docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
"github.com/AdguardTeam/AdGuardHome/internal/testutil"
"github.com/AdguardTeam/golibs/log" | <mask> "testing"
<mask>
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func TestDecode_decodeQueryLog(t *testing.T) {
</s> Pull request: cover with tests
Merge in DNS/adguard-home from 2271-cover-with-tests to master
Updates #2271.
Squashed commit of the following:
commit db6440efe051... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8a9c6e8a02c6fd7805a6d6100f9e57b2e6bbca8b | internal/querylog/decode_test.go |
res := dnsfilter.Result{
IsFiltered: true,
Rule: "SomeRule",
Reason: dnsfilter.ReasonRewrite,
ServiceName: "SomeService",
FilterID: 1,
} | <mask> Class: dns.ClassINET,
<mask> }
<mask> answer.A = net.ParseIP(answerStr)
<mask> a.Answer = append(a.Answer, answer)
<mask> res := dnsfilter.Result{}
<mask> params := AddParams{
<mask> Question: &q,
<mask> Answer: &a,
<mask> Result: &res,
<mask> ClientIP: net.ParseIP(client),
</s> Pu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8a9c6e8a02c6fd7805a6d6100f9e57b2e6bbca8b | internal/querylog/qlog_test.go |
Question: &q,
Answer: &a,
OrigAnswer: &a,
Result: &res,
ClientIP: net.ParseIP(client),
Upstream: "upstream", | <mask> answer.A = net.ParseIP(answerStr)
<mask> a.Answer = append(a.Answer, answer)
<mask> res := dnsfilter.Result{}
<mask> params := AddParams{
<mask> Question: &q,
<mask> Answer: &a,
<mask> Result: &res,
<mask> ClientIP: net.ParseIP(client),
<mask> Upstream: "upstream",
<mask> }
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8a9c6e8a02c6fd7805a6d6100f9e57b2e6bbca8b | internal/querylog/qlog_test.go |
"io" | <mask> package testutil
<mask>
<mask> import (
<mask> "io/ioutil"
<mask> "os"
<mask> "testing"
<mask>
</s> Pull request: cover with tests
Merge in DNS/adguard-home from 2271-cover-with-tests to master
Updates #2271.
Squashed commit of the following:
commit db6440efe05171bc15367a2996521848ca348053
Merge... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8a9c6e8a02c6fd7805a6d6100f9e57b2e6bbca8b | internal/testutil/testutil.go |
<mask> package dnsforward
<mask>
<mask> import (
<mask> "errors"
<mask> "net"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> Pull request: 2704 local addresses vol.4
Updates #2704.
Squashed commit of the following:
commit bbc292a1c9dc7382e1116c... | [
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dns.go | |
err := s.localResolvers.Resolve(d) | <mask> if !s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> req := d.Req
<mask> resp, err := s.localResolvers.Exchange(req)
<mask> if err != nil {
<mask> if errors.Is(err, aghnet.NoUpstreamsErr) {
<mask> d.Res = s.genNXDomain(req)
<mask>
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dns.go |
<mask>
<mask> req := d.Req
<mask> resp, err := s.localResolvers.Exchange(req)
<mask> if err != nil {
<mask> if errors.Is(err, aghnet.NoUpstreamsErr) {
<mask> d.Res = s.genNXDomain(req)
<mask>
<mask> return resultCodeFinish
<mask> }
<mask>
<mask> ctx.err = err
<mask>
<mask> return resul... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dns.go | |
if d.Res == nil {
d.Res = s.genNXDomain(d.Req)
return resultCodeFinish
} | <mask>
<mask> return resultCodeError
<mask> }
<mask>
<mask> d.Res = resp
<mask>
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> // Apply filtering logic
</s> Pull request: 2704 local addresses vol.4
Updates #2704.
Squashed commit of the following:
commit bbc292a1c9dc7382e1116cfd85fea22ab8d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dns.go |
<mask> }
<mask> }
<mask>
<mask> func TestLocalRestriction(t *testing.T) {
<mask> s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
<mask> TCPListenAddrs: []*net.TCPAddr{{}},
<mask> })
<mask> ups := &aghtest.TestUpstream{
<mask> Reverse: map[strin... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dns_test.go | |
s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
UDPListenAddrs: []*net.UDPAddr{{}},
TCPListenAddrs: []*net.TCPAddr{{}},
}, ups) | <mask> "251.252.253.254.in-addr.arpa.": {"host1.example.net."},
<mask> "1.1.168.192.in-addr.arpa.": {"some.local-client."},
<mask> },
<mask> }
<mask> s.localResolvers = &aghtest.Exchanger{Ups: ups}
<mask> s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{ups}
<mask> startDeferStop(t, s)
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dns_test.go |
"github.com/AdguardTeam/dnsproxy/upstream" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<ma... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go |
localResolvers *proxy.Proxy | <mask> autohostSuffix string
<mask>
<mask> ipset ipsetCtx
<mask> subnetDetector *aghnet.SubnetDetector
<mask> localResolvers aghnet.Exchanger
<mask>
<mask> tableHostToIP map[string]net.IP // "hostname -> IP" table for internal addresses (DHCP)
<mask> tableHostToIPLock sync.Mutex
<mask>
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go |
ctx := &proxy.DNSContext{
Proto: "udp",
Req: req,
StartTime: time.Now(),
} | <mask> }},
<mask> }
<mask>
<mask> var resp *dns.Msg
<mask> if s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> err = s.localResolvers.Resolve(ctx)
<mask> } else {
</s> Pull request: 2704 local addresses vol.4
Updates #2704.
Squashed commit of the following:
commit bbc292a1c9dc7382e1116cfd85fea22... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go |
err = s.localResolvers.Resolve(ctx) | <mask> }
<mask>
<mask> var resp *dns.Msg
<mask> if s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> resp, err = s.localResolvers.Exchange(req)
<mask> } else {
<mask> ctx := &proxy.DNSContext{
<mask> Proto: "udp",
<mask> Req: req,
<mask> StartTime: time.Now(),
</s> Pull request... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go |
<mask> var resp *dns.Msg
<mask> if s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> resp, err = s.localResolvers.Exchange(req)
<mask> } else {
<mask> ctx := &proxy.DNSContext{
<mask> Proto: "udp",
<mask> Req: req,
<mask> StartTime: time.Now(),
<mask> }
<mask> err = s.internal... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go | |
<mask> Req: req,
<mask> StartTime: time.Now(),
<mask> }
<mask> err = s.internalProxy.Resolve(ctx)
<mask>
<mask> resp = ctx.Res
<mask> }
<mask> if err != nil {
<mask> return "", err
<mask> }
<mask>
</s> Pull request: 2704 local addresses vol.4
Updates #2704.
Squashed commit of the ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go | |
resp = ctx.Res
| <mask> return "", err
<mask> }
<mask>
<mask> if len(resp.Answer) == 0 {
<mask> return "", fmt.Errorf("lookup for %q: %w", arpa, rDNSEmptyAnswerErr)
<mask> }
<mask>
<mask> ptr, ok := resp.Answer[0].(*dns.PTR)
<mask> if !ok {
</s> Pull request: 2704 local addresses vol.4
Updates #2704.
Squashed com... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go |
// TODO(e.burkov): The approach of subtracting sets of strings is not
// really applicable here since in case of listening on all network
// interfaces we should check the whole interface's network to cut off
// all the loopback addresses as well. | <mask> if err != nil {
<mask> return err
<mask> }
<mask>
<mask> // TODO(e.burkov): The approach of subtracting sets of strings
<mask> // is not really applicable here since in case of listening on
<mask> // all network interfaces we should check the whole interface's
<mask> // network to cut off all th... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go |
var upsConfig proxy.UpstreamConfig
upsConfig, err = proxy.ParseUpstreamsConfig(localAddrs, upstream.Options{
Bootstrap: bootstraps,
Timeout: defaultLocalTimeout,
// TODO(e.burkov): Should we verify server's ceritificates?
})
if err != nil {
return fmt.Errorf("parsing upstreams: %w", err)
}
s.localResol... | <mask> // all network interfaces we should check the whole interface's
<mask> // network to cut off all the loopback addresses as well.
<mask> localAddrs = stringSetSubtract(localAddrs, ourAddrs)
<mask>
<mask> if s.localResolvers, err = aghnet.NewMultiAddrExchanger(
<mask> localAddrs,
<mask> bootstraps,... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward.go |
func createTestServer(
t *testing.T,
filterConf *dnsfilter.Config,
forwardConf ServerConfig,
localUps upstream.Upstream,
) (s *Server) { | <mask> require.NoErrorf(t, serr, "dns server failed to stop: %s", serr)
<mask> })
<mask> }
<mask>
<mask> func createTestServer(t *testing.T, filterConf *dnsfilter.Config, forwardConf ServerConfig) *Server {
<mask> t.Helper()
<mask>
<mask> rules := `||nxdomain.example.org
<mask> ||null.example.org^
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask> require.NotNil(t, snd)
<mask>
<mask> var s *Server
<mask> s, err = NewServer(DNSCreateParams{
<mask> DNSFilter: f,
<mask> SubnetDetector: snd,
<mask> })
<mask> require.NoError(t, err)
</s> Pull request: 2704 ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go | |
if localUps != nil {
s.localResolvers.Config.UpstreamConfig.Upstreams = []upstream.Upstream{localUps}
} | <mask>
<mask> s.Lock()
<mask> defer s.Unlock()
<mask>
<mask> s.localResolvers = &aghtest.Exchanger{}
<mask>
<mask> return s
<mask> }
<mask>
<mask> func createServerTLSConfig(t *testing.T) (*tls.Config, []byte, []byte) {
</s> Pull request: 2704 local addresses vol.4
Updates #2704.
Squashed commit of... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
}, nil) | <mask>
<mask> s = createTestServer(t, &dnsfilter.Config{}, ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
<mask> TCPListenAddrs: []*net.TCPAddr{{}},
<mask> })
<mask>
<mask> tlsConf.CertificateChainData, tlsConf.PrivateKeyData = certPem, keyPem
<mask> s.conf.TLSConfig = tlsConf
<mask>
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
}, nil) | <mask> func TestServer(t *testing.T) {
<mask> s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
<mask> TCPListenAddrs: []*net.TCPAddr{{}},
<mask> })
<mask> s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
<mask> &aghtest.TestUpstream{
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
}, nil) | <mask> func TestServerWithProtectionDisabled(t *testing.T) {
<mask> s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
<mask> TCPListenAddrs: []*net.TCPAddr{{}},
<mask> })
<mask> s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
<mask> &aghtest.Te... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, filterConf, forwardConf, nil) | <mask> UpstreamDNS: []string{"8.8.8.8:53", "8.8.4.4:53"},
<mask> },
<mask> ConfigModified: func() {},
<mask> }
<mask> s := createTestServer(t, filterConf, forwardConf)
<mask> s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
<mask> &aghtest.TestUpstream{
<mask> IPv4: map[string][]net.I... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, filterConf, forwardConf, nil) | <mask> FilteringConfig: FilteringConfig{
<mask> ProtectionEnabled: true,
<mask> },
<mask> }
<mask> s := createTestServer(t, filterConf, forwardConf)
<mask> startDeferStop(t, s)
<mask>
<mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP).String()
<mask> client := dns.Client{Net: proxy.ProtoUDP}
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
}, nil) | <mask> func TestInvalidRequest(t *testing.T) {
<mask> s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
<mask> TCPListenAddrs: []*net.TCPAddr{{}},
<mask> })
<mask> startDeferStop(t, s)
<mask>
<mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP).String()
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, &dnsfilter.Config{}, forwardConf, nil) | <mask> FilteringConfig: FilteringConfig{
<mask> ProtectionEnabled: true,
<mask> },
<mask> }
<mask> s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
<mask> startDeferStop(t, s)
<mask>
<mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP)
<mask>
<mask> // Default blocking.
</s> Pull request: 2... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, &dnsfilter.Config{}, forwardConf, nil) | <mask> FilteringConfig: FilteringConfig{
<mask> ProtectionEnabled: true,
<mask> },
<mask> }
<mask> s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
<mask> s.conf.GetCustomUpstreamByClient = func(_ string) *proxy.UpstreamConfig {
<mask> return &proxy.UpstreamConfig{
<mask> Upstreams: []u... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
}, nil) | <mask> func TestBlockCNAMEProtectionEnabled(t *testing.T) {
<mask> s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
<mask> TCPListenAddrs: []*net.TCPAddr{{}},
<mask> })
<mask> testUpstm := &aghtest.TestUpstream{
<mask> CName: testCNAMEs,
<mask> IP... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, &dnsfilter.Config{}, forwardConf, nil) | <mask> FilteringConfig: FilteringConfig{
<mask> ProtectionEnabled: true,
<mask> },
<mask> }
<mask> s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
<mask> s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
<mask> &aghtest.TestUpstream{
<mask> CName: testCNAMEs,
<mask> IPv4: tes... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, &dnsfilter.Config{}, forwardConf, nil) | <mask> settings.FilteringEnabled = false
<mask> },
<mask> },
<mask> }
<mask> s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
<mask> s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
<mask> &aghtest.TestUpstream{
<mask> CName: testCNAMEs,
<mask> IPv4: testIPv4,
<mask> },
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, &dnsfilter.Config{}, forwardConf, nil) | <mask> ProtectionEnabled: true,
<mask> BlockingMode: "null_ip",
<mask> },
<mask> }
<mask> s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
<mask> startDeferStop(t, s)
<mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP)
<mask>
<mask> // Nil filter blocking.
<mask> req := dns.Msg{
</s>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, &dnsfilter.Config{}, forwardConf, nil) | <mask> FilteringConfig: FilteringConfig{
<mask> ProtectionEnabled: true,
<mask> },
<mask> }
<mask> s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
<mask> startDeferStop(t, s)
<mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP)
<mask>
<mask> // Hosts blocking.
<mask> req := createTestMessag... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, filterConf, forwardConf, nil) | <mask> SafeBrowsingBlockHost: ans4.String(),
<mask> ProtectionEnabled: true,
<mask> },
<mask> }
<mask> s := createTestServer(t, filterConf, forwardConf)
<mask> s.dnsFilter.SetSafeBrowsingUpstream(sbUps)
<mask> startDeferStop(t, s)
<mask> addr := s.dnsProxy.Addr(proxy.ProtoUDP)
<mask>
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
pcfg := proxy.Config{
UpstreamConfig: &proxy.UpstreamConfig{
Upstreams: []upstream.Upstream{tc.locUpstream},
},
}
dns.localResolvers = &proxy.Proxy{
Config: pcfg, | <mask> req: localIP,
<mask> }}
<mask>
<mask> for _, tc := range testCases {
<mask> dns.localResolvers = &aghtest.Exchanger{
<mask> Ups: tc.locUpstream,
<mask> }
<mask>
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> host, eerr := dns.Exchange(tc.req)
<mask>
</s> Pull request: 27... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/dnsforward_test.go |
s := createTestServer(t, filterConf, forwardConf, nil) | <mask> UpstreamDNS: []string{"8.8.8.8:53", "8.8.4.4:53"},
<mask> },
<mask> ConfigModified: func() {},
<mask> }
<mask> s := createTestServer(t, filterConf, forwardConf)
<mask> require.Nil(t, s.Start())
<mask> t.Cleanup(func() {
<mask> require.Nil(t, s.Stop())
<mask> })
<mask>
</s> Pull re... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/http_test.go |
s := createTestServer(t, filterConf, forwardConf, nil) | <mask> UpstreamDNS: []string{"8.8.8.8:53", "8.8.4.4:53"},
<mask> },
<mask> ConfigModified: func() {},
<mask> }
<mask> s := createTestServer(t, filterConf, forwardConf)
<mask>
<mask> defaultConf := s.conf
<mask>
<mask> err := s.Start()
<mask> assert.Nil(t, err)
</s> Pull request: 2704 loca... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8b8319fca047c541d1813218a80f27cd28098bd1 | internal/dnsforward/http_test.go |
// MarshalJSON implements the json.Marshaler interface for NetInterface.
func (iface NetInterface) MarshalJSON() ([]byte, error) { | <mask> Flags net.Flags `json:"flags"`
<mask> MTU int `json:"mtu"`
<mask> }
<mask>
<mask> // MarshalText implements the json.Marshaler interface for NetInterface.
<mask> func (iface NetInterface) MarshalText() ([]byte, error) {
<mask> type netInterface NetInterface
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bb95469d92bac60811f3f76c59511e52d0ffadc | internal/aghnet/net.go |
"bytes"
"encoding/json" | <mask>
<mask> import (
<mask> "fmt"
<mask> "io/fs"
<mask> "net"
<mask> "os"
<mask> "strings"
</s> Pull request: 4465 fix ifaces resp
Merge in DNS/adguard-home from 4465-bad-ifaces-resp to master
Closes #4465.
Squashed commit of the following:
commit cc44252b2f12ba4b15df315253417aba2a3f98a6
Author: Eug... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bb95469d92bac60811f3f76c59511e52d0ffadc | internal/aghnet/net_test.go |
func TestNetInterface_MarshalJSON(t *testing.T) { | <mask> assert.False(t, IsAddrInUse(anotherErr))
<mask> })
<mask> }
<mask>
<mask> func TestNetInterface_MarshalText(t *testing.T) {
<mask> const want = `{` +
<mask> `"hardware_address":"aa:bb:cc:dd:ee:ff",` +
<mask> `"flags":"up|multicast",` +
<mask> `"ip_addresses":["1.2.3.4","aaaa::1"],` +
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bb95469d92bac60811f3f76c59511e52d0ffadc | internal/aghnet/net_test.go |
`}` + "\n" | <mask> `"flags":"up|multicast",` +
<mask> `"ip_addresses":["1.2.3.4","aaaa::1"],` +
<mask> `"name":"iface0",` +
<mask> `"mtu":1500` +
<mask> `}`
<mask>
<mask> ip4, ip6 := net.IP{1, 2, 3, 4}, net.IP{0xAA, 0xAA, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}
<mask> mask4, mask6 := net.CIDRMask(24, netutil... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bb95469d92bac60811f3f76c59511e52d0ffadc | internal/aghnet/net_test.go |
b := &bytes.Buffer{}
err := json.NewEncoder(b).Encode(iface)
require.NoError(t, err)
assert.Equal(t, want, b.String()) | <mask> Flags: net.FlagUp | net.FlagMulticast,
<mask> MTU: 1500,
<mask> }
<mask>
<mask> testutil.AssertMarshalText(t, want, iface)
<mask> }
</s> Pull request: 4465 fix ifaces resp
Merge in DNS/adguard-home from 4465-bad-ifaces-resp to master
Closes #4465.
Squashed commit of the following... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bb95469d92bac60811f3f76c59511e52d0ffadc | internal/aghnet/net_test.go |
// Custom filtering settings
type RequestFilteringSettings struct {
FilteringEnabled bool
SafeSearchEnabled bool
SafeBrowsingEnabled bool
ParentalEnabled bool
}
| <mask> const enableDelayedCompilation = true // flag for debugging, must be true in production for faster performance
<mask>
<mask> // Config allows you to configure DNS filtering with New() or just change variables directly.
<mask> type Config struct {
<mask> FilteringTempFilename string `yaml:"filtering_temp_f... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter.go |
// Filtering callback function
FilterHandler func(clientAddr string, settings *RequestFilteringSettings) `yaml:"-"` | <mask> UsePlainHTTP bool `yaml:"-"` // use plain HTTP for requests to parental and safe browsing servers
<mask> SafeSearchEnabled bool `yaml:"safesearch_enabled"`
<mask> SafeBrowsingEnabled bool `yaml:"safebrowsing_enabled"`
<mask> ResolverAddress string // DNS server address
<mask> ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter.go |
func (d *Dnsfilter) CheckHost(host string, qtype uint16, clientAddr string) (Result, error) { | <mask> return r != NotFilteredNotFound
<mask> }
<mask>
<mask> // CheckHost tries to match host against rules, then safebrowsing and parental if they are enabled
<mask> func (d *Dnsfilter) CheckHost(host string, qtype uint16) (Result, error) {
<mask> // sometimes DNS clients will try to resolve ".", which is a ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter.go |
var setts RequestFilteringSettings
setts.FilteringEnabled = true
setts.SafeSearchEnabled = d.SafeSearchEnabled
setts.SafeBrowsingEnabled = d.SafeBrowsingEnabled
setts.ParentalEnabled = d.ParentalEnabled
if len(clientAddr) != 0 && d.FilterHandler != nil {
d.FilterHandler(clientAddr, &setts) | <mask> if host == d.parentalServer || host == d.safeBrowsingServer {
<mask> return Result{}, nil
<mask> }
<mask>
<mask> // try filter lists first
<mask> result, err := d.matchHost(host, qtype)
<mask> if err != nil {
<mask> return result, err
<mask> }
<mask> if result.Reason.Matched() {
<mask> r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter.go |
var result Result
var err error
// try filter lists first
if setts.FilteringEnabled {
result, err = d.matchHost(host, qtype)
if err != nil {
return result, err
}
if result.Reason.Matched() {
return result, nil
} | <mask> result, err := d.matchHost(host, qtype)
<mask> if err != nil {
<mask> return result, err
<mask> }
<mask> if result.Reason.Matched() {
<mask> return result, nil
<mask> }
<mask>
<mask> // check safeSearch if no match
<mask> if d.SafeSearchEnabled {
<mask> result, err = d.checkSafeSearch(ho... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter.go |
if setts.SafeSearchEnabled { | <mask> return result, nil
<mask> }
<mask>
<mask> // check safeSearch if no match
<mask> if d.SafeSearchEnabled {
<mask> result, err = d.checkSafeSearch(host)
<mask> if err != nil {
<mask> log.Printf("Failed to safesearch HTTP lookup, ignoring check: %v", err)
<mask> return Result{}, nil
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter.go |
if setts.SafeBrowsingEnabled { | <mask> }
<mask> }
<mask>
<mask> // check safebrowsing if no match
<mask> if d.SafeBrowsingEnabled {
<mask> result, err = d.checkSafeBrowsing(host)
<mask> if err != nil {
<mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache
<mask> log.Printf("Failed to... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter.go |
if setts.ParentalEnabled { | <mask> }
<mask> }
<mask>
<mask> // check parental if no match
<mask> if d.ParentalEnabled {
<mask> result, err = d.checkParental(host)
<mask> if err != nil {
<mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache
<mask> log.Printf("Failed to do parental... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter.go |
// CLIENTS SETTINGS | <mask> // SAFE BROWSING
<mask> // SAFE SEARCH
<mask> // PARENTAL
<mask> // FILTERING
<mask> // BENCHMARKS
<mask>
<mask> // HELPERS
<mask>
</s> + dnsfilter: use callback function for applying per-client settings </s> remove result, err = d.CheckHost(domain, dns.TypeA)
</s> add result, err = d.CheckHost(dom... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
ret, err := d.CheckHost(hostname, dns.TypeA, "") | <mask> }
<mask>
<mask> func (d *Dnsfilter) checkMatch(t *testing.T, hostname string) {
<mask> t.Helper()
<mask> ret, err := d.CheckHost(hostname, dns.TypeA)
<mask> if err != nil {
<mask> t.Errorf("Error while matching host %s: %s", hostname, err)
<mask> }
<mask> if !ret.IsFiltered {
<mask> t.Errorf(... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
ret, err := d.CheckHost(hostname, qtype, "") | <mask> }
<mask>
<mask> func (d *Dnsfilter) checkMatchIP(t *testing.T, hostname string, ip string, qtype uint16) {
<mask> t.Helper()
<mask> ret, err := d.CheckHost(hostname, qtype)
<mask> if err != nil {
<mask> t.Errorf("Error while matching host %s: %s", hostname, err)
<mask> }
<mask> if !ret.IsFiltere... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
ret, err := d.CheckHost(hostname, dns.TypeA, "") | <mask> }
<mask>
<mask> func (d *Dnsfilter) checkMatchEmpty(t *testing.T, hostname string) {
<mask> t.Helper()
<mask> ret, err := d.CheckHost(hostname, dns.TypeA)
<mask> if err != nil {
<mask> t.Errorf("Error while matching host %s: %s", hostname, err)
<mask> }
<mask> if ret.IsFiltered {
<mask> t.Err... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
result, err := d.CheckHost(host, dns.TypeA, "") | <mask> yandex := []string{"yAndeX.ru", "YANdex.COM", "yandex.ua", "yandex.by", "yandex.kz", "www.yandex.com"}
<mask>
<mask> // Check host for each domain
<mask> for _, host := range yandex {
<mask> result, err := d.CheckHost(host, dns.TypeA)
<mask> if err != nil {
<mask> t.Errorf("SafeSearch doesn't w... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
result, err := d.CheckHost(host, dns.TypeA, "") | <mask> googleDomains := []string{"www.google.com", "www.google.im", "www.google.co.in", "www.google.iq", "www.google.is", "www.google.it", "www.google.je"}
<mask>
<mask> // Check host for each domain
<mask> for _, host := range googleDomains {
<mask> result, err := d.CheckHost(host, dns.TypeA)
<mask> if e... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
result, err = d.CheckHost(domain, dns.TypeA, "") | <mask> var result Result
<mask> var err error
<mask>
<mask> // Check host with disabled safesearch
<mask> result, err = d.CheckHost(domain, dns.TypeA)
<mask> if err != nil {
<mask> t.Fatalf("Cannot check host due to %s", err)
<mask> }
<mask> if result.IP != nil {
<mask> t.Fatalf("SafeSearch is not... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
result, err = d.CheckHost(domain, dns.TypeA, "") | <mask> }
<mask>
<mask> // Enable safesearch
<mask> d.SafeSearchEnabled = true
<mask> result, err = d.CheckHost(domain, dns.TypeA)
<mask> if err != nil {
<mask> t.Fatalf("CheckHost for safesearh domain %s failed cause %s", domain, err)
<mask> }
<mask>
<mask> // Fir yandex we already know valid ip
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
result, err := d.CheckHost(domain, dns.TypeA, "") | <mask> func TestSafeSearchCacheGoogle(t *testing.T) {
<mask> d := NewForTest()
<mask> defer d.Destroy()
<mask> domain := "www.google.ru"
<mask> result, err := d.CheckHost(domain, dns.TypeA)
<mask> if err != nil {
<mask> t.Fatalf("Cannot check host due to %s", err)
<mask> }
<mask> if result.IP != nil {... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
result, err = d.CheckHost(domain, dns.TypeA, "") | <mask> ip = i
<mask> }
<mask> }
<mask>
<mask> result, err = d.CheckHost(domain, dns.TypeA)
<mask> if err != nil {
<mask> t.Fatalf("CheckHost for safesearh domain %s failed cause %s", domain, err)
<mask> }
<mask>
<mask> if result.IP.String() != ip.String() {
</s> + dnsfilter: use callback functi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
ret, err := d.CheckHost(test.hostname, dns.TypeA, "") | <mask> filters[0] = test.rules
<mask> d := NewForTestFilters(filters)
<mask> defer d.Destroy()
<mask>
<mask> ret, err := d.CheckHost(test.hostname, dns.TypeA)
<mask> if err != nil {
<mask> t.Errorf("Error while matching host %s: %s", test.hostname, err)
<mask> }
<mask> if ret.IsFilter... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
ret, err := d.CheckHost(hostname, dns.TypeA, "") | <mask> defer d.Destroy()
<mask> d.SafeBrowsingEnabled = true
<mask> for n := 0; n < b.N; n++ {
<mask> hostname := "wmconvirus.narod.ru"
<mask> ret, err := d.CheckHost(hostname, dns.TypeA)
<mask> if err != nil {
<mask> b.Errorf("Error while matching host %s: %s", hostname, err)
<mask> }
<mask> i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
ret, err := d.CheckHost(hostname, dns.TypeA, "") | <mask> d.SafeBrowsingEnabled = true
<mask> b.RunParallel(func(pb *testing.PB) {
<mask> for pb.Next() {
<mask> hostname := "wmconvirus.narod.ru"
<mask> ret, err := d.CheckHost(hostname, dns.TypeA)
<mask> if err != nil {
<mask> b.Errorf("Error while matching host %s: %s", hostname, err)
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsfilter/dnsfilter_test.go |
clientAddr := ""
if d.Addr != nil {
clientAddr, _, _ = net.SplitHostPort(d.Addr.String())
}
res, err = dnsFilter.CheckHost(host, d.Req.Question[0].Qtype, clientAddr) | <mask>
<mask> var res dnsfilter.Result
<mask> var err error
<mask>
<mask> res, err = dnsFilter.CheckHost(host, d.Req.Question[0].Qtype)
<mask> if err != nil {
<mask> // Return immediately if there's an error
<mask> return nil, errorx.Decorate(err, "dnsfilter failed to check host '%s'", host)
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8bf76c331d8a5244cd760bff5d7ed249de79478e | dnsforward/dnsforward.go |
// configure config filename
initConfigFilename(args) | <mask> // run initializes configuration and runs the AdGuard Home
<mask> // run is a blocking method!
<mask> // nolint
<mask> func run(args options) {
<mask> // config file path can be overridden by command-line arguments:
<mask> if args.configFilename != "" {
<mask> Context.configFilename = args.configFilen... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c411c463030e0188a27c85db5ad545ab442cce8 | home/home.go |
func initConfigFilename(args options) {
// config file path can be overridden by command-line arguments:
if args.configFilename != "" {
Context.configFilename = args.configFilename
} else {
// Default config file name
Context.configFilename = "AdGuardHome.yaml"
}
}
| <mask> }
<mask>
<mask> // initWorkingDir initializes the workDir
<mask> // if no command-line arguments specified, we use the directory where our binary file is located
<mask> func initWorkingDir(args options) {
<mask> execPath, err := os.Executable()
</s> 2128 + service: Detect config file on service run corr... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c411c463030e0188a27c85db5ad545ab442cce8 | home/home.go |
initConfigFilename(opts)
initWorkingDir(opts) | <mask> log.Fatalf("Failed to run service: %s", err)
<mask> }
<mask> } else if action == "install" {
<mask> handleServiceInstallCommand(s)
<mask> } else if action == "uninstall" {
<mask> handleServiceUninstallCommand(s)
<mask> } else {
<mask> err = svcAction(s, action)
</s> 2128 + service: Detect ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c411c463030e0188a27c85db5ad545ab442cce8 | home/service.go |
func (d *DNSFilter) ApplyBlockedServices(setts *FilteringSettings, list []string, global bool) { | <mask> return ok
<mask> }
<mask>
<mask> // ApplyBlockedServices - set blocked services settings for this DNS request
<mask> func (d *DNSFilter) ApplyBlockedServices(setts *RequestFilteringSettings, list []string, global bool) {
<mask> setts.ServicesRules = []ServiceEntry{}
<mask> if global {
<mask> d.conf... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/blocked.go |
// FilteringSettings are custom filtering settings for a client.
type FilteringSettings struct { | <mask> Name string
<mask> Rules []*rules.NetworkRule
<mask> }
<mask>
<mask> // RequestFilteringSettings is custom filtering settings
<mask> type RequestFilteringSettings struct {
<mask> FilteringEnabled bool
<mask> SafeSearchEnabled bool
<mask> SafeBrowsingEnabled bool
<mask> ParentalEnabled ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
FilteringEnabled bool
SafeSearchEnabled bool
SafeBrowsingEnabled bool
ParentalEnabled bool | <mask> ClientTags []string
<mask>
<mask> ServicesRules []ServiceEntry
<mask> }
<mask>
<mask> // Resolver is the interface for net.Resolver to simplify testing.
<mask> type Resolver interface {
</s> Pull request: all: imp code, decr cyclo
Updates #2646.
Squashed commit of the following:
commit c83c230f3d2... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
type hostChecker struct {
check func(host string, qtype uint16, setts *FilteringSettings) (res Result, err error)
name string
}
| <mask> }
<mask>
<mask> // DNSFilter matches hostnames and DNS requests against filtering rules.
<mask> type DNSFilter struct {
<mask> rulesStorage *filterlist.RuleStorage
<mask> filteringEngine *urlfilter.DNSEngine
<mask> rulesStorageAllow *filterlist.RuleStorage
<mask> filteringEngineAllow... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
hostCheckers []hostChecker | <mask> //
<mask> // TODO(e.burkov): Use upstream that configured in dnsforward instead.
<mask> resolver Resolver
<mask> }
<mask>
<mask> // Filter represents a filter list
<mask> type Filter struct {
</s> Pull request: all: imp code, decr cyclo
Updates #2646.
Squashed commit of the following:
commit c83c2... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
func (d *DNSFilter) GetConfig() FilteringSettings {
c := FilteringSettings{} | <mask> return false
<mask> }
<mask>
<mask> // GetConfig - get configuration
<mask> func (d *DNSFilter) GetConfig() RequestFilteringSettings {
<mask> c := RequestFilteringSettings{}
<mask> // d.confLock.RLock()
<mask> c.SafeSearchEnabled = d.Config.SafeSearchEnabled
<mask> c.SafeBrowsingEnabled = d.Config... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
func (d *DNSFilter) CheckHostRules(host string, qtype uint16, setts *FilteringSettings) (Result, error) { | <mask> return r != NotFilteredNotFound
<mask> }
<mask>
<mask> // CheckHostRules tries to match the host against filtering rules only.
<mask> func (d *DNSFilter) CheckHostRules(host string, qtype uint16, setts *RequestFilteringSettings) (Result, error) {
<mask> if !setts.FilteringEnabled {
<mask> return Resu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
return d.matchHost(host, qtype, setts) | <mask> if !setts.FilteringEnabled {
<mask> return Result{}, nil
<mask> }
<mask>
<mask> return d.matchHost(host, qtype, *setts)
<mask> }
<mask>
<mask> // CheckHost tries to match the host against filtering rules, then
<mask> // safebrowsing and parental control rules, if they are enabled.
<mask> func (d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
// CheckHost tries to match the host against filtering rules, then safebrowsing
// and parental control rules, if they are enabled.
func (d *DNSFilter) CheckHost(
host string,
qtype uint16,
setts *FilteringSettings,
) (res Result, err error) {
// Sometimes clients try to resolve ".", which is a request to get root
... | <mask>
<mask> return d.matchHost(host, qtype, *setts)
<mask> }
<mask>
<mask> // CheckHost tries to match the host against filtering rules, then
<mask> // safebrowsing and parental control rules, if they are enabled.
<mask> func (d *DNSFilter) CheckHost(host string, qtype uint16, setts *RequestFilteringSetting... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
<mask> // sometimes DNS clients will try to resolve ".", which is a request to get root servers
<mask> if host == "" {
<mask> return Result{Reason: NotFilteredNotFound}, nil
<mask> }
<mask> host = strings.ToLower(host)
<mask>
<mask> var result Result
<mask> var err error
<mask>
<mask> // first - ch... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
... | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go | |
host = strings.ToLower(host) | <mask> return result, nil
<mask> }
<mask> }
<mask>
<mask> if setts.FilteringEnabled {
<mask> result, err = d.matchHost(host, qtype, *setts)
<mask> if err != nil {
<mask> return result, err
<mask> }
<mask> if result.Reason.Matched() {
<mask> return result, nil
<mask> }
<mask> }
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
res = d.processRewrites(host, qtype)
if res.Reason == Rewritten {
return res, nil | <mask> return result, nil
<mask> }
<mask> }
<mask>
<mask> // parental control web service
<mask> if setts.ParentalEnabled {
<mask> result, err = d.checkParental(host)
<mask> if err != nil {
<mask> log.Printf("Parental: failed: %v", err)
<mask> return Result{}, nil
<mask> }
<mask> if r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
for _, hc := range d.hostCheckers {
res, err = hc.check(host, qtype, setts) | <mask> return result, nil
<mask> }
<mask> }
<mask>
<mask> // apply safe search if needed
<mask> if setts.SafeSearchEnabled {
<mask> result, err = d.checkSafeSearch(host)
<mask> if err != nil {
<mask> log.Info("SafeSearch: failed: %v", err)
<mask> return Result{}, nil
<mask> }
<mask>
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
return Result{}, fmt.Errorf("%s: %w", hc.name, err) | <mask> // apply safe search if needed
<mask> if setts.SafeSearchEnabled {
<mask> result, err = d.checkSafeSearch(host)
<mask> if err != nil {
<mask> log.Info("SafeSearch: failed: %v", err)
<mask> return Result{}, nil
<mask> }
<mask>
<mask> if result.Reason.Matched() {
<mask> return result,... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
if res.Reason.Matched() {
return res, nil | <mask> log.Info("SafeSearch: failed: %v", err)
<mask> return Result{}, nil
<mask> }
<mask>
<mask> if result.Reason.Matched() {
<mask> return result, nil
<mask> }
<mask> }
<mask>
<mask> return Result{}, nil
<mask> }
</s> Pull request: all: imp code, decr cyclo
Updates #2646.
Squashed com... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
// checkAutoHosts compares the host against our autohosts table. The err is
// always nil, it is only there to make this a valid hostChecker function.
func (d *DNSFilter) checkAutoHosts(
host string,
qtype uint16,
_ *FilteringSettings,
) (res Result, err error) {
if d.Config.AutoHosts == nil {
return Result{}, n... | <mask>
<mask> return Result{}, nil
<mask> }
<mask>
<mask> func (d *DNSFilter) checkAutoHosts(host string, qtype uint16, result *Result) (matched bool) {
<mask> ips := d.Config.AutoHosts.Process(host, qtype)
<mask> if ips != nil {
<mask> result.Reason = RewrittenAutoHosts
<mask> result.IPList = ips
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
res = Result{
Reason: RewrittenAutoHosts,
IPList: ips,
} | <mask>
<mask> func (d *DNSFilter) checkAutoHosts(host string, qtype uint16, result *Result) (matched bool) {
<mask> ips := d.Config.AutoHosts.Process(host, qtype)
<mask> if ips != nil {
<mask> result.Reason = RewrittenAutoHosts
<mask> result.IPList = ips
<mask>
<mask> return true
<mask> }
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
return res, nil | <mask> if ips != nil {
<mask> result.Reason = RewrittenAutoHosts
<mask> result.IPList = ips
<mask>
<mask> return true
<mask> }
<mask>
<mask> revHosts := d.Config.AutoHosts.ProcessReverse(host, qtype)
<mask> if len(revHosts) != 0 {
<mask> result.Reason = RewrittenAutoHosts
</s> Pull request: all... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
res = Result{
Reason: RewrittenAutoHosts,
} | <mask> }
<mask>
<mask> revHosts := d.Config.AutoHosts.ProcessReverse(host, qtype)
<mask> if len(revHosts) != 0 {
<mask> result.Reason = RewrittenAutoHosts
<mask>
<mask> // TODO(a.garipov): Optimize this with a buffer.
<mask> result.ReverseHosts = make([]string, len(revHosts))
<mask> for i := range... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
res.ReverseHosts = make([]string, len(revHosts)) | <mask> if len(revHosts) != 0 {
<mask> result.Reason = RewrittenAutoHosts
<mask>
<mask> // TODO(a.garipov): Optimize this with a buffer.
<mask> result.ReverseHosts = make([]string, len(revHosts))
<mask> for i := range revHosts {
<mask> result.ReverseHosts[i] = revHosts[i] + "."
<mask> }
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
res.ReverseHosts[i] = revHosts[i] + "." | <mask>
<mask> // TODO(a.garipov): Optimize this with a buffer.
<mask> result.ReverseHosts = make([]string, len(revHosts))
<mask> for i := range revHosts {
<mask> result.ReverseHosts[i] = revHosts[i] + "."
<mask> }
<mask>
<mask> return true
<mask> }
<mask>
</s> Pull request: all: imp code, de... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
return res, nil | <mask> for i := range revHosts {
<mask> result.ReverseHosts[i] = revHosts[i] + "."
<mask> }
<mask>
<mask> return true
<mask> }
<mask>
<mask> return false
<mask> }
<mask>
</s> Pull request: all: imp code, decr cyclo
Updates #2646.
Squashed commit of the following:
commit c83c230f3d2c542d7b1a4... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
return Result{}, nil | <mask>
<mask> return true
<mask> }
<mask>
<mask> return false
<mask> }
<mask>
<mask> // Process rewrites table
<mask> // . Find CNAME for a domain name (exact match or by wildcard)
<mask> // . if found and CNAME equals to domain name - this is an exception; exit
</s> Pull request: all: imp code, dec... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
// matchBlockedServicesRules checks the host against the blocked services rules
// in settings, if any. The err is always nil, it is only there to make this
// a valid hostChecker function.
func matchBlockedServicesRules(
host string,
_ uint16,
setts *FilteringSettings,
) (res Result, err error) {
svcs := setts.Se... | <mask>
<mask> return res
<mask> }
<mask>
<mask> func matchBlockedServicesRules(host string, svcs []ServiceEntry) Result {
<mask> req := rules.NewRequestForHostname(host)
<mask> res := Result{}
<mask>
<mask> for _, s := range svcs {
<mask> for _, rule := range s.Rules {
<mask> if rule.Match(req) {... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
req := rules.NewRequestForHostname(host) | <mask> }
<mask>
<mask> for _, s := range svcs {
<mask> for _, rule := range s.Rules {
<mask> if rule.Match(req) {
<mask> res.Reason = FilteredBlockedService
</s> Pull request: all: imp code, decr cyclo
Updates #2646.
Squashed commit of the following:
commit c83c230f3d2c542d7b1a4bc0e1c503d5bbc16cb8... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
return res, nil | <mask>
<mask> log.Debug("blocked services: matched rule: %s host: %s service: %s",
<mask> ruleText, host, s.Name)
<mask>
<mask> return res
<mask> }
<mask> }
<mask> }
<mask> return res
<mask> }
</s> Pull request: all: imp code, decr cyclo
Updates #2646.
Squashed commit of the followi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
return res, nil | <mask> return res
<mask> }
<mask> }
<mask> }
<mask> return res
<mask> }
<mask>
<mask> //
<mask> // Adding rule and matching against the rules
<mask> //
</s> Pull request: all: imp code, decr cyclo
Updates #2646.
Squashed commit of the following:
commit c83c230f3d2c542d7b1a4bc0e1c503d5bbc16cb8
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
func (d *DNSFilter) matchHost(
host string,
qtype uint16,
setts *FilteringSettings,
) (res Result, err error) {
if !setts.FilteringEnabled {
return Result{}, nil
}
| <mask> }
<mask>
<mask> // matchHost is a low-level way to check only if hostname is filtered by rules,
<mask> // skipping expensive safebrowsing and parental lookups.
<mask> func (d *DNSFilter) matchHost(host string, qtype uint16, setts RequestFilteringSettings) (res Result, err error) {
<mask> d.engineLock.RLo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter.go |
var setts FilteringSettings | <mask> func TestMain(m *testing.M) {
<mask> aghtest.DiscardLogOutput(m)
<mask> }
<mask>
<mask> var setts RequestFilteringSettings
<mask>
<mask> // Helpers.
<mask>
<mask> func purgeCaches() {
<mask> for _, c := range []cache.Cache{
</s> Pull request: all: imp code, decr cyclo
Updates #2646.
Squashed co... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter_test.go |
setts = FilteringSettings{ | <mask> }
<mask> }
<mask>
<mask> func newForTest(c *Config, filters []Filter) *DNSFilter {
<mask> setts = RequestFilteringSettings{
<mask> FilteringEnabled: true,
<mask> }
<mask> setts.FilteringEnabled = true
<mask> if c != nil {
<mask> c.SafeBrowsingCacheSize = 10000
</s> Pull request: all: imp cod... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter_test.go |
func applyClientSettings(setts *FilteringSettings) { | <mask> }
<mask>
<mask> // Client Settings.
<mask>
<mask> func applyClientSettings(setts *RequestFilteringSettings) {
<mask> setts.FilteringEnabled = false
<mask> setts.ParentalEnabled = false
<mask> setts.SafeBrowsingEnabled = true
<mask>
<mask> rule, _ := rules.NewNetworkRule("||facebook.com^", 0)
</... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/8c735d0dd5c2158e2230fa12a140e27960f89e0b | internal/dnsfilter/dnsfilter_test.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.