docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
<mask> }, { <mask> processing: true, <mask> processingTestUpstream: false, <mask> processingSetUpstream: false, <mask> upstream: '', <mask> }); <mask> <mask> const dashboard = handleActions({ <mask> [actions.dnsStatusRequest]: state => ({ ...state, processing: true }), <mask> [actions...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb
client/src/reducers/index.js
upstream_dns: upstreamDns,
<mask> dns_address: dnsAddress, <mask> querylog_enabled: queryLogEnabled, <mask> } = payload; <mask> const newState = { <mask> ...state, <mask> isCoreRunning: running, <mask> processing: false, </s> Add list of upstream servers Closes ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb
client/src/reducers/index.js
upstreamDns: upstreamDns.join('\n'),
<mask> dnsVersion: version, <mask> dnsPort, <mask> dnsAddress, <mask> queryLogEnabled, <mask> }; <mask> return newState; <mask> }, <mask> <mask> [actions.enableDnsRequest]: state => ({ ...state, processing: true }), </s> Add list of upst...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb
client/src/reducers/index.js
[actions.handleUpstreamChange]: (state, { payload }) => { const { upstreamDns } = payload; return { ...state, upstreamDns }; },
<mask> [actions.toggleFilteringSuccess]: (state) => { <mask> const newSetting = { ...state, isFilteringEnabled: !state.isFilteringEnabled }; <mask> return newSetting; <mask> }, <mask> }, { <mask> processing: true, <mask> isCoreRunning: false, <mask> processingTopStats: true, ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb
client/src/reducers/index.js
upstreamDns: [],
<mask> processingVersion: true, <mask> processingFiltering: true, <mask> }); <mask> <mask> const queryLogs = handleActions({ <mask> [actions.getLogsRequest]: state => ({ ...state, getLogsProcessing: true }), <mask> [actions.getLogsFailure]: state => ({ ...state, getLogsProcessing: false }), </s...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb
client/src/reducers/index.js
this.props.getFiltering(); } getToggleFilteringButton = () => { const { isFilteringEnabled } = this.props.dashboard; const buttonText = isFilteringEnabled ? 'Disable' : 'Enable'; const buttonClass = isFilteringEnabled ? 'btn-outline-secondary' : 'btn-outline-success'; r...
<mask> getAllStats = () => { <mask> this.props.getStats(); <mask> this.props.getStatsHistory(); <mask> this.props.getTopStats(); <mask> } <mask> <mask> render() { <mask> const { dashboard } = this.props; <mask> const dashboardProcessing = <mask> ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04
client/src/components/Dashboard/index.js
{this.getToggleFilteringButton()}
<mask> <PageTitle title="Dashboard"> <mask> <div className="page-title__actions"> <mask> {refreshFullButton} <mask> </div> <mask> </PageTitle> <mask> {dashboardProcessing && <Loading />} </s> Add butto...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04
client/src/components/Dashboard/index.js
<mask> Dashboard.propTypes = { <mask> getStats: PropTypes.func, <mask> getStatsHistory: PropTypes.func, <mask> getTopStats: PropTypes.func, <mask> disableDns: PropTypes.func, <mask> dashboard: PropTypes.object, <mask> isCoreRunning: PropTypes.bool, <mask> }; <mask> <mask> export defau...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04
client/src/components/Dashboard/index.js
getFiltering: PropTypes.func, toggleFiltering: PropTypes.func,
<mask> getStatsHistory: PropTypes.func, <mask> getTopStats: PropTypes.func, <mask> dashboard: PropTypes.object, <mask> isCoreRunning: PropTypes.bool, <mask> }; <mask> <mask> export default Dashboard; </s> Add button to the dashboard page for enable/disable filtering Closes #333 </s> remove ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04
client/src/components/Dashboard/index.js
[actions.getFilteringRequest]: state => ({ ...state, processingFiltering: true }), [actions.getFilteringFailure]: state => ({ ...state, processingFiltering: false }), [actions.getFilteringSuccess]: (state, { payload }) => { const newState = { ...state, isFilteringEnabled: payload, processingFilterin...
<mask> } <mask> <mask> return state; <mask> }, <mask> }, { <mask> processing: true, <mask> isCoreRunning: false, <mask> processingTopStats: true, </s> Add button to the dashboard page for enable/disable filtering Closes #333 </s> remove disableDns: PropTypes.func, </s> ad...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04
client/src/reducers/index.js
processingFiltering: true,
<mask> processingTopStats: true, <mask> processingStats: true, <mask> logStatusProcessing: false, <mask> processingVersion: true, <mask> }); <mask> <mask> const queryLogs = handleActions({ <mask> [actions.getLogsRequest]: state => ({ ...state, getLogsProcessing: true }), </s> Add button to...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04
client/src/reducers/index.js
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog" <mask> "github.com/AdguardTeam/AdGuardHome/internal/stats" <mask> "github.com/AdguardTeam/AdGuardHome/internal/updater" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0
internal/home/home.go
Context.tlsRoots = LoadSystemRootCAs() Context.tlsCiphers = InitTLSCiphers()
<mask> } <mask> <mask> initConfig() <mask> <mask> Context.tlsRoots = util.LoadSystemRootCAs() <mask> Context.tlsCiphers = util.InitTLSCiphers() <mask> Context.transport = &http.Transport{ <mask> DialContext: customDialContext, <mask> Proxy: getHTTPProxy, <mask> TLSClientConfig: &tls.Config{...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0
internal/home/home.go
"path/filepath"
<mask> "io/ioutil" <mask> "net/http" <mask> "os" <mask> "reflect" <mask> "runtime" <mask> "strings" <mask> "sync" <mask> "time" <mask> </s> Pull request: 2829 rm util Merge in DNS/adguard-home from 2829-finally to master Closes #2829. Squashed commit of the following: commit 22b287d5c2cbeced1b487...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0
internal/home/tls.go
"runtime"
<mask> "net/http" <mask> "os" <mask> "path/filepath" <mask> "reflect" <mask> "strings" <mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/log" </s> Pull request: 2829 rm util Merge in DNS/adguard-home from 2829-finally to master Closes #2829. Squashed commit of the following:...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0
internal/home/tls.go
"golang.org/x/sys/cpu"
<mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> var tlsWebHandlersRegistered = false <mask> <mask> // TLSMod - TLS module object <mask> type TLSMod struct { </s> Pull request: 2829 rm util Merge in DNS/adguard-home from 2829-finally to master Closes #2829. Squash...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0
internal/home/tls.go
github.com/AdguardTeam/dnsproxy v0.46.1
<mask> <mask> go 1.18 <mask> <mask> require ( <mask> github.com/AdguardTeam/dnsproxy v0.45.3 <mask> github.com/AdguardTeam/golibs v0.10.9 <mask> github.com/AdguardTeam/urlfilter v0.16.0 <mask> github.com/NYTimes/gziphandler v1.1.1 <mask> github.com/ameshkov/dnscrypt/v2 v2.2.5 <mask> github.com/digineo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
go.mod
github.com/lucas-clemente/quic-go v0.29.2
<mask> github.com/google/renameio v1.0.1 <mask> github.com/google/uuid v1.3.0 <mask> github.com/insomniacslk/dhcp v0.0.0-20220822114210-de18a9d48e84 <mask> github.com/kardianos/service v1.2.1 <mask> github.com/lucas-clemente/quic-go v0.29.1 <mask> github.com/mdlayher/ethernet v0.0.0-20220221185849-529eae5b6...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
go.mod
github.com/marten-seemann/qtls-go1-18 v0.1.3 // indirect github.com/marten-seemann/qtls-go1-19 v0.1.1 // indirect
<mask> github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 // indirect <mask> github.com/golang/mock v1.6.0 // indirect <mask> github.com/josharian/native v1.0.0 // indirect <mask> github.com/marten-seemann/qpack v0.2.1 // indirect <mask> github.com/marten-seemann/qtls-go1-18 v0.1.2 // indirect ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
go.mod
github.com/AdguardTeam/dnsproxy v0.46.1 h1:ej9iRorG+vekaXGYB854waAiS+q8OfswYZ1MQRZolHk= github.com/AdguardTeam/dnsproxy v0.46.1/go.mod h1:PAmRzFqls0E92XTglyY2ESAqMAzZJhHKErG1ZpRnpjA=
<mask> github.com/AdguardTeam/dnsproxy v0.45.3 h1:lvJlifDIVjHFVkVcieBhXyQA357Wl+vmLxeDlaQ8DE8= <mask> github.com/AdguardTeam/dnsproxy v0.45.3/go.mod h1:h+0r4GDvHHY2Wu6r7oqva+O37h00KofYysfzy1TEXFE= <mask> github.com/AdguardTeam/golibs v0.4.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4= <mask> github.com/Ad...
[ "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
go.sum
github.com/lucas-clemente/quic-go v0.29.2 h1:O8Mt0O6LpvEW+wfC40vZdcw0DngwYzoxq5xULZNzSI8= github.com/lucas-clemente/quic-go v0.29.2/go.mod h1:g6/h9YMmLuU54tL1gW25uIi3VlBp3uv+sBihplIuskE=
<mask> github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ= <mask> github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI= <mask> github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY= <mask> github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkid...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
go.sum
github.com/marten-seemann/qtls-go1-18 v0.1.3 h1:R4H2Ks8P6pAtUagjFty2p7BVHn3XiwDAl7TTQf5h7TI= github.com/marten-seemann/qtls-go1-18 v0.1.3/go.mod h1:mJttiymBAByA49mhlNZZGrH5u1uXYZJ+RW28Py7f4m4= github.com/marten-seemann/qtls-go1-19 v0.1.1 h1:mnbxeq3oEyQxQXwI4ReCgW9DPoPR94sNlqWoDZnjRIE= github.com/marten-seemann/qtls-go1...
<mask> github.com/lucas-clemente/quic-go v0.29.1 h1:Z+WMJ++qMLhvpFkRZA+jl3BTxUjm415YBmWanXB8zP0= <mask> github.com/lucas-clemente/quic-go v0.29.1/go.mod h1:CTcNfLYJS2UuRNB+zcNlgvkjBhxX6Hm3WUxxAQx2mgE= <mask> github.com/marten-seemann/qpack v0.2.1 h1:jvTsT/HpCn2UZJdP+UUB53FfUUgeOyG5K1ns0OJOGVs= <mask> github.com/mar...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
go.sum
OnClose func() (err error)
<mask> // rename it to just Upstream. <mask> type UpstreamMock struct { <mask> OnAddress func() (addr string) <mask> OnExchange func(req *dns.Msg) (resp *dns.Msg, err error) <mask> } <mask> <mask> // Address implements the [upstream.Upstream] interface for *UpstreamMock. <mask> func (u *UpstreamMock) Addres...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/aghtest/interface.go
"github.com/AdguardTeam/dnsproxy/upstream"
<mask> "net" <mask> "strings" <mask> "testing" <mask> <mask> "github.com/AdguardTeam/golibs/errors" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/require" <mask> ) </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-upstreams to master Closes #5044. S...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/aghtest/upstream.go
var _ upstream.Upstream = (*Upstream)(nil)
<mask> Addr string <mask> } <mask> <mask> // RespondTo returns a response with answer if req has class cl, question type <mask> // qt, and target targ. <mask> func RespondTo(t testing.TB, req *dns.Msg, cl, qt uint16, targ, answer string) (resp *dns.Msg) { <mask> t.Helper() <mask> <mask> require.NotNil(t, ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/aghtest/upstream.go
// Exchange implements the [upstream.Upstream] interface for *Upstream.
<mask> <mask> return resp <mask> } <mask> <mask> // Exchange implements the upstream.Upstream interface for *Upstream. <mask> // <mask> // TODO(a.garipov): Split further into handlers. <mask> func (u *Upstream) Exchange(m *dns.Msg) (resp *dns.Msg, err error) { <mask> resp = new(dns.Msg).SetReply(m) <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/aghtest/upstream.go
// Address implements [upstream.Upstream] interface for *Upstream.
<mask> <mask> return resp, nil <mask> } <mask> <mask> // Address implements upstream.Upstream interface for *Upstream. <mask> func (u *Upstream) Address() string { <mask> return u.Addr <mask> } <mask> <mask> // NewBlockUpstream returns an [*UpstreamMock] that works like an upstream that </s> Pull reques...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/aghtest/upstream.go
// Close implements [upstream.Upstream] interface for *Upstream. func (u *Upstream) Close() (err error) { return nil }
<mask> } <mask> <mask> // NewBlockUpstream returns an [*UpstreamMock] that works like an upstream that <mask> // supports hash-based safe-browsing/adult-blocking feature. If shouldBlock is <mask> // true, hostname's actual hash is returned, blocking it. Otherwise, it returns <mask> // a different hash. </s> P...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/aghtest/upstream.go
// queries, such as public clients PTR resolving and updater hostname resolving.
<mask> } <mask> } <mask> <mask> // prepareInternalProxy initializes the DNS proxy that is used for internal DNS <mask> // queries, such at client PTR resolving and updater hostname resolving. <mask> func (s *Server) prepareInternalProxy() (err error) { <mask> conf := &proxy.Config{ <mask> CacheEnabled: t...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/dnsforward/dnsforward.go
// stopLocked stops the DNS server without locking. For internal use only. func (s *Server) stopLocked() (err error) { var errs []error
<mask> <mask> return s.stopLocked() <mask> } <mask> <mask> // stopLocked stops the DNS server without locking. For internal use only. <mask> func (s *Server) stopLocked() error { <mask> if s.dnsProxy != nil { <mask> err := s.dnsProxy.Stop() <mask> if err != nil { <mask> return fmt.Errorf("could not...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/dnsforward/dnsforward.go
err = s.dnsProxy.Stop() if err != nil { errs = append(errs, fmt.Errorf("could not stop primary resolvers properly: %w", err)) } } if s.internalProxy != nil && s.internalProxy.UpstreamConfig != nil { err = s.internalProxy.UpstreamConfig.Close() if err != nil { errs = append(errs, fmt.Errorf("could not...
<mask> <mask> // stopLocked stops the DNS server without locking. For internal use only. <mask> func (s *Server) stopLocked() error { <mask> if s.dnsProxy != nil { <mask> err := s.dnsProxy.Stop() <mask> if err != nil { <mask> return fmt.Errorf("could not stop the DNS server properly: %w", err) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/dnsforward/dnsforward.go
errs = append(errs, fmt.Errorf("could not stop local resolvers properly: %w", err))
<mask> func (s *Server) stopLocked() error { <mask> if s.dnsProxy != nil { <mask> err := s.dnsProxy.Stop() <mask> if err != nil { <mask> return fmt.Errorf("could not stop the DNS server properly: %w", err) <mask> } <mask> } <mask> <mask> s.isRunning = false <mask> return nil </s> Pull request: ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/dnsforward/dnsforward.go
if len(errs) > 0 { return errors.List("stopping DNS server", errs...) } else { s.isRunning = false }
<mask> return fmt.Errorf("could not stop the DNS server properly: %w", err) <mask> } <mask> } <mask> <mask> s.isRunning = false <mask> return nil <mask> } <mask> <mask> // IsRunning returns true if the DNS server is running. <mask> func (s *Server) IsRunning() bool { </s> Pull request: 5044 Close u...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/dnsforward/dnsforward.go
defer func() { err = errors.WithDeferred(err, u.Close()) }()
<mask> return fmt.Errorf("failed to choose upstream for %q: %w", upstreamAddr, err) <mask> } <mask> <mask> if err = healthCheck(u); err != nil { <mask> err = fmt.Errorf("upstream %q fails to exchange: %w", upstreamAddr, err) <mask> if domains != nil { <mask> return domainSpecificTestError{error: err}...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/dnsforward/http.go
"golang.org/x/exp/maps" "golang.org/x/exp/slices"
<mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/AdguardTeam/golibs/netutil" <mask> "github.com/AdguardTeam/golibs/stringutil" <mask> ) <mask> <mask> const clientsUpdatePeriod = 10 * time.Minute <mask> </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-upstreams...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/clients.go
// closeUpstreams closes the client-specific upstream config of c if any. func (c *Client) closeUpstreams() (err error) { if c.upstreamConfig != nil { err = c.upstreamConfig.Close() if err != nil { return fmt.Errorf("closing upstreams of client %q: %w", c.Name, err) } } return nil }
<mask> } <mask> <mask> type clientSource uint <mask> <mask> // Client sources. The order determines the priority. <mask> const ( </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-upstreams to master Closes #5044. Squashed commit of the following: commit e121380ecb32bd2664d4...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/clients.go
if err := c.closeUpstreams(); err != nil { log.Error("client container: removing client %s: %s", name, err) }
<mask> } <mask> <mask> // update Name index <mask> delete(clients.list, name) <mask> <mask> // update ID index <mask> for _, id := range c.IDs { <mask> delete(clients.idIndex, id) </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-upstreams to master Closes #5044. Squ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/clients.go
// Update ID index.
<mask> return fmt.Errorf("another client uses the same id (%q): %q", id, c2.Name) <mask> } <mask> } <mask> <mask> // update ID index <mask> for _, id := range prev.IDs { <mask> delete(clients.idIndex, id) <mask> } <mask> for _, id := range c.IDs { <mask> clients.idIndex[id] = prev </s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/clients.go
// Update name index.
<mask> clients.idIndex[id] = prev <mask> } <mask> } <mask> <mask> // update Name index <mask> if prev.Name != c.Name { <mask> delete(clients.list, prev.Name) <mask> clients.list[c.Name] = prev <mask> } <mask> </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-up...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/clients.go
// Update upstreams cache. err = c.closeUpstreams() if err != nil { return err }
<mask> delete(clients.list, prev.Name) <mask> clients.list[c.Name] = prev <mask> } <mask> <mask> // update upstreams cache <mask> c.upstreamConfig = nil <mask> <mask> *prev = *c <mask> <mask> return nil <mask> } </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-u...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/clients.go
func stopDNSServer() (err error) {
<mask> <mask> return nil <mask> } <mask> <mask> func stopDNSServer() error { <mask> if !isRunning() { <mask> return nil <mask> } <mask> <mask> err := Context.dnsServer.Stop() </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-upstreams to master Closes #5044. Squash...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/dns.go
err = Context.dnsServer.Stop()
<mask> if !isRunning() { <mask> return nil <mask> } <mask> <mask> err := Context.dnsServer.Stop() <mask> if err != nil { <mask> return fmt.Errorf("couldn't stop forwarding DNS server: %w", err) <mask> } <mask> <mask> closeDNSServer() </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-h...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/dns.go
return fmt.Errorf("stopping forwarding dns server: %w", err) } err = Context.clients.Close() if err != nil { return fmt.Errorf("closing clients container: %w", err)
<mask> } <mask> <mask> err := Context.dnsServer.Stop() <mask> if err != nil { <mask> return fmt.Errorf("couldn't stop forwarding DNS server: %w", err) <mask> } <mask> <mask> closeDNSServer() <mask> return nil <mask> } </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-clos...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/home/dns.go
"github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/next/dnssvc" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/assert" <mask> "github.com/stretchr/testify/require" <mask> ) <mask> </s> Pull request: 5044 Close upstreams Merge in DNS/ad...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/next/dnssvc/dnssvc_test.go
closeErr errors.Error = "closing failed"
<mask> bootstrapAddr = "bootstrap.example" <mask> upstreamAddr = "upstream.example" <mask> ) <mask> <mask> ups := &aghtest.UpstreamMock{ <mask> OnAddress: func() (addr string) { <mask> return upstreamAddr </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-upstreams t...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/next/dnssvc/dnssvc_test.go
OnClose: func() (err error) { return closeErr },
<mask> resp = (&dns.Msg{}).SetReply(req) <mask> <mask> return resp, nil <mask> }, <mask> } <mask> <mask> c := &dnssvc.Config{ <mask> Addresses: []netip.AddrPort{netip.MustParseAddrPort("127.0.0.1:0")}, </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-upstr...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/next/dnssvc/dnssvc_test.go
require.ErrorIs(t, err, closeErr)
<mask> ctx, cancel := context.WithTimeout(context.Background(), testTimeout) <mask> defer cancel() <mask> <mask> err = svc.Shutdown(ctx) <mask> require.NoError(t, err) <mask> } </s> Pull request: 5044 Close upstreams Merge in DNS/adguard-home from 5044-close-upstreams to master Closes #5044. Squashed com...
[ "keep", "keep", "keep", "keep", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d
internal/next/dnssvc/dnssvc_test.go
<mask> github.com/gobuffalo/packr v1.30.1 <mask> github.com/gobuffalo/packr/v2 v2.8.1 // indirect <mask> github.com/google/go-cmp v0.5.5 // indirect <mask> github.com/google/renameio v1.0.1-0.20210406141108-81588dbe0453 <mask> github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714 <mask> github....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.mod
<mask> github.com/insomniacslk/dhcp v0.0.0-20210310193751-cfd4d47082c2 <mask> github.com/kardianos/service v1.2.0 <mask> github.com/karrick/godirwalk v1.16.1 // indirect <mask> github.com/lucas-clemente/quic-go v0.20.1 <mask> github.com/mdlayher/ethernet v0.0.0-20190606142754-0394541c37b7 <mask> github.com/...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.mod
<mask> github.com/karrick/godirwalk v1.16.1 // indirect <mask> github.com/lucas-clemente/quic-go v0.20.1 <mask> github.com/mdlayher/ethernet v0.0.0-20190606142754-0394541c37b7 <mask> github.com/mdlayher/netlink v1.4.0 <mask> github.com/mdlayher/raw v0.0.0-20191009151244-50f2db8cc065 <mask> github.com/miekg/...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.mod
<mask> github.com/sirupsen/logrus v1.8.1 // indirect <mask> github.com/spf13/cobra v1.1.3 // indirect <mask> github.com/stretchr/testify v1.7.0 <mask> github.com/ti-mo/netfilter v0.4.0 <mask> github.com/u-root/u-root v7.0.0+incompatible <mask> go.etcd.io/bbolt v1.3.5 <mask> golang.org/x/crypto v0.0.0-2021...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.mod
github.com/AdguardTeam/dhcp v0.0.0-20210420175708-50b0efd52063 h1:RBsQppxEJEqHApY6WDBkM2H0UG5wt57RcT0El2WGdp8= github.com/AdguardTeam/dhcp v0.0.0-20210420175708-50b0efd52063/go.mod h1:TKl4jN3Voofo4UJIicyNhWGp/nlQqQkFxmwIFTvBkKI=
<mask> dmitri.shuralyov.com/service/change v0.0.0-20181023043359-a85b471d5412/go.mod h1:a1inKt/atXimZ4Mv927x+r7UpyzRUf4emIoiiSC2TN4= <mask> dmitri.shuralyov.com/state v0.0.0-20180228185332-28bcc343414c/go.mod h1:0PRwlb0D6DFvNNtx+9ybjezNCa8XF0xaYcETyp6rHWU= <mask> git.apache.org/thrift.git v0.0.0-20180902110319-2566e...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> github.com/AdguardTeam/dnsproxy v0.37.1 h1:vULyF1+xSI7vV99m8GD2hmOuCQrpu87awyeSe5qtFbA= <mask> github.com/AdguardTeam/dnsproxy v0.37.1/go.mod h1:xkJWEuTr550gPDmB9azsciKZzSXjf9wMn+Ji54PQ4gE= <mask> github.com/AdguardTeam/golibs v0.4.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4= <mask> github.com/Ad...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> github.com/cheekybits/genny v1.0.0/go.mod h1:+tQajlRqAUrPI7DOSpB0XAqZYtQakVtB7wXkRAgjxjQ= <mask> github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw= <mask> github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk= <mask> github.com/coreos/etcd...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> github.com/gobuffalo/packr/v2 v2.5.1/go.mod h1:8f9c96ITobJlPzI44jj+4tHnEKNt0xXWSVlXRN9X1Iw= <mask> github.com/gobuffalo/packr/v2 v2.8.1 h1:tkQpju6i3EtMXJ9uoF5GT6kB+LMTimDWD8Xvbz6zDVA= <mask> github.com/gobuffalo/packr/v2 v2.8.1/go.mod h1:c/PLlOuTU+p3SybaJATW3H6lX/iK7xEz5OeMf+NnJpg= <mask> github.com/gogo/pro...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> github.com/golang/lint v0.0.0-20180702182130-06c8688daad7/go.mod h1:tluoj9z5200jBnyusfRPU2LqT6J+DAorxEvtC7LHB+E= <mask> github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= <mask> github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= <mask> githu...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714 h1:/jC7qQFrv8CrSJVmaolDVOxTfS9kc36uB6H40kdbQq8= <mask> github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714/go.mod h1:2Goc3h8EklBH5mspfHFxBnEoURQCGzQQH1ga9Myjvis= <mask> github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCX...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8= <mask> github.com/insomniacslk/dhcp v0.0.0-20210310193751-cfd4d47082c2 h1:NpTIlXznCStsY88jU+Gh1Dy5dt/jYV4z4uU8h2TUOt4= <mask> github.com/insomniacslk/dhcp v0.0.0-20210310193751-cfd4d47082c2/go.mod h1:TKl4jN3Voof...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc= <mask> google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc= <mask> google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= <mask> google.golang.org/grpc v1.21.0/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= <mask> google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= <mask> google.golang.org/grpc v1.23.0...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
go.sum
<mask> "os" <mask> "runtime" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd/nclient4" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/insomniacslk/dhcp/dhcpv4" <mask> "github.com/insomniacslk/dhcp/dhcpv6" <mask> "github.com/insomniacslk/dhcp/dhcpv6/nclient...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
internal/dhcpd/checkother.go
"github.com/insomniacslk/dhcp/dhcpv4/nclient4"
<mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/insomniacslk/dhcp/dhcpv4" <mask> "github.com/insomniacslk/dhcp/dhcpv6" <mask> "github.com/insomniacslk/dhcp/dhcpv6/nclient6" <mask> "github.com/insomniacslk/dhcp/iana" <mask> ) </s> Pull request: 2606 substitute nclient4 ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a
internal/dhcpd/checkother.go
func Create(conf ServerConfig) *Server {
<mask> SetOnLeaseChanged(onLeaseChanged OnLeaseChangedT) <mask> } <mask> <mask> // Create - create object <mask> func Create(config ServerConfig) *Server { <mask> s := &Server{} <mask> <mask> s.conf.Enabled = config.Enabled <mask> s.conf.InterfaceName = config.InterfaceName <mask> s.conf.HTTPRegister =...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcpd.go
s.conf.Enabled = conf.Enabled s.conf.InterfaceName = conf.InterfaceName s.conf.HTTPRegister = conf.HTTPRegister s.conf.ConfigModified = conf.ConfigModified s.conf.DBFilePath = filepath.Join(conf.WorkDir, dbFilename)
<mask> // Create - create object <mask> func Create(config ServerConfig) *Server { <mask> s := &Server{} <mask> <mask> s.conf.Enabled = config.Enabled <mask> s.conf.InterfaceName = config.InterfaceName <mask> s.conf.HTTPRegister = config.HTTPRegister <mask> s.conf.ConfigModified = config.ConfigModified <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcpd.go
v4conf := conf.Conf4
<mask> webHandlersRegistered = true <mask> } <mask> <mask> var err4, err6 error <mask> v4conf := config.Conf4 <mask> v4conf.Enabled = s.conf.Enabled <mask> if len(v4conf.RangeStart) == 0 { <mask> v4conf.Enabled = false <mask> } <mask> v4conf.InterfaceName = s.conf.InterfaceName </s> Pull request:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcpd.go
v6conf := conf.Conf6
<mask> v4conf.InterfaceName = s.conf.InterfaceName <mask> v4conf.notify = s.onNotify <mask> s.srv4, err4 = v4Create(v4conf) <mask> <mask> v6conf := config.Conf6 <mask> v6conf.Enabled = s.conf.Enabled <mask> if len(v6conf.RangeStart) == 0 { <mask> v6conf.Enabled = false <mask> } <mask> v6conf.Interf...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcpd.go
s.conf.Conf4 = conf.Conf4 s.conf.Conf6 = conf.Conf6
<mask> } <mask> <mask> if s.conf.Enabled && !v4conf.Enabled && !v6conf.Enabled { <mask> log.Error("Can't enable DHCP server because neither DHCPv4 nor DHCPv6 servers are configured") <mask> return nil <mask> } <mask> </s> Pull request: dhcpd: do not override ra-slaac settings Merge in DNS/adguard-home...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcpd.go
<mask> "strings" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> "github.com/AdguardTeam/golibs/jsonutil" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> func httpError(r *http.Request, w http.Response...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
func v4JSONToServerConf(j *v4ServerConfJSON) V4ServerConf { if j == nil { return V4ServerConf{} }
<mask> RangeEnd net.IP `json:"range_end"` <mask> LeaseDuration uint32 `json:"lease_duration"` <mask> } <mask> <mask> func v4JSONToServerConf(j v4ServerConfJSON) V4ServerConf { <mask> return V4ServerConf{ <mask> GatewayIP: j.GatewayIP, <mask> SubnetMask: j.SubnetMask, <mask> RangeStart: ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
func v6JSONToServerConf(j *v6ServerConfJSON) V6ServerConf { if j == nil { return V6ServerConf{} }
<mask> RangeStart net.IP `json:"range_start"` <mask> LeaseDuration uint32 `json:"lease_duration"` <mask> } <mask> <mask> func v6JSONToServerConf(j v6ServerConfJSON) V6ServerConf { <mask> return V6ServerConf{ <mask> RangeStart: j.RangeStart, <mask> LeaseDuration: j.LeaseDuration, <mask> } <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
<mask> return <mask> } <mask> } <mask> <mask> type dhcpServerConfigJSON struct { <mask> Enabled bool `json:"enabled"` <mask> InterfaceName string `json:"interface_name"` <mask> V4 v4ServerConfJSON `json:"v4"` <mask> V6 v6ServerConfJSON `json:"v6"` <mas...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
type dhcpServerConfigJSON struct { V4 *v4ServerConfJSON `json:"v4"` V6 *v6ServerConfJSON `json:"v6"` InterfaceName string `json:"interface_name"` Enabled nullBool `json:"enabled"` }
<mask> } <mask> <mask> func (s *Server) handleDHCPSetConfig(w http.ResponseWriter, r *http.Request) { <mask> conf := dhcpServerConfigJSON{} <mask> conf.Enabled = boolToNullBool(s.conf.Enabled) <mask> conf.InterfaceName = s.conf.InterfaceName <mask> <mask> err := json.NewDecoder(r.Body).Decode(&conf) </s>...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
conf := dhcpServerConfigJSON{} conf.Enabled = boolToNullBool(s.conf.Enabled) conf.InterfaceName = s.conf.InterfaceName
<mask> return 0, nil <mask> } <mask> <mask> func (s *Server) handleDHCPSetConfig(w http.ResponseWriter, r *http.Request) { <mask> newconfig := dhcpServerConfigJSON{} <mask> newconfig.Enabled = s.conf.Enabled <mask> newconfig.InterfaceName = s.conf.InterfaceName <mask> <mask> js, err := jsonutil.DecodeOb...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
err := json.NewDecoder(r.Body).Decode(&conf)
<mask> newconfig := dhcpServerConfigJSON{} <mask> newconfig.Enabled = s.conf.Enabled <mask> newconfig.InterfaceName = s.conf.InterfaceName <mask> <mask> js, err := jsonutil.DecodeObject(&newconfig, r.Body) <mask> if err != nil { <mask> httpError(r, w, http.StatusBadRequest, "Failed to parse new DHCP conf...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
httpError(r, w, http.StatusBadRequest, "failed to parse new dhcp config json: %s", err)
<mask> newconfig.InterfaceName = s.conf.InterfaceName <mask> <mask> js, err := jsonutil.DecodeObject(&newconfig, r.Body) <mask> if err != nil { <mask> httpError(r, w, http.StatusBadRequest, "Failed to parse new DHCP config json: %s", err) <mask> <mask> return <mask> } <mask> <mask> var s4 DHCPServ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
if conf.V4 != nil { v4Conf := v4JSONToServerConf(conf.V4) v4Conf.Enabled = conf.Enabled == nbTrue if len(v4Conf.RangeStart) == 0 { v4Conf.Enabled = false
<mask> var s6 DHCPServer <mask> v4Enabled := false <mask> v6Enabled := false <mask> <mask> if js.Exists("v4") { <mask> v4conf := v4JSONToServerConf(newconfig.V4) <mask> v4conf.Enabled = newconfig.Enabled <mask> if len(v4conf.RangeStart) == 0 { <mask> v4conf.Enabled = false <mask> } <mask> <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
v4Enabled = v4Conf.Enabled v4Conf.InterfaceName = conf.InterfaceName
<mask> if len(v4conf.RangeStart) == 0 { <mask> v4conf.Enabled = false <mask> } <mask> <mask> v4Enabled = v4conf.Enabled <mask> v4conf.InterfaceName = newconfig.InterfaceName <mask> <mask> c4 := V4ServerConf{} <mask> s.srv4.WriteDiskConfig4(&c4) <mask> v4conf.notify = c4.notify <mask> v4c...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
v4Conf.notify = c4.notify v4Conf.ICMPTimeout = c4.ICMPTimeout
<mask> v4conf.InterfaceName = newconfig.InterfaceName <mask> <mask> c4 := V4ServerConf{} <mask> s.srv4.WriteDiskConfig4(&c4) <mask> v4conf.notify = c4.notify <mask> v4conf.ICMPTimeout = c4.ICMPTimeout <mask> <mask> s4, err = v4Create(v4conf) <mask> if err != nil { <mask> httpError(r, w, htt...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
s4, err = v4Create(v4Conf)
<mask> s.srv4.WriteDiskConfig4(&c4) <mask> v4conf.notify = c4.notify <mask> v4conf.ICMPTimeout = c4.ICMPTimeout <mask> <mask> s4, err = v4Create(v4conf) <mask> if err != nil { <mask> httpError(r, w, http.StatusBadRequest, "invalid dhcpv4 configuration: %s", err) <mask> <mask> return <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
httpError(r, w, http.StatusBadRequest, "invalid dhcpv4 configuration: %s", err)
<mask> v4conf.ICMPTimeout = c4.ICMPTimeout <mask> <mask> s4, err = v4Create(v4conf) <mask> if err != nil { <mask> httpError(r, w, http.StatusBadRequest, "invalid dhcpv4 configuration: %s", err) <mask> <mask> return <mask> } <mask> } <mask> </s> Pull request: dhcpd: do not override ra-slaac ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
if conf.V6 != nil { v6Conf := v6JSONToServerConf(conf.V6) v6Conf.Enabled = conf.Enabled == nbTrue if len(v6Conf.RangeStart) == 0 { v6Conf.Enabled = false
<mask> return <mask> } <mask> } <mask> <mask> if js.Exists("v6") { <mask> v6conf := v6JSONToServerConf(newconfig.V6) <mask> v6conf.Enabled = newconfig.Enabled <mask> if len(v6conf.RangeStart) == 0 { <mask> v6conf.Enabled = false <mask> } <mask> <mask> v6Enabled = v6conf.Enabled <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
// Don't overwrite the RA/SLAAC settings from the config file. // // TODO(a.garipov): Perhaps include them into the request to // allow changing them from the HTTP API? v6Conf.RASLAACOnly = s.conf.Conf6.RASLAACOnly v6Conf.RAAllowSLAAC = s.conf.Conf6.RAAllowSLAAC v6Enabled = v6Conf.Enabled v6Conf.Interf...
<mask> if len(v6conf.RangeStart) == 0 { <mask> v6conf.Enabled = false <mask> } <mask> <mask> v6Enabled = v6conf.Enabled <mask> v6conf.InterfaceName = newconfig.InterfaceName <mask> v6conf.notify = s.onNotify <mask> <mask> s6, err = v6Create(v6conf) <mask> if err != nil { <mask> httpErro...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
s6, err = v6Create(v6Conf)
<mask> v6Enabled = v6conf.Enabled <mask> v6conf.InterfaceName = newconfig.InterfaceName <mask> v6conf.notify = s.onNotify <mask> <mask> s6, err = v6Create(v6conf) <mask> if err != nil { <mask> httpError(r, w, http.StatusBadRequest, "invalid dhcpv6 configuration: %s", err) <mask> <mask> return...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
httpError(r, w, http.StatusBadRequest, "invalid dhcpv6 configuration: %s", err)
<mask> v6conf.notify = s.onNotify <mask> <mask> s6, err = v6Create(v6conf) <mask> if err != nil { <mask> httpError(r, w, http.StatusBadRequest, "invalid dhcpv6 configuration: %s", err) <mask> <mask> return <mask> } <mask> } <mask> </s> Pull request: dhcpd: do not override ra-slaac settings ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
if conf.Enabled == nbTrue && !v4Enabled && !v6Enabled { httpError(r, w, http.StatusBadRequest, "dhcpv4 or dhcpv6 configuration must be complete")
<mask> return <mask> } <mask> } <mask> <mask> if newconfig.Enabled && !v4Enabled && !v6Enabled { <mask> httpError(r, w, http.StatusBadRequest, "dhcpv4 or dhcpv6 configuration must be complete") <mask> <mask> return <mask> } <mask> <mask> s.Stop() </s> Pull request: dhcpd: do not override ra-...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
if conf.Enabled != nbNull { s.conf.Enabled = conf.Enabled == nbTrue
<mask> } <mask> <mask> s.Stop() <mask> <mask> if js.Exists("enabled") { <mask> s.conf.Enabled = newconfig.Enabled <mask> } <mask> <mask> if js.Exists("interface_name") { <mask> s.conf.InterfaceName = newconfig.InterfaceName <mask> } </s> Pull request: dhcpd: do not override ra-slaac settings M...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
if conf.InterfaceName != "" { s.conf.InterfaceName = conf.InterfaceName
<mask> if js.Exists("enabled") { <mask> s.conf.Enabled = newconfig.Enabled <mask> } <mask> <mask> if js.Exists("interface_name") { <mask> s.conf.InterfaceName = newconfig.InterfaceName <mask> } <mask> <mask> if s4 != nil { <mask> s.srv4 = s4 <mask> } </s> Pull request: dhcpd: do not override r...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
code, err = s.enableDHCP(conf.InterfaceName)
<mask> s.dbLoad() <mask> <mask> if s.conf.Enabled { <mask> var code int <mask> code, err = s.enableDHCP(newconfig.InterfaceName) <mask> if err != nil { <mask> httpError(r, w, code, "enabling dhcp: %s", err) <mask> <mask> return <mask> } </s> Pull request: dhcpd: do not override ra-slaac set...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/dhcphttp.go
raAllowSLAAC bool // send RA packets without MO flags raSLAACOnly bool // send RA packets with MO flags
<mask> "golang.org/x/net/ipv6" <mask> ) <mask> <mask> type raCtx struct { <mask> raAllowSlaac bool // send RA packets without MO flags <mask> raSlaacOnly bool // send RA packets with MO flags <mask> ipAddr net.IP // source IP address (link-local-unicast) <mask> dnsIPAddr net....
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/routeradv.go
if !(ra.raAllowSLAAC || ra.raSLAACOnly) {
<mask> // Init - initialize RA module <mask> func (ra *raCtx) Init() error { <mask> ra.stop.Store(0) <mask> ra.conn = nil <mask> if !(ra.raAllowSlaac || ra.raSlaacOnly) { <mask> return nil <mask> } <mask> <mask> log.Debug("dhcpv6 ra: source IP address: %s DNS IP address: %s", <mask> ra.ipAddr, ra.d...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/routeradv.go
managedAddressConfiguration: !ra.raSLAACOnly, otherConfiguration: !ra.raSLAACOnly,
<mask> log.Debug("dhcpv6 ra: source IP address: %s DNS IP address: %s", <mask> ra.ipAddr, ra.dnsIPAddr) <mask> <mask> params := icmpv6RA{ <mask> managedAddressConfiguration: !ra.raSlaacOnly, <mask> otherConfiguration: !ra.raSlaacOnly, <mask> mtu: uint32(ra.iface.MTU),...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/routeradv.go
RASLAACOnly bool `yaml:"ra_slaac_only" json:"-"` // send ICMPv6.RA packets without MO flags RAAllowSLAAC bool `yaml:"ra_allow_slaac" json:"-"` // send ICMPv6.RA packets with MO flags
<mask> RangeStart net.IP `yaml:"range_start"` <mask> <mask> LeaseDuration uint32 `yaml:"lease_duration" json:"lease_duration"` // in seconds <mask> <mask> RaSlaacOnly bool `yaml:"ra_slaac_only" json:"-"` // send ICMPv6.RA packets without MO flags <mask> RaAllowSlaac bool `yaml:"ra_allow_slaac" json:"-"` /...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/server.go
s.ra.raAllowSLAAC = s.conf.RAAllowSLAAC s.ra.raSLAACOnly = s.conf.RASLAACOnly
<mask> break <mask> } <mask> } <mask> <mask> s.ra.raAllowSlaac = s.conf.RaAllowSlaac <mask> s.ra.raSlaacOnly = s.conf.RaSlaacOnly <mask> s.ra.dnsIPAddr = s.ra.ipAddr <mask> s.ra.prefixIPAddr = s.conf.ipStart <mask> s.ra.ifaceName = s.conf.InterfaceName <mask> s.ra.iface = iface <mask> s.ra.pack...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/v6.go
if s.conf.RASLAACOnly {
<mask> return err <mask> } <mask> <mask> // don't initialize DHCPv6 server if we must force the clients to use SLAAC <mask> if s.conf.RaSlaacOnly { <mask> log.Debug("DHCPv6: not starting DHCPv6 server due to ra_slaac_only=true") <mask> return nil <mask> } <mask> <mask> log.Debug("dhcpv6: listenin...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/dhcpd/v6.go
<mask> checker: ifacesStaticConfig, <mask> filePath: "/etc/network/interfaces", <mask> }} { <mask> f, err = os.Open(check.filePath) <mask> if errors.Is(err, os.ErrNotExist) { <mask> continue <mask> } <mask> if err != nil { <mask> return false, err <mask> } <mask> defer f.Close() <mas...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/sysutil/net_linux.go
if errors.Is(err, os.ErrNotExist) { err = nil continue }
<mask> f, err = os.Open(check.filePath) <mask> if err != nil { <mask> return false, err <mask> } <mask> defer f.Close() <mask> <mask> var fileReadCloser io.ReadCloser </s> Pull request: dhcpd: do not override ra-slaac settings Merge in DNS/adguard-home from 2653-ra-slaac to master Updates #2653....
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/sysutil/net_linux.go
var fileReadCloser io.ReadCloser fileReadCloser, err = aghio.LimitReadCloser(f, maxConfigFileSize)
<mask> return false, err <mask> } <mask> defer f.Close() <mask> <mask> fileReadCloser, err := aghio.LimitReadCloser(f, maxConfigFileSize) <mask> if err != nil { <mask> return false, err <mask> } <mask> defer fileReadCloser.Close() <mask> </s> Pull request: dhcpd: do not override ra-slaac ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
internal/sysutil/net_linux.go
, "RA"
<mask> , "MX" <mask> , "PTR" <mask> , "QUIC" <mask> , "SDNS" <mask> , "SLAAC" <mask> , "SVCB" <mask> ] <mask> dot_import_whitelist = [] <mask> http_status_code_whitelist = [] </s> Pull request: dhcpd: do not override ra-slaac settings Merge in DNS/adguard-home from 2653-ra-slaac to master Updates #2653. Sq...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
staticcheck.conf
, "SLAAC"
<mask> , "RA" <mask> , "SDNS" <mask> , "SVCB" <mask> ] <mask> dot_import_whitelist = [] <mask> http_status_code_whitelist = [] </s> Pull request: dhcpd: do not override ra-slaac settings Merge in DNS/adguard-home from 2653-ra-slaac to master Updates #2653. Squashed commit of the following: commit f261413a58d...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5
staticcheck.conf
// DNS64Prefixes is a slice of NAT64 prefixes to be used for DNS64. DNS64Prefixes []string
<mask> // resolving PTR queries for local addresses. <mask> LocalPTRResolvers []string <mask> <mask> // ResolveClients signals if the RDNS should resolve clients' addresses. <mask> ResolveClients bool <mask> <mask> // UsePrivateRDNS defines if the PTR requests for unknown addresses from </s> Pull request...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/2ecf2a4c42fbd7ea61573d35271ee65f335c7c4f
internal/dnsforward/config.go