docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
require.NoError(t, err)
<mask> require.Nil(t, err) <mask> <mask> assert.True(t, s.process(msg, req, resp)) <mask> }) <mask> require.Nil(t, err) <mask> <mask> t.Run("reply", func(t *testing.T) { <mask> require.Equal(t, dhcpv6.MessageTypeReply, resp.Type()) <mask> oia = resp.Options.OneIANA() <mask> oiaAddr = oia.Option...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dhcpd/v6_test.go
func (d *testDHCP) Leases(flags dhcpd.GetLeasesFlags) (leases []*dhcpd.Lease) { return []*dhcpd.Lease{{
<mask> type testDHCP struct{} <mask> <mask> func (d *testDHCP) Enabled() (ok bool) { return true } <mask> <mask> func (d *testDHCP) Leases(flags int) []dhcpd.Lease { <mask> l := dhcpd.Lease{ <mask> IP: net.IP{192, 168, 12, 34}, <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}, ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dnsforward/dnsforward_test.go
}}
<mask> l := dhcpd.Lease{ <mask> IP: net.IP{192, 168, 12, 34}, <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}, <mask> Hostname: "myhost", <mask> } <mask> <mask> return []dhcpd.Lease{l} <mask> } <mask> func (d *testDHCP) SetOnLeaseChanged(onLeaseChanged dhcpd.OnLeaseChanged...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/dnsforward/dnsforward_test.go
var err error
<mask> <mask> t.Run("complicated", func(t *testing.T) { <mask> testIP := net.IP{1, 2, 3, 4} <mask> <mask> // First, init a DHCP server with a single static lease. <mask> config := dhcpd.ServerConfig{ <mask> Enabled: true, </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashed com...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/home/clients_test.go
clients.dhcpServer, err = dhcpd.Create(config) require.NoError(t, err)
<mask> RangeEnd: net.IP{1, 2, 3, 10}, <mask> }, <mask> } <mask> <mask> clients.dhcpServer = dhcpd.Create(config) <mask> t.Cleanup(func() { _ = os.Remove("leases.db") }) <mask> <mask> err := clients.dhcpServer.AddStaticLease(dhcpd.Lease{ <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/home/clients_test.go
err = clients.dhcpServer.AddStaticLease(&dhcpd.Lease{
<mask> <mask> clients.dhcpServer = dhcpd.Create(config) <mask> t.Cleanup(func() { _ = os.Remove("leases.db") }) <mask> <mask> err := clients.dhcpServer.AddStaticLease(dhcpd.Lease{ <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}, <mask> IP: testIP, <mask> Hostname: "t...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/home/clients_test.go
Context.dhcpServer, err = dhcpd.Create(config.DHCP) if Context.dhcpServer == nil || err != nil {
<mask> config.DHCP.WorkDir = Context.workDir <mask> config.DHCP.HTTPRegister = httpRegister <mask> config.DHCP.ConfigModified = onConfigModified <mask> <mask> Context.dhcpServer = dhcpd.Create(config.DHCP) <mask> if Context.dhcpServer == nil { <mask> // TODO(a.garipov): There are a lot of places in the c...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/home/home.go
log.Info("stopping AdGuard Home")
<mask> } <mask> <mask> // cleanup stops and resets all the modules. <mask> func cleanup(ctx context.Context) { <mask> log.Info("Stopping AdGuard Home") <mask> <mask> if Context.web != nil { <mask> Context.web.Close(ctx) <mask> Context.web = nil <mask> } </s> Pull request: dhcpd: add purge, imp code ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/home/home.go
log.Error("stopping dns server: %s", err)
<mask> } <mask> <mask> err := stopDNSServer() <mask> if err != nil { <mask> log.Error("Couldn't stop DNS server: %s", err) <mask> } <mask> <mask> if Context.dhcpServer != nil { <mask> Context.dhcpServer.Stop() <mask> } </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashed commit...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/home/home.go
err = Context.dhcpServer.Stop() if err != nil { log.Error("stopping dhcp server: %s", err) }
<mask> log.Error("Couldn't stop DNS server: %s", err) <mask> } <mask> <mask> if Context.dhcpServer != nil { <mask> Context.dhcpServer.Stop() <mask> } <mask> <mask> Context.etcHosts.Close() <mask> <mask> if Context.tls != nil { </s> Pull request: dhcpd: add purge, imp code Updates #1691. Squashe...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
internal/home/home.go
'/dhcp/reset_leases': 'post': 'tags': - 'dhcp' 'operationId': 'dhcpResetLeases' 'summary': 'Reset DHCP leases' 'responses': '200': 'description': 'OK.' '501': 'content': 'application/json': 'schema': '$ref'...
<mask> 'application/json': <mask> 'schema': <mask> '$ref': '#/components/schemas/Error' <mask> 'description': 'Not implemented (for example, on Windows).' <mask> '/filtering/status': <mask> 'get': <mask> 'tags': <mask> - 'filtering' </s> Pul...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/84e71e912e9f8808b396f171cc97b0a0d6f43814
openapi/openapi.yaml
err = ioutil.WriteFile(configfile+".tmp", yamlText, 0644)
<mask> if err != nil { <mask> log.Printf("Couldn't generate YAML file: %s", err) <mask> return err <mask> } <mask> err = ioutil.WriteFile(configfile, yamlText, 0644) <mask> if err != nil { <mask> log.Printf("Couldn't write YAML config: %s", err) <mask> return err <mask> } <mask> return nil </s>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09
config.go
err = os.Rename(configfile+".tmp", configfile) if err != nil { log.Printf("Couldn't rename YAML config: %s", err) return err }
<mask> if err != nil { <mask> log.Printf("Couldn't write YAML config: %s", err) <mask> return err <mask> } <mask> return nil <mask> } <mask> <mask> // -------------- <mask> // coredns config <mask> // -------------- </s> Be more atomic during writing of files -- this prevents other processes from see...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09
config.go
err = ioutil.WriteFile(corefile+".tmp", []byte(configtext), 0644)
<mask> if err != nil { <mask> log.Printf("Couldn't generate DNS config: %s", err) <mask> return err <mask> } <mask> err = ioutil.WriteFile(corefile, []byte(configtext), 0644) <mask> if err != nil { <mask> log.Printf("Couldn't write DNS config: %s", err) <mask> } <mask> return err <mask> } </s> Be...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09
config.go
err = os.Rename(corefile+".tmp", corefile) if err != nil { log.Printf("Couldn't rename DNS config: %s", err) }
<mask> err = ioutil.WriteFile(corefile+".tmp", []byte(configtext), 0644) <mask> if err != nil { <mask> log.Printf("Couldn't write DNS config: %s", err) <mask> } <mask> return err <mask> } <mask> <mask> func writeAllConfigs() error { </s> Be more atomic during writing of files -- this prevents other proc...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09
config.go
err := ioutil.WriteFile(filterpath+".tmp", data, 0644)
<mask> for _, rule := range config.UserRules { <mask> data = append(data, []byte(rule)...) <mask> data = append(data, '\n') <mask> } <mask> err := ioutil.WriteFile(filterpath, data, 0644) <mask> if err != nil { <mask> log.Printf("Couldn't write filter file: %s", err) <mask> return err <mask> } <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09
control.go
err = os.Rename(filterpath+".tmp", filterpath) if err != nil { log.Printf("Couldn't rename filter file: %s", err) return err }
<mask> return err <mask> } <mask> return nil <mask> } <mask> <mask> // ------------ <mask> // safebrowsing <mask> // ------------ </s> Be more atomic during writing of files -- this prevents other processes from seeing empty or impartial files </s> remove err = ioutil.WriteFile(configfile, yamlText, 0644...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/859f1590dd25c633358bcc4182a0df66d7c35b09
control.go
<mask> netInterface: (*netInterface)(iface), <mask> }) <mask> } <mask> <mask> // GetValidNetInterfaces returns interfaces that are eligible for DNS and/or DHCP <mask> // invalid interface is a ppp interface or the one that doesn't allow broadcasts <mask> func GetValidNetInterfaces() ([]net.Interface, error) ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/net.go
ifaces, err := net.Interfaces()
<mask> <mask> // GetValidNetInterfacesForWeb returns interfaces that are eligible for DNS and WEB only <mask> // we do not return link-local addresses here <mask> func GetValidNetInterfacesForWeb() ([]*NetInterface, error) { <mask> ifaces, err := GetValidNetInterfaces() <mask> if err != nil { <mask> return ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/net.go
// getCurrentHardwarePortInfo gets information for the specified network interface.
<mask> <mask> return portInfo.static, nil <mask> } <mask> <mask> // getCurrentHardwarePortInfo gets information the specified network interface. <mask> func getCurrentHardwarePortInfo(ifaceName string) (hardwarePortInfo, error) { <mask> // First of all we should find hardware port name <mask> m := getNetwo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/net_darwin.go
"net"
<mask> <mask> import ( <mask> "testing" <mask> <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) <mask> </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master Updates #2704. Updates #2829. Squash...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/net_test.go
"github.com/stretchr/testify/assert"
<mask> "testing" <mask> <mask> "github.com/stretchr/testify/require" <mask> ) <mask> <mask> func TestGetValidNetInterfacesForWeb(t *testing.T) { </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master Updates #2704. Updates #2829. Squashed commit o...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/net_test.go
// refresh refreshes the local resolvers' addresses cache. It should be
<mask> type SystemResolvers interface { <mask> // Get returns the slice of local resolvers' addresses. <mask> // It should be safe for concurrent use. <mask> Get() (rs []string) <mask> // Refresh refreshes the local resolvers' addresses cache. It should be <mask> // safe for concurrent use. <mask> Refresh...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/systemresolvers.go
refresh() (err error)
<mask> // It should be safe for concurrent use. <mask> Get() (rs []string) <mask> // Refresh refreshes the local resolvers' addresses cache. It should be <mask> // safe for concurrent use. <mask> Refresh() (err error) <mask> } <mask> <mask> const ( <mask> // fakeDialErr is an error which dialFunc is ex...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/systemresolvers.go
err := sr.refresh()
<mask> defer agherr.LogPanic("systemResolvers") <mask> <mask> // TODO(e.burkov): Implement a functionality to stop ticker. <mask> for range tickCh { <mask> err := sr.Refresh() <mask> if err != nil { <mask> log.Error("systemResolvers: error in refreshing goroutine: %s", err) <mask> <mask> continu...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/systemresolvers.go
err = sr.refresh()
<mask> ) (sr SystemResolvers, err error) { <mask> sr = newSystemResolvers(refreshIvl, hostGenFunc) <mask> <mask> // Fill cache. <mask> err = sr.Refresh() <mask> if err != nil { <mask> return nil, err <mask> } <mask> <mask> if refreshIvl > 0 { </s> Pull request: 2704 local addresses vol.2 Merge in ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/systemresolvers.go
func (sr *systemResolvers) refresh() (err error) {
<mask> addrs map[string]unit <mask> addrsLock sync.RWMutex <mask> } <mask> <mask> func (sr *systemResolvers) Refresh() (err error) { <mask> defer agherr.Annotate("systemResolvers: %w", &err) <mask> <mask> _, err = sr.resolver.LookupHost(context.Background(), sr.hostGenFunc()) <mask> dnserr := &net.D...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/systemresolvers_others.go
sr.addrs[host] = unit{}
<mask> <mask> sr.addrsLock.Lock() <mask> defer sr.addrsLock.Unlock() <mask> <mask> sr.addrs[address] = unit{} <mask> <mask> return nil, fakeDialErr <mask> } <mask> <mask> func (sr *systemResolvers) Get() (rs []string) { </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 270...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/systemresolvers_others.go
assert.NoError(t, sr.refresh())
<mask> func TestSystemResolvers_Refresh(t *testing.T) { <mask> t.Run("expected_error", func(t *testing.T) { <mask> sr := createTestSystemResolvers(t, 0, nil) <mask> <mask> assert.NoError(t, sr.Refresh()) <mask> }) <mask> <mask> t.Run("unexpected_error", func(t *testing.T) { <mask> _, err := NewSyste...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/systemresolvers_others_test.go
func (sr *systemResolvers) refresh() (err error) {
<mask> <mask> return addrs, nil <mask> } <mask> <mask> func (sr *systemResolvers) Refresh() (err error) { <mask> defer agherr.Annotate("systemResolvers: %w", &err) <mask> <mask> got, err := sr.getAddrs() <mask> if err != nil { <mask> return fmt.Errorf("can't get addresses: %w", err) </s> Pull reques...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghnet/systemresolvers_windows.go
<mask> <mask> import ( <mask> "crypto/sha256" <mask> "encoding/hex" <mask> "errors" <mask> "fmt" <mask> "net" <mask> "strings" <mask> "sync" <mask> </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master Updates #2704. Updates #2829. Squas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghtest/upstream.go
Name: n,
<mask> <mask> for _, n := range names { <mask> resp.Answer = append(resp.Answer, &dns.PTR{ <mask> Hdr: dns.RR_Header{ <mask> Name: name, <mask> Rrtype: rrType, <mask> }, <mask> Ptr: n, <mask> }) <mask> } </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-ho...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghtest/upstream.go
type TestErrUpstream struct { // The error returned by Exchange may be unwraped to the Err. Err error }
<mask> } <mask> <mask> // TestErrUpstream implements upstream.Upstream interface for replacing real <mask> // upstream in tests. <mask> type TestErrUpstream struct{} <mask> <mask> // Exchange always returns nil Msg and non-nil error. <mask> func (u *TestErrUpstream) Exchange(*dns.Msg) (*dns.Msg, error) { <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghtest/upstream.go
return nil, fmt.Errorf("errupstream: %w", u.Err)
<mask> func (u *TestErrUpstream) Exchange(*dns.Msg) (*dns.Msg, error) { <mask> // We don't use an agherr.Error to avoid the import cycle since aghtests <mask> // used to provide the utilities for testing which agherr (and any other <mask> // testable package) should be able to use. <mask> return nil, errors.Ne...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/aghtest/upstream.go
ifaces, err := net.Interfaces()
<mask> <mask> func (s *Server) handleDHCPInterfaces(w http.ResponseWriter, r *http.Request) { <mask> response := map[string]netInterfaceJSON{} <mask> <mask> ifaces, err := aghnet.GetValidNetInterfaces() <mask> if err != nil { <mask> httpError(r, w, http.StatusInternalServerError, "Couldn't get interfaces:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dhcpd/http.go
"errors"
<mask> package dnsforward <mask> <mask> import ( <mask> "net" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-l...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/miekg/dns" </s> Pull request: 2704...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
<mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/golibs/log" <mask> "githu...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
// unreversedReqIP stores an IP address obtained from PTR request if it // was successfully parsed. unreversedReqIP net.IP
<mask> // response is modified by filters. <mask> origResp *dns.Msg <mask> // err is the error returned from a processing function. <mask> err error <mask> // clientID is the clientID from DOH, DOQ, or DOT, if provided. <mask> clientID string </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adgu...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
s.processRestrictLocal, s.processInternalIPAddrs,
<mask> // appropriate handler. <mask> mods := []modProcessFunc{ <mask> processInitial, <mask> s.processInternalHosts, <mask> processInternalIPAddrs, <mask> processClientID, <mask> processFilteringBeforeRequest, <mask> processUpstream, <mask> processDNSSECAfterResponse, <mask> processFilterin...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
s.processLocalPTR,
<mask> s.processInternalIPAddrs, <mask> processClientID, <mask> processFilteringBeforeRequest, <mask> processUpstream, <mask> processDNSSECAfterResponse, <mask> processFilteringAfterResponse, <mask> s.ipset.process, </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
// TODO(e.burkov): Restrict the access for external clients. ip, ok := s.hostToIP(host)
<mask> if host == reqHost { <mask> return resultCodeSuccess <mask> } <mask> <mask> s.tableHostToIPLock.Lock() <mask> if s.tableHostToIP == nil { <mask> s.tableHostToIPLock.Unlock() <mask> return resultCodeSuccess <mask> } <mask> ip, ok := s.tableHostToIP[host] <mask> s.tableHostToIPLock.Unlock(...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
A: ip,
<mask> <mask> if q.Qtype == dns.TypeA { <mask> a := &dns.A{ <mask> Hdr: s.hdr(req, dns.TypeA), <mask> A: make([]byte, len(ip)), <mask> } <mask> <mask> copy(a.A, ip) <mask> resp.Answer = append(resp.Answer, a) <mask> } </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-hom...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
<mask> a := &dns.A{ <mask> Hdr: s.hdr(req, dns.TypeA), <mask> A: make([]byte, len(ip)), <mask> } <mask> <mask> copy(a.A, ip) <mask> resp.Answer = append(resp.Answer, a) <mask> } <mask> <mask> dctx.proxyCtx.Res = resp <mask> </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adg...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
// processRestrictLocal responds with empty answers to PTR requests for IP // addresses in locally-served network from external clients. func (s *Server) processRestrictLocal(ctx *dnsContext) (rc resultCode) { d := ctx.proxyCtx req := d.Req q := req.Question[0] if q.Qtype != dns.TypePTR { // No need for restricti...
<mask> <mask> return resultCodeSuccess <mask> } <mask> <mask> // Respond to PTR requests if the target IP address is leased by our DHCP server <mask> func processInternalIPAddrs(ctx *dnsContext) (rc resultCode) { <mask> s := ctx.srv <mask> req := ctx.proxyCtx.Req <mask> if req.Question[0].Qtype != dns.Ty...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
ip := aghnet.UnreverseAddr(q.Name)
<mask> if req.Question[0].Qtype != dns.TypePTR { <mask> return resultCodeSuccess <mask> } <mask> <mask> arpa := req.Question[0].Name <mask> arpa = strings.TrimSuffix(arpa, ".") <mask> arpa = strings.ToLower(arpa) <mask> ip := util.DNSUnreverseAddr(arpa) <mask> if ip == nil { <mask> return resultCo...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
// That's weird. // // TODO(e.burkov): Research the cases when it could happen.
<mask> } <mask> <mask> ip := aghnet.UnreverseAddr(q.Name) <mask> if ip == nil { <mask> return resultCodeSuccess <mask> } <mask> <mask> // Restrict an access to local addresses for external clients. We also </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-local-addres...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
defer s.tablePTRLock.Unlock()
<mask> func (s *Server) ipToHost(ip net.IP) (host string, ok bool) { <mask> s.tablePTRLock.Lock() <mask> if s.tablePTR == nil { <mask> return "", false <mask> } <mask> <mask> host, ok = s.tablePTR[ip.String()] <mask> </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-loc...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
return "", false } host, ok = s.tablePTR[ip.String()] return host, ok } // Respond to PTR requests if the target IP is leased by our DHCP server and the // requestor is inside the local network. func (s *Server) processInternalIPAddrs(ctx *dnsContext) (rc resultCode) { d := ctx.proxyCtx if d.Res != nil {
<mask> } <mask> <mask> s.tablePTRLock.Lock() <mask> if s.tablePTR == nil { <mask> s.tablePTRLock.Unlock() <mask> return resultCodeSuccess <mask> } <mask> host, ok := s.tablePTR[ip.String()] <mask> s.tablePTRLock.Unlock() <mask> if !ok { </s> Pull request: 2704 local addresses vol.2 Merge in DNS/...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
ip := ctx.unreversedReqIP if ip == nil { return resultCodeSuccess } host, ok := s.ipToHost(ip)
<mask> if s.tablePTR == nil { <mask> s.tablePTRLock.Unlock() <mask> return resultCodeSuccess <mask> } <mask> host, ok := s.tablePTR[ip.String()] <mask> s.tablePTRLock.Unlock() <mask> if !ok { <mask> return resultCodeSuccess <mask> } <mask> <mask> log.Debug("dns: reverse-lookup: %s -> %s", arpa,...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
log.Debug("dns: reverse-lookup: %s -> %s", ip, host)
<mask> if !ok { <mask> return resultCodeSuccess <mask> } <mask> <mask> log.Debug("dns: reverse-lookup: %s -> %s", arpa, host) <mask> <mask> resp := s.makeResponse(req) <mask> ptr := &dns.PTR{} <mask> ptr.Hdr = dns.RR_Header{ <mask> Name: req.Question[0].Name, </s> Pull request: 2704 local addre...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
req := d.Req
<mask> log.Debug("dns: reverse-lookup: %s -> %s", ip, host) <mask> <mask> resp := s.makeResponse(req) <mask> ptr := &dns.PTR{ <mask> Hdr: dns.RR_Header{ <mask> Name: req.Question[0].Name, <mask> Rrtype: dns.TypePTR, </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
ptr := &dns.PTR{ Hdr: dns.RR_Header{ Name: req.Question[0].Name, Rrtype: dns.TypePTR, Ttl: s.conf.BlockedResponseTTL, Class: dns.ClassINET, }, Ptr: dns.Fqdn(host), }
<mask> <mask> log.Debug("dns: reverse-lookup: %s -> %s", arpa, host) <mask> <mask> resp := s.makeResponse(req) <mask> ptr := &dns.PTR{} <mask> ptr.Hdr = dns.RR_Header{ <mask> Name: req.Question[0].Name, <mask> Rrtype: dns.TypePTR, <mask> Ttl: s.conf.BlockedResponseTTL, <mask> Class: dns.Cl...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
d.Res = resp return resultCodeSuccess } // processLocalPTR responds to PTR requests if the target IP is detected to be // inside the local network and the query was not answered from DHCP. func (s *Server) processLocalPTR(ctx *dnsContext) (rc resultCode) { d := ctx.proxyCtx if d.Res != nil { return resultCodeSu...
<mask> Class: dns.ClassINET, <mask> } <mask> ptr.Ptr = host + "." <mask> resp.Answer = append(resp.Answer, ptr) <mask> ctx.proxyCtx.Res = resp <mask> return resultCodeSuccess <mask> } <mask> <mask> // Apply filtering logic <mask> func processFilteringBeforeRequest(ctx *dnsContext) (rc resultCode) { ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns.go
"github.com/AdguardTeam/AdGuardHome/internal/aghtest" "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "testing" <mask> <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adgua...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns_test.go
"github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) <mask> ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dns_test.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "runtime" <mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog" <mask> "github.com/AdguardTeam/AdGuardHome/internal/stats" <mask> ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward.go
ipset ipsetCtx subnetDetector *aghnet.SubnetDetector localResolvers aghnet.Exchanger
<mask> // autohostSuffix is the suffix used to detect internal hosts. It must <mask> // be a valid top-level domain plus dots on each side. <mask> autohostSuffix string <mask> <mask> ipset ipsetCtx <mask> <mask> tableHostToIP map[string]net.IP // "hostname -> IP" table for internal addresses (DHCP) ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward.go
DNSFilter *dnsfilter.DNSFilter Stats stats.Stats QueryLog querylog.QueryLog DHCPServer dhcpd.ServerInterface SubnetDetector *aghnet.SubnetDetector LocalResolvers aghnet.Exchanger AutohostTLD string
<mask> const defaultAutohostSuffix = ".lan." <mask> <mask> // DNSCreateParams are parameters to create a new server. <mask> type DNSCreateParams struct { <mask> DNSFilter *dnsfilter.DNSFilter <mask> Stats stats.Stats <mask> QueryLog querylog.QueryLog <mask> DHCPServer dhcpd.ServerInterface <ma...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward.go
subnetDetector: p.SubnetDetector, localResolvers: p.LocalResolvers,
<mask> s = &Server{ <mask> dnsFilter: p.DNSFilter, <mask> stats: p.Stats, <mask> queryLog: p.QueryLog, <mask> autohostSuffix: autohostSuffix, <mask> } <mask> <mask> if p.DHCPServer != nil { <mask> s.dhcpServer = p.DHCPServer </s> Pull request: 2704 local addresses vol.2 Merg...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "testing" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" </s> Pull request: 2704 lo...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
snd, err := aghnet.NewSubnetDetector() require.NoError(t, err) require.NotNil(t, snd) var s *Server s, err = NewServer(DNSCreateParams{ DNSFilter: f, SubnetDetector: snd, LocalResolvers: &aghtest.Exchanger{}, })
<mask> }} <mask> <mask> f := dnsfilter.New(filterConf, filters) <mask> <mask> s, err := NewServer(DNSCreateParams{DNSFilter: f}) <mask> require.NoError(t, err) <mask> <mask> s.conf = forwardConf <mask> <mask> err = s.Prepare(nil) </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-h...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
snd, err := aghnet.NewSubnetDetector() require.NoError(t, err) require.NotNil(t, snd) var s *Server s, err = NewServer(DNSCreateParams{ DNSFilter: dnsfilter.New(&dnsfilter.Config{}, filters), SubnetDetector: snd, LocalResolvers: &aghtest.Exchanger{},
<mask> ID: 0, <mask> Data: []byte(rules), <mask> }} <mask> <mask> s, err := NewServer(DNSCreateParams{ <mask> DNSFilter: dnsfilter.New(&dnsfilter.Config{}, filters), <mask> }) <mask> require.NoError(t, err) <mask> <mask> conf := &ServerConfig{ <mask> UDPListenAddrs: []*net.UDPAddr{{}}, </s>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
snd, err := aghnet.NewSubnetDetector()
<mask> }}, <mask> } <mask> f := dnsfilter.New(c, nil) <mask> <mask> s, err := NewServer(DNSCreateParams{DNSFilter: f}) <mask> require.NoError(t, err) <mask> <mask> err = s.Prepare(&ServerConfig{ <mask> UDPListenAddrs: []*net.UDPAddr{{}}, <mask> TCPListenAddrs: []*net.TCPAddr{{}}, </s> Pull reque...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
require.NotNil(t, snd)
<mask> <mask> snd, err := aghnet.NewSubnetDetector() <mask> require.NoError(t, err) <mask> <mask> var s *Server <mask> s, err = NewServer(DNSCreateParams{ <mask> DNSFilter: f, <mask> SubnetDetector: snd, <mask> LocalResolvers: &aghtest.Exchanger{}, </s> Pull request: 2704 local addresses vol....
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
var s *Server s, err = NewServer(DNSCreateParams{ DNSFilter: f, SubnetDetector: snd, LocalResolvers: &aghtest.Exchanger{}, }) require.NoError(t, err) assert.NoError(t, s.Prepare(&ServerConfig{
<mask> <mask> s, err := NewServer(DNSCreateParams{DNSFilter: f}) <mask> require.NoError(t, err) <mask> <mask> err = s.Prepare(&ServerConfig{ <mask> UDPListenAddrs: []*net.UDPAddr{{}}, <mask> TCPListenAddrs: []*net.TCPAddr{{}}, <mask> FilteringConfig: FilteringConfig{ <mask> ProtectionEnabled: tru...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
}))
<mask> FilteringConfig: FilteringConfig{ <mask> ProtectionEnabled: true, <mask> UpstreamDNS: []string{"8.8.8.8:53"}, <mask> }, <mask> }) <mask> assert.NoError(t, err) <mask> <mask> s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{ <mask> &aghtest.TestUpstream{ <mask> CName: map[s...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
snd, err := aghnet.NewSubnetDetector() require.NoError(t, err) require.NotNil(t, snd) var s *Server s, err = NewServer(DNSCreateParams{ DNSFilter: dnsfilter.New(&dnsfilter.Config{}, nil), DHCPServer: &testDHCP{}, SubnetDetector: snd, LocalResolvers: &aghtest.Exchanger{},
<mask> } <mask> func (d *testDHCP) SetOnLeaseChanged(onLeaseChanged dhcpd.OnLeaseChangedT) {} <mask> <mask> func TestPTRResponseFromDHCPLeases(t *testing.T) { <mask> s, err := NewServer(DNSCreateParams{ <mask> DNSFilter: dnsfilter.New(&dnsfilter.Config{}, nil), <mask> DHCPServer: &testDHCP{}, <mask> }) ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
var snd *aghnet.SubnetDetector snd, err = aghnet.NewSubnetDetector() require.NoError(t, err) require.NotNil(t, snd) var s *Server s, err = NewServer(DNSCreateParams{ DNSFilter: dnsfilter.New(&c, nil), SubnetDetector: snd, LocalResolvers: &aghtest.Exchanger{}, })
<mask> // Init auto hosts. <mask> c.AutoHosts.Init(hf.Name()) <mask> t.Cleanup(c.AutoHosts.Close) <mask> <mask> s, err := NewServer(DNSCreateParams{DNSFilter: dnsfilter.New(&c, nil)}) <mask> require.NoError(t, err) <mask> <mask> s.conf.UDPListenAddrs = []*net.UDPAddr{{}} <mask> s.conf.TCPListenAddrs =...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/dnsforward_test.go
// TODO(e.burkov): Consistently use req instead of d.Req since it is // declared.
<mask> // was filtered. <mask> func (s *Server) filterDNSRequest(ctx *dnsContext) (*dnsfilter.Result, error) { <mask> d := ctx.proxyCtx <mask> req := d.Req <mask> host := strings.TrimSuffix(req.Question[0].Name, ".") <mask> res, err := s.dnsFilter.CheckHost(host, d.Req.Question[0].Qtype, ctx.setts) <mask> i...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/dnsforward/filter.go
defer clients.lock.Unlock()
<mask> // AddHost adds a new IP-hostname pairing. The priorities of the sources is <mask> // taken into account. ok is true if the pairing was added. <mask> func (clients *clientsContainer) AddHost(ip, host string, src clientSource) (ok bool, err error) { <mask> clients.lock.Lock() <mask> ok = clients.addHostL...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/clients.go
<mask> // taken into account. ok is true if the pairing was added. <mask> func (clients *clientsContainer) AddHost(ip, host string, src clientSource) (ok bool, err error) { <mask> clients.lock.Lock() <mask> ok = clients.addHostLocked(ip, host, src) <mask> clients.lock.Unlock() <mask> <mask> return ok, nil ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/clients.go
DNSFilter: Context.dnsFilter, Stats: Context.stats, QueryLog: Context.queryLog, SubnetDetector: Context.subnetDetector, LocalResolvers: Context.localResolvers, AutohostTLD: config.DNS.AutohostTLD,
<mask> filterConf.HTTPRegister = httpRegister <mask> Context.dnsFilter = dnsfilter.New(&filterConf, nil) <mask> <mask> p := dnsforward.DNSCreateParams{ <mask> DNSFilter: Context.dnsFilter, <mask> Stats: Context.stats, <mask> QueryLog: Context.queryLog, <mask> AutohostTLD: config.DNS.Autoh...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/dns.go
Context.rdns = NewRDNS(Context.dnsServer, &Context.clients, Context.subnetDetector, Context.localResolvers)
<mask> closeDNSServer() <mask> return fmt.Errorf("dnsServer.Prepare: %w", err) <mask> } <mask> <mask> Context.rdns = InitRDNS(Context.dnsServer, &Context.clients) <mask> Context.whois = initWhois(&Context.clients) <mask> <mask> Context.filters.Init() <mask> return nil <mask> } </s> Pull request: 2...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/dns.go
// This would be quite weird if we get here.
<mask> <mask> func onDNSRequest(d *proxy.DNSContext) { <mask> ip := dnsforward.IPFromAddr(d.Addr) <mask> if ip == nil { <mask> // This would be quite weird if we get here <mask> return <mask> } <mask> <mask> if !ip.IsLoopback() { <mask> Context.rdns.Begin(ip) </s> Pull request: 2704 local address...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/dns.go
if !Context.subnetDetector.IsSpecialNetwork(ip) {
<mask> <mask> if !ip.IsLoopback() { <mask> Context.rdns.Begin(ip) <mask> } <mask> if !Context.ipDetector.DetectSpecialNetwork(ip) { <mask> Context.whois.Begin(ip) <mask> } <mask> } <mask> <mask> func ipsToTCPAddrs(ips []net.IP, port int) (tcpAddrs []*net.TCPAddr) { </s> Pull request: 2704 local add...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/dns.go
if !Context.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> Context.queryLog.Start() <mask> <mask> const topClientsNumber = 100 // the number of clients to get <mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) { <mask> if !ip.IsLoopback() { <mask> Context.rdns.Begin(ip) <mask> } <mask> if !Context.ipDetector.DetectSpecialNetwo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/dns.go
if !Context.subnetDetector.IsSpecialNetwork(ip) {
<mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) { <mask> if !ip.IsLoopback() { <mask> Context.rdns.Begin(ip) <mask> } <mask> if !Context.ipDetector.DetectSpecialNetwork(ip) { <mask> Context.whois.Begin(ip) <mask> } <mask> } <mask> <mask> return nil </s> Pull reques...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/dns.go
subnetDetector *aghnet.SubnetDetector systemResolvers aghnet.SystemResolvers localResolvers aghnet.Exchanger
<mask> tls *TLSMod // TLS module <mask> autoHosts util.AutoHosts // IP-hostname pairs taken from system configuration (e.g. /etc/hosts) files <mask> updater *updater.Updater <mask> <mask> ipDetector *aghnet.IPDetector <mask> <mask> // mux is our custom http.ServeMux. <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/home.go
Context.subnetDetector, err = aghnet.NewSubnetDetector()
<mask> if Context.web == nil { <mask> log.Fatalf("Can't initialize Web module") <mask> } <mask> <mask> Context.ipDetector, err = aghnet.NewIPDetector() <mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> <mask> if !Context.firstRun { </s> Pull request: 2704 local addresses vol.2 Merge i...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/home.go
setupResolvers()
<mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> <mask> if !Context.firstRun { <mask> err = initDNSServer() <mask> if err != nil { <mask> log.Fatalf("%s", err) </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master Updates #2...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/home.go
"fmt"
<mask> <mask> import ( <mask> "encoding/binary" <mask> "net" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master Updates #2704. Updates #2829....
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
"github.com/AdguardTeam/AdGuardHome/internal/agherr" "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/miekg/dns" <mask> ) </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home fr...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
// RDNS resolves clients' addresses to enrich their metadata.
<mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/miekg/dns" <mask> ) <mask> <mask> // RDNS - module context <mask> type RDNS struct { <mask> dnsServer *dnsforward.Server <mask> clients *clientsContainer <mask> ipChannel chan net.IP // pass data from DNS request handling thread to rDNS thre...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
dnsServer *dnsforward.Server clients *clientsContainer subnetDetector *aghnet.SubnetDetector localResolvers aghnet.Exchanger // ipCh used to pass client's IP to rDNS workerLoop. ipCh chan net.IP // ipCache caches the IP addresses to be resolved by rDNS. The resolved // address stays here while it...
<mask> ) <mask> <mask> // RDNS - module context <mask> type RDNS struct { <mask> dnsServer *dnsforward.Server <mask> clients *clientsContainer <mask> ipChannel chan net.IP // pass data from DNS request handling thread to rDNS thread <mask> <mask> // Contains IP addresses of clients to be resolved by rD...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
// Default rDNS values. const ( defaultRDNSCacheSize = 10000 defaultRDNSCacheTTL = 1 * 60 * 60 defaultRDNSIPChSize = 256 ) // NewRDNS creates and returns initialized RDNS. func NewRDNS( dnsServer *dnsforward.Server, clients *clientsContainer, snd *aghnet.SubnetDetector, lr aghnet.Exchanger, ) (rDNS *RDNS) { ...
<mask> // If IP address couldn't be resolved, it stays here for some time to prevent further attempts to resolve the same IP. <mask> ipAddrs cache.Cache <mask> } <mask> <mask> // InitRDNS - create module context <mask> func InitRDNS(dnsServer *dnsforward.Server, clients *clientsContainer) *RDNS { <mask> r :=...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
MaxCount: defaultRDNSCacheSize,
<mask> dnsServer: dnsServer, <mask> clients: clients, <mask> ipAddrs: cache.New(cache.Config{ <mask> EnableLRU: true, <mask> MaxCount: 10000, <mask> }), <mask> ipChannel: make(chan net.IP, 256), <mask> } <mask> <mask> go r.workerLoop() </s> Pull request: 2704 local addresses vol.2 Merg...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
ipCh: make(chan net.IP, defaultRDNSIPChSize),
<mask> ipAddrs: cache.New(cache.Config{ <mask> EnableLRU: true, <mask> MaxCount: 10000, <mask> }), <mask> ipChannel: make(chan net.IP, 256), <mask> } <mask> <mask> go r.workerLoop() <mask> return r <mask> } </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-lo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
go rDNS.workerLoop() return rDNS
<mask> }), <mask> ipChannel: make(chan net.IP, 256), <mask> } <mask> <mask> go r.workerLoop() <mask> return r <mask> } <mask> <mask> // Begin - add IP address to rDNS queue <mask> func (r *RDNS) Begin(ip net.IP) { <mask> now := uint64(time.Now().Unix()) </s> Pull request: 2704 local addresses vol....
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
// Begin adds the ip to the resolving queue if it is not cached or already // resolved.
<mask> go r.workerLoop() <mask> return r <mask> } <mask> <mask> // Begin - add IP address to rDNS queue <mask> func (r *RDNS) Begin(ip net.IP) { <mask> now := uint64(time.Now().Unix()) <mask> expire := r.ipAddrs.Get(ip) <mask> if len(expire) != 0 { <mask> exp := binary.BigEndian.Uint64(expire) </s> P...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
if expire := r.ipCache.Get(ip); len(expire) != 0 { if binary.BigEndian.Uint64(expire) > now {
<mask> <mask> // Begin - add IP address to rDNS queue <mask> func (r *RDNS) Begin(ip net.IP) { <mask> now := uint64(time.Now().Unix()) <mask> expire := r.ipAddrs.Get(ip) <mask> if len(expire) != 0 { <mask> exp := binary.BigEndian.Uint64(expire) <mask> if exp > now { <mask> return <mask> } <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
<mask> exp := binary.BigEndian.Uint64(expire) <mask> if exp > now { <mask> return <mask> } <mask> // TTL expired <mask> } <mask> expire = make([]byte, 8) <mask> const ttl = 1 * 60 * 60 <mask> binary.BigEndian.PutUint64(expire, now+ttl) <mask> _ = r.ipAddrs.Set(ip, expire) </s> Pull request: 2...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
// The cache entry either expired or doesn't exist. ttl := make([]byte, 8) binary.BigEndian.PutUint64(ttl, now+defaultRDNSCacheTTL) r.ipCache.Set(ip, ttl)
<mask> return <mask> } <mask> // TTL expired <mask> } <mask> expire = make([]byte, 8) <mask> const ttl = 1 * 60 * 60 <mask> binary.BigEndian.PutUint64(expire, now+ttl) <mask> _ = r.ipAddrs.Set(ip, expire) <mask> <mask> id := ip.String() <mask> if r.clients.Exists(id, ClientSourceRDNS) { <mask...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
<mask> if r.clients.Exists(id, ClientSourceRDNS) { <mask> return <mask> } <mask> <mask> log.Tracef("rDNS: adding %s", ip) <mask> select { <mask> case r.ipChannel <- ip: <mask> // <mask> default: <mask> log.Tracef("rDNS: queue is full") </s> Pull request: 2704 local addresses vol.2 Merge in DNS/...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
case r.ipCh <- ip: log.Tracef("rdns: %q added to queue", ip)
<mask> } <mask> <mask> log.Tracef("rDNS: adding %s", ip) <mask> select { <mask> case r.ipChannel <- ip: <mask> // <mask> default: <mask> log.Tracef("rDNS: queue is full") <mask> } <mask> } <mask> </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-local-addresses-v...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
log.Tracef("rdns: queue is full")
<mask> select { <mask> case r.ipChannel <- ip: <mask> // <mask> default: <mask> log.Tracef("rDNS: queue is full") <mask> } <mask> } <mask> <mask> // Use rDNS to get hostname by IP address <mask> func (r *RDNS) resolve(ip net.IP) string { </s> Pull request: 2704 local addresses vol.2 Merge in DNS/ad...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
const ( // rDNSEmptyAnswerErr is returned by RDNS resolve method when the answer // section of respond is empty. rDNSEmptyAnswerErr agherr.Error = "the answer section is empty"
<mask> log.Tracef("rDNS: queue is full") <mask> } <mask> } <mask> <mask> // Use rDNS to get hostname by IP address <mask> func (r *RDNS) resolve(ip net.IP) string { <mask> log.Tracef("Resolving host for %s", ip) <mask> <mask> name, err := dns.ReverseAddr(ip.String()) <mask> if err != nil { <mask> l...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
// rDNSNotPTRErr is returned by RDNS resolve method when the response is // not of PTR type. rDNSNotPTRErr agherr.Error = "the response is not a ptr" ) // resolve tries to resolve the ip in a suitable way. func (r *RDNS) resolve(ip net.IP) (host string, err error) { log.Tracef("rdns: resolving host for %q", ip)
<mask> // Use rDNS to get hostname by IP address <mask> func (r *RDNS) resolve(ip net.IP) string { <mask> log.Tracef("Resolving host for %s", ip) <mask> <mask> name, err := dns.ReverseAddr(ip.String()) <mask> if err != nil { <mask> log.Debug("Error while calling dns.ReverseAddr(%s): %s", ip, err) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
arpa := dns.Fqdn(aghnet.ReverseAddr(ip)) msg := &dns.Msg{
<mask> log.Debug("Error while calling dns.ReverseAddr(%s): %s", ip, err) <mask> return "" <mask> } <mask> <mask> resp, err := r.dnsServer.Exchange(&dns.Msg{ <mask> MsgHdr: dns.MsgHdr{ <mask> Id: dns.Id(), <mask> RecursionDesired: true, <mask> }, <mask> Question: []dns.Question...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go
Compress: true,
<mask> Id: dns.Id(), <mask> RecursionDesired: true, <mask> }, <mask> Question: []dns.Question{{ <mask> Name: arpa, <mask> Qtype: dns.TypePTR, <mask> Qclass: dns.ClassINET, <mask> }}, </s> Pull request: 2704 local addresses vol.2 Merge in DNS/adguard-home from 2704-local-a...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/86444eacc2d38666b949b37163e9e53b499119eb
internal/home/rdns.go