docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
port := int(config.HTTPConfig.Address.Port()) | <mask> if Context.tls != nil {
<mask> Context.tls.WriteDiskConfig(&tlsConf)
<mask> }
<mask>
<mask> port := config.BindPort
<mask> if proto == aghhttp.SchemeHTTPS {
<mask> port = tlsConf.PortHTTPS
<mask> }
<mask>
<mask> // TODO(e.burkov): Inspect and perhaps merge with the previous condition.
</s>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/home.go |
bindHost := config.HTTPConfig.Address.Addr()
if !bindHost.IsUnspecified() {
printWebAddrs(proto, bindHost.String(), port) | <mask>
<mask> return
<mask> }
<mask>
<mask> bindhost := config.BindHost
<mask> if !bindhost.IsUnspecified() {
<mask> printWebAddrs(proto, bindhost.String(), port)
<mask>
<mask> return
<mask> }
<mask>
<mask> ifaces, err := aghnet.GetValidNetInterfacesForWeb()
</s> Pull request: home: http con... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/home.go |
printWebAddrs(proto, bindHost.String(), port) | <mask> log.Error("web: getting iface ips: %s", err)
<mask> // That's weird, but we'll ignore it.
<mask> //
<mask> // TODO(e.burkov): Find out when it happens.
<mask> printWebAddrs(proto, bindhost.String(), port)
<mask>
<mask> return
<mask> }
<mask>
<mask> for _, iface := range ifaces {
</s> P... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/home.go |
printWebAddrs(proto, addr.String(), port) | <mask> }
<mask>
<mask> for _, iface := range ifaces {
<mask> for _, addr := range iface.Addresses {
<mask> printWebAddrs(proto, addr.String(), config.BindPort)
<mask> }
<mask> }
<mask> }
<mask>
<mask> // -------------------
</s> Pull request: home: http conf
Updates #2860.
Squashed commit of th... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/home.go |
tcpPort(config.HTTPConfig.Address.Port()), | <mask> }
<mask>
<mask> if setts.Enabled {
<mask> err = validatePorts(
<mask> tcpPort(config.BindPort),
<mask> tcpPort(setts.PortHTTPS),
<mask> tcpPort(setts.PortDNSOverTLS),
<mask> tcpPort(setts.PortDNSCrypt),
<mask> udpPort(config.DNS.Port),
<mask> udpPort(setts.PortDNSOverQUIC),
</s>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/tls.go |
tcpPort(config.HTTPConfig.Address.Port()), | <mask> }
<mask>
<mask> if req.Enabled {
<mask> err = validatePorts(
<mask> tcpPort(config.BindPort),
<mask> tcpPort(req.PortHTTPS),
<mask> tcpPort(req.PortDNSOverTLS),
<mask> tcpPort(req.PortDNSCrypt),
<mask> udpPort(config.DNS.Port),
<mask> udpPort(req.PortDNSOverQUIC),
</s> Pull requ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/tls.go |
"net/netip" | <mask> "bytes"
<mask> "fmt"
<mask> "net/url"
<mask> "os"
<mask> "path"
<mask> "path/filepath"
</s> Pull request: home: http conf
Updates #2860.
Squashed commit of the following:
commit 0d55a99d5c0b9f1d8c9497775dd69929e5091eaa
Merge: 73a203ac8 d4a4bda64
Author: Dimitry Kolyshev <dkolyshev@adguard.com>
Da... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/upgrade.go |
const currentSchemaVersion = 23 | <mask> yaml "gopkg.in/yaml.v3"
<mask> )
<mask>
<mask> // currentSchemaVersion is the current schema version.
<mask> const currentSchemaVersion = 22
<mask>
<mask> // These aliases are provided for convenience.
<mask> type (
<mask> yarr = []any
<mask> yobj = map[string]any
</s> Pull request: home: http co... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/upgrade.go |
upgradeSchema22to23, | <mask> upgradeSchema20to21,
<mask> upgradeSchema21to22,
<mask> }
<mask>
<mask> n := 0
<mask> for i, u := range upgrades {
</s> Pull request: home: http conf
Updates #2860.
Squashed commit of the following:
commit 0d55a99d5c0b9f1d8c9497775dd69929e5091eaa
Merge: 73a203ac8 d4a4bda64
Author: Dimitry Kolys... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/upgrade.go |
addrPort := netip.AddrPortFrom(config.HTTPConfig.Address.Addr(), uint16(port))
return aghnet.CheckPort("tcp", addrPort) == nil | <mask> if Context.web.httpsServer.server != nil {
<mask> return true
<mask> }
<mask>
<mask> return aghnet.CheckPort("tcp", netip.AddrPortFrom(config.BindHost, uint16(port))) == nil
<mask> }
<mask>
<mask> // tlsConfigChanged updates the TLS configuration and restarts the HTTPS server
<mask> // if necessa... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df | internal/home/web.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "net/http"
<mask> "os"
<mask> "strings"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> func httpError(r *http.Request, w http.ResponseWriter, code int... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/dhcpd/http.go |
hasStaticIP, err = aghnet.IfaceHasStaticIP(ifaceName) | <mask> }
<mask>
<mask> func (s *Server) enableDHCP(ifaceName string) (code int, err error) {
<mask> var hasStaticIP bool
<mask> hasStaticIP, err = sysutil.IfaceHasStaticIP(ifaceName)
<mask> if err != nil {
<mask> if errors.Is(err, os.ErrPermission) {
<mask> // ErrPermission may happen here on Linux sys... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/dhcpd/http.go |
} else if errors.Is(err, aghnet.ErrNoStaticIPInfo) { | <mask> // to log it. Think about it more.
<mask> log.Info("error while checking static ip: %s; "+
<mask> "assuming machine has static ip and going on", err)
<mask> hasStaticIP = true
<mask> } else if errors.Is(err, sysutil.ErrNoStaticIPInfo) {
<mask> // Couldn't obtain a definitive answer. Ass... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/dhcpd/http.go |
err = aghnet.IfaceSetStaticIP(ifaceName) | <mask> }
<mask> }
<mask>
<mask> if !hasStaticIP {
<mask> err = sysutil.IfaceSetStaticIP(ifaceName)
<mask> if err != nil {
<mask> err = fmt.Errorf("setting static ip: %w", err)
<mask>
<mask> return http.StatusInternalServerError, err
<mask> }
</s> Pull request: create aghnet package
Merge i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/dhcpd/http.go |
ifaces, err := aghnet.GetValidNetInterfaces() | <mask>
<mask> func (s *Server) handleDHCPInterfaces(w http.ResponseWriter, r *http.Request) {
<mask> response := map[string]netInterfaceJSON{}
<mask>
<mask> ifaces, err := util.GetValidNetInterfaces()
<mask> if err != nil {
<mask> httpError(r, w, http.StatusInternalServerError, "Couldn't get interfaces: %... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/dhcpd/http.go |
jsonIface.GatewayIP = aghnet.GatewayIP(iface.Name) | <mask> jsonIface.Addrs6 = append(jsonIface.Addrs6, ipnet.IP)
<mask> }
<mask> }
<mask> if len(jsonIface.Addrs4)+len(jsonIface.Addrs6) != 0 {
<mask> jsonIface.GatewayIP = sysutil.GatewayIP(iface.Name)
<mask> response[iface.Name] = jsonIface
<mask> }
<mask> }
<mask>
<mask> err = json.NewEnc... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/dhcpd/http.go |
isStaticIP, err := aghnet.IfaceHasStaticIP(interfaceName) | <mask> }
<mask>
<mask> found4, err4 := CheckIfOtherDHCPServersPresentV4(interfaceName)
<mask>
<mask> isStaticIP, err := sysutil.IfaceHasStaticIP(interfaceName)
<mask> if err != nil {
<mask> result.V4.StaticIP.Static = "error"
<mask> result.V4.StaticIP.Error = err.Error()
<mask> } else if !isStaticIP... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/dhcpd/http.go |
result.V4.StaticIP.IP = aghnet.GetSubnet(interfaceName).String() | <mask> result.V4.StaticIP.Static = "error"
<mask> result.V4.StaticIP.Error = err.Error()
<mask> } else if !isStaticIP {
<mask> result.V4.StaticIP.Static = "no"
<mask> result.V4.StaticIP.IP = util.GetSubnet(interfaceName).String()
<mask> }
<mask>
<mask> if found4 {
<mask> result.V4.OtherServer.Fou... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/dhcpd/http.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "strconv"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil"
<mask>
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> // getAddrsResponse is the response for /ins... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
WebPort int `json:"web_port"`
DNSPort int `json:"dns_port"`
Interfaces map[string]*aghnet.NetInterface `json:"interfaces"` | <mask> )
<mask>
<mask> // getAddrsResponse is the response for /install/get_addresses endpoint.
<mask> type getAddrsResponse struct {
<mask> WebPort int `json:"web_port"`
<mask> DNSPort int `json:"dns_port"`
<mask> Interfaces map[string]*util.NetInter... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
ifaces, err := aghnet.GetValidNetInterfacesForWeb() | <mask> data := getAddrsResponse{}
<mask> data.WebPort = 80
<mask> data.DNSPort = 53
<mask>
<mask> ifaces, err := util.GetValidNetInterfacesForWeb()
<mask> if err != nil {
<mask> httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
<mask> return
<mask> }
<mask>
</s> Pul... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
data.Interfaces = make(map[string]*aghnet.NetInterface) | <mask> httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
<mask> return
<mask> }
<mask>
<mask> data.Interfaces = make(map[string]*util.NetInterface)
<mask> for _, iface := range ifaces {
<mask> data.Interfaces[iface.Name] = iface
<mask> }
<mask>
<mask> w.Header().Set... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
err = aghnet.CheckPortAvailable(reqData.Web.IP, reqData.Web.Port) | <mask> return
<mask> }
<mask>
<mask> if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort && reqData.Web.Port != config.BetaBindPort {
<mask> err = util.CheckPortAvailable(reqData.Web.IP, reqData.Web.Port)
<mask> if err != nil {
<mask> respData.Web.Status = err.Error()
<mask> }
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
err = aghnet.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port) | <mask> }
<mask> }
<mask>
<mask> if reqData.DNS.Port != 0 {
<mask> err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask>
<mask> if util.ErrorIsAddrInUse(err) {
<mask> canAutofix := checkDNSStubListener()
<mask> if canAutofix && reqData.DNS.Autofix {
<mask>
</s> Pull req... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
if aghnet.ErrorIsAddrInUse(err) { | <mask>
<mask> if reqData.DNS.Port != 0 {
<mask> err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask>
<mask> if util.ErrorIsAddrInUse(err) {
<mask> canAutofix := checkDNSStubListener()
<mask> if canAutofix && reqData.DNS.Autofix {
<mask>
<mask> err = disableDNSStubListe... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
err = aghnet.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port) | <mask> if err != nil {
<mask> log.Error("Couldn't disable DNSStubListener: %s", err)
<mask> }
<mask>
<mask> err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask> canAutofix = false
<mask> }
<mask>
<mask> respData.DNS.CanAutofix = canAutofix
<mask> }
</s> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
err = aghnet.CheckPortAvailable(reqData.DNS.IP, reqData.DNS.Port) | <mask> respData.DNS.CanAutofix = canAutofix
<mask> }
<mask>
<mask> if err == nil {
<mask> err = util.CheckPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask> }
<mask>
<mask> if err != nil {
<mask> respData.DNS.Status = err.Error()
<mask> } else if !reqData.DNS.IP.IsUnspecified() {
</s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
interfaceName := aghnet.GetInterfaceByIP(ip) | <mask> // Or if set=true, it tries to set it
<mask> func handleStaticIP(ip net.IP, set bool) staticIPJSON {
<mask> resp := staticIPJSON{}
<mask>
<mask> interfaceName := util.GetInterfaceByIP(ip)
<mask> resp.Static = "no"
<mask>
<mask> if len(interfaceName) == 0 {
<mask> resp.Static = "error"
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
err := aghnet.IfaceSetStaticIP(interfaceName) | <mask> }
<mask>
<mask> if set {
<mask> // Try to set static IP for the specified interface
<mask> err := sysutil.IfaceSetStaticIP(interfaceName)
<mask> if err != nil {
<mask> resp.Static = "error"
<mask> resp.Error = err.Error()
<mask> return resp
<mask> }
</s> Pull request: create aghnet... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
isStaticIP, err := aghnet.IfaceHasStaticIP(interfaceName) | <mask> }
<mask>
<mask> // Fallthrough here even if we set static IP
<mask> // Check if we have a static IP and return the details
<mask> isStaticIP, err := sysutil.IfaceHasStaticIP(interfaceName)
<mask> if err != nil {
<mask> resp.Static = "error"
<mask> resp.Error = err.Error()
<mask> } else {
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
resp.IP = aghnet.GetSubnet(interfaceName).String() | <mask> } else {
<mask> if isStaticIP {
<mask> resp.Static = "yes"
<mask> }
<mask> resp.IP = util.GetSubnet(interfaceName).String()
<mask> }
<mask> return resp
<mask> }
<mask>
<mask> // Check if DNSStubListener is active
</s> Pull request: create aghnet package
Merge in DNS/adguard-home from mk-... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
err = aghnet.CheckPortAvailable(newSettings.Web.IP, newSettings.Web.Port) | <mask> }
<mask>
<mask> // validate that hosts and ports are bindable
<mask> if restartHTTP {
<mask> err = util.CheckPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
<mask> if err != nil {
<mask> httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s",
<mask> net.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
err = aghnet.CheckPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port) | <mask> }
<mask>
<mask> }
<mask>
<mask> err = util.CheckPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
<mask> if err != nil {
<mask> httpError(w, http.StatusBadRequest, "%s", err)
<mask> return
<mask> }
<mask>
</s> Pull request: create aghnet package
Merge in DNS/adguard-home from... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
err = aghnet.CheckPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port) | <mask> httpError(w, http.StatusBadRequest, "%s", err)
<mask> return
<mask> }
<mask>
<mask> err = util.CheckPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
<mask> if err != nil {
<mask> httpError(w, http.StatusBadRequest, "%s", err)
<mask> return
<mask> }
<mask>
</s> Pull request: create... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
WebPort int `json:"web_port"`
DNSPort int `json:"dns_port"`
Interfaces []*aghnet.NetInterface `json:"interfaces"` | <mask> //
<mask> // TODO(e.burkov): This should removed with the API v1 when the appropriate
<mask> // functionality will appear in default firstRunData.
<mask> type getAddrsResponseBeta struct {
<mask> WebPort int `json:"web_port"`
<mask> DNSPort int `json:"dns_port"`
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
ifaces, err := aghnet.GetValidNetInterfacesForWeb() | <mask> data := getAddrsResponseBeta{}
<mask> data.WebPort = 80
<mask> data.DNSPort = 53
<mask>
<mask> ifaces, err := util.GetValidNetInterfacesForWeb()
<mask> if err != nil {
<mask> httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
<mask> return
<mask> }
<mask>
</s>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlinstall.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghos" | <mask> "runtime"
<mask> "syscall"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/updater"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> // temporaryError is the interface for temporary errors fro... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlupdate.go |
canUpdate, _ = aghos.CanBindPrivilegedPorts() | <mask> tlsConf.PortDNSOverTLS < 1024 ||
<mask> tlsConf.PortDNSOverQUIC < 1024)) ||
<mask> config.BindPort < 1024 ||
<mask> config.DNS.Port < 1024) {
<mask> canUpdate, _ = sysutil.CanBindPrivilegedPorts()
<mask> }
<mask> vr.CanAutoUpdate = &canUpdate
<mask> }
<mask> }
<mask>
</s> Pull... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/controlupdate.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "path/filepath"
<mask> "strconv"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/dns.go |
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/dns.go | |
if !Context.ipDetector.DetectSpecialNetwork(ip) { | <mask>
<mask> if !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Context.ipDetector.detectSpecialNetwork(ip) {
<mask> Context.whois.Begin(ip)
<mask> }
<mask> }
<mask>
<mask> func generateServerConfig() (newconfig dnsforward.ServerConfig, err error) {
</s> Pull request: create a... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/dns.go |
ifaces, e := aghnet.GetValidNetInterfacesForWeb() | <mask> func getDNSAddresses() []string {
<mask> dnsAddresses := []string{}
<mask>
<mask> if config.DNS.BindHost.IsUnspecified() {
<mask> ifaces, e := util.GetValidNetInterfacesForWeb()
<mask> if e != nil {
<mask> log.Error("Couldn't get network interfaces: %v", e)
<mask> return []string{}
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/dns.go |
if !Context.ipDetector.DetectSpecialNetwork(ip) { | <mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) {
<mask> if !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Context.ipDetector.detectSpecialNetwork(ip) {
<mask> Context.whois.Begin(ip)
<mask> }
<mask> }
<mask>
<mask> return nil
</s> Pull reques... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/dns.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
"github.com/AdguardTeam/AdGuardHome/internal/aghos" | <mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/que... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go |
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil"
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go | |
ipDetector *aghnet.IPDetector | <mask> tls *TLSMod // TLS module
<mask> autoHosts util.AutoHosts // IP-hostname pairs taken from system configuration (e.g. /etc/hosts) files
<mask> updater *updater.Updater
<mask>
<mask> ipDetector *ipDetector
<mask>
<mask> // mux is our custom http.ServeMux.
<mask> mux *h... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go |
aghos.SetRlimit(config.RlimitNoFile) | <mask> config.Clients = nil
<mask>
<mask> if (runtime.GOOS == "linux" || runtime.GOOS == "darwin") &&
<mask> config.RlimitNoFile != 0 {
<mask> sysutil.SetRlimit(config.RlimitNoFile)
<mask> }
<mask>
<mask> // override bind host/port from the console
<mask> if args.bindHost != nil {
<mask> config.B... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go |
Context.ipDetector, err = aghnet.NewIPDetector() | <mask> if Context.web == nil {
<mask> log.Fatalf("Can't initialize Web module")
<mask> }
<mask>
<mask> Context.ipDetector, err = newIPDetector()
<mask> if err != nil {
<mask> log.Fatal(err)
<mask> }
<mask>
<mask> if !Context.firstRun {
</s> Pull request: create aghnet package
Merge in DNS/adguar... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go |
admin, _ := aghos.HaveAdminRights() | <mask>
<mask> if runtime.GOOS == "windows" {
<mask> // On Windows we need to have admin rights to run properly
<mask>
<mask> admin, _ := sysutil.HaveAdminRights()
<mask> if admin {
<mask> return
<mask> }
<mask>
<mask> log.Fatal("This is the first launch of AdGuard Home. You must run it as Adm... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go |
ok, err := aghnet.CanBindPort(53) | <mask> log.Fatal("This is the first launch of AdGuard Home. You must run it as Administrator.")
<mask> }
<mask>
<mask> // We should check if AdGuard Home is able to bind to port 53
<mask> ok, err := util.CanBindPort(53)
<mask>
<mask> if ok {
<mask> log.Info("AdGuard Home can bind to port 53")
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go |
err := aghos.ConfigureSyslog(serviceName) | <mask> }
<mask>
<mask> if ls.LogFile == configSyslog {
<mask> // Use syslog where it is possible and eventlog on Windows
<mask> err := sysutil.ConfigureSyslog(serviceName)
<mask> if err != nil {
<mask> log.Fatalf("cannot initialize syslog: %s", err)
<mask> }
<mask> } else {
<mask> logFilePath... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go |
ifaces, err := aghnet.GetValidNetInterfacesForWeb() | <mask> log.Printf("Go to https://%s:%s", tlsConf.ServerName, port)
<mask> }
<mask> } else if config.BindHost.IsUnspecified() {
<mask> log.Println("AdGuard Home is available on the following addresses:")
<mask> ifaces, err := util.GetValidNetInterfacesForWeb()
<mask> if err != nil {
<mask> // That'... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/home.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghos" | <mask> "strconv"
<mask> "strings"
<mask> "syscall"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/kardianos/service"
<mask> )
<mask>
</s> Pull request: create ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/service.go |
err = aghos.SendProcessSignal(pid, syscall.SIGHUP) | <mask> if err != nil {
<mask> log.Error("Can't read PID file %s: %s", pidfile, err)
<mask> return
<mask> }
<mask> err = sysutil.SendProcessSignal(pid, syscall.SIGHUP)
<mask> if err != nil {
<mask> log.Error("Can't send signal to PID %d: %s", pid, err)
<mask> return
<mask> }
<mask> log.Debug("Sen... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/service.go |
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" | <mask> "strconv"
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/NYTimes/gziphandler"
<mask> "github.com/gobuffalo/packr"
<mask> )
<mask>
</s> Pull request: create aghnet package
Merge in DNS/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/web.go |
err := aghnet.CheckPortAvailable(config.BindHost, port) | <mask> if Context.web.httpsServer.server != nil {
<mask> alreadyRunning = true
<mask> }
<mask> if !alreadyRunning {
<mask> err := util.CheckPortAvailable(config.BindHost, port)
<mask> if err != nil {
<mask> return false
<mask> }
<mask> }
<mask> return true
</s> Pull request: create aghnet pac... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1 | internal/home/web.go |
"version": "1.2.5",
"resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz",
"integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUxkDWcgIXLw==", | <mask> "minimist": "^1.2.0"
<mask> }
<mask> },
<mask> "minimist": {
<mask> "version": "1.2.0",
<mask> "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz",
<mask> "integrity": "sha1-o1AIsg9BOD7sH7kU9M1d95omQoQ=",
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "5.7.4",
"resolved": "https://registry.npmjs.org/acorn/-/acorn-5.7.4.tgz",
"integrity": "sha512-1D++VG7BhrtvQpNbBzovKNc1FLGGEE/oGe7b9xJm/RFHMBeUaUGpluV9RLjZa47YFdPcDAenEYuq9pQPcMdLJg==", | <mask> "negotiator": "0.6.1"
<mask> }
<mask> },
<mask> "acorn": {
<mask> "version": "5.7.2",
<mask> "resolved": "https://registry.npmjs.org/acorn/-/acorn-5.7.2.tgz",
<mask> "integrity": "sha512-cJrKCNcr2kv8dlDnbw+JPUGjHZzo4myaxOLmpOX8a+rgX94YeTcTMv/LFJUSByRpc+i4GgVnnhLxvMu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"resolved": "", | <mask> "dev": true
<mask> },
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90Oj... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"resolved": "", | <mask> "dev": true
<mask> },
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90Oj... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"coa": {
"version": "2.0.2",
"resolved": "https://registry.npmjs.org/coa/-/coa-2.0.2.tgz",
"integrity": "sha512-q5/jG+YQnSy4nRTV4F7lPepBJZ8qBNJJDBuJdoejDyLXgmL7IEo+Le2JDZudFTFt7mrCqIRaSjws4ygRCTCAXA==",
"dev": true,
"requires": {
"@types/q": "^1.5.1",
"chalk": "^2.4.1",... | <mask> "resolved": "https://registry.npmjs.org/co/-/co-4.6.0.tgz",
<mask> "integrity": "sha1-bqa989hTrlTMuOR7+gvz+QMfsYQ=",
<mask> "dev": true
<mask> },
<mask> "code-point-at": {
<mask> "version": "1.1.0",
<mask> "resolved": "https://registry.npmjs.org/code-point-at/-/code-p... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"resolved": "", | <mask> }
<mask> },
<mask> "minimist": {
<mask> "version": "1.2.0",
<mask> "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz",
<mask> "integrity": "sha1-o1AIsg9BOD7sH7kU9M1d95omQoQ=",
<mask> "dev": true
<mask> },
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "6.0.3",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz",
"integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==", | <mask> "integrity": "sha1-TkMekrEalzFjaqH5yNHMvP2reN8=",
<mask> "dev": true
<mask> },
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"esprima": {
"version": "4.0.1",
"resolved": "https://registry.npmjs.org/esprima/-/esprima-4.0.1.tgz",
"integrity": "sha512-eGuFFw7Upda+g4p+QHvnW0RyTX/SVeJBDM/gCtMARO0cLuT2HcEKnTPvhjV6aGeqrCB/sbNop0Kszm0jsaWU4A==",
"dev": true
}, | <mask> }
<mask> },
<mask> "esquery": {
<mask> "version": "1.0.1",
<mask> "resolved": "https://registry.npmjs.org/esquery/-/esquery-1.0.1.tgz",
<mask> "integrity": "sha512-SmiyZ5zIWH9VM+SRUReLS5Q8a7GxtRdxEBVZpm98rJM7Sb+A9DVCndXfkeFUd3byderg+EbDkfnevfCwynWaNA==",
<mask> "dev":... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"resolved": "", | <mask> }
<mask> },
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90OjzBTme2QqA=... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "6.0.3",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz",
"integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==", | <mask> "which": "^1.3.1"
<mask> },
<mask> "dependencies": {
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPU... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "4.3.0",
"resolved": "https://registry.npmjs.org/gonzales-pe/-/gonzales-pe-4.3.0.tgz",
"integrity": "sha512-otgSPpUmdWJ43VXyiNgEYE4luzHCL2pz4wQ0OnDluC6Eg4Ko3Vexy/SrSynglw/eR+OhkzmqFCZa/OFa/RgAOQ==", | <mask> "integrity": "sha1-L0SUrIkZ43Z8XLtpHp9GMyQoXUM=",
<mask> "dev": true
<mask> },
<mask> "gonzales-pe": {
<mask> "version": "4.2.3",
<mask> "resolved": "https://registry.npmjs.org/gonzales-pe/-/gonzales-pe-4.2.3.tgz",
<mask> "integrity": "sha512-Kjhohco0esHQnOiqqdJeNz/5f... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"minimist": "^1.2.5" | <mask> "resolved": "https://registry.npmjs.org/gonzales-pe/-/gonzales-pe-4.2.3.tgz",
<mask> "integrity": "sha512-Kjhohco0esHQnOiqqdJeNz/5fyPkOMD/d6XVjwTAoPGUFh0mCollPUTUTa2OZy4dYNAqlPIQdTiNzJTWdd9Htw==",
<mask> "dev": true,
<mask> "requires": {
<mask> "minimist": "1.1.x"
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"has-symbols": {
"version": "1.0.1",
"resolved": "https://registry.npmjs.org/has-symbols/-/has-symbols-1.0.1.tgz",
"integrity": "sha512-PLcsoqu++dmEIZB+6totNFKq/7Do+Z0u4oT0zKOJNl3lYK6vGwwu2hjHs+68OEZbTjiUE9bgOABXbP/GvrS0Kg==",
"dev": true
}, | <mask> "version": "3.0.0",
<mask> "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-3.0.0.tgz",
<mask> "integrity": "sha1-tdRU3CGZriJWmfNGfloH87lVuv0="
<mask> },
<mask> "has-value": {
<mask> "version": "1.0.0",
<mask> "resolved": "https://registry.npmjs.org/has-val... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "6.0.3",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz",
"integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==", | <mask> "integrity": "sha1-TkMekrEalzFjaqH5yNHMvP2reN8=",
<mask> "dev": true
<mask> },
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"js-yaml": {
"version": "3.13.1",
"resolved": "https://registry.npmjs.org/js-yaml/-/js-yaml-3.13.1.tgz",
"integrity": "sha512-YfbcO7jXDdyj0DGxYVSlSeQNHbD7XPWvrVWeVUujrQEoZzWJIRrCPoyk6kL6IAjAG2IolMK4T0hNUe0HOUs5Jw==",
"dev": true,
"requires": {
"argparse": "^1.0.7",
"esp... | <mask> "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-4.0.0.tgz",
<mask> "integrity": "sha512-RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ=="
<mask> },
<mask> "jsesc": {
<mask> "version": "1.3.0",
<mask> "resolved": "https://... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/loader-fs-cache/-/loader-fs-cache-1.0.3.tgz",
"integrity": "sha512-ldcgZpjNJj71n+2Mf6yetz+c9bM4xpKtNds4LbqXzU/PTdeAX0g3ytnU1AJMEcTk2Lex4Smpe3Q/eCTsvUBxbA==", | <mask> "strip-bom": "^3.0.0"
<mask> }
<mask> },
<mask> "loader-fs-cache": {
<mask> "version": "1.0.1",
<mask> "resolved": "https://registry.npmjs.org/loader-fs-cache/-/loader-fs-cache-1.0.1.tgz",
<mask> "integrity": "sha1-VuC/CL2XCLJqdltoUJhAyN7J/bw=",
<mask> "dev":... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"mkdirp": "^0.5.1" | <mask> "integrity": "sha1-VuC/CL2XCLJqdltoUJhAyN7J/bw=",
<mask> "dev": true,
<mask> "requires": {
<mask> "find-cache-dir": "^0.1.1",
<mask> "mkdirp": "0.5.1"
<mask> },
<mask> "dependencies": {
<mask> "find-cache-dir": {
<mask> "version": "0.1.1",
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/mdn-data/-/mdn-data-2.0.4.tgz",
"integrity": "sha512-iV3XNKw06j5Q7mi6h+9vbx23Tv7JkjEVgKHW4pimwyDGWm0OIQntJJ+u1C6mg6mK1EaTv42XQ7w76yuzH7M2cA==", | <mask> "unist-util-visit": "^1.1.0"
<mask> }
<mask> },
<mask> "mdn-data": {
<mask> "version": "1.1.4",
<mask> "resolved": "https://registry.npmjs.org/mdn-data/-/mdn-data-1.1.4.tgz",
<mask> "integrity": "sha512-FSYbp3lyKjyj3E7fMl6rYvUdX0FBXaluGqlFoYESWQlyUTq8R+wp0rkFxoYFqZl... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "6.0.3",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz",
"integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==", | <mask> "to-regex": "^3.0.2"
<mask> },
<mask> "dependencies": {
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40Qo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "1.2.5",
"resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz",
"integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUxkDWcgIXLw==", | <mask> "brace-expansion": "^1.1.7"
<mask> }
<mask> },
<mask> "minimist": {
<mask> "version": "0.0.8",
<mask> "resolved": "http://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz",
<mask> "integrity": "sha1-hX/Kv8M5fSYluCKCYuhqp6ARsF0=",
<mask> "dev": true
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "0.5.5",
"resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-0.5.5.tgz",
"integrity": "sha512-NKmAlESf6jMGym1++R0Ra7wvhV+wFW63FaSOFPwRahvea0gMUcGUhVeAg/0BC0wiv9ih5NYPB1Wn1UEI1/L+xQ==", | <mask> }
<mask> }
<mask> },
<mask> "mkdirp": {
<mask> "version": "0.5.1",
<mask> "resolved": "http://registry.npmjs.org/mkdirp/-/mkdirp-0.5.1.tgz",
<mask> "integrity": "sha1-MAV0OOrGz3+MR2fzhkjWaX11yQM=",
<mask> "dev": true,
<mask> "requires": {
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"minimist": "^1.2.5" | <mask> "resolved": "http://registry.npmjs.org/mkdirp/-/mkdirp-0.5.1.tgz",
<mask> "integrity": "sha1-MAV0OOrGz3+MR2fzhkjWaX11yQM=",
<mask> "dev": true,
<mask> "requires": {
<mask> "minimist": "0.0.8"
<mask> }
<mask> },
<mask> "move-concurrently": {
<mask> "ver... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "6.0.3",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz",
"integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==", | <mask> "integrity": "sha1-qJS3XUvE9s1nnvMkSp/Y9Gri1Cg=",
<mask> "dev": true
<mask> },
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"object-inspect": {
"version": "1.7.0",
"resolved": "https://registry.npmjs.org/object-inspect/-/object-inspect-1.7.0.tgz",
"integrity": "sha512-a7pEHdh1xKIAgTySUGgLMx/xwDZskN1Ud6egYYN3EdRW4ZMPNEDUTF+hwy2LUC+Bl+SyLXANnwz/jyh/qutKUw==",
"dev": true
}, | <mask> "dev": true
<mask> },
<mask> "object-keys": {
<mask> "version": "1.0.12",
<mask> "resolved": "https://registry.npmjs.org/object-keys/-/object-keys-1.0.12.tgz",
<mask> "integrity": "sha512-FTMyFUm2wBcGHnH2eXmz7tC6IwlqQZ6mVZ+6dm6vZ4IQIHjs6FdNsQBuKGPuUUUY6NfJw2PshC08Tn6LzLDOag=... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"object.assign": {
"version": "4.1.0",
"resolved": "https://registry.npmjs.org/object.assign/-/object.assign-4.1.0.tgz",
"integrity": "sha512-exHJeq6kBKj58mqGyTQ9DFvrZC/eR6OwxzoM9YRoGBqrXYonaFyGiFMuc9VZrXf7DarreEwMpurG3dd+CNyW5w==",
"dev": true,
"requires": {
"define-properties... | <mask> "dev": true
<mask> }
<mask> }
<mask> },
<mask> "object.getownpropertydescriptors": {
<mask> "version": "2.0.3",
<mask> "resolved": "https://registry.npmjs.org/object.getownpropertydescriptors/-/object.getownpropertydescriptors-2.0.3.tgz",
<mask> "integrit... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "1.0.25",
"resolved": "https://registry.npmjs.org/portfinder/-/portfinder-1.0.25.tgz",
"integrity": "sha512-6ElJnHBbxVA1XSLgBp7G1FiCkQdlqGzuF7DswL5tcea+E8UpuvPU7beVAjjRwCioTS9ZluNbu+ZyRvgTsmqEBg==", | <mask> "integrity": "sha512-ARhBOdzS3e41FbkW/XWrTEtukqqLoK5+Z/4UeDaLuSW+39JPeFgs4gCGqsrJHVZX0fUrx//4OF0K1CUGwlIFow==",
<mask> "dev": true
<mask> },
<mask> "portfinder": {
<mask> "version": "1.0.20",
<mask> "resolved": "https://registry.npmjs.org/portfinder/-/portfinder-1.0.20.tgz",... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"async": "^2.6.2",
"debug": "^3.1.1",
"mkdirp": "^0.5.1" | <mask> "resolved": "https://registry.npmjs.org/portfinder/-/portfinder-1.0.20.tgz",
<mask> "integrity": "sha512-Yxe4mTyDzTd59PZJY4ojZR8F+E5e97iq2ZOHPz3HDgSvYC5siNad2tLooQ5y5QHyQhc3xVqvyk/eNA3wuoa7Sw==",
<mask> "dev": true,
<mask> "requires": {
<mask> "async": "^1.5.2",
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "2.6.3",
"resolved": "https://registry.npmjs.org/async/-/async-2.6.3.tgz",
"integrity": "sha512-zflvls11DCy+dQWzTW2dzuilv8Z5X/pjfmZOWba6TNIVDm+2UDaJmXSOXlasHKfNBs8oo3M0aT50fDEWfKZjXg==",
"dev": true,
"requires": {
"lodash": "^4.17.14"
} | <mask> "mkdirp": "0.5.x"
<mask> },
<mask> "dependencies": {
<mask> "async": {
<mask> "version": "1.5.2",
<mask> "resolved": "https://registry.npmjs.org/async/-/async-1.5.2.tgz",
<mask> "integrity": "sha1-7GphrlZIDAw8skHJVhjiCJL5Zyo=",
<mask> "d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "3.2.6",
"resolved": "https://registry.npmjs.org/debug/-/debug-3.2.6.tgz",
"integrity": "sha512-mel+jf7nrtEl5Pn1Qx46zARXKDpBbvzezse7p7LqINmdoIk8PYP5SySaxEmYv6TZ0JyEKA1hsCId6DIhgITtWQ==", | <mask> "integrity": "sha1-7GphrlZIDAw8skHJVhjiCJL5Zyo=",
<mask> "dev": true
<mask> },
<mask> "debug": {
<mask> "version": "2.6.9",
<mask> "resolved": "https://registry.npmjs.org/debug/-/debug-2.6.9.tgz",
<mask> "integrity": "sha512-bC7ElrdJaJnPbAP... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"ms": "^2.1.1" | <mask> "resolved": "https://registry.npmjs.org/debug/-/debug-2.6.9.tgz",
<mask> "integrity": "sha512-bC7ElrdJaJnPbAP+1EotYvqZsb3ecl5wi6Bfi6BJTUcNowp6cvspg0jXznRTKDjm/E7AdgFBVeAPVMNcKGsHMA==",
<mask> "dev": true,
<mask> "requires": {
<mask> "ms": "2.0.0"
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
},
"ms": {
"version": "2.1.2",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz",
"integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w==",
"dev": true | <mask> "requires": {
<mask> "ms": "^2.1.1"
<mask> }
<mask> }
<mask> }
<mask> },
<mask> "posix-character-classes": {
<mask> "version": "0.1.1",
</s> + client: Switch places for "Upstream DNS servers" and "DNS servers configuration" </s> remove ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
<mask> "postcss": "6.x",
<mask> "postcss-value-parser": "3.x",
<mask> "svgo": "1.x",
<mask> "xmldoc": "1.x"
<mask> },
<mask> "dependencies": {
<mask> "coa": {
<mask> "version": "2.0.2",
<mask> "resolved": "https://registry.npmjs.org/coa/-/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json | |
"resolved": "", | <mask> "dev": true
<mask> },
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90Oj... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"stable": {
"version": "0.1.8",
"resolved": "https://registry.npmjs.org/stable/-/stable-0.1.8.tgz",
"integrity": "sha512-ji9qxRnOVfcuLDySj9qzhGSEFVobyt1kIOSkj1qZzYLzq7Tos/oUUWvotUPQLlrsidqsK6tBH89Bc9kL5zHA6w==",
"dev": true
}, | <mask> }
<mask> },
<mask> "state-toggle": {
<mask> "version": "1.0.1",
<mask> "resolved": "https://registry.npmjs.org/state-toggle/-/state-toggle-1.0.1.tgz",
<mask> "integrity": "sha512-Qe8QntFrrpWTnHwvwj2FZTgv+PKIsp0B9VxLzLLbSpPXWOgRgc5LVj/aTiSfK1RqIeF9jeC1UeOH8Q8y60A7og==",
<mas... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"version": "6.0.3",
"resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz",
"integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==", | <mask> "integrity": "sha1-TkMekrEalzFjaqH5yNHMvP2reN8=",
<mask> "dev": true
<mask> },
<mask> "kind-of": {
<mask> "version": "6.0.2",
<mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz",
<mask> "integrity": "sha512-s5kLOcnH0... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
"unquote": {
"version": "1.1.1",
"resolved": "https://registry.npmjs.org/unquote/-/unquote-1.1.1.tgz",
"integrity": "sha1-j97XMk7G6IoP+LkF58CYzcCG1UQ=",
"dev": true
}, | <mask> "integrity": "sha1-sr9O6FFKrmFltIF4KdIbLvSZBOw=",
<mask> "dev": true
<mask> },
<mask> "unset-value": {
<mask> "version": "1.0.0",
<mask> "resolved": "https://registry.npmjs.org/unset-value/-/unset-value-1.0.0.tgz",
<mask> "integrity": "sha1-g3aHP30jNRef+x5vw6jtDfyKtVk... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/package-lock.json |
<mask> <PageTitle title={t('dns_settings')} />
<mask> {isDataLoading ?
<mask> <Loading /> :
<mask> <Fragment>
<mask> <Config
<mask> dnsConfig={dnsConfig}
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/src/components/Settings/Dns/index.js | |
<Config
dnsConfig={dnsConfig}
setDnsConfig={setDnsConfig}
/> | <mask> dnsConfig={dnsConfig}
<mask> setDnsConfig={setDnsConfig}
<mask> />
<mask> <Access access={access} setAccessList={setAccessList} />
<mask> </Fragment>}
<mask> </Fragment>
... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17 | client/src/components/Settings/Dns/index.js |
<mask> /dist/
<mask> /client/node_modules/
<mask> /querylog.json
<mask> /querylog.json.1
<mask> /scripts/translations/node_modules
<mask> /scripts/translations/oneskyapp.json
<mask> /a_main-packr.go
<mask>
<mask> # Test output
<mask> dnsfilter/tests/top-1m.csv
<mask> dnsfilter/tests/dnsfilter.TestLotsOfRule... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514 | .gitignore | |
"example_upstream_reserved": "you can specify DNS upstream <0>for a specific domain(s)</0>", | <mask> {
<mask> "client_settings": "Client settings",
<mask> "example_upstream_reserved": "you can specify DNS upstream <0>for a specific domain(s)<\/0>",
<mask> "upstream_parallel": "Use parallel queries to speed up resolving by simultaneously querying all upstream servers",
<mask> "bootstrap_dns"... | [
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514 | client/src/__locales/en.json |
"bootstrap_dns_desc": "Bootstrap DNS servers are used to resolve IP addresses of the DoH/DoT resolvers you specify as upstreams.", | <mask> "client_settings": "Client settings",
<mask> "example_upstream_reserved": "you can specify DNS upstream <0>for a specific domain(s)<\/0>",
<mask> "upstream_parallel": "Use parallel queries to speed up resolving by simultaneously querying all upstream servers",
<mask> "bootstrap_dns": "Bootstr... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514 | client/src/__locales/en.json |
"dhcp_dynamic_ip_found": "Your system uses dynamic IP address configuration for interface <0>{{interfaceName}}</0>. In order to use DHCP server a static IP address must be set. Your current IP address is <0>{{ipAddress}}</0>. We will automatically set this IP address as static if you press Enable DHCP button.", | <mask> "dhcp_table_expires": "Expires",
<mask> "dhcp_warning": "If you want to enable DHCP server anyway, make sure that there is no other active DHCP server in your network. Otherwise, it can break the Internet for connected devices!",
<mask> "dhcp_error": "We could not determine whether there is anothe... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514 | client/src/__locales/en.json |
"stats_malware_phishing": "Blocked malware/phishing", | <mask> "disabled_protection": "Disabled protection",
<mask> "refresh_statics": "Refresh statistics",
<mask> "dns_query": "DNS Queries",
<mask> "blocked_by": "Blocked by Filters",
<mask> "stats_malware_phishing": "Blocked malware\/phishing",
<mask> "stats_adult": "Blocked adult websites",
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514 | client/src/__locales/en.json |
"filters_block_toggle_hint": "You can setup blocking rules in the <a href='#filters'>Filters</a> settings.", | <mask> "number_of_dns_query_to_safe_search": "A number of DNS requests to search engines for which Safe Search was enforced",
<mask> "average_processing_time": "Average processing time",
<mask> "average_processing_time_hint": "Average time in milliseconds on processing a DNS request",
<mask> "block_... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514 | client/src/__locales/en.json |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.