docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
// Register an HTTP handler HTTPRegister func(string, string, func(http.ResponseWriter, *http.Request)) `yaml:"-"`
<mask> // Filtering callback function <mask> FilterHandler func(clientAddr string, settings *RequestFilteringSettings) `yaml:"-"` <mask> } <mask> <mask> type privateConfig struct { <mask> parentalServer string // access via methods <mask> safeBrowsingServer string // access via methods <mask> } <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
// Parameters to pass to filters-initializer goroutine type filtersInitializerParams struct { filters map[int]string }
<mask> } <mask> <mask> // Dnsfilter holds added rules and performs hostname matches against the rules <mask> type Dnsfilter struct { <mask> rulesStorage *urlfilter.RuleStorage <mask> filteringEngine *urlfilter.DNSEngine <mask> engineLock sync.RWMutex <mask> </s> * dnsfilter: major refactoring * d...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
engineLock sync.RWMutex
<mask> rulesStorage *urlfilter.RuleStorage <mask> filteringEngine *urlfilter.DNSEngine <mask> <mask> // HTTP lookups for safebrowsing and parental <mask> client http.Client // handle for http client -- single instance as recommended by docs <mask> transport *http.Transport // handle for http trans...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
parentalServer string // access via methods safeBrowsingServer string // access via methods Config // for direct access by library users, even a = assignment confLock sync.RWMutex // Channel for passing data to filters-initializer goroutine filtersInitializerChan chan filtersInitializerParams filtersInit...
<mask> // HTTP lookups for safebrowsing and parental <mask> client http.Client // handle for http client -- single instance as recommended by docs <mask> transport *http.Transport // handle for http transport used by http client <mask> <mask> Config // for direct access by library users, even a = assig...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
<mask> Data []byte `yaml:"-"` // List of rules divided by '\n' <mask> FilePath string `yaml:"-"` // Path to a filtering rules file <mask> } <mask> <mask> //go:generate stringer -type=Reason <mask> <mask> // Reason holds an enum detailing why it was filtered or not filtered <mask> type Reason int <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
var reasonNames = []string{ "NotFilteredNotFound", "NotFilteredWhiteList", "NotFilteredError", "FilteredBlackList", "FilteredSafeBrowsing", "FilteredParental", "FilteredInvalid", "FilteredSafeSearch", "FilteredBlockedService", "Rewrite", }
<mask> ) <mask> <mask> func (r Reason) String() string { <mask> if uint(r) >= uint(len(reasonNames)) { <mask> return "" <mask> } <mask> return reasonNames[r] <mask> } </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not dnsforward * move HTTP handlers to dnsfilter/ * apply ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
if uint(r) >= uint(len(reasonNames)) { return "" } return reasonNames[r] } // GetConfig - get configuration func (d *Dnsfilter) GetConfig() RequestFilteringSettings { c := RequestFilteringSettings{} // d.confLock.RLock() c.SafeSearchEnabled = d.Config.SafeSearchEnabled c.SafeBrowsingEnabled = d.Config.SafeBro...
<mask> ReasonRewrite <mask> ) <mask> <mask> func (r Reason) String() string { <mask> names := []string{ <mask> "NotFilteredNotFound", <mask> "NotFilteredWhiteList", <mask> "NotFilteredError", <mask> <mask> "FilteredBlackList", <mask> "FilteredSafeBrowsing", <mask> "FilteredParental", <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
// SetFilters - set new filters (synchronously or asynchronously) // When filters are set asynchronously, the old filters continue working until the new filters are ready. // In this case the caller must ensure that the old filter files are intact. func (d *Dnsfilter) SetFilters(filters map[int]string, async bool) err...
<mask> "NotFilteredNotFound", <mask> "NotFilteredWhiteList", <mask> "NotFilteredError", <mask> <mask> "FilteredBlackList", <mask> "FilteredSafeBrowsing", <mask> "FilteredParental", <mask> "FilteredInvalid", <mask> "FilteredSafeSearch", <mask> "FilteredBlockedService", <mask> <mask> "Re...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
d.filtersInitializerLock.Lock() // prevent multiple writers from adding more than 1 task // remove all pending tasks stop := false for !stop { select { case <-d.filtersInitializerChan: // default: stop = true } } d.filtersInitializerChan <- params d.filtersInitializerLock.Unlock() r...
<mask> "FilteredInvalid", <mask> "FilteredSafeSearch", <mask> "FilteredBlockedService", <mask> <mask> "Rewrite", <mask> } <mask> if uint(r) >= uint(len(names)) { <mask> return "" <mask> } <mask> return names[r] </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
err := d.initFiltering(filters) if err != nil { log.Error("Can't initialize filtering subsystem: %s", err) return err } return nil } // Starts initializing new filters by signal from channel func (d *Dnsfilter) filtersInitializer() { for { params := <-d.filtersInitializerChan err := d.initFiltering(param...
<mask> "FilteredBlockedService", <mask> <mask> "Rewrite", <mask> } <mask> if uint(r) >= uint(len(names)) { <mask> return "" <mask> } <mask> return names[r] <mask> } <mask> <mask> type dnsFilterContext struct { </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not dn...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
<mask> } <mask> if uint(r) >= uint(len(names)) { <mask> return "" <mask> } <mask> return names[r] <mask> } <mask> <mask> type dnsFilterContext struct { <mask> stats Stats <mask> dialCache gcache.Cache // "host" -> "IP" cache for safebrowsing and parental control servers </s> * dn...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
d.confLock.RLock() defer d.confLock.RUnlock()
<mask> func (d *Dnsfilter) processRewrites(host string, qtype uint16) Result { <mask> var res Result <mask> <mask> for _, r := range d.Rewrites { <mask> if r.Domain != host { <mask> continue <mask> } </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not dnsforward * move ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
rulesStorage, err := urlfilter.NewRuleStorage(listArray)
<mask> } <mask> listArray = append(listArray, list) <mask> } <mask> <mask> var err error <mask> d.rulesStorage, err = urlfilter.NewRuleStorage(listArray) <mask> if err != nil { <mask> return fmt.Errorf("urlfilter.NewRuleStorage(): %s", err) <mask> } <mask> d.filteringEngine = urlfilter.NewDNSEngi...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
filteringEngine := urlfilter.NewDNSEngine(rulesStorage) d.engineLock.Lock() if d.rulesStorage != nil { d.rulesStorage.Close() } d.rulesStorage = rulesStorage d.filteringEngine = filteringEngine d.engineLock.Unlock() log.Debug("initialized filtering engine")
<mask> d.rulesStorage, err = urlfilter.NewRuleStorage(listArray) <mask> if err != nil { <mask> return fmt.Errorf("urlfilter.NewRuleStorage(): %s", err) <mask> } <mask> d.filteringEngine = urlfilter.NewDNSEngine(d.rulesStorage) <mask> return nil <mask> } <mask> <mask> // matchHost is a low-level way to ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
d.engineLock.RLock() defer d.engineLock.RUnlock()
<mask> <mask> // matchHost is a low-level way to check only if hostname is filtered by rules, skipping expensive safebrowsing and parental lookups <mask> func (d *Dnsfilter) matchHost(host string, qtype uint16) (Result, error) { <mask> if d.filteringEngine == nil { <mask> return Result{}, nil <mask> } <mask...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
d.Close()
<mask> if filters != nil { <mask> err := d.initFiltering(filters) <mask> if err != nil { <mask> log.Error("Can't initialize filtering subsystem: %s", err) <mask> d.Destroy() <mask> return nil <mask> } <mask> } <mask> <mask> return d </s> * dnsfilter: major refactoring * dnsfilter is contr...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
d.filtersInitializerChan = make(chan filtersInitializerParams, 1) go d.filtersInitializer()
<mask> return nil <mask> } <mask> } <mask> <mask> return d <mask> } <mask> <mask> // Destroy is optional if you want to tidy up goroutines without waiting for them to die off <mask> // right now it closes idle HTTP connections if there are any <mask> func (d *Dnsfilter) Destroy() { <mask> if d != n...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
if d.Config.HTTPRegister != nil { // for tests d.registerSecurityHandlers() d.registerRewritesHandlers()
<mask> <mask> return d <mask> } <mask> <mask> // Destroy is optional if you want to tidy up goroutines without waiting for them to die off <mask> // right now it closes idle HTTP connections if there are any <mask> func (d *Dnsfilter) Destroy() { <mask> if d != nil && d.transport != nil { <mask> d.transp...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
return d
<mask> d.registerSecurityHandlers() <mask> d.registerRewritesHandlers() <mask> } <mask> } <mask> <mask> // <mask> // config manipulation helpers </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not dnsforward * move HTTP handlers to dnsfilter/ * apply filtering settings with...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter.go
defer d.Close()
<mask> addr, addr6) <mask> filters := make(map[int]string) <mask> filters[0] = text <mask> d := NewForTest(nil, filters) <mask> defer d.Destroy() <mask> <mask> d.checkMatchIP(t, "google.com", addr, dns.TypeA) <mask> d.checkMatchIP(t, "www.google.com", addr, dns.TypeA) <mask> d.checkMatchEmpty(t, "sub...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> for _, tc := range testCases { <mask> t.Run(fmt.Sprintf("%s in %s", tc, _Func()), func(t *testing.T) { <mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Destroy() <mask> gctx.stats.Safebrowsing.Requests = 0 <mask> d.checkMatch(t, "wmconvirus.narod.ru")...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> <mask> func TestParallelSB(t *testing.T) { <mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Destroy() <mask> t.Run("group", func(t *testing.T) { <mask> for i := 0; i < 100; i++ { <mask> t.Run(fmt.Sprintf("aaa%d", i), func(t *testing.T) { <mask> t.Paral...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> <mask> // the only way to verify that custom server option is working is to point it at a server that does serve safebrowsing <mask> func TestSafeBrowsingCustomServerFail(t *testing.T) { <mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Destroy() <mask> ts := httptest.NewSe...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> // SAFE SEARCH <mask> <mask> func TestSafeSearch(t *testing.T) { <mask> d := NewForTest(nil, nil) <mask> defer d.Destroy() <mask> _, ok := d.SafeSearchDomain("www.google.com") <mask> if ok { <mask> t.Errorf("Expected safesearch to error when disabled") <mask> } <mask> </s> * dnsfilter: major ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> t.Errorf("Expected safesearch to error when disabled") <mask> } <mask> <mask> d = NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Destroy() <mask> val, ok := d.SafeSearchDomain("www.google.com") <mask> if !ok { <mask> t.Errorf("Expected safesearch to find result for www.google....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> <mask> func TestCheckHostSafeSearchYandex(t *testing.T) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Destroy() <mask> <mask> // Slice of yandex domains <mask> yandex := []string{"yAndeX.ru", "YANdex.COM", "yandex.ua", "yandex.by", "yandex.kz", "www.yandex....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> <mask> func TestCheckHostSafeSearchGoogle(t *testing.T) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Destroy() <mask> <mask> // Slice of google domains <mask> googleDomains := []string{"www.google.com", "www.google.im", "www.google.co.in", "www.google.iq",...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> <mask> func TestSafeSearchCacheYandex(t *testing.T) { <mask> d := NewForTest(nil, nil) <mask> defer d.Destroy() <mask> domain := "yandex.ru" <mask> <mask> var result Result <mask> var err error <mask> </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> t.Fatalf("SafeSearch is not enabled but there is an answer for `%s` !", domain) <mask> } <mask> <mask> d = NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Destroy() <mask> <mask> result, err = d.CheckHost(domain, dns.TypeA, &setts) <mask> if err != nil { <mask> t.Fatalf("Chec...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> <mask> func TestSafeSearchCacheGoogle(t *testing.T) { <mask> d := NewForTest(nil, nil) <mask> defer d.Destroy() <mask> domain := "www.google.ru" <mask> result, err := d.CheckHost(domain, dns.TypeA, &setts) <mask> if err != nil { <mask> t.Fatalf("Cannot check host due to %s", err) <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> t.Fatalf("SafeSearch is not enabled but there is an answer!") <mask> } <mask> <mask> d = NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Destroy() <mask> <mask> // Let's lookup for safesearch domain <mask> safeDomain, ok := d.SafeSearchDomain(domain) <mask> if !ok { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> // PARENTAL <mask> <mask> func TestParentalControl(t *testing.T) { <mask> d := NewForTest(&Config{ParentalEnabled: true}, nil) <mask> defer d.Destroy() <mask> d.ParentalSensitivity = 3 <mask> d.checkMatch(t, "pornhub.com") <mask> d.checkMatch(t, "pornhub.com") <mask> if gctx.stats.Parental.Reques...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> t.Run(fmt.Sprintf("%s-%s", test.testname, test.hostname), func(t *testing.T) { <mask> filters := make(map[int]string) <mask> filters[0] = test.rules <mask> d := NewForTest(nil, filters) <mask> defer d.Destroy() <mask> <mask> ret, err := d.CheckHost(test.hostname, dns.TypeA, &setts) <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> var r Result <mask> filters := make(map[int]string) <mask> filters[0] = "||example.org^\n" <mask> d := NewForTest(&Config{ParentalEnabled: true, SafeBrowsingEnabled: false}, filters) <mask> defer d.Destroy() <mask> d.ParentalSensitivity = 3 <mask> <mask> // no client settings: <mask> <mask> /...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> // BENCHMARKS <mask> <mask> func BenchmarkSafeBrowsing(b *testing.B) { <mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Destroy() <mask> for n := 0; n < b.N; n++ { <mask> hostname := "wmconvirus.narod.ru" <mask> ret, err := d.CheckHost(hostname, dns.TypeA, &setts) <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> <mask> func BenchmarkSafeBrowsingParallel(b *testing.B) { <mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Destroy() <mask> b.RunParallel(func(pb *testing.PB) { <mask> for pb.Next() { <mask> hostname := "wmconvirus.narod.ru" <mask> ret, err := d.CheckHo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> <mask> func BenchmarkSafeSearch(b *testing.B) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Destroy() <mask> for n := 0; n < b.N; n++ { <mask> val, ok := d.SafeSearchDomain("www.google.com") <mask> if !ok { <mask> b.Errorf("Expected safesearch to find...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
defer d.Close()
<mask> } <mask> <mask> func BenchmarkSafeSearchParallel(b *testing.B) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Destroy() <mask> b.RunParallel(func(pb *testing.PB) { <mask> for pb.Next() { <mask> val, ok := d.SafeSearchDomain("www.google.com") <mask> if !ok { <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsfilter/dnsfilter_test.go
<mask> <mask> import ( <mask> "crypto/tls" <mask> "errors" <mask> "fmt" <mask> "net" <mask> "net/http" <mask> "strings" <mask> "sync" <mask> "time" </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not dnsforward * move HTTP handlers to dnsfilter/ * apply filtering sett...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> dnsFilter *dnsfilter.Dnsfilter // DNS filter instance <mask> queryLog querylog.QueryLog // Query log instance <mask> stats stats.Stats <mask> <mask> // How many times the server was started <mask> // While creating a dnsfilter object, <mask> // we use this value to set s.dnsFilter property...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> sync.RWMutex <mask> conf ServerConfig <mask> } <mask> <mask> type dnsfilterCreatorParams struct { <mask> conf dnsfilter.Config <mask> filters map[int]string <mask> } <mask> <mask> // NewServer creates a new instance of the dnsforward.Server <mask> // Note: this function must be called only on...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
func NewServer(dnsFilter *dnsfilter.Dnsfilter, stats stats.Stats, queryLog querylog.QueryLog) *Server {
<mask> } <mask> <mask> // NewServer creates a new instance of the dnsforward.Server <mask> // Note: this function must be called only once <mask> func NewServer(stats stats.Stats, queryLog querylog.QueryLog) *Server { <mask> s := &Server{} <mask> s.stats = stats <mask> s.queryLog = queryLog <mask> return ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
s.dnsFilter = dnsFilter
<mask> // NewServer creates a new instance of the dnsforward.Server <mask> // Note: this function must be called only once <mask> func NewServer(dnsFilter *dnsfilter.Dnsfilter, stats stats.Stats, queryLog querylog.QueryLog) *Server { <mask> s := &Server{} <mask> s.stats = stats <mask> s.queryLog = queryLog <m...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
s.dnsFilter = nil
<mask> <mask> func (s *Server) Close() { <mask> s.Lock() <mask> s.stats = nil <mask> s.queryLog = nil <mask> s.Unlock() <mask> } </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not dnsforward * move HTTP handlers to dnsfilter/ * apply filtering settings without DNS server re...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
// Filtering callback function FilterHandler func(clientAddr string, settings *dnsfilter.RequestFilteringSettings) `yaml:"-"`
<mask> <mask> // FilteringConfig represents the DNS filtering configuration of AdGuard Home <mask> // The zero FilteringConfig is empty and ready for use. <mask> type FilteringConfig struct { <mask> // Create dnsfilter asynchronously. <mask> // Requests won't be filtered until dnsfilter is created. <mask> //...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
CacheSize uint `yaml:"cache_size"` // DNS cache size (in bytes) DnsfilterConf dnsfilter.Config `yaml:",inline"`
<mask> // Names of services to block (globally). <mask> // Per-client settings can override this configuration. <mask> BlockedServices []string `yaml:"blocked_services"` <mask> <mask> CacheSize uint `yaml:"cache_size"` // DNS cache size (in bytes) <mask> dnsfilter.Config `yaml:",inline"` <mask> } <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> UDPListenAddr *net.UDPAddr // UDP listen address <mask> TCPListenAddr *net.TCPAddr // TCP listen address <mask> Upstreams []upstream.Upstream // Configured upstreams <mask> DomainsReservedUpstreams map[string][]upstream.U...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
if s.dnsProxy != nil {
<mask> } <mask> <mask> // startInternal starts without locking <mask> func (s *Server) startInternal(config *ServerConfig) error { <mask> if s.dnsFilter != nil || s.dnsProxy != nil { <mask> return errors.New("DNS server is already started") <mask> } <mask> <mask> err := s.initDNSFilter(config) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
if config != nil { s.conf = *config } if len(s.conf.ParentalBlockHost) == 0 { s.conf.ParentalBlockHost = parentalBlockHost } if len(s.conf.SafeBrowsingBlockHost) == 0 { s.conf.SafeBrowsingBlockHost = safeBrowsingBlockHost
<mask> if s.dnsFilter != nil || s.dnsProxy != nil { <mask> return errors.New("DNS server is already started") <mask> } <mask> <mask> err := s.initDNSFilter(config) <mask> if err != nil { <mask> return err <mask> } <mask> <mask> proxyConfig := proxy.Config{ <mask> UDPListenAddr: s.con...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
err := processIPCIDRArray(&s.AllowedClients, &s.AllowedClientsIPNet, s.conf.AllowedClients)
<mask> RequestHandler: s.handleDNSRequest, <mask> AllServers: s.conf.AllServers, <mask> } <mask> <mask> err = processIPCIDRArray(&s.AllowedClients, &s.AllowedClientsIPNet, s.conf.AllowedClients) <mask> if err != nil { <mask> return err <mask> } <mask> <mask> err = processI...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> s.dnsProxy = &proxy.Proxy{Config: proxyConfig} <mask> return s.dnsProxy.Start() <mask> } <mask> <mask> // Initializes the DNS filter <mask> func (s *Server) initDNSFilter(config *ServerConfig) error { <mask> if config != nil { <mask> s.conf = *config <mask> } <mask> <mask> var filters map[int...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> return errorx.Decorate(err, "could not stop the DNS server properly") <mask> } <mask> } <mask> <mask> if s.dnsFilter != nil { <mask> s.dnsFilter.Destroy() <mask> s.dnsFilter = nil <mask> } <mask> <mask> return nil <mask> } <mask> <mask> // IsRunning returns true if the DNS server is ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> } <mask> <mask> // filterDNSRequest applies the dnsFilter and sets d.Res if the request was filtered <mask> func (s *Server) filterDNSRequest(d *proxy.DNSContext) (*dnsfilter.Result, error) { <mask> var res dnsfilter.Result <mask> req := d.Req <mask> host := strings.TrimSuffix(req.Question[0].Name, "....
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> if !s.conf.ProtectionEnabled || s.dnsFilter == nil { <mask> return &dnsfilter.Result{}, nil <mask> } <mask> <mask> var err error <mask> <mask> clientAddr := "" <mask> if d.Addr != nil { <mask> clientAddr, _, _ = net.SplitHostPort(d.Addr.String()) <mask> } <mask> </s> * dnsfilter: major r...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
setts := s.dnsFilter.GetConfig()
<mask> if d.Addr != nil { <mask> clientAddr, _, _ = net.SplitHostPort(d.Addr.String()) <mask> } <mask> <mask> var setts dnsfilter.RequestFilteringSettings <mask> setts.FilteringEnabled = true <mask> setts.SafeSearchEnabled = s.conf.SafeSearchEnabled <mask> setts.SafeBrowsingEnabled = s.conf.SafeBrowsin...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> } <mask> <mask> var setts dnsfilter.RequestFilteringSettings <mask> setts.FilteringEnabled = true <mask> setts.SafeSearchEnabled = s.conf.SafeSearchEnabled <mask> setts.SafeBrowsingEnabled = s.conf.SafeBrowsingEnabled <mask> setts.ParentalEnabled = s.conf.ParentalEnabled <mask> if s.conf.FilterHa...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
req := d.Req host := strings.TrimSuffix(req.Question[0].Name, ".") res, err := s.dnsFilter.CheckHost(host, d.Req.Question[0].Qtype, &setts)
<mask> if s.conf.FilterHandler != nil { <mask> s.conf.FilterHandler(clientAddr, &setts) <mask> } <mask> <mask> res, err = dnsFilter.CheckHost(host, d.Req.Question[0].Qtype, &setts) <mask> if err != nil { <mask> // Return immediately if there's an error <mask> return nil, errorx.Decorate(err, "dnsfilt...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward.go
<mask> } <mask> <mask> func TestSafeSearch(t *testing.T) { <mask> s := createTestServer(t) <mask> s.conf.SafeSearchEnabled = true <mask> err := s.Start(nil) <mask> if err != nil { <mask> t.Fatalf("Failed to start server: %s", err) <mask> } <mask> </s> * dnsfilter: major refactoring * dnsfilter is c...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward_test.go
rules := "||nxdomain.example.org^\n||null.example.org^\n127.0.0.1 host.example.org\n" filters := map[int]string{} filters[0] = rules c := dnsfilter.Config{} c.SafeBrowsingEnabled = true c.SafeBrowsingCacheSize = 1000 c.SafeSearchEnabled = true c.SafeSearchCacheSize = 1000 c.ParentalCacheSize = 1000 c.CacheTim...
<mask> } <mask> } <mask> <mask> func createTestServer(t *testing.T) *Server { <mask> s := NewServer(nil, nil) <mask> s.conf.UDPListenAddr = &net.UDPAddr{Port: 0} <mask> s.conf.TCPListenAddr = &net.TCPAddr{Port: 0} <mask> <mask> s.conf.FilteringConfig.FilteringEnabled = true <mask> s.conf.FilteringConf...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward_test.go
<mask> s.conf.TCPListenAddr = &net.TCPAddr{Port: 0} <mask> <mask> s.conf.FilteringConfig.FilteringEnabled = true <mask> s.conf.FilteringConfig.ProtectionEnabled = true <mask> s.conf.FilteringConfig.SafeBrowsingEnabled = true <mask> s.conf.Filters = make([]dnsfilter.Filter, 0) <mask> <mask> s.conf.SafeBr...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
dnsforward/dnsforward_test.go
"github.com/AdguardTeam/AdGuardHome/dnsfilter"
<mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/dnsforward" <mask> "github.com/AdguardTeam/AdGuardHome/querylog" <mask> "github.com/AdguardTeam/AdGuardHome/stats" <mask> "github.com/AdguardTeam/golibs/file" </s> * dnsfilter...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/config.go
<mask> transport *http.Transport <mask> client *http.Client <mask> stats stats.Stats // statistics module <mask> queryLog querylog.QueryLog // query log module <mask> filteringStarted bool // TRUE if filtering module is started <mask> auth *...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/config.go
dnsFilter *dnsfilter.Dnsfilter
<mask> versionCheckLastTime time.Time <mask> <mask> dnsctx dnsContext <mask> dnsServer *dnsforward.Server <mask> dhcpServer dhcpd.Server <mask> httpServer *http.Server <mask> httpsServer HTTPSServer <mask> </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not dnsf...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/config.go
config.DNS.DnsfilterConf.SafeBrowsingCacheSize = 1 * 1024 * 1024 config.DNS.DnsfilterConf.SafeSearchCacheSize = 1 * 1024 * 1024 config.DNS.DnsfilterConf.ParentalCacheSize = 1 * 1024 * 1024 config.DNS.DnsfilterConf.CacheTime = 30
<mask> config.DNS.UpstreamDNS = defaultDNS <mask> } <mask> <mask> config.DNS.CacheSize = 4 * 1024 * 1024 <mask> config.DNS.SafeBrowsingCacheSize = 1 * 1024 * 1024 <mask> config.DNS.SafeSearchCacheSize = 1 * 1024 * 1024 <mask> config.DNS.ParentalCacheSize = 1 * 1024 * 1024 <mask> config.DNS.CacheTime = ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/config.go
if config.dnsFilter != nil { c := dnsfilter.Config{} config.dnsFilter.WriteDiskConfig(&c) config.DNS.DnsfilterConf = c }
<mask> config.DNS.QueryLogEnabled = dc.Enabled <mask> config.DNS.QueryLogInterval = dc.Interval <mask> } <mask> <mask> configFile := config.getConfigFilename() <mask> log.Debug("Writing YAML file: %s", configFile) <mask> yamlText, err := yaml.Marshal(&config) <mask> config.Clients = nil <mask> if er...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/config.go
<mask> log.Debug("DNS %s works OK", input) <mask> return nil <mask> } <mask> <mask> // ------------ <mask> // safebrowsing <mask> // ------------ <mask> <mask> func handleSafeBrowsingEnable(w http.ResponseWriter, r *http.Request) { <mask> config.DNS.SafeBrowsingEnabled = true <mask> httpUpdateConfigRel...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control.go
<mask> httpRegister(http.MethodPost, "/control/i18n/change_language", handleI18nChangeLanguage) <mask> httpRegister(http.MethodGet, "/control/i18n/current_language", handleI18nCurrentLanguage) <mask> http.HandleFunc("/control/version.json", postInstall(optionalAuth(handleGetVersionJSON))) <mask> httpRegister(ht...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control.go
<mask> <mask> RegisterFilteringHandlers() <mask> RegisterTLSHandlers() <mask> RegisterClientsHandlers() <mask> registerRewritesHandlers() <mask> RegisterBlockedServicesHandlers() <mask> RegisterAuthHandlers() <mask> <mask> http.HandleFunc("/dns-query", postInstall(handleDOH)) <mask> } </s> * dnsfilt...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control.go
onConfigModified() enableFilters(true)
<mask> httpError(w, http.StatusBadRequest, "Filter URL already added -- %s", f.URL) <mask> return <mask> } <mask> <mask> err = writeAllConfigs() <mask> if err != nil { <mask> httpError(w, http.StatusInternalServerError, "Couldn't write config file: %s", err) <mask> return <mask> } <mask> <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
<mask> http.Error(w, "URL parameter is not valid request URL", http.StatusBadRequest) <mask> return <mask> } <mask> <mask> // Stop DNS server: <mask> // we close urlfilter object which in turn closes file descriptors to filter files. <mask> // Otherwise, Windows won't allow us to remove the file which ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
newFilters := []filter{}
<mask> _ = config.dnsServer.Stop() <mask> <mask> // go through each element and delete if url matches <mask> config.Lock() <mask> newFilters := config.Filters[:0] <mask> for _, filter := range config.Filters { <mask> if filter.URL != req.URL { <mask> newFilters = append(newFilters, filter) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
err := os.Rename(filter.Path(), filter.Path()+".old") if err != nil { log.Error("os.Rename: %s: %s", filter.Path(), err)
<mask> for _, filter := range config.Filters { <mask> if filter.URL != req.URL { <mask> newFilters = append(newFilters, filter) <mask> } else { <mask> // Remove the filter file <mask> err := os.Remove(filter.Path()) <mask> if err != nil && !os.IsNotExist(err) { <mask> config.Unlock() <mask...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
<mask> config.Unlock() <mask> httpError(w, http.StatusInternalServerError, "Couldn't remove the filter file: %s", err) <mask> return <mask> } <mask> log.Debug("os.Remove(%s)", filter.Path()) <mask> } <mask> } <mask> // Update the configuration after removing filter files <mask> config.Fi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
onConfigModified() enableFilters(true) // Note: the old files "filter.txt.old" aren't deleted - it's not really necessary, // but will require the additional code to run after enableFilters() is finished: i.e. complicated
<mask> } <mask> // Update the configuration after removing filter files <mask> config.Filters = newFilters <mask> config.Unlock() <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> type filterURLJSON struct { <mask> URL string `json:"url"` <mask> Enabled bool `json:"enabled"` ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
onConfigModified() enableFilters(true)
<mask> http.Error(w, "URL doesn't exist", http.StatusBadRequest) <mask> return <mask> } <mask> <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleFilteringSetRules(w http.ResponseWriter, r *http.Request) { <mask> body, err := ioutil.ReadAll(r.Body) <mask> if err != nil ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
_ = writeAllConfigs() enableFilters(true)
<mask> return <mask> } <mask> <mask> config.UserRules = strings.Split(string(body), "\n") <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleFilteringRefresh(w http.ResponseWriter, r *http.Request) { <mask> updated := refreshFiltersIfNecessary(true) <mask> fmt.Fprintf(w,...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
beginRefreshFilters() fmt.Fprintf(w, "OK 0 filters updated\n")
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleFilteringRefresh(w http.ResponseWriter, r *http.Request) { <mask> updated := refreshFiltersIfNecessary(true) <mask> fmt.Fprintf(w, "OK %d filters updated\n", updated) <mask> } <mask> <mask> type filterJSON struct { <mask> I...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
onConfigModified() enableFilters(true)
<mask> } <mask> <mask> config.DNS.FilteringEnabled = req.Enabled <mask> config.DNS.FiltersUpdateIntervalHours = req.Interval <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> <mask> returnOK(w) <mask> } <mask> <mask> // RegisterFilteringHandlers - register handlers <mask> func RegisterFilteringHa...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/control_filtering.go
filterConf := config.DNS.DnsfilterConf bindhost := config.DNS.BindHost if config.DNS.BindHost == "0.0.0.0" { bindhost = "127.0.0.1" } filterConf.ResolverAddress = fmt.Sprintf("%s:%d", bindhost, config.DNS.Port) filterConf.ConfigModified = onConfigModified filterConf.HTTPRegister = httpRegister config.dnsFilte...
<mask> ConfigModified: onConfigModified, <mask> HTTPRegister: httpRegister, <mask> } <mask> config.queryLog = querylog.New(conf) <mask> config.dnsServer = dnsforward.NewServer(config.stats, config.queryLog) <mask> <mask> sessFilename := filepath.Join(baseDir, "sessions.db") <mask> config.auth = Init...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/dns.go
<mask> } <mask> } <mask> <mask> func generateServerConfig() (dnsforward.ServerConfig, error) { <mask> filters := []dnsfilter.Filter{} <mask> userFilter := userFilter() <mask> filters = append(filters, dnsfilter.Filter{ <mask> ID: userFilter.ID, <mask> Data: userFilter.Data, <mask> }) <mask> for ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/dns.go
<mask> newconfig := dnsforward.ServerConfig{ <mask> UDPListenAddr: &net.UDPAddr{IP: net.ParseIP(config.DNS.BindHost), Port: config.DNS.Port}, <mask> TCPListenAddr: &net.TCPAddr{IP: net.ParseIP(config.DNS.BindHost), Port: config.DNS.Port}, <mask> FilteringConfig: config.DNS.FilteringConfig, <mask> Filt...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/dns.go
<mask> TCPListenAddr: &net.TCPAddr{IP: net.ParseIP(config.DNS.BindHost), Port: config.DNS.Port}, <mask> FilteringConfig: config.DNS.FilteringConfig, <mask> Filters: filters, <mask> } <mask> newconfig.AsyncStartup = true <mask> bindhost := config.DNS.BindHost <mask> if config.DNS.BindHost == "...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/dns.go
enableFilters(false)
<mask> } <mask> <mask> newconfig, err := generateServerConfig() <mask> if err != nil { <mask> return errorx.Decorate(err, "Couldn't start forwarding DNS server") <mask> } <mask> <mask> err = config.dnsServer.Start(&newconfig) </s> * dnsfilter: major refactoring * dnsfilter is controlled by package ho...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/dns.go
<mask> if err != nil { <mask> return errorx.Decorate(err, "Couldn't start forwarding DNS server") <mask> } <mask> <mask> if !config.filteringStarted { <mask> config.filteringStarted = true <mask> startRefreshFilters() <mask> } <mask> <mask> return nil <mask> } <mask> <mask> func reconfigureDN...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/dns.go
config.dnsFilter.Close() config.dnsFilter = nil
<mask> config.dnsServer.Close() <mask> <mask> config.stats.Close() <mask> config.stats = nil <mask> <mask> config.queryLog.Close() </s> * dnsfilter: major refactoring * dnsfilter is controlled by package home, not dnsforward * move HTTP handlers to dnsfilter/ * apply filtering settings without DNS server ...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/dns.go
forceRefresh bool
<mask> var ( <mask> nextFilterID = time.Now().Unix() // semi-stable way to generate an unique ID <mask> filterTitleRegexp = regexp.MustCompile(`^! Title: +(.*)$`) <mask> ) <mask> <mask> func initFiltering() { <mask> loadFilters() <mask> deduplicateFilters() <mask> updateUniqueFilterID(config.Filters...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
<mask> func initFiltering() { <mask> loadFilters() <mask> deduplicateFilters() <mask> updateUniqueFilterID(config.Filters) <mask> } <mask> <mask> func startRefreshFilters() { <mask> go func() { <mask> _ = refreshFiltersIfNecessary(false) <mask> }() <mask> go periodicallyRefreshFilters() <mask> } <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
nextRefresh := int64(0)
<mask> } <mask> <mask> // Sets up a timer that will be checking for filters updates periodically <mask> func periodicallyRefreshFilters() { <mask> for { <mask> if forceRefresh { <mask> _ = refreshFiltersIfNecessary(true) <mask> forceRefresh = false <mask> } </s> * dnsfilter: major refactoring * d...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
if forceRefresh { _ = refreshFiltersIfNecessary(true) forceRefresh = false
<mask> <mask> // Sets up a timer that will be checking for filters updates periodically <mask> func periodicallyRefreshFilters() { <mask> for { <mask> time.Sleep(1 * time.Hour) <mask> if config.DNS.FiltersUpdateIntervalHours == 0 { <mask> continue <mask> } <mask> <mask> refreshFiltersIfNecessary...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
if config.DNS.FiltersUpdateIntervalHours != 0 && nextRefresh <= time.Now().Unix() { _ = refreshFiltersIfNecessary(false) nextRefresh = time.Now().Add(1 * time.Hour).Unix() } time.Sleep(1 * time.Second)
<mask> if config.DNS.FiltersUpdateIntervalHours == 0 { <mask> continue <mask> } <mask> <mask> refreshFiltersIfNecessary(false) <mask> } <mask> } <mask> <mask> // Checks filters updates if necessary <mask> // If force is true, it ignores the filter.LastUpdated field value </s> * dnsfilter: major r...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
// Schedule the procedure to refresh filters func beginRefreshFilters() { forceRefresh = true log.Debug("Filters: schedule update") }
<mask> time.Sleep(1 * time.Second) <mask> } <mask> } <mask> <mask> // Checks filters updates if necessary <mask> // If force is true, it ignores the filter.LastUpdated field value <mask> // <mask> // Algorithm: <mask> // . Get the list of filters to be updated <mask> // . For each filter run the download ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
<mask> // <mask> // Algorithm: <mask> // . Get the list of filters to be updated <mask> // . For each filter run the download and checksum check operation <mask> // . Stop server <mask> // . For each filter: <mask> // . If filter data hasn't changed, just set new update time on file <mask> // . If filter data...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
// . If filter data has changed: rename the old file, store the new data on disk // . Pass new filters to dnsfilter object
<mask> // . For each filter run the download and checksum check operation <mask> // . Stop server <mask> // . For each filter: <mask> // . If filter data hasn't changed, just set new update time on file <mask> // . If filter data has changed, save it on disk <mask> // . Apply changes to the current configurati...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
log.Debug("Filters: updating...")
<mask> var updateFlags []bool // 'true' if filter data has changed <mask> <mask> now := time.Now() <mask> config.RLock() <mask> for i := range config.Filters { <mask> f := &config.Filters[i] // otherwise we will be operating on a copy <mask> </s> * dnsfilter: major refactoring * dnsfilter is controlled...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
<mask> updateFilters = append(updateFilters, uf) <mask> } <mask> config.RUnlock() <mask> <mask> updateCount := 0 <mask> for i := range updateFilters { <mask> uf := &updateFilters[i] <mask> updated, err := uf.update() <mask> updateFlags = append(updateFlags, updated) <mask> if err != nil { </s>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
<mask> log.Printf("Failed to update filter %s: %s\n", uf.URL, err) <mask> continue <mask> } <mask> uf.LastUpdated = now <mask> if updated { <mask> updateCount++ <mask> } <mask> } <mask> <mask> stopped := false <mask> if updateCount != 0 { <mask> _ = config.dnsServer.Stop() <mask> s...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
updateCount := 0
<mask> _ = config.dnsServer.Stop() <mask> stopped = true <mask> } <mask> <mask> updateCount = 0 <mask> for i := range updateFilters { <mask> uf := &updateFilters[i] <mask> updated := updateFlags[i] <mask> if updated { <mask> // Saving it to the filters dir now </s> * dnsfilter: major refacto...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
err := uf.saveAndBackupOld()
<mask> for i := range updateFilters { <mask> uf := &updateFilters[i] <mask> updated := updateFlags[i] <mask> if updated { <mask> // Saving it to the filters dir now <mask> err := uf.save() <mask> if err != nil { <mask> log.Printf("Failed to save the updated filter %d: %s", uf.ID, err) <mask...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
if updateCount != 0 { enableFilters(false) for i := range updateFilters { uf := &updateFilters[i] updated := updateFlags[i] if !updated { continue } _ = os.Remove(uf.Path() + ".old")
<mask> } <mask> config.Unlock() <mask> } <mask> <mask> if stopped { <mask> err := reconfigureDNSServer() <mask> if err != nil { <mask> log.Error("cannot reconfigure DNS server with the new filters: %s", err) <mask> } <mask> } <mask> return updateCount <mask> } <mask> </s> * dnsfilter: m...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go
log.Debug("Filters: update finished")
<mask> } <mask> _ = os.Remove(uf.Path() + ".old") <mask> } <mask> } <mask> return updateCount <mask> } <mask> <mask> // Allows printable UTF-8 text with CR, LF, TAB characters <mask> func isPrintableText(data []byte) bool { <mask> for _, c := range data { </s> * dnsfilter: major refactoring * dn...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/a59e346d4af2a1ac91ea087a0c465e9a1e593f86
home/filter.go