docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
DNSProtocol: dnsp,
ServerName: host, | <mask> return
<mask> }
<mask>
<mask> d := &dnsSettings{
<mask> DNSProtocol: dnsp,
<mask> ServerName: host,
<mask> ServerAddresses: dnsIPs,
<mask> }
<mask>
<mask> mobileconfig, err := encodeMobileConfig(d, clientID)
<mask> if err != nil {
<mask> respondJSONError(w, http.StatusIntern... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a4e078271cec4efad5aea95a32dc46a3d86ea9ca | internal/home/mobileconfig.go |
<mask>
<mask> func handleMobileConfigDoT(w http.ResponseWriter, r *http.Request) {
<mask> handleMobileConfig(w, r, dnsProtoTLS)
<mask> }
<mask>
<mask> // collectDNSIPs returns a slice of IP addresses the server is listening
<mask> // on, including the addresses on all interfaces in cases of unspecified IPs bu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/a4e078271cec4efad5aea95a32dc46a3d86ea9ca | internal/home/mobileconfig.go | |
<mask>
<mask> s := mc.PayloadContent[0].DNSSettings
<mask> require.NotNil(t, s)
<mask>
<mask> assert.NotEmpty(t, s.ServerAddresses)
<mask> assert.Empty(t, s.ServerName)
<mask> assert.Equal(t, "https://example.org/dns-query", s.ServerURL)
<mask> })
<mask>
<mask> t.Run("error_no_host", func(t *te... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a4e078271cec4efad5aea95a32dc46a3d86ea9ca | internal/home/mobileconfig_test.go | |
<mask>
<mask> s := mc.PayloadContent[0].DNSSettings
<mask> require.NotNil(t, s)
<mask>
<mask> assert.NotEmpty(t, s.ServerAddresses)
<mask> assert.Empty(t, s.ServerName)
<mask> assert.Equal(t, "https://example.org/dns-query/cli42", s.ServerURL)
<mask> })
<mask> }
<mask>
</s> Pull request: home: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a4e078271cec4efad5aea95a32dc46a3d86ea9ca | internal/home/mobileconfig_test.go | |
<mask>
<mask> s := mc.PayloadContent[0].DNSSettings
<mask> require.NotNil(t, s)
<mask>
<mask> assert.NotEmpty(t, s.ServerAddresses)
<mask> assert.Equal(t, "example.org", s.ServerName)
<mask> assert.Empty(t, s.ServerURL)
<mask> })
<mask>
<mask> t.Run("error_no_host", func(t *testing.T) {
</s> P... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a4e078271cec4efad5aea95a32dc46a3d86ea9ca | internal/home/mobileconfig_test.go | |
<mask>
<mask> s := mc.PayloadContent[0].DNSSettings
<mask> require.NotNil(t, s)
<mask>
<mask> assert.NotEmpty(t, s.ServerAddresses)
<mask> assert.Equal(t, "cli42.example.org", s.ServerName)
<mask> assert.Empty(t, s.ServerURL)
<mask> })
<mask> }
</s> Pull request: home: rollback serveraddresses in... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a4e078271cec4efad5aea95a32dc46a3d86ea9ca | internal/home/mobileconfig_test.go | |
import { getPercent } from '../../helpers/helpers'; | <mask>
<mask> import Card from '../ui/Card';
<mask> import Cell from '../ui/Cell';
<mask>
<mask> import { getPercent, getClientName } from '../../helpers/helpers';
<mask> import { STATUS_COLORS } from '../../helpers/constants';
<mask>
<mask> const getClientsPercentColor = (percent) => {
<mask> if (perce... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js |
import { formatClientCell } from '../../helpers/formatClientCell'; | <mask> import { getPercent } from '../../helpers/helpers';
<mask> import { STATUS_COLORS } from '../../helpers/constants';
<mask>
<mask> const getClientsPercentColor = (percent) => {
<mask> if (percent > 50) {
<mask> return STATUS_COLORS.green;
<mask> } else if (percent > 10) {
</s> + client: a... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js |
const countCell = dnsQueries => | <mask> }
<mask> return STATUS_COLORS.red;
<mask> };
<mask>
<mask> const ipCell = (clients, autoClients) =>
<mask> function cell(row) {
<mask> let client;
<mask> const { value } = row;
<mask> const clientName = getClientName(clients, value) || getClientName(autoClients, valu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js |
<mask> };
<mask>
<mask> const ipCell = (clients, autoClients) =>
<mask> function cell(row) {
<mask> let client;
<mask> const { value } = row;
<mask> const clientName = getClientName(clients, value) || getClientName(autoClients, value);
<mask>
<mask> if (clientName) {
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js | |
const percent = getPercent(dnsQueries, value);
const percentColor = getClientsPercentColor(percent); | <mask> const ipCell = (clients, autoClients) =>
<mask> function cell(row) {
<mask> let client;
<mask> const { value } = row;
<mask> const clientName = getClientName(clients, value) || getClientName(autoClients, value);
<mask>
<mask> if (clientName) {
<mask> clien... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js |
return <Cell value={value} percent={percent} color={percentColor} />; | <mask> } else {
<mask> client = value;
<mask> }
<mask>
<mask> return (
<mask> <div className="logs__row logs__row--overflow">
<mask> <span className="logs__text" title={value}>
<mask> {client}
<mask> </span>
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js |
const clientCell = (clients, autoClients) => | <mask> </div>
<mask> );
<mask> };
<mask>
<mask> const countCell = dnsQueries =>
<mask> function cell(row) {
<mask> const { value } = row;
<mask> const percent = getPercent(dnsQueries, value);
<mask> const percentColor = getClientsPercentColor(percent);
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js |
<mask>
<mask> const countCell = dnsQueries =>
<mask> function cell(row) {
<mask> const { value } = row;
<mask> const percent = getPercent(dnsQueries, value);
<mask> const percentColor = getClientsPercentColor(percent);
<mask>
<mask> return <Cell value={value} percent={perce... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js | |
return (
<div className="logs__row logs__row--overflow logs__row--column">
{formatClientCell(value, clients, autoClients)}
</div>
); | <mask> const { value } = row;
<mask> const percent = getPercent(dnsQueries, value);
<mask> const percentColor = getClientsPercentColor(percent);
<mask>
<mask> return <Cell value={value} percent={percent} color={percentColor} />;
<mask> };
<mask>
<mask> const Clients = ({
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js |
Cell: clientCell(clients, autoClients), | <mask> Header: 'IP',
<mask> accessor: 'ip',
<mask> sortMethod: (a, b) =>
<mask> parseInt(a.replace(/\./g, ''), 10) - parseInt(b.replace(/\./g, ''), 10),
<mask> Cell: ipCell(clients, autoClients),
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Dashboard/Clients.js |
<mask> justify-content: center;
<mask> }
<mask>
<mask> .logs__row--column {
<mask> align-items: flex-start;
<mask> flex-direction: column;
<mask> }
<mask>
<mask> .logs__row--overflow {
<mask> overflow: hidden;
</s> + client: add whois info to dashboard and logs </s> remove import { formatTi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/Logs.css | |
align-items: flex-start;
justify-content: center; | <mask> }
<mask>
<mask> .logs__row--column {
<mask> flex-direction: column;
<mask> }
<mask>
<mask> .logs__row--overflow {
<mask> overflow: hidden;
<mask> }
<mask>
</s> + client: add whois info to dashboard and logs </s> remove align-items: flex-start;
</s> add </s> remove import { formatTime,... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/Logs.css |
line-height: 1.4; | <mask> }
<mask>
<mask> .logs__text--wrap {
<mask> white-space: normal;
<mask> }
<mask>
<mask> .logs__row .tooltip-custom {
<mask> top: 0;
<mask> margin-left: 0;
</s> + client: add whois info to dashboard and logs </s> remove import { formatTime, formatDateTime, getClientName } from '../../helper... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/Logs.css |
import { formatTime, formatDateTime } from '../../helpers/helpers'; | <mask> import endsWith from 'lodash/endsWith';
<mask> import { Trans, withNamespaces } from 'react-i18next';
<mask> import { HashLink as Link } from 'react-router-hash-link';
<mask>
<mask> import { formatTime, formatDateTime, getClientName } from '../../helpers/helpers';
<mask> import { SERVICES, FILTERED_STATUS... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/index.js |
import { formatClientCell } from '../../helpers/formatClientCell';
| <mask>
<mask> import { formatTime, formatDateTime } from '../../helpers/helpers';
<mask> import { SERVICES, FILTERED_STATUS } from '../../helpers/constants';
<mask> import { getTrackerData } from '../../helpers/trackers/trackers';
<mask> import PageTitle from '../ui/PageTitle';
<mask> import Card from '../ui/Car... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/index.js |
const { clients, autoClients } = dashboard; | <mask> getClientCell = ({ original, value }) => {
<mask> const { dashboard } = this.props;
<mask> const { reason, domain } = original;
<mask> const isFiltered = this.checkFiltered(reason);
<mask> const isRewrite = this.checkRewrite(reason);
<mask>
</s> + client: add whois inf... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/index.js |
<mask> const { dashboard } = this.props;
<mask> const { reason, domain } = original;
<mask> const isFiltered = this.checkFiltered(reason);
<mask> const isRewrite = this.checkRewrite(reason);
<mask> const clientName =
<mask> getClientName(dashboard.clients, value... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/index.js | |
<div className="logs__row logs__row--overflow logs__row--column">
{formatClientCell(value, clients, autoClients)}
</div> | <mask> }
<mask>
<mask> return (
<mask> <Fragment>
<mask> <div className="logs__row">{client}</div>
<mask> {isRewrite ? (
<mask> <div className="logs__action">
<mask> <Link to="/dns#rewrites" className="btn b... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/index.js |
maxWidth: 240,
minWidth: 240, | <mask> },
<mask> {
<mask> Header: t('client_table_header'),
<mask> accessor: 'client',
<mask> maxWidth: 220,
<mask> minWidth: 220,
<mask> Cell: this.getClientCell,
<mask> },
<mask> ];
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Logs/index.js |
minWidth: 180, | <mask> },
<mask> {
<mask> Header: this.props.t('blocked_services'),
<mask> accessor: 'blocked_services',
<mask> minWidth: 210,
<mask> Cell: (row) => {
<mask> const { value, original } = row;
<mask>
<mask> if (origi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Settings/Clients/ClientsTable.js |
minWidth: 120, | <mask> {
<mask> Header: this.props.t('requests_count'),
<mask> accessor: 'statistics',
<mask> Cell: (row) => {
<mask> const clientIP = row.original.ip;
<mask> const clientStats = clientIP && this.getStats(clientIP, this.props.topClients);... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/components/Settings/Clients/ClientsTable.js |
const formatWhois = (whois) => {
if (!whois) {
return '';
}
const keys = Object.keys(whois);
if (keys.length > 0) {
return (
keys.map(key => whois[key])
);
}
return '';
};
export const getClientInfo = (clients, ip) => { | <mask> };
<mask>
<mask> export const normalizeTextarea = text => text && text.replace(/[;, ]/g, '\n').split('\n').filter(n => n);
<mask>
<mask> export const getClientName = (clients, ip) => {
<mask> const client = clients.find(item => ip === item.ip);
<mask> return (client && client.name) || '';
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/helpers/helpers.js |
if (!client) {
return '';
}
const { name, whois_info } = client;
const formattedWhois = formatWhois(whois_info);
const whois = formattedWhois && formattedWhois.length > 0 && formattedWhois.join(' | ');
return { name, whois }; | <mask> export const normalizeTextarea = text => text && text.replace(/[;, ]/g, '\n').split('\n').filter(n => n);
<mask>
<mask> export const getClientName = (clients, ip) => {
<mask> const client = clients.find(item => ip === item.ip);
<mask> return (client && client.name) || '';
<mask> };
<mask>
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a52715e0863af0a9e1b26dbf96fc7cced02ae4f6 | client/src/helpers/helpers.js |
temporaryConfig := config.CoreDNS
temporaryConfig.FilterFile = filepath.Join(config.ourBinaryDir, config.CoreDNS.FilterFile) | <mask>
<mask> var configBytes bytes.Buffer
<mask> // run the template
<mask> err = t.Execute(&configBytes, &temporaryConfig)
<mask> if err != nil {
<mask> log.Printf("Couldn't generate DNS config: %s", err)
</s> Stop requiring current working directory to be the location of AdGuardHome.
Fixes #381. </s> ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a528ed9f947d42f4324cd4f2263a015d34d7341f | config.go |
err = t.Execute(&configBytes, &temporaryConfig) | <mask> }
<mask>
<mask> var configBytes bytes.Buffer
<mask> // run the template
<mask> err = t.Execute(&configBytes, config.CoreDNS)
<mask> if err != nil {
<mask> log.Printf("Couldn't generate DNS config: %s", err)
<mask> return "", err
<mask> }
<mask> configtext := configBytes.String()
</s> Stop ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a528ed9f947d42f4324cd4f2263a015d34d7341f | config.go |
"os"
"path/filepath"
"sync" // Include all plugins. | <mask>
<mask> import (
<mask> "fmt"
<mask> "log"
<mask> "sync"
<mask>
<mask> // Include all plugins.
<mask> _ "github.com/AdguardTeam/AdGuardHome/coredns_plugin"
<mask> _ "github.com/coredns/coredns/plugin/auto"
<mask> _ "github.com/coredns/coredns/plugin/autopath"
</s> Stop requiring current workin... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a528ed9f947d42f4324cd4f2263a015d34d7341f | coredns.go |
<mask> "fmt"
<mask> "log"
<mask> "sync"
<mask>
<mask> // Include all plugins.
<mask> _ "github.com/AdguardTeam/AdGuardHome/coredns_plugin"
<mask> _ "github.com/coredns/coredns/plugin/auto"
<mask> _ "github.com/coredns/coredns/plugin/autopath"
<mask> _ "github.com/coredns/coredns/plugin/bind"
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a528ed9f947d42f4324cd4f2263a015d34d7341f | coredns.go | |
"github.com/coredns/coredns/core/dnsserver"
"github.com/coredns/coredns/coremain" | <mask> "path/filepath"
<mask> "sync" // Include all plugins.
<mask>
<mask> _ "github.com/AdguardTeam/AdGuardHome/coredns_plugin"
<mask> _ "github.com/coredns/coredns/plugin/auto"
<mask> _ "github.com/coredns/coredns/plugin/autopath"
<mask> _ "github.com/coredns/coredns/plugin/bind"
<mask> _ "github.com/... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a528ed9f947d42f4324cd4f2263a015d34d7341f | coredns.go |
<mask> _ "github.com/coredns/coredns/plugin/template"
<mask> _ "github.com/coredns/coredns/plugin/tls"
<mask> _ "github.com/coredns/coredns/plugin/whoami"
<mask> _ "github.com/mholt/caddy/onevent"
<mask>
<mask> "github.com/coredns/coredns/core/dnsserver"
<mask> "github.com/coredns/coredns/coremain"
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a528ed9f947d42f4324cd4f2263a015d34d7341f | coredns.go | |
configpath := filepath.Join(config.ourBinaryDir, config.CoreDNS.coreFile)
os.Args = os.Args[:1]
os.Args = append(os.Args, "-conf")
os.Args = append(os.Args, configpath)
| <mask> isCoreDNSRunningLock.Unlock()
<mask>
<mask> err := writeCoreDNSConfig()
<mask> if err != nil {
<mask> errortext := fmt.Errorf("Unable to write coredns config: %s", err)
<mask> log.Println(errortext)
<mask> return errortext
</s> Stop requiring current working directory to be the location of AdGu... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a528ed9f947d42f4324cd4f2263a015d34d7341f | coredns.go |
// clientServerName returns the TLS server name based on the protocol. For
// DNS-over-HTTPS requests, it will return the hostname part of the Host header
// if there is one. | <mask>
<mask> return clientID, nil
<mask> }
<mask>
<mask> // clientServerName returns the TLS server name based on the protocol.
<mask> func clientServerName(pctx *proxy.DNSContext, proto proxy.Proto) (srvName string, err error) {
<mask> switch proto {
<mask> case proxy.ProtoHTTPS:
<mask> srvName = pctx... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid.go |
r := pctx.HTTPRequest
if connState := r.TLS; connState != nil {
srvName = connState.ServerName
} else if r.Host != "" {
var host string
host, err = netutil.SplitHost(r.Host)
if err != nil {
return "", fmt.Errorf("parsing host: %w", err)
}
srvName = host
} | <mask> // clientServerName returns the TLS server name based on the protocol.
<mask> func clientServerName(pctx *proxy.DNSContext, proto proxy.Proto) (srvName string, err error) {
<mask> switch proto {
<mask> case proxy.ProtoHTTPS:
<mask> srvName = pctx.HTTPRequest.TLS.ServerName
<mask> case proxy.ProtoQUIC:... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid.go |
confSrvName string | <mask> func TestServer_clientIDFromDNSContext(t *testing.T) {
<mask> testCases := []struct {
<mask> name string
<mask> proto proxy.Proto
<mask> hostSrvName string
<mask> cliSrvName string
<mask> wantClientID string
<mask> wantErrMsg string
<mask> strictSNI bool
<mask> }{... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS bool | <mask> confSrvName string
<mask> cliSrvName string
<mask> wantClientID string
<mask> wantErrMsg string
<mask> strictSNI bool
<mask> }{{
<mask> name: "udp",
<mask> proto: proxy.ProtoUDP,
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed commit ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "", | <mask> strictSNI bool
<mask> }{{
<mask> name: "udp",
<mask> proto: proxy.ProtoUDP,
<mask> hostSrvName: "",
<mask> cliSrvName: "",
<mask> wantClientID: "",
<mask> wantErrMsg: "",
<mask> strictSNI: false,
<mask> }, {
</s> Pull request 1742: 5518-doh-panic
Updates #5... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false, | <mask> confSrvName: "",
<mask> cliSrvName: "",
<mask> wantClientID: "",
<mask> wantErrMsg: "",
<mask> strictSNI: false,
<mask> }, {
<mask> name: "tls_no_clientid",
<mask> proto: proxy.ProtoTLS,
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: false,
<mask> }, {
<mask> name: "tls_no_clientid",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "example.com",
<mask> wantClientID: "",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }, {
</s> Pull req... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false, | <mask> cliSrvName: "example.com",
<mask> wantClientID: "",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_no_client_server_name",
<mask> proto: proxy.ProtoTLS,
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed commit ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_no_client_server_name",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "",
<mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: client server name "" ` +
<mask> `doesn't mat... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false,
strictSNI: true, | <mask> cliSrvName: "",
<mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: client server name "" ` +
<mask> `doesn't match host server name "example.com"`,
<mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_no_client_server_name_no_strict",
<mask> proto: proxy.ProtoT... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_no_client_server_name_no_strict",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "",
<mask> wantClientID: "",
<mask> wantErrMsg: "",
<mask> strictSNI: false,
<mask> }, {
</s> Pu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false, | <mask> wantClientID: "",
<mask> wantErrMsg: "",
<mask> strictSNI: false,
<mask> }, {
<mask> name: "tls_clientid",
<mask> proto: proxy.ProtoTLS,
<mask> confSrvName: "example.com",
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed commit of the follo... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: false,
<mask> }, {
<mask> name: "tls_clientid",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "cli.example.com",
<mask> wantClientID: "cli",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }, {
</s> Pull... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false, | <mask> cliSrvName: "cli.example.com",
<mask> wantClientID: "cli",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_clientid_hostname_error",
<mask> proto: proxy.ProtoTLS,
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashe... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_clientid_hostname_error",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "cli.example.net",
<mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: client server name "cli.example.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false,
strictSNI: true, | <mask> cliSrvName: "cli.example.net",
<mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: client server name "cli.example.net" ` +
<mask> `doesn't match host server name "example.com"`,
<mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_invalid_clientid",
<mask> proto: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_invalid_clientid",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "!!!.example.com",
<mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: invalid clientid "!!!": ` +
<mask> `ba... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false,
strictSNI: true, | <mask> cliSrvName: "!!!.example.com",
<mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: invalid clientid "!!!": ` +
<mask> `bad domain name label rune '!'`,
<mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_clientid_too_long",
<mask> proto: proxy.ProtoTLS,
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_clientid_too_long",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: `abcdefghijklmnopqrstuvwxyz0123456789abcdefghijklmno` +
<mask> `pqrstuvwxyz0123456789.example.com`,
<mask> wantClientID: "",
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false,
strictSNI: true, | <mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: invalid clientid "abcdefghijklmno` +
<mask> `pqrstuvwxyz0123456789abcdefghijklmnopqrstuvwxyz0123456789": ` +
<mask> `domain name label is too long: got 72, max 63`,
<mask> strictSNI: true,
<mask> }, {
<mask> name: "quic_clientid"... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "quic_clientid",
<mask> proto: proxy.ProtoQUIC,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "cli.example.com",
<mask> wantClientID: "cli",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }, {
</s> Pull r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false, | <mask> wantClientID: "cli",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_clientid_issue3437",
<mask> proto: proxy.ProtoTLS,
<mask> confSrvName: "example.com",
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed commit ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_clientid_issue3437",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "cli.myexample.com",
<mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: client server name "cli.myexample.c... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false,
strictSNI: true, | <mask> cliSrvName: "cli.myexample.com",
<mask> wantClientID: "",
<mask> wantErrMsg: `clientid check: client server name "cli.myexample.com" ` +
<mask> `doesn't match host server name "example.com"`,
<mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_case",
<mask> proto: proxy... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "tls_case",
<mask> proto: proxy.ProtoTLS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "InSeNsItIvE.example.com",
<mask> wantClientID: "insensitive",
<mask> wantErrMsg: ``,
<mask> strictSNI: true,
<mask> }, {
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false, | <mask> cliSrvName: "InSeNsItIvE.example.com",
<mask> wantClientID: "insensitive",
<mask> wantErrMsg: ``,
<mask> strictSNI: true,
<mask> }, {
<mask> name: "quic_case",
<mask> proto: proxy.ProtoQUIC,
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "quic_case",
<mask> proto: proxy.ProtoQUIC,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "InSeNsItIvE.example.com",
<mask> wantClientID: "insensitive",
<mask> wantErrMsg: ``,
<mask> strictSNI: true,
<mask> },... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: false, | <mask> cliSrvName: "InSeNsItIvE.example.com",
<mask> wantClientID: "insensitive",
<mask> wantErrMsg: ``,
<mask> strictSNI: true,
<mask> }, {
<mask> name: "https_no_clientid",
<mask> proto: proxy.ProtoHTTPS,
<mask> confSrvName: "example.com",
</s> Pull request 1742: 5518-do... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "https_no_clientid",
<mask> proto: proxy.ProtoHTTPS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "example.com",
<mask> wantClientID: "",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }, {
</s> Pull ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
inclHTTPTLS: true, | <mask> wantClientID: "",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }, {
<mask> name: "https_clientid",
<mask> proto: proxy.ProtoHTTPS,
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed commit of the following:
commit 74873bd47bab569d0a4536... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
confSrvName: "example.com", | <mask> strictSNI: true,
<mask> }, {
<mask> name: "https_clientid",
<mask> proto: proxy.ProtoHTTPS,
<mask> hostSrvName: "example.com",
<mask> cliSrvName: "cli.example.com",
<mask> wantClientID: "cli",
<mask> wantErrMsg: "",
<mask> strictSNI: true,
<mask> }}
</s> Pul... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
ServerName: tc.confSrvName, | <mask>
<mask> for _, tc := range testCases {
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> tlsConf := TLSConfig{
<mask> ServerName: tc.hostSrvName,
<mask> StrictSNICheck: tc.strictSNI,
<mask> }
<mask>
<mask> srv := &Server{
<mask> conf: ServerConfig{TLSConfig: tlsConf},
</s>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
httpReq = newHTTPReq(tc.cliSrvName, tc.inclHTTPTLS) | <mask> )
<mask>
<mask> switch tc.proto {
<mask> case proxy.ProtoHTTPS:
<mask> httpReq = newHTTPReq(tc.cliSrvName)
<mask> case proxy.ProtoQUIC:
<mask> qconn = testQUICConnection{
<mask> serverName: tc.cliSrvName,
<mask> }
<mask> case proxy.ProtoTLS:
</s> Pull request 1742: 551... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
func newHTTPReq(cliSrvName string, inclTLS bool) (r *http.Request) { | <mask> }
<mask> }
<mask>
<mask> // newHTTPReq is a helper to create HTTP requests for tests.
<mask> func newHTTPReq(cliSrvName string) (r *http.Request) {
<mask> u := &url.URL{
<mask> Path: "/dns-query",
<mask> }
<mask>
<mask> return &http.Request{
</s> Pull request 1742: 5518-doh-panic
Updates #542... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
r = &http.Request{ | <mask> u := &url.URL{
<mask> Path: "/dns-query",
<mask> }
<mask>
<mask> return &http.Request{
<mask> ProtoMajor: 1,
<mask> ProtoMinor: 1,
<mask> URL: u,
<mask> Host: cliSrvName,
<mask> TLS: &tls.ConnectionState{
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
}
if inclTLS {
r.TLS = &tls.ConnectionState{ | <mask> ProtoMajor: 1,
<mask> ProtoMinor: 1,
<mask> URL: u,
<mask> Host: cliSrvName,
<mask> TLS: &tls.ConnectionState{
<mask> ServerName: cliSrvName,
<mask> },
<mask> }
<mask> }
<mask>
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed commit of the f... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
} | <mask> URL: u,
<mask> Host: cliSrvName,
<mask> TLS: &tls.ConnectionState{
<mask> ServerName: cliSrvName,
<mask> },
<mask> }
<mask> }
<mask>
<mask> func TestClientIDFromDNSContextHTTPS(t *testing.T) {
<mask> testCases := []struct {
</s> Pull request 1742: 5518-doh-panic
Updates #54... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
return r | <mask> }
<mask> }
<mask> }
<mask>
<mask> func TestClientIDFromDNSContextHTTPS(t *testing.T) {
<mask> testCases := []struct {
<mask> name string
<mask> path string
</s> Pull request 1742: 5518-doh-panic
Updates #5425.
Updates #5518.
Squashed commit of the following:
commit 74873bd47b... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a556ce8fb872284fe9d20dbe2109458cd50629ff | internal/dnsforward/clientid_test.go |
github.com/AdguardTeam/dnsproxy v0.42.2 | <mask>
<mask> go 1.17
<mask>
<mask> require (
<mask> github.com/AdguardTeam/dnsproxy v0.42.1
<mask> github.com/AdguardTeam/golibs v0.10.8
<mask> github.com/AdguardTeam/urlfilter v0.16.0
<mask> github.com/NYTimes/gziphandler v1.1.1
<mask> github.com/ameshkov/dnscrypt/v2 v2.2.3
<mask> github.com/digineo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.mod |
github.com/fsnotify/fsnotify v1.5.4 | <mask> github.com/AdguardTeam/urlfilter v0.16.0
<mask> github.com/NYTimes/gziphandler v1.1.1
<mask> github.com/ameshkov/dnscrypt/v2 v2.2.3
<mask> github.com/digineo/go-ipset/v2 v2.2.1
<mask> github.com/fsnotify/fsnotify v1.5.1
<mask> github.com/go-ping/ping v0.0.0-20211130115550-779d1e919534
<mask> github... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.mod |
golang.org/x/net v0.0.0-20220425223048-2871e0cb64e4
golang.org/x/sys v0.0.0-20220422013727-9388b58f7150 | <mask> github.com/stretchr/testify v1.7.0
<mask> github.com/ti-mo/netfilter v0.4.0
<mask> go.etcd.io/bbolt v1.3.6
<mask> golang.org/x/crypto v0.0.0-20220411220226-7b82a4e95df4
<mask> golang.org/x/net v0.0.0-20220412020605-290c469a71a5
<mask> golang.org/x/sys v0.0.0-20220412211240-33da011f77ad
<mask> gopkg... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.mod |
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4 // indirect | <mask> github.com/pkg/errors v0.9.1 // indirect
<mask> github.com/pmezard/go-difflib v1.0.0 // indirect
<mask> github.com/stretchr/objx v0.1.1 // indirect
<mask> github.com/u-root/uio v0.0.0-20220204230159-dac05f7d2cb4 // indirect
<mask> golang.org/x/mod v0.6.0-dev.0.20220106191415-9b9b3d81d5e3 // indirect
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.mod |
golang.org/x/tools v0.1.11-0.20220426200323-dcaea06afc12 // indirect | <mask> github.com/u-root/uio v0.0.0-20220204230159-dac05f7d2cb4 // indirect
<mask> golang.org/x/mod v0.6.0-dev.0.20220106191415-9b9b3d81d5e3 // indirect
<mask> golang.org/x/sync v0.0.0-20210220032951-036812b2e83c // indirect
<mask> golang.org/x/text v0.3.7 // indirect
<mask> golang.org/x/tools v0.1.11-0.20220... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.mod |
github.com/AdguardTeam/dnsproxy v0.42.2 h1:aBhbuvqg/rZN8Rab5ILSfPFJDkiTviWXXcceJgajnNs=
github.com/AdguardTeam/dnsproxy v0.42.2/go.mod h1:thHuk3599mgmucsv5J9HR9lBVQHnf4YleE08EbxNrN0= | <mask> dmitri.shuralyov.com/html/belt v0.0.0-20180602232347-f7d459c86be0/go.mod h1:JLBrvjyP0v+ecvNYvCpyZgu5/xkfAUhi6wJj28eUfSU=
<mask> dmitri.shuralyov.com/service/change v0.0.0-20181023043359-a85b471d5412/go.mod h1:a1inKt/atXimZ4Mv927x+r7UpyzRUf4emIoiiSC2TN4=
<mask> dmitri.shuralyov.com/state v0.0.0-20180228185332-... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum |
<mask> github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568/go.mod h1:xEzjJPgXI435gkrCt3MPfRiAkVrwSbHsst4LCFVfpJc=
<mask> github.com/francoispqt/gojay v1.2.13/go.mod h1:ehT5mTG4ua4581f1++1WLG0vPdaA9HaiDsoyrBGkyDY=
<mask> github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjF... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum | |
github.com/fsnotify/fsnotify v1.5.4 h1:jRbGcIw6P2Meqdwuo0H1p6JVLbL5DHKAKlYndzMwVZI=
github.com/fsnotify/fsnotify v1.5.4/go.mod h1:OVB6XrOHzAwXMpEM7uPOzcehqUV2UqJxmVXmkdnm1bU= | <mask> github.com/francoispqt/gojay v1.2.13/go.mod h1:ehT5mTG4ua4581f1++1WLG0vPdaA9HaiDsoyrBGkyDY=
<mask> github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
<mask> github.com/fsnotify/fsnotify v1.4.9/go.mod h1:znqG4EE+3YCdAaPaxE2ZRY/06pZUdp0tY4IgpuI1SZQ=
<mask> github.com/fsn... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum |
<mask> golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
<mask> golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
<mask> golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum | |
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4 h1:6zppjxzCulZykYSLyVDYbneBfbaBIQPYMevg0bEwv2s=
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4= | <mask> golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
<mask> golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
<mask> golang.org/x/mod v0.6.0-dev.0.20220106191415-9b9b3d81d5e3/go.mod h1:3p9vT2HGsQu2K1YbXdKPJLVgG5VJdoTa1poYQBtP1AY=
<mask> golang.org/x/net ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum |
golang.org/x/net v0.0.0-20220425223048-2871e0cb64e4 h1:HVyaeDAYux4pnY+D/SiwmLOR36ewZ4iGQIIrtnuCjFA=
golang.org/x/net v0.0.0-20220425223048-2871e0cb64e4/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk= | <mask> golang.org/x/net v0.0.0-20211015210444-4f30a5c0130f/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
<mask> golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
<mask> golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod h1:CfG3xpIq0wQ8r1q4Su4U... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum |
<mask> golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
<mask> golang.org/x/sys v0.0.0-20220128215802-99c3d69c2c27/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
<mask> golang.org/x/sys v0.0.0-20220209214540-3681064d5158/go.mod h1:oPkhp1MJrh7nUepCBck5... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum | |
golang.org/x/sys v0.0.0-20220422013727-9388b58f7150 h1:xHms4gcpe1YE7A3yIllJXP16CMAGuqwO2lX1mTyyRRc=
golang.org/x/sys v0.0.0-20220422013727-9388b58f7150/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | <mask> golang.org/x/sys v0.0.0-20220128215802-99c3d69c2c27/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
<mask> golang.org/x/sys v0.0.0-20220209214540-3681064d5158/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
<mask> golang.org/x/sys v0.0.0-20220319134239-a9b59b0215f8/go.mod h1:oPkhp1MJrh7nUepCBck5... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum |
golang.org/x/tools v0.1.11-0.20220426200323-dcaea06afc12 h1:pODAJF0uBqx6zFa1MYaiTobVo5FzCbnTVUXeO8o71fE=
golang.org/x/tools v0.1.11-0.20220426200323-dcaea06afc12/go.mod h1:SgwaegtQh8clINPpECJMqnxLv9I09HLqnW3RMqW0CA4= | <mask> golang.org/x/tools v0.0.0-20201224043029-2b0845dc783e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
<mask> golang.org/x/tools v0.1.1/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
<mask> golang.org/x/tools v0.1.6-0.20210726203631-07bc1bf47fb2/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHm... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | go.sum |
honnef.co/go/tools v0.3.1 | <mask> github.com/kyoh86/looppointer v0.1.7
<mask> github.com/securego/gosec/v2 v2.11.0
<mask> golang.org/x/lint v0.0.0-20210508222113-6edffad5e616
<mask> golang.org/x/tools v0.1.11-0.20220316014157-77aa08bb151a
<mask> honnef.co/go/tools v0.3.0
<mask> mvdan.cc/gofumpt v0.3.1
<mask> mvdan.cc/unparam v0.0.0... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.mod |
github.com/google/go-cmp v0.5.8 // indirect | <mask>
<mask> require (
<mask> github.com/BurntSushi/toml v1.1.0 // indirect
<mask> github.com/client9/misspell v0.3.4 // indirect
<mask> github.com/google/go-cmp v0.5.7 // indirect
<mask> github.com/google/uuid v1.3.0 // indirect
<mask> github.com/gookit/color v1.5.0 // indirect
<mask> github.com/kyoh86... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.mod |
golang.org/x/exp/typeparams v0.0.0-20220426173459-3bcf042a4bf5 // indirect | <mask> github.com/gookit/color v1.5.0 // indirect
<mask> github.com/kyoh86/nolint v0.0.1 // indirect
<mask> github.com/nbutton23/zxcvbn-go v0.0.0-20210217022336-fa2cb2858354 // indirect
<mask> github.com/xo/terminfo v0.0.0-20210125001918-ca9a967f8778 // indirect
<mask> golang.org/x/exp/typeparams v0.0.0-20220... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.mod |
golang.org/x/sys v0.0.0-20220422013727-9388b58f7150 // indirect | <mask> github.com/xo/terminfo v0.0.0-20210125001918-ca9a967f8778 // indirect
<mask> golang.org/x/exp/typeparams v0.0.0-20220407100705-7b9b53b0aca4 // indirect
<mask> golang.org/x/mod v0.6.0-dev.0.20220106191415-9b9b3d81d5e3 // indirect
<mask> golang.org/x/sync v0.0.0-20210220032951-036812b2e83c // indirect
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.mod |
<mask> github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
<mask> github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
<mask> github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
<mask> github.com/google/go-cmp v0... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.sum | |
github.com/google/go-cmp v0.5.8 h1:e6P7q2lk1O+qJJb4BtCQXlK8vWEO8V1ZeuEdJNOqZyg=
github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= | <mask> github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
<mask> github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
<mask> github.com/google/go-cmp v0.5.7/go.mod h1:n+brtR0CgQNWTVd5ZUFpTBC8YFBDLK/h/bpaJ8/DtOE=
<mask> github.com/google/gofuzz v1... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.sum |
golang.org/x/exp/typeparams v0.0.0-20220426173459-3bcf042a4bf5 h1:pKfHvPtBtqS0+V/V9Y0cZQa2h8HJV/qSRJiGgYu+LQA=
golang.org/x/exp/typeparams v0.0.0-20220426173459-3bcf042a4bf5/go.mod h1:AbB0pIl9nAr9wVwH+Z2ZpaocVmF5I4GyWCDIsVjR0bk= | <mask> golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU=
<mask> golang.org/x/exp v0.0.0-20200331195152-e8c3332aa8e5 h1:FR+oGxGfbQu1d+jglI3rCkjAjUnhRSZcUxr+DqlDLNo=
<mask> golang.org/x/exp v0.0.0-20200331195152-e8c3332aa8e5/go.mod h1:4M0jN8W1tt0AVLNr8HDosyJCDCD... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.sum |
golang.org/x/sys v0.0.0-20220422013727-9388b58f7150 h1:xHms4gcpe1YE7A3yIllJXP16CMAGuqwO2lX1mTyyRRc=
golang.org/x/sys v0.0.0-20220422013727-9388b58f7150/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | <mask> golang.org/x/sys v0.0.0-20211019181941-9d821ace8654/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
<mask> golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
<mask> golang.org/x/sys v0.0.0-20220315194320-039c03cc5b86/go.mod h1:oPkhp1MJrh7nUepCBck5... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.sum |
honnef.co/go/tools v0.3.1 h1:1kJlrWJLkaGXgcaeosRXViwviqjI7nkBvU2+sZW0AYc=
honnef.co/go/tools v0.3.1/go.mod h1:vlRD9XErLMGT+mDuofSr0mMMquscM/1nQqtRSsh6m70= | <mask> honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
<mask> honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
<mask> honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a580149ad67b604a1e3c6e7b3483d856a51c905a | internal/tools/go.sum |
"sync" | <mask> "net"
<mask> "net/http"
<mask> "os"
<mask> "strings"
<mask> "sync/atomic"
<mask> "time"
<mask>
<mask> "github.com/joomcode/errorx"
</s> * dnsfilter: major refactoring
* dnsfilter is controlled by package home, not dnsforward
* move HTTP handlers to dnsfilter/
* apply filtering settings without ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86 | dnsfilter/dnsfilter.go |
ResolverAddress string `yaml:"-"` // DNS server address | <mask> ParentalEnabled bool `yaml:"parental_enabled"`
<mask> UsePlainHTTP bool `yaml:"-"` // use plain HTTP for requests to parental and safe browsing servers
<mask> SafeSearchEnabled bool `yaml:"safesearch_enabled"`
<mask> SafeBrowsingEnabled bool `yaml:"safebrowsing_enabled"`
<mask> Res... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86 | dnsfilter/dnsfilter.go |
// Called when the configuration is changed by HTTP request
ConfigModified func() `yaml:"-"` | <mask> CacheTime uint `yaml:"cache_time"` // Element's TTL (in minutes)
<mask>
<mask> Rewrites []RewriteEntry `yaml:"rewrites"`
<mask>
<mask> // Filtering callback function
<mask> FilterHandler func(clientAddr string, settings *RequestFilteringSettings) `yaml:"-"`
<mask> }
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86 | dnsfilter/dnsfilter.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.