docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
placeholder={t('dhcp_form_gateway_input')} | <mask> name="gateway_ip"
<mask> component={renderField}
<mask> type="text"
<mask> className="form-control"
<mask> placeholder="Gateway IP"
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
<label>{t('dhcp_form_subnet_input')}</label> | <mask> disabled={!enabled}
<mask> />
<mask> </div>
<mask> <div className="form__group form__group--dhcp">
<mask> <label>Subnet mask</label>
<mask> <Field
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
placeholder={t('dhcp_form_subnet_input')} | <mask> name="subnet_mask"
<mask> component={renderField}
<mask> type="text"
<mask> className="form-control"
<mask> placeholder="Subnet mask"
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
<label>{t('dhcp_form_range_title')}</label> | <mask> <div className="col-lg-6">
<mask> <div className="form__group form__group--dhcp">
<mask> <div className="row">
<mask> <div className="col-12">
<mask> <label>Range of IP addresses</label>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
placeholder={t('dhcp_form_range_start')} | <mask> name="range_start"
<mask> component={renderField}
<mask> type="text"
<mask> className="form-control"
<mask> placeholder="Range s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
placeholder={t('dhcp_form_range_end')} | <mask> name="range_end"
<mask> component={renderField}
<mask> type="text"
<mask> className="form-control"
<mask> placeholder="Range end... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
<label>{t('dhcp_form_lease_title')}</label> | <mask> </div>
<mask> </div>
<mask> </div>
<mask> <div className="form__group form__group--dhcp">
<mask> <label>DHCP lease time (in seconds)</label>
<mask> <Field
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
placeholder={t('dhcp_form_lease_input')} | <mask> name="lease_duration"
<mask> component={renderField}
<mask> type="number"
<mask> className="form-control"
<mask> placeholder="Lease duration"
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
{t('save_config')} | <mask> type="submit"
<mask> className="btn btn-success btn-standart"
<mask> disabled={pristine || submitting || !enabled}
<mask> >
<mask> Save config
<mask> </button>
<mask> </form>
<mask> );
<mask> };
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
t: PropTypes.func, | <mask> pristine: PropTypes.bool,
<mask> submitting: PropTypes.bool,
<mask> enabled: PropTypes.bool,
<mask> };
<mask>
<mask> export default flow([
<mask> withNamespaces(),
<mask> reduxForm({ form: 'dhcpForm' }),
<mask> ])(Form);
</s> Added DHCP form strings to translations </s> remove expo... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
export default flow([
withNamespaces(),
reduxForm({ form: 'dhcpForm' }),
])(Form); | <mask> submitting: PropTypes.bool,
<mask> enabled: PropTypes.bool,
<mask> };
<mask>
<mask> export default reduxForm({
<mask> form: 'dhcpForm',
<mask> })(Form);
</s> Added DHCP form strings to translations </s> remove return 'Invalid IPv4 format';
</s> add return <Trans>form_error_i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31 | client/src/components/Settings/Dhcp/Form.js |
TAG_NAME=$(shell git describe --abbrev=0)
PRERELEASE_VERSION=$(shell git describe --abbrev=0) | <mask>
<mask> # Version properties
<mask> COMMIT=$(shell git rev-parse --short HEAD)
<mask> # TODO(a.garipov): The cut call is a temporary solution to trim
<mask> # prerelease versions. See the comment in .goreleaser.yml.
<mask> RELEASE_VERSION=$(shell git describe --abbrev=0 | cut -c 1-8)
<mask> SNAPSHOT_VERS... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fb6bf82c7cb7bb152ec5bfb4812720be549cd80 | Makefile |
RELEASE_VERSION=$(shell git describe --abbrev=0 | cut -c 1-8) | <mask> # Version properties
<mask> COMMIT=$(shell git rev-parse --short HEAD)
<mask> # TODO(a.garipov): The cut call is a temporary solution to trim
<mask> # prerelease versions. See the comment in .goreleaser.yml.
<mask> TAG_NAME=$(shell git describe --abbrev=0 | cut -c 1-8)
<mask> RELEASE_VERSION=$(TAG_NAME)
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fb6bf82c7cb7bb152ec5bfb4812720be549cd80 | Makefile |
else ifeq ($(CHANNEL),beta)
VERSION=$(PRERELEASE_VERSION) | <mask> ifeq ($(TAG_NAME),$(shell git describe --abbrev=4))
<mask> ifeq ($(CHANNEL),edge)
<mask> VERSION=$(SNAPSHOT_VERSION)
<mask> else
<mask> VERSION=$(RELEASE_VERSION)
<mask> endif
<mask> else
</s> Pull request: all: improve prerelease version selection
Merge in DNS/adguard-home from fix-prereleases t... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9fb6bf82c7cb7bb152ec5bfb4812720be549cd80 | Makefile |
log.Printf("Reading config file: %s", configFile) | <mask>
<mask> // parseConfig loads configuration from the YAML file
<mask> func parseConfig() error {
<mask> configFile := config.getConfigFilename()
<mask> log.Tracef("Reading YAML file: %s", configFile)
<mask> yamlFile, err := readConfigFile()
<mask> if err != nil {
<mask> log.Printf("Couldn't read con... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | config.go |
once sync.Once | <mask> queryLog *queryLog // Query log instance
<mask> stats *stats // General server statistics
<mask>
<mask> sync.RWMutex
<mask> ServerConfig
<mask> }
<mask>
<mask> // NewServer creates a new instance of the dnsforward.Server
</s> Do not store last_updated in the config fi... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | dnsforward/dnsforward.go |
// TODO: Think about reworking this, the current approach won't work properly if AG Home is restarted periodically
s.once.Do(func() {
log.Printf("Start DNS server periodic jobs") | <mask> if err != nil {
<mask> return errorx.Decorate(err, "failed to load stats from querylog")
<mask> }
<mask>
<mask> // TODO: Start starts rotators, stop stops rotators
<mask> once.Do(func() {
<mask> go s.queryLog.periodicQueryLogRotate()
<mask> go s.queryLog.runningTop.periodicHourlyTopRotate()
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | dnsforward/dnsforward.go |
<mask> soa.Mbox += zone
<mask> }
<mask> return []dns.RR{&soa}
<mask> }
<mask>
<mask> var once sync.Once
</s> Do not store last_updated in the config file anymore </s> remove return safeWriteFile(filterFilePath, body)
</s> add err := safeWriteFile(filterFilePath, body)
// update LastUpdated field after ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | dnsforward/dnsforward.go | |
LastUpdated time.Time `json:"lastUpdated,omitempty" yaml:"-"` | <mask> Enabled bool `json:"enabled"`
<mask> URL string `json:"url"`
<mask> Name string `json:"name" yaml:"name"`
<mask> RulesCount int `json:"rulesCount" yaml:"-"`
<mask> LastUpdated time.Time `json:"lastUpdated,omitempty" yaml:"last_updated,omitempty"`
<mask>
<mask> d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | filter.go |
// Re-load it from the disk before updating
if len(filter.Rules) == 0 {
err := filter.load()
if err != nil {
log.Printf("Failed to reload filter %s: %s", filter.URL, err)
continue
}
}
| <mask> if filter.ID == 0 { // protect against users modifying the yaml and removing the ID
<mask> filter.ID = assignUniqueFilterID()
<mask> }
<mask>
<mask> updated, err := filter.update(force)
<mask> if err != nil {
<mask> log.Printf("Failed to update filter %s: %s\n", filter.URL, err)
<mask> ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | filter.go |
<mask> }
<mask>
<mask> log.Printf("Downloading update for filter %d from %s", filter.ID, filter.URL)
<mask>
<mask> // use the same update period for failed filter downloads to avoid flooding with requests
<mask> filter.LastUpdated = time.Now()
<mask>
<mask> resp, err := client.Get(filter.URL)
<mask> i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | filter.go | |
err := safeWriteFile(filterFilePath, body)
// update LastUpdated field after saving the file
filter.LastUpdated = filter.LastTimeUpdated()
return err | <mask> filterFilePath := filter.Path()
<mask> log.Printf("Saving filter %d contents to: %s", filter.ID, filterFilePath)
<mask> body := []byte(strings.Join(filter.Rules, "\n"))
<mask>
<mask> return safeWriteFile(filterFilePath, body)
<mask> }
<mask>
<mask> // loads filter contents from the file in dataDir
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | filter.go |
filter.LastUpdated = filter.LastTimeUpdated() | <mask>
<mask> filter.RulesCount = rulesCount
<mask> filter.Rules = rules
<mask>
<mask> return nil
<mask> }
<mask>
</s> Do not store last_updated in the config file anymore </s> remove LastUpdated time.Time `json:"lastUpdated,omitempty" yaml:"last_updated,omitempty"`
</s> add LastUpdated time.Time `json... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b | filter.go |
"EnableAll": true, | <mask> }
<mask> },
<mask> "WarnUnmatchedDirective": true,
<mask>
<mask> "DisableAll": true,
<mask> "Enable": [
<mask> "deadcode",
<mask> "gocyclo",
<mask> "gofmt",
<mask> "goimports",
<mask> "golint",
<mask> "gosimple",
<mask> "ineffassign",
<mask> "interfacer"... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | .gometalinter.json |
type bodyHandler func(body []byte, hashes map[string]bool) (Result, error) | <mask> return result, err
<mask> }
<mask>
<mask> type formatHandler func(hashparam string) string
<mask> type handleBodyHandler func(body []byte, hashes map[string]bool) (Result, error)
<mask>
<mask> // real implementation of lookup/check
<mask> func (d *Dnsfilter) lookupCommon(host string, lookupstats *Look... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
func (d *Dnsfilter) lookupCommon(host string, lookupstats *LookupStats, cache gcache.Cache, hashparamNeedSlash bool, format formatHandler, handleBody bodyHandler) (Result, error) { | <mask> type formatHandler func(hashparam string) string
<mask> type handleBodyHandler func(body []byte, hashes map[string]bool) (Result, error)
<mask>
<mask> // real implementation of lookup/check
<mask> func (d *Dnsfilter) lookupCommon(host string, lookupstats *LookupStats, cache gcache.Cache, hashparamNeedSlash... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
r := rule{ | <mask> return nil
<mask> }
<mask>
<mask> // Start parsing the rule
<mask> rule := rule{
<mask> text: input, // will be modified
<mask> originalText: input,
<mask> listID: filterListID,
<mask> }
<mask>
</s> Use EnableAll in gometalinter config </s> remove rule := rule{
</s> add ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
if strings.HasPrefix(r.text, "@@") {
r.isWhitelist = true
r.text = r.text[2:] | <mask> listID: filterListID,
<mask> }
<mask>
<mask> // Mark rule as whitelist if it starts with @@
<mask> if strings.HasPrefix(rule.text, "@@") {
<mask> rule.isWhitelist = true
<mask> rule.text = rule.text[2:]
<mask> }
<mask>
<mask> err := rule.parseOptions()
<mask> if err != nil {
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
err := r.parseOptions() | <mask> rule.isWhitelist = true
<mask> rule.text = rule.text[2:]
<mask> }
<mask>
<mask> err := rule.parseOptions()
<mask> if err != nil {
<mask> return err
<mask> }
<mask>
<mask> rule.extractShortcut()
</s> Use EnableAll in gometalinter config </s> remove if strings.HasPrefix(rule.text, "@@") {
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
r.extractShortcut() | <mask> if err != nil {
<mask> return err
<mask> }
<mask>
<mask> rule.extractShortcut()
<mask>
<mask> if !enableDelayedCompilation {
<mask> err := rule.compile()
<mask> if err != nil {
<mask> return err
</s> Use EnableAll in gometalinter config </s> remove err := rule.compile()
</s> add er... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
err := r.compile() | <mask>
<mask> rule.extractShortcut()
<mask>
<mask> if !enableDelayedCompilation {
<mask> err := rule.compile()
<mask> if err != nil {
<mask> return err
<mask> }
<mask> }
<mask>
</s> Use EnableAll in gometalinter config </s> remove rule.extractShortcut()
</s> add r.extractShortcut() </s> rem... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
if r.isImportant { | <mask> }
<mask> }
<mask>
<mask> destination := d.blackList
<mask> if rule.isImportant {
<mask> destination = d.important
<mask> } else if rule.isWhitelist {
<mask> destination = d.whiteList
<mask> }
<mask>
</s> Use EnableAll in gometalinter config </s> remove } else if rule.isWhitelist {
</s> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
} else if r.isWhitelist { | <mask>
<mask> destination := d.blackList
<mask> if rule.isImportant {
<mask> destination = d.important
<mask> } else if rule.isWhitelist {
<mask> destination = d.whiteList
<mask> }
<mask>
<mask> d.storageMutex.Lock()
<mask> d.storage[input] = true
</s> Use EnableAll in gometalinter config </s> re... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
destination.Add(&r) | <mask>
<mask> d.storageMutex.Lock()
<mask> d.storage[input] = true
<mask> d.storageMutex.Unlock()
<mask> destination.Add(&rule)
<mask> return nil
<mask> }
<mask>
<mask> // Parses the hosts-syntax rules. Returns false if the input string is not of hosts-syntax.
<mask> func (d *Dnsfilter) parseEtcHosts(i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
r := rule{ | <mask> d.storage[input] = true
<mask> d.storageMutex.Unlock()
<mask>
<mask> for _, host := range fields[1:] {
<mask> rule := rule{
<mask> text: host,
<mask> originalText: input,
<mask> listID: filterListID,
<mask> ip: addr,
<mask> }
</s> Use EnableAll in gometalint... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
d.blackList.Add(&r) | <mask> originalText: input,
<mask> listID: filterListID,
<mask> ip: addr,
<mask> }
<mask> d.blackList.Add(&rule)
<mask> }
<mask> return true
<mask> }
<mask>
<mask> // matchHost is a low-level way to check only if hostname is filtered by rules, skipping expensive safebrowsing an... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsfilter/dnsfilter.go |
v := currentValues[elapsed] | <mask> p.Lock()
<mask> {
<mask> countname := name + "_count"
<mask> currentValues := p.Entries[countname]
<mask> value := currentValues[elapsed]
<mask> // log.Tracef("Will change p.Entries[%s][%d] from %v to %v", countname, elapsed, value, value+1)
<mask> value++
<mask> currentValues[elapsed] = va... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsforward/stats.go |
v++
currentValues[elapsed] = v | <mask> countname := name + "_count"
<mask> currentValues := p.Entries[countname]
<mask> value := currentValues[elapsed]
<mask> // log.Tracef("Will change p.Entries[%s][%d] from %v to %v", countname, elapsed, value, value+1)
<mask> value++
<mask> currentValues[elapsed] = value
<mask> p.Entries[count... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7 | dnsforward/stats.go |
<code>[/example.local/]1.1.1.1</code> - <span dangerouslySetInnerHTML={{ __html: props.t('example_upstream_reserved') }} /> | <mask> <li>
<mask> <code>sdns://...</code> - <span dangerouslySetInnerHTML={{ __html: props.t('example_upstream_sdns') }} />
<mask> </li>
<mask> <li>
<mask> <code>[/host.com/]1.1.1.1</code> - <span dangerouslySetInnerHTML={{ __html: props.t('examp... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff | client/src/components/Settings/Upstream/Examples.js |
func validateUpstream(u string) (bool, error) { | <mask>
<mask> return nil
<mask> }
<mask>
<mask> func validateUpstream(u string) (defaultUpstream bool, err error) {
<mask> // Check if user tries to specify upstream for domain
<mask> defaultUpstream = true
<mask> u, defaultUpstream, err = separateUpstream(u)
<mask> if err != nil {
<mask> return
</s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff | control.go |
u, defaultUpstream, err := separateUpstream(u) | <mask> }
<mask>
<mask> func validateUpstream(u string) (defaultUpstream bool, err error) {
<mask> // Check if user tries to specify upstream for domain
<mask> defaultUpstream = true
<mask> u, defaultUpstream, err = separateUpstream(u)
<mask> if err != nil {
<mask> return
<mask> }
<mask>
<mask> // T... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff | control.go |
return defaultUpstream, err | <mask> // Check if user tries to specify upstream for domain
<mask> defaultUpstream = true
<mask> u, defaultUpstream, err = separateUpstream(u)
<mask> if err != nil {
<mask> return
<mask> }
<mask>
<mask> // The special server address '#' means "use the default servers"
<mask> if u == "#" && !defaultU... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff | control.go |
return defaultUpstream, nil | <mask> }
<mask>
<mask> // The special server address '#' means "use the default servers"
<mask> if u == "#" && !defaultUpstream {
<mask> return
<mask> }
<mask>
<mask> // Check if the upstream has a valid protocol prefix
<mask> for _, proto := range protocols {
<mask> if strings.HasPrefix(u, proto)... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff | control.go |
return defaultUpstream, nil | <mask>
<mask> // Check if the upstream has a valid protocol prefix
<mask> for _, proto := range protocols {
<mask> if strings.HasPrefix(u, proto) {
<mask> return
<mask> }
<mask> }
<mask>
<mask> // Return error if the upstream contains '://' without any valid protocol
<mask> if strings.Contains(u... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff | control.go |
// MarshalJSON implements the json.Marshaler interface for NetInterface.
func (iface NetInterface) MarshalJSON() ([]byte, error) { | <mask> // Array with IP networks for this network interface.
<mask> Subnets []*net.IPNet `json:"-"`
<mask> }
<mask>
<mask> // MarshalJSON implements the json.Marshaler interface for *NetInterface.
<mask> func (iface *NetInterface) MarshalJSON() ([]byte, error) {
<mask> type netInterface NetInterface
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/aghnet/net.go |
netInterface | <mask> type netInterface NetInterface
<mask> return json.Marshal(&struct {
<mask> HardwareAddr string `json:"hardware_address"`
<mask> Flags string `json:"flags"`
<mask> *netInterface
<mask> }{
<mask> HardwareAddr: iface.HardwareAddr.String(),
<mask> Flags: iface.Flags.String(),
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/aghnet/net.go |
netInterface: netInterface(iface), | <mask> *netInterface
<mask> }{
<mask> HardwareAddr: iface.HardwareAddr.String(),
<mask> Flags: iface.Flags.String(),
<mask> netInterface: (*netInterface)(iface),
<mask> })
<mask> }
<mask>
<mask> // GetValidNetInterfacesForWeb returns interfaces that are eligible for DNS and WEB only
<mask> /... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/aghnet/net.go |
// MarshalJSON implements the json.Marshaler interface for Lease.
func (l Lease) MarshalJSON() ([]byte, error) { | <mask> func (l *Lease) IsStatic() (ok bool) {
<mask> return l != nil && l.Expiry.Unix() == leaseExpireStatic
<mask> }
<mask>
<mask> // MarshalJSON implements the json.Marshaler interface for *Lease.
<mask> func (l *Lease) MarshalJSON() ([]byte, error) {
<mask> var expiryStr string
<mask> if !l.IsStatic() {
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/dhcpd/dhcpd.go |
lease | <mask> type lease Lease
<mask> return json.Marshal(&struct {
<mask> HWAddr string `json:"mac"`
<mask> Expiry string `json:"expires,omitempty"`
<mask> *lease
<mask> }{
<mask> HWAddr: l.HWAddr.String(),
<mask> Expiry: expiryStr,
<mask> lease: (*lease)(l),
<mask> })
</s> Pull request: home: imp... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/dhcpd/dhcpd.go |
lease: lease(l), | <mask> *lease
<mask> }{
<mask> HWAddr: l.HWAddr.String(),
<mask> Expiry: expiryStr,
<mask> lease: (*lease)(l),
<mask> })
<mask> }
<mask>
<mask> // UnmarshalJSON implements the json.Unmarshaler interface for *Lease.
<mask> func (l *Lease) UnmarshalJSON(data []byte) (err error) {
</s> Pull request:... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/dhcpd/dhcpd.go |
<mask> // UnmarshalJSON implements the json.Unmarshaler interface for *Lease.
<mask> func (l *Lease) UnmarshalJSON(data []byte) (err error) {
<mask> type lease Lease
<mask> aux := struct {
<mask> HWAddr string `json:"mac"`
<mask> *lease
<mask> }{
<mask> lease: (*lease)(l),
<mask> }
<mask> if err = ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/dhcpd/dhcpd.go | |
HWAddr string `json:"mac"` | <mask> type lease Lease
<mask> aux := struct {
<mask> *lease
<mask> }{
<mask> lease: (*lease)(l),
<mask> }
<mask> if err = json.Unmarshal(data, &aux); err != nil {
</s> Pull request: home: imp err handling, marshalling
Merge in DNS/adguard-home from imp-code to master
Squashed commit of the following... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/dhcpd/dhcpd.go |
"errors" | <mask>
<mask> import (
<mask> "bufio"
<mask> "fmt"
<mask> "hash/crc32"
<mask> "io"
<mask> "io/ioutil"
<mask> "net/http"
<mask> "os"
</s> Pull request: home: imp err handling, marshalling
Merge in DNS/adguard-home from imp-code to master
Squashed commit of the following:
commit 9433fb9b0154a1cfaf804... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go |
func (f *Filtering) load(filter *filter) (err error) { | <mask> return updated, nil
<mask> }
<mask>
<mask> // loads filter contents from the file in dataDir
<mask> func (f *Filtering) load(filter *filter) error {
<mask> filterFilePath := filter.Path()
<mask> log.Tracef("Loading filter %d contents to: %s", filter.ID, filterFilePath)
<mask>
<mask> if _, err := o... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go |
<mask>
<mask> // loads filter contents from the file in dataDir
<mask> func (f *Filtering) load(filter *filter) error {
<mask> filterFilePath := filter.Path()
<mask> log.Tracef("Loading filter %d contents to: %s", filter.ID, filterFilePath)
<mask>
<mask> if _, err := os.Stat(filterFilePath); os.IsNotExist(e... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go | |
log.Tracef("filtering: loading filter %d contents to: %s", filter.ID, filterFilePath) | <mask> func (f *Filtering) load(filter *filter) error {
<mask> filterFilePath := filter.Path()
<mask> log.Tracef("Loading filter %d contents to: %s", filter.ID, filterFilePath)
<mask>
<mask> if _, err := os.Stat(filterFilePath); os.IsNotExist(err) {
<mask> // do nothing, file doesn't exist
<mask> return ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go |
if errors.Is(err, os.ErrNotExist) {
// Do nothing, file doesn't exist.
return nil
} else if err != nil {
return fmt.Errorf("opening filter file: %w", err) | <mask> return err
<mask> }
<mask>
<mask> file, err := os.Open(filterFilePath)
<mask> if err != nil {
<mask> return err
<mask> }
<mask> defer file.Close()
<mask> st, _ := file.Stat()
<mask>
<mask> log.Tracef("File %s, id %d, length %d",
</s> Pull request: home: imp err handling, marshalling
Mer... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go |
<mask> if err != nil {
<mask> return err
<mask> }
<mask> defer file.Close()
<mask> st, _ := file.Stat()
<mask>
<mask> log.Tracef("File %s, id %d, length %d",
<mask> filterFilePath, filter.ID, st.Size())
<mask> rulesCount, checksum, _ := f.parseFilterContents(file)
<mask>
</s> Pull request: home: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go | |
st, err := file.Stat()
if err != nil {
return fmt.Errorf("getting filter file stat: %w", err)
}
log.Tracef("filtering: File %s, id %d, length %d", filterFilePath, filter.ID, st.Size())
| <mask> }
<mask> defer file.Close()
<mask> st, _ := file.Stat()
<mask>
<mask> log.Tracef("File %s, id %d, length %d",
<mask> filterFilePath, filter.ID, st.Size())
<mask> rulesCount, checksum, _ := f.parseFilterContents(file)
<mask>
<mask> filter.RulesCount = rulesCount
<mask> filter.checksum = check... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go |
filter.LastUpdated = st.ModTime() | <mask> rulesCount, checksum, _ := f.parseFilterContents(file)
<mask>
<mask> filter.RulesCount = rulesCount
<mask> filter.checksum = checksum
<mask> filter.LastUpdated = filter.LastTimeUpdated()
<mask>
<mask> return nil
<mask> }
<mask>
<mask> // Clear filter rules
</s> Pull request: home: imp err hand... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go |
<mask> func (filter *filter) Path() string {
<mask> return filepath.Join(Context.getDataDir(), filterDir, strconv.FormatInt(filter.ID, 10)+".txt")
<mask> }
<mask>
<mask> // LastTimeUpdated returns the time when the filter was last time updated
<mask> func (filter *filter) LastTimeUpdated() time.Time {
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"k... | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/filter.go | |
"errors" | <mask>
<mask> import (
<mask> "fmt"
<mask> "io/ioutil"
<mask> "os"
<mask> "runtime"
<mask> "strconv"
<mask> "strings"
</s> Pull request: home: imp err handling, marshalling
Merge in DNS/adguard-home from imp-code to master
Squashed commit of the following:
commit 9433fb9b0154a1cfaf804edbfa8531efbbcbf... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go |
log.Error("not implemented on windows")
| <mask> // Send SIGHUP to a process with ID taken from our pid-file
<mask> // If pid-file doesn't exist, find our PID using 'ps' command
<mask> func sendSigReload() {
<mask> if runtime.GOOS == "windows" {
<mask> log.Error("Not implemented on Windows")
<mask> return
<mask> }
<mask>
<mask> pidfile := fmt.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go |
if errors.Is(err, os.ErrNotExist) { | <mask> }
<mask>
<mask> pidfile := fmt.Sprintf("/var/run/%s.pid", serviceName)
<mask> data, err := ioutil.ReadFile(pidfile)
<mask> if os.IsNotExist(err) {
<mask> var code int
<mask> var psdata string
<mask> code, psdata, err = aghos.RunCommand("ps", "-C", serviceName, "-o", "pid=")
<mask> if err !=... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go |
log.Error("finding AdGuardHome process: code: %d, error: %s", code, err)
| <mask> var code int
<mask> var psdata string
<mask> code, psdata, err = aghos.RunCommand("ps", "-C", serviceName, "-o", "pid=")
<mask> if err != nil || code != 0 {
<mask> log.Error("Can't find AdGuardHome process: %s code:%d", err, code)
<mask> return
<mask> }
<mask> data = []byte(psdata)
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go |
<mask> if err != nil || code != 0 {
<mask> log.Error("Can't find AdGuardHome process: %s code:%d", err, code)
<mask> return
<mask> }
<mask> data = []byte(psdata)
<mask>
<mask> } else if err != nil {
<mask> log.Error("Can't read PID file %s: %s", pidfile, err)
<mask> return
<mask> }
</s> P... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go | |
data = []byte(psdata) | <mask> }
<mask>
<mask> } else if err != nil {
<mask> log.Error("reading pid file %s: %s", pidfile, err)
<mask>
<mask> return
<mask> }
</s> Pull request: home: imp err handling, marshalling
Merge in DNS/adguard-home from imp-code to master
Squashed commit of the following:
commit 9433fb9b0154a1cfaf8... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go |
log.Error("reading pid file %s: %s", pidfile, err)
| <mask> }
<mask> data = []byte(psdata)
<mask>
<mask> } else if err != nil {
<mask> log.Error("Can't read PID file %s: %s", pidfile, err)
<mask> return
<mask> }
<mask>
<mask> parts := strings.SplitN(string(data), "\n", 2)
<mask> if len(parts) == 0 {
</s> Pull request: home: imp err handling, mars... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go |
if err != nil && !errors.Is(err, os.ErrNotExist) { | <mask>
<mask> if runtime.GOOS == "darwin" {
<mask> // Remove log files on cleanup and log errors.
<mask> err = os.Remove(launchdStdoutPath)
<mask> if err != nil && !os.IsNotExist(err) {
<mask> log.Printf("removing stdout file: %s", err)
<mask> }
<mask>
<mask> err = os.Remove(launchdStderrPath)
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go |
if err != nil && !errors.Is(err, os.ErrNotExist) { | <mask> log.Printf("removing stdout file: %s", err)
<mask> }
<mask>
<mask> err = os.Remove(launchdStderrPath)
<mask> if err != nil && !os.IsNotExist(err) {
<mask> log.Printf("removing stderr file: %s", err)
<mask> }
<mask> }
<mask> }
<mask>
</s> Pull request: home: imp err handling, marshalli... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/service.go |
"errors" | <mask>
<mask> import (
<mask> "fmt"
<mask> "net/url"
<mask> "os"
<mask> "path"
<mask> "path/filepath"
<mask> "runtime"
</s> Pull request: home: imp err handling, marshalling
Merge in DNS/adguard-home from imp-code to master
Squashed commit of the following:
commit 9433fb9b0154a1cfaf804edbfa8531efbbcb... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/upgrade.go |
func upgradeSchema0to1(diskConf yobj) (err error) { | <mask> }
<mask>
<mask> // The first schema upgrade:
<mask> // No more "dnsfilter.txt", filters are now kept in data/filters/
<mask> func upgradeSchema0to1(diskConf yobj) error {
<mask> log.Printf("%s(): called", funcName())
<mask>
<mask> dnsFilterPath := filepath.Join(Context.workDir, "dnsfilter.txt")
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/upgrade.go |
log.Printf("deleting %s as we don't need it anymore", dnsFilterPath)
err = os.Remove(dnsFilterPath)
if err != nil && !errors.Is(err, os.ErrNotExist) {
log.Info("warning: %s", err)
// Go on. | <mask> func upgradeSchema0to1(diskConf yobj) error {
<mask> log.Printf("%s(): called", funcName())
<mask>
<mask> dnsFilterPath := filepath.Join(Context.workDir, "dnsfilter.txt")
<mask> if _, err := os.Stat(dnsFilterPath); !os.IsNotExist(err) {
<mask> log.Printf("Deleting %s as we don't need it anymore", dns... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/upgrade.go |
func upgradeSchema1to2(diskConf yobj) (err error) { | <mask>
<mask> // Second schema upgrade:
<mask> // coredns is now dns in config
<mask> // delete 'Corefile', since we don't use that anymore
<mask> func upgradeSchema1to2(diskConf yobj) error {
<mask> log.Printf("%s(): called", funcName())
<mask>
<mask> coreFilePath := filepath.Join(Context.workDir, "Corefil... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/upgrade.go |
log.Printf("deleting %s as we don't need it anymore", coreFilePath)
err = os.Remove(coreFilePath)
if err != nil && !errors.Is(err, os.ErrNotExist) {
log.Info("warning: %s", err)
// Go on. | <mask> func upgradeSchema1to2(diskConf yobj) error {
<mask> log.Printf("%s(): called", funcName())
<mask>
<mask> coreFilePath := filepath.Join(Context.workDir, "Corefile")
<mask> if _, err := os.Stat(coreFilePath); !os.IsNotExist(err) {
<mask> log.Printf("Deleting %s as we don't need it anymore", coreFilePa... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c | internal/home/upgrade.go |
interval={msToDays(stats.interval)} | <mask> </Trans>
<mask> </div>
<mask> )}
<mask> <Statistics
<mask> interval={stats.interval}
<mask> dnsQueries={stats.dnsQueries}
<mask> blockedFiltering={stats.block... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0349b6c7ea64bc3fe117f4e432e22f98ca1577f | client/src/components/Dashboard/index.js |
import { msToDays } from '../../helpers/helpers'; | <mask> import round from 'lodash/round';
<mask> import { useSelector } from 'react-redux';
<mask> import PropTypes from 'prop-types';
<mask> import './Line.css';
<mask>
<mask> const Line = ({
<mask> data, color = 'black',
<mask> }) => {
<mask> const interval = msToDays(useSelector((state) => state.sta... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0349b6c7ea64bc3fe117f4e432e22f98ca1577f | client/src/components/ui/Line.js |
const interval = msToDays(useSelector((state) => state.stats.interval)); | <mask>
<mask> const Line = ({
<mask> data, color = 'black',
<mask> }) => {
<mask> const interval = useSelector((state) => state.stats.interval);
<mask>
<mask> return <ResponsiveLine
<mask> enableArea
<mask> animate
<mask> enableSlices="x"
</s> Pull request 1792: 5633-inv... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0349b6c7ea64bc3fe117f4e432e22f98ca1577f | client/src/components/ui/Line.js |
// leaseExpireStatic is used to define the Expiry field for static
// leases.
//
// TODO(e.burkov): Remove it when static leases determining mechanism
// will be improved.
leaseExpireStatic = 1 | <mask> )
<mask>
<mask> const (
<mask> defaultDiscoverTime = time.Second * 3
<mask> leaseExpireStatic = 1
<mask> )
<mask>
<mask> var webHandlersRegistered = false
<mask>
<mask> // Lease contains the necessary information about a DHCP lease
</s> Pull request: 2692 time format
Merge in DNS/adguard-home ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282 | internal/dhcpd/dhcpd.go |
var expiryStr string
if expiry := l.Expiry; expiry.Unix() != leaseExpireStatic {
// The front-end is waiting for RFC 3999 format of the time
// value. It also shouldn't got an Expiry field for static
// leases.
//
// See https://github.com/AdguardTeam/AdGuardHome/issues/2692.
expiryStr = expiry.Format(ti... | <mask> // MarshalJSON implements the json.Marshaler interface for *Lease.
<mask> func (l *Lease) MarshalJSON() ([]byte, error) {
<mask> type lease Lease
<mask> return json.Marshal(&struct {
<mask> HWAddr string `json:"mac"`
<mask> Expiry string `json:"expires,omitempty"`
<mask> *lease
<mask> }{
</s> P... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282 | internal/dhcpd/dhcpd.go |
Expiry string `json:"expires,omitempty"` | <mask>
<mask> type lease Lease
<mask> return json.Marshal(&struct {
<mask> HWAddr string `json:"mac"`
<mask> *lease
<mask> }{
<mask> HWAddr: l.HWAddr.String(),
<mask> Expiry: expiryStr,
<mask> lease: (*lease)(l),
<mask> })
</s> Pull request: 2692 time format
Merge in DNS/adguard-home from 26... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282 | internal/dhcpd/dhcpd.go |
Expiry: expiryStr, | <mask> }{
<mask> HWAddr: l.HWAddr.String(),
<mask> lease: (*lease)(l),
<mask> })
<mask> }
<mask>
</s> Pull request: 2692 time format
Merge in DNS/adguard-home from 2692-time-format to master
Closes #2692.
Squashed commit of the following:
commit a77e3ffc1e2ca7ad1eb4b56641eee787595268e9
Merge: 5262c0b... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282 | internal/dhcpd/dhcpd.go |
// Leases returns the list of active IPv4 and IPv6 DHCP leases. It's safe for
// concurrent use.
func (s *Server) Leases(flags int) (leases []Lease) {
return append(s.srv4.GetLeases(flags), s.srv6.GetLeases(flags)...) | <mask> LeasesStatic = 2
<mask> LeasesAll = LeasesDynamic | LeasesStatic
<mask> )
<mask>
<mask> // Leases returns the list of current DHCP leases (thread-safe)
<mask> func (s *Server) Leases(flags int) []Lease {
<mask> result := s.srv4.GetLeases(flags)
<mask>
<mask> v6leases := s.srv6.GetLeases(flags... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282 | internal/dhcpd/dhcpd.go |
"strings"
"sync"
"time" | <mask> import (
<mask> "fmt"
<mask> "net"
<mask> "os"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/dnsforward"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/gol... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2 | dns.go |
"github.com/AdguardTeam/dnsproxy/upstream" | <mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/dnsforward"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/joomcode/errorx"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> var dnsServer *d... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2 | dns.go |
"github.com/miekg/dns" | <mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/joomcode/errorx"
<mask> )
<mask>
<mask> var dnsServer *dnsforward.Server
<mask>
</s> + clients: find DNS client's hostname by IP using rDNS | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2 | dns.go |
const (
rdnsTimeout = 3 * time.Second // max time to wait for rDNS response
)
type dnsContext struct {
rdnsChannel chan string // pass data from DNS request handling thread to rDNS thread
// contains IP addresses of clients to be resolved by rDNS
// if IP address couldn't be resolved, it stays here forever to prev... | <mask>
<mask> var dnsServer *dnsforward.Server
<mask>
<mask> // initDNSServer creates an instance of the dnsforward.Server
<mask> // Please note that we must do it even if we don't start it
<mask> // so that we had access to the query log and the stats
<mask> func initDNSServer(baseDir string) {
</s> + client... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2 | dns.go |
bindhost := config.DNS.BindHost
if config.DNS.BindHost == "0.0.0.0" {
bindhost = "127.0.0.1"
}
resolverAddress := fmt.Sprintf("%s:%d", bindhost, config.DNS.Port)
opts := upstream.Options{
Timeout: rdnsTimeout,
}
dnsctx.upstream, err = upstream.AddressToUpstream(resolverAddress, opts)
if err != nil {
log.E... | <mask> log.Fatalf("Cannot create DNS data dir at %s: %s", baseDir, err)
<mask> }
<mask>
<mask> dnsServer = dnsforward.NewServer(baseDir)
<mask> }
<mask>
<mask> func isRunning() bool {
<mask> return dnsServer != nil && dnsServer.IsRunning()
<mask> }
<mask>
</s> + clients: find DNS client's hostname by... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2 | dns.go |
newconfig.OnDNSRequest = onDNSRequest | <mask> newconfig.DomainsReservedUpstreams = upstreamConfig.DomainReservedUpstreams
<mask> newconfig.AllServers = config.DNS.AllServers
<mask> newconfig.FilterHandler = applyClientSettings
<mask> return newconfig
<mask> }
<mask>
<mask> // If a client has his own settings, apply them
<mask> func applyClientS... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2 | dns.go |
OnDNSRequest func(d *proxy.DNSContext) | <mask> TCPListenAddr *net.TCPAddr // TCP listen address
<mask> Upstreams []upstream.Upstream // Configured upstreams
<mask> DomainsReservedUpstreams map[string][]upstream.Upstream // Map of domains and lists of configured upstreams
<mask> Filters ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2 | dnsforward/dnsforward.go |
if s.conf.OnDNSRequest != nil {
s.conf.OnDNSRequest(d)
}
| <mask> func (s *Server) handleDNSRequest(p *proxy.Proxy, d *proxy.DNSContext) error {
<mask> start := time.Now()
<mask>
<mask> // use dnsfilter before cache -- changed settings or filters would require cache invalidation otherwise
<mask> res, err := s.filterDNSRequest(d)
<mask> if err != nil {
<mask> retu... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2 | dnsforward/dnsforward.go |
LeaseChangedRemovedAll | <mask> LeaseChangedAdded = iota
<mask> LeaseChangedAddedStatic
<mask> LeaseChangedRemovedStatic
<mask>
<mask> LeaseChangedDBStore
<mask> )
<mask>
<mask> // Server - the current state of the DHCP server
<mask> type Server struct {
</s> Pull request: all: do not use dhcp clients when server is off
Closes... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/dhcpd.go |
// Signal to the clients containers in packages home and dnsforward that
// it should reload the DHCP clients.
s.conf.notify(LeaseChangedAdded)
| <mask> log.Debug("dhcpv4: srv.Serve: %s", err)
<mask> }()
<mask>
<mask> return nil
<mask> }
<mask>
<mask> // Stop - stop server
<mask> func (s *v4Server) Stop() {
</s> Pull request: all: do not use dhcp clients when server is off
Closes #2934.
Squashed commit of the following:
commit 856ea4ec0c3ffb1da... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/v4.go |
// Signal to the clients containers in packages home and dnsforward that
// it should remove all DHCP clients.
s.conf.notify(LeaseChangedRemovedAll)
| <mask> err := s.srv.Close()
<mask> if err != nil {
<mask> log.Error("dhcpv4: srv.Close: %s", err)
<mask> }
<mask> // now s.srv.Serve() will return
<mask> s.srv = nil
<mask> }
<mask>
<mask> // Create DHCPv4 server
<mask> func v4Create(conf V4ServerConf) (srv DHCPServer, err error) {
</s> Pull request:... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/v4.go |
require.NoError(t, err) | <mask> GatewayIP: net.IP{192, 168, 10, 1},
<mask> SubnetMask: net.IP{255, 255, 255, 0},
<mask> notify: notify4,
<mask> })
<mask> require.Nil(t, err)
<mask>
<mask> ls := s.GetLeases(LeasesStatic)
<mask> assert.Empty(t, ls)
<mask>
<mask> // Add static lease.
</s> Pull request: all: do not use... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/v4_test.go |
err = s.AddStaticLease(l)
require.NoError(t, err)
err = s.AddStaticLease(l)
assert.Error(t, err) | <mask> l := Lease{
<mask> IP: net.IP{192, 168, 10, 150},
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
<mask> }
<mask> require.Nil(t, s.AddStaticLease(l))
<mask> assert.NotNil(t, s.AddStaticLease(l))
<mask>
<mask> ls = s.GetLeases(LeasesStatic)
<mask> require.Len(t, ls, 1)... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/v4_test.go |
err = s.RemoveStaticLease(Lease{ | <mask> assert.Equal(t, l.HWAddr, ls[0].HWAddr)
<mask> assert.True(t, ls[0].IsStatic())
<mask>
<mask> // Try to remove static lease.
<mask> assert.NotNil(t, s.RemoveStaticLease(Lease{
<mask> IP: net.IP{192, 168, 10, 110},
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
<mask> }... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/v4_test.go |
})
assert.Error(t, err) | <mask> // Try to remove static lease.
<mask> assert.NotNil(t, s.RemoveStaticLease(Lease{
<mask> IP: net.IP{192, 168, 10, 110},
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
<mask> }))
<mask>
<mask> // Remove static lease.
<mask> require.Nil(t, s.RemoveStaticLease(l))
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/v4_test.go |
err = s.RemoveStaticLease(l)
require.NoError(t, err) | <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
<mask> }))
<mask>
<mask> // Remove static lease.
<mask> require.Nil(t, s.RemoveStaticLease(l))
<mask> ls = s.GetLeases(LeasesStatic)
<mask> assert.Empty(t, ls)
<mask> }
<mask>
<mask> func TestV4_AddReplace(t *testing.T) {
</s> Pull... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/v4_test.go |
require.NoError(t, err) | <mask> GatewayIP: net.IP{192, 168, 10, 1},
<mask> SubnetMask: net.IP{255, 255, 255, 0},
<mask> notify: notify4,
<mask> })
<mask> require.Nil(t, err)
<mask>
<mask> s, ok := sIface.(*v4Server)
<mask> require.True(t, ok)
<mask>
<mask> dynLeases := []Lease{{
</s> Pull request: all: do not use d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0 | internal/dhcpd/v4_test.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.