docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
func setRlimit(val uint64) (err error) { return ErrUnsupported
<mask> func canBindPrivilegedPorts() (can bool, err error) { <mask> return HaveAdminRights() <mask> } <mask> <mask> func setRlimit(val uint) { <mask> } <mask> <mask> func haveAdminRights() (bool, error) { <mask> var token windows.Token <mask> h := windows.CurrentProcess() </s> Pull request: all: openbsd...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/aghos/os_windows.go
RlimitNoFile uint64 `yaml:"rlimit_nofile"` // Maximum number of opened fd's per process (0: default)
<mask> // attempts after AuthAttempts unsuccessful login attempts. <mask> AuthBlockMin uint `yaml:"block_auth_min"` <mask> ProxyURL string `yaml:"http_proxy"` // Proxy address for our HTTP client <mask> Language string `yaml:"language"` // two-letter ISO 639-1 language code <mask> RlimitNoFi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/config.go
// TODO(a.garipov): github.com/kardianos/service doesn't seem to // support OpenBSD currently. Either patch it to do so or make // our own implementation of the service.System interface. if runtime.GOOS == "openbsd" { log.Fatal("service actions are not supported on openbsd") }
<mask> }() <mask> <mask> if args.serviceControlAction != "" { <mask> handleServiceControlAction(args, clientBuildFS) <mask> <mask> return <mask> } <mask> </s> Pull request: all: openbsd support Updates #2439. Squashed commit of the following: commit 3ff109e43751132d77500256c8869938680ac281 Author:...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
func setupConfig(args options) (err error) {
<mask> <mask> Context.mux = http.NewServeMux() <mask> } <mask> <mask> func setupConfig(args options) { <mask> config.DHCP.WorkDir = Context.workDir <mask> config.DHCP.HTTPRegister = httpRegister <mask> config.DHCP.ConfigModified = onConfigModified <mask> <mask> Context.dhcpServer = dhcpd.Create(config...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
return fmt.Errorf("initing dhcp: %w", err)
<mask> // TODO(a.garipov): There are a lot of places in the code right <mask> // now which assume that the DHCP server can be nil despite this <mask> // condition. Inspect them and perhaps rewrite them to use <mask> // Enabled() instead. <mask> log.Fatalf("can't initialize dhcp module") <mask> } <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
if config.RlimitNoFile != 0 { err = aghos.SetRlimit(config.RlimitNoFile) if err != nil && !errors.Is(err, aghos.ErrUnsupported) { return fmt.Errorf("setting rlimit: %w", err) }
<mask> } <mask> Context.clients.Init(config.Clients, Context.dhcpServer, Context.etcHosts) <mask> config.Clients = nil <mask> <mask> if (runtime.GOOS == "linux" || runtime.GOOS == "darwin") && <mask> config.RlimitNoFile != 0 { <mask> aghos.SetRlimit(config.RlimitNoFile) <mask> } <mask> <mask> // o...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
return nil
<mask> Context.pidFileName = args.pidFile <mask> } <mask> } <mask> <mask> func initWeb(args options, clientBuildFS fs.FS) (web *Web, err error) { <mask> var clientFS, clientBetaFS fs.FS <mask> if args.localFrontend { <mask> log.Info("warning: using local frontend files") </s> Pull request: all: openbsd...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
func fatalOnError(err error) { if err != nil { log.Fatal(err) } }
<mask> return web, nil <mask> } <mask> <mask> // run performs configurating and starts AdGuard Home. <mask> func run(args options, clientBuildFS fs.FS) { <mask> var err error <mask> <mask> // configure config filename </s> Pull request: all: openbsd support Updates #2439. Squashed commit of the followin...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
var err error
<mask> // run performs configurating and starts AdGuard Home. <mask> func run(args options, clientBuildFS fs.FS) { <mask> // configure config filename <mask> initConfigFilename(args) <mask> <mask> // configure working dir and config path <mask> initWorkingDir(args) <mask> </s> Pull request: all: openbsd ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
err = setupConfig(args) fatalOnError(err)
<mask> // so we have to initialize filtering's static data first, <mask> // but also avoid relying on automatic Go init() function <mask> filtering.InitModule() <mask> <mask> setupConfig(args) <mask> <mask> if !Context.firstRun { <mask> // Save the updated config <mask> err := config.write() <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
err = config.write() fatalOnError(err)
<mask> setupConfig(args) <mask> <mask> if !Context.firstRun { <mask> // Save the updated config <mask> err := config.write() <mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> <mask> if config.DebugPProf { <mask> mux := http.NewServeMux() <mask> mux.HandleFunc("/debug/pprof/...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
err = os.MkdirAll(Context.getDataDir(), 0o755)
<mask> }() <mask> } <mask> } <mask> <mask> err := os.MkdirAll(Context.getDataDir(), 0o755) <mask> if err != nil { <mask> log.Fatalf("Cannot create DNS data dir at %s: %s", Context.getDataDir(), err) <mask> } <mask> <mask> sessFilename := filepath.Join(Context.getDataDir(), "sessions.db") </s> P...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
fatalOnError(err)
<mask> log.Fatalf("Can't initialize TLS module") <mask> } <mask> <mask> Context.web, err = initWeb(args, clientBuildFS) <mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> <mask> Context.subnetDetector, err = aghnet.NewSubnetDetector() <mask> if err != nil { <mask> log.Fatal(err) <mas...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
fatalOnError(err)
<mask> log.Fatal(err) <mask> } <mask> <mask> Context.subnetDetector, err = aghnet.NewSubnetDetector() <mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> <mask> if !Context.firstRun { <mask> err = initDNSServer() <mask> if err != nil { <mask> log.Fatalf("%s", err) </s> Pull reque...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
fatalOnError(err)
<mask> } <mask> <mask> if !Context.firstRun { <mask> err = initDNSServer() <mask> if err != nil { <mask> log.Fatalf("%s", err) <mask> } <mask> <mask> Context.tls.Start() <mask> Context.etcHosts.Start() <mask> <mask> go func() { </s> Pull request: all: openbsd support Updates #2439. Sq...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
fatalOnError(serr)
<mask> go func() { <mask> serr := startDNSServer() <mask> if serr != nil { <mask> closeDNSServer() <mask> log.Fatal(serr) <mask> } <mask> }() <mask> <mask> if Context.dhcpServer != nil { <mask> err = Context.dhcpServer.Start() </s> Pull request: all: openbsd support Updates #2439....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b
internal/home/home.go
if !data.usable {
<mask> } <mask> address := net.JoinHostPort(config.BindHost, strconv.Itoa(config.TLS.PortHTTPS)) <mask> // validate current TLS config and update warnings (it could have been loaded from file) <mask> data := validateCertificates(config.TLS) <mask> if data.WarningValidation != "" { <mask> log.Fa...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3c374b594000a47bef40c2d5d20d7ba677c74b31
app.go
// is usable? set by validator usable bool
<mask> ValidKey bool `yaml:"-" json:"valid_key"` <mask> KeyType string `yaml:"-" json:"key_type,omitempty"` <mask> <mask> // warnings <mask> Warning string `yaml:"-" json:"warning,omitempty"` <mask> WarningValidation string `yaml:"-" json:"warning_validation,omitempty"` <mask> } <mask> </s>...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3c374b594000a47bef40c2d5d20d7ba677c74b31
config.go
if data.usable {
<mask> } <mask> <mask> restartHTTPS := false <mask> data = validateCertificates(data) <mask> if data.WarningValidation == "" { <mask> if !reflect.DeepEqual(config.TLS.tlsConfigSettings, data.tlsConfigSettings) { <mask> log.Printf("tls config settings have changed, will restart HTTPS server") <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3c374b594000a47bef40c2d5d20d7ba677c74b31
control.go
data.usable = true
<mask> if err != nil { <mask> data.WarningValidation = fmt.Sprintf("Invalid certificate or key: %s", err) <mask> return data <mask> } <mask> } <mask> <mask> return data <mask> } <mask> </s> /tls/ -- add internal usable flag to simplify logic when https needs to be booted up </s> remove if data....
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3c374b594000a47bef40c2d5d20d7ba677c74b31
control.go
ifaceIPNet, err := ifaceIPv4Addrs(iface) if err != nil { return false, fmt.Errorf("getting ipv4 addrs for iface %s: %w", ifaceName, err) }
<mask> if err != nil { <mask> return false, fmt.Errorf("couldn't find interface by name %s: %w", ifaceName, err) <mask> } <mask> <mask> // get ipv4 address of an interface <mask> ifaceIPNet := getIfaceIPv4(*iface) <mask> if len(ifaceIPNet) == 0 { <mask> return false, fmt.Errorf("couldn't find IPv4 add...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
return false, fmt.Errorf("interface %s has no ipv4 addresses", ifaceName)
<mask> <mask> // get ipv4 address of an interface <mask> ifaceIPNet := getIfaceIPv4(*iface) <mask> if len(ifaceIPNet) == 0 { <mask> return false, fmt.Errorf("couldn't find IPv4 address of interface %s %+v", ifaceName, iface) <mask> } <mask> <mask> if runtime.GOOS == "darwin" { <mask> return false, f...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
// TODO(a.garipov): Find out what this is about. Perhaps this // information is outdated or at least incomplete.
<mask> return false, fmt.Errorf("interface %s has no ipv4 addresses", ifaceName) <mask> } <mask> <mask> if runtime.GOOS == "darwin" { <mask> return false, fmt.Errorf("can't find DHCP server: not supported on macOS") <mask> } <mask> </s> Pull request: * dhcpd: send secondary dns as well Merge in DNS/ad...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
ok, next, err := tryConn(req, c, iface) if next { continue } if ok { return true, nil
<mask> return false, fmt.Errorf("couldn't send a packet to %s: %w", dst, err) <mask> } <mask> <mask> for { <mask> // wait for answer <mask> log.Tracef("Waiting %v for an answer", defaultDiscoverTime) <mask> // TODO: replicate dhclient's behaviour of retrying several times with progressively bigger tim...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
log.Debug("%s", err)
<mask> log.Debug("DHCPv4: didn't receive DHCP response") <mask> return false, nil <mask> } <mask> if err != nil { <mask> return false, fmt.Errorf("couldn't receive packet: %w", err) <mask> } <mask> <mask> log.Tracef("Received packet (%v bytes)", n) <mask> <mask> response, err := dhcpv4.Fr...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
} }
<mask> if err != nil { <mask> log.Debug("%s", err) <mask> } <mask> <mask> // TODO(a.garipov): Refactor further. Inspect error handling, remove the next <mask> // parameter, address the TODO, etc. <mask> func tryConn(req *dhcpv4.DHCPv4, c net.PacketConn, iface *net.Interface) (ok, next bool, err error) {...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
// TODO(a.garipov): Refactor further. Inspect error handling, remove the next // parameter, address the TODO, etc. func tryConn(req *dhcpv4.DHCPv4, c net.PacketConn, iface *net.Interface) (ok, next bool, err error) { // TODO: replicate dhclient's behavior of retrying several times with // progressively longer timeou...
<mask> if err != nil { <mask> return false, fmt.Errorf("couldn't receive packet: %w", err) <mask> } <mask> <mask> log.Tracef("Received packet (%v bytes)", n) <mask> <mask> response, err := dhcpv4.FromBytes(b[:n]) <mask> if err != nil { <mask> log.Debug("DHCPv4: dhcpv4.FromBytes: %s", err) <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
b := make([]byte, 1500) _ = c.SetReadDeadline(time.Now().Add(defaultDiscoverTime)) n, _, err := c.ReadFrom(b) if err != nil { if isTimeout(err) { log.Debug("dhcpv4: didn't receive dhcp response") return false, false, nil
<mask> } <mask> <mask> log.Tracef("Received packet (%v bytes)", n) <mask> <mask> response, err := dhcpv4.FromBytes(b[:n]) <mask> if err != nil { <mask> log.Debug("DHCPv4: dhcpv4.FromBytes: %s", err) <mask> continue <mask> } <mask> <mask> log.Debug("DHCPv4: received message from server: %...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
return false, false, fmt.Errorf("receiving packet: %w", err) }
<mask> log.Debug("DHCPv4: dhcpv4.FromBytes: %s", err) <mask> continue <mask> } <mask> <mask> log.Debug("DHCPv4: received message from server: %s", response.Summary()) <mask> <mask> if !(response.OpCode == dhcpv4.OpcodeBootReply && <mask> response.HWType == iana.HWTypeEthernet && <mask> byte...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
log.Tracef("received packet, %d bytes", n)
<mask> } <mask> <mask> log.Debug("DHCPv4: received message from server: %s", response.Summary()) <mask> <mask> if !(response.OpCode == dhcpv4.OpcodeBootReply && <mask> response.HWType == iana.HWTypeEthernet && <mask> bytes.Equal(response.ClientHWAddr, iface.HardwareAddr) && <mask> bytes.Equal(r...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
response, err := dhcpv4.FromBytes(b[:n]) if err != nil { log.Debug("dhcpv4: encoding: %s", err) return false, true, err
<mask> log.Debug("DHCPv4: received message from server doesn't match our request") <mask> continue <mask> } <mask> <mask> log.Tracef("The packet is from an active DHCP server") <mask> // that's a DHCP server there <mask> return true, nil <mask> } <mask> } <mask> <mask> // CheckIfOtherDHCPSer...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
ifaceIPNet, err := ifaceIPv6Addrs(iface) if err != nil { return false, fmt.Errorf("getting ipv6 addrs for iface %s: %w", ifaceName, err) }
<mask> if err != nil { <mask> return false, fmt.Errorf("dhcpv6: net.InterfaceByName: %s: %w", ifaceName, err) <mask> } <mask> <mask> ifaceIPNet := getIfaceIPv6(*iface) <mask> if len(ifaceIPNet) == 0 { <mask> return false, fmt.Errorf("dhcpv6: couldn't find IPv6 address of interface %s %+v", ifaceName, if...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
return false, fmt.Errorf("interface %s has no ipv6 addresses", ifaceName)
<mask> } <mask> <mask> ifaceIPNet := getIfaceIPv6(*iface) <mask> if len(ifaceIPNet) == 0 { <mask> return false, fmt.Errorf("dhcpv6: couldn't find IPv6 address of interface %s %+v", ifaceName, iface) <mask> } <mask> <mask> srcIP := ifaceIPNet[0] <mask> src := net.JoinHostPort(srcIP.String(), "546") <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/check_other_dhcp.go
} else if err4 != nil {
<mask> othSrv := map[string]interface{}{} <mask> foundVal := "no" <mask> if found4 { <mask> foundVal = "yes" <mask> } else if err != nil { <mask> foundVal = "error" <mask> othSrv["error"] = err4.Error() <mask> } <mask> othSrv["found"] = foundVal <mask> v4["other_server"] = othSrv </s> Pull reque...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/dhcp_http.go
<mask> } <mask> return operr.Timeout() <mask> } <mask> <mask> // Get IPv4 address list <mask> func getIfaceIPv4(iface net.Interface) []net.IP { <mask> addrs, err := iface.Addrs() <mask> if err != nil { <mask> return nil <mask> } <mask> <mask> var res []net.IP <mask> for _, a := range addrs { <m...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep"...
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/helpers.go
func ip4InRange(start, stop, ip net.IP) bool {
<mask> func (s *v4Server) WriteDiskConfig6(c *V6ServerConf) { <mask> } <mask> <mask> // Return TRUE if IP address is within range [start..stop] <mask> func ip4InRange(start net.IP, stop net.IP, ip net.IP) bool { <mask> if len(start) != 4 || len(stop) != 4 { <mask> return false <mask> } <mask> from := bin...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
func (s *v4Server) processDiscover(req, resp *dhcpv4.DHCPv4) *Lease {
<mask> s.conf.notify(LeaseChangedAdded) <mask> } <mask> <mask> // Process Discover request and return lease <mask> func (s *v4Server) processDiscover(req *dhcpv4.DHCPv4, resp *dhcpv4.DHCPv4) *Lease { <mask> mac := req.ClientHWAddr <mask> <mask> s.leasesLock.Lock() <mask> defer s.leasesLock.Unlock() <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
func (s *v4Server) processRequest(req, resp *dhcpv4.DHCPv4) (*Lease, bool) {
<mask> } <mask> <mask> // Process Request request and return lease <mask> // Return false if we don't need to reply <mask> func (s *v4Server) processRequest(req *dhcpv4.DHCPv4, resp *dhcpv4.DHCPv4) (*Lease, bool) { <mask> var lease *Lease <mask> mac := req.ClientHWAddr <mask> hostname := req.Options.Get(dhc...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
func (s *v4Server) process(req, resp *dhcpv4.DHCPv4) int {
<mask> // Find a lease associated with MAC and prepare response <mask> // Return 1: OK <mask> // Return 0: error; reply with Nak <mask> // Return -1: error; don't reply <mask> func (s *v4Server) process(req *dhcpv4.DHCPv4, resp *dhcpv4.DHCPv4) int { <mask> var lease *Lease <mask> <mask> resp.UpdateOption(dhc...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
// ifaceIPv4Addrs returns the interface's IPv4 addresses. func ifaceIPv4Addrs(iface *net.Interface) (ips []net.IP, err error) { addrs, err := iface.Addrs() if err != nil { return nil, err } for _, a := range addrs { ipnet, ok := a.(*net.IPNet) if !ok { continue } if ip := ipnet.IP.To4(); ip != nil { ...
<mask> return <mask> } <mask> } <mask> <mask> // Start - start server <mask> func (s *v4Server) Start() error { <mask> if !s.conf.Enabled { <mask> return nil <mask> } <mask> </s> Pull request: * dhcpd: send secondary dns as well Merge in DNS/adguard-home from 1708-secondary-dns to master Updates #...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
ifaceName := s.conf.InterfaceName iface, err := net.InterfaceByName(ifaceName)
<mask> if !s.conf.Enabled { <mask> return nil <mask> } <mask> <mask> iface, err := net.InterfaceByName(s.conf.InterfaceName) <mask> if err != nil { <mask> return fmt.Errorf("dhcpv4: Couldn't find interface by name %s: %w", s.conf.InterfaceName, err) <mask> } <mask> <mask> log.Debug("dhcpv4: starti...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
return fmt.Errorf("dhcpv4: finding interface %s by name: %w", ifaceName, err)
<mask> } <mask> <mask> iface, err := net.InterfaceByName(s.conf.InterfaceName) <mask> if err != nil { <mask> return fmt.Errorf("dhcpv4: Couldn't find interface by name %s: %w", s.conf.InterfaceName, err) <mask> } <mask> <mask> log.Debug("dhcpv4: starting...") <mask> s.conf.dnsIPAddrs = getIfaceIPv4(*...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
dnsIPAddrs, err := ifaceIPv4Addrs(iface) if err != nil { return fmt.Errorf("dhcpv4: getting ipv4 addrs for iface %s: %w", ifaceName, err) } switch len(dnsIPAddrs) { case 0: log.Debug("dhcpv4: no ipv4 address for interface %s", iface.Name)
<mask> return fmt.Errorf("dhcpv4: Couldn't find interface by name %s: %w", s.conf.InterfaceName, err) <mask> } <mask> <mask> log.Debug("dhcpv4: starting...") <mask> s.conf.dnsIPAddrs = getIfaceIPv4(*iface) <mask> if len(s.conf.dnsIPAddrs) == 0 { <mask> log.Debug("dhcpv4: no IPv6 address for interface %s...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
case 1: // Some Android devices use 8.8.8.8 if there is no secondary DNS // server. Fix that by setting the secondary DNS address to our // address as well. // // See https://github.com/AdguardTeam/AdGuardHome/issues/1708. log.Debug("dhcpv4: setting secondary dns ip to iself for interface %s", iface.Name)...
<mask> case 0: <mask> log.Debug("dhcpv4: no ipv4 address for interface %s", iface.Name) <mask> <mask> return nil <mask> } <mask> <mask> s.conf.dnsIPAddrs = dnsIPAddrs <mask> <mask> laddr := &net.UDPAddr{ <mask> IP: net.ParseIP("0.0.0.0"), </s> Pull request: * dhcpd: send secondary dns as well ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
s.conf.dnsIPAddrs = dnsIPAddrs
<mask> default: <mask> // Go on. <mask> } <mask> <mask> laddr := &net.UDPAddr{ <mask> IP: net.ParseIP("0.0.0.0"), <mask> Port: dhcpv4.ServerPort, <mask> } <mask> s.srv, err = server4.NewServer(iface.Name, laddr, s.packetHandler, server4.WithDebugLogger()) </s> Pull request: * dhcpd: send seconda...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v4.go
// ifaceIPv6Addrs returns the interface's IPv6 addresses. func ifaceIPv6Addrs(iface *net.Interface) (ips []net.IP, err error) {
<mask> return <mask> } <mask> } <mask> <mask> // Get IPv6 address list <mask> func getIfaceIPv6(iface net.Interface) []net.IP { <mask> addrs, err := iface.Addrs() <mask> if err != nil { <mask> return nil <mask> } <mask> </s> Pull request: * dhcpd: send secondary dns as well Merge in DNS/adguard-h...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
return nil, err
<mask> // Get IPv6 address list <mask> func getIfaceIPv6(iface net.Interface) []net.IP { <mask> addrs, err := iface.Addrs() <mask> if err != nil { <mask> return nil <mask> } <mask> <mask> var res []net.IP <mask> for _, a := range addrs { <mask> ipnet, ok := a.(*net.IPNet) </s> Pull request: * dhcpd...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
<mask> if err != nil { <mask> return nil <mask> } <mask> <mask> var res []net.IP <mask> for _, a := range addrs { <mask> ipnet, ok := a.(*net.IPNet) <mask> if !ok { <mask> continue <mask> } </s> Pull request: * dhcpd: send secondary dns as well Merge in DNS/adguard-home from 1708-secondary-d...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
if ip := ipnet.IP.To16(); ip != nil { ips = append(ips, ip)
<mask> ipnet, ok := a.(*net.IPNet) <mask> if !ok { <mask> continue <mask> } <mask> if ipnet.IP.To4() == nil { <mask> res = append(res, ipnet.IP) <mask> } <mask> } <mask> return res <mask> } <mask> </s> Pull request: * dhcpd: send secondary dns as well Merge in DNS/adguard-home from 1708-...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
return ips, nil
<mask> if ipnet.IP.To4() == nil { <mask> res = append(res, ipnet.IP) <mask> } <mask> } <mask> return res <mask> } <mask> <mask> // initialize RA module <mask> func (s *v6Server) initRA(iface *net.Interface) error { <mask> // choose the source IP address - should be link-local-unicast </s> Pull req...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
// Start starts the IPv6 DHCP server.
<mask> s.ra.packetSendPeriod = 1 * time.Second <mask> return s.ra.Init() <mask> } <mask> <mask> // Start - start server <mask> func (s *v6Server) Start() error { <mask> if !s.conf.Enabled { <mask> return nil <mask> } <mask> </s> Pull request: * dhcpd: send secondary dns as well Merge in DNS/adguard-...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
ifaceName := s.conf.InterfaceName iface, err := net.InterfaceByName(ifaceName) if err != nil { return fmt.Errorf("dhcpv6: finding interface %s by name: %w", ifaceName, err) } log.Debug("dhcpv4: starting...") dnsIPAddrs, err := ifaceIPv6Addrs(iface)
<mask> if !s.conf.Enabled { <mask> return nil <mask> } <mask> <mask> iface, err := net.InterfaceByName(s.conf.InterfaceName) <mask> if err != nil { <mask> return fmt.Errorf("couldn't find interface by name %s: %w", s.conf.InterfaceName, err) <mask> } <mask> <mask> s.conf.dnsIPAddrs = getIfaceIPv6(...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
return fmt.Errorf("dhcpv6: getting ipv6 addrs for iface %s: %w", ifaceName, err)
<mask> } <mask> <mask> iface, err := net.InterfaceByName(s.conf.InterfaceName) <mask> if err != nil { <mask> return fmt.Errorf("couldn't find interface by name %s: %w", s.conf.InterfaceName, err) <mask> } <mask> <mask> s.conf.dnsIPAddrs = getIfaceIPv6(*iface) <mask> if len(s.conf.dnsIPAddrs) == 0 { ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
switch len(dnsIPAddrs) { case 0: log.Debug("dhcpv6: no ipv6 address for interface %s", iface.Name)
<mask> if err != nil { <mask> return fmt.Errorf("couldn't find interface by name %s: %w", s.conf.InterfaceName, err) <mask> } <mask> <mask> s.conf.dnsIPAddrs = getIfaceIPv6(*iface) <mask> if len(s.conf.dnsIPAddrs) == 0 { <mask> log.Debug("DHCPv6: no IPv6 address for interface %s", iface.Name) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
case 1: // See the comment in (*v4Server).Start. log.Debug("dhcpv6: setting secondary dns ip to iself for interface %s", iface.Name) dnsIPAddrs = append(dnsIPAddrs, dnsIPAddrs[0]) default: // Go on.
<mask> case 0: <mask> log.Debug("dhcpv6: no ipv6 address for interface %s", iface.Name) <mask> <mask> return nil <mask> } <mask> <mask> s.conf.dnsIPAddrs = dnsIPAddrs <mask> <mask> err = s.initRA(iface) </s> Pull request: * dhcpd: send secondary dns as well Merge in DNS/adguard-home from 1708-seco...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
s.conf.dnsIPAddrs = dnsIPAddrs
<mask> default: <mask> // Go on. <mask> } <mask> <mask> err = s.initRA(iface) <mask> if err != nil { <mask> return err <mask> } </s> Pull request: * dhcpd: send secondary dns as well Merge in DNS/adguard-home from 1708-secondary-dns to master Updates #1708. Squashed commit of the following: commi...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9
internal/dhcpd/v6.go
client = &dnscrypt.Client{Timeout: defaultTimeout, AdjustPayloadSize: true}
<mask> if client == nil || serverInfo == nil || (serverInfo != nil && serverInfo.ServerCert.NotAfter < now) { <mask> p.Lock() <mask> <mask> // Using "udp" for DNSCrypt upstreams by default <mask> client = &dnscrypt.Client{Proto: "udp", Timeout: defaultTimeout} <mask> si, _, err := client.Dial(p.boot.add...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032
dnsforward/upstream.go
github.com/ameshkov/dnscrypt v1.0.0
<mask> module github.com/AdguardTeam/AdGuardHome <mask> <mask> require ( <mask> github.com/StackExchange/wmi v0.0.0-20180725035823-b12b22c5341f // indirect <mask> github.com/ameshkov/dnscrypt v0.0.0-20181217090431-1215bb8b150f <mask> github.com/beefsack/go-rate v0.0.0-20180408011153-efa7637bb9b6 <mask> gith...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032
go.mod
golang.org/x/net v0.0.0-20181217023233-e147a9138326 golang.org/x/sys v0.0.0-20181217223516-dcdaa6325bcb // indirect
<mask> github.com/shirou/gopsutil v2.18.10+incompatible <mask> github.com/shirou/w32 v0.0.0-20160930032740-bb4de0191aa4 // indirect <mask> go.uber.org/goleak v0.10.0 <mask> golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9 <mask> golang.org/x/net v0.0.0-20181213202711-891ebc4b82d6 <mask> gopkg.in/asask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032
go.mod
github.com/ameshkov/dnscrypt v1.0.0 h1:Y7YexPCxtVCTDXlXu9n17+1H5YS25vftx8vV8Dhuu+E= github.com/ameshkov/dnscrypt v1.0.0/go.mod h1:EC7Z1GguyEEwhuLXrcgkRTE3GdyPDSWq2OXefhydGWo=
<mask> github.com/aead/poly1305 v0.0.0-20180717145839-3fee0db0b635/go.mod h1:lmLxL+FV291OopO93Bwf9fQLQeLyt33VJRUg5VJ30us= <mask> github.com/ameshkov/dnscrypt v0.0.0-20181217090431-1215bb8b150f h1:vOaSvI9B3wqzV1g8raDeVzRJnq5RHQxsz0MVXudxdNU= <mask> github.com/ameshkov/dnscrypt v0.0.0-20181217090431-1215bb8b150f/go.mo...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032
go.sum
golang.org/x/net v0.0.0-20181217023233-e147a9138326 h1:iCzOf0xz39Tstp+Tu/WwyGjUXCk34QhQORRxBeXXTA4= golang.org/x/net v0.0.0-20181217023233-e147a9138326/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
<mask> golang.org/x/net v0.0.0-20181213202711-891ebc4b82d6 h1:gT0Y6H7hbVPUtvtk0YGxMXPgN+p8fYlqWkgJeUCZcaQ= <mask> golang.org/x/net v0.0.0-20181213202711-891ebc4b82d6/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= <mask> golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f h1:wMNYb4v58l5UBM7MYRLPG6ZhfOqbKu7X5...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032
go.sum
golang.org/x/sys v0.0.0-20181217223516-dcdaa6325bcb h1:zzdd4xkMwu/GRxhSUJaCPh4/jil9kAbsU7AUmXboO+A= golang.org/x/sys v0.0.0-20181217223516-dcdaa6325bcb/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
<mask> golang.org/x/sys v0.0.0-20181213200352-4d1cda033e06 h1:0oC8rFnE+74kEmuHZ46F6KHsMr5Gx2gUQPuNz28iQZM= <mask> golang.org/x/sys v0.0.0-20181213200352-4d1cda033e06/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= <mask> gopkg.in/asaskevich/govalidator.v4 v4.0.0-20160518190739-766470278477 h1:5xUJw+lg4zao9W4H...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032
go.sum
// Create a ClientHost implicitly so that we don't do this check again
<mask> log.Debug("Clients: set WHOIS info for auto-client %s: %v", ch.Host, ch.WhoisInfo) <mask> return <mask> } <mask> <mask> ch = &ClientHost{ <mask> Source: ClientSourceWHOIS, <mask> } <mask> ch.WhoisInfo = info <mask> clients.ipHost[ip] = ch <mask> log.Debug("Clients: set WHOIS info for auto-...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3dd91cf17962b4b5d39f31424adeeab579416666
home/clients.go
IDs: []string{"1.1.1.1", "1:2:3::4", "aa:aa:aa:aa:aa:aa", "2.2.2.0/24"},
<mask> testIP := "1.2.3.4" <mask> <mask> // add a client <mask> c = Client{ <mask> IDs: []string{"1.1.1.1", "1:2:3::4", "aa:aa:aa:aa:aa:aa"}, <mask> Name: "client1", <mask> } <mask> ok, err := clients.Add(c) <mask> assert.True(t, ok) <mask> assert.Nil(t, err) </s> -: add one more test
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3dd91cf17962b4b5d39f31424adeeab579416666
home/clients_test.go
// don't allow duplicates by CIDR ok, err = clients.AddHost("2.2.2.2", "test", ClientSourceRDNS) assert.False(t, ok) assert.Nil(t, err)
<mask> // try adding a duplicate IP which for a Mac-based client <mask> ok, err = clients.AddHost(testIP, "test", ClientSourceRDNS) <mask> assert.False(t, ok) <mask> assert.Nil(t, err) <mask> } </s> -: add one more test </s> remove IDs: []string{"1.1.1.1", "1:2:3::4", "aa:aa:aa:aa:aa:aa"}, </s> add IDs:...
[ "keep", "keep", "keep", "add", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3dd91cf17962b4b5d39f31424adeeab579416666
home/clients_test.go
"errors"
<mask> // Package dnsforward contains a DNS forwarding server. <mask> package dnsforward <mask> <mask> import ( <mask> "fmt" <mask> "net" <mask> "net/http" <mask> "os" <mask> "runtime" </s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling Merge in DNS/adguard-home from ipset-fix...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/dnsforward.go
"os"
<mask> "errors" <mask> "fmt" <mask> "net" <mask> "net/http" <mask> "runtime" <mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter" </s> Pull request: dnsforward: imp ipset caching, logging, and ep...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/dnsforward.go
if !errors.Is(err, os.ErrPermission) { return fmt.Errorf("cannot initialize ipset: %w", err) } // ipset cannot currently be initialized if the server was // installed from Snap or when the user or the binary doesn't // have the required permissions. // // Log and go on. log.Error("cannot initialize ...
<mask> // Initialize IPSET configuration <mask> // -- <mask> err := s.ipset.init(s.conf.IPSETList) <mask> if err != nil { <mask> // ipset cannot be initialized in a Snap version (and maybe - without root) <mask> // this needs to be handled properly <mask> // TODO: Handle this properly <mask> log.Inf...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/dnsforward.go
// TODO(a.garipov): Currently, the ipset list is static, and we don't // read the IPs already in sets, so we can assume that all incoming IPs // are either added to all corresponding ipsets or not. When that stops // being the case, for example if we add dynamic reconfiguration of // ipsets, this map will need to...
<mask> nameToIpset map[string]ipsetProps <mask> domainToIpsets map[string][]ipsetProps <mask> <mask> addedIPs map[[16]byte]struct{} <mask> <mask> ipv4Conn *ipset.Conn <mask> ipv6Conn *ipset.Conn </s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling Merge in DNS/adguard-home fr...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/ipset_linux.go
var err error
<mask> <mask> // process adds the resolved IP addresses to the domain's ipsets, if any. <mask> func (c *ipsetCtx) process(ctx *dnsContext) (rc resultCode) { <mask> if c == nil { <mask> return resultCodeSuccess <mask> } <mask> </s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling M...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/ipset_linux.go
log.Debug("ipset: starting processing")
<mask> } <mask> <mask> c.mu.Lock() <mask> defer c.mu.Unlock() <mask> <mask> if c.skipIpsetProcessing(ctx) { <mask> log.Debug("ipset: skipped processing for request") </s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling Merge in DNS/adguard-home from ipset-fix to master Updates...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/ipset_linux.go
log.Debug("ipset: no ipsets for host %s", host)
<mask> host = strings.TrimSuffix(host, ".") <mask> host = strings.ToLower(host) <mask> sets := c.lookupHost(host) <mask> if len(sets) == 0 { <mask> return resultCodeSuccess <mask> } <mask> <mask> log.Debug("ipset: found ipsets %+v for host %s", sets, host) <mask> </s> Pull request: dnsforward: imp i...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/ipset_linux.go
<mask> <mask> v4s = append(v4s, ip) <mask> } <mask> <mask> var err error <mask> setLoop: <mask> for _, set := range sets { <mask> switch set.family { <mask> case netfilter.ProtoIPv4: <mask> err = c.addIPs(host, set, v4s) </s> Pull request: dnsforward: imp ipset caching, logging, and eperm handl...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/ipset_linux.go
} else { log.Debug("ipset: processed %d new ips", len(v4s)+len(v6s)) } for _, ip := range v4s { var iparr [16]byte copy(iparr[:], ip.To16()) c.addedIPs[iparr] = struct{}{} } for _, ip := range v6s { var iparr [16]byte copy(iparr[:], ip.To16()) c.addedIPs[iparr] = struct{}{}
<mask> } <mask> if err != nil { <mask> log.Error("ipset: adding host ips: %s", err) <mask> } <mask> <mask> return resultCodeSuccess <mask> } </s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling Merge in DNS/adguard-home from ipset-fix to master Updates #2619. Squashed commit o...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75
internal/dnsforward/ipset_linux.go
msg := fmt.Sprintf("failed to read request body: %s", err) log.Error(msg) http.Error(w, msg, http.StatusBadRequest)
<mask> // Respond with results <mask> func (s *Server) handleDHCPFindActiveServer(w http.ResponseWriter, r *http.Request) { <mask> body, err := ioutil.ReadAll(r.Body) <mask> if err != nil { <mask> errorText := fmt.Sprintf("failed to read request body: %s", err) <mask> log.Error(errorText) <mask> http.Err...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/dhcp_http.go
msg := "empty interface name specified" log.Error(msg) http.Error(w, msg, http.StatusBadRequest)
<mask> } <mask> <mask> interfaceName := strings.TrimSpace(string(body)) <mask> if interfaceName == "" { <mask> errorText := fmt.Sprintf("empty interface name specified") <mask> log.Error(errorText) <mask> http.Error(w, errorText, http.StatusBadRequest) <mask> return <mask> } <mask> <mask> foun...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/dhcp_http.go
<mask> <mask> "github.com/stretchr/testify/assert" <mask> ) <mask> <mask> func check(t *testing.T, result bool, msg string) { <mask> if !result { <mask> t.Fatal(msg) <mask> } <mask> } <mask> <mask> func testNotify(flags uint32) { <mask> } <mask> <mask> // Leases database store/load <mask> func T...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/dhcpd_test.go
// DefaultServers is the address of all link-local DHCP servers and // relay agents. var DefaultServers = &net.UDPAddr{ IP: net.IPv4bcast, Port: ServerPort, }
<mask> // ServerPort is the port that DHCP servers and relay agents listen on. <mask> ServerPort = 67 <mask> ) <mask> <mask> var ( <mask> // DefaultServers is the address of all link-local DHCP servers and <mask> // relay agents. <mask> DefaultServers = &net.UDPAddr{ <mask> IP: net.IPv4bcast, <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/nclient4/client.go
<mask> return <mask> } <mask> } <mask> <mask> // nolint <mask> func withBufferCap(n int) ClientOpt { <mask> return func(c *Client) (err error) { <mask> c.bufferCap = n <mask> return <mask> } <mask> } <mask> <mask> // WithRetry configures the number of retransmissions to attempt. <mask> // <mas...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/nclient4/client.go
func withBufferCap(n int) ClientOpt { return func(c *Client) (err error) { c.bufferCap = n return } }
<mask> p.ClientHWAddr = net.HardwareAddr{0xa, 0xb, 0xc, 0xd, 0xe, 0xf} <mask> return p <mask> } <mask> <mask> func TestSendAndRead(t *testing.T) { <mask> for _, tt := range []struct { <mask> desc string <mask> send *dhcpv4.DHCPv4 <mask> server []*dhcpv4.DHCPv4 </s> Pull request:* all: fix all st...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/nclient4/client_test.go
m := make(map[string]string)
<mask> if err != nil { <mask> return nil <mask> } <mask> <mask> m := make(map[string]string, 0) <mask> <mask> matches := re.FindAllStringSubmatch(out, -1) <mask> for i := range matches { <mask> port := matches[i][1] <mask> device := matches[i][2] </s> Pull request:* all: fix all staticcheck simp...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/network_utils.go
func ip6InRange(start, ip net.IP) bool {
<mask> } <mask> <mask> // Return TRUE if IP address is within range [start..0xff] <mask> // nolint(staticcheck) <mask> func ip6InRange(start net.IP, ip net.IP) bool { <mask> if len(start) != 16 { <mask> return false <mask> } <mask> //lint:ignore SA1021 TODO(e.burkov): Ignore this for now, think about usi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/v6.go
lifetime = time.Until(lease.Expiry)
<mask> case dhcpv6.MessageTypeSolicit: <mask> // <mask> <mask> case dhcpv6.MessageTypeConfirm: <mask> lifetime = lease.Expiry.Sub(time.Now()) <mask> <mask> case dhcpv6.MessageTypeRequest, <mask> dhcpv6.MessageTypeRenew, <mask> dhcpv6.MessageTypeRebind: <mask> </s> Pull request:* all: fix all st...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/v6.go
func (s *v6Server) process(msg *dhcpv6.Message, req, resp dhcpv6.DHCPv6) bool {
<mask> return lifetime <mask> } <mask> <mask> // Find a lease associated with MAC and prepare response <mask> func (s *v6Server) process(msg *dhcpv6.Message, req dhcpv6.DHCPv6, resp dhcpv6.DHCPv6) bool { <mask> switch msg.Type() { <mask> case dhcpv6.MessageTypeSolicit, <mask> dhcpv6.MessageTypeRequest, <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dhcpd/v6.go
func (d *Dnsfilter) SetFilters(blockFilters, allowFilters []Filter, async bool) error {
<mask> <mask> // SetFilters - set new filters (synchronously or asynchronously) <mask> // When filters are set asynchronously, the old filters continue working until the new filters are ready. <mask> // In this case the caller must ensure that the old filter files are intact. <mask> func (d *Dnsfilter) SetFilter...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
// fileExists returns true if file exists.
<mask> // <mask> // Adding rule and matching against the rules <mask> // <mask> <mask> // Return TRUE if file exists <mask> func fileExists(fn string) bool { <mask> _, err := os.Stat(fn) <mask> if err != nil { <mask> return false <mask> } </s> Pull request:* all: fix all staticcheck simplification and ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
return err == nil
<mask> <mask> // Return TRUE if file exists <mask> func fileExists(fn string) bool { <mask> _, err := os.Stat(fn) <mask> if err != nil { <mask> return false <mask> } <mask> return true <mask> } <mask> <mask> func createFilteringEngine(filters []Filter) (*filterlist.RuleStorage, *urlfilter.DNSEngine, ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
// it's difficult to update this file while it's being // used.
<mask> IgnoreCosmetic: true, <mask> } <mask> } else if runtime.GOOS == "windows" { <mask> // On Windows we don't pass a file to urlfilter because <mask> // it's difficult to update this file while it's being used. <mask> data, err := ioutil.ReadFile(f.FilePath) <mask> if err != nil { <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
// Initialize urlfilter objects.
<mask> filteringEngine := urlfilter.NewDNSEngine(rulesStorage) <mask> return rulesStorage, filteringEngine, nil <mask> } <mask> <mask> // Initialize urlfilter objects <mask> func (d *Dnsfilter) initFiltering(allowFilters, blockFilters []Filter) error { <mask> rulesStorage, filteringEngine, err := createFilte...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
// matchHost is a low-level way to check only if hostname is filtered by rules, // skipping expensive safebrowsing and parental lookups.
<mask> <mask> return nil <mask> } <mask> <mask> // matchHost is a low-level way to check only if hostname is filtered by rules, skipping expensive safebrowsing and parental lookups <mask> func (d *Dnsfilter) matchHost(host string, qtype uint16, setts RequestFilteringSettings) (Result, error) { <mask> d.engin...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
// InitModule manually initializes blocked services map.
<mask> } <mask> return res <mask> } <mask> <mask> // InitModule() - manually initialize blocked services map <mask> func InitModule() { <mask> initBlockedServices() <mask> } <mask> <mask> // New creates properly initialized DNS Filter that is ready to be used </s> Pull request:* all: fix all staticcheck...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
// New creates properly initialized DNS Filter that is ready to be used.
<mask> func InitModule() { <mask> initBlockedServices() <mask> } <mask> <mask> // New creates properly initialized DNS Filter that is ready to be used <mask> func New(c *Config, blockFilters []Filter) *Dnsfilter { <mask> if c != nil { <mask> cacheConf := cache.Config{ <mask> EnableLRU: true, <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
<mask> cacheConf := cache.Config{ <mask> EnableLRU: true, <mask> } <mask> <mask> // initialize objects only once <mask> <mask> if gctx.safebrowsingCache == nil { <mask> cacheConf.MaxSize = c.SafeBrowsingCacheSize <mask> gctx.safebrowsingCache = cache.New(cacheConf) <mask> } <mask> </s>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
// GetStats return dns filtering stats since startup.
<mask> // <mask> // stats <mask> // <mask> <mask> // GetStats return dns filtering stats since startup <mask> func (d *Dnsfilter) GetStats() Stats { <mask> return gctx.stats <mask> } </s> Pull request:* all: fix all staticcheck simplification and unused warnings Merge in DNS/adguard-home from 2270-fix-s-u-w...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter.go
<mask> <mask> import ( <mask> "fmt" <mask> "net" <mask> "os" <mask> "path" <mask> "runtime" <mask> "testing" <mask> <mask> "github.com/AdguardTeam/urlfilter/rules" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/assert" </s> Pull request:* all: fix all staticcheck simplificatio...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter_test.go
<mask> gctx.safeSearchCache.Clear() <mask> } <mask> } <mask> <mask> func _Func() string { <mask> pc := make([]uintptr, 10) // at least 1 entry needed <mask> runtime.Callers(2, pc) <mask> f := runtime.FuncForPC(pc[0]) <mask> return path.Base(f.Name()) <mask> } <mask> <mask> func NewForTest(c *Config...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter_test.go
func (d *Dnsfilter) checkMatchIP(t *testing.T, hostname, ip string, qtype uint16) {
<mask> t.Errorf("Expected hostname %s to match", hostname) <mask> } <mask> } <mask> <mask> func (d *Dnsfilter) checkMatchIP(t *testing.T, hostname string, ip string, qtype uint16) { <mask> t.Helper() <mask> ret, err := d.CheckHost(hostname, qtype, &setts) <mask> if err != nil { <mask> t.Errorf("Error ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter_test.go
filters := []Filter{{
<mask> 0.0.0.2 host2 <mask> ::1 host2 <mask> `, <mask> addr, addr6) <mask> filters := []Filter{Filter{ <mask> ID: 0, Data: []byte(text), <mask> }} <mask> d := NewForTest(nil, filters) <mask> defer d.Close() <mask> </s> Pull request:* all: fix all staticcheck simplification and unused warnings Merge...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter_test.go
const nl = "\n" const ( blockingRules = `||example.org^` + nl whitelistRules = `||example.org^` + nl + `@@||test.example.org` + nl importantRules = `@@||example.org^` + nl + `||test.example.org^$important` + nl regexRules = `/example\.org/` + nl + `@@||test.example.org^` + nl maskRules = `test*.example....
<mask> } <mask> <mask> // FILTERING <mask> <mask> var blockingRules = "||example.org^\n" <mask> var whitelistRules = "||example.org^\n@@||test.example.org\n" <mask> var importantRules = "@@||example.org^\n||test.example.org^$important\n" <mask> var regexRules = "/example\\.org/\n@@||test.example.org^\n" <mas...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter_test.go
filters := []Filter{{
<mask> <mask> func TestMatching(t *testing.T) { <mask> for _, test := range tests { <mask> t.Run(fmt.Sprintf("%s-%s", test.testname, test.hostname), func(t *testing.T) { <mask> filters := []Filter{Filter{ <mask> ID: 0, Data: []byte(test.rules), <mask> }} <mask> d := NewForTest(nil, filters) <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3
internal/dnsfilter/dnsfilter_test.go