docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
placeholder={t('dhcp_form_gateway_input')}
<mask> name="gateway_ip" <mask> component={renderField} <mask> type="text" <mask> className="form-control" <mask> placeholder="Gateway IP" <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
<label>{t('dhcp_form_subnet_input')}</label>
<mask> disabled={!enabled} <mask> /> <mask> </div> <mask> <div className="form__group form__group--dhcp"> <mask> <label>Subnet mask</label> <mask> <Field <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
placeholder={t('dhcp_form_subnet_input')}
<mask> name="subnet_mask" <mask> component={renderField} <mask> type="text" <mask> className="form-control" <mask> placeholder="Subnet mask" <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
<label>{t('dhcp_form_range_title')}</label>
<mask> <div className="col-lg-6"> <mask> <div className="form__group form__group--dhcp"> <mask> <div className="row"> <mask> <div className="col-12"> <mask> <label>Range of IP addresses</label> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
placeholder={t('dhcp_form_range_start')}
<mask> name="range_start" <mask> component={renderField} <mask> type="text" <mask> className="form-control" <mask> placeholder="Range s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
placeholder={t('dhcp_form_range_end')}
<mask> name="range_end" <mask> component={renderField} <mask> type="text" <mask> className="form-control" <mask> placeholder="Range end...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
<label>{t('dhcp_form_lease_title')}</label>
<mask> </div> <mask> </div> <mask> </div> <mask> <div className="form__group form__group--dhcp"> <mask> <label>DHCP lease time (in seconds)</label> <mask> <Field <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
placeholder={t('dhcp_form_lease_input')}
<mask> name="lease_duration" <mask> component={renderField} <mask> type="number" <mask> className="form-control" <mask> placeholder="Lease duration" <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
{t('save_config')}
<mask> type="submit" <mask> className="btn btn-success btn-standart" <mask> disabled={pristine || submitting || !enabled} <mask> > <mask> Save config <mask> </button> <mask> </form> <mask> ); <mask> }; <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
t: PropTypes.func,
<mask> pristine: PropTypes.bool, <mask> submitting: PropTypes.bool, <mask> enabled: PropTypes.bool, <mask> }; <mask> <mask> export default flow([ <mask> withNamespaces(), <mask> reduxForm({ form: 'dhcpForm' }), <mask> ])(Form); </s> Added DHCP form strings to translations </s> remove expo...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
export default flow([ withNamespaces(), reduxForm({ form: 'dhcpForm' }), ])(Form);
<mask> submitting: PropTypes.bool, <mask> enabled: PropTypes.bool, <mask> }; <mask> <mask> export default reduxForm({ <mask> form: 'dhcpForm', <mask> })(Form); </s> Added DHCP form strings to translations </s> remove return 'Invalid IPv4 format'; </s> add return <Trans>form_error_i...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fa85a5c48cc5db772c3fd4c0decddd30a8a6b31
client/src/components/Settings/Dhcp/Form.js
TAG_NAME=$(shell git describe --abbrev=0) PRERELEASE_VERSION=$(shell git describe --abbrev=0)
<mask> <mask> # Version properties <mask> COMMIT=$(shell git rev-parse --short HEAD) <mask> # TODO(a.garipov): The cut call is a temporary solution to trim <mask> # prerelease versions. See the comment in .goreleaser.yml. <mask> RELEASE_VERSION=$(shell git describe --abbrev=0 | cut -c 1-8) <mask> SNAPSHOT_VERS...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fb6bf82c7cb7bb152ec5bfb4812720be549cd80
Makefile
RELEASE_VERSION=$(shell git describe --abbrev=0 | cut -c 1-8)
<mask> # Version properties <mask> COMMIT=$(shell git rev-parse --short HEAD) <mask> # TODO(a.garipov): The cut call is a temporary solution to trim <mask> # prerelease versions. See the comment in .goreleaser.yml. <mask> TAG_NAME=$(shell git describe --abbrev=0 | cut -c 1-8) <mask> RELEASE_VERSION=$(TAG_NAME) ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fb6bf82c7cb7bb152ec5bfb4812720be549cd80
Makefile
else ifeq ($(CHANNEL),beta) VERSION=$(PRERELEASE_VERSION)
<mask> ifeq ($(TAG_NAME),$(shell git describe --abbrev=4)) <mask> ifeq ($(CHANNEL),edge) <mask> VERSION=$(SNAPSHOT_VERSION) <mask> else <mask> VERSION=$(RELEASE_VERSION) <mask> endif <mask> else </s> Pull request: all: improve prerelease version selection Merge in DNS/adguard-home from fix-prereleases t...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9fb6bf82c7cb7bb152ec5bfb4812720be549cd80
Makefile
log.Printf("Reading config file: %s", configFile)
<mask> <mask> // parseConfig loads configuration from the YAML file <mask> func parseConfig() error { <mask> configFile := config.getConfigFilename() <mask> log.Tracef("Reading YAML file: %s", configFile) <mask> yamlFile, err := readConfigFile() <mask> if err != nil { <mask> log.Printf("Couldn't read con...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
config.go
once sync.Once
<mask> queryLog *queryLog // Query log instance <mask> stats *stats // General server statistics <mask> <mask> sync.RWMutex <mask> ServerConfig <mask> } <mask> <mask> // NewServer creates a new instance of the dnsforward.Server </s> Do not store last_updated in the config fi...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
dnsforward/dnsforward.go
// TODO: Think about reworking this, the current approach won't work properly if AG Home is restarted periodically s.once.Do(func() { log.Printf("Start DNS server periodic jobs")
<mask> if err != nil { <mask> return errorx.Decorate(err, "failed to load stats from querylog") <mask> } <mask> <mask> // TODO: Start starts rotators, stop stops rotators <mask> once.Do(func() { <mask> go s.queryLog.periodicQueryLogRotate() <mask> go s.queryLog.runningTop.periodicHourlyTopRotate() <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
dnsforward/dnsforward.go
<mask> soa.Mbox += zone <mask> } <mask> return []dns.RR{&soa} <mask> } <mask> <mask> var once sync.Once </s> Do not store last_updated in the config file anymore </s> remove return safeWriteFile(filterFilePath, body) </s> add err := safeWriteFile(filterFilePath, body) // update LastUpdated field after ...
[ "keep", "keep", "keep", "keep", "replace", "replace" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
dnsforward/dnsforward.go
LastUpdated time.Time `json:"lastUpdated,omitempty" yaml:"-"`
<mask> Enabled bool `json:"enabled"` <mask> URL string `json:"url"` <mask> Name string `json:"name" yaml:"name"` <mask> RulesCount int `json:"rulesCount" yaml:"-"` <mask> LastUpdated time.Time `json:"lastUpdated,omitempty" yaml:"last_updated,omitempty"` <mask> <mask> d...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
filter.go
// Re-load it from the disk before updating if len(filter.Rules) == 0 { err := filter.load() if err != nil { log.Printf("Failed to reload filter %s: %s", filter.URL, err) continue } }
<mask> if filter.ID == 0 { // protect against users modifying the yaml and removing the ID <mask> filter.ID = assignUniqueFilterID() <mask> } <mask> <mask> updated, err := filter.update(force) <mask> if err != nil { <mask> log.Printf("Failed to update filter %s: %s\n", filter.URL, err) <mask> ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
filter.go
<mask> } <mask> <mask> log.Printf("Downloading update for filter %d from %s", filter.ID, filter.URL) <mask> <mask> // use the same update period for failed filter downloads to avoid flooding with requests <mask> filter.LastUpdated = time.Now() <mask> <mask> resp, err := client.Get(filter.URL) <mask> i...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
filter.go
err := safeWriteFile(filterFilePath, body) // update LastUpdated field after saving the file filter.LastUpdated = filter.LastTimeUpdated() return err
<mask> filterFilePath := filter.Path() <mask> log.Printf("Saving filter %d contents to: %s", filter.ID, filterFilePath) <mask> body := []byte(strings.Join(filter.Rules, "\n")) <mask> <mask> return safeWriteFile(filterFilePath, body) <mask> } <mask> <mask> // loads filter contents from the file in dataDir ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
filter.go
filter.LastUpdated = filter.LastTimeUpdated()
<mask> <mask> filter.RulesCount = rulesCount <mask> filter.Rules = rules <mask> <mask> return nil <mask> } <mask> </s> Do not store last_updated in the config file anymore </s> remove LastUpdated time.Time `json:"lastUpdated,omitempty" yaml:"last_updated,omitempty"` </s> add LastUpdated time.Time `json...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/9ff420bb52e5f863dbd422e0ff7c7dd4e8f9fb6b
filter.go
"EnableAll": true,
<mask> } <mask> }, <mask> "WarnUnmatchedDirective": true, <mask> <mask> "DisableAll": true, <mask> "Enable": [ <mask> "deadcode", <mask> "gocyclo", <mask> "gofmt", <mask> "goimports", <mask> "golint", <mask> "gosimple", <mask> "ineffassign", <mask> "interfacer"...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
.gometalinter.json
type bodyHandler func(body []byte, hashes map[string]bool) (Result, error)
<mask> return result, err <mask> } <mask> <mask> type formatHandler func(hashparam string) string <mask> type handleBodyHandler func(body []byte, hashes map[string]bool) (Result, error) <mask> <mask> // real implementation of lookup/check <mask> func (d *Dnsfilter) lookupCommon(host string, lookupstats *Look...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
func (d *Dnsfilter) lookupCommon(host string, lookupstats *LookupStats, cache gcache.Cache, hashparamNeedSlash bool, format formatHandler, handleBody bodyHandler) (Result, error) {
<mask> type formatHandler func(hashparam string) string <mask> type handleBodyHandler func(body []byte, hashes map[string]bool) (Result, error) <mask> <mask> // real implementation of lookup/check <mask> func (d *Dnsfilter) lookupCommon(host string, lookupstats *LookupStats, cache gcache.Cache, hashparamNeedSlash...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
r := rule{
<mask> return nil <mask> } <mask> <mask> // Start parsing the rule <mask> rule := rule{ <mask> text: input, // will be modified <mask> originalText: input, <mask> listID: filterListID, <mask> } <mask> </s> Use EnableAll in gometalinter config </s> remove rule := rule{ </s> add ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
if strings.HasPrefix(r.text, "@@") { r.isWhitelist = true r.text = r.text[2:]
<mask> listID: filterListID, <mask> } <mask> <mask> // Mark rule as whitelist if it starts with @@ <mask> if strings.HasPrefix(rule.text, "@@") { <mask> rule.isWhitelist = true <mask> rule.text = rule.text[2:] <mask> } <mask> <mask> err := rule.parseOptions() <mask> if err != nil { <mask...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
err := r.parseOptions()
<mask> rule.isWhitelist = true <mask> rule.text = rule.text[2:] <mask> } <mask> <mask> err := rule.parseOptions() <mask> if err != nil { <mask> return err <mask> } <mask> <mask> rule.extractShortcut() </s> Use EnableAll in gometalinter config </s> remove if strings.HasPrefix(rule.text, "@@") { ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
r.extractShortcut()
<mask> if err != nil { <mask> return err <mask> } <mask> <mask> rule.extractShortcut() <mask> <mask> if !enableDelayedCompilation { <mask> err := rule.compile() <mask> if err != nil { <mask> return err </s> Use EnableAll in gometalinter config </s> remove err := rule.compile() </s> add er...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
err := r.compile()
<mask> <mask> rule.extractShortcut() <mask> <mask> if !enableDelayedCompilation { <mask> err := rule.compile() <mask> if err != nil { <mask> return err <mask> } <mask> } <mask> </s> Use EnableAll in gometalinter config </s> remove rule.extractShortcut() </s> add r.extractShortcut() </s> rem...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
if r.isImportant {
<mask> } <mask> } <mask> <mask> destination := d.blackList <mask> if rule.isImportant { <mask> destination = d.important <mask> } else if rule.isWhitelist { <mask> destination = d.whiteList <mask> } <mask> </s> Use EnableAll in gometalinter config </s> remove } else if rule.isWhitelist { </s> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
} else if r.isWhitelist {
<mask> <mask> destination := d.blackList <mask> if rule.isImportant { <mask> destination = d.important <mask> } else if rule.isWhitelist { <mask> destination = d.whiteList <mask> } <mask> <mask> d.storageMutex.Lock() <mask> d.storage[input] = true </s> Use EnableAll in gometalinter config </s> re...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
destination.Add(&r)
<mask> <mask> d.storageMutex.Lock() <mask> d.storage[input] = true <mask> d.storageMutex.Unlock() <mask> destination.Add(&rule) <mask> return nil <mask> } <mask> <mask> // Parses the hosts-syntax rules. Returns false if the input string is not of hosts-syntax. <mask> func (d *Dnsfilter) parseEtcHosts(i...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
r := rule{
<mask> d.storage[input] = true <mask> d.storageMutex.Unlock() <mask> <mask> for _, host := range fields[1:] { <mask> rule := rule{ <mask> text: host, <mask> originalText: input, <mask> listID: filterListID, <mask> ip: addr, <mask> } </s> Use EnableAll in gometalint...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
d.blackList.Add(&r)
<mask> originalText: input, <mask> listID: filterListID, <mask> ip: addr, <mask> } <mask> d.blackList.Add(&rule) <mask> } <mask> return true <mask> } <mask> <mask> // matchHost is a low-level way to check only if hostname is filtered by rules, skipping expensive safebrowsing an...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsfilter/dnsfilter.go
v := currentValues[elapsed]
<mask> p.Lock() <mask> { <mask> countname := name + "_count" <mask> currentValues := p.Entries[countname] <mask> value := currentValues[elapsed] <mask> // log.Tracef("Will change p.Entries[%s][%d] from %v to %v", countname, elapsed, value, value+1) <mask> value++ <mask> currentValues[elapsed] = va...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsforward/stats.go
v++ currentValues[elapsed] = v
<mask> countname := name + "_count" <mask> currentValues := p.Entries[countname] <mask> value := currentValues[elapsed] <mask> // log.Tracef("Will change p.Entries[%s][%d] from %v to %v", countname, elapsed, value, value+1) <mask> value++ <mask> currentValues[elapsed] = value <mask> p.Entries[count...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0157e39c6d580f5dbea968dd32e820420c686d7
dnsforward/stats.go
<code>[/example.local/]1.1.1.1</code> - <span dangerouslySetInnerHTML={{ __html: props.t('example_upstream_reserved') }} />
<mask> <li> <mask> <code>sdns://...</code> - <span dangerouslySetInnerHTML={{ __html: props.t('example_upstream_sdns') }} /> <mask> </li> <mask> <li> <mask> <code>[/host.com/]1.1.1.1</code> - <span dangerouslySetInnerHTML={{ __html: props.t('examp...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff
client/src/components/Settings/Upstream/Examples.js
func validateUpstream(u string) (bool, error) {
<mask> <mask> return nil <mask> } <mask> <mask> func validateUpstream(u string) (defaultUpstream bool, err error) { <mask> // Check if user tries to specify upstream for domain <mask> defaultUpstream = true <mask> u, defaultUpstream, err = separateUpstream(u) <mask> if err != nil { <mask> return </s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff
control.go
u, defaultUpstream, err := separateUpstream(u)
<mask> } <mask> <mask> func validateUpstream(u string) (defaultUpstream bool, err error) { <mask> // Check if user tries to specify upstream for domain <mask> defaultUpstream = true <mask> u, defaultUpstream, err = separateUpstream(u) <mask> if err != nil { <mask> return <mask> } <mask> <mask> // T...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff
control.go
return defaultUpstream, err
<mask> // Check if user tries to specify upstream for domain <mask> defaultUpstream = true <mask> u, defaultUpstream, err = separateUpstream(u) <mask> if err != nil { <mask> return <mask> } <mask> <mask> // The special server address '#' means "use the default servers" <mask> if u == "#" && !defaultU...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff
control.go
return defaultUpstream, nil
<mask> } <mask> <mask> // The special server address '#' means "use the default servers" <mask> if u == "#" && !defaultUpstream { <mask> return <mask> } <mask> <mask> // Check if the upstream has a valid protocol prefix <mask> for _, proto := range protocols { <mask> if strings.HasPrefix(u, proto)...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff
control.go
return defaultUpstream, nil
<mask> <mask> // Check if the upstream has a valid protocol prefix <mask> for _, proto := range protocols { <mask> if strings.HasPrefix(u, proto) { <mask> return <mask> } <mask> } <mask> <mask> // Return error if the upstream contains '://' without any valid protocol <mask> if strings.Contains(u...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a01ba5dd4d04bd722cfca2cee950411f3deaabff
control.go
// MarshalJSON implements the json.Marshaler interface for NetInterface. func (iface NetInterface) MarshalJSON() ([]byte, error) {
<mask> // Array with IP networks for this network interface. <mask> Subnets []*net.IPNet `json:"-"` <mask> } <mask> <mask> // MarshalJSON implements the json.Marshaler interface for *NetInterface. <mask> func (iface *NetInterface) MarshalJSON() ([]byte, error) { <mask> type netInterface NetInterface <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/aghnet/net.go
netInterface
<mask> type netInterface NetInterface <mask> return json.Marshal(&struct { <mask> HardwareAddr string `json:"hardware_address"` <mask> Flags string `json:"flags"` <mask> *netInterface <mask> }{ <mask> HardwareAddr: iface.HardwareAddr.String(), <mask> Flags: iface.Flags.String(), <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/aghnet/net.go
netInterface: netInterface(iface),
<mask> *netInterface <mask> }{ <mask> HardwareAddr: iface.HardwareAddr.String(), <mask> Flags: iface.Flags.String(), <mask> netInterface: (*netInterface)(iface), <mask> }) <mask> } <mask> <mask> // GetValidNetInterfacesForWeb returns interfaces that are eligible for DNS and WEB only <mask> /...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/aghnet/net.go
// MarshalJSON implements the json.Marshaler interface for Lease. func (l Lease) MarshalJSON() ([]byte, error) {
<mask> func (l *Lease) IsStatic() (ok bool) { <mask> return l != nil && l.Expiry.Unix() == leaseExpireStatic <mask> } <mask> <mask> // MarshalJSON implements the json.Marshaler interface for *Lease. <mask> func (l *Lease) MarshalJSON() ([]byte, error) { <mask> var expiryStr string <mask> if !l.IsStatic() { ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/dhcpd/dhcpd.go
lease
<mask> type lease Lease <mask> return json.Marshal(&struct { <mask> HWAddr string `json:"mac"` <mask> Expiry string `json:"expires,omitempty"` <mask> *lease <mask> }{ <mask> HWAddr: l.HWAddr.String(), <mask> Expiry: expiryStr, <mask> lease: (*lease)(l), <mask> }) </s> Pull request: home: imp...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/dhcpd/dhcpd.go
lease: lease(l),
<mask> *lease <mask> }{ <mask> HWAddr: l.HWAddr.String(), <mask> Expiry: expiryStr, <mask> lease: (*lease)(l), <mask> }) <mask> } <mask> <mask> // UnmarshalJSON implements the json.Unmarshaler interface for *Lease. <mask> func (l *Lease) UnmarshalJSON(data []byte) (err error) { </s> Pull request:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/dhcpd/dhcpd.go
<mask> // UnmarshalJSON implements the json.Unmarshaler interface for *Lease. <mask> func (l *Lease) UnmarshalJSON(data []byte) (err error) { <mask> type lease Lease <mask> aux := struct { <mask> HWAddr string `json:"mac"` <mask> *lease <mask> }{ <mask> lease: (*lease)(l), <mask> } <mask> if err = ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/dhcpd/dhcpd.go
HWAddr string `json:"mac"`
<mask> type lease Lease <mask> aux := struct { <mask> *lease <mask> }{ <mask> lease: (*lease)(l), <mask> } <mask> if err = json.Unmarshal(data, &aux); err != nil { </s> Pull request: home: imp err handling, marshalling Merge in DNS/adguard-home from imp-code to master Squashed commit of the following...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/dhcpd/dhcpd.go
"errors"
<mask> <mask> import ( <mask> "bufio" <mask> "fmt" <mask> "hash/crc32" <mask> "io" <mask> "io/ioutil" <mask> "net/http" <mask> "os" </s> Pull request: home: imp err handling, marshalling Merge in DNS/adguard-home from imp-code to master Squashed commit of the following: commit 9433fb9b0154a1cfaf804...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
func (f *Filtering) load(filter *filter) (err error) {
<mask> return updated, nil <mask> } <mask> <mask> // loads filter contents from the file in dataDir <mask> func (f *Filtering) load(filter *filter) error { <mask> filterFilePath := filter.Path() <mask> log.Tracef("Loading filter %d contents to: %s", filter.ID, filterFilePath) <mask> <mask> if _, err := o...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
<mask> <mask> // loads filter contents from the file in dataDir <mask> func (f *Filtering) load(filter *filter) error { <mask> filterFilePath := filter.Path() <mask> log.Tracef("Loading filter %d contents to: %s", filter.ID, filterFilePath) <mask> <mask> if _, err := os.Stat(filterFilePath); os.IsNotExist(e...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
log.Tracef("filtering: loading filter %d contents to: %s", filter.ID, filterFilePath)
<mask> func (f *Filtering) load(filter *filter) error { <mask> filterFilePath := filter.Path() <mask> log.Tracef("Loading filter %d contents to: %s", filter.ID, filterFilePath) <mask> <mask> if _, err := os.Stat(filterFilePath); os.IsNotExist(err) { <mask> // do nothing, file doesn't exist <mask> return ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
if errors.Is(err, os.ErrNotExist) { // Do nothing, file doesn't exist. return nil } else if err != nil { return fmt.Errorf("opening filter file: %w", err)
<mask> return err <mask> } <mask> <mask> file, err := os.Open(filterFilePath) <mask> if err != nil { <mask> return err <mask> } <mask> defer file.Close() <mask> st, _ := file.Stat() <mask> <mask> log.Tracef("File %s, id %d, length %d", </s> Pull request: home: imp err handling, marshalling Mer...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
<mask> if err != nil { <mask> return err <mask> } <mask> defer file.Close() <mask> st, _ := file.Stat() <mask> <mask> log.Tracef("File %s, id %d, length %d", <mask> filterFilePath, filter.ID, st.Size()) <mask> rulesCount, checksum, _ := f.parseFilterContents(file) <mask> </s> Pull request: home: ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
st, err := file.Stat() if err != nil { return fmt.Errorf("getting filter file stat: %w", err) } log.Tracef("filtering: File %s, id %d, length %d", filterFilePath, filter.ID, st.Size())
<mask> } <mask> defer file.Close() <mask> st, _ := file.Stat() <mask> <mask> log.Tracef("File %s, id %d, length %d", <mask> filterFilePath, filter.ID, st.Size()) <mask> rulesCount, checksum, _ := f.parseFilterContents(file) <mask> <mask> filter.RulesCount = rulesCount <mask> filter.checksum = check...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
filter.LastUpdated = st.ModTime()
<mask> rulesCount, checksum, _ := f.parseFilterContents(file) <mask> <mask> filter.RulesCount = rulesCount <mask> filter.checksum = checksum <mask> filter.LastUpdated = filter.LastTimeUpdated() <mask> <mask> return nil <mask> } <mask> <mask> // Clear filter rules </s> Pull request: home: imp err hand...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
<mask> func (filter *filter) Path() string { <mask> return filepath.Join(Context.getDataDir(), filterDir, strconv.FormatInt(filter.ID, 10)+".txt") <mask> } <mask> <mask> // LastTimeUpdated returns the time when the filter was last time updated <mask> func (filter *filter) LastTimeUpdated() time.Time { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "k...
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/filter.go
"errors"
<mask> <mask> import ( <mask> "fmt" <mask> "io/ioutil" <mask> "os" <mask> "runtime" <mask> "strconv" <mask> "strings" </s> Pull request: home: imp err handling, marshalling Merge in DNS/adguard-home from imp-code to master Squashed commit of the following: commit 9433fb9b0154a1cfaf804edbfa8531efbbcbf...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
log.Error("not implemented on windows")
<mask> // Send SIGHUP to a process with ID taken from our pid-file <mask> // If pid-file doesn't exist, find our PID using 'ps' command <mask> func sendSigReload() { <mask> if runtime.GOOS == "windows" { <mask> log.Error("Not implemented on Windows") <mask> return <mask> } <mask> <mask> pidfile := fmt....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
if errors.Is(err, os.ErrNotExist) {
<mask> } <mask> <mask> pidfile := fmt.Sprintf("/var/run/%s.pid", serviceName) <mask> data, err := ioutil.ReadFile(pidfile) <mask> if os.IsNotExist(err) { <mask> var code int <mask> var psdata string <mask> code, psdata, err = aghos.RunCommand("ps", "-C", serviceName, "-o", "pid=") <mask> if err !=...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
log.Error("finding AdGuardHome process: code: %d, error: %s", code, err)
<mask> var code int <mask> var psdata string <mask> code, psdata, err = aghos.RunCommand("ps", "-C", serviceName, "-o", "pid=") <mask> if err != nil || code != 0 { <mask> log.Error("Can't find AdGuardHome process: %s code:%d", err, code) <mask> return <mask> } <mask> data = []byte(psdata) <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
<mask> if err != nil || code != 0 { <mask> log.Error("Can't find AdGuardHome process: %s code:%d", err, code) <mask> return <mask> } <mask> data = []byte(psdata) <mask> <mask> } else if err != nil { <mask> log.Error("Can't read PID file %s: %s", pidfile, err) <mask> return <mask> } </s> P...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
data = []byte(psdata)
<mask> } <mask> <mask> } else if err != nil { <mask> log.Error("reading pid file %s: %s", pidfile, err) <mask> <mask> return <mask> } </s> Pull request: home: imp err handling, marshalling Merge in DNS/adguard-home from imp-code to master Squashed commit of the following: commit 9433fb9b0154a1cfaf8...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
log.Error("reading pid file %s: %s", pidfile, err)
<mask> } <mask> data = []byte(psdata) <mask> <mask> } else if err != nil { <mask> log.Error("Can't read PID file %s: %s", pidfile, err) <mask> return <mask> } <mask> <mask> parts := strings.SplitN(string(data), "\n", 2) <mask> if len(parts) == 0 { </s> Pull request: home: imp err handling, mars...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
if err != nil && !errors.Is(err, os.ErrNotExist) {
<mask> <mask> if runtime.GOOS == "darwin" { <mask> // Remove log files on cleanup and log errors. <mask> err = os.Remove(launchdStdoutPath) <mask> if err != nil && !os.IsNotExist(err) { <mask> log.Printf("removing stdout file: %s", err) <mask> } <mask> <mask> err = os.Remove(launchdStderrPath) ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
if err != nil && !errors.Is(err, os.ErrNotExist) {
<mask> log.Printf("removing stdout file: %s", err) <mask> } <mask> <mask> err = os.Remove(launchdStderrPath) <mask> if err != nil && !os.IsNotExist(err) { <mask> log.Printf("removing stderr file: %s", err) <mask> } <mask> } <mask> } <mask> </s> Pull request: home: imp err handling, marshalli...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/service.go
"errors"
<mask> <mask> import ( <mask> "fmt" <mask> "net/url" <mask> "os" <mask> "path" <mask> "path/filepath" <mask> "runtime" </s> Pull request: home: imp err handling, marshalling Merge in DNS/adguard-home from imp-code to master Squashed commit of the following: commit 9433fb9b0154a1cfaf804edbfa8531efbbcb...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/upgrade.go
func upgradeSchema0to1(diskConf yobj) (err error) {
<mask> } <mask> <mask> // The first schema upgrade: <mask> // No more "dnsfilter.txt", filters are now kept in data/filters/ <mask> func upgradeSchema0to1(diskConf yobj) error { <mask> log.Printf("%s(): called", funcName()) <mask> <mask> dnsFilterPath := filepath.Join(Context.workDir, "dnsfilter.txt") <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/upgrade.go
log.Printf("deleting %s as we don't need it anymore", dnsFilterPath) err = os.Remove(dnsFilterPath) if err != nil && !errors.Is(err, os.ErrNotExist) { log.Info("warning: %s", err) // Go on.
<mask> func upgradeSchema0to1(diskConf yobj) error { <mask> log.Printf("%s(): called", funcName()) <mask> <mask> dnsFilterPath := filepath.Join(Context.workDir, "dnsfilter.txt") <mask> if _, err := os.Stat(dnsFilterPath); !os.IsNotExist(err) { <mask> log.Printf("Deleting %s as we don't need it anymore", dns...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/upgrade.go
func upgradeSchema1to2(diskConf yobj) (err error) {
<mask> <mask> // Second schema upgrade: <mask> // coredns is now dns in config <mask> // delete 'Corefile', since we don't use that anymore <mask> func upgradeSchema1to2(diskConf yobj) error { <mask> log.Printf("%s(): called", funcName()) <mask> <mask> coreFilePath := filepath.Join(Context.workDir, "Corefil...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/upgrade.go
log.Printf("deleting %s as we don't need it anymore", coreFilePath) err = os.Remove(coreFilePath) if err != nil && !errors.Is(err, os.ErrNotExist) { log.Info("warning: %s", err) // Go on.
<mask> func upgradeSchema1to2(diskConf yobj) error { <mask> log.Printf("%s(): called", funcName()) <mask> <mask> coreFilePath := filepath.Join(Context.workDir, "Corefile") <mask> if _, err := os.Stat(coreFilePath); !os.IsNotExist(err) { <mask> log.Printf("Deleting %s as we don't need it anymore", coreFilePa...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a031cae447e5f77a88f9d7a8c2c1d1dcb1fda11c
internal/home/upgrade.go
interval={msToDays(stats.interval)}
<mask> </Trans> <mask> </div> <mask> )} <mask> <Statistics <mask> interval={stats.interval} <mask> dnsQueries={stats.dnsQueries} <mask> blockedFiltering={stats.block...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0349b6c7ea64bc3fe117f4e432e22f98ca1577f
client/src/components/Dashboard/index.js
import { msToDays } from '../../helpers/helpers';
<mask> import round from 'lodash/round'; <mask> import { useSelector } from 'react-redux'; <mask> import PropTypes from 'prop-types'; <mask> import './Line.css'; <mask> <mask> const Line = ({ <mask> data, color = 'black', <mask> }) => { <mask> const interval = msToDays(useSelector((state) => state.sta...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0349b6c7ea64bc3fe117f4e432e22f98ca1577f
client/src/components/ui/Line.js
const interval = msToDays(useSelector((state) => state.stats.interval));
<mask> <mask> const Line = ({ <mask> data, color = 'black', <mask> }) => { <mask> const interval = useSelector((state) => state.stats.interval); <mask> <mask> return <ResponsiveLine <mask> enableArea <mask> animate <mask> enableSlices="x" </s> Pull request 1792: 5633-inv...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0349b6c7ea64bc3fe117f4e432e22f98ca1577f
client/src/components/ui/Line.js
// leaseExpireStatic is used to define the Expiry field for static // leases. // // TODO(e.burkov): Remove it when static leases determining mechanism // will be improved. leaseExpireStatic = 1
<mask> ) <mask> <mask> const ( <mask> defaultDiscoverTime = time.Second * 3 <mask> leaseExpireStatic = 1 <mask> ) <mask> <mask> var webHandlersRegistered = false <mask> <mask> // Lease contains the necessary information about a DHCP lease </s> Pull request: 2692 time format Merge in DNS/adguard-home ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282
internal/dhcpd/dhcpd.go
var expiryStr string if expiry := l.Expiry; expiry.Unix() != leaseExpireStatic { // The front-end is waiting for RFC 3999 format of the time // value. It also shouldn't got an Expiry field for static // leases. // // See https://github.com/AdguardTeam/AdGuardHome/issues/2692. expiryStr = expiry.Format(ti...
<mask> // MarshalJSON implements the json.Marshaler interface for *Lease. <mask> func (l *Lease) MarshalJSON() ([]byte, error) { <mask> type lease Lease <mask> return json.Marshal(&struct { <mask> HWAddr string `json:"mac"` <mask> Expiry string `json:"expires,omitempty"` <mask> *lease <mask> }{ </s> P...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282
internal/dhcpd/dhcpd.go
Expiry string `json:"expires,omitempty"`
<mask> <mask> type lease Lease <mask> return json.Marshal(&struct { <mask> HWAddr string `json:"mac"` <mask> *lease <mask> }{ <mask> HWAddr: l.HWAddr.String(), <mask> Expiry: expiryStr, <mask> lease: (*lease)(l), <mask> }) </s> Pull request: 2692 time format Merge in DNS/adguard-home from 26...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282
internal/dhcpd/dhcpd.go
Expiry: expiryStr,
<mask> }{ <mask> HWAddr: l.HWAddr.String(), <mask> lease: (*lease)(l), <mask> }) <mask> } <mask> </s> Pull request: 2692 time format Merge in DNS/adguard-home from 2692-time-format to master Closes #2692. Squashed commit of the following: commit a77e3ffc1e2ca7ad1eb4b56641eee787595268e9 Merge: 5262c0b...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282
internal/dhcpd/dhcpd.go
// Leases returns the list of active IPv4 and IPv6 DHCP leases. It's safe for // concurrent use. func (s *Server) Leases(flags int) (leases []Lease) { return append(s.srv4.GetLeases(flags), s.srv6.GetLeases(flags)...)
<mask> LeasesStatic = 2 <mask> LeasesAll = LeasesDynamic | LeasesStatic <mask> ) <mask> <mask> // Leases returns the list of current DHCP leases (thread-safe) <mask> func (s *Server) Leases(flags int) []Lease { <mask> result := s.srv4.GetLeases(flags) <mask> <mask> v6leases := s.srv6.GetLeases(flags...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a0abad6644d1cbe80d9293b6742e38c4c6ddc282
internal/dhcpd/dhcpd.go
"strings" "sync" "time"
<mask> import ( <mask> "fmt" <mask> "net" <mask> "os" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/dnsforward" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/gol...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2
dns.go
"github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/dnsforward" <mask> "github.com/AdguardTeam/dnsproxy/proxy" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/joomcode/errorx" <mask> "github.com/miekg/dns" <mask> ) <mask> <mask> var dnsServer *d...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2
dns.go
"github.com/miekg/dns"
<mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/joomcode/errorx" <mask> ) <mask> <mask> var dnsServer *dnsforward.Server <mask> </s> + clients: find DNS client's hostname by IP using rDNS
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2
dns.go
const ( rdnsTimeout = 3 * time.Second // max time to wait for rDNS response ) type dnsContext struct { rdnsChannel chan string // pass data from DNS request handling thread to rDNS thread // contains IP addresses of clients to be resolved by rDNS // if IP address couldn't be resolved, it stays here forever to prev...
<mask> <mask> var dnsServer *dnsforward.Server <mask> <mask> // initDNSServer creates an instance of the dnsforward.Server <mask> // Please note that we must do it even if we don't start it <mask> // so that we had access to the query log and the stats <mask> func initDNSServer(baseDir string) { </s> + client...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2
dns.go
bindhost := config.DNS.BindHost if config.DNS.BindHost == "0.0.0.0" { bindhost = "127.0.0.1" } resolverAddress := fmt.Sprintf("%s:%d", bindhost, config.DNS.Port) opts := upstream.Options{ Timeout: rdnsTimeout, } dnsctx.upstream, err = upstream.AddressToUpstream(resolverAddress, opts) if err != nil { log.E...
<mask> log.Fatalf("Cannot create DNS data dir at %s: %s", baseDir, err) <mask> } <mask> <mask> dnsServer = dnsforward.NewServer(baseDir) <mask> } <mask> <mask> func isRunning() bool { <mask> return dnsServer != nil && dnsServer.IsRunning() <mask> } <mask> </s> + clients: find DNS client's hostname by...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2
dns.go
newconfig.OnDNSRequest = onDNSRequest
<mask> newconfig.DomainsReservedUpstreams = upstreamConfig.DomainReservedUpstreams <mask> newconfig.AllServers = config.DNS.AllServers <mask> newconfig.FilterHandler = applyClientSettings <mask> return newconfig <mask> } <mask> <mask> // If a client has his own settings, apply them <mask> func applyClientS...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2
dns.go
OnDNSRequest func(d *proxy.DNSContext)
<mask> TCPListenAddr *net.TCPAddr // TCP listen address <mask> Upstreams []upstream.Upstream // Configured upstreams <mask> DomainsReservedUpstreams map[string][]upstream.Upstream // Map of domains and lists of configured upstreams <mask> Filters ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2
dnsforward/dnsforward.go
if s.conf.OnDNSRequest != nil { s.conf.OnDNSRequest(d) }
<mask> func (s *Server) handleDNSRequest(p *proxy.Proxy, d *proxy.DNSContext) error { <mask> start := time.Now() <mask> <mask> // use dnsfilter before cache -- changed settings or filters would require cache invalidation otherwise <mask> res, err := s.filterDNSRequest(d) <mask> if err != nil { <mask> retu...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a12f01793ff97e0ea53bc6f751bee758d1df6bb2
dnsforward/dnsforward.go
LeaseChangedRemovedAll
<mask> LeaseChangedAdded = iota <mask> LeaseChangedAddedStatic <mask> LeaseChangedRemovedStatic <mask> <mask> LeaseChangedDBStore <mask> ) <mask> <mask> // Server - the current state of the DHCP server <mask> type Server struct { </s> Pull request: all: do not use dhcp clients when server is off Closes...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/dhcpd.go
// Signal to the clients containers in packages home and dnsforward that // it should reload the DHCP clients. s.conf.notify(LeaseChangedAdded)
<mask> log.Debug("dhcpv4: srv.Serve: %s", err) <mask> }() <mask> <mask> return nil <mask> } <mask> <mask> // Stop - stop server <mask> func (s *v4Server) Stop() { </s> Pull request: all: do not use dhcp clients when server is off Closes #2934. Squashed commit of the following: commit 856ea4ec0c3ffb1da...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/v4.go
// Signal to the clients containers in packages home and dnsforward that // it should remove all DHCP clients. s.conf.notify(LeaseChangedRemovedAll)
<mask> err := s.srv.Close() <mask> if err != nil { <mask> log.Error("dhcpv4: srv.Close: %s", err) <mask> } <mask> // now s.srv.Serve() will return <mask> s.srv = nil <mask> } <mask> <mask> // Create DHCPv4 server <mask> func v4Create(conf V4ServerConf) (srv DHCPServer, err error) { </s> Pull request:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/v4.go
require.NoError(t, err)
<mask> GatewayIP: net.IP{192, 168, 10, 1}, <mask> SubnetMask: net.IP{255, 255, 255, 0}, <mask> notify: notify4, <mask> }) <mask> require.Nil(t, err) <mask> <mask> ls := s.GetLeases(LeasesStatic) <mask> assert.Empty(t, ls) <mask> <mask> // Add static lease. </s> Pull request: all: do not use...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/v4_test.go
err = s.AddStaticLease(l) require.NoError(t, err) err = s.AddStaticLease(l) assert.Error(t, err)
<mask> l := Lease{ <mask> IP: net.IP{192, 168, 10, 150}, <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}, <mask> } <mask> require.Nil(t, s.AddStaticLease(l)) <mask> assert.NotNil(t, s.AddStaticLease(l)) <mask> <mask> ls = s.GetLeases(LeasesStatic) <mask> require.Len(t, ls, 1)...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/v4_test.go
err = s.RemoveStaticLease(Lease{
<mask> assert.Equal(t, l.HWAddr, ls[0].HWAddr) <mask> assert.True(t, ls[0].IsStatic()) <mask> <mask> // Try to remove static lease. <mask> assert.NotNil(t, s.RemoveStaticLease(Lease{ <mask> IP: net.IP{192, 168, 10, 110}, <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}, <mask> }...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/v4_test.go
}) assert.Error(t, err)
<mask> // Try to remove static lease. <mask> assert.NotNil(t, s.RemoveStaticLease(Lease{ <mask> IP: net.IP{192, 168, 10, 110}, <mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}, <mask> })) <mask> <mask> // Remove static lease. <mask> require.Nil(t, s.RemoveStaticLease(l)) <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/v4_test.go
err = s.RemoveStaticLease(l) require.NoError(t, err)
<mask> HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA}, <mask> })) <mask> <mask> // Remove static lease. <mask> require.Nil(t, s.RemoveStaticLease(l)) <mask> ls = s.GetLeases(LeasesStatic) <mask> assert.Empty(t, ls) <mask> } <mask> <mask> func TestV4_AddReplace(t *testing.T) { </s> Pull...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/v4_test.go
require.NoError(t, err)
<mask> GatewayIP: net.IP{192, 168, 10, 1}, <mask> SubnetMask: net.IP{255, 255, 255, 0}, <mask> notify: notify4, <mask> }) <mask> require.Nil(t, err) <mask> <mask> s, ok := sIface.(*v4Server) <mask> require.True(t, ok) <mask> <mask> dynLeases := []Lease{{ </s> Pull request: all: do not use d...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a1450c55955e51a81c138f565a7d0dab68fea6b0
internal/dhcpd/v4_test.go