask> if err != nil {
<mask> log.Printf("Couldn't write YAML config: %s", err)
<mask> return err
<mask> }
<mask> return nil
</s>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09 | config.go |
err = os.Rename(configfile+".tmp", configfile)
if err != nil {
log.Printf("Couldn't rename YAML config: %s", err)
return err
} | <mask> if err != nil {
<mask> log.Printf("Couldn't write YAML config: %s", err)
<mask> return err
<mask> }
<mask> return nil
<mask> }
<mask>
<mask> // --------------
<mask> // coredns config
<mask> // --------------
</s> Be more atomic during writing of files -- this prevents other processes from see... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09 | config.go |
err = ioutil.WriteFile(corefile+".tmp", []byte(configtext), 0644) | <mask> if err != nil {
<mask> log.Printf("Couldn't generate DNS config: %s", err)
<mask> return err
<mask> }
<mask> err = ioutil.WriteFile(corefile, []byte(configtext), 0644)
<mask> if err != nil {
<mask> log.Printf("Couldn't write DNS config: %s", err)
<mask> }
<mask> return err
<mask> }
</s> Be... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09 | config.go |
err = os.Rename(corefile+".tmp", corefile)
if err != nil {
log.Printf("Couldn't rename DNS config: %s", err)
} | <mask> err = ioutil.WriteFile(corefile+".tmp", []byte(configtext), 0644)
<mask> if err != nil {
<mask> log.Printf("Couldn't write DNS config: %s", err)
<mask> }
<mask> return err
<mask> }
<mask>
<mask> func writeAllConfigs() error {
</s> Be more atomic during writing of files -- this prevents other proc... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09 | config.go |
err := ioutil.WriteFile(filterpath+".tmp", data, 0644) | <mask> for _, rule := range config.UserRules {
<mask> data = append(data, []byte(rule)...)
<mask> data = append(data, '\n')
<mask> }
<mask> err := ioutil.WriteFile(filterpath, data, 0644)
<mask> if err != nil {
<mask> log.Printf("Couldn't write filter file: %s", err)
<mask> return err
<mask> }
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09 | control.go |
err = os.Rename(filterpath+".tmp", filterpath)
if err != nil {
log.Printf("Couldn't rename filter file: %s", err)
return err
} | <mask> return err
<mask> }
<mask> return nil
<mask> }
<mask>
<mask> // ------------
<mask> // safebrowsing
<mask> // ------------
</s> Be more atomic during writing of files -- this prevents other processes from seeing empty or impartial files </s> remove err = ioutil.WriteFile(configfile, yamlText, 0644... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09 | control.go |
<mask> netInterface: (*netInterface)(iface),
<mask> })
<mask> }
<mask>
<mask> // GetValidNetInterfaces returns interfaces that are eligible for DNS and/or DHCP
<mask> // invalid interface is a ppp interface or the one that doesn't allow broadcasts
<mask> func GetValidNetInterfaces() ([]net.Interface, error) ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/net.go | |
ifaces, err := net.Interfaces() | <mask>
<mask> // GetValidNetInterfacesForWeb returns interfaces that are eligible for DNS and WEB only
<mask> // we do not return link-local addresses here
<mask> func GetValidNetInterfacesForWeb() ([]*NetInterface, error) {
<mask> ifaces, err := GetValidNetInterfaces()
<mask> if err != nil {
<mask> return ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/net.go |
// getCurrentHardwarePortInfo gets information for the specified network interface. | <mask>
<mask> return portInfo.static, nil
<mask> }
<mask>
<mask> // getCurrentHardwarePortInfo gets information the specified network interface.
<mask> func getCurrentHardwarePortInfo(ifaceName string) (hardwarePortInfo, error) {
<mask> // First of all we should find hardware port name
<mask> m := getNetwo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/net_darwin.go |
"net" | <mask>
<mask> import (
<mask> "testing"
<mask>
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master
Updates #2704.
Updates #2829.
Squash... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/net_test.go |
"github.com/stretchr/testify/assert" | <mask> "testing"
<mask>
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
<mask> func TestGetValidNetInterfacesForWeb(t *testing.T) {
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master
Updates #2704.
Updates #2829.
Squashed commit o... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/net_test.go |
// refresh refreshes the local resolvers' addresses cache. It should be | <mask> type SystemResolvers interface {
<mask> // Get returns the slice of local resolvers' addresses.
<mask> // It should be safe for concurrent use.
<mask> Get() (rs []string)
<mask> // Refresh refreshes the local resolvers' addresses cache. It should be
<mask> // safe for concurrent use.
<mask> Refresh... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/systemresolvers.go |
refresh() (err error) | <mask> // It should be safe for concurrent use.
<mask> Get() (rs []string)
<mask> // Refresh refreshes the local resolvers' addresses cache. It should be
<mask> // safe for concurrent use.
<mask> Refresh() (err error)
<mask> }
<mask>
<mask> const (
<mask> // fakeDialErr is an error which dialFunc is ex... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/systemresolvers.go |
err := sr.refresh() | <mask> defer agherr.LogPanic("systemResolvers")
<mask>
<mask> // TODO(e.burkov): Implement a functionality to stop ticker.
<mask> for range tickCh {
<mask> err := sr.Refresh()
<mask> if err != nil {
<mask> log.Error("systemResolvers: error in refreshing goroutine: %s", err)
<mask>
<mask> continu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/systemresolvers.go |
err = sr.refresh() | <mask> ) (sr SystemResolvers, err error) {
<mask> sr = newSystemResolvers(refreshIvl, hostGenFunc)
<mask>
<mask> // Fill cache.
<mask> err = sr.Refresh()
<mask> if err != nil {
<mask> return nil, err
<mask> }
<mask>
<mask> if refreshIvl > 0 {
</s> Pull request: 2704 local addresses vol.2
Merge in ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/systemresolvers.go |
func (sr *systemResolvers) refresh() (err error) { | <mask> addrs map[string]unit
<mask> addrsLock sync.RWMutex
<mask> }
<mask>
<mask> func (sr *systemResolvers) Refresh() (err error) {
<mask> defer agherr.Annotate("systemResolvers: %w", &err)
<mask>
<mask> _, err = sr.resolver.LookupHost(context.Background(), sr.hostGenFunc())
<mask> dnserr := &net.D... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/systemresolvers_others.go |
sr.addrs[host] = unit{} | <mask>
<mask> sr.addrsLock.Lock()
<mask> defer sr.addrsLock.Unlock()
<mask>
<mask> sr.addrs[address] = unit{}
<mask>
<mask> return nil, fakeDialErr
<mask> }
<mask>
<mask> func (sr *systemResolvers) Get() (rs []string) {
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 270... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/systemresolvers_others.go |
assert.NoError(t, sr.refresh()) | <mask> func TestSystemResolvers_Refresh(t *testing.T) {
<mask> t.Run("expected_error", func(t *testing.T) {
<mask> sr := createTestSystemResolvers(t, 0, nil)
<mask>
<mask> assert.NoError(t, sr.Refresh())
<mask> })
<mask>
<mask> t.Run("unexpected_error", func(t *testing.T) {
<mask> _, err := NewSyste... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/systemresolvers_others_test.go |
func (sr *systemResolvers) refresh() (err error) { | <mask>
<mask> return addrs, nil
<mask> }
<mask>
<mask> func (sr *systemResolvers) Refresh() (err error) {
<mask> defer agherr.Annotate("systemResolvers: %w", &err)
<mask>
<mask> got, err := sr.getAddrs()
<mask> if err != nil {
<mask> return fmt.Errorf("can't get addresses: %w", err)
</s> Pull reques... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghnet/systemresolvers_windows.go |
<mask>
<mask> import (
<mask> "crypto/sha256"
<mask> "encoding/hex"
<mask> "errors"
<mask> "fmt"
<mask> "net"
<mask> "strings"
<mask> "sync"
<mask>
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master
Updates #2704.
Updates #2829.
Squas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghtest/upstream.go | |
Name: n, | <mask>
<mask> for _, n := range names {
<mask> resp.Answer = append(resp.Answer, &dns.PTR{
<mask> Hdr: dns.RR_Header{
<mask> Name: name,
<mask> Rrtype: rrType,
<mask> },
<mask> Ptr: n,
<mask> })
<mask> }
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-ho... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghtest/upstream.go |
type TestErrUpstream struct {
// The error returned by Exchange may be unwraped to the Err.
Err error
} | <mask> }
<mask>
<mask> // TestErrUpstream implements upstream.Upstream interface for replacing real
<mask> // upstream in tests.
<mask> type TestErrUpstream struct{}
<mask>
<mask> // Exchange always returns nil Msg and non-nil error.
<mask> func (u *TestErrUpstream) Exchange(*dns.Msg) (*dns.Msg, error) {
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghtest/upstream.go |
return nil, fmt.Errorf("errupstream: %w", u.Err) | <mask> func (u *TestErrUpstream) Exchange(*dns.Msg) (*dns.Msg, error) {
<mask> // We don't use an agherr.Error to avoid the import cycle since aghtests
<mask> // used to provide the utilities for testing which agherr (and any other
<mask> // testable package) should be able to use.
<mask> return nil, errors.Ne... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/aghtest/upstream.go |
ifaces, err := net.Interfaces() | <mask>
<mask> func (s *Server) handleDHCPInterfaces(w http.ResponseWriter, r *http.Request) {
<mask> response := map[string]netInterfaceJSON{}
<mask>
<mask> ifaces, err := aghnet.GetValidNetInterfaces()
<mask> if err != nil {
<mask> httpError(r, w, http.StatusInternalServerError, "Couldn't get interfaces:... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dhcpd/http.go |
"errors" | <mask> package dnsforward
<mask>
<mask> import (
<mask> "net"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-l... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
</s> Pull request: 2704... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "githu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go | |
// unreversedReqIP stores an IP address obtained from PTR request if it
// was successfully parsed.
unreversedReqIP net.IP | <mask> // response is modified by filters.
<mask> origResp *dns.Msg
<mask> // err is the error returned from a processing function.
<mask> err error
<mask> // clientID is the clientID from DOH, DOQ, or DOT, if provided.
<mask> clientID string
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adgu... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
s.processRestrictLocal,
s.processInternalIPAddrs, | <mask> // appropriate handler.
<mask> mods := []modProcessFunc{
<mask> processInitial,
<mask> s.processInternalHosts,
<mask> processInternalIPAddrs,
<mask> processClientID,
<mask> processFilteringBeforeRequest,
<mask> processUpstream,
<mask> processDNSSECAfterResponse,
<mask> processFilterin... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
s.processLocalPTR, | <mask> s.processInternalIPAddrs,
<mask> processClientID,
<mask> processFilteringBeforeRequest,
<mask> processUpstream,
<mask> processDNSSECAfterResponse,
<mask> processFilteringAfterResponse,
<mask> s.ipset.process,
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
// TODO(e.burkov): Restrict the access for external clients.
ip, ok := s.hostToIP(host) | <mask> if host == reqHost {
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> s.tableHostToIPLock.Lock()
<mask> if s.tableHostToIP == nil {
<mask> s.tableHostToIPLock.Unlock()
<mask> return resultCodeSuccess
<mask> }
<mask> ip, ok := s.tableHostToIP[host]
<mask> s.tableHostToIPLock.Unlock(... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
A: ip, | <mask>
<mask> if q.Qtype == dns.TypeA {
<mask> a := &dns.A{
<mask> Hdr: s.hdr(req, dns.TypeA),
<mask> A: make([]byte, len(ip)),
<mask> }
<mask>
<mask> copy(a.A, ip)
<mask> resp.Answer = append(resp.Answer, a)
<mask> }
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-hom... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
<mask> a := &dns.A{
<mask> Hdr: s.hdr(req, dns.TypeA),
<mask> A: make([]byte, len(ip)),
<mask> }
<mask>
<mask> copy(a.A, ip)
<mask> resp.Answer = append(resp.Answer, a)
<mask> }
<mask>
<mask> dctx.proxyCtx.Res = resp
<mask>
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adg... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go | |
// processRestrictLocal responds with empty answers to PTR requests for IP
// addresses in locally-served network from external clients.
func (s *Server) processRestrictLocal(ctx *dnsContext) (rc resultCode) {
d := ctx.proxyCtx
req := d.Req
q := req.Question[0]
if q.Qtype != dns.TypePTR {
// No need for restricti... | <mask>
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> // Respond to PTR requests if the target IP address is leased by our DHCP server
<mask> func processInternalIPAddrs(ctx *dnsContext) (rc resultCode) {
<mask> s := ctx.srv
<mask> req := ctx.proxyCtx.Req
<mask> if req.Question[0].Qtype != dns.Ty... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
ip := aghnet.UnreverseAddr(q.Name) | <mask> if req.Question[0].Qtype != dns.TypePTR {
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> arpa := req.Question[0].Name
<mask> arpa = strings.TrimSuffix(arpa, ".")
<mask> arpa = strings.ToLower(arpa)
<mask> ip := util.DNSUnreverseAddr(arpa)
<mask> if ip == nil {
<mask> return resultCo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
// That's weird.
//
// TODO(e.burkov): Research the cases when it could happen. | <mask> }
<mask>
<mask> ip := aghnet.UnreverseAddr(q.Name)
<mask> if ip == nil {
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> // Restrict an access to local addresses for external clients. We also
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-local-addres... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
defer s.tablePTRLock.Unlock()
| <mask> func (s *Server) ipToHost(ip net.IP) (host string, ok bool) {
<mask> s.tablePTRLock.Lock()
<mask> if s.tablePTR == nil {
<mask> return "", false
<mask> }
<mask>
<mask> host, ok = s.tablePTR[ip.String()]
<mask>
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-loc... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
return "", false
}
host, ok = s.tablePTR[ip.String()]
return host, ok
}
// Respond to PTR requests if the target IP is leased by our DHCP server and the
// requestor is inside the local network.
func (s *Server) processInternalIPAddrs(ctx *dnsContext) (rc resultCode) {
d := ctx.proxyCtx
if d.Res != nil { | <mask> }
<mask>
<mask> s.tablePTRLock.Lock()
<mask> if s.tablePTR == nil {
<mask> s.tablePTRLock.Unlock()
<mask> return resultCodeSuccess
<mask> }
<mask> host, ok := s.tablePTR[ip.String()]
<mask> s.tablePTRLock.Unlock()
<mask> if !ok {
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
ip := ctx.unreversedReqIP
if ip == nil {
return resultCodeSuccess
}
host, ok := s.ipToHost(ip) | <mask> if s.tablePTR == nil {
<mask> s.tablePTRLock.Unlock()
<mask> return resultCodeSuccess
<mask> }
<mask> host, ok := s.tablePTR[ip.String()]
<mask> s.tablePTRLock.Unlock()
<mask> if !ok {
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> log.Debug("dns: reverse-lookup: %s -> %s", arpa,... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
log.Debug("dns: reverse-lookup: %s -> %s", ip, host) | <mask> if !ok {
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> log.Debug("dns: reverse-lookup: %s -> %s", arpa, host)
<mask>
<mask> resp := s.makeResponse(req)
<mask> ptr := &dns.PTR{}
<mask> ptr.Hdr = dns.RR_Header{
<mask> Name: req.Question[0].Name,
</s> Pull request: 2704 local addre... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
req := d.Req | <mask> log.Debug("dns: reverse-lookup: %s -> %s", ip, host)
<mask>
<mask> resp := s.makeResponse(req)
<mask> ptr := &dns.PTR{
<mask> Hdr: dns.RR_Header{
<mask> Name: req.Question[0].Name,
<mask> Rrtype: dns.TypePTR,
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
ptr := &dns.PTR{
Hdr: dns.RR_Header{
Name: req.Question[0].Name,
Rrtype: dns.TypePTR,
Ttl: s.conf.BlockedResponseTTL,
Class: dns.ClassINET,
},
Ptr: dns.Fqdn(host),
} | <mask>
<mask> log.Debug("dns: reverse-lookup: %s -> %s", arpa, host)
<mask>
<mask> resp := s.makeResponse(req)
<mask> ptr := &dns.PTR{}
<mask> ptr.Hdr = dns.RR_Header{
<mask> Name: req.Question[0].Name,
<mask> Rrtype: dns.TypePTR,
<mask> Ttl: s.conf.BlockedResponseTTL,
<mask> Class: dns.Cl... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
d.Res = resp
return resultCodeSuccess
}
// processLocalPTR responds to PTR requests if the target IP is detected to be
// inside the local network and the query was not answered from DHCP.
func (s *Server) processLocalPTR(ctx *dnsContext) (rc resultCode) {
d := ctx.proxyCtx
if d.Res != nil {
return resultCodeSu... | <mask> Class: dns.ClassINET,
<mask> }
<mask> ptr.Ptr = host + "."
<mask> resp.Answer = append(resp.Answer, ptr)
<mask> ctx.proxyCtx.Res = resp
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> // Apply filtering logic
<mask> func processFilteringBeforeRequest(ctx *dnsContext) (rc resultCode) {
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghtest"
"github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" | <mask> "testing"
<mask>
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adgua... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns_test.go |
"github.com/AdguardTeam/dnsproxy/upstream" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask> ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dns_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "runtime"
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask> ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward.go |
ipset ipsetCtx
subnetDetector *aghnet.SubnetDetector
localResolvers aghnet.Exchanger | <mask> // autohostSuffix is the suffix used to detect internal hosts. It must
<mask> // be a valid top-level domain plus dots on each side.
<mask> autohostSuffix string
<mask>
<mask> ipset ipsetCtx
<mask>
<mask> tableHostToIP map[string]net.IP // "hostname -> IP" table for internal addresses (DHCP)
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward.go |
DNSFilter *dnsfilter.DNSFilter
Stats stats.Stats
QueryLog querylog.QueryLog
DHCPServer dhcpd.ServerInterface
SubnetDetector *aghnet.SubnetDetector
LocalResolvers aghnet.Exchanger
AutohostTLD string | <mask> const defaultAutohostSuffix = ".lan."
<mask>
<mask> // DNSCreateParams are parameters to create a new server.
<mask> type DNSCreateParams struct {
<mask> DNSFilter *dnsfilter.DNSFilter
<mask> Stats stats.Stats
<mask> QueryLog querylog.QueryLog
<mask> DHCPServer dhcpd.ServerInterface
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward.go |
subnetDetector: p.SubnetDetector,
localResolvers: p.LocalResolvers, | <mask> s = &Server{
<mask> dnsFilter: p.DNSFilter,
<mask> stats: p.Stats,
<mask> queryLog: p.QueryLog,
<mask> autohostSuffix: autohostSuffix,
<mask> }
<mask>
<mask> if p.DHCPServer != nil {
<mask> s.dhcpServer = p.DHCPServer
</s> Pull request: 2704 local addresses vol.2
Merg... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
</s> Pull request: 2704 lo... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: f,
SubnetDetector: snd,
LocalResolvers: &aghtest.Exchanger{},
}) | <mask> }}
<mask>
<mask> f := dnsfilter.New(filterConf, filters)
<mask>
<mask> s, err := NewServer(DNSCreateParams{DNSFilter: f})
<mask> require.NoError(t, err)
<mask>
<mask> s.conf = forwardConf
<mask>
<mask> err = s.Prepare(nil)
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-h... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: dnsfilter.New(&dnsfilter.Config{}, filters),
SubnetDetector: snd,
LocalResolvers: &aghtest.Exchanger{}, | <mask> ID: 0,
<mask> Data: []byte(rules),
<mask> }}
<mask>
<mask> s, err := NewServer(DNSCreateParams{
<mask> DNSFilter: dnsfilter.New(&dnsfilter.Config{}, filters),
<mask> })
<mask> require.NoError(t, err)
<mask>
<mask> conf := &ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
</s>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
snd, err := aghnet.NewSubnetDetector() | <mask> }},
<mask> }
<mask> f := dnsfilter.New(c, nil)
<mask>
<mask> s, err := NewServer(DNSCreateParams{DNSFilter: f})
<mask> require.NoError(t, err)
<mask>
<mask> err = s.Prepare(&ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
<mask> TCPListenAddrs: []*net.TCPAddr{{}},
</s> Pull reque... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
require.NotNil(t, snd) | <mask>
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask>
<mask> var s *Server
<mask> s, err = NewServer(DNSCreateParams{
<mask> DNSFilter: f,
<mask> SubnetDetector: snd,
<mask> LocalResolvers: &aghtest.Exchanger{},
</s> Pull request: 2704 local addresses vol.... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: f,
SubnetDetector: snd,
LocalResolvers: &aghtest.Exchanger{},
})
require.NoError(t, err)
assert.NoError(t, s.Prepare(&ServerConfig{ | <mask>
<mask> s, err := NewServer(DNSCreateParams{DNSFilter: f})
<mask> require.NoError(t, err)
<mask>
<mask> err = s.Prepare(&ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
<mask> TCPListenAddrs: []*net.TCPAddr{{}},
<mask> FilteringConfig: FilteringConfig{
<mask> ProtectionEnabled: tru... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
})) | <mask> FilteringConfig: FilteringConfig{
<mask> ProtectionEnabled: true,
<mask> UpstreamDNS: []string{"8.8.8.8:53"},
<mask> },
<mask> })
<mask> assert.NoError(t, err)
<mask>
<mask> s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
<mask> &aghtest.TestUpstream{
<mask> CName: map[s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: dnsfilter.New(&dnsfilter.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
LocalResolvers: &aghtest.Exchanger{}, | <mask> }
<mask> func (d *testDHCP) SetOnLeaseChanged(onLeaseChanged dhcpd.OnLeaseChangedT) {}
<mask>
<mask> func TestPTRResponseFromDHCPLeases(t *testing.T) {
<mask> s, err := NewServer(DNSCreateParams{
<mask> DNSFilter: dnsfilter.New(&dnsfilter.Config{}, nil),
<mask> DHCPServer: &testDHCP{},
<mask> })
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
var snd *aghnet.SubnetDetector
snd, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: dnsfilter.New(&c, nil),
SubnetDetector: snd,
LocalResolvers: &aghtest.Exchanger{},
}) | <mask> // Init auto hosts.
<mask> c.AutoHosts.Init(hf.Name())
<mask> t.Cleanup(c.AutoHosts.Close)
<mask>
<mask> s, err := NewServer(DNSCreateParams{DNSFilter: dnsfilter.New(&c, nil)})
<mask> require.NoError(t, err)
<mask>
<mask> s.conf.UDPListenAddrs = []*net.UDPAddr{{}}
<mask> s.conf.TCPListenAddrs =... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/dnsforward_test.go |
// TODO(e.burkov): Consistently use req instead of d.Req since it is
// declared. | <mask> // was filtered.
<mask> func (s *Server) filterDNSRequest(ctx *dnsContext) (*dnsfilter.Result, error) {
<mask> d := ctx.proxyCtx
<mask> req := d.Req
<mask> host := strings.TrimSuffix(req.Question[0].Name, ".")
<mask> res, err := s.dnsFilter.CheckHost(host, d.Req.Question[0].Qtype, ctx.setts)
<mask> i... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/dnsforward/filter.go |
defer clients.lock.Unlock()
| <mask> // AddHost adds a new IP-hostname pairing. The priorities of the sources is
<mask> // taken into account. ok is true if the pairing was added.
<mask> func (clients *clientsContainer) AddHost(ip, host string, src clientSource) (ok bool, err error) {
<mask> clients.lock.Lock()
<mask> ok = clients.addHostL... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/clients.go |
<mask> // taken into account. ok is true if the pairing was added.
<mask> func (clients *clientsContainer) AddHost(ip, host string, src clientSource) (ok bool, err error) {
<mask> clients.lock.Lock()
<mask> ok = clients.addHostLocked(ip, host, src)
<mask> clients.lock.Unlock()
<mask>
<mask> return ok, nil
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/clients.go | |
DNSFilter: Context.dnsFilter,
Stats: Context.stats,
QueryLog: Context.queryLog,
SubnetDetector: Context.subnetDetector,
LocalResolvers: Context.localResolvers,
AutohostTLD: config.DNS.AutohostTLD, | <mask> filterConf.HTTPRegister = httpRegister
<mask> Context.dnsFilter = dnsfilter.New(&filterConf, nil)
<mask>
<mask> p := dnsforward.DNSCreateParams{
<mask> DNSFilter: Context.dnsFilter,
<mask> Stats: Context.stats,
<mask> QueryLog: Context.queryLog,
<mask> AutohostTLD: config.DNS.Autoh... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/dns.go |
Context.rdns = NewRDNS(Context.dnsServer, &Context.clients, Context.subnetDetector, Context.localResolvers) | <mask> closeDNSServer()
<mask> return fmt.Errorf("dnsServer.Prepare: %w", err)
<mask> }
<mask>
<mask> Context.rdns = InitRDNS(Context.dnsServer, &Context.clients)
<mask> Context.whois = initWhois(&Context.clients)
<mask>
<mask> Context.filters.Init()
<mask> return nil
<mask> }
</s> Pull request: 2... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/dns.go |
// This would be quite weird if we get here. | <mask>
<mask> func onDNSRequest(d *proxy.DNSContext) {
<mask> ip := dnsforward.IPFromAddr(d.Addr)
<mask> if ip == nil {
<mask> // This would be quite weird if we get here
<mask> return
<mask> }
<mask>
<mask> if !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
</s> Pull request: 2704 local address... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/dns.go |
if !Context.subnetDetector.IsSpecialNetwork(ip) { | <mask>
<mask> if !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Context.ipDetector.DetectSpecialNetwork(ip) {
<mask> Context.whois.Begin(ip)
<mask> }
<mask> }
<mask>
<mask> func ipsToTCPAddrs(ips []net.IP, port int) (tcpAddrs []*net.TCPAddr) {
</s> Pull request: 2704 local add... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/dns.go |
if !Context.subnetDetector.IsLocallyServedNetwork(ip) { | <mask> Context.queryLog.Start()
<mask>
<mask> const topClientsNumber = 100 // the number of clients to get
<mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) {
<mask> if !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Context.ipDetector.DetectSpecialNetwo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/dns.go |
if !Context.subnetDetector.IsSpecialNetwork(ip) { | <mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) {
<mask> if !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Context.ipDetector.DetectSpecialNetwork(ip) {
<mask> Context.whois.Begin(ip)
<mask> }
<mask> }
<mask>
<mask> return nil
</s> Pull reques... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/dns.go |
subnetDetector *aghnet.SubnetDetector
systemResolvers aghnet.SystemResolvers
localResolvers aghnet.Exchanger | <mask> tls *TLSMod // TLS module
<mask> autoHosts util.AutoHosts // IP-hostname pairs taken from system configuration (e.g. /etc/hosts) files
<mask> updater *updater.Updater
<mask>
<mask> ipDetector *aghnet.IPDetector
<mask>
<mask> // mux is our custom http.ServeMux.
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/home.go |
Context.subnetDetector, err = aghnet.NewSubnetDetector() | <mask> if Context.web == nil {
<mask> log.Fatalf("Can't initialize Web module")
<mask> }
<mask>
<mask> Context.ipDetector, err = aghnet.NewIPDetector()
<mask> if err != nil {
<mask> log.Fatal(err)
<mask> }
<mask>
<mask> if !Context.firstRun {
</s> Pull request: 2704 local addresses vol.2
Merge i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/home.go |
setupResolvers()
| <mask> if err != nil {
<mask> log.Fatal(err)
<mask> }
<mask>
<mask> if !Context.firstRun {
<mask> err = initDNSServer()
<mask> if err != nil {
<mask> log.Fatalf("%s", err)
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master
Updates #2... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/home.go |
"fmt" | <mask>
<mask> import (
<mask> "encoding/binary"
<mask> "net"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master
Updates #2704.
Updates #2829.... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
"github.com/AdguardTeam/AdGuardHome/internal/agherr"
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home fr... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
// RDNS resolves clients' addresses to enrich their metadata. | <mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // RDNS - module context
<mask> type RDNS struct {
<mask> dnsServer *dnsforward.Server
<mask> clients *clientsContainer
<mask> ipChannel chan net.IP // pass data from DNS request handling thread to rDNS thre... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
dnsServer *dnsforward.Server
clients *clientsContainer
subnetDetector *aghnet.SubnetDetector
localResolvers aghnet.Exchanger
// ipCh used to pass client's IP to rDNS workerLoop.
ipCh chan net.IP
// ipCache caches the IP addresses to be resolved by rDNS. The resolved
// address stays here while it... | <mask> )
<mask>
<mask> // RDNS - module context
<mask> type RDNS struct {
<mask> dnsServer *dnsforward.Server
<mask> clients *clientsContainer
<mask> ipChannel chan net.IP // pass data from DNS request handling thread to rDNS thread
<mask>
<mask> // Contains IP addresses of clients to be resolved by rD... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
// Default rDNS values.
const (
defaultRDNSCacheSize = 10000
defaultRDNSCacheTTL = 1 * 60 * 60
defaultRDNSIPChSize = 256
)
// NewRDNS creates and returns initialized RDNS.
func NewRDNS(
dnsServer *dnsforward.Server,
clients *clientsContainer,
snd *aghnet.SubnetDetector,
lr aghnet.Exchanger,
) (rDNS *RDNS) {
... | <mask> // If IP address couldn't be resolved, it stays here for some time to prevent further attempts to resolve the same IP.
<mask> ipAddrs cache.Cache
<mask> }
<mask>
<mask> // InitRDNS - create module context
<mask> func InitRDNS(dnsServer *dnsforward.Server, clients *clientsContainer) *RDNS {
<mask> r :=... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
MaxCount: defaultRDNSCacheSize, | <mask> dnsServer: dnsServer,
<mask> clients: clients,
<mask> ipAddrs: cache.New(cache.Config{
<mask> EnableLRU: true,
<mask> MaxCount: 10000,
<mask> }),
<mask> ipChannel: make(chan net.IP, 256),
<mask> }
<mask>
<mask> go r.workerLoop()
</s> Pull request: 2704 local addresses vol.2
Merg... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
ipCh: make(chan net.IP, defaultRDNSIPChSize), | <mask> ipAddrs: cache.New(cache.Config{
<mask> EnableLRU: true,
<mask> MaxCount: 10000,
<mask> }),
<mask> ipChannel: make(chan net.IP, 256),
<mask> }
<mask>
<mask> go r.workerLoop()
<mask> return r
<mask> }
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-lo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
go rDNS.workerLoop()
return rDNS | <mask> }),
<mask> ipChannel: make(chan net.IP, 256),
<mask> }
<mask>
<mask> go r.workerLoop()
<mask> return r
<mask> }
<mask>
<mask> // Begin - add IP address to rDNS queue
<mask> func (r *RDNS) Begin(ip net.IP) {
<mask> now := uint64(time.Now().Unix())
</s> Pull request: 2704 local addresses vol.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
// Begin adds the ip to the resolving queue if it is not cached or already
// resolved. | <mask> go r.workerLoop()
<mask> return r
<mask> }
<mask>
<mask> // Begin - add IP address to rDNS queue
<mask> func (r *RDNS) Begin(ip net.IP) {
<mask> now := uint64(time.Now().Unix())
<mask> expire := r.ipAddrs.Get(ip)
<mask> if len(expire) != 0 {
<mask> exp := binary.BigEndian.Uint64(expire)
</s> P... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
if expire := r.ipCache.Get(ip); len(expire) != 0 {
if binary.BigEndian.Uint64(expire) > now { | <mask>
<mask> // Begin - add IP address to rDNS queue
<mask> func (r *RDNS) Begin(ip net.IP) {
<mask> now := uint64(time.Now().Unix())
<mask> expire := r.ipAddrs.Get(ip)
<mask> if len(expire) != 0 {
<mask> exp := binary.BigEndian.Uint64(expire)
<mask> if exp > now {
<mask> return
<mask> }
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
<mask> exp := binary.BigEndian.Uint64(expire)
<mask> if exp > now {
<mask> return
<mask> }
<mask> // TTL expired
<mask> }
<mask> expire = make([]byte, 8)
<mask> const ttl = 1 * 60 * 60
<mask> binary.BigEndian.PutUint64(expire, now+ttl)
<mask> _ = r.ipAddrs.Set(ip, expire)
</s> Pull request: 2... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go | |
// The cache entry either expired or doesn't exist.
ttl := make([]byte, 8)
binary.BigEndian.PutUint64(ttl, now+defaultRDNSCacheTTL)
r.ipCache.Set(ip, ttl) | <mask> return
<mask> }
<mask> // TTL expired
<mask> }
<mask> expire = make([]byte, 8)
<mask> const ttl = 1 * 60 * 60
<mask> binary.BigEndian.PutUint64(expire, now+ttl)
<mask> _ = r.ipAddrs.Set(ip, expire)
<mask>
<mask> id := ip.String()
<mask> if r.clients.Exists(id, ClientSourceRDNS) {
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
<mask> if r.clients.Exists(id, ClientSourceRDNS) {
<mask> return
<mask> }
<mask>
<mask> log.Tracef("rDNS: adding %s", ip)
<mask> select {
<mask> case r.ipChannel <- ip:
<mask> //
<mask> default:
<mask> log.Tracef("rDNS: queue is full")
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go | |
case r.ipCh <- ip:
log.Tracef("rdns: %q added to queue", ip) | <mask> }
<mask>
<mask> log.Tracef("rDNS: adding %s", ip)
<mask> select {
<mask> case r.ipChannel <- ip:
<mask> //
<mask> default:
<mask> log.Tracef("rDNS: queue is full")
<mask> }
<mask> }
<mask>
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-local-addresses-v... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
log.Tracef("rdns: queue is full") | <mask> select {
<mask> case r.ipChannel <- ip:
<mask> //
<mask> default:
<mask> log.Tracef("rDNS: queue is full")
<mask> }
<mask> }
<mask>
<mask> // Use rDNS to get hostname by IP address
<mask> func (r *RDNS) resolve(ip net.IP) string {
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/ad... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
const (
// rDNSEmptyAnswerErr is returned by RDNS resolve method when the answer
// section of respond is empty.
rDNSEmptyAnswerErr agherr.Error = "the answer section is empty" | <mask> log.Tracef("rDNS: queue is full")
<mask> }
<mask> }
<mask>
<mask> // Use rDNS to get hostname by IP address
<mask> func (r *RDNS) resolve(ip net.IP) string {
<mask> log.Tracef("Resolving host for %s", ip)
<mask>
<mask> name, err := dns.ReverseAddr(ip.String())
<mask> if err != nil {
<mask> l... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
// rDNSNotPTRErr is returned by RDNS resolve method when the response is
// not of PTR type.
rDNSNotPTRErr agherr.Error = "the response is not a ptr"
)
// resolve tries to resolve the ip in a suitable way.
func (r *RDNS) resolve(ip net.IP) (host string, err error) {
log.Tracef("rdns: resolving host for %q", ip) | <mask> // Use rDNS to get hostname by IP address
<mask> func (r *RDNS) resolve(ip net.IP) string {
<mask> log.Tracef("Resolving host for %s", ip)
<mask>
<mask> name, err := dns.ReverseAddr(ip.String())
<mask> if err != nil {
<mask> log.Debug("Error while calling dns.ReverseAddr(%s): %s", ip, err)
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
arpa := dns.Fqdn(aghnet.ReverseAddr(ip))
msg := &dns.Msg{ | <mask> log.Debug("Error while calling dns.ReverseAddr(%s): %s", ip, err)
<mask> return ""
<mask> }
<mask>
<mask> resp, err := r.dnsServer.Exchange(&dns.Msg{
<mask> MsgHdr: dns.MsgHdr{
<mask> Id: dns.Id(),
<mask> RecursionDesired: true,
<mask> },
<mask> Question: []dns.Question... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
Compress: true, | <mask> Id: dns.Id(),
<mask> RecursionDesired: true,
<mask> },
<mask> Question: []dns.Question{{
<mask> Name: arpa,
<mask> Qtype: dns.TypePTR,
<mask> Qclass: dns.ClassINET,
<mask> }},
</s> Pull request: 2704 local addresses vol.2
Merge in DNS/adguard-home from 2704-local-a... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb | internal/home/rdns.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.