docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
cType := w.Header().Get(aghhttp.HdrNameContentType) assert.Equal(t, aghhttp.HdrValApplicationJSON, cType)
<mask> <mask> s.conf = tc.conf() <mask> s.handleGetConfig(w, nil) <mask> <mask> assert.Equal(t, "application/json", w.Header().Get("Content-Type")) <mask> assert.JSONEq(t, string(caseWant), w.Body.String()) <mask> }) <mask> } <mask> } <mask> </s> Pull request: 3955-doh3 Updates #3955. Squ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/dnsforward/http_test.go
Bootstrap: config.DNS.BootstrapDNS, Timeout: config.DNS.UpstreamTimeout.Duration, HTTPVersions: dnsforward.UpstreamHTTPVersions(config.DNS.UseHTTP3Upstreams),
<mask> var conf *proxy.UpstreamConfig <mask> conf, err = proxy.ParseUpstreamsConfig( <mask> upstreams, <mask> &upstream.Options{ <mask> Bootstrap: config.DNS.BootstrapDNS, <mask> Timeout: config.DNS.UpstreamTimeout.Duration, <mask> }, <mask> ) <mask> if err != nil { <mask> return nil, err ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/clients.go
// ServeHTTP3 defines if HTTP/3 is be allowed for incoming requests. // // TODO(a.garipov): Add to the UI when HTTP/3 support is no longer // experimental. ServeHTTP3 bool `yaml:"serve_http3"` // UseHTTP3Upstreams defines if HTTP/3 is be allowed for DNS-over-HTTPS // upstreams. // // TODO(a.garipov): Add to t...
<mask> // LocalPTRResolvers is the slice of addresses to be used as upstreams <mask> // for PTR queries for locally-served networks. <mask> LocalPTRResolvers []string `yaml:"local_ptr_upstreams"` <mask> } <mask> <mask> type tlsConfigSettings struct { <mask> Enabled bool `yaml:"enabled" json:"enabl...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/config.go
<mask> package home <mask> <mask> import ( <mask> "encoding/json" <mask> "fmt" <mask> "net" <mask> "net/http" <mask> "net/url" <mask> "runtime" </s> Pull request: 3955-doh3 Updates #3955. Squashed commit of the following: commit acfd5ccc29ff03dfae1e51e52649acdf05042d9f Merge: caeac6e5 61bd217e Autho...
[ "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/control.go
<mask> Name string `json:"name"` <mask> } <mask> <mask> func handleGetProfile(w http.ResponseWriter, r *http.Request) { <mask> pj := profileJSON{} <mask> u := Context.auth.getCurrentUser(r) <mask> <mask> pj.Name = u.Name <mask> <mask> data, err := json.Marshal(pj) </s> Pull request: 3955-doh3 Update...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/control.go
resp := &profileJSON{ Name: u.Name,
<mask> <mask> func handleGetProfile(w http.ResponseWriter, r *http.Request) { <mask> pj := profileJSON{} <mask> u := Context.auth.getCurrentUser(r) <mask> <mask> pj.Name = u.Name <mask> <mask> data, err := json.Marshal(pj) <mask> if err != nil { <mask> aghhttp.Error(r, w, http.StatusInternalServerEr...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/control.go
_ = aghhttp.WriteJSONResponse(w, r, resp)
<mask> <mask> return <mask> } <mask> <mask> _, _ = w.Write(data) <mask> } <mask> <mask> // ------------------------ <mask> // registration of handlers <mask> // ------------------------ </s> Pull request: 3955-doh3 Updates #3955. Squashed commit of the following: commit acfd5ccc29ff03dfae1e51e52649...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/control.go
"github.com/lucas-clemente/quic-go/http3"
<mask> "github.com/AdguardTeam/golibs/errors" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> // getAddrsResponse is the response for /install/get_addresses endpoint. <mask> type getAddrsResponse struct { <mask> Interfaces map[string]*aghnet.NetInterface `json:"interfaces"` <mask> </s> P...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/controlinstall.go
// shutdownSrv shuts srv down and prints error messages to the log.
<mask> <mask> // shutdownTimeout is the timeout for shutting HTTP server down operation. <mask> const shutdownTimeout = 5 * time.Second <mask> <mask> func shutdownSrv(ctx context.Context, srv *http.Server) { <mask> defer log.OnPanic("") <mask> <mask> if srv == nil { <mask> return <mask> } </s> Pull r...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/controlinstall.go
if err == nil { return } const msgFmt = "shutting down http server %q: %s" if errors.Is(err, context.Canceled) { log.Debug(msgFmt, srv.Addr, err) } else { log.Error(msgFmt, srv.Addr, err) } } // shutdownSrv3 shuts srv down and prints error messages to the log. // // TODO(a.garipov): Think of a good way to...
<mask> return <mask> } <mask> <mask> err := srv.Shutdown(ctx) <mask> if err != nil { <mask> const msgFmt = "shutting down http server %q: %s" <mask> if errors.Is(err, context.Canceled) { <mask> log.Debug(msgFmt, srv.Addr, err) <mask> } else { <mask> log.Error(msgFmt, srv.Addr, err) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/controlinstall.go
aghhttp.Error(r, w, http.StatusBadRequest, "encoding check_config: %s", err)
<mask> nonBetaReqBody := &strings.Builder{} <mask> <mask> err = json.NewEncoder(nonBetaReqBody).Encode(nonBetaReqData) <mask> if err != nil { <mask> aghhttp.Error( <mask> r, <mask> w, <mask> http.StatusBadRequest, <mask> "Failed to encode 'check_config' JSON data: %s", <mask> err, <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/controlinstall.go
aghhttp.Error(r, w, http.StatusBadRequest, "encoding configure: %s", err)
<mask> nonBetaReqBody := &strings.Builder{} <mask> <mask> err = json.NewEncoder(nonBetaReqBody).Encode(nonBetaReqData) <mask> if err != nil { <mask> aghhttp.Error( <mask> r, <mask> w, <mask> http.StatusBadRequest, <mask> "Failed to encode 'check_config' JSON data: %s", <mask> err, <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/controlinstall.go
<mask> <mask> newConf.FilterHandler = applyAdditionalFiltering <mask> newConf.GetCustomUpstreamByClient = Context.clients.findUpstreams <mask> <mask> newConf.ResolveClients = config.Clients.Sources.RDNS <mask> newConf.UsePrivateRDNS = dnsConf.UsePrivateRDNS <mask> newConf.LocalPTRResolvers = dnsConf.Local...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/dns.go
newConf.ResolveClients = config.Clients.Sources.RDNS newConf.UsePrivateRDNS = dnsConf.UsePrivateRDNS newConf.ServeHTTP3 = dnsConf.ServeHTTP3 newConf.UseHTTP3Upstreams = dnsConf.UseHTTP3Upstreams
<mask> <mask> newConf.LocalPTRResolvers = dnsConf.LocalPTRResolvers <mask> newConf.UpstreamTimeout = dnsConf.UpstreamTimeout.Duration <mask> <mask> return newConf, nil <mask> } <mask> <mask> func newDNSCrypt(hosts []net.IP, tlsConf tlsConfigSettings) (dnscc dnsforward.DNSCryptConfig, err error) { <mask> ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/dns.go
serveHTTP3: config.DNS.ServeHTTP3,
<mask> WriteTimeout: writeTimeout, <mask> <mask> clientFS: clientFS, <mask> clientBetaFS: clientBetaFS, <mask> } <mask> <mask> web = newWeb(&webConf) <mask> if web == nil { </s> Pull request: 3955-doh3 Updates #3955. Squashed commit of the following: commit acfd5ccc29ff03dfae1e51e52649ac...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/home.go
web = newWeb(&webConf)
<mask> clientFS: clientFS, <mask> clientBetaFS: clientBetaFS, <mask> } <mask> <mask> web = CreateWeb(&webConf) <mask> if web == nil { <mask> return nil, fmt.Errorf("initializing web: %w", err) <mask> } <mask> <mask> return web, nil </s> Pull request: 3955-doh3 Updates #3955. Squashed commi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/home.go
if !webCheckPortAvailable(setts.PortHTTPS) {
<mask> return <mask> } <mask> } <mask> <mask> if !WebCheckPortAvailable(setts.PortHTTPS) { <mask> aghhttp.Error( <mask> r, <mask> w, <mask> http.StatusBadRequest, <mask> "port %d is not available, cannot enable HTTPS on it", </s> Pull request: 3955-doh3 Updates #3955. Squashed commit ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/tls.go
if !webCheckPortAvailable(data.PortHTTPS) {
<mask> } <mask> } <mask> <mask> // TODO(e.burkov): Investigate and perhaps check other ports. <mask> if !WebCheckPortAvailable(data.PortHTTPS) { <mask> aghhttp.Error( <mask> r, <mask> w, <mask> http.StatusBadRequest, <mask> "port %d is not available, cannot enable HTTPS on it", </s> Pull...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/tls.go
"github.com/lucas-clemente/quic-go" "github.com/lucas-clemente/quic-go/http3"
<mask> "github.com/AdguardTeam/golibs/errors" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/AdguardTeam/golibs/netutil" <mask> "github.com/NYTimes/gziphandler" <mask> "golang.org/x/net/http2" <mask> "golang.org/x/net/http2/h2c" <mask> ) <mask> </s> Pull request: 3955-doh3 Updates #3955....
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
serveHTTP3 bool
<mask> // appropriate field. <mask> WriteTimeout time.Duration <mask> <mask> firstRun bool <mask> } <mask> <mask> // httpsServer contains the data for the HTTPS server. <mask> type httpsServer struct { <mask> // server is the pre-HTTP/3 HTTPS server. </s> Pull request: 3955-doh3 Updates #3955. Squashe...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
// httpsServer contains the data for the HTTPS server. type httpsServer struct { // server is the pre-HTTP/3 HTTPS server. server *http.Server // server3 is the HTTP/3 HTTPS server. If it is not nil, // [httpsServer.server] must also be non-nil. server3 *http3.Server // TODO(a.garipov): Why is there a *sync.Con...
<mask> <mask> firstRun bool <mask> } <mask> <mask> // HTTPSServer - HTTPS Server <mask> type HTTPSServer struct { <mask> server *http.Server <mask> cond *sync.Cond <mask> condLock sync.Mutex <mask> shutdown bool // if TRUE, don't restart the server <mask> enabled bool <mask> cert tls.Cer...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
// Web is the web UI and API server.
<mask> enabled bool <mask> cert tls.Certificate <mask> } <mask> <mask> // Web - module object <mask> type Web struct { <mask> conf *webConfig <mask> forceHTTPS bool <mask> httpServer *http.Server // HTTP module <mask> httpsServer HTTPSServer // HTTPS module </s> Pull request: 3955-doh3 ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
conf *webConfig // TODO(a.garipov): Refactor all these servers. httpServer *http.Server // httpServerBeta is a server for new client. httpServerBeta *http.Server
<mask> } <mask> <mask> // Web - module object <mask> type Web struct { <mask> conf *webConfig <mask> forceHTTPS bool <mask> httpServer *http.Server // HTTP module <mask> httpsServer HTTPSServer // HTTPS module <mask> <mask> // handlerBeta is the handler for new client. <mask> handlerBeta ht...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
// httpsServer is the server that handles HTTPS traffic. If it is not nil, // [Web.http3Server] must also not be nil. httpsServer httpsServer forceHTTPS bool
<mask> handlerBeta http.Handler <mask> // installerBeta is the pre-install handler for new client. <mask> installerBeta http.Handler <mask> <mask> // httpServerBeta is a server for new client. <mask> httpServerBeta *http.Server <mask> } <mask> <mask> // CreateWeb - create module <mask> func CreateWeb(c...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
// newWeb creates a new instance of the web UI and API server. func newWeb(conf *webConfig) (w *Web) { log.Info("web: initializing")
<mask> // httpServerBeta is a server for new client. <mask> httpServerBeta *http.Server <mask> } <mask> <mask> // CreateWeb - create module <mask> func CreateWeb(conf *webConfig) *Web { <mask> log.Info("Initialize web module") <mask> <mask> w := Web{} <mask> w.conf = conf <mask> <mask> clientFS := ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
w = &Web{ conf: conf, }
<mask> // CreateWeb - create module <mask> func CreateWeb(conf *webConfig) *Web { <mask> log.Info("Initialize web module") <mask> <mask> w := Web{} <mask> w.conf = conf <mask> <mask> clientFS := http.FileServer(http.FS(conf.clientFS)) <mask> betaClientFS := http.FileServer(http.FS(conf.clientBetaFS)) <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
return w
<mask> registerControlHandlers() <mask> } <mask> <mask> w.httpsServer.cond = sync.NewCond(&w.httpsServer.condLock) <mask> return &w <mask> } <mask> <mask> // WebCheckPortAvailable - check if port is available <mask> // BUT: if we are already using this port, no need <mask> func WebCheckPortAvailable(po...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
// webCheckPortAvailable checks if port, which is considered an HTTPS port, is // available, unless the HTTPS server isn't active. // // TODO(a.garipov): Adapt for HTTP/3. func webCheckPortAvailable(port int) (ok bool) {
<mask> w.httpsServer.cond = sync.NewCond(&w.httpsServer.condLock) <mask> return &w <mask> } <mask> <mask> // WebCheckPortAvailable - check if port is available <mask> // BUT: if we are already using this port, no need <mask> func WebCheckPortAvailable(port int) bool { <mask> return Context.web.httpsServer.s...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
log.Debug("web: applying new tls configuration")
<mask> <mask> // TLSConfigChanged updates the TLS configuration and restarts the HTTPS server <mask> // if necessary. <mask> func (web *Web) TLSConfigChanged(ctx context.Context, tlsConf tlsConfigSettings) { <mask> log.Debug("Web: applying new TLS configuration") <mask> web.conf.PortHTTPS = tlsConf.PortHTTPS ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
shutdownSrv3(web.httpsServer.server3)
<mask> var cancel context.CancelFunc <mask> ctx, cancel = context.WithTimeout(ctx, shutdownTimeout) <mask> shutdownSrv(ctx, web.httpsServer.server) <mask> cancel() <mask> } <mask> <mask> web.httpsServer.enabled = enabled <mask> web.httpsServer.cert = cert </s> Pull request: 3955-doh3 Updates #3955...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
for !web.httpsServer.inShutdown {
<mask> // for https, we have a separate goroutine loop <mask> go web.tlsServerLoop() <mask> <mask> // this loop is used as an ability to change listening host and/or port <mask> for !web.httpsServer.shutdown { <mask> printHTTPAddresses(aghhttp.SchemeHTTP) <mask> errs := make(chan error, 2) <mask> <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
web.httpsServer.inShutdown = true
<mask> func (web *Web) Close(ctx context.Context) { <mask> log.Info("stopping http server...") <mask> <mask> web.httpsServer.cond.L.Lock() <mask> web.httpsServer.shutdown = true <mask> web.httpsServer.cond.L.Unlock() <mask> <mask> var cancel context.CancelFunc <mask> ctx, cancel = context.WithTimeout(c...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
shutdownSrv3(web.httpsServer.server3)
<mask> defer cancel() <mask> <mask> shutdownSrv(ctx, web.httpsServer.server) <mask> shutdownSrv(ctx, web.httpServer) <mask> shutdownSrv(ctx, web.httpServerBeta) <mask> <mask> log.Info("stopped http server") <mask> } <mask> </s> Pull request: 3955-doh3 Updates #3955. Squashed commit of the following:...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
if web.httpsServer.inShutdown {
<mask> <mask> func (web *Web) tlsServerLoop() { <mask> for { <mask> web.httpsServer.cond.L.Lock() <mask> if web.httpsServer.shutdown { <mask> web.httpsServer.cond.L.Unlock() <mask> break <mask> } <mask> <mask> // this mechanism doesn't let us through until all conditions are met </s> Pull re...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
if web.httpsServer.inShutdown {
<mask> <mask> // this mechanism doesn't let us through until all conditions are met <mask> for !web.httpsServer.enabled { // sleep until necessary data is supplied <mask> web.httpsServer.cond.Wait() <mask> if web.httpsServer.shutdown { <mask> web.httpsServer.cond.L.Unlock() <mask> return <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
addr := netutil.JoinHostPort(web.conf.BindHost.String(), web.conf.PortHTTPS)
<mask> } <mask> <mask> web.httpsServer.cond.L.Unlock() <mask> <mask> // prepare HTTPS server <mask> address := netutil.JoinHostPort(web.conf.BindHost.String(), web.conf.PortHTTPS) <mask> web.httpsServer.server = &http.Server{ <mask> ErrorLog: log.StdLog("web: https", log.DEBUG), <mask> Addr: ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
Addr: addr,
<mask> // prepare HTTPS server <mask> address := netutil.JoinHostPort(web.conf.BindHost.String(), web.conf.PortHTTPS) <mask> web.httpsServer.server = &http.Server{ <mask> ErrorLog: log.StdLog("web: https", log.DEBUG), <mask> Addr: address, <mask> TLSConfig: &tls.Config{ <mask> Certificates...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
if web.conf.serveHTTP3 { go web.mustStartHTTP3(addr) } log.Debug("web: starting https server")
<mask> WriteTimeout: web.conf.WriteTimeout, <mask> } <mask> <mask> printHTTPAddresses(aghhttp.SchemeHTTPS) <mask> err := web.httpsServer.server.ListenAndServeTLS("", "") <mask> if !errors.Is(err, http.ErrServerClosed) { <mask> cleanupAlways() <mask> log.Fatalf("web: https: %s", err) <mas...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
if !errors.Is(err, http.ErrServerClosed) {
<mask> } <mask> <mask> printHTTPAddresses(aghhttp.SchemeHTTPS) <mask> err := web.httpsServer.server.ListenAndServeTLS("", "") <mask> if err != http.ErrServerClosed { <mask> cleanupAlways() <mask> log.Fatal(err) <mask> } <mask> } <mask> } </s> Pull request: 3955-doh3 Updates #3955. Squashe...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
log.Fatalf("web: https: %s", err)
<mask> printHTTPAddresses(aghhttp.SchemeHTTPS) <mask> err := web.httpsServer.server.ListenAndServeTLS("", "") <mask> if err != http.ErrServerClosed { <mask> cleanupAlways() <mask> log.Fatal(err) <mask> } <mask> } <mask> } </s> Pull request: 3955-doh3 Updates #3955. Squashed commit of the follo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cce420261b1e207e558f884d6c73cbec9d55f60
internal/home/web.go
delete(clients.list, old.Name)
<mask> // update Name index <mask> if old.Name != c.Name { <mask> clients.list[c.Name] = old <mask> } <mask> <mask> // update upstreams cache <mask> if old.Name != c.Name { </s> Merge: - clients: fix rename Close #1340 Squashed commit of the following: commit 95f0291c681f98c29f4014b651c159d387301af4 A...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd25cf598096505f9b77c4d0a64bd1bbf08d6fe
home/clients.go
if old.Name != c.Name { delete(clients.upstreamsCache, old.Name) } else { delete(clients.upstreamsCache, c.Name) }
<mask> clients.list[c.Name] = old <mask> } <mask> <mask> // update upstreams cache <mask> delete(clients.upstreamsCache, name) <mask> delete(clients.upstreamsCache, old.Name) <mask> <mask> *old = c <mask> return nil <mask> } <mask> </s> Merge: - clients: fix rename Close #1340 Squashed commit of...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd25cf598096505f9b77c4d0a64bd1bbf08d6fe
home/clients.go
assert.True(t, clients.list["client1"] == nil)
<mask> c = Client{} <mask> c, b = clients.Find("1.1.1.2") <mask> assert.True(t, b && c.Name == "client1-renamed" && c.IDs[0] == "1.1.1.2" && c.UseOwnSettings) <mask> <mask> // failed remove - no such name <mask> if clients.Del("client3") { <mask> t.Fatalf("Del - no such name") <mask> } <mask> </s> M...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd25cf598096505f9b77c4d0a64bd1bbf08d6fe
home/clients_test.go
s.queryLog.Add(msg, d.Res, res, elapsed, getIP(d.Addr), upstreamAddr)
<mask> upstreamAddr := "" <mask> if d.Upstream != nil { <mask> upstreamAddr = d.Upstream.Address() <mask> } <mask> s.queryLog.Add(msg, d.Res, res, elapsed, d.Addr, upstreamAddr) <mask> } <mask> <mask> s.updateStats(d, elapsed, *res) <mask> s.RUnlock() <mask> </s> * QueryLog.Add() now receives...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd6781a9a94bbb0cf1d0bd310fc50d665da4674
dnsforward/dnsforward.go
// Get IP address from net.Addr func getIP(addr net.Addr) net.IP { switch addr := addr.(type) { case *net.UDPAddr: return addr.IP case *net.TCPAddr: return addr.IP } return nil }
<mask> } <mask> <mask> func (s *Server) updateStats(d *proxy.DNSContext, elapsed time.Duration, res dnsfilter.Result) { <mask> if s.stats == nil { <mask> return <mask> } <mask> <mask> e := stats.Entry{} </s> * QueryLog.Add() now receives net.IP, not net.Addr </s> remove // getIPString is a helper functi...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd6781a9a94bbb0cf1d0bd310fc50d665da4674
dnsforward/dnsforward.go
func (l *queryLog) Add(question *dns.Msg, answer *dns.Msg, result *dnsfilter.Result, elapsed time.Duration, ip net.IP, upstream string) {
<mask> Elapsed time.Duration <mask> Upstream string `json:",omitempty"` // if empty, means it was cached <mask> } <mask> <mask> // getIPString is a helper function that extracts IP address from net.Addr <mask> func getIPString(addr net.Addr) string { <mask> switch addr := addr.(type) { <mask> case *net.UD...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd6781a9a94bbb0cf1d0bd310fc50d665da4674
querylog/qlog.go
<mask> } <mask> <mask> var a []byte <mask> var err error <mask> ip := getIPString(addr) <mask> <mask> if answer != nil { <mask> a, err = answer.Pack() <mask> if err != nil { <mask> log.Printf("failed to pack answer for querylog: %s", err) </s> * QueryLog.Add() now receives net.IP, not net.Addr ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd6781a9a94bbb0cf1d0bd310fc50d665da4674
querylog/qlog.go
IP: ip.String(),
<mask> } <mask> <mask> now := time.Now() <mask> entry := logEntry{ <mask> IP: ip, <mask> Time: now, <mask> <mask> Answer: a, <mask> Result: *result, <mask> Elapsed: elapsed, </s> * QueryLog.Add() now receives net.IP, not net.Addr </s> remove s.queryLog.Add(msg, d.Res, res, elapsed, d....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd6781a9a94bbb0cf1d0bd310fc50d665da4674
querylog/qlog.go
Add(question *dns.Msg, answer *dns.Msg, result *dnsfilter.Result, elapsed time.Duration, ip net.IP, upstream string)
<mask> // Close query log object <mask> Close() <mask> <mask> // Add a log entry <mask> Add(question *dns.Msg, answer *dns.Msg, result *dnsfilter.Result, elapsed time.Duration, addr net.Addr, upstream string) <mask> <mask> // WriteDiskConfig - write configuration <mask> WriteDiskConfig(dc *DiskConfig) ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0cd6781a9a94bbb0cf1d0bd310fc50d665da4674
querylog/querylog.go
"context"
<mask> // Package dnsfilter implements a DNS request and response filter. <mask> package dnsfilter <mask> <mask> import ( <mask> "fmt" <mask> "io/ioutil" <mask> "net" <mask> "net/http" </s> Pull request: 2574 external tests vol.1 Merge in DNS/adguard-home from 2574-external-tests to master Updates #2574...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter.go
// Resolver is the interface for net.Resolver to simplify testing. type Resolver interface { // TODO(e.burkov): Replace with LookupIP after upgrading go to v1.15. LookupIPAddr(ctx context.Context, host string) (ips []net.IPAddr, err error) }
<mask> blockFilters []Filter <mask> } <mask> <mask> // DNSFilter matches hostnames and DNS requests against filtering rules. <mask> type DNSFilter struct { <mask> rulesStorage *filterlist.RuleStorage <mask> filteringEngine *urlfilter.DNSEngine <mask> rulesStorageAllow *filterlist.RuleStorag...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter.go
// resolver only looks up the IP address of the host while safe search. // // TODO(e.burkov): Use upstream that configured in dnsforward instead. resolver Resolver
<mask> <mask> // Channel for passing data to filters-initializer goroutine <mask> filtersInitializerChan chan filtersInitializerParams <mask> filtersInitializerLock sync.Mutex <mask> } <mask> <mask> // Filter represents a filter list <mask> type Filter struct { <mask> ID int64 // auto-assigned whe...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter.go
d := &DNSFilter{ resolver: net.DefaultResolver, }
<mask> gctx.parentalCache = cache.New(cacheConf) <mask> } <mask> } <mask> <mask> d := new(DNSFilter) <mask> <mask> err := d.initSecurityServices() <mask> if err != nil { <mask> log.Error("dnsfilter: initialize services: %s", err) <mask> return nil </s> Pull request: 2574 external tests vol.1 ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter.go
"context" "crypto/sha256"
<mask> package dnsfilter <mask> <mask> import ( <mask> "bytes" <mask> "fmt" <mask> "net" <mask> "testing" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/testutil" </s> Pull request: 2574 external tests vol.1 Merge in DNS/adguard-home from 2574-external-tests to master Updates #2574. Squa...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
"github.com/AdguardTeam/golibs/cache"
<mask> "testing" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/testutil" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/AdguardTeam/urlfilter/rules" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/assert" </s> Pull request: 2574 external tests vol.1 Merge in...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Helpers.
<mask> } <mask> <mask> var setts RequestFilteringSettings <mask> <mask> // HELPERS <mask> // SAFE BROWSING <mask> // SAFE SEARCH <mask> // PARENTAL <mask> // FILTERING <mask> // BENCHMARKS <mask> <mask> // HELPERS <mask> <mask> func purgeCaches() { <mask> if gctx.safebrowsingCache != nil { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
for _, c := range []cache.Cache{ gctx.safebrowsingCache, gctx.parentalCache, gctx.safeSearchCache, } { if c != nil { c.Clear() }
<mask> <mask> // HELPERS <mask> <mask> func purgeCaches() { <mask> if gctx.safebrowsingCache != nil { <mask> gctx.safebrowsingCache.Clear() <mask> } <mask> if gctx.parentalCache != nil { <mask> gctx.parentalCache.Clear() <mask> } <mask> if gctx.safeSearchCache != nil { <mask> gctx.safeSearchCac...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
func newForTest(c *Config, filters []Filter) *DNSFilter {
<mask> gctx.safeSearchCache.Clear() <mask> } <mask> } <mask> <mask> func NewForTest(c *Config, filters []Filter) *DNSFilter { <mask> setts = RequestFilteringSettings{} <mask> setts.FilteringEnabled = true <mask> if c != nil { <mask> c.SafeBrowsingCacheSize = 10000 <mask> c.ParentalCacheSize = 10000...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Nilf(t, err, "Error while matching host %s: %s", hostname, err) assert.Truef(t, res.IsFiltered, "Expected hostname %s to match", hostname)
<mask> <mask> func (d *DNSFilter) checkMatch(t *testing.T, hostname string) { <mask> t.Helper() <mask> res, err := d.CheckHost(hostname, dns.TypeA, &setts) <mask> if err != nil { <mask> t.Errorf("Error while matching host %s: %s", hostname, err) <mask> } <mask> if !res.IsFiltered { <mask> t.Errorf("E...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Nilf(t, err, "Error while matching host %s: %s", hostname, err) assert.Truef(t, res.IsFiltered, "Expected hostname %s to match", hostname) if assert.NotEmpty(t, res.Rules, "Expected result to have rules") { r := res.Rules[0] assert.NotNilf(t, r.IP, "Expected ip %s to match, actual: %v", ip, r.IP) assert...
<mask> func (d *DNSFilter) checkMatchIP(t *testing.T, hostname, ip string, qtype uint16) { <mask> t.Helper() <mask> <mask> res, err := d.CheckHost(hostname, qtype, &setts) <mask> if err != nil { <mask> t.Errorf("Error while matching host %s: %s", hostname, err) <mask> } <mask> <mask> if !res.IsFiltere...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Nilf(t, err, "Error while matching host %s: %s", hostname, err) assert.Falsef(t, res.IsFiltered, "Expected hostname %s to not match", hostname)
<mask> <mask> func (d *DNSFilter) checkMatchEmpty(t *testing.T, hostname string) { <mask> t.Helper() <mask> res, err := d.CheckHost(hostname, dns.TypeA, &setts) <mask> if err != nil { <mask> t.Errorf("Error while matching host %s: %s", hostname, err) <mask> } <mask> if res.IsFiltered { <mask> t.Error...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d := newForTest(nil, filters) t.Cleanup(d.Close)
<mask> addr, addr6) <mask> filters := []Filter{{ <mask> ID: 0, Data: []byte(text), <mask> }} <mask> d := NewForTest(nil, filters) <mask> defer d.Close() <mask> <mask> d.checkMatchIP(t, "google.com", addr, dns.TypeA) <mask> d.checkMatchIP(t, "www.google.com", addr, dns.TypeA) <mask> d.checkMatchEmp...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// IPv4 match.
<mask> d.checkMatchIP(t, "www.google.com", addr, dns.TypeA) <mask> d.checkMatchEmpty(t, "subdomain.google.com") <mask> d.checkMatchEmpty(t, "example.org") <mask> <mask> // IPv4 <mask> d.checkMatchIP(t, "block.com", "0.0.0.0", dns.TypeA) <mask> <mask> // ...but empty IPv6 <mask> res, err := d.CheckHost...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Empty IPv6.
<mask> <mask> // IPv4 <mask> d.checkMatchIP(t, "block.com", "0.0.0.0", dns.TypeA) <mask> <mask> // ...but empty IPv6 <mask> res, err := d.CheckHost("block.com", dns.TypeAAAA, &setts) <mask> assert.Nil(t, err) <mask> assert.True(t, res.IsFiltered) <mask> if assert.Len(t, res.Rules, 1) { <mask> asser...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// IPv6 match.
<mask> assert.Equal(t, "0.0.0.0 block.com", res.Rules[0].Text) <mask> assert.Empty(t, res.Rules[0].IP) <mask> } <mask> <mask> // IPv6 <mask> d.checkMatchIP(t, "ipv6.com", addr6, dns.TypeAAAA) <mask> <mask> // ...but empty IPv4 <mask> res, err = d.CheckHost("ipv6.com", dns.TypeA, &setts) <mask> ass...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Empty IPv4.
<mask> <mask> // IPv6 <mask> d.checkMatchIP(t, "ipv6.com", addr6, dns.TypeAAAA) <mask> <mask> // ...but empty IPv4 <mask> res, err = d.CheckHost("ipv6.com", dns.TypeA, &setts) <mask> assert.Nil(t, err) <mask> assert.True(t, res.IsFiltered) <mask> if assert.Len(t, res.Rules, 1) { <mask> assert.Equal...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Two IPv4, the first one returned.
<mask> assert.Equal(t, "::1 ipv6.com", res.Rules[0].Text) <mask> assert.Empty(t, res.Rules[0].IP) <mask> } <mask> <mask> // 2 IPv4 (return only the first one) <mask> res, err = d.CheckHost("host2", dns.TypeA, &setts) <mask> assert.Nil(t, err) <mask> assert.True(t, res.IsFiltered) <mask> if assert.L...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Equal(t, res.Rules[0].IP, net.IP{0, 0, 0, 1})
<mask> res, err = d.CheckHost("host2", dns.TypeA, &setts) <mask> assert.Nil(t, err) <mask> assert.True(t, res.IsFiltered) <mask> if assert.Len(t, res.Rules, 1) { <mask> loopback4 := net.IP{0, 0, 0, 1} <mask> assert.Equal(t, res.Rules[0].IP, loopback4) <mask> } <mask> <mask> // ...and 1 IPv6 address ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// One IPv6 address.
<mask> loopback4 := net.IP{0, 0, 0, 1} <mask> assert.Equal(t, res.Rules[0].IP, loopback4) <mask> } <mask> <mask> // ...and 1 IPv6 address <mask> res, err = d.CheckHost("host2", dns.TypeAAAA, &setts) <mask> assert.Nil(t, err) <mask> assert.True(t, res.IsFiltered) <mask> if assert.Len(t, res.Rules, 1)...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Equal(t, res.Rules[0].IP, net.IPv6loopback)
<mask> res, err = d.CheckHost("host2", dns.TypeAAAA, &setts) <mask> assert.Nil(t, err) <mask> assert.True(t, res.IsFiltered) <mask> if assert.Len(t, res.Rules, 1) { <mask> loopback6 := net.IP{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1} <mask> assert.Equal(t, res.Rules[0].IP, loopback6) <mask> } <ma...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Safe Browsing.
<mask> assert.Equal(t, res.Rules[0].IP, loopback6) <mask> } <mask> } <mask> <mask> // SAFE BROWSING <mask> <mask> func TestSafeBrowsing(t *testing.T) { <mask> logOutput := &bytes.Buffer{} <mask> testutil.ReplaceLogWriter(t, logOutput) <mask> testutil.ReplaceLogLevel(t, log.DEBUG) </s> Pull request: 2...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d := newForTest(&Config{SafeBrowsingEnabled: true}, nil) t.Cleanup(d.Close) matching := "wmconvirus.narod.ru" d.safeBrowsingUpstream = &testSbUpstream{ hostname: matching, block: true, } d.checkMatch(t, matching)
<mask> logOutput := &bytes.Buffer{} <mask> testutil.ReplaceLogWriter(t, logOutput) <mask> testutil.ReplaceLogLevel(t, log.DEBUG) <mask> <mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Close() <mask> d.checkMatch(t, "wmconvirus.narod.ru") <mask> <mask> assert.Contains(t, ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Contains(t, logOutput.String(), "SafeBrowsing lookup for "+matching)
<mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Close() <mask> d.checkMatch(t, "wmconvirus.narod.ru") <mask> <mask> assert.Contains(t, logOutput.String(), "SafeBrowsing lookup for wmconvirus.narod.ru") <mask> <mask> d.checkMatch(t, "test.wmconvirus.narod.ru") <mask> d.chec...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d.checkMatch(t, "test."+matching)
<mask> d.checkMatch(t, "wmconvirus.narod.ru") <mask> <mask> assert.Contains(t, logOutput.String(), "SafeBrowsing lookup for wmconvirus.narod.ru") <mask> <mask> d.checkMatch(t, "test.wmconvirus.narod.ru") <mask> d.checkMatchEmpty(t, "yandex.ru") <mask> d.checkMatchEmpty(t, "pornhub.com") <mask> <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Cached result.
<mask> d.checkMatch(t, "test.wmconvirus.narod.ru") <mask> d.checkMatchEmpty(t, "yandex.ru") <mask> d.checkMatchEmpty(t, "pornhub.com") <mask> <mask> // test cached result <mask> d.safeBrowsingServer = "127.0.0.1" <mask> d.checkMatch(t, "wmconvirus.narod.ru") <mask> d.checkMatchEmpty(t, "pornhub.com") <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d.checkMatch(t, matching)
<mask> d.checkMatchEmpty(t, "pornhub.com") <mask> <mask> // test cached result <mask> d.safeBrowsingServer = "127.0.0.1" <mask> d.checkMatch(t, "wmconvirus.narod.ru") <mask> d.checkMatchEmpty(t, "pornhub.com") <mask> d.safeBrowsingServer = defaultSafebrowsingServer <mask> } <mask> <mask> func TestPara...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d := newForTest(&Config{SafeBrowsingEnabled: true}, nil) t.Cleanup(d.Close) matching := "wmconvirus.narod.ru" d.safeBrowsingUpstream = &testSbUpstream{ hostname: matching, block: true, }
<mask> d.safeBrowsingServer = defaultSafebrowsingServer <mask> } <mask> <mask> func TestParallelSB(t *testing.T) { <mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Close() <mask> t.Run("group", func(t *testing.T) { <mask> for i := 0; i < 100; i++ { <mask> t.Run(fmt.Sprin...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d.checkMatch(t, matching) d.checkMatch(t, "test."+matching)
<mask> t.Run("group", func(t *testing.T) { <mask> for i := 0; i < 100; i++ { <mask> t.Run(fmt.Sprintf("aaa%d", i), func(t *testing.T) { <mask> t.Parallel() <mask> d.checkMatch(t, "wmconvirus.narod.ru") <mask> d.checkMatch(t, "test.wmconvirus.narod.ru") <mask> d.checkMatchEmpty(t, "yandex.ru...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Safe Search.
<mask> } <mask> }) <mask> } <mask> <mask> // SAFE SEARCH <mask> <mask> func TestSafeSearch(t *testing.T) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> val, ok := d.SafeSearchDomain("www.google.com") </s> Pull request: 2574 external tests vol.1 Merge in...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d := newForTest(&Config{SafeSearchEnabled: true}, nil) t.Cleanup(d.Close)
<mask> <mask> // SAFE SEARCH <mask> <mask> func TestSafeSearch(t *testing.T) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> val, ok := d.SafeSearchDomain("www.google.com") <mask> if !ok { <mask> t.Errorf("Expected safesearch to find result for www.google.c...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.True(t, ok, "Expected safesearch to find result for www.google.com") assert.Equal(t, "forcesafesearch.google.com", val, "Expected safesearch for google.com to be forcesafesearch.google.com")
<mask> func TestSafeSearch(t *testing.T) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> val, ok := d.SafeSearchDomain("www.google.com") <mask> if !ok { <mask> t.Errorf("Expected safesearch to find result for www.google.com") <mask> } <mask> if val != "force...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d := newForTest(&Config{SafeSearchEnabled: true}, nil) t.Cleanup(d.Close) // Check host for each domain. for _, host := range []string{ "yAndeX.ru", "YANdex.COM", "yandex.ua", "yandex.by", "yandex.kz", "www.yandex.com", } {
<mask> } <mask> } <mask> <mask> func TestCheckHostSafeSearchYandex(t *testing.T) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> <mask> // Slice of yandex domains <mask> yandex := []string{"yAndeX.ru", "YANdex.COM", "yandex.ua", "yandex.by", "yandex.kz", "ww...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Equal(t, res.Rules[0].IP, net.IPv4(213, 180, 193, 56))
<mask> res, err := d.CheckHost(host, dns.TypeA, &setts) <mask> assert.Nil(t, err) <mask> assert.True(t, res.IsFiltered) <mask> if assert.Len(t, res.Rules, 1) { <mask> assert.Equal(t, res.Rules[0].IP.String(), "213.180.193.56") <mask> } <mask> } <mask> } <mask> <mask> func TestCheckHostSafeSearc...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// testResolver is a Resolver for tests. type testResolver struct{} // LookupIP implements Resolver interface for *testResolver. func (r *testResolver) LookupIPAddr(_ context.Context, host string) (ips []net.IPAddr, err error) { hash := sha256.Sum256([]byte(host)) addrs := []net.IPAddr{{ IP: net.IP(hash[:4]), ...
<mask> } <mask> } <mask> } <mask> <mask> func TestCheckHostSafeSearchGoogle(t *testing.T) { <mask> d := NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> <mask> // Slice of google domains <mask> googleDomains := []string{"www.google.com", "www.google.im", "www.google.co....
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
func TestCheckHostSafeSearchGoogle(t *testing.T) { d := newForTest(&Config{SafeSearchEnabled: true}, nil) t.Cleanup(d.Close) d.resolver = &testResolver{} // Check host for each domain. for _, host := range []string{ "www.google.com", "www.google.im", "www.google.co.in", "www.google.iq", "www.google.is",...
<mask> <mask> // Slice of google domains <mask> googleDomains := []string{"www.google.com", "www.google.im", "www.google.co.in", "www.google.iq", "www.google.is", "www.google.it", "www.google.je"} <mask> <mask> // Check host for each domain <mask> for _, host := range googleDomains { <mask> res, err := d...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d := newForTest(nil, nil) t.Cleanup(d.Close)
<mask> } <mask> } <mask> <mask> func TestSafeSearchCacheYandex(t *testing.T) { <mask> d := NewForTest(nil, nil) <mask> defer d.Close() <mask> domain := "yandex.ru" <mask> <mask> // Check host with disabled safesearch. <mask> res, err := d.CheckHost(domain, dns.TypeA, &setts) <mask> assert.Nil(t, err...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d = newForTest(&Config{SafeSearchEnabled: true}, nil) t.Cleanup(d.Close)
<mask> assert.Nil(t, err) <mask> assert.False(t, res.IsFiltered) <mask> assert.Empty(t, res.Rules) <mask> <mask> d = NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> <mask> res, err = d.CheckHost(domain, dns.TypeA, &setts) <mask> if err != nil { <mask> t.Fatalf("Check...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Nilf(t, err, "CheckHost for safesearh domain %s failed cause %s", domain, err)
<mask> d = NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> <mask> res, err = d.CheckHost(domain, dns.TypeA, &setts) <mask> if err != nil { <mask> t.Fatalf("CheckHost for safesearh domain %s failed cause %s", domain, err) <mask> } <mask> <mask> // For yandex we already ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// For yandex we already know valid IP.
<mask> if err != nil { <mask> t.Fatalf("CheckHost for safesearh domain %s failed cause %s", domain, err) <mask> } <mask> <mask> // For yandex we already know valid ip. <mask> if assert.Len(t, res.Rules, 1) { <mask> assert.Equal(t, res.Rules[0].IP.String(), "213.180.193.56") <mask> } <mask> <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Equal(t, res.Rules[0].IP, net.IPv4(213, 180, 193, 56))
<mask> } <mask> <mask> // For yandex we already know valid ip. <mask> if assert.Len(t, res.Rules, 1) { <mask> assert.Equal(t, res.Rules[0].IP.String(), "213.180.193.56") <mask> } <mask> <mask> // Check cache. <mask> cachedValue, isFound := getCachedResult(gctx.safeSearchCache, domain) <mask> assert...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Equal(t, cachedValue.Rules[0].IP, net.IPv4(213, 180, 193, 56))
<mask> // Check cache. <mask> cachedValue, isFound := getCachedResult(gctx.safeSearchCache, domain) <mask> assert.True(t, isFound) <mask> if assert.Len(t, cachedValue.Rules, 1) { <mask> assert.Equal(t, cachedValue.Rules[0].IP.String(), "213.180.193.56") <mask> } <mask> } <mask> <mask> func TestSafeSear...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d := newForTest(nil, nil) t.Cleanup(d.Close) resolver := &testResolver{} d.resolver = resolver
<mask> } <mask> } <mask> <mask> func TestSafeSearchCacheGoogle(t *testing.T) { <mask> d := NewForTest(nil, nil) <mask> defer d.Close() <mask> domain := "www.google.ru" <mask> res, err := d.CheckHost(domain, dns.TypeA, &setts) <mask> assert.Nil(t, err) <mask> assert.False(t, res.IsFiltered) <mask> as...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d = newForTest(&Config{SafeSearchEnabled: true}, nil) t.Cleanup(d.Close) d.resolver = resolver
<mask> assert.Nil(t, err) <mask> assert.False(t, res.IsFiltered) <mask> assert.Empty(t, res.Rules) <mask> <mask> d = NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> <mask> // Let's lookup for safesearch domain <mask> safeDomain, ok := d.SafeSearchDomain(domain) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Lookup for safesearch domain.
<mask> <mask> d = NewForTest(&Config{SafeSearchEnabled: true}, nil) <mask> defer d.Close() <mask> <mask> // Let's lookup for safesearch domain <mask> safeDomain, ok := d.SafeSearchDomain(domain) <mask> if !ok { <mask> t.Fatalf("Failed to get safesearch domain for %s", domain) <mask> } <mask> </s> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
assert.Truef(t, ok, "Failed to get safesearch domain for %s", domain)
<mask> defer d.Close() <mask> <mask> // Let's lookup for safesearch domain <mask> safeDomain, ok := d.SafeSearchDomain(domain) <mask> if !ok { <mask> t.Fatalf("Failed to get safesearch domain for %s", domain) <mask> } <mask> <mask> ips, err := net.LookupIP(safeDomain) <mask> if err != nil { <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
ipAddrs, err := resolver.LookupIPAddr(context.Background(), safeDomain)
<mask> if !ok { <mask> t.Fatalf("Failed to get safesearch domain for %s", domain) <mask> } <mask> <mask> ips, err := net.LookupIP(safeDomain) <mask> if err != nil { <mask> t.Fatalf("Failed to lookup for %s", safeDomain) <mask> } <mask> <mask> ip := ips[0] </s> Pull request: 2574 external tests vo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
ip := ipAddrs[0].IP for _, ipAddr := range ipAddrs { if ipAddr.IP.To4() != nil { ip = ipAddr.IP
<mask> if err != nil { <mask> t.Fatalf("Failed to lookup for %s", safeDomain) <mask> } <mask> <mask> ip := ips[0] <mask> for _, i := range ips { <mask> if i.To4() != nil { <mask> ip = i <mask> break <mask> } <mask> } <mask> <mask> res, err = d.CheckHost(domain, dns.TypeA, &setts) </s> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
// Parental.
<mask> assert.True(t, cachedValue.Rules[0].IP.Equal(ip)) <mask> } <mask> } <mask> <mask> // PARENTAL <mask> <mask> func TestParentalControl(t *testing.T) { <mask> logOutput := &bytes.Buffer{} <mask> testutil.ReplaceLogWriter(t, logOutput) <mask> testutil.ReplaceLogLevel(t, log.DEBUG) </s> Pull reques...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d := newForTest(&Config{ParentalEnabled: true}, nil) t.Cleanup(d.Close) matching := "pornhub.com" d.parentalUpstream = &testSbUpstream{ hostname: matching, block: true, } d.checkMatch(t, matching) assert.Contains(t, logOutput.String(), "Parental lookup for "+matching) d.checkMatch(t, "www."+matching)
<mask> logOutput := &bytes.Buffer{} <mask> testutil.ReplaceLogWriter(t, logOutput) <mask> testutil.ReplaceLogLevel(t, log.DEBUG) <mask> <mask> d := NewForTest(&Config{ParentalEnabled: true}, nil) <mask> defer d.Close() <mask> d.checkMatch(t, "pornhub.com") <mask> assert.Contains(t, logOutput.String(), "...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go
d.checkMatch(t, matching)
<mask> d.checkMatchEmpty(t, "api.jquery.com") <mask> <mask> // test cached result <mask> d.parentalServer = "127.0.0.1" <mask> d.checkMatch(t, "pornhub.com") <mask> d.checkMatchEmpty(t, "yandex.ru") <mask> d.parentalServer = defaultParentalServer <mask> } <mask> <mask> // FILTERING </s> Pull request:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0d0a419bd34dd8fe612f790ace698aebd930bfcc
internal/dnsfilter/dnsfilter_test.go