docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
<mask> }, {
<mask> processing: true,
<mask> processingTestUpstream: false,
<mask> processingSetUpstream: false,
<mask> upstream: '',
<mask> });
<mask>
<mask> const dashboard = handleActions({
<mask> [actions.dnsStatusRequest]: state => ({ ...state, processing: true }),
<mask> [actions... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb | client/src/reducers/index.js | |
upstream_dns: upstreamDns, | <mask> dns_address: dnsAddress,
<mask> querylog_enabled: queryLogEnabled,
<mask> } = payload;
<mask> const newState = {
<mask> ...state,
<mask> isCoreRunning: running,
<mask> processing: false,
</s> Add list of upstream servers
Closes ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb | client/src/reducers/index.js |
upstreamDns: upstreamDns.join('\n'), | <mask> dnsVersion: version,
<mask> dnsPort,
<mask> dnsAddress,
<mask> queryLogEnabled,
<mask> };
<mask> return newState;
<mask> },
<mask>
<mask> [actions.enableDnsRequest]: state => ({ ...state, processing: true }),
</s> Add list of upst... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb | client/src/reducers/index.js |
[actions.handleUpstreamChange]: (state, { payload }) => {
const { upstreamDns } = payload;
return { ...state, upstreamDns };
}, | <mask> [actions.toggleFilteringSuccess]: (state) => {
<mask> const newSetting = { ...state, isFilteringEnabled: !state.isFilteringEnabled };
<mask> return newSetting;
<mask> },
<mask> }, {
<mask> processing: true,
<mask> isCoreRunning: false,
<mask> processingTopStats: true,
... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb | client/src/reducers/index.js |
upstreamDns: [], | <mask> processingVersion: true,
<mask> processingFiltering: true,
<mask> });
<mask>
<mask> const queryLogs = handleActions({
<mask> [actions.getLogsRequest]: state => ({ ...state, getLogsProcessing: true }),
<mask> [actions.getLogsFailure]: state => ({ ...state, getLogsProcessing: false }),
</s... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2c720350006f607958540a672d2fa4cf927010bb | client/src/reducers/index.js |
this.props.getFiltering();
}
getToggleFilteringButton = () => {
const { isFilteringEnabled } = this.props.dashboard;
const buttonText = isFilteringEnabled ? 'Disable' : 'Enable';
const buttonClass = isFilteringEnabled ? 'btn-outline-secondary' : 'btn-outline-success';
r... | <mask> getAllStats = () => {
<mask> this.props.getStats();
<mask> this.props.getStatsHistory();
<mask> this.props.getTopStats();
<mask> }
<mask>
<mask> render() {
<mask> const { dashboard } = this.props;
<mask> const dashboardProcessing =
<mask> ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04 | client/src/components/Dashboard/index.js |
{this.getToggleFilteringButton()} | <mask> <PageTitle title="Dashboard">
<mask> <div className="page-title__actions">
<mask> {refreshFullButton}
<mask> </div>
<mask> </PageTitle>
<mask> {dashboardProcessing && <Loading />}
</s> Add butto... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04 | client/src/components/Dashboard/index.js |
<mask> Dashboard.propTypes = {
<mask> getStats: PropTypes.func,
<mask> getStatsHistory: PropTypes.func,
<mask> getTopStats: PropTypes.func,
<mask> disableDns: PropTypes.func,
<mask> dashboard: PropTypes.object,
<mask> isCoreRunning: PropTypes.bool,
<mask> };
<mask>
<mask> export defau... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04 | client/src/components/Dashboard/index.js | |
getFiltering: PropTypes.func,
toggleFiltering: PropTypes.func, | <mask> getStatsHistory: PropTypes.func,
<mask> getTopStats: PropTypes.func,
<mask> dashboard: PropTypes.object,
<mask> isCoreRunning: PropTypes.bool,
<mask> };
<mask>
<mask> export default Dashboard;
</s> Add button to the dashboard page for enable/disable filtering
Closes #333 </s> remove ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04 | client/src/components/Dashboard/index.js |
[actions.getFilteringRequest]: state => ({ ...state, processingFiltering: true }),
[actions.getFilteringFailure]: state => ({ ...state, processingFiltering: false }),
[actions.getFilteringSuccess]: (state, { payload }) => {
const newState = { ...state, isFilteringEnabled: payload, processingFilterin... | <mask> }
<mask>
<mask> return state;
<mask> },
<mask> }, {
<mask> processing: true,
<mask> isCoreRunning: false,
<mask> processingTopStats: true,
</s> Add button to the dashboard page for enable/disable filtering
Closes #333 </s> remove disableDns: PropTypes.func,
</s> ad... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04 | client/src/reducers/index.js |
processingFiltering: true, | <mask> processingTopStats: true,
<mask> processingStats: true,
<mask> logStatusProcessing: false,
<mask> processingVersion: true,
<mask> });
<mask>
<mask> const queryLogs = handleActions({
<mask> [actions.getLogsRequest]: state => ({ ...state, getLogsProcessing: true }),
</s> Add button to... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2cf22898dd1418d1659340a95c94c8c9a6a7cf04 | client/src/reducers/index.js |
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/updater"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0 | internal/home/home.go | |
Context.tlsRoots = LoadSystemRootCAs()
Context.tlsCiphers = InitTLSCiphers() | <mask> }
<mask>
<mask> initConfig()
<mask>
<mask> Context.tlsRoots = util.LoadSystemRootCAs()
<mask> Context.tlsCiphers = util.InitTLSCiphers()
<mask> Context.transport = &http.Transport{
<mask> DialContext: customDialContext,
<mask> Proxy: getHTTPProxy,
<mask> TLSClientConfig: &tls.Config{... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0 | internal/home/home.go |
"path/filepath" | <mask> "io/ioutil"
<mask> "net/http"
<mask> "os"
<mask> "reflect"
<mask> "runtime"
<mask> "strings"
<mask> "sync"
<mask> "time"
<mask>
</s> Pull request: 2829 rm util
Merge in DNS/adguard-home from 2829-finally to master
Closes #2829.
Squashed commit of the following:
commit 22b287d5c2cbeced1b487... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0 | internal/home/tls.go |
"runtime" | <mask> "net/http"
<mask> "os"
<mask> "path/filepath"
<mask> "reflect"
<mask> "strings"
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/log"
</s> Pull request: 2829 rm util
Merge in DNS/adguard-home from 2829-finally to master
Closes #2829.
Squashed commit of the following:... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0 | internal/home/tls.go |
"golang.org/x/sys/cpu" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> var tlsWebHandlersRegistered = false
<mask>
<mask> // TLSMod - TLS module object
<mask> type TLSMod struct {
</s> Pull request: 2829 rm util
Merge in DNS/adguard-home from 2829-finally to master
Closes #2829.
Squash... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2d87a0458ef0425629e9f11dbb382e2ec0089ad0 | internal/home/tls.go |
github.com/AdguardTeam/dnsproxy v0.46.1 | <mask>
<mask> go 1.18
<mask>
<mask> require (
<mask> github.com/AdguardTeam/dnsproxy v0.45.3
<mask> github.com/AdguardTeam/golibs v0.10.9
<mask> github.com/AdguardTeam/urlfilter v0.16.0
<mask> github.com/NYTimes/gziphandler v1.1.1
<mask> github.com/ameshkov/dnscrypt/v2 v2.2.5
<mask> github.com/digineo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | go.mod |
github.com/lucas-clemente/quic-go v0.29.2 | <mask> github.com/google/renameio v1.0.1
<mask> github.com/google/uuid v1.3.0
<mask> github.com/insomniacslk/dhcp v0.0.0-20220822114210-de18a9d48e84
<mask> github.com/kardianos/service v1.2.1
<mask> github.com/lucas-clemente/quic-go v0.29.1
<mask> github.com/mdlayher/ethernet v0.0.0-20220221185849-529eae5b6... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | go.mod |
github.com/marten-seemann/qtls-go1-18 v0.1.3 // indirect
github.com/marten-seemann/qtls-go1-19 v0.1.1 // indirect | <mask> github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 // indirect
<mask> github.com/golang/mock v1.6.0 // indirect
<mask> github.com/josharian/native v1.0.0 // indirect
<mask> github.com/marten-seemann/qpack v0.2.1 // indirect
<mask> github.com/marten-seemann/qtls-go1-18 v0.1.2 // indirect
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | go.mod |
github.com/AdguardTeam/dnsproxy v0.46.1 h1:ej9iRorG+vekaXGYB854waAiS+q8OfswYZ1MQRZolHk=
github.com/AdguardTeam/dnsproxy v0.46.1/go.mod h1:PAmRzFqls0E92XTglyY2ESAqMAzZJhHKErG1ZpRnpjA= | <mask> github.com/AdguardTeam/dnsproxy v0.45.3 h1:lvJlifDIVjHFVkVcieBhXyQA357Wl+vmLxeDlaQ8DE8=
<mask> github.com/AdguardTeam/dnsproxy v0.45.3/go.mod h1:h+0r4GDvHHY2Wu6r7oqva+O37h00KofYysfzy1TEXFE=
<mask> github.com/AdguardTeam/golibs v0.4.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/Ad... | [
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | go.sum |
github.com/lucas-clemente/quic-go v0.29.2 h1:O8Mt0O6LpvEW+wfC40vZdcw0DngwYzoxq5xULZNzSI8=
github.com/lucas-clemente/quic-go v0.29.2/go.mod h1:g6/h9YMmLuU54tL1gW25uIi3VlBp3uv+sBihplIuskE= | <mask> github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
<mask> github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
<mask> github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
<mask> github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkid... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | go.sum |
github.com/marten-seemann/qtls-go1-18 v0.1.3 h1:R4H2Ks8P6pAtUagjFty2p7BVHn3XiwDAl7TTQf5h7TI=
github.com/marten-seemann/qtls-go1-18 v0.1.3/go.mod h1:mJttiymBAByA49mhlNZZGrH5u1uXYZJ+RW28Py7f4m4=
github.com/marten-seemann/qtls-go1-19 v0.1.1 h1:mnbxeq3oEyQxQXwI4ReCgW9DPoPR94sNlqWoDZnjRIE=
github.com/marten-seemann/qtls-go1... | <mask> github.com/lucas-clemente/quic-go v0.29.1 h1:Z+WMJ++qMLhvpFkRZA+jl3BTxUjm415YBmWanXB8zP0=
<mask> github.com/lucas-clemente/quic-go v0.29.1/go.mod h1:CTcNfLYJS2UuRNB+zcNlgvkjBhxX6Hm3WUxxAQx2mgE=
<mask> github.com/marten-seemann/qpack v0.2.1 h1:jvTsT/HpCn2UZJdP+UUB53FfUUgeOyG5K1ns0OJOGVs=
<mask> github.com/mar... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | go.sum |
OnClose func() (err error) | <mask> // rename it to just Upstream.
<mask> type UpstreamMock struct {
<mask> OnAddress func() (addr string)
<mask> OnExchange func(req *dns.Msg) (resp *dns.Msg, err error)
<mask> }
<mask>
<mask> // Address implements the [upstream.Upstream] interface for *UpstreamMock.
<mask> func (u *UpstreamMock) Addres... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/aghtest/interface.go |
"github.com/AdguardTeam/dnsproxy/upstream" | <mask> "net"
<mask> "strings"
<mask> "testing"
<mask>
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/require"
<mask> )
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-upstreams to master
Closes #5044.
S... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/aghtest/upstream.go |
var _ upstream.Upstream = (*Upstream)(nil)
| <mask> Addr string
<mask> }
<mask>
<mask> // RespondTo returns a response with answer if req has class cl, question type
<mask> // qt, and target targ.
<mask> func RespondTo(t testing.TB, req *dns.Msg, cl, qt uint16, targ, answer string) (resp *dns.Msg) {
<mask> t.Helper()
<mask>
<mask> require.NotNil(t, ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/aghtest/upstream.go |
// Exchange implements the [upstream.Upstream] interface for *Upstream. | <mask>
<mask> return resp
<mask> }
<mask>
<mask> // Exchange implements the upstream.Upstream interface for *Upstream.
<mask> //
<mask> // TODO(a.garipov): Split further into handlers.
<mask> func (u *Upstream) Exchange(m *dns.Msg) (resp *dns.Msg, err error) {
<mask> resp = new(dns.Msg).SetReply(m)
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/aghtest/upstream.go |
// Address implements [upstream.Upstream] interface for *Upstream. | <mask>
<mask> return resp, nil
<mask> }
<mask>
<mask> // Address implements upstream.Upstream interface for *Upstream.
<mask> func (u *Upstream) Address() string {
<mask> return u.Addr
<mask> }
<mask>
<mask> // NewBlockUpstream returns an [*UpstreamMock] that works like an upstream that
</s> Pull reques... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/aghtest/upstream.go |
// Close implements [upstream.Upstream] interface for *Upstream.
func (u *Upstream) Close() (err error) {
return nil
}
| <mask> }
<mask>
<mask> // NewBlockUpstream returns an [*UpstreamMock] that works like an upstream that
<mask> // supports hash-based safe-browsing/adult-blocking feature. If shouldBlock is
<mask> // true, hostname's actual hash is returned, blocking it. Otherwise, it returns
<mask> // a different hash.
</s> P... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/aghtest/upstream.go |
// queries, such as public clients PTR resolving and updater hostname resolving. | <mask> }
<mask> }
<mask>
<mask> // prepareInternalProxy initializes the DNS proxy that is used for internal DNS
<mask> // queries, such at client PTR resolving and updater hostname resolving.
<mask> func (s *Server) prepareInternalProxy() (err error) {
<mask> conf := &proxy.Config{
<mask> CacheEnabled: t... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/dnsforward/dnsforward.go |
// stopLocked stops the DNS server without locking. For internal use only.
func (s *Server) stopLocked() (err error) {
var errs []error
| <mask>
<mask> return s.stopLocked()
<mask> }
<mask>
<mask> // stopLocked stops the DNS server without locking. For internal use only.
<mask> func (s *Server) stopLocked() error {
<mask> if s.dnsProxy != nil {
<mask> err := s.dnsProxy.Stop()
<mask> if err != nil {
<mask> return fmt.Errorf("could not... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/dnsforward/dnsforward.go |
err = s.dnsProxy.Stop()
if err != nil {
errs = append(errs, fmt.Errorf("could not stop primary resolvers properly: %w", err))
}
}
if s.internalProxy != nil && s.internalProxy.UpstreamConfig != nil {
err = s.internalProxy.UpstreamConfig.Close()
if err != nil {
errs = append(errs, fmt.Errorf("could not... | <mask>
<mask> // stopLocked stops the DNS server without locking. For internal use only.
<mask> func (s *Server) stopLocked() error {
<mask> if s.dnsProxy != nil {
<mask> err := s.dnsProxy.Stop()
<mask> if err != nil {
<mask> return fmt.Errorf("could not stop the DNS server properly: %w", err)
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/dnsforward/dnsforward.go |
errs = append(errs, fmt.Errorf("could not stop local resolvers properly: %w", err)) | <mask> func (s *Server) stopLocked() error {
<mask> if s.dnsProxy != nil {
<mask> err := s.dnsProxy.Stop()
<mask> if err != nil {
<mask> return fmt.Errorf("could not stop the DNS server properly: %w", err)
<mask> }
<mask> }
<mask>
<mask> s.isRunning = false
<mask> return nil
</s> Pull request: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/dnsforward/dnsforward.go |
if len(errs) > 0 {
return errors.List("stopping DNS server", errs...)
} else {
s.isRunning = false
}
| <mask> return fmt.Errorf("could not stop the DNS server properly: %w", err)
<mask> }
<mask> }
<mask>
<mask> s.isRunning = false
<mask> return nil
<mask> }
<mask>
<mask> // IsRunning returns true if the DNS server is running.
<mask> func (s *Server) IsRunning() bool {
</s> Pull request: 5044 Close u... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/dnsforward/dnsforward.go |
defer func() { err = errors.WithDeferred(err, u.Close()) }() | <mask> return fmt.Errorf("failed to choose upstream for %q: %w", upstreamAddr, err)
<mask> }
<mask>
<mask> if err = healthCheck(u); err != nil {
<mask> err = fmt.Errorf("upstream %q fails to exchange: %w", upstreamAddr, err)
<mask> if domains != nil {
<mask> return domainSpecificTestError{error: err}... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/dnsforward/http.go |
"golang.org/x/exp/maps"
"golang.org/x/exp/slices" | <mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/golibs/netutil"
<mask> "github.com/AdguardTeam/golibs/stringutil"
<mask> )
<mask>
<mask> const clientsUpdatePeriod = 10 * time.Minute
<mask>
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-upstreams... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/clients.go |
// closeUpstreams closes the client-specific upstream config of c if any.
func (c *Client) closeUpstreams() (err error) {
if c.upstreamConfig != nil {
err = c.upstreamConfig.Close()
if err != nil {
return fmt.Errorf("closing upstreams of client %q: %w", c.Name, err)
}
}
return nil
}
| <mask> }
<mask>
<mask> type clientSource uint
<mask>
<mask> // Client sources. The order determines the priority.
<mask> const (
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-upstreams to master
Closes #5044.
Squashed commit of the following:
commit e121380ecb32bd2664d4... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/clients.go |
if err := c.closeUpstreams(); err != nil {
log.Error("client container: removing client %s: %s", name, err)
}
| <mask> }
<mask>
<mask> // update Name index
<mask> delete(clients.list, name)
<mask>
<mask> // update ID index
<mask> for _, id := range c.IDs {
<mask> delete(clients.idIndex, id)
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-upstreams to master
Closes #5044.
Squ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/clients.go |
// Update ID index. | <mask> return fmt.Errorf("another client uses the same id (%q): %q", id, c2.Name)
<mask> }
<mask> }
<mask>
<mask> // update ID index
<mask> for _, id := range prev.IDs {
<mask> delete(clients.idIndex, id)
<mask> }
<mask> for _, id := range c.IDs {
<mask> clients.idIndex[id] = prev
</s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/clients.go |
// Update name index. | <mask> clients.idIndex[id] = prev
<mask> }
<mask> }
<mask>
<mask> // update Name index
<mask> if prev.Name != c.Name {
<mask> delete(clients.list, prev.Name)
<mask> clients.list[c.Name] = prev
<mask> }
<mask>
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-up... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/clients.go |
// Update upstreams cache.
err = c.closeUpstreams()
if err != nil {
return err
} | <mask> delete(clients.list, prev.Name)
<mask> clients.list[c.Name] = prev
<mask> }
<mask>
<mask> // update upstreams cache
<mask> c.upstreamConfig = nil
<mask>
<mask> *prev = *c
<mask>
<mask> return nil
<mask> }
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-u... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/clients.go |
func stopDNSServer() (err error) { | <mask>
<mask> return nil
<mask> }
<mask>
<mask> func stopDNSServer() error {
<mask> if !isRunning() {
<mask> return nil
<mask> }
<mask>
<mask> err := Context.dnsServer.Stop()
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-upstreams to master
Closes #5044.
Squash... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/dns.go |
err = Context.dnsServer.Stop() | <mask> if !isRunning() {
<mask> return nil
<mask> }
<mask>
<mask> err := Context.dnsServer.Stop()
<mask> if err != nil {
<mask> return fmt.Errorf("couldn't stop forwarding DNS server: %w", err)
<mask> }
<mask>
<mask> closeDNSServer()
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-h... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/dns.go |
return fmt.Errorf("stopping forwarding dns server: %w", err)
}
err = Context.clients.Close()
if err != nil {
return fmt.Errorf("closing clients container: %w", err) | <mask> }
<mask>
<mask> err := Context.dnsServer.Stop()
<mask> if err != nil {
<mask> return fmt.Errorf("couldn't stop forwarding DNS server: %w", err)
<mask> }
<mask>
<mask> closeDNSServer()
<mask> return nil
<mask> }
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-clos... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/home/dns.go |
"github.com/AdguardTeam/golibs/errors" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/next/dnssvc"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
</s> Pull request: 5044 Close upstreams
Merge in DNS/ad... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/next/dnssvc/dnssvc_test.go |
closeErr errors.Error = "closing failed" | <mask> bootstrapAddr = "bootstrap.example"
<mask> upstreamAddr = "upstream.example"
<mask> )
<mask>
<mask> ups := &aghtest.UpstreamMock{
<mask> OnAddress: func() (addr string) {
<mask> return upstreamAddr
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-upstreams t... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/next/dnssvc/dnssvc_test.go |
OnClose: func() (err error) {
return closeErr
}, | <mask> resp = (&dns.Msg{}).SetReply(req)
<mask>
<mask> return resp, nil
<mask> },
<mask> }
<mask>
<mask> c := &dnssvc.Config{
<mask> Addresses: []netip.AddrPort{netip.MustParseAddrPort("127.0.0.1:0")},
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-upstr... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/next/dnssvc/dnssvc_test.go |
require.ErrorIs(t, err, closeErr) | <mask> ctx, cancel := context.WithTimeout(context.Background(), testTimeout)
<mask> defer cancel()
<mask>
<mask> err = svc.Shutdown(ctx)
<mask> require.NoError(t, err)
<mask> }
</s> Pull request: 5044 Close upstreams
Merge in DNS/adguard-home from 5044-close-upstreams to master
Closes #5044.
Squashed com... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2de42284a5f8cf8f75f77059ba13f09b26a5ee6d | internal/next/dnssvc/dnssvc_test.go |
<mask> github.com/gobuffalo/packr v1.30.1
<mask> github.com/gobuffalo/packr/v2 v2.8.1 // indirect
<mask> github.com/google/go-cmp v0.5.5 // indirect
<mask> github.com/google/renameio v1.0.1-0.20210406141108-81588dbe0453
<mask> github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714
<mask> github.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.mod | |
<mask> github.com/insomniacslk/dhcp v0.0.0-20210310193751-cfd4d47082c2
<mask> github.com/kardianos/service v1.2.0
<mask> github.com/karrick/godirwalk v1.16.1 // indirect
<mask> github.com/lucas-clemente/quic-go v0.20.1
<mask> github.com/mdlayher/ethernet v0.0.0-20190606142754-0394541c37b7
<mask> github.com/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.mod | |
<mask> github.com/karrick/godirwalk v1.16.1 // indirect
<mask> github.com/lucas-clemente/quic-go v0.20.1
<mask> github.com/mdlayher/ethernet v0.0.0-20190606142754-0394541c37b7
<mask> github.com/mdlayher/netlink v1.4.0
<mask> github.com/mdlayher/raw v0.0.0-20191009151244-50f2db8cc065
<mask> github.com/miekg/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.mod | |
<mask> github.com/sirupsen/logrus v1.8.1 // indirect
<mask> github.com/spf13/cobra v1.1.3 // indirect
<mask> github.com/stretchr/testify v1.7.0
<mask> github.com/ti-mo/netfilter v0.4.0
<mask> github.com/u-root/u-root v7.0.0+incompatible
<mask> go.etcd.io/bbolt v1.3.5
<mask> golang.org/x/crypto v0.0.0-2021... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.mod | |
github.com/AdguardTeam/dhcp v0.0.0-20210420175708-50b0efd52063 h1:RBsQppxEJEqHApY6WDBkM2H0UG5wt57RcT0El2WGdp8=
github.com/AdguardTeam/dhcp v0.0.0-20210420175708-50b0efd52063/go.mod h1:TKl4jN3Voofo4UJIicyNhWGp/nlQqQkFxmwIFTvBkKI= | <mask> dmitri.shuralyov.com/service/change v0.0.0-20181023043359-a85b471d5412/go.mod h1:a1inKt/atXimZ4Mv927x+r7UpyzRUf4emIoiiSC2TN4=
<mask> dmitri.shuralyov.com/state v0.0.0-20180228185332-28bcc343414c/go.mod h1:0PRwlb0D6DFvNNtx+9ybjezNCa8XF0xaYcETyp6rHWU=
<mask> git.apache.org/thrift.git v0.0.0-20180902110319-2566e... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum |
<mask> github.com/AdguardTeam/dnsproxy v0.37.1 h1:vULyF1+xSI7vV99m8GD2hmOuCQrpu87awyeSe5qtFbA=
<mask> github.com/AdguardTeam/dnsproxy v0.37.1/go.mod h1:xkJWEuTr550gPDmB9azsciKZzSXjf9wMn+Ji54PQ4gE=
<mask> github.com/AdguardTeam/golibs v0.4.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/Ad... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum | |
<mask> github.com/cheekybits/genny v1.0.0/go.mod h1:+tQajlRqAUrPI7DOSpB0XAqZYtQakVtB7wXkRAgjxjQ=
<mask> github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
<mask> github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk=
<mask> github.com/coreos/etcd... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum | |
<mask> github.com/gobuffalo/packr/v2 v2.5.1/go.mod h1:8f9c96ITobJlPzI44jj+4tHnEKNt0xXWSVlXRN9X1Iw=
<mask> github.com/gobuffalo/packr/v2 v2.8.1 h1:tkQpju6i3EtMXJ9uoF5GT6kB+LMTimDWD8Xvbz6zDVA=
<mask> github.com/gobuffalo/packr/v2 v2.8.1/go.mod h1:c/PLlOuTU+p3SybaJATW3H6lX/iK7xEz5OeMf+NnJpg=
<mask> github.com/gogo/pro... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum | |
<mask> github.com/golang/lint v0.0.0-20180702182130-06c8688daad7/go.mod h1:tluoj9z5200jBnyusfRPU2LqT6J+DAorxEvtC7LHB+E=
<mask> github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
<mask> github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
<mask> githu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum | |
<mask> github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714 h1:/jC7qQFrv8CrSJVmaolDVOxTfS9kc36uB6H40kdbQq8=
<mask> github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714/go.mod h1:2Goc3h8EklBH5mspfHFxBnEoURQCGzQQH1ga9Myjvis=
<mask> github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCX... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum | |
<mask> github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8=
<mask> github.com/insomniacslk/dhcp v0.0.0-20210310193751-cfd4d47082c2 h1:NpTIlXznCStsY88jU+Gh1Dy5dt/jYV4z4uU8h2TUOt4=
<mask> github.com/insomniacslk/dhcp v0.0.0-20210310193751-cfd4d47082c2/go.mod h1:TKl4jN3Voof... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum | |
<mask> google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
<mask> google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
<mask> google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum | |
<mask> google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
<mask> google.golang.org/grpc v1.21.0/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
<mask> google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
<mask> google.golang.org/grpc v1.23.0... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | go.sum | |
<mask> "os"
<mask> "runtime"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd/nclient4"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/insomniacslk/dhcp/dhcpv4"
<mask> "github.com/insomniacslk/dhcp/dhcpv6"
<mask> "github.com/insomniacslk/dhcp/dhcpv6/nclient... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | internal/dhcpd/checkother.go | |
"github.com/insomniacslk/dhcp/dhcpv4/nclient4" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/insomniacslk/dhcp/dhcpv4"
<mask> "github.com/insomniacslk/dhcp/dhcpv6"
<mask> "github.com/insomniacslk/dhcp/dhcpv6/nclient6"
<mask> "github.com/insomniacslk/dhcp/iana"
<mask> )
</s> Pull request: 2606 substitute nclient4 ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2e4e1973d990e2deec5a6b91c4ddc31f49136a6a | internal/dhcpd/checkother.go |
func Create(conf ServerConfig) *Server { | <mask> SetOnLeaseChanged(onLeaseChanged OnLeaseChangedT)
<mask> }
<mask>
<mask> // Create - create object
<mask> func Create(config ServerConfig) *Server {
<mask> s := &Server{}
<mask>
<mask> s.conf.Enabled = config.Enabled
<mask> s.conf.InterfaceName = config.InterfaceName
<mask> s.conf.HTTPRegister =... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcpd.go |
s.conf.Enabled = conf.Enabled
s.conf.InterfaceName = conf.InterfaceName
s.conf.HTTPRegister = conf.HTTPRegister
s.conf.ConfigModified = conf.ConfigModified
s.conf.DBFilePath = filepath.Join(conf.WorkDir, dbFilename) | <mask> // Create - create object
<mask> func Create(config ServerConfig) *Server {
<mask> s := &Server{}
<mask>
<mask> s.conf.Enabled = config.Enabled
<mask> s.conf.InterfaceName = config.InterfaceName
<mask> s.conf.HTTPRegister = config.HTTPRegister
<mask> s.conf.ConfigModified = config.ConfigModified
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcpd.go |
v4conf := conf.Conf4 | <mask> webHandlersRegistered = true
<mask> }
<mask>
<mask> var err4, err6 error
<mask> v4conf := config.Conf4
<mask> v4conf.Enabled = s.conf.Enabled
<mask> if len(v4conf.RangeStart) == 0 {
<mask> v4conf.Enabled = false
<mask> }
<mask> v4conf.InterfaceName = s.conf.InterfaceName
</s> Pull request:... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcpd.go |
v6conf := conf.Conf6 | <mask> v4conf.InterfaceName = s.conf.InterfaceName
<mask> v4conf.notify = s.onNotify
<mask> s.srv4, err4 = v4Create(v4conf)
<mask>
<mask> v6conf := config.Conf6
<mask> v6conf.Enabled = s.conf.Enabled
<mask> if len(v6conf.RangeStart) == 0 {
<mask> v6conf.Enabled = false
<mask> }
<mask> v6conf.Interf... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcpd.go |
s.conf.Conf4 = conf.Conf4
s.conf.Conf6 = conf.Conf6
| <mask> }
<mask>
<mask> if s.conf.Enabled && !v4conf.Enabled && !v6conf.Enabled {
<mask> log.Error("Can't enable DHCP server because neither DHCPv4 nor DHCPv6 servers are configured")
<mask> return nil
<mask> }
<mask>
</s> Pull request: dhcpd: do not override ra-slaac settings
Merge in DNS/adguard-home... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcpd.go |
<mask> "strings"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask> "github.com/AdguardTeam/golibs/jsonutil"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> func httpError(r *http.Request, w http.Response... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go | |
func v4JSONToServerConf(j *v4ServerConfJSON) V4ServerConf {
if j == nil {
return V4ServerConf{}
}
| <mask> RangeEnd net.IP `json:"range_end"`
<mask> LeaseDuration uint32 `json:"lease_duration"`
<mask> }
<mask>
<mask> func v4JSONToServerConf(j v4ServerConfJSON) V4ServerConf {
<mask> return V4ServerConf{
<mask> GatewayIP: j.GatewayIP,
<mask> SubnetMask: j.SubnetMask,
<mask> RangeStart: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
func v6JSONToServerConf(j *v6ServerConfJSON) V6ServerConf {
if j == nil {
return V6ServerConf{}
}
| <mask> RangeStart net.IP `json:"range_start"`
<mask> LeaseDuration uint32 `json:"lease_duration"`
<mask> }
<mask>
<mask> func v6JSONToServerConf(j v6ServerConfJSON) V6ServerConf {
<mask> return V6ServerConf{
<mask> RangeStart: j.RangeStart,
<mask> LeaseDuration: j.LeaseDuration,
<mask> }
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
<mask> return
<mask> }
<mask> }
<mask>
<mask> type dhcpServerConfigJSON struct {
<mask> Enabled bool `json:"enabled"`
<mask> InterfaceName string `json:"interface_name"`
<mask> V4 v4ServerConfJSON `json:"v4"`
<mask> V6 v6ServerConfJSON `json:"v6"`
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go | |
type dhcpServerConfigJSON struct {
V4 *v4ServerConfJSON `json:"v4"`
V6 *v6ServerConfJSON `json:"v6"`
InterfaceName string `json:"interface_name"`
Enabled nullBool `json:"enabled"`
}
| <mask> }
<mask>
<mask> func (s *Server) handleDHCPSetConfig(w http.ResponseWriter, r *http.Request) {
<mask> conf := dhcpServerConfigJSON{}
<mask> conf.Enabled = boolToNullBool(s.conf.Enabled)
<mask> conf.InterfaceName = s.conf.InterfaceName
<mask>
<mask> err := json.NewDecoder(r.Body).Decode(&conf)
</s>... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
conf := dhcpServerConfigJSON{}
conf.Enabled = boolToNullBool(s.conf.Enabled)
conf.InterfaceName = s.conf.InterfaceName | <mask> return 0, nil
<mask> }
<mask>
<mask> func (s *Server) handleDHCPSetConfig(w http.ResponseWriter, r *http.Request) {
<mask> newconfig := dhcpServerConfigJSON{}
<mask> newconfig.Enabled = s.conf.Enabled
<mask> newconfig.InterfaceName = s.conf.InterfaceName
<mask>
<mask> js, err := jsonutil.DecodeOb... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
err := json.NewDecoder(r.Body).Decode(&conf) | <mask> newconfig := dhcpServerConfigJSON{}
<mask> newconfig.Enabled = s.conf.Enabled
<mask> newconfig.InterfaceName = s.conf.InterfaceName
<mask>
<mask> js, err := jsonutil.DecodeObject(&newconfig, r.Body)
<mask> if err != nil {
<mask> httpError(r, w, http.StatusBadRequest, "Failed to parse new DHCP conf... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
httpError(r, w, http.StatusBadRequest,
"failed to parse new dhcp config json: %s", err) | <mask> newconfig.InterfaceName = s.conf.InterfaceName
<mask>
<mask> js, err := jsonutil.DecodeObject(&newconfig, r.Body)
<mask> if err != nil {
<mask> httpError(r, w, http.StatusBadRequest, "Failed to parse new DHCP config json: %s", err)
<mask>
<mask> return
<mask> }
<mask>
<mask> var s4 DHCPServ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
if conf.V4 != nil {
v4Conf := v4JSONToServerConf(conf.V4)
v4Conf.Enabled = conf.Enabled == nbTrue
if len(v4Conf.RangeStart) == 0 {
v4Conf.Enabled = false | <mask> var s6 DHCPServer
<mask> v4Enabled := false
<mask> v6Enabled := false
<mask>
<mask> if js.Exists("v4") {
<mask> v4conf := v4JSONToServerConf(newconfig.V4)
<mask> v4conf.Enabled = newconfig.Enabled
<mask> if len(v4conf.RangeStart) == 0 {
<mask> v4conf.Enabled = false
<mask> }
<mask>
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
v4Enabled = v4Conf.Enabled
v4Conf.InterfaceName = conf.InterfaceName | <mask> if len(v4conf.RangeStart) == 0 {
<mask> v4conf.Enabled = false
<mask> }
<mask>
<mask> v4Enabled = v4conf.Enabled
<mask> v4conf.InterfaceName = newconfig.InterfaceName
<mask>
<mask> c4 := V4ServerConf{}
<mask> s.srv4.WriteDiskConfig4(&c4)
<mask> v4conf.notify = c4.notify
<mask> v4c... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
v4Conf.notify = c4.notify
v4Conf.ICMPTimeout = c4.ICMPTimeout | <mask> v4conf.InterfaceName = newconfig.InterfaceName
<mask>
<mask> c4 := V4ServerConf{}
<mask> s.srv4.WriteDiskConfig4(&c4)
<mask> v4conf.notify = c4.notify
<mask> v4conf.ICMPTimeout = c4.ICMPTimeout
<mask>
<mask> s4, err = v4Create(v4conf)
<mask> if err != nil {
<mask> httpError(r, w, htt... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
s4, err = v4Create(v4Conf) | <mask> s.srv4.WriteDiskConfig4(&c4)
<mask> v4conf.notify = c4.notify
<mask> v4conf.ICMPTimeout = c4.ICMPTimeout
<mask>
<mask> s4, err = v4Create(v4conf)
<mask> if err != nil {
<mask> httpError(r, w, http.StatusBadRequest, "invalid dhcpv4 configuration: %s", err)
<mask>
<mask> return
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
httpError(r, w, http.StatusBadRequest,
"invalid dhcpv4 configuration: %s", err) | <mask> v4conf.ICMPTimeout = c4.ICMPTimeout
<mask>
<mask> s4, err = v4Create(v4conf)
<mask> if err != nil {
<mask> httpError(r, w, http.StatusBadRequest, "invalid dhcpv4 configuration: %s", err)
<mask>
<mask> return
<mask> }
<mask> }
<mask>
</s> Pull request: dhcpd: do not override ra-slaac ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
if conf.V6 != nil {
v6Conf := v6JSONToServerConf(conf.V6)
v6Conf.Enabled = conf.Enabled == nbTrue
if len(v6Conf.RangeStart) == 0 {
v6Conf.Enabled = false | <mask> return
<mask> }
<mask> }
<mask>
<mask> if js.Exists("v6") {
<mask> v6conf := v6JSONToServerConf(newconfig.V6)
<mask> v6conf.Enabled = newconfig.Enabled
<mask> if len(v6conf.RangeStart) == 0 {
<mask> v6conf.Enabled = false
<mask> }
<mask>
<mask> v6Enabled = v6conf.Enabled
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
// Don't overwrite the RA/SLAAC settings from the config file.
//
// TODO(a.garipov): Perhaps include them into the request to
// allow changing them from the HTTP API?
v6Conf.RASLAACOnly = s.conf.Conf6.RASLAACOnly
v6Conf.RAAllowSLAAC = s.conf.Conf6.RAAllowSLAAC
v6Enabled = v6Conf.Enabled
v6Conf.Interf... | <mask> if len(v6conf.RangeStart) == 0 {
<mask> v6conf.Enabled = false
<mask> }
<mask>
<mask> v6Enabled = v6conf.Enabled
<mask> v6conf.InterfaceName = newconfig.InterfaceName
<mask> v6conf.notify = s.onNotify
<mask>
<mask> s6, err = v6Create(v6conf)
<mask> if err != nil {
<mask> httpErro... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
s6, err = v6Create(v6Conf) | <mask> v6Enabled = v6conf.Enabled
<mask> v6conf.InterfaceName = newconfig.InterfaceName
<mask> v6conf.notify = s.onNotify
<mask>
<mask> s6, err = v6Create(v6conf)
<mask> if err != nil {
<mask> httpError(r, w, http.StatusBadRequest, "invalid dhcpv6 configuration: %s", err)
<mask>
<mask> return... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
httpError(r, w, http.StatusBadRequest,
"invalid dhcpv6 configuration: %s", err) | <mask> v6conf.notify = s.onNotify
<mask>
<mask> s6, err = v6Create(v6conf)
<mask> if err != nil {
<mask> httpError(r, w, http.StatusBadRequest, "invalid dhcpv6 configuration: %s", err)
<mask>
<mask> return
<mask> }
<mask> }
<mask>
</s> Pull request: dhcpd: do not override ra-slaac settings
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
if conf.Enabled == nbTrue && !v4Enabled && !v6Enabled {
httpError(r, w, http.StatusBadRequest,
"dhcpv4 or dhcpv6 configuration must be complete") | <mask> return
<mask> }
<mask> }
<mask>
<mask> if newconfig.Enabled && !v4Enabled && !v6Enabled {
<mask> httpError(r, w, http.StatusBadRequest, "dhcpv4 or dhcpv6 configuration must be complete")
<mask>
<mask> return
<mask> }
<mask>
<mask> s.Stop()
</s> Pull request: dhcpd: do not override ra-... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
if conf.Enabled != nbNull {
s.conf.Enabled = conf.Enabled == nbTrue | <mask> }
<mask>
<mask> s.Stop()
<mask>
<mask> if js.Exists("enabled") {
<mask> s.conf.Enabled = newconfig.Enabled
<mask> }
<mask>
<mask> if js.Exists("interface_name") {
<mask> s.conf.InterfaceName = newconfig.InterfaceName
<mask> }
</s> Pull request: dhcpd: do not override ra-slaac settings
M... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
if conf.InterfaceName != "" {
s.conf.InterfaceName = conf.InterfaceName | <mask> if js.Exists("enabled") {
<mask> s.conf.Enabled = newconfig.Enabled
<mask> }
<mask>
<mask> if js.Exists("interface_name") {
<mask> s.conf.InterfaceName = newconfig.InterfaceName
<mask> }
<mask>
<mask> if s4 != nil {
<mask> s.srv4 = s4
<mask> }
</s> Pull request: dhcpd: do not override r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
code, err = s.enableDHCP(conf.InterfaceName) | <mask> s.dbLoad()
<mask>
<mask> if s.conf.Enabled {
<mask> var code int
<mask> code, err = s.enableDHCP(newconfig.InterfaceName)
<mask> if err != nil {
<mask> httpError(r, w, code, "enabling dhcp: %s", err)
<mask>
<mask> return
<mask> }
</s> Pull request: dhcpd: do not override ra-slaac set... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/dhcphttp.go |
raAllowSLAAC bool // send RA packets without MO flags
raSLAACOnly bool // send RA packets with MO flags | <mask> "golang.org/x/net/ipv6"
<mask> )
<mask>
<mask> type raCtx struct {
<mask> raAllowSlaac bool // send RA packets without MO flags
<mask> raSlaacOnly bool // send RA packets with MO flags
<mask> ipAddr net.IP // source IP address (link-local-unicast)
<mask> dnsIPAddr net.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/routeradv.go |
if !(ra.raAllowSLAAC || ra.raSLAACOnly) { | <mask> // Init - initialize RA module
<mask> func (ra *raCtx) Init() error {
<mask> ra.stop.Store(0)
<mask> ra.conn = nil
<mask> if !(ra.raAllowSlaac || ra.raSlaacOnly) {
<mask> return nil
<mask> }
<mask>
<mask> log.Debug("dhcpv6 ra: source IP address: %s DNS IP address: %s",
<mask> ra.ipAddr, ra.d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/routeradv.go |
managedAddressConfiguration: !ra.raSLAACOnly,
otherConfiguration: !ra.raSLAACOnly, | <mask> log.Debug("dhcpv6 ra: source IP address: %s DNS IP address: %s",
<mask> ra.ipAddr, ra.dnsIPAddr)
<mask>
<mask> params := icmpv6RA{
<mask> managedAddressConfiguration: !ra.raSlaacOnly,
<mask> otherConfiguration: !ra.raSlaacOnly,
<mask> mtu: uint32(ra.iface.MTU),... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/routeradv.go |
RASLAACOnly bool `yaml:"ra_slaac_only" json:"-"` // send ICMPv6.RA packets without MO flags
RAAllowSLAAC bool `yaml:"ra_allow_slaac" json:"-"` // send ICMPv6.RA packets with MO flags | <mask> RangeStart net.IP `yaml:"range_start"`
<mask>
<mask> LeaseDuration uint32 `yaml:"lease_duration" json:"lease_duration"` // in seconds
<mask>
<mask> RaSlaacOnly bool `yaml:"ra_slaac_only" json:"-"` // send ICMPv6.RA packets without MO flags
<mask> RaAllowSlaac bool `yaml:"ra_allow_slaac" json:"-"` /... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/server.go |
s.ra.raAllowSLAAC = s.conf.RAAllowSLAAC
s.ra.raSLAACOnly = s.conf.RASLAACOnly | <mask> break
<mask> }
<mask> }
<mask>
<mask> s.ra.raAllowSlaac = s.conf.RaAllowSlaac
<mask> s.ra.raSlaacOnly = s.conf.RaSlaacOnly
<mask> s.ra.dnsIPAddr = s.ra.ipAddr
<mask> s.ra.prefixIPAddr = s.conf.ipStart
<mask> s.ra.ifaceName = s.conf.InterfaceName
<mask> s.ra.iface = iface
<mask> s.ra.pack... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/v6.go |
if s.conf.RASLAACOnly { | <mask> return err
<mask> }
<mask>
<mask> // don't initialize DHCPv6 server if we must force the clients to use SLAAC
<mask> if s.conf.RaSlaacOnly {
<mask> log.Debug("DHCPv6: not starting DHCPv6 server due to ra_slaac_only=true")
<mask> return nil
<mask> }
<mask>
<mask> log.Debug("dhcpv6: listenin... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/dhcpd/v6.go |
<mask> checker: ifacesStaticConfig,
<mask> filePath: "/etc/network/interfaces",
<mask> }} {
<mask> f, err = os.Open(check.filePath)
<mask> if errors.Is(err, os.ErrNotExist) {
<mask> continue
<mask> }
<mask> if err != nil {
<mask> return false, err
<mask> }
<mask> defer f.Close()
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/sysutil/net_linux.go | |
if errors.Is(err, os.ErrNotExist) {
err = nil
continue
}
| <mask> f, err = os.Open(check.filePath)
<mask> if err != nil {
<mask> return false, err
<mask> }
<mask> defer f.Close()
<mask>
<mask> var fileReadCloser io.ReadCloser
</s> Pull request: dhcpd: do not override ra-slaac settings
Merge in DNS/adguard-home from 2653-ra-slaac to master
Updates #2653.... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/sysutil/net_linux.go |
var fileReadCloser io.ReadCloser
fileReadCloser, err = aghio.LimitReadCloser(f, maxConfigFileSize) | <mask> return false, err
<mask> }
<mask> defer f.Close()
<mask>
<mask> fileReadCloser, err := aghio.LimitReadCloser(f, maxConfigFileSize)
<mask> if err != nil {
<mask> return false, err
<mask> }
<mask> defer fileReadCloser.Close()
<mask>
</s> Pull request: dhcpd: do not override ra-slaac ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | internal/sysutil/net_linux.go |
, "RA" | <mask> , "MX"
<mask> , "PTR"
<mask> , "QUIC"
<mask> , "SDNS"
<mask> , "SLAAC"
<mask> , "SVCB"
<mask> ]
<mask> dot_import_whitelist = []
<mask> http_status_code_whitelist = []
</s> Pull request: dhcpd: do not override ra-slaac settings
Merge in DNS/adguard-home from 2653-ra-slaac to master
Updates #2653.
Sq... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | staticcheck.conf |
, "SLAAC" | <mask> , "RA"
<mask> , "SDNS"
<mask> , "SVCB"
<mask> ]
<mask> dot_import_whitelist = []
<mask> http_status_code_whitelist = []
</s> Pull request: dhcpd: do not override ra-slaac settings
Merge in DNS/adguard-home from 2653-ra-slaac to master
Updates #2653.
Squashed commit of the following:
commit f261413a58d... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2eb21ef40901e893069e9e4b6fa902d759d510b5 | staticcheck.conf |
// DNS64Prefixes is a slice of NAT64 prefixes to be used for DNS64.
DNS64Prefixes []string
| <mask> // resolving PTR queries for local addresses.
<mask> LocalPTRResolvers []string
<mask>
<mask> // ResolveClients signals if the RDNS should resolve clients' addresses.
<mask> ResolveClients bool
<mask>
<mask> // UsePrivateRDNS defines if the PTR requests for unknown addresses from
</s> Pull request... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/2ecf2a4c42fbd7ea61573d35271ee65f335c7c4f | internal/dnsforward/config.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.