docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
port := int(config.HTTPConfig.Address.Port())
<mask> if Context.tls != nil { <mask> Context.tls.WriteDiskConfig(&tlsConf) <mask> } <mask> <mask> port := config.BindPort <mask> if proto == aghhttp.SchemeHTTPS { <mask> port = tlsConf.PortHTTPS <mask> } <mask> <mask> // TODO(e.burkov): Inspect and perhaps merge with the previous condition. </s>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/home.go
bindHost := config.HTTPConfig.Address.Addr() if !bindHost.IsUnspecified() { printWebAddrs(proto, bindHost.String(), port)
<mask> <mask> return <mask> } <mask> <mask> bindhost := config.BindHost <mask> if !bindhost.IsUnspecified() { <mask> printWebAddrs(proto, bindhost.String(), port) <mask> <mask> return <mask> } <mask> <mask> ifaces, err := aghnet.GetValidNetInterfacesForWeb() </s> Pull request: home: http con...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/home.go
printWebAddrs(proto, bindHost.String(), port)
<mask> log.Error("web: getting iface ips: %s", err) <mask> // That's weird, but we'll ignore it. <mask> // <mask> // TODO(e.burkov): Find out when it happens. <mask> printWebAddrs(proto, bindhost.String(), port) <mask> <mask> return <mask> } <mask> <mask> for _, iface := range ifaces { </s> P...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/home.go
printWebAddrs(proto, addr.String(), port)
<mask> } <mask> <mask> for _, iface := range ifaces { <mask> for _, addr := range iface.Addresses { <mask> printWebAddrs(proto, addr.String(), config.BindPort) <mask> } <mask> } <mask> } <mask> <mask> // ------------------- </s> Pull request: home: http conf Updates #2860. Squashed commit of th...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/home.go
tcpPort(config.HTTPConfig.Address.Port()),
<mask> } <mask> <mask> if setts.Enabled { <mask> err = validatePorts( <mask> tcpPort(config.BindPort), <mask> tcpPort(setts.PortHTTPS), <mask> tcpPort(setts.PortDNSOverTLS), <mask> tcpPort(setts.PortDNSCrypt), <mask> udpPort(config.DNS.Port), <mask> udpPort(setts.PortDNSOverQUIC), </s>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/tls.go
tcpPort(config.HTTPConfig.Address.Port()),
<mask> } <mask> <mask> if req.Enabled { <mask> err = validatePorts( <mask> tcpPort(config.BindPort), <mask> tcpPort(req.PortHTTPS), <mask> tcpPort(req.PortDNSOverTLS), <mask> tcpPort(req.PortDNSCrypt), <mask> udpPort(config.DNS.Port), <mask> udpPort(req.PortDNSOverQUIC), </s> Pull requ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/tls.go
"net/netip"
<mask> "bytes" <mask> "fmt" <mask> "net/url" <mask> "os" <mask> "path" <mask> "path/filepath" </s> Pull request: home: http conf Updates #2860. Squashed commit of the following: commit 0d55a99d5c0b9f1d8c9497775dd69929e5091eaa Merge: 73a203ac8 d4a4bda64 Author: Dimitry Kolyshev <dkolyshev@adguard.com> Da...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/upgrade.go
const currentSchemaVersion = 23
<mask> yaml "gopkg.in/yaml.v3" <mask> ) <mask> <mask> // currentSchemaVersion is the current schema version. <mask> const currentSchemaVersion = 22 <mask> <mask> // These aliases are provided for convenience. <mask> type ( <mask> yarr = []any <mask> yobj = map[string]any </s> Pull request: home: http co...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/upgrade.go
upgradeSchema22to23,
<mask> upgradeSchema20to21, <mask> upgradeSchema21to22, <mask> } <mask> <mask> n := 0 <mask> for i, u := range upgrades { </s> Pull request: home: http conf Updates #2860. Squashed commit of the following: commit 0d55a99d5c0b9f1d8c9497775dd69929e5091eaa Merge: 73a203ac8 d4a4bda64 Author: Dimitry Kolys...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/upgrade.go
addrPort := netip.AddrPortFrom(config.HTTPConfig.Address.Addr(), uint16(port)) return aghnet.CheckPort("tcp", addrPort) == nil
<mask> if Context.web.httpsServer.server != nil { <mask> return true <mask> } <mask> <mask> return aghnet.CheckPort("tcp", netip.AddrPortFrom(config.BindHost, uint16(port))) == nil <mask> } <mask> <mask> // tlsConfigChanged updates the TLS configuration and restarts the HTTPS server <mask> // if necessa...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/39f5c50acd9da08dca22a0a3170f3f47446210df
internal/home/web.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "net/http" <mask> "os" <mask> "strings" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> func httpError(r *http.Request, w http.ResponseWriter, code int...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/dhcpd/http.go
hasStaticIP, err = aghnet.IfaceHasStaticIP(ifaceName)
<mask> } <mask> <mask> func (s *Server) enableDHCP(ifaceName string) (code int, err error) { <mask> var hasStaticIP bool <mask> hasStaticIP, err = sysutil.IfaceHasStaticIP(ifaceName) <mask> if err != nil { <mask> if errors.Is(err, os.ErrPermission) { <mask> // ErrPermission may happen here on Linux sys...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/dhcpd/http.go
} else if errors.Is(err, aghnet.ErrNoStaticIPInfo) {
<mask> // to log it. Think about it more. <mask> log.Info("error while checking static ip: %s; "+ <mask> "assuming machine has static ip and going on", err) <mask> hasStaticIP = true <mask> } else if errors.Is(err, sysutil.ErrNoStaticIPInfo) { <mask> // Couldn't obtain a definitive answer. Ass...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/dhcpd/http.go
err = aghnet.IfaceSetStaticIP(ifaceName)
<mask> } <mask> } <mask> <mask> if !hasStaticIP { <mask> err = sysutil.IfaceSetStaticIP(ifaceName) <mask> if err != nil { <mask> err = fmt.Errorf("setting static ip: %w", err) <mask> <mask> return http.StatusInternalServerError, err <mask> } </s> Pull request: create aghnet package Merge i...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/dhcpd/http.go
ifaces, err := aghnet.GetValidNetInterfaces()
<mask> <mask> func (s *Server) handleDHCPInterfaces(w http.ResponseWriter, r *http.Request) { <mask> response := map[string]netInterfaceJSON{} <mask> <mask> ifaces, err := util.GetValidNetInterfaces() <mask> if err != nil { <mask> httpError(r, w, http.StatusInternalServerError, "Couldn't get interfaces: %...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/dhcpd/http.go
jsonIface.GatewayIP = aghnet.GatewayIP(iface.Name)
<mask> jsonIface.Addrs6 = append(jsonIface.Addrs6, ipnet.IP) <mask> } <mask> } <mask> if len(jsonIface.Addrs4)+len(jsonIface.Addrs6) != 0 { <mask> jsonIface.GatewayIP = sysutil.GatewayIP(iface.Name) <mask> response[iface.Name] = jsonIface <mask> } <mask> } <mask> <mask> err = json.NewEnc...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/dhcpd/http.go
isStaticIP, err := aghnet.IfaceHasStaticIP(interfaceName)
<mask> } <mask> <mask> found4, err4 := CheckIfOtherDHCPServersPresentV4(interfaceName) <mask> <mask> isStaticIP, err := sysutil.IfaceHasStaticIP(interfaceName) <mask> if err != nil { <mask> result.V4.StaticIP.Static = "error" <mask> result.V4.StaticIP.Error = err.Error() <mask> } else if !isStaticIP...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/dhcpd/http.go
result.V4.StaticIP.IP = aghnet.GetSubnet(interfaceName).String()
<mask> result.V4.StaticIP.Static = "error" <mask> result.V4.StaticIP.Error = err.Error() <mask> } else if !isStaticIP { <mask> result.V4.StaticIP.Static = "no" <mask> result.V4.StaticIP.IP = util.GetSubnet(interfaceName).String() <mask> } <mask> <mask> if found4 { <mask> result.V4.OtherServer.Fou...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/dhcpd/http.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "strconv" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> // getAddrsResponse is the response for /ins...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
WebPort int `json:"web_port"` DNSPort int `json:"dns_port"` Interfaces map[string]*aghnet.NetInterface `json:"interfaces"`
<mask> ) <mask> <mask> // getAddrsResponse is the response for /install/get_addresses endpoint. <mask> type getAddrsResponse struct { <mask> WebPort int `json:"web_port"` <mask> DNSPort int `json:"dns_port"` <mask> Interfaces map[string]*util.NetInter...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
ifaces, err := aghnet.GetValidNetInterfacesForWeb()
<mask> data := getAddrsResponse{} <mask> data.WebPort = 80 <mask> data.DNSPort = 53 <mask> <mask> ifaces, err := util.GetValidNetInterfacesForWeb() <mask> if err != nil { <mask> httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err) <mask> return <mask> } <mask> </s> Pul...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
data.Interfaces = make(map[string]*aghnet.NetInterface)
<mask> httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err) <mask> return <mask> } <mask> <mask> data.Interfaces = make(map[string]*util.NetInterface) <mask> for _, iface := range ifaces { <mask> data.Interfaces[iface.Name] = iface <mask> } <mask> <mask> w.Header().Set...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
err = aghnet.CheckPortAvailable(reqData.Web.IP, reqData.Web.Port)
<mask> return <mask> } <mask> <mask> if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort && reqData.Web.Port != config.BetaBindPort { <mask> err = util.CheckPortAvailable(reqData.Web.IP, reqData.Web.Port) <mask> if err != nil { <mask> respData.Web.Status = err.Error() <mask> } <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
err = aghnet.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask> } <mask> } <mask> <mask> if reqData.DNS.Port != 0 { <mask> err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port) <mask> <mask> if util.ErrorIsAddrInUse(err) { <mask> canAutofix := checkDNSStubListener() <mask> if canAutofix && reqData.DNS.Autofix { <mask> </s> Pull req...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
if aghnet.ErrorIsAddrInUse(err) {
<mask> <mask> if reqData.DNS.Port != 0 { <mask> err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port) <mask> <mask> if util.ErrorIsAddrInUse(err) { <mask> canAutofix := checkDNSStubListener() <mask> if canAutofix && reqData.DNS.Autofix { <mask> <mask> err = disableDNSStubListe...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
err = aghnet.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask> if err != nil { <mask> log.Error("Couldn't disable DNSStubListener: %s", err) <mask> } <mask> <mask> err = util.CheckPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port) <mask> canAutofix = false <mask> } <mask> <mask> respData.DNS.CanAutofix = canAutofix <mask> } </s> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
err = aghnet.CheckPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask> respData.DNS.CanAutofix = canAutofix <mask> } <mask> <mask> if err == nil { <mask> err = util.CheckPortAvailable(reqData.DNS.IP, reqData.DNS.Port) <mask> } <mask> <mask> if err != nil { <mask> respData.DNS.Status = err.Error() <mask> } else if !reqData.DNS.IP.IsUnspecified() { </s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
interfaceName := aghnet.GetInterfaceByIP(ip)
<mask> // Or if set=true, it tries to set it <mask> func handleStaticIP(ip net.IP, set bool) staticIPJSON { <mask> resp := staticIPJSON{} <mask> <mask> interfaceName := util.GetInterfaceByIP(ip) <mask> resp.Static = "no" <mask> <mask> if len(interfaceName) == 0 { <mask> resp.Static = "error" <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
err := aghnet.IfaceSetStaticIP(interfaceName)
<mask> } <mask> <mask> if set { <mask> // Try to set static IP for the specified interface <mask> err := sysutil.IfaceSetStaticIP(interfaceName) <mask> if err != nil { <mask> resp.Static = "error" <mask> resp.Error = err.Error() <mask> return resp <mask> } </s> Pull request: create aghnet...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
isStaticIP, err := aghnet.IfaceHasStaticIP(interfaceName)
<mask> } <mask> <mask> // Fallthrough here even if we set static IP <mask> // Check if we have a static IP and return the details <mask> isStaticIP, err := sysutil.IfaceHasStaticIP(interfaceName) <mask> if err != nil { <mask> resp.Static = "error" <mask> resp.Error = err.Error() <mask> } else { <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
resp.IP = aghnet.GetSubnet(interfaceName).String()
<mask> } else { <mask> if isStaticIP { <mask> resp.Static = "yes" <mask> } <mask> resp.IP = util.GetSubnet(interfaceName).String() <mask> } <mask> return resp <mask> } <mask> <mask> // Check if DNSStubListener is active </s> Pull request: create aghnet package Merge in DNS/adguard-home from mk-...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
err = aghnet.CheckPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
<mask> } <mask> <mask> // validate that hosts and ports are bindable <mask> if restartHTTP { <mask> err = util.CheckPortAvailable(newSettings.Web.IP, newSettings.Web.Port) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s", <mask> net....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
err = aghnet.CheckPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
<mask> } <mask> <mask> } <mask> <mask> err = util.CheckPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "%s", err) <mask> return <mask> } <mask> </s> Pull request: create aghnet package Merge in DNS/adguard-home from...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
err = aghnet.CheckPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
<mask> httpError(w, http.StatusBadRequest, "%s", err) <mask> return <mask> } <mask> <mask> err = util.CheckPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "%s", err) <mask> return <mask> } <mask> </s> Pull request: create...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
WebPort int `json:"web_port"` DNSPort int `json:"dns_port"` Interfaces []*aghnet.NetInterface `json:"interfaces"`
<mask> // <mask> // TODO(e.burkov): This should removed with the API v1 when the appropriate <mask> // functionality will appear in default firstRunData. <mask> type getAddrsResponseBeta struct { <mask> WebPort int `json:"web_port"` <mask> DNSPort int `json:"dns_port"` <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
ifaces, err := aghnet.GetValidNetInterfacesForWeb()
<mask> data := getAddrsResponseBeta{} <mask> data.WebPort = 80 <mask> data.DNSPort = 53 <mask> <mask> ifaces, err := util.GetValidNetInterfacesForWeb() <mask> if err != nil { <mask> httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err) <mask> return <mask> } <mask> </s>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlinstall.go
"github.com/AdguardTeam/AdGuardHome/internal/aghos"
<mask> "runtime" <mask> "syscall" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil" <mask> "github.com/AdguardTeam/AdGuardHome/internal/updater" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> // temporaryError is the interface for temporary errors fro...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlupdate.go
canUpdate, _ = aghos.CanBindPrivilegedPorts()
<mask> tlsConf.PortDNSOverTLS < 1024 || <mask> tlsConf.PortDNSOverQUIC < 1024)) || <mask> config.BindPort < 1024 || <mask> config.DNS.Port < 1024) { <mask> canUpdate, _ = sysutil.CanBindPrivilegedPorts() <mask> } <mask> vr.CanAutoUpdate = &canUpdate <mask> } <mask> } <mask> </s> Pull...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/controlupdate.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "path/filepath" <mask> "strconv" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog" <mask> "...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/dns.go
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog" <mask> "github.com/AdguardTeam/AdGuardHome/internal/stats" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/dns.go
if !Context.ipDetector.DetectSpecialNetwork(ip) {
<mask> <mask> if !ip.IsLoopback() { <mask> Context.rdns.Begin(ip) <mask> } <mask> if !Context.ipDetector.detectSpecialNetwork(ip) { <mask> Context.whois.Begin(ip) <mask> } <mask> } <mask> <mask> func generateServerConfig() (newconfig dnsforward.ServerConfig, err error) { </s> Pull request: create a...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/dns.go
ifaces, e := aghnet.GetValidNetInterfacesForWeb()
<mask> func getDNSAddresses() []string { <mask> dnsAddresses := []string{} <mask> <mask> if config.DNS.BindHost.IsUnspecified() { <mask> ifaces, e := util.GetValidNetInterfacesForWeb() <mask> if e != nil { <mask> log.Error("Couldn't get network interfaces: %v", e) <mask> return []string{} <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/dns.go
if !Context.ipDetector.DetectSpecialNetwork(ip) {
<mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) { <mask> if !ip.IsLoopback() { <mask> Context.rdns.Begin(ip) <mask> } <mask> if !Context.ipDetector.detectSpecialNetwork(ip) { <mask> Context.whois.Begin(ip) <mask> } <mask> } <mask> <mask> return nil </s> Pull reques...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/dns.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet" "github.com/AdguardTeam/AdGuardHome/internal/aghos"
<mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/AdGuardHome/internal/que...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward" <mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog" <mask> "github.com/AdguardTeam/AdGuardHome/internal/stats" <mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil" ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
ipDetector *aghnet.IPDetector
<mask> tls *TLSMod // TLS module <mask> autoHosts util.AutoHosts // IP-hostname pairs taken from system configuration (e.g. /etc/hosts) files <mask> updater *updater.Updater <mask> <mask> ipDetector *ipDetector <mask> <mask> // mux is our custom http.ServeMux. <mask> mux *h...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
aghos.SetRlimit(config.RlimitNoFile)
<mask> config.Clients = nil <mask> <mask> if (runtime.GOOS == "linux" || runtime.GOOS == "darwin") && <mask> config.RlimitNoFile != 0 { <mask> sysutil.SetRlimit(config.RlimitNoFile) <mask> } <mask> <mask> // override bind host/port from the console <mask> if args.bindHost != nil { <mask> config.B...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
Context.ipDetector, err = aghnet.NewIPDetector()
<mask> if Context.web == nil { <mask> log.Fatalf("Can't initialize Web module") <mask> } <mask> <mask> Context.ipDetector, err = newIPDetector() <mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> <mask> if !Context.firstRun { </s> Pull request: create aghnet package Merge in DNS/adguar...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
admin, _ := aghos.HaveAdminRights()
<mask> <mask> if runtime.GOOS == "windows" { <mask> // On Windows we need to have admin rights to run properly <mask> <mask> admin, _ := sysutil.HaveAdminRights() <mask> if admin { <mask> return <mask> } <mask> <mask> log.Fatal("This is the first launch of AdGuard Home. You must run it as Adm...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
ok, err := aghnet.CanBindPort(53)
<mask> log.Fatal("This is the first launch of AdGuard Home. You must run it as Administrator.") <mask> } <mask> <mask> // We should check if AdGuard Home is able to bind to port 53 <mask> ok, err := util.CanBindPort(53) <mask> <mask> if ok { <mask> log.Info("AdGuard Home can bind to port 53") <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
err := aghos.ConfigureSyslog(serviceName)
<mask> } <mask> <mask> if ls.LogFile == configSyslog { <mask> // Use syslog where it is possible and eventlog on Windows <mask> err := sysutil.ConfigureSyslog(serviceName) <mask> if err != nil { <mask> log.Fatalf("cannot initialize syslog: %s", err) <mask> } <mask> } else { <mask> logFilePath...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
ifaces, err := aghnet.GetValidNetInterfacesForWeb()
<mask> log.Printf("Go to https://%s:%s", tlsConf.ServerName, port) <mask> } <mask> } else if config.BindHost.IsUnspecified() { <mask> log.Println("AdGuard Home is available on the following addresses:") <mask> ifaces, err := util.GetValidNetInterfacesForWeb() <mask> if err != nil { <mask> // That'...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/home.go
"github.com/AdguardTeam/AdGuardHome/internal/aghos"
<mask> "strconv" <mask> "strings" <mask> "syscall" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/sysutil" <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/kardianos/service" <mask> ) <mask> </s> Pull request: create ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/service.go
err = aghos.SendProcessSignal(pid, syscall.SIGHUP)
<mask> if err != nil { <mask> log.Error("Can't read PID file %s: %s", pidfile, err) <mask> return <mask> } <mask> err = sysutil.SendProcessSignal(pid, syscall.SIGHUP) <mask> if err != nil { <mask> log.Error("Can't send signal to PID %d: %s", pid, err) <mask> return <mask> } <mask> log.Debug("Sen...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/service.go
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "strconv" <mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/util" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/NYTimes/gziphandler" <mask> "github.com/gobuffalo/packr" <mask> ) <mask> </s> Pull request: create aghnet package Merge in DNS/...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/web.go
err := aghnet.CheckPortAvailable(config.BindHost, port)
<mask> if Context.web.httpsServer.server != nil { <mask> alreadyRunning = true <mask> } <mask> if !alreadyRunning { <mask> err := util.CheckPortAvailable(config.BindHost, port) <mask> if err != nil { <mask> return false <mask> } <mask> } <mask> return true </s> Pull request: create aghnet pac...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3a67cc2c4593df1d169a316480130fec7f3d45b1
internal/home/web.go
"version": "1.2.5", "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz", "integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUxkDWcgIXLw==",
<mask> "minimist": "^1.2.0" <mask> } <mask> }, <mask> "minimist": { <mask> "version": "1.2.0", <mask> "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz", <mask> "integrity": "sha1-o1AIsg9BOD7sH7kU9M1d95omQoQ=", <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "5.7.4", "resolved": "https://registry.npmjs.org/acorn/-/acorn-5.7.4.tgz", "integrity": "sha512-1D++VG7BhrtvQpNbBzovKNc1FLGGEE/oGe7b9xJm/RFHMBeUaUGpluV9RLjZa47YFdPcDAenEYuq9pQPcMdLJg==",
<mask> "negotiator": "0.6.1" <mask> } <mask> }, <mask> "acorn": { <mask> "version": "5.7.2", <mask> "resolved": "https://registry.npmjs.org/acorn/-/acorn-5.7.2.tgz", <mask> "integrity": "sha512-cJrKCNcr2kv8dlDnbw+JPUGjHZzo4myaxOLmpOX8a+rgX94YeTcTMv/LFJUSByRpc+i4GgVnnhLxvMu...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"resolved": "",
<mask> "dev": true <mask> }, <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90Oj...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"resolved": "",
<mask> "dev": true <mask> }, <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90Oj...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"coa": { "version": "2.0.2", "resolved": "https://registry.npmjs.org/coa/-/coa-2.0.2.tgz", "integrity": "sha512-q5/jG+YQnSy4nRTV4F7lPepBJZ8qBNJJDBuJdoejDyLXgmL7IEo+Le2JDZudFTFt7mrCqIRaSjws4ygRCTCAXA==", "dev": true, "requires": { "@types/q": "^1.5.1", "chalk": "^2.4.1",...
<mask> "resolved": "https://registry.npmjs.org/co/-/co-4.6.0.tgz", <mask> "integrity": "sha1-bqa989hTrlTMuOR7+gvz+QMfsYQ=", <mask> "dev": true <mask> }, <mask> "code-point-at": { <mask> "version": "1.1.0", <mask> "resolved": "https://registry.npmjs.org/code-point-at/-/code-p...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"resolved": "",
<mask> } <mask> }, <mask> "minimist": { <mask> "version": "1.2.0", <mask> "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz", <mask> "integrity": "sha1-o1AIsg9BOD7sH7kU9M1d95omQoQ=", <mask> "dev": true <mask> }, <mask...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "6.0.3", "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz", "integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==",
<mask> "integrity": "sha1-TkMekrEalzFjaqH5yNHMvP2reN8=", <mask> "dev": true <mask> }, <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"esprima": { "version": "4.0.1", "resolved": "https://registry.npmjs.org/esprima/-/esprima-4.0.1.tgz", "integrity": "sha512-eGuFFw7Upda+g4p+QHvnW0RyTX/SVeJBDM/gCtMARO0cLuT2HcEKnTPvhjV6aGeqrCB/sbNop0Kszm0jsaWU4A==", "dev": true },
<mask> } <mask> }, <mask> "esquery": { <mask> "version": "1.0.1", <mask> "resolved": "https://registry.npmjs.org/esquery/-/esquery-1.0.1.tgz", <mask> "integrity": "sha512-SmiyZ5zIWH9VM+SRUReLS5Q8a7GxtRdxEBVZpm98rJM7Sb+A9DVCndXfkeFUd3byderg+EbDkfnevfCwynWaNA==", <mask> "dev":...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"resolved": "",
<mask> } <mask> }, <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90OjzBTme2QqA=...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "6.0.3", "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz", "integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==",
<mask> "which": "^1.3.1" <mask> }, <mask> "dependencies": { <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPU...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "4.3.0", "resolved": "https://registry.npmjs.org/gonzales-pe/-/gonzales-pe-4.3.0.tgz", "integrity": "sha512-otgSPpUmdWJ43VXyiNgEYE4luzHCL2pz4wQ0OnDluC6Eg4Ko3Vexy/SrSynglw/eR+OhkzmqFCZa/OFa/RgAOQ==",
<mask> "integrity": "sha1-L0SUrIkZ43Z8XLtpHp9GMyQoXUM=", <mask> "dev": true <mask> }, <mask> "gonzales-pe": { <mask> "version": "4.2.3", <mask> "resolved": "https://registry.npmjs.org/gonzales-pe/-/gonzales-pe-4.2.3.tgz", <mask> "integrity": "sha512-Kjhohco0esHQnOiqqdJeNz/5f...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"minimist": "^1.2.5"
<mask> "resolved": "https://registry.npmjs.org/gonzales-pe/-/gonzales-pe-4.2.3.tgz", <mask> "integrity": "sha512-Kjhohco0esHQnOiqqdJeNz/5fyPkOMD/d6XVjwTAoPGUFh0mCollPUTUTa2OZy4dYNAqlPIQdTiNzJTWdd9Htw==", <mask> "dev": true, <mask> "requires": { <mask> "minimist": "1.1.x" <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"has-symbols": { "version": "1.0.1", "resolved": "https://registry.npmjs.org/has-symbols/-/has-symbols-1.0.1.tgz", "integrity": "sha512-PLcsoqu++dmEIZB+6totNFKq/7Do+Z0u4oT0zKOJNl3lYK6vGwwu2hjHs+68OEZbTjiUE9bgOABXbP/GvrS0Kg==", "dev": true },
<mask> "version": "3.0.0", <mask> "resolved": "https://registry.npmjs.org/has-flag/-/has-flag-3.0.0.tgz", <mask> "integrity": "sha1-tdRU3CGZriJWmfNGfloH87lVuv0=" <mask> }, <mask> "has-value": { <mask> "version": "1.0.0", <mask> "resolved": "https://registry.npmjs.org/has-val...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "6.0.3", "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz", "integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==",
<mask> "integrity": "sha1-TkMekrEalzFjaqH5yNHMvP2reN8=", <mask> "dev": true <mask> }, <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"js-yaml": { "version": "3.13.1", "resolved": "https://registry.npmjs.org/js-yaml/-/js-yaml-3.13.1.tgz", "integrity": "sha512-YfbcO7jXDdyj0DGxYVSlSeQNHbD7XPWvrVWeVUujrQEoZzWJIRrCPoyk6kL6IAjAG2IolMK4T0hNUe0HOUs5Jw==", "dev": true, "requires": { "argparse": "^1.0.7", "esp...
<mask> "resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-4.0.0.tgz", <mask> "integrity": "sha512-RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ==" <mask> }, <mask> "jsesc": { <mask> "version": "1.3.0", <mask> "resolved": "https://...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "1.0.3", "resolved": "https://registry.npmjs.org/loader-fs-cache/-/loader-fs-cache-1.0.3.tgz", "integrity": "sha512-ldcgZpjNJj71n+2Mf6yetz+c9bM4xpKtNds4LbqXzU/PTdeAX0g3ytnU1AJMEcTk2Lex4Smpe3Q/eCTsvUBxbA==",
<mask> "strip-bom": "^3.0.0" <mask> } <mask> }, <mask> "loader-fs-cache": { <mask> "version": "1.0.1", <mask> "resolved": "https://registry.npmjs.org/loader-fs-cache/-/loader-fs-cache-1.0.1.tgz", <mask> "integrity": "sha1-VuC/CL2XCLJqdltoUJhAyN7J/bw=", <mask> "dev":...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"mkdirp": "^0.5.1"
<mask> "integrity": "sha1-VuC/CL2XCLJqdltoUJhAyN7J/bw=", <mask> "dev": true, <mask> "requires": { <mask> "find-cache-dir": "^0.1.1", <mask> "mkdirp": "0.5.1" <mask> }, <mask> "dependencies": { <mask> "find-cache-dir": { <mask> "version": "0.1.1", ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "2.0.4", "resolved": "https://registry.npmjs.org/mdn-data/-/mdn-data-2.0.4.tgz", "integrity": "sha512-iV3XNKw06j5Q7mi6h+9vbx23Tv7JkjEVgKHW4pimwyDGWm0OIQntJJ+u1C6mg6mK1EaTv42XQ7w76yuzH7M2cA==",
<mask> "unist-util-visit": "^1.1.0" <mask> } <mask> }, <mask> "mdn-data": { <mask> "version": "1.1.4", <mask> "resolved": "https://registry.npmjs.org/mdn-data/-/mdn-data-1.1.4.tgz", <mask> "integrity": "sha512-FSYbp3lyKjyj3E7fMl6rYvUdX0FBXaluGqlFoYESWQlyUTq8R+wp0rkFxoYFqZl...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "6.0.3", "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz", "integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==",
<mask> "to-regex": "^3.0.2" <mask> }, <mask> "dependencies": { <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40Qo...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "1.2.5", "resolved": "https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz", "integrity": "sha512-FM9nNUYrRBAELZQT3xeZQ7fmMOBg6nWNmJKTcgsJeaLstP/UODVpGsr5OhXhhXg6f+qtJ8uiZ+PUxkDWcgIXLw==",
<mask> "brace-expansion": "^1.1.7" <mask> } <mask> }, <mask> "minimist": { <mask> "version": "0.0.8", <mask> "resolved": "http://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz", <mask> "integrity": "sha1-hX/Kv8M5fSYluCKCYuhqp6ARsF0=", <mask> "dev": true <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "0.5.5", "resolved": "https://registry.npmjs.org/mkdirp/-/mkdirp-0.5.5.tgz", "integrity": "sha512-NKmAlESf6jMGym1++R0Ra7wvhV+wFW63FaSOFPwRahvea0gMUcGUhVeAg/0BC0wiv9ih5NYPB1Wn1UEI1/L+xQ==",
<mask> } <mask> } <mask> }, <mask> "mkdirp": { <mask> "version": "0.5.1", <mask> "resolved": "http://registry.npmjs.org/mkdirp/-/mkdirp-0.5.1.tgz", <mask> "integrity": "sha1-MAV0OOrGz3+MR2fzhkjWaX11yQM=", <mask> "dev": true, <mask> "requires": { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"minimist": "^1.2.5"
<mask> "resolved": "http://registry.npmjs.org/mkdirp/-/mkdirp-0.5.1.tgz", <mask> "integrity": "sha1-MAV0OOrGz3+MR2fzhkjWaX11yQM=", <mask> "dev": true, <mask> "requires": { <mask> "minimist": "0.0.8" <mask> } <mask> }, <mask> "move-concurrently": { <mask> "ver...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "6.0.3", "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz", "integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==",
<mask> "integrity": "sha1-qJS3XUvE9s1nnvMkSp/Y9Gri1Cg=", <mask> "dev": true <mask> }, <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"object-inspect": { "version": "1.7.0", "resolved": "https://registry.npmjs.org/object-inspect/-/object-inspect-1.7.0.tgz", "integrity": "sha512-a7pEHdh1xKIAgTySUGgLMx/xwDZskN1Ud6egYYN3EdRW4ZMPNEDUTF+hwy2LUC+Bl+SyLXANnwz/jyh/qutKUw==", "dev": true },
<mask> "dev": true <mask> }, <mask> "object-keys": { <mask> "version": "1.0.12", <mask> "resolved": "https://registry.npmjs.org/object-keys/-/object-keys-1.0.12.tgz", <mask> "integrity": "sha512-FTMyFUm2wBcGHnH2eXmz7tC6IwlqQZ6mVZ+6dm6vZ4IQIHjs6FdNsQBuKGPuUUUY6NfJw2PshC08Tn6LzLDOag=...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"object.assign": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/object.assign/-/object.assign-4.1.0.tgz", "integrity": "sha512-exHJeq6kBKj58mqGyTQ9DFvrZC/eR6OwxzoM9YRoGBqrXYonaFyGiFMuc9VZrXf7DarreEwMpurG3dd+CNyW5w==", "dev": true, "requires": { "define-properties...
<mask> "dev": true <mask> } <mask> } <mask> }, <mask> "object.getownpropertydescriptors": { <mask> "version": "2.0.3", <mask> "resolved": "https://registry.npmjs.org/object.getownpropertydescriptors/-/object.getownpropertydescriptors-2.0.3.tgz", <mask> "integrit...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "1.0.25", "resolved": "https://registry.npmjs.org/portfinder/-/portfinder-1.0.25.tgz", "integrity": "sha512-6ElJnHBbxVA1XSLgBp7G1FiCkQdlqGzuF7DswL5tcea+E8UpuvPU7beVAjjRwCioTS9ZluNbu+ZyRvgTsmqEBg==",
<mask> "integrity": "sha512-ARhBOdzS3e41FbkW/XWrTEtukqqLoK5+Z/4UeDaLuSW+39JPeFgs4gCGqsrJHVZX0fUrx//4OF0K1CUGwlIFow==", <mask> "dev": true <mask> }, <mask> "portfinder": { <mask> "version": "1.0.20", <mask> "resolved": "https://registry.npmjs.org/portfinder/-/portfinder-1.0.20.tgz",...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"async": "^2.6.2", "debug": "^3.1.1", "mkdirp": "^0.5.1"
<mask> "resolved": "https://registry.npmjs.org/portfinder/-/portfinder-1.0.20.tgz", <mask> "integrity": "sha512-Yxe4mTyDzTd59PZJY4ojZR8F+E5e97iq2ZOHPz3HDgSvYC5siNad2tLooQ5y5QHyQhc3xVqvyk/eNA3wuoa7Sw==", <mask> "dev": true, <mask> "requires": { <mask> "async": "^1.5.2", <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "2.6.3", "resolved": "https://registry.npmjs.org/async/-/async-2.6.3.tgz", "integrity": "sha512-zflvls11DCy+dQWzTW2dzuilv8Z5X/pjfmZOWba6TNIVDm+2UDaJmXSOXlasHKfNBs8oo3M0aT50fDEWfKZjXg==", "dev": true, "requires": { "lodash": "^4.17.14" }
<mask> "mkdirp": "0.5.x" <mask> }, <mask> "dependencies": { <mask> "async": { <mask> "version": "1.5.2", <mask> "resolved": "https://registry.npmjs.org/async/-/async-1.5.2.tgz", <mask> "integrity": "sha1-7GphrlZIDAw8skHJVhjiCJL5Zyo=", <mask> "d...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "3.2.6", "resolved": "https://registry.npmjs.org/debug/-/debug-3.2.6.tgz", "integrity": "sha512-mel+jf7nrtEl5Pn1Qx46zARXKDpBbvzezse7p7LqINmdoIk8PYP5SySaxEmYv6TZ0JyEKA1hsCId6DIhgITtWQ==",
<mask> "integrity": "sha1-7GphrlZIDAw8skHJVhjiCJL5Zyo=", <mask> "dev": true <mask> }, <mask> "debug": { <mask> "version": "2.6.9", <mask> "resolved": "https://registry.npmjs.org/debug/-/debug-2.6.9.tgz", <mask> "integrity": "sha512-bC7ElrdJaJnPbAP...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"ms": "^2.1.1"
<mask> "resolved": "https://registry.npmjs.org/debug/-/debug-2.6.9.tgz", <mask> "integrity": "sha512-bC7ElrdJaJnPbAP+1EotYvqZsb3ecl5wi6Bfi6BJTUcNowp6cvspg0jXznRTKDjm/E7AdgFBVeAPVMNcKGsHMA==", <mask> "dev": true, <mask> "requires": { <mask> "ms": "2.0.0" <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
}, "ms": { "version": "2.1.2", "resolved": "https://registry.npmjs.org/ms/-/ms-2.1.2.tgz", "integrity": "sha512-sGkPx+VjMtmA6MX27oA4FBFELFCZZ4S4XqeGOXCv68tT+jb3vk/RyaKWP0PTKyWtmLSM0b+adUTEvbs1PEaH2w==", "dev": true
<mask> "requires": { <mask> "ms": "^2.1.1" <mask> } <mask> } <mask> } <mask> }, <mask> "posix-character-classes": { <mask> "version": "0.1.1", </s> + client: Switch places for "Upstream DNS servers" and "DNS servers configuration" </s> remove ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
<mask> "postcss": "6.x", <mask> "postcss-value-parser": "3.x", <mask> "svgo": "1.x", <mask> "xmldoc": "1.x" <mask> }, <mask> "dependencies": { <mask> "coa": { <mask> "version": "2.0.2", <mask> "resolved": "https://registry.npmjs.org/coa/-/...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"resolved": "",
<mask> "dev": true <mask> }, <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0XqDO+FvuaLX8DDjZ18CGFk7VygH40QoKPUQhW4e2rvM0rwUq0t8IQDOwYSeLK01U90Oj...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"stable": { "version": "0.1.8", "resolved": "https://registry.npmjs.org/stable/-/stable-0.1.8.tgz", "integrity": "sha512-ji9qxRnOVfcuLDySj9qzhGSEFVobyt1kIOSkj1qZzYLzq7Tos/oUUWvotUPQLlrsidqsK6tBH89Bc9kL5zHA6w==", "dev": true },
<mask> } <mask> }, <mask> "state-toggle": { <mask> "version": "1.0.1", <mask> "resolved": "https://registry.npmjs.org/state-toggle/-/state-toggle-1.0.1.tgz", <mask> "integrity": "sha512-Qe8QntFrrpWTnHwvwj2FZTgv+PKIsp0B9VxLzLLbSpPXWOgRgc5LVj/aTiSfK1RqIeF9jeC1UeOH8Q8y60A7og==", <mas...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"version": "6.0.3", "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.3.tgz", "integrity": "sha512-dcS1ul+9tmeD95T+x28/ehLgd9mENa3LsvDTtzm3vyBEO7RPptvAD+t44WVXaUjTBRcrpFeFlC8WCruUR456hw==",
<mask> "integrity": "sha1-TkMekrEalzFjaqH5yNHMvP2reN8=", <mask> "dev": true <mask> }, <mask> "kind-of": { <mask> "version": "6.0.2", <mask> "resolved": "https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz", <mask> "integrity": "sha512-s5kLOcnH0...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
"unquote": { "version": "1.1.1", "resolved": "https://registry.npmjs.org/unquote/-/unquote-1.1.1.tgz", "integrity": "sha1-j97XMk7G6IoP+LkF58CYzcCG1UQ=", "dev": true },
<mask> "integrity": "sha1-sr9O6FFKrmFltIF4KdIbLvSZBOw=", <mask> "dev": true <mask> }, <mask> "unset-value": { <mask> "version": "1.0.0", <mask> "resolved": "https://registry.npmjs.org/unset-value/-/unset-value-1.0.0.tgz", <mask> "integrity": "sha1-g3aHP30jNRef+x5vw6jtDfyKtVk...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/package-lock.json
<mask> <PageTitle title={t('dns_settings')} /> <mask> {isDataLoading ? <mask> <Loading /> : <mask> <Fragment> <mask> <Config <mask> dnsConfig={dnsConfig} <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/src/components/Settings/Dns/index.js
<Config dnsConfig={dnsConfig} setDnsConfig={setDnsConfig} />
<mask> dnsConfig={dnsConfig} <mask> setDnsConfig={setDnsConfig} <mask> /> <mask> <Access access={access} setAccessList={setAccessList} /> <mask> </Fragment>} <mask> </Fragment> ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0914715ee0be2a5b6236729b9976193db9bb17
client/src/components/Settings/Dns/index.js
<mask> /dist/ <mask> /client/node_modules/ <mask> /querylog.json <mask> /querylog.json.1 <mask> /scripts/translations/node_modules <mask> /scripts/translations/oneskyapp.json <mask> /a_main-packr.go <mask> <mask> # Test output <mask> dnsfilter/tests/top-1m.csv <mask> dnsfilter/tests/dnsfilter.TestLotsOfRule...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514
.gitignore
"example_upstream_reserved": "you can specify DNS upstream <0>for a specific domain(s)</0>",
<mask> { <mask> "client_settings": "Client settings", <mask> "example_upstream_reserved": "you can specify DNS upstream <0>for a specific domain(s)<\/0>", <mask> "upstream_parallel": "Use parallel queries to speed up resolving by simultaneously querying all upstream servers", <mask> "bootstrap_dns"...
[ "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514
client/src/__locales/en.json
"bootstrap_dns_desc": "Bootstrap DNS servers are used to resolve IP addresses of the DoH/DoT resolvers you specify as upstreams.",
<mask> "client_settings": "Client settings", <mask> "example_upstream_reserved": "you can specify DNS upstream <0>for a specific domain(s)<\/0>", <mask> "upstream_parallel": "Use parallel queries to speed up resolving by simultaneously querying all upstream servers", <mask> "bootstrap_dns": "Bootstr...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514
client/src/__locales/en.json
"dhcp_dynamic_ip_found": "Your system uses dynamic IP address configuration for interface <0>{{interfaceName}}</0>. In order to use DHCP server a static IP address must be set. Your current IP address is <0>{{ipAddress}}</0>. We will automatically set this IP address as static if you press Enable DHCP button.",
<mask> "dhcp_table_expires": "Expires", <mask> "dhcp_warning": "If you want to enable DHCP server anyway, make sure that there is no other active DHCP server in your network. Otherwise, it can break the Internet for connected devices!", <mask> "dhcp_error": "We could not determine whether there is anothe...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514
client/src/__locales/en.json
"stats_malware_phishing": "Blocked malware/phishing",
<mask> "disabled_protection": "Disabled protection", <mask> "refresh_statics": "Refresh statistics", <mask> "dns_query": "DNS Queries", <mask> "blocked_by": "Blocked by Filters", <mask> "stats_malware_phishing": "Blocked malware\/phishing", <mask> "stats_adult": "Blocked adult websites", ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514
client/src/__locales/en.json
"filters_block_toggle_hint": "You can setup blocking rules in the <a href='#filters'>Filters</a> settings.",
<mask> "number_of_dns_query_to_safe_search": "A number of DNS requests to search engines for which Safe Search was enforced", <mask> "average_processing_time": "Average processing time", <mask> "average_processing_time_hint": "Average time in milliseconds on processing a DNS request", <mask> "block_...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b0f2e5563bfa3411b258b1b9c0b9d74f5598514
client/src/__locales/en.json