docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
wantErr: nil,
<mask> want: []string{fp1, path.Join(dir0, dir1, "*")}, <mask> paths: []string{fp1, path.Join(dir0, dir1)}, <mask> }, { <mask> name: "non-existing", <mask> wantErr: fs.ErrNotExist, <mask> want: nil, <mask> paths: []string{path.Join(dir0, "file_3")}, <mask> }} <mask> <mask> for _, tc := range testCases { </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove name: "whole_dir", paths: []string{dirname}, wantErr: nil, wantPatterns: []string{path.Join(dirname, "*")}, </s> add wantErr: nil, name: "whole_dir", paths: []string{dirname}, </s> remove name: "non-existent_file", paths: []string{path.Join(dirname, filename+"2")}, wantErr: fs.ErrNotExist, wantPatterns: nil, </s> add wantErr: ErrNoHostsPaths, name: "non-existent_file", paths: []string{path.Join(dirname, filename+"2")}, </s> remove name: "no_files", paths: []string{}, wantErr: errNoPaths, wantPatterns: nil, </s> add wantErr: ErrNoHostsPaths, name: "no_files", paths: []string{}, </s> remove name: "one_file", paths: []string{p}, wantErr: nil, wantPatterns: []string{p}, </s> add wantErr: nil, name: "one_file", paths: []string{p}, </s> remove name string paths []string wantErr error wantPatterns []string </s> add wantErr error name string paths []string
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/aghnet/hostscontainer_test.go
t.Run("bad_file", func(t *testing.T) { const errStat errors.Error = "bad file" badFS := &aghtest.StatFS{ OnStat: func(name string) (fs.FileInfo, error) { return nil, errStat }, } _, err := pathsToPatterns(badFS, []string{""}) assert.ErrorIs(t, err, errStat) })
<mask> <mask> assert.Equal(t, tc.want, patterns) <mask> }) <mask> } <mask> } <mask> <mask> func TestUniqueRules_AddPair(t *testing.T) { <mask> knownIP := net.IP{1, 2, 3, 4} <mask> </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove t.Cleanup(func() { require.ErrorIs(t, hc.Close(), closeCalled) }) </s> add </s> remove const closeCalled errors.Error = "close method called" // fsWatcherOnCloseStub is a stub implementation of the Close method of // aghos.FSWatcher. func fsWatcherOnCloseStub() (err error) { return closeCalled } </s> add </s> remove OnClose: fsWatcherOnCloseStub, </s> add OnClose: func() (err error) { panic("not implemented") }, </s> remove assert.Equal(t, tc.wantPatterns, hc.patterns) </s> add </s> remove require.ErrorIs(t, hc.Close(), closeCalled) </s> add
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/aghnet/hostscontainer_test.go
// // TODO(e.burkov): Make it accept non-existing files to detect it's creating.
<mask> } <mask> <mask> // Add implements the FSWatcher interface for *osWatcher. <mask> func (w *osWatcher) Add(name string) (err error) { <mask> defer func() { err = errors.Annotate(err, "%s: %w", osWatcherPref) }() <mask> <mask> if _, err = fs.Stat(RootDirFS(), name); err != nil { <mask> return fmt.Errorf("checking file %q: %w", name, err) <mask> } </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove return nil, errNoPaths </s> add return nil, ErrNoHostsPaths </s> remove // Close implements the io.Closer interface for *HostsContainer. </s> add // Close implements the io.Closer interface for *HostsContainer. Close must // only be called once. The returned err is always nil. </s> remove res, ok = hc.engine.MatchRequest(req) return res, ok </s> add return hc.engine.MatchRequest(req) </s> remove return errors.Annotate(hc.w.Close(), "%s: closing: %w", hostsContainerPref) </s> add close(hc.done) return nil </s> remove err = w.Add(p) if err == nil { continue } else if errors.Is(err, fs.ErrNotExist) { log.Debug("%s: file %q expected to exist but doesn't", hostsContainerPref, p) </s> add if err = w.Add(p); err != nil { if !errors.Is(err, fs.ErrNotExist) { return nil, fmt.Errorf("adding path: %w", err) }
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/aghos/fswatcher.go
<mask> ::1 localhost#comment <mask> `)}, <mask> } <mask> <mask> const closeCalled errors.Error = "close method called" <mask> <mask> var eventsCalledCounter uint32 <mask> hc, err := aghnet.NewHostsContainer(testFS, &aghtest.FSWatcher{ <mask> OnEvents: func() (e <-chan struct{}) { <mask> assert.Equal(t, uint32(1), atomic.AddUint32(&eventsCalledCounter, 1)) <mask> </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove const closeCalled errors.Error = "close method called" // fsWatcherOnCloseStub is a stub implementation of the Close method of // aghos.FSWatcher. func fsWatcherOnCloseStub() (err error) { return closeCalled } </s> add </s> remove OnClose: fsWatcherOnCloseStub, </s> add OnClose: func() (err error) { panic("not implemented") }, </s> remove OnClose: func() (err error) { return closeCalled }, </s> add OnClose: func() (err error) { panic("not implemented") }, </s> remove require.ErrorIs(t, hc.Close(), closeCalled) </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/dnsforward/dnsforward_test.go
OnClose: func() (err error) { panic("not implemented") },
<mask> assert.Equal(t, hostsFilename, name) <mask> <mask> return nil <mask> }, <mask> OnClose: func() (err error) { return closeCalled }, <mask> }, hostsFilename) <mask> require.NoError(t, err) <mask> t.Cleanup(func() { <mask> assert.Equal(t, uint32(1), atomic.LoadUint32(&eventsCalledCounter)) <mask> </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove require.ErrorIs(t, hc.Close(), closeCalled) </s> add </s> remove OnClose: fsWatcherOnCloseStub, </s> add OnClose: func() (err error) { panic("not implemented") }, </s> remove OnClose: fsWatcherOnCloseStub, </s> add OnClose: func() (err error) { panic("not implemented") }, </s> remove t.Cleanup(func() { require.ErrorIs(t, hc.Close(), closeCalled) }) </s> add </s> remove OnClose: fsWatcherOnCloseStub, </s> add OnClose: func() (err error) { panic("not implemented") },
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/dnsforward/dnsforward_test.go
<mask> }, hostsFilename) <mask> require.NoError(t, err) <mask> t.Cleanup(func() { <mask> assert.Equal(t, uint32(1), atomic.LoadUint32(&eventsCalledCounter)) <mask> <mask> require.ErrorIs(t, hc.Close(), closeCalled) <mask> }) <mask> <mask> flt := filtering.New(&filtering.Config{ <mask> EtcHosts: hc, <mask> }, nil) </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove OnClose: func() (err error) { return closeCalled }, </s> add OnClose: func() (err error) { panic("not implemented") }, </s> remove OnClose: fsWatcherOnCloseStub, </s> add OnClose: func() (err error) { panic("not implemented") }, </s> remove OnClose: fsWatcherOnCloseStub, </s> add OnClose: func() (err error) { panic("not implemented") }, </s> remove t.Cleanup(func() { require.ErrorIs(t, hc.Close(), closeCalled) }) </s> add </s> remove t.Cleanup(func() { require.ErrorIs(t, hc.Close(), closeCalled) }) </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/dnsforward/dnsforward_test.go
// hostsWatcher is the watcher to detect changes in the hosts files. hostsWatcher aghos.FSWatcher updater *updater.Updater
<mask> tls *TLSMod // TLS module <mask> // etcHosts is an IP-hostname pairs set taken from system configuration <mask> // (e.g. /etc/hosts) files. <mask> etcHosts *aghnet.HostsContainer <mask> updater *updater.Updater <mask> <mask> subnetDetector *aghnet.SubnetDetector <mask> <mask> // mux is our custom http.ServeMux. <mask> mux *http.ServeMux </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove // errNoPaths is returned when there are no paths to watch passed to the // HostsContainer. const errNoPaths errors.Error = "hosts paths are empty" </s> add // ErrNoHostsPaths is returned when there are no valid paths to watch passed to // the HostsContainer. const ErrNoHostsPaths errors.Error = "no valid paths to hosts files provided" </s> remove // Close implements the io.Closer interface for *HostsContainer. </s> add // Close implements the io.Closer interface for *HostsContainer. Close must // only be called once. The returned err is always nil.
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/home/home.go
if err = setupHostsContainer(); err != nil { return err
<mask> ConfName: config.getConfigFilename(), <mask> }) <mask> <mask> if !args.noEtcHosts { <mask> var osWritesWatcher aghos.FSWatcher <mask> osWritesWatcher, err = aghos.NewOSWritesWatcher() <mask> if err != nil { <mask> return fmt.Errorf("initing os watcher: %w", err) <mask> } <mask> <mask> Context.etcHosts, err = aghnet.NewHostsContainer( <mask> aghos.RootDirFS(), <mask> osWritesWatcher, <mask> aghnet.DefaultHostsPaths()..., <mask> ) <mask> if err != nil { <mask> return fmt.Errorf("initing hosts container: %w", err) <mask> } <mask> } <mask> Context.clients.Init(config.Clients, Context.dhcpServer, Context.etcHosts) <mask> config.Clients = nil <mask> </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove log.Error("stopping hosts container: %s", err) </s> add log.Error("closing hosts container: %s", err) </s> remove err = w.Add(p) if err == nil { continue } else if errors.Is(err, fs.ErrNotExist) { log.Debug("%s: file %q expected to exist but doesn't", hostsContainerPref, p) </s> add if err = w.Add(p); err != nil { if !errors.Is(err, fs.ErrNotExist) { return nil, fmt.Errorf("adding path: %w", err) } </s> remove return nil, errNoPaths </s> add return nil, ErrNoHostsPaths </s> remove if fi, err = fs.Stat(fsys, p); err != nil { return nil, fmt.Errorf("%q at index %d: %w", p, i, err) </s> add fi, err = fs.Stat(fsys, p) if err != nil { if errors.Is(err, fs.ErrNotExist) { continue } // Don't put a filename here since it's already added by fs.Stat. return nil, fmt.Errorf("path at index %d: %w", i, err)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/home/home.go
// Currently Context.hostsWatcher is only used in Context.etcHosts and // needs closing only in case of the successful initialization of // Context.etcHosts. if err = Context.hostsWatcher.Close(); err != nil { log.Error("closing hosts watcher: %s", err) }
<mask> <mask> if Context.etcHosts != nil { <mask> if err = Context.etcHosts.Close(); err != nil { <mask> log.Error("closing hosts container: %s", err) <mask> } <mask> } </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove log.Error("stopping hosts container: %s", err) </s> add log.Error("closing hosts container: %s", err) </s> remove var osWritesWatcher aghos.FSWatcher osWritesWatcher, err = aghos.NewOSWritesWatcher() if err != nil { return fmt.Errorf("initing os watcher: %w", err) } Context.etcHosts, err = aghnet.NewHostsContainer( aghos.RootDirFS(), osWritesWatcher, aghnet.DefaultHostsPaths()..., ) if err != nil { return fmt.Errorf("initing hosts container: %w", err) </s> add if err = setupHostsContainer(); err != nil { return err </s> remove for range hc.w.Events() { if err := hc.refresh(); err != nil { log.Error("%s: %s", hostsContainerPref, err) </s> add ok, eventsCh := true, hc.w.Events() for ok { select { case _, ok = <-eventsCh: if !ok { log.Debug("%s: watcher closed the events channel", hostsContainerPref) continue } if err := hc.refresh(); err != nil { log.Error("%s: %s", hostsContainerPref, err) } case _, ok = <-hc.done: // Go on. </s> remove err = w.Add(p) if err == nil { continue } else if errors.Is(err, fs.ErrNotExist) { log.Debug("%s: file %q expected to exist but doesn't", hostsContainerPref, p) </s> add if err = w.Add(p); err != nil { if !errors.Is(err, fs.ErrNotExist) { return nil, fmt.Errorf("adding path: %w", err) } </s> remove patterns, err := pathsToPatterns(fsys, paths) </s> add var patterns []string patterns, err = pathsToPatterns(fsys, paths)
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/home/home.go
log.Error("closing hosts container: %s", err)
<mask> } <mask> <mask> if Context.etcHosts != nil { <mask> if err = Context.etcHosts.Close(); err != nil { <mask> log.Error("stopping hosts container: %s", err) <mask> } <mask> } <mask> <mask> if Context.tls != nil { <mask> Context.tls.Close() </s> Pull request: 3845 hosts fatality Merge in DNS/adguard-home from 3845-hosts-fatality to master Updates #3845. Squashed commit of the following: commit 1447efcc4066e0226feaebde01fcc632cb7b7432 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 17:14:35 2021 +0300 home: imp readability commit e934499072e983e1111b6c976eb93e1d6017981b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:35:10 2021 +0300 aghnet: imp more commit ed9995ee52bd9ec3fa130f3f56989619184a6669 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Nov 17 13:05:56 2021 +0300 all: imp docs, code commit 7b0718a1a4a58a4fd5f1ba24c33792b0610c334f Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Tue Nov 16 20:32:24 2021 +0300 all: reduce hosts container fatality </s> remove var osWritesWatcher aghos.FSWatcher osWritesWatcher, err = aghos.NewOSWritesWatcher() if err != nil { return fmt.Errorf("initing os watcher: %w", err) } Context.etcHosts, err = aghnet.NewHostsContainer( aghos.RootDirFS(), osWritesWatcher, aghnet.DefaultHostsPaths()..., ) if err != nil { return fmt.Errorf("initing hosts container: %w", err) </s> add if err = setupHostsContainer(); err != nil { return err </s> remove for range hc.w.Events() { if err := hc.refresh(); err != nil { log.Error("%s: %s", hostsContainerPref, err) </s> add ok, eventsCh := true, hc.w.Events() for ok { select { case _, ok = <-eventsCh: if !ok { log.Debug("%s: watcher closed the events channel", hostsContainerPref) continue } if err := hc.refresh(); err != nil { log.Error("%s: %s", hostsContainerPref, err) } case _, ok = <-hc.done: // Go on. </s> remove err = w.Add(p) if err == nil { continue } else if errors.Is(err, fs.ErrNotExist) { log.Debug("%s: file %q expected to exist but doesn't", hostsContainerPref, p) </s> add if err = w.Add(p); err != nil { if !errors.Is(err, fs.ErrNotExist) { return nil, fmt.Errorf("adding path: %w", err) } </s> remove patterns, err := pathsToPatterns(fsys, paths) </s> add var patterns []string patterns, err = pathsToPatterns(fsys, paths)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bac4b3db2416e05d5d6100e2815b806196fcc9b
internal/home/home.go
import ( "github.com/miekg/dns" "golang.org/x/net/context" "net" "strings" ) // Detects the upstream type from the specified url and creates a proper Upstream object func NewUpstream(url string, bootstrap string) (Upstream, error) { proto := "udp" prefix := "" switch { case strings.HasPrefix(url, "tcp://"): proto = "tcp" prefix = "tcp://" case strings.HasPrefix(url, "tls://"): proto = "tcp-tls" prefix = "tls://" case strings.HasPrefix(url, "https://"): return NewHttpsUpstream(url, bootstrap) } hostname := strings.TrimPrefix(url, prefix) host, port, err := net.SplitHostPort(hostname) if err != nil { // Set port depending on the protocol switch proto { case "udp": port = "53" case "tcp": port = "53" case "tcp-tls": port = "853" } // Set host = hostname host = hostname } // Try to resolve the host address (or check if it's an IP address) bootstrapResolver := CreateResolver(bootstrap) ips, err := bootstrapResolver.LookupIPAddr(context.Background(), host) if err != nil || len(ips) == 0 { return nil, err } addr := ips[0].String() endpoint := net.JoinHostPort(addr, port) tlsServerName := "" if proto == "tcp-tls" && host != addr { // Check if we need to specify TLS server name tlsServerName = host } return NewDnsUpstream(endpoint, proto, tlsServerName) } func CreateResolver(bootstrap string) *net.Resolver { bootstrapResolver := net.DefaultResolver if bootstrap != "" { bootstrapResolver = &net.Resolver{ PreferGo: true, Dial: func(ctx context.Context, network, address string) (net.Conn, error) { var d net.Dialer conn, err := d.DialContext(ctx, network, bootstrap) return conn, err }, } } return bootstrapResolver }
<mask> package upstream <mask> <mask> import "github.com/miekg/dns" <mask> <mask> // Performs a simple health-check of the specified upstream <mask> func IsAlive(u Upstream) (bool, error) { <mask> <mask> // Using ipv4only.arpa. domain as it is a part of DNS64 RFC and it should exist everywhere </s> Added factory method for creating DNS upstreams </s> remove // NewHttpsUpstream creates a new DNS-over-HTTPS upstream from hostname </s> add // NewHttpsUpstream creates a new DNS-over-HTTPS upstream from the specified url </s> remove bootstrapResolver := net.DefaultResolver if bootstrap != "" { bootstrapResolver = &net.Resolver{ PreferGo: true, Dial: func(ctx context.Context, network, address string) (net.Conn, error) { var d net.Dialer conn, err := d.DialContext(ctx, network, bootstrap) return conn, err }, } } </s> add bootstrapResolver := CreateResolver(bootstrap) </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, // TODO: status 201?? </s> add {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, </s> remove endpoint string proto string </s> add url string bootstrap string
[ "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/helpers.go
// NewHttpsUpstream creates a new DNS-over-HTTPS upstream from the specified url
<mask> client *http.Client <mask> endpoint *url.URL <mask> } <mask> <mask> // NewHttpsUpstream creates a new DNS-over-HTTPS upstream from hostname <mask> func NewHttpsUpstream(endpoint string, bootstrap string) (Upstream, error) { <mask> u, err := url.Parse(endpoint) <mask> if err != nil { <mask> return nil, err <mask> } </s> Added factory method for creating DNS upstreams </s> remove import "github.com/miekg/dns" </s> add import ( "github.com/miekg/dns" "golang.org/x/net/context" "net" "strings" ) // Detects the upstream type from the specified url and creates a proper Upstream object func NewUpstream(url string, bootstrap string) (Upstream, error) { proto := "udp" prefix := "" switch { case strings.HasPrefix(url, "tcp://"): proto = "tcp" prefix = "tcp://" case strings.HasPrefix(url, "tls://"): proto = "tcp-tls" prefix = "tls://" case strings.HasPrefix(url, "https://"): return NewHttpsUpstream(url, bootstrap) } hostname := strings.TrimPrefix(url, prefix) host, port, err := net.SplitHostPort(hostname) if err != nil { // Set port depending on the protocol switch proto { case "udp": port = "53" case "tcp": port = "53" case "tcp-tls": port = "853" } // Set host = hostname host = hostname } // Try to resolve the host address (or check if it's an IP address) bootstrapResolver := CreateResolver(bootstrap) ips, err := bootstrapResolver.LookupIPAddr(context.Background(), host) if err != nil || len(ips) == 0 { return nil, err } addr := ips[0].String() endpoint := net.JoinHostPort(addr, port) tlsServerName := "" if proto == "tcp-tls" && host != addr { // Check if we need to specify TLS server name tlsServerName = host } return NewDnsUpstream(endpoint, proto, tlsServerName) } func CreateResolver(bootstrap string) *net.Resolver { bootstrapResolver := net.DefaultResolver if bootstrap != "" { bootstrapResolver = &net.Resolver{ PreferGo: true, Dial: func(ctx context.Context, network, address string) (net.Conn, error) { var d net.Dialer conn, err := d.DialContext(ctx, network, bootstrap) return conn, err }, } } return bootstrapResolver } </s> remove bootstrapResolver := net.DefaultResolver if bootstrap != "" { bootstrapResolver = &net.Resolver{ PreferGo: true, Dial: func(ctx context.Context, network, address string) (net.Conn, error) { var d net.Dialer conn, err := d.DialContext(ctx, network, bootstrap) return conn, err }, } } </s> add bootstrapResolver := CreateResolver(bootstrap) </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/https_upstream.go
bootstrapResolver := CreateResolver(bootstrap)
<mask> return nil, err <mask> } <mask> <mask> // Initialize bootstrap resolver <mask> bootstrapResolver := net.DefaultResolver <mask> if bootstrap != "" { <mask> bootstrapResolver = &net.Resolver{ <mask> PreferGo: true, <mask> Dial: func(ctx context.Context, network, address string) (net.Conn, error) { <mask> var d net.Dialer <mask> conn, err := d.DialContext(ctx, network, bootstrap) <mask> return conn, err <mask> }, <mask> } <mask> } <mask> <mask> dialer := &net.Dialer{ <mask> Timeout: defaultTimeout, <mask> KeepAlive: defaultKeepAlive, <mask> DualStack: true, <mask> Resolver: bootstrapResolver, </s> Added factory method for creating DNS upstreams </s> remove import "github.com/miekg/dns" </s> add import ( "github.com/miekg/dns" "golang.org/x/net/context" "net" "strings" ) // Detects the upstream type from the specified url and creates a proper Upstream object func NewUpstream(url string, bootstrap string) (Upstream, error) { proto := "udp" prefix := "" switch { case strings.HasPrefix(url, "tcp://"): proto = "tcp" prefix = "tcp://" case strings.HasPrefix(url, "tls://"): proto = "tcp-tls" prefix = "tls://" case strings.HasPrefix(url, "https://"): return NewHttpsUpstream(url, bootstrap) } hostname := strings.TrimPrefix(url, prefix) host, port, err := net.SplitHostPort(hostname) if err != nil { // Set port depending on the protocol switch proto { case "udp": port = "53" case "tcp": port = "53" case "tcp-tls": port = "853" } // Set host = hostname host = hostname } // Try to resolve the host address (or check if it's an IP address) bootstrapResolver := CreateResolver(bootstrap) ips, err := bootstrapResolver.LookupIPAddr(context.Background(), host) if err != nil || len(ips) == 0 { return nil, err } addr := ips[0].String() endpoint := net.JoinHostPort(addr, port) tlsServerName := "" if proto == "tcp-tls" && host != addr { // Check if we need to specify TLS server name tlsServerName = host } return NewDnsUpstream(endpoint, proto, tlsServerName) } func CreateResolver(bootstrap string) *net.Resolver { bootstrapResolver := net.DefaultResolver if bootstrap != "" { bootstrapResolver = &net.Resolver{ PreferGo: true, Dial: func(ctx context.Context, network, address string) (net.Conn, error) { var d net.Dialer conn, err := d.DialContext(ctx, network, bootstrap) return conn, err }, } } return bootstrapResolver } </s> remove // NewHttpsUpstream creates a new DNS-over-HTTPS upstream from hostname </s> add // NewHttpsUpstream creates a new DNS-over-HTTPS upstream from the specified url </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/https_upstream.go
url string bootstrap string
<mask> <mask> func TestDnsUpstreamIsAlive(t *testing.T) { <mask> <mask> var tests = []struct { <mask> endpoint string <mask> proto string <mask> }{ <mask> {"8.8.8.8:53", "udp"}, <mask> {"8.8.8.8:53", "tcp"}, <mask> {"1.1.1.1:53", "udp"}, <mask> } </s> Added factory method for creating DNS upstreams </s> remove endpoint string proto string </s> add url string bootstrap string </s> remove {"8.8.8.8:53", "udp"}, {"8.8.8.8:53", "tcp"}, {"1.1.1.1:53", "udp"}, </s> add {"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""}, </s> remove {"8.8.8.8:53", "udp"}, {"8.8.8.8:53", "tcp"}, {"1.1.1.1:53", "udp"}, </s> add {"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""}, </s> remove endpoint string tlsServerName string </s> add url string bootstrap string </s> remove endpoint string tlsServerName string </s> add url string bootstrap string
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
{"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""},
<mask> var tests = []struct { <mask> endpoint string <mask> proto string <mask> }{ <mask> {"8.8.8.8:53", "udp"}, <mask> {"8.8.8.8:53", "tcp"}, <mask> {"1.1.1.1:53", "udp"}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewDnsUpstream(test.endpoint, test.proto, "") <mask> </s> Added factory method for creating DNS upstreams </s> remove {"8.8.8.8:53", "udp"}, {"8.8.8.8:53", "tcp"}, {"1.1.1.1:53", "udp"}, </s> add {"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""}, </s> remove endpoint string proto string </s> add url string bootstrap string </s> remove endpoint string proto string </s> add url string bootstrap string </s> remove u, err := NewDnsUpstream(test.endpoint, test.proto, "") </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, test.proto, "") </s> add u, err := NewUpstream(test.url, test.bootstrap)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
u, err := NewUpstream(test.url, test.bootstrap)
<mask> {"1.1.1.1:53", "udp"}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewDnsUpstream(test.endpoint, test.proto, "") <mask> <mask> if err != nil { <mask> t.Errorf("cannot create a DNS upstream") <mask> } <mask> </s> Added factory method for creating DNS upstreams </s> remove u, err := NewDnsUpstream(test.endpoint, test.proto, "") </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove {"8.8.8.8:53", "udp"}, {"8.8.8.8:53", "tcp"}, {"1.1.1.1:53", "udp"}, </s> add {"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""},
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
{"https://doh.cleanbrowsing.org/doh/security-filter/", ""},
<mask> bootstrap string <mask> }{ <mask> {"https://cloudflare-dns.com/dns-query", "8.8.8.8:53"}, <mask> {"https://dns.google.com/experimental", "8.8.8.8:53"}, <mask> {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, // TODO: status 201?? <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewHttpsUpstream(test.url, test.bootstrap) <mask> </s> Added factory method for creating DNS upstreams </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove {"1.1.1.1:853", ""}, {"9.9.9.9:853", ""}, {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, </s> add {"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"}, </s> remove {"1.1.1.1:853", ""}, {"9.9.9.9:853", ""}, {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, </s> add {"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"}, </s> remove {"8.8.8.8:53", "udp"}, {"8.8.8.8:53", "tcp"}, {"1.1.1.1:53", "udp"}, </s> add {"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""},
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
u, err := NewUpstream(test.url, test.bootstrap)
<mask> {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, // TODO: status 201?? <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewHttpsUpstream(test.url, test.bootstrap) <mask> <mask> if err != nil { <mask> t.Errorf("cannot create a DNS-over-HTTPS upstream") <mask> } <mask> </s> Added factory method for creating DNS upstreams </s> remove {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, // TODO: status 201?? </s> add {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, test.proto, "") </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, test.proto, "") </s> add u, err := NewUpstream(test.url, test.bootstrap)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
url string bootstrap string
<mask> <mask> func TestDnsOverTlsIsAlive(t *testing.T) { <mask> <mask> var tests = []struct { <mask> endpoint string <mask> tlsServerName string <mask> }{ <mask> {"1.1.1.1:853", ""}, <mask> {"9.9.9.9:853", ""}, <mask> {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, <mask> } </s> Added factory method for creating DNS upstreams </s> remove endpoint string tlsServerName string </s> add url string bootstrap string </s> remove {"1.1.1.1:853", ""}, {"9.9.9.9:853", ""}, {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, </s> add {"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"}, </s> remove {"1.1.1.1:853", ""}, {"9.9.9.9:853", ""}, {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, </s> add {"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"}, </s> remove endpoint string proto string </s> add url string bootstrap string </s> remove endpoint string proto string </s> add url string bootstrap string
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
{"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"},
<mask> var tests = []struct { <mask> endpoint string <mask> tlsServerName string <mask> }{ <mask> {"1.1.1.1:853", ""}, <mask> {"9.9.9.9:853", ""}, <mask> {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) <mask> </s> Added factory method for creating DNS upstreams </s> remove {"1.1.1.1:853", ""}, {"9.9.9.9:853", ""}, {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, </s> add {"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"}, </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove endpoint string tlsServerName string </s> add url string bootstrap string </s> remove endpoint string tlsServerName string </s> add url string bootstrap string
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
u, err := NewUpstream(test.url, test.bootstrap)
<mask> {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) <mask> <mask> if err != nil { <mask> t.Errorf("cannot create a DNS-over-TLS upstream") <mask> } <mask> </s> Added factory method for creating DNS upstreams </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, test.proto, "") </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, test.proto, "") </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove {"1.1.1.1:853", ""}, {"9.9.9.9:853", ""}, {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, </s> add {"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"},
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
url string bootstrap string
<mask> <mask> func TestDnsUpstream(t *testing.T) { <mask> <mask> var tests = []struct { <mask> endpoint string <mask> proto string <mask> }{ <mask> {"8.8.8.8:53", "udp"}, <mask> {"8.8.8.8:53", "tcp"}, <mask> {"1.1.1.1:53", "udp"}, <mask> } </s> Added factory method for creating DNS upstreams </s> remove endpoint string proto string </s> add url string bootstrap string </s> remove {"8.8.8.8:53", "udp"}, {"8.8.8.8:53", "tcp"}, {"1.1.1.1:53", "udp"}, </s> add {"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""}, </s> remove {"8.8.8.8:53", "udp"}, {"8.8.8.8:53", "tcp"}, {"1.1.1.1:53", "udp"}, </s> add {"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""}, </s> remove endpoint string tlsServerName string </s> add url string bootstrap string </s> remove endpoint string tlsServerName string </s> add url string bootstrap string
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
{"8.8.8.8:53", "8.8.8.8:53"}, {"1.1.1.1", ""}, {"tcp://1.1.1.1:53", ""}, {"176.103.130.130:5353", ""},
<mask> var tests = []struct { <mask> endpoint string <mask> proto string <mask> }{ <mask> {"8.8.8.8:53", "udp"}, <mask> {"8.8.8.8:53", "tcp"}, <mask> {"1.1.1.1:53", "udp"}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewDnsUpstream(test.endpoint, test.proto, "") <mask> </s> Added factory method for creating DNS upstreams
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
u, err := NewUpstream(test.url, test.bootstrap)
<mask> {"1.1.1.1:53", "udp"}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewDnsUpstream(test.endpoint, test.proto, "") <mask> <mask> if err != nil { <mask> t.Errorf("cannot create a DNS upstream") <mask> } <mask> </s> Added factory method for creating DNS upstreams
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
u, err := NewUpstream(test.url, test.bootstrap)
<mask> {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewHttpsUpstream(test.url, test.bootstrap) <mask> <mask> if err != nil { <mask> t.Errorf("cannot create a DNS-over-HTTPS upstream") <mask> } <mask> </s> Added factory method for creating DNS upstreams </s> remove u, err := NewHttpsUpstream(test.url, test.bootstrap) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, // TODO: status 201?? </s> add {"https://doh.cleanbrowsing.org/doh/security-filter/", ""}, </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, test.proto, "") </s> add u, err := NewUpstream(test.url, test.bootstrap) </s> remove u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) </s> add u, err := NewUpstream(test.url, test.bootstrap)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
url string bootstrap string
<mask> <mask> func TestDnsOverTlsUpstream(t *testing.T) { <mask> <mask> var tests = []struct { <mask> endpoint string <mask> tlsServerName string <mask> }{ <mask> {"1.1.1.1:853", ""}, <mask> {"9.9.9.9:853", ""}, <mask> {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, <mask> } </s> Added factory method for creating DNS upstreams </s> remove endpoint string tlsServerName string </s> add url string bootstrap string </s> remove {"1.1.1.1:853", ""}, {"9.9.9.9:853", ""}, {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, </s> add {"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"}, </s> remove {"1.1.1.1:853", ""}, {"9.9.9.9:853", ""}, {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, </s> add {"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"}, </s> remove endpoint string proto string </s> add url string bootstrap string </s> remove endpoint string proto string </s> add url string bootstrap string
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
{"tls://1.1.1.1", ""}, {"tls://9.9.9.9:853", ""}, {"tls://security-filter-dns.cleanbrowsing.org", "8.8.8.8:53"}, {"tls://adult-filter-dns.cleanbrowsing.org:853", "8.8.8.8:53"},
<mask> var tests = []struct { <mask> endpoint string <mask> tlsServerName string <mask> }{ <mask> {"1.1.1.1:853", ""}, <mask> {"9.9.9.9:853", ""}, <mask> {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) <mask> </s> Added factory method for creating DNS upstreams
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
u, err := NewUpstream(test.url, test.bootstrap)
<mask> {"185.228.168.10:853", "security-filter-dns.cleanbrowsing.org"}, <mask> } <mask> <mask> for _, test := range tests { <mask> u, err := NewDnsUpstream(test.endpoint, "tcp-tls", test.tlsServerName) <mask> <mask> if err != nil { <mask> t.Errorf("cannot create a DNS-over-TLS upstream") <mask> } <mask> </s> Added factory method for creating DNS upstreams
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc4bf66edb279f83aa7610894bd3cccaf12e477
upstream/upstream_test.go
hw = []byte{3, 2, 3, 4, 5, 6}
<mask> <mask> p = make(dhcp4.Packet, 241) <mask> <mask> // Reserve an IP <mask> hw = []byte{1, 2, 3, 4, 5, 6} <mask> p.SetCHAddr(hw) <mask> lease, _ = s.reserveLease(p) <mask> check(t, bytes.Equal(lease.HWAddr, hw), "lease.HWAddr") <mask> check(t, bytes.Equal(lease.IP, []byte{1, 1, 1, 1}), "lease.IP") <mask> lease = s.findLease(p) </s> * DHCP: fix and update tests for: + dhcp: handle lease expiration (d68600c5d03b73d94f380f5442c22ddc8f755d9a) </s> remove check(t, lease == nil, "lease == nil") </s> add check(t, bytes.Equal(lease.HWAddr, hw), "lease.HWAddr") check(t, bytes.Equal(lease.IP, []byte{1, 1, 1, 1}), "lease.IP") </s> remove // Reserve an IP - we have no more available IPs p.SetCHAddr([]byte{3, 2, 3, 4, 5, 6}) </s> add // Reserve an IP - we have no more available IPs, // so the first expired (or, in our case, not yet committed) lease is returned hw = []byte{1, 2, 3, 4, 5, 6} p.SetCHAddr(hw)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc5a4570e76873984a4fda21a4d307499b4980a
dhcpd/dhcpd_test.go
// Reserve an IP - we have no more available IPs, // so the first expired (or, in our case, not yet committed) lease is returned hw = []byte{1, 2, 3, 4, 5, 6} p.SetCHAddr(hw)
<mask> lease, _ = s.reserveLease(p) <mask> check(t, bytes.Equal(lease.HWAddr, hw), "lease.HWAddr") <mask> check(t, bytes.Equal(lease.IP, []byte{1, 1, 1, 2}), "lease.IP") <mask> <mask> // Reserve an IP - we have no more available IPs <mask> p.SetCHAddr([]byte{3, 2, 3, 4, 5, 6}) <mask> lease, _ = s.reserveLease(p) <mask> check(t, lease == nil, "lease == nil") <mask> <mask> // Decline request for a lease which doesn't match our internal state <mask> hw = []byte{1, 2, 3, 4, 5, 6} </s> * DHCP: fix and update tests for: + dhcp: handle lease expiration (d68600c5d03b73d94f380f5442c22ddc8f755d9a) </s> remove hw = []byte{1, 2, 3, 4, 5, 6} </s> add hw = []byte{3, 2, 3, 4, 5, 6} </s> remove check(t, lease == nil, "lease == nil") </s> add check(t, bytes.Equal(lease.HWAddr, hw), "lease.HWAddr") check(t, bytes.Equal(lease.IP, []byte{1, 1, 1, 1}), "lease.IP")
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc5a4570e76873984a4fda21a4d307499b4980a
dhcpd/dhcpd_test.go
check(t, bytes.Equal(lease.HWAddr, hw), "lease.HWAddr") check(t, bytes.Equal(lease.IP, []byte{1, 1, 1, 1}), "lease.IP")
<mask> <mask> // Reserve an IP - we have no more available IPs <mask> p.SetCHAddr([]byte{3, 2, 3, 4, 5, 6}) <mask> lease, _ = s.reserveLease(p) <mask> check(t, lease == nil, "lease == nil") <mask> <mask> // Decline request for a lease which doesn't match our internal state <mask> hw = []byte{1, 2, 3, 4, 5, 6} <mask> p.SetCHAddr(hw) <mask> p.SetCIAddr([]byte{0, 0, 0, 0}) </s> * DHCP: fix and update tests for: + dhcp: handle lease expiration (d68600c5d03b73d94f380f5442c22ddc8f755d9a) </s> remove hw = []byte{1, 2, 3, 4, 5, 6} </s> add hw = []byte{3, 2, 3, 4, 5, 6} </s> remove // Reserve an IP - we have no more available IPs p.SetCHAddr([]byte{3, 2, 3, 4, 5, 6}) </s> add // Reserve an IP - we have no more available IPs, // so the first expired (or, in our case, not yet committed) lease is returned hw = []byte{1, 2, 3, 4, 5, 6} p.SetCHAddr(hw)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc5a4570e76873984a4fda21a4d307499b4980a
dhcpd/dhcpd_test.go
// Commit the previously reserved lease #2 hw = []byte{2, 2, 3, 4, 5, 6} p.SetCHAddr(hw) p.SetCIAddr([]byte{0, 0, 0, 0}) opt = make(dhcp4.Options, 10) opt[dhcp4.OptionRequestedIPAddress] = []byte{1, 1, 1, 2} p2 = s.handleDHCP4Request(p, opt) check(t, bytes.Equal(p2.YIAddr(), []byte{1, 1, 1, 2}), "p2.YIAddr") // Reserve an IP - we have no more available IPs hw = []byte{3, 2, 3, 4, 5, 6} p.SetCHAddr(hw) lease, _ = s.reserveLease(p) check(t, lease == nil, "lease == nil")
<mask> check(t, bytes.Equal(opt[dhcp4.OptionServerIdentifier], s.ipnet.IP), "OptionServerIdentifier") <mask> <mask> s.reset() <mask> misc(t, &s) <mask> } <mask> <mask> // Small tests that don't require a static server's state <mask> func misc(t *testing.T, s *Server) { </s> * DHCP: fix and update tests for: + dhcp: handle lease expiration (d68600c5d03b73d94f380f5442c22ddc8f755d9a) </s> remove hw = []byte{1, 2, 3, 4, 5, 6} </s> add hw = []byte{3, 2, 3, 4, 5, 6} </s> remove // Reserve an IP - we have no more available IPs p.SetCHAddr([]byte{3, 2, 3, 4, 5, 6}) </s> add // Reserve an IP - we have no more available IPs, // so the first expired (or, in our case, not yet committed) lease is returned hw = []byte{1, 2, 3, 4, 5, 6} p.SetCHAddr(hw) </s> remove check(t, lease == nil, "lease == nil") </s> add check(t, bytes.Equal(lease.HWAddr, hw), "lease.HWAddr") check(t, bytes.Equal(lease.IP, []byte{1, 1, 1, 1}), "lease.IP")
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9bc5a4570e76873984a4fda21a4d307499b4980a
dhcpd/dhcpd_test.go
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_24.txt"
<mask> "1hosts_lite": { <mask> "name": "1Hosts (Lite)", <mask> "categoryId": "general", <mask> "homepage": "https://badmojr.github.io/1Hosts/", <mask> "source": "https://badmojr.gitlab.io/1hosts/Lite/adblock.txt" <mask> }, <mask> "CHN_adrules": { <mask> "name": "CHN: AdRules DNS List", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/Cats-Team/AdRules", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/Cats-Team/AdRules/main/dns.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_29.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://abpvn.com/android/abpvn.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_16.txt" </s> remove "source": "https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_1.txt" </s> remove "source": "https://raw.githubusercontent.com/bkrucarci/turk-adlist/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_26.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_29.txt"
<mask> "CHN_adrules": { <mask> "name": "CHN: AdRules DNS List", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/Cats-Team/AdRules", <mask> "source": "https://raw.githubusercontent.com/Cats-Team/AdRules/main/dns.txt" <mask> }, <mask> "CHN_anti_ad": { <mask> "name": "CHN: anti-AD", <mask> "categoryId": "regional", <mask> "homepage": "https://anti-ad.net/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://badmojr.gitlab.io/1hosts/Lite/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_24.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://abpvn.com/android/abpvn.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_16.txt" </s> remove "source": "https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_1.txt" </s> remove "source": "https://raw.githubusercontent.com/bkrucarci/turk-adlist/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_26.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt"
<mask> "CHN_anti_ad": { <mask> "name": "CHN: anti-AD", <mask> "categoryId": "regional", <mask> "homepage": "https://anti-ad.net/", <mask> "source": "https://anti-ad.net/easylist.txt" <mask> }, <mask> "IDN_abpindo": { <mask> "name": "IDN: ABPindo", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/ABPindo/indonesianadblockrules", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/Cats-Team/AdRules/main/dns.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_29.txt" </s> remove "source": "https://raw.githubusercontent.com/ABPindo/indonesianadblockrules/master/subscriptions/aghome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_22.txt" </s> remove "source": "https://badmojr.gitlab.io/1hosts/Lite/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_24.txt" </s> remove "source": "https://raw.githubusercontent.com/MasterKia/PersianBlocker/main/PersianBlockerHosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_19.txt" </s> remove "source": "https://raw.githubusercontent.com/bkrucarci/turk-adlist/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_26.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_22.txt"
<mask> "IDN_abpindo": { <mask> "name": "IDN: ABPindo", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/ABPindo/indonesianadblockrules", <mask> "source": "https://raw.githubusercontent.com/ABPindo/indonesianadblockrules/master/subscriptions/aghome.txt" <mask> }, <mask> "IRN_unwanted_iranian_domains": { <mask> "name": "IRN: PersianBlocker list", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/MasterKia/PersianBlocker", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/MasterKia/PersianBlocker/main/PersianBlockerHosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_19.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://raw.githubusercontent.com/bkrucarci/turk-adlist/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_26.txt" </s> remove "source": "https://filtri-dns.ga/filtri.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_18.txt" </s> remove "source": "https://github.com/List-KR/List-KR" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_25.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_19.txt"
<mask> "IRN_unwanted_iranian_domains": { <mask> "name": "IRN: PersianBlocker list", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/MasterKia/PersianBlocker", <mask> "source": "https://raw.githubusercontent.com/MasterKia/PersianBlocker/main/PersianBlockerHosts.txt" <mask> }, <mask> "ITA_filtri_dns": { <mask> "name": "ITA: Filtri-DNS", <mask> "categoryId": "regional", <mask> "homepage": "https://filtri-dns.ga/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/ABPindo/indonesianadblockrules/master/subscriptions/aghome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_22.txt" </s> remove "source": "https://filtri-dns.ga/filtri.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_18.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://raw.githubusercontent.com/bkrucarci/turk-adlist/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_26.txt" </s> remove "source": "https://github.com/List-KR/List-KR" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_25.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_18.txt"
<mask> "ITA_filtri_dns": { <mask> "name": "ITA: Filtri-DNS", <mask> "categoryId": "regional", <mask> "homepage": "https://filtri-dns.ga/", <mask> "source": "https://filtri-dns.ga/filtri.txt" <mask> }, <mask> "KOR_list_kr": { <mask> "name": "KOR: List-KR DNS", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/List-KR/List-KR", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://github.com/List-KR/List-KR" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_25.txt" </s> remove "source": "https://raw.githubusercontent.com/MasterKia/PersianBlocker/main/PersianBlockerHosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_19.txt" </s> remove "source": "https://raw.githubusercontent.com/yous/YousList/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_15.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://raw.githubusercontent.com/ABPindo/indonesianadblockrules/master/subscriptions/aghome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_22.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_25.txt"
<mask> "KOR_list_kr": { <mask> "name": "KOR: List-KR DNS", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/List-KR/List-KR", <mask> "source": "https://github.com/List-KR/List-KR" <mask> }, <mask> "KOR_youslist": { <mask> "name": "KOR: YousList", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/yous/YousList", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://filtri-dns.ga/filtri.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_18.txt" </s> remove "source": "https://raw.githubusercontent.com/yous/YousList/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_15.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://raw.githubusercontent.com/ABPindo/indonesianadblockrules/master/subscriptions/aghome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_22.txt" </s> remove "source": "https://raw.githubusercontent.com/MasterKia/PersianBlocker/main/PersianBlockerHosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_19.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_15.txt"
<mask> "KOR_youslist": { <mask> "name": "KOR: YousList", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/yous/YousList", <mask> "source": "https://raw.githubusercontent.com/yous/YousList/master/hosts.txt" <mask> }, <mask> "MKD_macedonian_pi_hole_blocklist": { <mask> "name": "MKD: Macedonian Pi-hole Blocklist", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/cchevy/macedonian-pi-hole-blocklist", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/cchevy/macedonian-pi-hole-blocklist/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_20.txt" </s> remove "source": "https://github.com/List-KR/List-KR" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_25.txt" </s> remove "source": "https://filtri-dns.ga/filtri.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_18.txt" </s> remove "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_20.txt"
<mask> "MKD_macedonian_pi_hole_blocklist": { <mask> "name": "MKD: Macedonian Pi-hole Blocklist", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/cchevy/macedonian-pi-hole-blocklist", <mask> "source": "https://raw.githubusercontent.com/cchevy/macedonian-pi-hole-blocklist/master/hosts.txt" <mask> }, <mask> "NOR_dandelion_sprouts_anti_malware_list": { <mask> "name": "NOR: Dandelion Sprouts nordiske filtre", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/DandelionSprout/adfilt", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/NorwegianExperimentalList%20alternate%20versions/NordicFiltersAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_13.txt" </s> remove "source": "https://raw.githubusercontent.com/yous/YousList/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_15.txt" </s> remove "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt" </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_12.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_13.txt"
<mask> "NOR_dandelion_sprouts_anti_malware_list": { <mask> "name": "NOR: Dandelion Sprouts nordiske filtre", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/DandelionSprout/adfilt", <mask> "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/NorwegianExperimentalList%20alternate%20versions/NordicFiltersAdGuardHome.txt" <mask> }, <mask> "POL_polish_filters_for_pi_hole": { <mask> "name": "POL: Polish filters for Pi hole", <mask> "categoryId": "regional", <mask> "homepage": "https://www.certyficate.it/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/MajkiIT/polish-ads-filter/master/polish-pihole-filters/hostfile.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_14.txt" </s> remove "source": "https://raw.githubusercontent.com/cchevy/macedonian-pi-hole-blocklist/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_20.txt" </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_12.txt" </s> remove "source": "https://someonewhocares.org/hosts/zero/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_4.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_14.txt"
<mask> "POL_polish_filters_for_pi_hole": { <mask> "name": "POL: Polish filters for Pi hole", <mask> "categoryId": "regional", <mask> "homepage": "https://www.certyficate.it/", <mask> "source": "https://raw.githubusercontent.com/MajkiIT/polish-ads-filter/master/polish-pihole-filters/hostfile.txt" <mask> }, <mask> "SWE_frellwit_swedish_hosts_file": { <mask> "name": "SWE: Frellwit's Swedish Hosts File", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/lassekongo83/Frellwits-filter-lists/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/NorwegianExperimentalList%20alternate%20versions/NordicFiltersAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_13.txt" </s> remove "source": "https://raw.githubusercontent.com/lassekongo83/Frellwits-filter-lists/master/Frellwits-Swedish-Hosts-File.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_17.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/urlhaus-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_11.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://raw.githubusercontent.com/ABPindo/indonesianadblockrules/master/subscriptions/aghome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_22.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_17.txt"
<mask> "SWE_frellwit_swedish_hosts_file": { <mask> "name": "SWE: Frellwit's Swedish Hosts File", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/lassekongo83/Frellwits-filter-lists/", <mask> "source": "https://raw.githubusercontent.com/lassekongo83/Frellwits-filter-lists/master/Frellwits-Swedish-Hosts-File.txt" <mask> }, <mask> "TUR_turk_adlist": { <mask> "name": "TUR: turk-adlist", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/bkrucarci/turk-adlist", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/MajkiIT/polish-ads-filter/master/polish-pihole-filters/hostfile.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_14.txt" </s> remove "source": "https://raw.githubusercontent.com/bkrucarci/turk-adlist/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_26.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/urlhaus-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_11.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://raw.githubusercontent.com/ABPindo/indonesianadblockrules/master/subscriptions/aghome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_22.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_26.txt"
<mask> "TUR_turk_adlist": { <mask> "name": "TUR: turk-adlist", <mask> "categoryId": "regional", <mask> "homepage": "https://github.com/bkrucarci/turk-adlist", <mask> "source": "https://raw.githubusercontent.com/bkrucarci/turk-adlist/master/hosts" <mask> }, <mask> "VNM_abpvn": { <mask> "name": "VNM: ABPVN List", <mask> "categoryId": "regional", <mask> "homepage": "http://abpvn.com/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://abpvn.com/android/abpvn.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_16.txt" </s> remove "source": "https://raw.githubusercontent.com/lassekongo83/Frellwits-filter-lists/master/Frellwits-Swedish-Hosts-File.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_17.txt" </s> remove "source": "https://raw.githubusercontent.com/Cats-Team/AdRules/main/dns.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_29.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://badmojr.gitlab.io/1hosts/Lite/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_24.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_16.txt"
<mask> "VNM_abpvn": { <mask> "name": "VNM: ABPVN List", <mask> "categoryId": "regional", <mask> "homepage": "http://abpvn.com/", <mask> "source": "https://abpvn.com/android/abpvn.txt" <mask> }, <mask> "adguard_dns_filter": { <mask> "name": "AdGuard DNS filter", <mask> "categoryId": "general", <mask> "homepage": "https://github.com/AdguardTeam/AdGuardSDNSFilter", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_1.txt" </s> remove "source": "https://raw.githubusercontent.com/bkrucarci/turk-adlist/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_26.txt" </s> remove "source": "https://badmojr.gitlab.io/1hosts/Lite/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_24.txt" </s> remove "source": "https://raw.githubusercontent.com/Cats-Team/AdRules/main/dns.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_29.txt" </s> remove "source": "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_31.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_1.txt"
<mask> "adguard_dns_filter": { <mask> "name": "AdGuard DNS filter", <mask> "categoryId": "general", <mask> "homepage": "https://github.com/AdguardTeam/AdGuardSDNSFilter", <mask> "source": "https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt" <mask> }, <mask> "adway_default_blocklist": { <mask> "name": "AdAway Default Blocklist", <mask> "categoryId": "general", <mask> "homepage": "https://github.com/AdAway/adaway.github.io/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://abpvn.com/android/abpvn.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_16.txt" </s> remove "source": "https://adaway.org/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt" </s> remove "source": "https://badmojr.gitlab.io/1hosts/Lite/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_24.txt" </s> remove "source": "https://raw.githubusercontent.com/Cats-Team/AdRules/main/dns.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_29.txt" </s> remove "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt"
<mask> "adway_default_blocklist": { <mask> "name": "AdAway Default Blocklist", <mask> "categoryId": "general", <mask> "homepage": "https://github.com/AdAway/adaway.github.io/", <mask> "source": "https://adaway.org/hosts.txt" <mask> }, <mask> "curben_phishing_filter": { <mask> "name": "Phishing URL Blocklist (PhishTank and OpenPhish)", <mask> "categoryId": "security", <mask> "homepage": "https://gitlab.com/malware-filter/phishing-filter", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/phishing-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_30.txt" </s> remove "source": "https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_1.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt" </s> remove "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt" </s> remove "source": "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=adblockplus\u0026showintro=1\u0026mimetype=plaintext" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_3.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_30.txt"
<mask> "curben_phishing_filter": { <mask> "name": "Phishing URL Blocklist (PhishTank and OpenPhish)", <mask> "categoryId": "security", <mask> "homepage": "https://gitlab.com/malware-filter/phishing-filter", <mask> "source": "https://malware-filter.gitlab.io/malware-filter/phishing-filter-agh.txt" <mask> }, <mask> "dan_pollocks_list": { <mask> "name": "Dan Pollock's List", <mask> "categoryId": "general", <mask> "homepage": "https://someonewhocares.org/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://adaway.org/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt" </s> remove "source": "https://someonewhocares.org/hosts/zero/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_4.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/urlhaus-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_11.txt" </s> remove "source": "https://raw.githubusercontent.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_9.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_4.txt"
<mask> "dan_pollocks_list": { <mask> "name": "Dan Pollock's List", <mask> "categoryId": "general", <mask> "homepage": "https://someonewhocares.org/", <mask> "source": "https://someonewhocares.org/hosts/zero/hosts" <mask> }, <mask> "dandelion_sprouts_anti_malware_list": { <mask> "name": "Dandelion Sprout's Anti-Malware List", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/DandelionSprout/adfilt", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_12.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/phishing-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_30.txt" </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/GameConsoleAdblockList.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_6.txt" </s> remove "source": "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_31.txt" </s> remove "source": "https://block.energized.pro/spark/formats/filter" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_28.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_12.txt"
<mask> "dandelion_sprouts_anti_malware_list": { <mask> "name": "Dandelion Sprout's Anti-Malware List", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/DandelionSprout/adfilt", <mask> "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt" <mask> }, <mask> "dandelion_sprouts_game_console_adblock_list": { <mask> "name": "Dandelion Sprout's Game Console Adblock List", <mask> "categoryId": "other", <mask> "homepage": "https://github.com/DandelionSprout/adfilt", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/GameConsoleAdblockList.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_6.txt" </s> remove "source": "https://someonewhocares.org/hosts/zero/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_4.txt" </s> remove "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt" </s> remove "source": "https://raw.githubusercontent.com/cchevy/macedonian-pi-hole-blocklist/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_20.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_6.txt"
<mask> "dandelion_sprouts_game_console_adblock_list": { <mask> "name": "Dandelion Sprout's Game Console Adblock List", <mask> "categoryId": "other", <mask> "homepage": "https://github.com/DandelionSprout/adfilt", <mask> "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/GameConsoleAdblockList.txt" <mask> }, <mask> "energized_spark": { <mask> "name": "Energized Spark", <mask> "categoryId": "general", <mask> "homepage": "https://energized.pro/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_12.txt" </s> remove "source": "https://block.energized.pro/spark/formats/filter" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_28.txt" </s> remove "source": "https://someonewhocares.org/hosts/zero/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_4.txt" </s> remove "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_28.txt"
<mask> "energized_spark": { <mask> "name": "Energized Spark", <mask> "categoryId": "general", <mask> "homepage": "https://energized.pro/", <mask> "source": "https://block.energized.pro/spark/formats/filter" <mask> }, <mask> "nocoin_filter_list": { <mask> "name": "NoCoin Filter List", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/hoshsadiq/adblock-nocoin-list/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_8.txt" </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/GameConsoleAdblockList.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_6.txt" </s> remove "source": "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_31.txt" </s> remove "source": "https://someonewhocares.org/hosts/zero/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_4.txt" </s> remove "source": "https://raw.githubusercontent.com/durablenapkin/scamblocklist/master/adguard.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_10.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_8.txt"
<mask> "nocoin_filter_list": { <mask> "name": "NoCoin Filter List", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/hoshsadiq/adblock-nocoin-list/", <mask> "source": "https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt" <mask> }, <mask> "notracking_hosts_blocklists": { <mask> "name": "The NoTracking blocklist", <mask> "categoryId": "general", <mask> "homepage": "https://github.com/notracking/hosts-blocklists", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/notracking/hosts-blocklists/master/adblock/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_32.txt" </s> remove "source": "https://block.energized.pro/spark/formats/filter" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_28.txt" </s> remove "source": "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_33.txt" </s> remove "source": "https://raw.githubusercontent.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_9.txt" </s> remove "source": "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_31.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_32.txt"
<mask> "notracking_hosts_blocklists": { <mask> "name": "The NoTracking blocklist", <mask> "categoryId": "general", <mask> "homepage": "https://github.com/notracking/hosts-blocklists", <mask> "source": "https://raw.githubusercontent.com/notracking/hosts-blocklists/master/adblock/adblock.txt" <mask> }, <mask> "oisd_basic": { <mask> "name": "OISD Blocklist Basic", <mask> "categoryId": "general", <mask> "homepage": "https://oisd.nl/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://abp.oisd.nl/basic/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_5.txt" </s> remove "source": "https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_8.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt" </s> remove "source": "https://raw.githubusercontent.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_9.txt" </s> remove "source": "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_33.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_5.txt"
<mask> "oisd_basic": { <mask> "name": "OISD Blocklist Basic", <mask> "categoryId": "general", <mask> "homepage": "https://oisd.nl/", <mask> "source": "https://abp.oisd.nl/basic/" <mask> }, <mask> "oisd_full": { <mask> "name": "OISD Blocklist Full", <mask> "categoryId": "general", <mask> "homepage": "https://oisd.nl/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/notracking/hosts-blocklists/master/adblock/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_32.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt" </s> remove "source": "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=adblockplus\u0026showintro=1\u0026mimetype=plaintext" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_3.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/phishing-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_30.txt" </s> remove "source": "https://adaway.org/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt"
<mask> "oisd_full": { <mask> "name": "OISD Blocklist Full", <mask> "categoryId": "general", <mask> "homepage": "https://oisd.nl/", <mask> "source": "https://abp.oisd.nl/" <mask> }, <mask> "perflyst_dandelion_sprout_smart_tv_blocklist_for_adguard_home": { <mask> "name": "Perflyst and Dandelion Sprout's Smart-TV Blocklist", <mask> "categoryId": "other", <mask> "homepage": "https://github.com/Perflyst/PiHoleBlocklist", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt" </s> remove "source": "https://abp.oisd.nl/basic/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_5.txt" </s> remove "source": "https://raw.githubusercontent.com/notracking/hosts-blocklists/master/adblock/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_32.txt" </s> remove "source": "https://adaway.org/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt" </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_12.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt"
<mask> "perflyst_dandelion_sprout_smart_tv_blocklist_for_adguard_home": { <mask> "name": "Perflyst and Dandelion Sprout's Smart-TV Blocklist", <mask> "categoryId": "other", <mask> "homepage": "https://github.com/Perflyst/PiHoleBlocklist", <mask> "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" <mask> }, <mask> "peter_lowe_list": { <mask> "name": "Peter Lowe's Blocklist", <mask> "categoryId": "general", <mask> "homepage": "https://pgl.yoyo.org/adservers/", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt" </s> remove "source": "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=adblockplus\u0026showintro=1\u0026mimetype=plaintext" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_3.txt" </s> remove "source": "https://raw.githubusercontent.com/cchevy/macedonian-pi-hole-blocklist/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_20.txt" </s> remove "source": "https://adaway.org/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt" </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_12.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_3.txt"
<mask> "peter_lowe_list": { <mask> "name": "Peter Lowe's Blocklist", <mask> "categoryId": "general", <mask> "homepage": "https://pgl.yoyo.org/adservers/", <mask> "source": "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=adblockplus\u0026showintro=1\u0026mimetype=plaintext" <mask> }, <mask> "scam_blocklist_by_durablenapkin": { <mask> "name": "Scam Blocklist by DurableNapkin", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/durablenapkin/scamblocklist", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/durablenapkin/scamblocklist/master/adguard.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_10.txt" </s> remove "source": "https://raw.githubusercontent.com/Perflyst/PiHoleBlocklist/master/SmartTV-AGH.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_7.txt" </s> remove "source": "https://adaway.org/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt" </s> remove "source": "https://abp.oisd.nl/basic/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_5.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_10.txt"
<mask> "scam_blocklist_by_durablenapkin": { <mask> "name": "Scam Blocklist by DurableNapkin", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/durablenapkin/scamblocklist", <mask> "source": "https://raw.githubusercontent.com/durablenapkin/scamblocklist/master/adguard.txt" <mask> }, <mask> "staklerware_indicators_list": { <mask> "name": "Stalkerware Indicators List", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/AssoEchap/stalkerware-indicators", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=adblockplus\u0026showintro=1\u0026mimetype=plaintext" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_3.txt" </s> remove "source": "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_31.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/phishing-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_30.txt" </s> remove "source": "https://raw.githubusercontent.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_9.txt" </s> remove "source": "https://block.energized.pro/spark/formats/filter" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_28.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_31.txt"
<mask> "staklerware_indicators_list": { <mask> "name": "Stalkerware Indicators List", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/AssoEchap/stalkerware-indicators", <mask> "source": "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" <mask> }, <mask> "steven_blacks_list": { <mask> "name": "Steven Black's List", <mask> "categoryId": "general", <mask> "homepage": "https://github.com/StevenBlack/hosts", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/durablenapkin/scamblocklist/master/adguard.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_10.txt" </s> remove "source": "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_33.txt" </s> remove "source": "https://someonewhocares.org/hosts/zero/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_4.txt" </s> remove "source": "https://block.energized.pro/spark/formats/filter" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_28.txt" </s> remove "source": "https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_8.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_33.txt"
<mask> "steven_blacks_list": { <mask> "name": "Steven Black's List", <mask> "categoryId": "general", <mask> "homepage": "https://github.com/StevenBlack/hosts", <mask> "source": "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts" <mask> }, <mask> "the_big_list_of_hacked_malware_web_sites": { <mask> "name": "The Big List of Hacked Malware Web Sites", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_9.txt" </s> remove "source": "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_31.txt" </s> remove "source": "https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_8.txt" </s> remove "source": "https://raw.githubusercontent.com/notracking/hosts-blocklists/master/adblock/adblock.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_32.txt" </s> remove "source": "https://block.energized.pro/spark/formats/filter" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_28.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_9.txt"
<mask> "the_big_list_of_hacked_malware_web_sites": { <mask> "name": "The Big List of Hacked Malware Web Sites", <mask> "categoryId": "security", <mask> "homepage": "https://github.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites", <mask> "source": "https://raw.githubusercontent.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites/master/hosts" <mask> }, <mask> "urlhaus_filter_online": { <mask> "name": "Malicious URL Blocklist (URLHaus)", <mask> "categoryId": "security", <mask> "homepage": "https://gitlab.com/malware-filter/urlhaus-filter", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_33.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/urlhaus-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_11.txt" </s> remove "source": "https://adaway.org/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/phishing-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_30.txt" </s> remove "source": "https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_8.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_11.txt"
<mask> "urlhaus_filter_online": { <mask> "name": "Malicious URL Blocklist (URLHaus)", <mask> "categoryId": "security", <mask> "homepage": "https://gitlab.com/malware-filter/urlhaus-filter", <mask> "source": "https://malware-filter.gitlab.io/malware-filter/urlhaus-filter-agh.txt" <mask> }, <mask> "windowsspyblocker_hosts_spy_rules": { <mask> "name": "WindowsSpyBlocker - Hosts spy rules", <mask> "categoryId": "other", <mask> "homepage": "https://github.com/crazy-max/WindowsSpyBlocker", </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_23.txt" </s> remove "source": "https://raw.githubusercontent.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites/master/hosts" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_9.txt" </s> remove "source": "https://adaway.org/hosts.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_2.txt" </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/phishing-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_30.txt" </s> remove "source": "https://abp.oisd.nl/" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_27.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
"source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_23.txt"
<mask> "windowsspyblocker_hosts_spy_rules": { <mask> "name": "WindowsSpyBlocker - Hosts spy rules", <mask> "categoryId": "other", <mask> "homepage": "https://github.com/crazy-max/WindowsSpyBlocker", <mask> "source": "https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt" <mask> } <mask> } <mask> } </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://malware-filter.gitlab.io/malware-filter/urlhaus-filter-agh.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_11.txt" </s> remove "source": "https://raw.githubusercontent.com/lassekongo83/Frellwits-filter-lists/master/Frellwits-Swedish-Hosts-File.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_17.txt" </s> remove Source: f.SourceURL, </s> add // NOTE: The source URL in filters.json is not guaranteed to contain // the URL of the filtering rule list. So, use our mirror for the // vetted blocklists, which are mostly guaranteed to be valid and // available lists. Source: f.DownloadURL, </s> remove FilterID string `json:"filterId"` Name string `json:"name"` Homepage string `json:"homepage"` SourceURL string `json:"sourceUrl"` Tags []string `json:"tags"` </s> add DownloadURL string `json:"downloadUrl"` FilterID string `json:"filterId"` Homepage string `json:"homepage"` Name string `json:"name"` Tags []string `json:"tags"` </s> remove "source": "https://raw.githubusercontent.com/MajkiIT/polish-ads-filter/master/polish-pihole-filters/hostfile.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_14.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
client/src/helpers/filters/filters.js
// NOTE: The source URL in filters.json is not guaranteed to contain // the URL of the filtering rule list. So, use our mirror for the // vetted blocklists, which are mostly guaranteed to be valid and // available lists. Source: f.DownloadURL,
<mask> aghFlt.Filters[id] = &aghFiltersFilter{ <mask> Name: f.Name, <mask> CategoryID: cat, <mask> Homepage: f.Homepage, <mask> Source: f.SourceURL, <mask> } <mask> } <mask> <mask> buf := &bytes.Buffer{} <mask> _, _ = buf.WriteString(jsHeader) </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove "source": "https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_23.txt" </s> remove FilterID string `json:"filterId"` Name string `json:"name"` Homepage string `json:"homepage"` SourceURL string `json:"sourceUrl"` Tags []string `json:"tags"` </s> add DownloadURL string `json:"downloadUrl"` FilterID string `json:"filterId"` Homepage string `json:"homepage"` Name string `json:"name"` Tags []string `json:"tags"` </s> remove "source": "https://raw.githubusercontent.com/Cats-Team/AdRules/main/dns.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_29.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt" </s> remove "source": "https://raw.githubusercontent.com/ABPindo/indonesianadblockrules/master/subscriptions/aghome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_22.txt"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
scripts/vetted-filters/main.go
DownloadURL string `json:"downloadUrl"` FilterID string `json:"filterId"` Homepage string `json:"homepage"` Name string `json:"name"` Tags []string `json:"tags"`
<mask> } <mask> <mask> // hlFiltersFilter is the JSON structure for a filter in the Hostlists Registry. <mask> type hlFiltersFilter struct { <mask> FilterID string `json:"filterId"` <mask> Name string `json:"name"` <mask> Homepage string `json:"homepage"` <mask> SourceURL string `json:"sourceUrl"` <mask> Tags []string `json:"tags"` <mask> } <mask> <mask> // category returns the AdGuard Home category for this filter. If there is no <mask> // fitting category, cat is empty. <mask> func (f *hlFiltersFilter) category() (cat string) { </s> Pull request: use-download-url Merge in DNS/adguard-home from use-download-url to master Squashed commit of the following: commit d665794ef0594b87044c7a1aadac6ac9dc31722a Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu Nov 24 18:06:36 2022 +0300 all: use download url for vetted lists </s> remove Source: f.SourceURL, </s> add // NOTE: The source URL in filters.json is not guaranteed to contain // the URL of the filtering rule list. So, use our mirror for the // vetted blocklists, which are mostly guaranteed to be valid and // available lists. Source: f.DownloadURL, </s> remove "source": "https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_23.txt" </s> remove "source": "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/NorwegianExperimentalList%20alternate%20versions/NordicFiltersAdGuardHome.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_13.txt" </s> remove "source": "https://raw.githubusercontent.com/MajkiIT/polish-ads-filter/master/polish-pihole-filters/hostfile.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_14.txt" </s> remove "source": "https://anti-ad.net/easylist.txt" </s> add "source": "https://adguardteam.github.io/HostlistsRegistry/assets/filter_21.txt"
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c4bed31e79dac3d558efe3510ff372a2cdbe59f
scripts/vetted-filters/main.go
<mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghio" <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> const ( </s> Pull request: home: imp whois parse Updates #2646. Squashed commit of the following: commit 0a5ff6ae74c532a296c0594a598a99c7cfaccf8c Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 14:07:08 2021 +0300 home: imp code commit 2af0f463a77b81e827d9faca079a19c5437e1cd9 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 13:48:08 2021 +0300 home: imp whois parse </s> remove _, ok := m["orgname"] if !ok { // Set orgname from either descr or netname for the frontent. // // TODO(a.garipov): Perhaps don't do that in the V1 HTTP API? if descr != "" { m["orgname"] = trimValue(descr) } else if netname != "" { m["orgname"] = trimValue(netname) } </s> add m[k] = v </s> remove } </s> add </s> remove case "org-name": m["orgname"] = trimValue(v) case "city", "country", "orgname": m[k] = trimValue(v) case "descr": if len(descr) == 0 { descr = v } case "netname": netname = v case "whois": // "whois: whois.arin.net" m["whois"] = v case "referralserver": // "ReferralServer: whois://whois.ripe.net" if strings.HasPrefix(v, "whois://") { m["whois"] = v[len("whois://"):] } </s> add case "orgname", "org-name": k = "orgname" v = trimValue(v) orgname = v case "city", "country": v = trimValue(v) case "descr", "netname": k = "orgname" v = coalesceStr(orgname, v) orgname = v case "whois": k = "whois" case "referralserver": k = "whois" v = strings.TrimPrefix(v, "whois://") default: continue </s> remove k := strings.TrimSpace(kv[0]) k = strings.ToLower(k) </s> add k := strings.ToLower(strings.TrimSpace(kv[0]))
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c60aef6371c608d715f3ded92afa91007397c48
internal/home/whois.go
// coalesceStr returns the first non-empty string. // // TODO(a.garipov): Move to aghstrings? func coalesceStr(strs ...string) (res string) { for _, s := range strs { if s != "" { return s } } return "" } // isWhoisComment returns true if the string is empty or is a WHOIS comment. func isWhoisComment(s string) (ok bool) { return len(s) == 0 || s[0] == '#' || s[0] == '%' } // strmap is an alias for convenience. type strmap = map[string]string // whoisParse parses a subset of plain-text data from the WHOIS response into // a string map. func whoisParse(data string) (m strmap) { m = strmap{} var orgname string lines := strings.Split(data, "\n") for _, l := range lines { if isWhoisComment(l) {
<mask> } <mask> return s[:maxValueLength-3] + "..." <mask> } <mask> <mask> // Parse plain-text data from the response <mask> func whoisParse(data string) map[string]string { <mask> m := map[string]string{} <mask> descr := "" <mask> netname := "" <mask> for len(data) != 0 { <mask> ln := aghstrings.SplitNext(&data, '\n') <mask> if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' { <mask> continue <mask> } <mask> <mask> kv := strings.SplitN(ln, ":", 2) <mask> if len(kv) != 2 { </s> Pull request: home: imp whois parse Updates #2646. Squashed commit of the following: commit 0a5ff6ae74c532a296c0594a598a99c7cfaccf8c Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 14:07:08 2021 +0300 home: imp code commit 2af0f463a77b81e827d9faca079a19c5437e1cd9 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 13:48:08 2021 +0300 home: imp whois parse </s> remove kv := strings.SplitN(ln, ":", 2) </s> add kv := strings.SplitN(l, ":", 2) </s> remove _, ok := m["orgname"] if !ok { // Set orgname from either descr or netname for the frontent. // // TODO(a.garipov): Perhaps don't do that in the V1 HTTP API? if descr != "" { m["orgname"] = trimValue(descr) } else if netname != "" { m["orgname"] = trimValue(netname) } </s> add m[k] = v </s> remove k := strings.TrimSpace(kv[0]) k = strings.ToLower(k) </s> add k := strings.ToLower(strings.TrimSpace(kv[0])) </s> remove } </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c60aef6371c608d715f3ded92afa91007397c48
internal/home/whois.go
kv := strings.SplitN(l, ":", 2)
<mask> if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' { <mask> continue <mask> } <mask> <mask> kv := strings.SplitN(ln, ":", 2) <mask> if len(kv) != 2 { <mask> continue <mask> } <mask> k := strings.TrimSpace(kv[0]) <mask> k = strings.ToLower(k) </s> Pull request: home: imp whois parse Updates #2646. Squashed commit of the following: commit 0a5ff6ae74c532a296c0594a598a99c7cfaccf8c Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 14:07:08 2021 +0300 home: imp code commit 2af0f463a77b81e827d9faca079a19c5437e1cd9 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 13:48:08 2021 +0300 home: imp whois parse </s> remove // Parse plain-text data from the response func whoisParse(data string) map[string]string { m := map[string]string{} descr := "" netname := "" for len(data) != 0 { ln := aghstrings.SplitNext(&data, '\n') if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' { </s> add // coalesceStr returns the first non-empty string. // // TODO(a.garipov): Move to aghstrings? func coalesceStr(strs ...string) (res string) { for _, s := range strs { if s != "" { return s } } return "" } // isWhoisComment returns true if the string is empty or is a WHOIS comment. func isWhoisComment(s string) (ok bool) { return len(s) == 0 || s[0] == '#' || s[0] == '%' } // strmap is an alias for convenience. type strmap = map[string]string // whoisParse parses a subset of plain-text data from the WHOIS response into // a string map. func whoisParse(data string) (m strmap) { m = strmap{} var orgname string lines := strings.Split(data, "\n") for _, l := range lines { if isWhoisComment(l) { </s> remove k := strings.TrimSpace(kv[0]) k = strings.ToLower(k) </s> add k := strings.ToLower(strings.TrimSpace(kv[0])) </s> remove case "org-name": m["orgname"] = trimValue(v) case "city", "country", "orgname": m[k] = trimValue(v) case "descr": if len(descr) == 0 { descr = v } case "netname": netname = v case "whois": // "whois: whois.arin.net" m["whois"] = v case "referralserver": // "ReferralServer: whois://whois.ripe.net" if strings.HasPrefix(v, "whois://") { m["whois"] = v[len("whois://"):] } </s> add case "orgname", "org-name": k = "orgname" v = trimValue(v) orgname = v case "city", "country": v = trimValue(v) case "descr", "netname": k = "orgname" v = coalesceStr(orgname, v) orgname = v case "whois": k = "whois" case "referralserver": k = "whois" v = strings.TrimPrefix(v, "whois://") default: continue </s> remove } </s> add
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c60aef6371c608d715f3ded92afa91007397c48
internal/home/whois.go
k := strings.ToLower(strings.TrimSpace(kv[0]))
<mask> kv := strings.SplitN(ln, ":", 2) <mask> if len(kv) != 2 { <mask> continue <mask> } <mask> k := strings.TrimSpace(kv[0]) <mask> k = strings.ToLower(k) <mask> v := strings.TrimSpace(kv[1]) <mask> <mask> switch k { <mask> case "org-name": <mask> m["orgname"] = trimValue(v) </s> Pull request: home: imp whois parse Updates #2646. Squashed commit of the following: commit 0a5ff6ae74c532a296c0594a598a99c7cfaccf8c Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 14:07:08 2021 +0300 home: imp code commit 2af0f463a77b81e827d9faca079a19c5437e1cd9 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 13:48:08 2021 +0300 home: imp whois parse </s> remove kv := strings.SplitN(ln, ":", 2) </s> add kv := strings.SplitN(l, ":", 2) </s> remove case "org-name": m["orgname"] = trimValue(v) case "city", "country", "orgname": m[k] = trimValue(v) case "descr": if len(descr) == 0 { descr = v } case "netname": netname = v case "whois": // "whois: whois.arin.net" m["whois"] = v case "referralserver": // "ReferralServer: whois://whois.ripe.net" if strings.HasPrefix(v, "whois://") { m["whois"] = v[len("whois://"):] } </s> add case "orgname", "org-name": k = "orgname" v = trimValue(v) orgname = v case "city", "country": v = trimValue(v) case "descr", "netname": k = "orgname" v = coalesceStr(orgname, v) orgname = v case "whois": k = "whois" case "referralserver": k = "whois" v = strings.TrimPrefix(v, "whois://") default: continue </s> remove // Parse plain-text data from the response func whoisParse(data string) map[string]string { m := map[string]string{} descr := "" netname := "" for len(data) != 0 { ln := aghstrings.SplitNext(&data, '\n') if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' { </s> add // coalesceStr returns the first non-empty string. // // TODO(a.garipov): Move to aghstrings? func coalesceStr(strs ...string) (res string) { for _, s := range strs { if s != "" { return s } } return "" } // isWhoisComment returns true if the string is empty or is a WHOIS comment. func isWhoisComment(s string) (ok bool) { return len(s) == 0 || s[0] == '#' || s[0] == '%' } // strmap is an alias for convenience. type strmap = map[string]string // whoisParse parses a subset of plain-text data from the WHOIS response into // a string map. func whoisParse(data string) (m strmap) { m = strmap{} var orgname string lines := strings.Split(data, "\n") for _, l := range lines { if isWhoisComment(l) { </s> remove } </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c60aef6371c608d715f3ded92afa91007397c48
internal/home/whois.go
if v == "" { continue }
<mask> } <mask> <mask> k := strings.ToLower(strings.TrimSpace(kv[0])) <mask> v := strings.TrimSpace(kv[1]) <mask> <mask> switch k { <mask> case "orgname", "org-name": <mask> k = "orgname" <mask> v = trimValue(v) </s> Pull request: home: imp whois parse Updates #2646. Squashed commit of the following: commit 0a5ff6ae74c532a296c0594a598a99c7cfaccf8c Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 14:07:08 2021 +0300 home: imp code commit 2af0f463a77b81e827d9faca079a19c5437e1cd9 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 13:48:08 2021 +0300 home: imp whois parse </s> remove case "org-name": m["orgname"] = trimValue(v) case "city", "country", "orgname": m[k] = trimValue(v) case "descr": if len(descr) == 0 { descr = v } case "netname": netname = v case "whois": // "whois: whois.arin.net" m["whois"] = v case "referralserver": // "ReferralServer: whois://whois.ripe.net" if strings.HasPrefix(v, "whois://") { m["whois"] = v[len("whois://"):] } </s> add case "orgname", "org-name": k = "orgname" v = trimValue(v) orgname = v case "city", "country": v = trimValue(v) case "descr", "netname": k = "orgname" v = coalesceStr(orgname, v) orgname = v case "whois": k = "whois" case "referralserver": k = "whois" v = strings.TrimPrefix(v, "whois://") default: continue </s> remove k := strings.TrimSpace(kv[0]) k = strings.ToLower(k) </s> add k := strings.ToLower(strings.TrimSpace(kv[0])) </s> remove kv := strings.SplitN(ln, ":", 2) </s> add kv := strings.SplitN(l, ":", 2) </s> remove _, ok := m["orgname"] if !ok { // Set orgname from either descr or netname for the frontent. // // TODO(a.garipov): Perhaps don't do that in the V1 HTTP API? if descr != "" { m["orgname"] = trimValue(descr) } else if netname != "" { m["orgname"] = trimValue(netname) } </s> add m[k] = v </s> remove } </s> add
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c60aef6371c608d715f3ded92afa91007397c48
internal/home/whois.go
case "orgname", "org-name": k = "orgname" v = trimValue(v) orgname = v case "city", "country": v = trimValue(v) case "descr", "netname": k = "orgname" v = coalesceStr(orgname, v) orgname = v case "whois": k = "whois" case "referralserver": k = "whois" v = strings.TrimPrefix(v, "whois://") default: continue
<mask> k = strings.ToLower(k) <mask> v := strings.TrimSpace(kv[1]) <mask> <mask> switch k { <mask> case "org-name": <mask> m["orgname"] = trimValue(v) <mask> case "city", "country", "orgname": <mask> m[k] = trimValue(v) <mask> case "descr": <mask> if len(descr) == 0 { <mask> descr = v <mask> } <mask> case "netname": <mask> netname = v <mask> case "whois": // "whois: whois.arin.net" <mask> m["whois"] = v <mask> case "referralserver": // "ReferralServer: whois://whois.ripe.net" <mask> if strings.HasPrefix(v, "whois://") { <mask> m["whois"] = v[len("whois://"):] <mask> } <mask> } <mask> } <mask> <mask> _, ok := m["orgname"] <mask> if !ok { </s> Pull request: home: imp whois parse Updates #2646. Squashed commit of the following: commit 0a5ff6ae74c532a296c0594a598a99c7cfaccf8c Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 14:07:08 2021 +0300 home: imp code commit 2af0f463a77b81e827d9faca079a19c5437e1cd9 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 13:48:08 2021 +0300 home: imp whois parse </s> remove } </s> add </s> remove k := strings.TrimSpace(kv[0]) k = strings.ToLower(k) </s> add k := strings.ToLower(strings.TrimSpace(kv[0])) </s> remove _, ok := m["orgname"] if !ok { // Set orgname from either descr or netname for the frontent. // // TODO(a.garipov): Perhaps don't do that in the V1 HTTP API? if descr != "" { m["orgname"] = trimValue(descr) } else if netname != "" { m["orgname"] = trimValue(netname) } </s> add m[k] = v </s> remove kv := strings.SplitN(ln, ":", 2) </s> add kv := strings.SplitN(l, ":", 2)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c60aef6371c608d715f3ded92afa91007397c48
internal/home/whois.go
<mask> if strings.HasPrefix(v, "whois://") { <mask> m["whois"] = v[len("whois://"):] <mask> } <mask> } <mask> } <mask> <mask> _, ok := m["orgname"] <mask> if !ok { <mask> // Set orgname from either descr or netname for the frontent. <mask> // </s> Pull request: home: imp whois parse Updates #2646. Squashed commit of the following: commit 0a5ff6ae74c532a296c0594a598a99c7cfaccf8c Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 14:07:08 2021 +0300 home: imp code commit 2af0f463a77b81e827d9faca079a19c5437e1cd9 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 13:48:08 2021 +0300 home: imp whois parse </s> remove _, ok := m["orgname"] if !ok { // Set orgname from either descr or netname for the frontent. // // TODO(a.garipov): Perhaps don't do that in the V1 HTTP API? if descr != "" { m["orgname"] = trimValue(descr) } else if netname != "" { m["orgname"] = trimValue(netname) } </s> add m[k] = v </s> remove case "org-name": m["orgname"] = trimValue(v) case "city", "country", "orgname": m[k] = trimValue(v) case "descr": if len(descr) == 0 { descr = v } case "netname": netname = v case "whois": // "whois: whois.arin.net" m["whois"] = v case "referralserver": // "ReferralServer: whois://whois.ripe.net" if strings.HasPrefix(v, "whois://") { m["whois"] = v[len("whois://"):] } </s> add case "orgname", "org-name": k = "orgname" v = trimValue(v) orgname = v case "city", "country": v = trimValue(v) case "descr", "netname": k = "orgname" v = coalesceStr(orgname, v) orgname = v case "whois": k = "whois" case "referralserver": k = "whois" v = strings.TrimPrefix(v, "whois://") default: continue </s> remove // Parse plain-text data from the response func whoisParse(data string) map[string]string { m := map[string]string{} descr := "" netname := "" for len(data) != 0 { ln := aghstrings.SplitNext(&data, '\n') if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' { </s> add // coalesceStr returns the first non-empty string. // // TODO(a.garipov): Move to aghstrings? func coalesceStr(strs ...string) (res string) { for _, s := range strs { if s != "" { return s } } return "" } // isWhoisComment returns true if the string is empty or is a WHOIS comment. func isWhoisComment(s string) (ok bool) { return len(s) == 0 || s[0] == '#' || s[0] == '%' } // strmap is an alias for convenience. type strmap = map[string]string // whoisParse parses a subset of plain-text data from the WHOIS response into // a string map. func whoisParse(data string) (m strmap) { m = strmap{} var orgname string lines := strings.Split(data, "\n") for _, l := range lines { if isWhoisComment(l) { </s> remove kv := strings.SplitN(ln, ":", 2) </s> add kv := strings.SplitN(l, ":", 2)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c60aef6371c608d715f3ded92afa91007397c48
internal/home/whois.go
m[k] = v
<mask> } <mask> } <mask> } <mask> <mask> _, ok := m["orgname"] <mask> if !ok { <mask> // Set orgname from either descr or netname for the frontent. <mask> // <mask> // TODO(a.garipov): Perhaps don't do that in the V1 HTTP API? <mask> if descr != "" { <mask> m["orgname"] = trimValue(descr) <mask> } else if netname != "" { <mask> m["orgname"] = trimValue(netname) <mask> } <mask> } <mask> <mask> return m <mask> } <mask> </s> Pull request: home: imp whois parse Updates #2646. Squashed commit of the following: commit 0a5ff6ae74c532a296c0594a598a99c7cfaccf8c Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 14:07:08 2021 +0300 home: imp code commit 2af0f463a77b81e827d9faca079a19c5437e1cd9 Author: Ainar Garipov <A.Garipov@AdGuard.COM> Date: Thu May 20 13:48:08 2021 +0300 home: imp whois parse </s> remove } </s> add </s> remove // Parse plain-text data from the response func whoisParse(data string) map[string]string { m := map[string]string{} descr := "" netname := "" for len(data) != 0 { ln := aghstrings.SplitNext(&data, '\n') if len(ln) == 0 || ln[0] == '#' || ln[0] == '%' { </s> add // coalesceStr returns the first non-empty string. // // TODO(a.garipov): Move to aghstrings? func coalesceStr(strs ...string) (res string) { for _, s := range strs { if s != "" { return s } } return "" } // isWhoisComment returns true if the string is empty or is a WHOIS comment. func isWhoisComment(s string) (ok bool) { return len(s) == 0 || s[0] == '#' || s[0] == '%' } // strmap is an alias for convenience. type strmap = map[string]string // whoisParse parses a subset of plain-text data from the WHOIS response into // a string map. func whoisParse(data string) (m strmap) { m = strmap{} var orgname string lines := strings.Split(data, "\n") for _, l := range lines { if isWhoisComment(l) { </s> remove case "org-name": m["orgname"] = trimValue(v) case "city", "country", "orgname": m[k] = trimValue(v) case "descr": if len(descr) == 0 { descr = v } case "netname": netname = v case "whois": // "whois: whois.arin.net" m["whois"] = v case "referralserver": // "ReferralServer: whois://whois.ripe.net" if strings.HasPrefix(v, "whois://") { m["whois"] = v[len("whois://"):] } </s> add case "orgname", "org-name": k = "orgname" v = trimValue(v) orgname = v case "city", "country": v = trimValue(v) case "descr", "netname": k = "orgname" v = coalesceStr(orgname, v) orgname = v case "whois": k = "whois" case "referralserver": k = "whois" v = strings.TrimPrefix(v, "whois://") default: continue </s> remove kv := strings.SplitN(ln, ":", 2) </s> add kv := strings.SplitN(l, ":", 2)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c60aef6371c608d715f3ded92afa91007397c48
internal/home/whois.go
<mask> "fmt" <mask> "io" <mask> "io/fs" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghio" <mask> "github.com/AdguardTeam/golibs/errors" <mask> "github.com/AdguardTeam/golibs/stringutil" <mask> ) <mask> <mask> // FileWalker is the signature of a function called for files in the file tree. </s> Pull request: 3906 filewalker read limit Merge in DNS/adguard-home from 3906-filewalker-constraint to master Updates #3906. Squashed commit of the following: commit e1b654420a5031dbfe69d86c3fcf16a95a9ca935 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Dec 1 15:45:26 2021 +0300 aghos: rm filewalker limit </s> remove // should be valid for fs.Glob. If cont is false, the walking terminates. Each // opened file is also limited for reading to MaxWalkedFileSize. </s> add // should be valid for fs.Glob. If FileWalker returns false for cont then // walking terminates. Prefer using bufio.Scanner to read the r since the input // is not limited. </s> remove // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> add // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> remove // MaxWalkedFileSize is the maximum length of the file that FileWalker can // check. const MaxWalkedFileSize = 1024 * 1024 </s> add </s> remove var r io.Reader // Ignore the error since LimitReader function returns error only if passed // limit value is less than zero, but the constant used. // // TODO(e.burkov): Make variable. r, _ = aghio.LimitReader(f, MaxWalkedFileSize) return c(r) </s> add return c(f) </s> remove } if fi.IsDir() { </s> add } else if fi.IsDir() {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c6d13991306d9a74e6a59954f507d37b15af6c3
internal/aghos/filewalker.go
// should be valid for fs.Glob. If FileWalker returns false for cont then // walking terminates. Prefer using bufio.Scanner to read the r since the input // is not limited.
<mask> <mask> // FileWalker is the signature of a function called for files in the file tree. <mask> // As opposed to filepath.Walk it only walk the files (not directories) matching <mask> // the provided pattern and those returned by function itself. All patterns <mask> // should be valid for fs.Glob. If cont is false, the walking terminates. Each <mask> // opened file is also limited for reading to MaxWalkedFileSize. <mask> // <mask> // TODO(e.burkov, a.garipov): Move into another package like aghfs. <mask> // <mask> // TODO(e.burkov): Think about passing filename or any additional data. <mask> type FileWalker func(r io.Reader) (patterns []string, cont bool, err error) </s> Pull request: 3906 filewalker read limit Merge in DNS/adguard-home from 3906-filewalker-constraint to master Updates #3906. Squashed commit of the following: commit e1b654420a5031dbfe69d86c3fcf16a95a9ca935 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Dec 1 15:45:26 2021 +0300 aghos: rm filewalker limit </s> remove // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> add // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghio" </s> add </s> remove // MaxWalkedFileSize is the maximum length of the file that FileWalker can // check. const MaxWalkedFileSize = 1024 * 1024 </s> add </s> remove var r io.Reader // Ignore the error since LimitReader function returns error only if passed // limit value is less than zero, but the constant used. // // TODO(e.burkov): Make variable. r, _ = aghio.LimitReader(f, MaxWalkedFileSize) return c(r) </s> add return c(f) </s> remove } if fi.IsDir() { </s> add } else if fi.IsDir() {
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c6d13991306d9a74e6a59954f507d37b15af6c3
internal/aghos/filewalker.go
// TODO(e.burkov, a.garipov): Move into another package like aghfs.
<mask> // the provided pattern and those returned by function itself. All patterns <mask> // should be valid for fs.Glob. If cont is false, the walking terminates. Each <mask> // opened file is also limited for reading to MaxWalkedFileSize. <mask> // <mask> // TODO(e.burkov, a.garipov): Move into another package like aghfs. <mask> // <mask> // TODO(e.burkov): Think about passing filename or any additional data. <mask> type FileWalker func(r io.Reader) (patterns []string, cont bool, err error) <mask> <mask> // MaxWalkedFileSize is the maximum length of the file that FileWalker can </s> Pull request: 3906 filewalker read limit Merge in DNS/adguard-home from 3906-filewalker-constraint to master Updates #3906. Squashed commit of the following: commit e1b654420a5031dbfe69d86c3fcf16a95a9ca935 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Dec 1 15:45:26 2021 +0300 aghos: rm filewalker limit </s> remove // should be valid for fs.Glob. If cont is false, the walking terminates. Each // opened file is also limited for reading to MaxWalkedFileSize. </s> add // should be valid for fs.Glob. If FileWalker returns false for cont then // walking terminates. Prefer using bufio.Scanner to read the r since the input // is not limited. </s> remove // MaxWalkedFileSize is the maximum length of the file that FileWalker can // check. const MaxWalkedFileSize = 1024 * 1024 </s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghio" </s> add </s> remove var r io.Reader // Ignore the error since LimitReader function returns error only if passed // limit value is less than zero, but the constant used. // // TODO(e.burkov): Make variable. r, _ = aghio.LimitReader(f, MaxWalkedFileSize) return c(r) </s> add return c(f) </s> remove } if fi.IsDir() { </s> add } else if fi.IsDir() {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c6d13991306d9a74e6a59954f507d37b15af6c3
internal/aghos/filewalker.go
<mask> // <mask> // TODO(e.burkov): Think about passing filename or any additional data. <mask> type FileWalker func(r io.Reader) (patterns []string, cont bool, err error) <mask> <mask> // MaxWalkedFileSize is the maximum length of the file that FileWalker can <mask> // check. <mask> const MaxWalkedFileSize = 1024 * 1024 <mask> <mask> // checkFile tries to open and process a single file located on sourcePath in <mask> // the specified fsys. The path is skipped if it's a directory. <mask> func checkFile( <mask> fsys fs.FS, <mask> c FileWalker, </s> Pull request: 3906 filewalker read limit Merge in DNS/adguard-home from 3906-filewalker-constraint to master Updates #3906. Squashed commit of the following: commit e1b654420a5031dbfe69d86c3fcf16a95a9ca935 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Dec 1 15:45:26 2021 +0300 aghos: rm filewalker limit </s> remove // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> add // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> remove // should be valid for fs.Glob. If cont is false, the walking terminates. Each // opened file is also limited for reading to MaxWalkedFileSize. </s> add // should be valid for fs.Glob. If FileWalker returns false for cont then // walking terminates. Prefer using bufio.Scanner to read the r since the input // is not limited. </s> remove var r io.Reader // Ignore the error since LimitReader function returns error only if passed // limit value is less than zero, but the constant used. // // TODO(e.burkov): Make variable. r, _ = aghio.LimitReader(f, MaxWalkedFileSize) return c(r) </s> add return c(f) </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghio" </s> add </s> remove } if fi.IsDir() { </s> add } else if fi.IsDir() {
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c6d13991306d9a74e6a59954f507d37b15af6c3
internal/aghos/filewalker.go
} else if fi.IsDir() {
<mask> <mask> var fi fs.FileInfo <mask> if fi, err = f.Stat(); err != nil { <mask> return nil, true, err <mask> } <mask> if fi.IsDir() { <mask> // Skip the directories. <mask> return nil, true, nil <mask> } <mask> <mask> var r io.Reader </s> Pull request: 3906 filewalker read limit Merge in DNS/adguard-home from 3906-filewalker-constraint to master Updates #3906. Squashed commit of the following: commit e1b654420a5031dbfe69d86c3fcf16a95a9ca935 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Dec 1 15:45:26 2021 +0300 aghos: rm filewalker limit </s> remove var r io.Reader // Ignore the error since LimitReader function returns error only if passed // limit value is less than zero, but the constant used. // // TODO(e.burkov): Make variable. r, _ = aghio.LimitReader(f, MaxWalkedFileSize) return c(r) </s> add return c(f) </s> remove // MaxWalkedFileSize is the maximum length of the file that FileWalker can // check. const MaxWalkedFileSize = 1024 * 1024 </s> add </s> remove // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> add // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> remove // should be valid for fs.Glob. If cont is false, the walking terminates. Each // opened file is also limited for reading to MaxWalkedFileSize. </s> add // should be valid for fs.Glob. If FileWalker returns false for cont then // walking terminates. Prefer using bufio.Scanner to read the r since the input // is not limited. </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghio" </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c6d13991306d9a74e6a59954f507d37b15af6c3
internal/aghos/filewalker.go
return c(f)
<mask> // Skip the directories. <mask> return nil, true, nil <mask> } <mask> <mask> var r io.Reader <mask> // Ignore the error since LimitReader function returns error only if passed <mask> // limit value is less than zero, but the constant used. <mask> // <mask> // TODO(e.burkov): Make variable. <mask> r, _ = aghio.LimitReader(f, MaxWalkedFileSize) <mask> <mask> return c(r) <mask> } <mask> <mask> // handlePatterns parses the patterns in fsys and ignores duplicates using <mask> // srcSet. srcSet must be non-nil. <mask> func handlePatterns( </s> Pull request: 3906 filewalker read limit Merge in DNS/adguard-home from 3906-filewalker-constraint to master Updates #3906. Squashed commit of the following: commit e1b654420a5031dbfe69d86c3fcf16a95a9ca935 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Dec 1 15:45:26 2021 +0300 aghos: rm filewalker limit </s> remove } if fi.IsDir() { </s> add } else if fi.IsDir() { </s> remove // should be valid for fs.Glob. If cont is false, the walking terminates. Each // opened file is also limited for reading to MaxWalkedFileSize. </s> add // should be valid for fs.Glob. If FileWalker returns false for cont then // walking terminates. Prefer using bufio.Scanner to read the r since the input // is not limited. </s> remove // MaxWalkedFileSize is the maximum length of the file that FileWalker can // check. const MaxWalkedFileSize = 1024 * 1024 </s> add </s> remove // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> add // TODO(e.burkov, a.garipov): Move into another package like aghfs. </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghio" </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c6d13991306d9a74e6a59954f507d37b15af6c3
internal/aghos/filewalker.go
<mask> ) <mask> <mask> // To transfer information between modules <mask> type dnsContext struct { <mask> // TODO(a.garipov): Remove this and rewrite processors to be methods of <mask> // *Server instead. <mask> srv *Server <mask> proxyCtx *proxy.DNSContext <mask> // setts are the filtering settings for the client. <mask> setts *filtering.Settings <mask> startTime time.Time <mask> result *filtering.Result </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove // assume that all the DHCP leases we give are locally-served or at // least don't need to be inaccessible externally. if s.subnetDetector.IsLocallyServedNetwork(ip) && !ctx.isLocalClient { log.Debug("dns: %q requests for internal ip", d.Addr) </s> add // assume that all the DHCP leases we give are locally-served or at least // don't need to be inaccessible externally. if !s.subnetDetector.IsLocallyServedNetwork(ip) { log.Debug("dns: addr %s is not from locally-served network", ip) return resultCodeSuccess } if !ctx.isLocalClient { log.Debug("dns: %q requests an internal ip", d.Addr) </s> remove // was successfully parsed. </s> add // parsed successfully and belongs to one of locally-served IP ranges as per // RFC 6303. </s> remove // Disable redundant filtering. filterSetts := s.getClientRequestFilteringSettings(ctx) filterSetts.ParentalEnabled = false filterSetts.SafeBrowsingEnabled = false filterSetts.SafeSearchEnabled = false filterSetts.ServicesRules = nil ctx.setts = filterSetts </s> add // There is no need to filter request from external addresses since this // code is only executed when the request is for locally-served ARPA // hostname so disable redundant filters. ctx.setts.ParentalEnabled = false ctx.setts.SafeBrowsingEnabled = false ctx.setts.SafeSearchEnabled = false ctx.setts.ServicesRules = nil </s> remove srv: s, </s> add </s> remove func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) {
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
// parsed successfully and belongs to one of locally-served IP ranges as per // RFC 6303.
<mask> // origResp is the response received from upstream. It is set when the <mask> // response is modified by filters. <mask> origResp *dns.Msg <mask> // unreversedReqIP stores an IP address obtained from PTR request if it <mask> // was successfully parsed. <mask> unreversedReqIP net.IP <mask> // err is the error returned from a processing function. <mask> err error <mask> // clientID is the clientID from DoH, DoQ, or DoT, if provided. <mask> clientID string </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove // Disable redundant filtering. filterSetts := s.getClientRequestFilteringSettings(ctx) filterSetts.ParentalEnabled = false filterSetts.SafeBrowsingEnabled = false filterSetts.SafeSearchEnabled = false filterSetts.ServicesRules = nil ctx.setts = filterSetts </s> add // There is no need to filter request from external addresses since this // code is only executed when the request is for locally-served ARPA // hostname so disable redundant filters. ctx.setts.ParentalEnabled = false ctx.setts.SafeBrowsingEnabled = false ctx.setts.SafeSearchEnabled = false ctx.setts.ServicesRules = nil </s> remove // assume that all the DHCP leases we give are locally-served or at // least don't need to be inaccessible externally. if s.subnetDetector.IsLocallyServedNetwork(ip) && !ctx.isLocalClient { log.Debug("dns: %q requests for internal ip", d.Addr) </s> add // assume that all the DHCP leases we give are locally-served or at least // don't need to be inaccessible externally. if !s.subnetDetector.IsLocallyServedNetwork(ip) { log.Debug("dns: addr %s is not from locally-served network", ip) return resultCodeSuccess } if !ctx.isLocalClient { log.Debug("dns: %q requests an internal ip", d.Addr) </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC { </s> remove func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove if ctx.setts == nil { ctx.setts = s.getClientRequestFilteringSettings(ctx) } </s> add
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
<mask> <mask> // handleDNSRequest filters the incoming DNS requests and writes them to the query log <mask> func (s *Server) handleDNSRequest(_ *proxy.Proxy, d *proxy.DNSContext) error { <mask> ctx := &dnsContext{ <mask> srv: s, <mask> proxyCtx: d, <mask> result: &filtering.Result{}, <mask> startTime: time.Now(), <mask> } <mask> </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove srv: &Server{ queryLog: ql, stats: st, }, </s> add </s> remove // assume that all the DHCP leases we give are locally-served or at // least don't need to be inaccessible externally. if s.subnetDetector.IsLocallyServedNetwork(ip) && !ctx.isLocalClient { log.Debug("dns: %q requests for internal ip", d.Addr) </s> add // assume that all the DHCP leases we give are locally-served or at least // don't need to be inaccessible externally. if !s.subnetDetector.IsLocallyServedNetwork(ip) { log.Debug("dns: addr %s is not from locally-served network", ip) return resultCodeSuccess } if !ctx.isLocalClient { log.Debug("dns: %q requests an internal ip", d.Addr) </s> remove // was successfully parsed. </s> add // parsed successfully and belongs to one of locally-served IP ranges as per // RFC 6303. </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
s.processInitial,
<mask> // (*proxy.Proxy).handleDNSRequest method performs it before calling the <mask> // appropriate handler. <mask> mods := []modProcessFunc{ <mask> s.processRecursion, <mask> processInitial, <mask> s.processDetermineLocal, <mask> s.processInternalHosts, <mask> s.processRestrictLocal, <mask> s.processInternalIPAddrs, <mask> s.processClientID, </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove processDNSSECAfterResponse, processFilteringAfterResponse, </s> add s.processDNSSECAfterResponse, s.processFilteringAfterResponse, </s> remove // was successfully parsed. </s> add // parsed successfully and belongs to one of locally-served IP ranges as per // RFC 6303. </s> remove // TODO(a.garipov): Remove this and rewrite processors to be methods of // *Server instead. srv *Server </s> add </s> remove srv: s, </s> add </s> remove processQueryLogsAndStats, </s> add s.processQueryLogsAndStats,
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
s.processDNSSECAfterResponse, s.processFilteringAfterResponse,
<mask> s.processClientID, <mask> s.processFilteringBeforeRequest, <mask> s.processLocalPTR, <mask> s.processUpstream, <mask> processDNSSECAfterResponse, <mask> processFilteringAfterResponse, <mask> s.ipset.process, <mask> processQueryLogsAndStats, <mask> } <mask> for _, process := range mods { <mask> r := process(ctx) </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove processQueryLogsAndStats, </s> add s.processQueryLogsAndStats, </s> remove processInitial, </s> add s.processInitial, </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC {
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
s.processQueryLogsAndStats,
<mask> s.processUpstream, <mask> processDNSSECAfterResponse, <mask> processFilteringAfterResponse, <mask> s.ipset.process, <mask> processQueryLogsAndStats, <mask> } <mask> for _, process := range mods { <mask> r := process(ctx) <mask> switch r { <mask> case resultCodeSuccess: </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove processDNSSECAfterResponse, processFilteringAfterResponse, </s> add s.processDNSSECAfterResponse, s.processFilteringAfterResponse, </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) {
<mask> return resultCodeSuccess <mask> } <mask> <mask> // Perform initial checks; process WHOIS & rDNS <mask> func processInitial(ctx *dnsContext) (rc resultCode) { <mask> s := ctx.srv <mask> d := ctx.proxyCtx <mask> if s.conf.AAAADisabled && d.Req.Question[0].Qtype == dns.TypeAAAA { <mask> _ = proxy.CheckDisabledAAAARequest(d, true) <mask> return resultCodeFinish <mask> } </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC { </s> remove s := ctx.srv </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
ctx.protectionEnabled = s.conf.ProtectionEnabled ctx.setts = s.getClientRequestFilteringSettings(ctx)
<mask> return resultCodeFinish <mask> } <mask> <mask> return resultCodeSuccess <mask> } <mask> <mask> func (s *Server) setTableHostToIP(t hostToIPTable) { <mask> s.tableHostToIPLock.Lock() </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove srv: s, </s> add </s> remove if ctx.setts == nil { ctx.setts = s.getClientRequestFilteringSettings(ctx) } </s> add
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
// assume that all the DHCP leases we give are locally-served or at least // don't need to be inaccessible externally. if !s.subnetDetector.IsLocallyServedNetwork(ip) { log.Debug("dns: addr %s is not from locally-served network", ip) return resultCodeSuccess } if !ctx.isLocalClient { log.Debug("dns: %q requests an internal ip", d.Addr)
<mask> return resultCodeError <mask> } <mask> <mask> // Restrict an access to local addresses for external clients. We also <mask> // assume that all the DHCP leases we give are locally-served or at <mask> // least don't need to be inaccessible externally. <mask> if s.subnetDetector.IsLocallyServedNetwork(ip) && !ctx.isLocalClient { <mask> log.Debug("dns: %q requests for internal ip", d.Addr) <mask> d.Res = s.genNXDomain(req) <mask> <mask> // Do not even put into query log. <mask> return resultCodeFinish <mask> } </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove // Disable redundant filtering. filterSetts := s.getClientRequestFilteringSettings(ctx) filterSetts.ParentalEnabled = false filterSetts.SafeBrowsingEnabled = false filterSetts.SafeSearchEnabled = false filterSetts.ServicesRules = nil ctx.setts = filterSetts </s> add // There is no need to filter request from external addresses since this // code is only executed when the request is for locally-served ARPA // hostname so disable redundant filters. ctx.setts.ParentalEnabled = false ctx.setts.SafeBrowsingEnabled = false ctx.setts.SafeSearchEnabled = false ctx.setts.ServicesRules = nil </s> remove // TODO(a.garipov): Remove this and rewrite processors to be methods of // *Server instead. srv *Server </s> add </s> remove srv: s, </s> add </s> remove // was successfully parsed. </s> add // parsed successfully and belongs to one of locally-served IP ranges as per // RFC 6303. </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) {
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
// There is no need to filter request from external addresses since this // code is only executed when the request is for locally-served ARPA // hostname so disable redundant filters. ctx.setts.ParentalEnabled = false ctx.setts.SafeBrowsingEnabled = false ctx.setts.SafeSearchEnabled = false ctx.setts.ServicesRules = nil
<mask> <mask> // Do not perform unreversing ever again. <mask> ctx.unreversedReqIP = ip <mask> <mask> // Disable redundant filtering. <mask> filterSetts := s.getClientRequestFilteringSettings(ctx) <mask> filterSetts.ParentalEnabled = false <mask> filterSetts.SafeBrowsingEnabled = false <mask> filterSetts.SafeSearchEnabled = false <mask> filterSetts.ServicesRules = nil <mask> ctx.setts = filterSetts <mask> <mask> // Nothing to restrict. <mask> return resultCodeSuccess <mask> } <mask> </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove if ctx.setts == nil { ctx.setts = s.getClientRequestFilteringSettings(ctx) } </s> add </s> remove ctx.protectionEnabled = s.conf.ProtectionEnabled </s> add </s> remove // assume that all the DHCP leases we give are locally-served or at // least don't need to be inaccessible externally. if s.subnetDetector.IsLocallyServedNetwork(ip) && !ctx.isLocalClient { log.Debug("dns: %q requests for internal ip", d.Addr) </s> add // assume that all the DHCP leases we give are locally-served or at least // don't need to be inaccessible externally. if !s.subnetDetector.IsLocallyServedNetwork(ip) { log.Debug("dns: addr %s is not from locally-served network", ip) return resultCodeSuccess } if !ctx.isLocalClient { log.Debug("dns: %q requests an internal ip", d.Addr) </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) {
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
<mask> <mask> s.serverLock.RLock() <mask> defer s.serverLock.RUnlock() <mask> <mask> ctx.protectionEnabled = s.conf.ProtectionEnabled <mask> <mask> if s.dnsFilter == nil { <mask> return resultCodeSuccess <mask> } <mask> <mask> if ctx.setts == nil { </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove if ctx.setts == nil { ctx.setts = s.getClientRequestFilteringSettings(ctx) } </s> add </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove // Disable redundant filtering. filterSetts := s.getClientRequestFilteringSettings(ctx) filterSetts.ParentalEnabled = false filterSetts.SafeBrowsingEnabled = false filterSetts.SafeSearchEnabled = false filterSetts.ServicesRules = nil ctx.setts = filterSetts </s> add // There is no need to filter request from external addresses since this // code is only executed when the request is for locally-served ARPA // hostname so disable redundant filters. ctx.setts.ParentalEnabled = false ctx.setts.SafeBrowsingEnabled = false ctx.setts.SafeSearchEnabled = false ctx.setts.ServicesRules = nil </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC {
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
<mask> if s.dnsFilter == nil { <mask> return resultCodeSuccess <mask> } <mask> <mask> if ctx.setts == nil { <mask> ctx.setts = s.getClientRequestFilteringSettings(ctx) <mask> } <mask> <mask> var err error <mask> if ctx.result, err = s.filterDNSRequest(ctx); err != nil { <mask> ctx.err = err <mask> <mask> return resultCodeError </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove ctx.protectionEnabled = s.conf.ProtectionEnabled </s> add </s> remove // Disable redundant filtering. filterSetts := s.getClientRequestFilteringSettings(ctx) filterSetts.ParentalEnabled = false filterSetts.SafeBrowsingEnabled = false filterSetts.SafeSearchEnabled = false filterSetts.ServicesRules = nil ctx.setts = filterSetts </s> add // There is no need to filter request from external addresses since this // code is only executed when the request is for locally-served ARPA // hostname so disable redundant filters. ctx.setts.ParentalEnabled = false ctx.setts.SafeBrowsingEnabled = false ctx.setts.SafeSearchEnabled = false ctx.setts.ServicesRules = nil </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove // was successfully parsed. </s> add // parsed successfully and belongs to one of locally-served IP ranges as per // RFC 6303.
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
func (s *Server) processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) {
<mask> return resultCodeSuccess <mask> } <mask> <mask> // Process DNSSEC after response from upstream server <mask> func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { <mask> d := ctx.proxyCtx <mask> <mask> if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers <mask> !ctx.srv.conf.EnableDNSSEC { <mask> return resultCodeSuccess </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC { </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove // assume that all the DHCP leases we give are locally-served or at // least don't need to be inaccessible externally. if s.subnetDetector.IsLocallyServedNetwork(ip) && !ctx.isLocalClient { log.Debug("dns: %q requests for internal ip", d.Addr) </s> add // assume that all the DHCP leases we give are locally-served or at least // don't need to be inaccessible externally. if !s.subnetDetector.IsLocallyServedNetwork(ip) { log.Debug("dns: addr %s is not from locally-served network", ip) return resultCodeSuccess } if !ctx.isLocalClient { log.Debug("dns: %q requests an internal ip", d.Addr) </s> remove func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
// Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC {
<mask> // Process DNSSEC after response from upstream server <mask> func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { <mask> d := ctx.proxyCtx <mask> <mask> if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers <mask> !ctx.srv.conf.EnableDNSSEC { <mask> return resultCodeSuccess <mask> } <mask> <mask> if !ctx.origReqDNSSEC { <mask> optResp := d.Res.IsEdns0() </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> remove // assume that all the DHCP leases we give are locally-served or at // least don't need to be inaccessible externally. if s.subnetDetector.IsLocallyServedNetwork(ip) && !ctx.isLocalClient { log.Debug("dns: %q requests for internal ip", d.Addr) </s> add // assume that all the DHCP leases we give are locally-served or at least // don't need to be inaccessible externally. if !s.subnetDetector.IsLocallyServedNetwork(ip) { log.Debug("dns: addr %s is not from locally-served network", ip) return resultCodeSuccess } if !ctx.isLocalClient { log.Debug("dns: %q requests an internal ip", d.Addr)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) {
<mask> return resultCodeSuccess <mask> } <mask> <mask> // Apply filtering logic after we have received response from upstream servers <mask> func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { <mask> s := ctx.srv <mask> d := ctx.proxyCtx <mask> <mask> switch res := ctx.result; res.Reason { <mask> case filtering.NotFilteredAllowList: <mask> // Go on. </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC { </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> remove s := ctx.srv </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/dns.go
func (s *Server) processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) {
<mask> "github.com/miekg/dns" <mask> ) <mask> <mask> // Write Stats data and logs <mask> func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { <mask> elapsed := time.Since(ctx.startTime) <mask> s := ctx.srv <mask> pctx := ctx.proxyCtx <mask> <mask> shouldLog := true </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove s := ctx.srv </s> add </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/stats.go
<mask> <mask> // Write Stats data and logs <mask> func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { <mask> elapsed := time.Since(ctx.startTime) <mask> s := ctx.srv <mask> pctx := ctx.proxyCtx <mask> <mask> shouldLog := true <mask> msg := pctx.Req <mask> </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove func processInitial(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processInitial(ctx *dnsContext) (rc resultCode) { </s> remove func processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processDNSSECAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove if !ctx.responseFromUpstream || // don't process response if it's not from upstream servers !ctx.srv.conf.EnableDNSSEC { </s> add // Don't process response if it's not from upstream servers. if !ctx.responseFromUpstream || !s.conf.EnableDNSSEC {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/stats.go
ql := &testQueryLog{} st := &testStats{} srv := &Server{ queryLog: ql, stats: st, }
<mask> <mask> for _, tc := range testCases { <mask> t.Run(tc.name, func(t *testing.T) { <mask> req := &dns.Msg{ <mask> Question: []dns.Question{{ <mask> Name: "example.com.", </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove processQueryLogsAndStats, </s> add s.processQueryLogsAndStats, </s> remove processDNSSECAfterResponse, processFilteringAfterResponse, </s> add s.processDNSSECAfterResponse, s.processFilteringAfterResponse, </s> remove func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> add func (s *Server) processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) { </s> remove func processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { s := ctx.srv </s> add func (s *Server) processFilteringAfterResponse(ctx *dnsContext) (rc resultCode) { </s> remove s := ctx.srv </s> add
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/stats_test.go
<mask> Res: &dns.Msg{}, <mask> Addr: tc.addr, <mask> Upstream: ups, <mask> } <mask> <mask> ql := &testQueryLog{} <mask> st := &testStats{} <mask> dctx := &dnsContext{ <mask> srv: &Server{ <mask> queryLog: ql, <mask> stats: st, <mask> }, </s> Pull request: 3842 ptr filtering Merge in DNS/adguard-home from 3842-fix-ptr-restrict to master Updates #3842. Squashed commit of the following: commit 77bbec41c5238f8fcb0d2bb8d11910d1ac521fcd Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 17:34:14 2021 +0300 dnsforward: imp docs commit c637276b5a53f5301387b7dc3035e265d0bc9418 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Nov 15 15:41:39 2021 +0300 dnsforward: fix local ptr blocking </s> remove srv: &Server{ queryLog: ql, stats: st, }, </s> add </s> remove srv: s, </s> add </s> remove code := processQueryLogsAndStats(dctx) </s> add code := srv.processQueryLogsAndStats(dctx) </s> remove processDNSSECAfterResponse, processFilteringAfterResponse, </s> add s.processDNSSECAfterResponse, s.processFilteringAfterResponse,
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9c8e087544d0497f1f4ec05d7fcabcb67c00ceff
internal/dnsforward/stats_test.go