docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
func setRlimit(val uint64) (err error) {
return ErrUnsupported | <mask> func canBindPrivilegedPorts() (can bool, err error) {
<mask> return HaveAdminRights()
<mask> }
<mask>
<mask> func setRlimit(val uint) {
<mask> }
<mask>
<mask> func haveAdminRights() (bool, error) {
<mask> var token windows.Token
<mask> h := windows.CurrentProcess()
</s> Pull request: all: openbsd... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/aghos/os_windows.go |
RlimitNoFile uint64 `yaml:"rlimit_nofile"` // Maximum number of opened fd's per process (0: default) | <mask> // attempts after AuthAttempts unsuccessful login attempts.
<mask> AuthBlockMin uint `yaml:"block_auth_min"`
<mask> ProxyURL string `yaml:"http_proxy"` // Proxy address for our HTTP client
<mask> Language string `yaml:"language"` // two-letter ISO 639-1 language code
<mask> RlimitNoFi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/config.go |
// TODO(a.garipov): github.com/kardianos/service doesn't seem to
// support OpenBSD currently. Either patch it to do so or make
// our own implementation of the service.System interface.
if runtime.GOOS == "openbsd" {
log.Fatal("service actions are not supported on openbsd")
}
| <mask> }()
<mask>
<mask> if args.serviceControlAction != "" {
<mask> handleServiceControlAction(args, clientBuildFS)
<mask>
<mask> return
<mask> }
<mask>
</s> Pull request: all: openbsd support
Updates #2439.
Squashed commit of the following:
commit 3ff109e43751132d77500256c8869938680ac281
Author:... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
func setupConfig(args options) (err error) { | <mask>
<mask> Context.mux = http.NewServeMux()
<mask> }
<mask>
<mask> func setupConfig(args options) {
<mask> config.DHCP.WorkDir = Context.workDir
<mask> config.DHCP.HTTPRegister = httpRegister
<mask> config.DHCP.ConfigModified = onConfigModified
<mask>
<mask> Context.dhcpServer = dhcpd.Create(config... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
return fmt.Errorf("initing dhcp: %w", err) | <mask> // TODO(a.garipov): There are a lot of places in the code right
<mask> // now which assume that the DHCP server can be nil despite this
<mask> // condition. Inspect them and perhaps rewrite them to use
<mask> // Enabled() instead.
<mask> log.Fatalf("can't initialize dhcp module")
<mask> }
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
if config.RlimitNoFile != 0 {
err = aghos.SetRlimit(config.RlimitNoFile)
if err != nil && !errors.Is(err, aghos.ErrUnsupported) {
return fmt.Errorf("setting rlimit: %w", err)
} | <mask> }
<mask> Context.clients.Init(config.Clients, Context.dhcpServer, Context.etcHosts)
<mask> config.Clients = nil
<mask>
<mask> if (runtime.GOOS == "linux" || runtime.GOOS == "darwin") &&
<mask> config.RlimitNoFile != 0 {
<mask> aghos.SetRlimit(config.RlimitNoFile)
<mask> }
<mask>
<mask> // o... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
return nil | <mask> Context.pidFileName = args.pidFile
<mask> }
<mask> }
<mask>
<mask> func initWeb(args options, clientBuildFS fs.FS) (web *Web, err error) {
<mask> var clientFS, clientBetaFS fs.FS
<mask> if args.localFrontend {
<mask> log.Info("warning: using local frontend files")
</s> Pull request: all: openbsd... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
func fatalOnError(err error) {
if err != nil {
log.Fatal(err)
}
}
| <mask> return web, nil
<mask> }
<mask>
<mask> // run performs configurating and starts AdGuard Home.
<mask> func run(args options, clientBuildFS fs.FS) {
<mask> var err error
<mask>
<mask> // configure config filename
</s> Pull request: all: openbsd support
Updates #2439.
Squashed commit of the followin... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
var err error
| <mask> // run performs configurating and starts AdGuard Home.
<mask> func run(args options, clientBuildFS fs.FS) {
<mask> // configure config filename
<mask> initConfigFilename(args)
<mask>
<mask> // configure working dir and config path
<mask> initWorkingDir(args)
<mask>
</s> Pull request: all: openbsd ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
err = setupConfig(args)
fatalOnError(err) | <mask> // so we have to initialize filtering's static data first,
<mask> // but also avoid relying on automatic Go init() function
<mask> filtering.InitModule()
<mask>
<mask> setupConfig(args)
<mask>
<mask> if !Context.firstRun {
<mask> // Save the updated config
<mask> err := config.write()
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
err = config.write()
fatalOnError(err) | <mask> setupConfig(args)
<mask>
<mask> if !Context.firstRun {
<mask> // Save the updated config
<mask> err := config.write()
<mask> if err != nil {
<mask> log.Fatal(err)
<mask> }
<mask>
<mask> if config.DebugPProf {
<mask> mux := http.NewServeMux()
<mask> mux.HandleFunc("/debug/pprof/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
err = os.MkdirAll(Context.getDataDir(), 0o755) | <mask> }()
<mask> }
<mask> }
<mask>
<mask> err := os.MkdirAll(Context.getDataDir(), 0o755)
<mask> if err != nil {
<mask> log.Fatalf("Cannot create DNS data dir at %s: %s", Context.getDataDir(), err)
<mask> }
<mask>
<mask> sessFilename := filepath.Join(Context.getDataDir(), "sessions.db")
</s> P... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
fatalOnError(err) | <mask> log.Fatalf("Can't initialize TLS module")
<mask> }
<mask>
<mask> Context.web, err = initWeb(args, clientBuildFS)
<mask> if err != nil {
<mask> log.Fatal(err)
<mask> }
<mask>
<mask> Context.subnetDetector, err = aghnet.NewSubnetDetector()
<mask> if err != nil {
<mask> log.Fatal(err)
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
fatalOnError(err) | <mask> log.Fatal(err)
<mask> }
<mask>
<mask> Context.subnetDetector, err = aghnet.NewSubnetDetector()
<mask> if err != nil {
<mask> log.Fatal(err)
<mask> }
<mask>
<mask> if !Context.firstRun {
<mask> err = initDNSServer()
<mask> if err != nil {
<mask> log.Fatalf("%s", err)
</s> Pull reque... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
fatalOnError(err) | <mask> }
<mask>
<mask> if !Context.firstRun {
<mask> err = initDNSServer()
<mask> if err != nil {
<mask> log.Fatalf("%s", err)
<mask> }
<mask>
<mask> Context.tls.Start()
<mask> Context.etcHosts.Start()
<mask>
<mask> go func() {
</s> Pull request: all: openbsd support
Updates #2439.
Sq... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
fatalOnError(serr) | <mask> go func() {
<mask> serr := startDNSServer()
<mask> if serr != nil {
<mask> closeDNSServer()
<mask> log.Fatal(serr)
<mask> }
<mask> }()
<mask>
<mask> if Context.dhcpServer != nil {
<mask> err = Context.dhcpServer.Start()
</s> Pull request: all: openbsd support
Updates #2439.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3b87478470ff49fbfe850c8f12492265a3c9491b | internal/home/home.go |
if !data.usable { | <mask> }
<mask> address := net.JoinHostPort(config.BindHost, strconv.Itoa(config.TLS.PortHTTPS))
<mask> // validate current TLS config and update warnings (it could have been loaded from file)
<mask> data := validateCertificates(config.TLS)
<mask> if data.WarningValidation != "" {
<mask> log.Fa... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3c374b594000a47bef40c2d5d20d7ba677c74b31 | app.go |
// is usable? set by validator
usable bool
| <mask> ValidKey bool `yaml:"-" json:"valid_key"`
<mask> KeyType string `yaml:"-" json:"key_type,omitempty"`
<mask>
<mask> // warnings
<mask> Warning string `yaml:"-" json:"warning,omitempty"`
<mask> WarningValidation string `yaml:"-" json:"warning_validation,omitempty"`
<mask> }
<mask>
</s>... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3c374b594000a47bef40c2d5d20d7ba677c74b31 | config.go |
if data.usable { | <mask> }
<mask>
<mask> restartHTTPS := false
<mask> data = validateCertificates(data)
<mask> if data.WarningValidation == "" {
<mask> if !reflect.DeepEqual(config.TLS.tlsConfigSettings, data.tlsConfigSettings) {
<mask> log.Printf("tls config settings have changed, will restart HTTPS server")
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3c374b594000a47bef40c2d5d20d7ba677c74b31 | control.go |
data.usable = true | <mask> if err != nil {
<mask> data.WarningValidation = fmt.Sprintf("Invalid certificate or key: %s", err)
<mask> return data
<mask> }
<mask> }
<mask>
<mask> return data
<mask> }
<mask>
</s> /tls/ -- add internal usable flag to simplify logic when https needs to be booted up </s> remove if data.... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3c374b594000a47bef40c2d5d20d7ba677c74b31 | control.go |
ifaceIPNet, err := ifaceIPv4Addrs(iface)
if err != nil {
return false, fmt.Errorf("getting ipv4 addrs for iface %s: %w", ifaceName, err)
} | <mask> if err != nil {
<mask> return false, fmt.Errorf("couldn't find interface by name %s: %w", ifaceName, err)
<mask> }
<mask>
<mask> // get ipv4 address of an interface
<mask> ifaceIPNet := getIfaceIPv4(*iface)
<mask> if len(ifaceIPNet) == 0 {
<mask> return false, fmt.Errorf("couldn't find IPv4 add... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
return false, fmt.Errorf("interface %s has no ipv4 addresses", ifaceName) | <mask>
<mask> // get ipv4 address of an interface
<mask> ifaceIPNet := getIfaceIPv4(*iface)
<mask> if len(ifaceIPNet) == 0 {
<mask> return false, fmt.Errorf("couldn't find IPv4 address of interface %s %+v", ifaceName, iface)
<mask> }
<mask>
<mask> if runtime.GOOS == "darwin" {
<mask> return false, f... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
// TODO(a.garipov): Find out what this is about. Perhaps this
// information is outdated or at least incomplete. | <mask> return false, fmt.Errorf("interface %s has no ipv4 addresses", ifaceName)
<mask> }
<mask>
<mask> if runtime.GOOS == "darwin" {
<mask> return false, fmt.Errorf("can't find DHCP server: not supported on macOS")
<mask> }
<mask>
</s> Pull request: * dhcpd: send secondary dns as well
Merge in DNS/ad... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
ok, next, err := tryConn(req, c, iface)
if next {
continue
}
if ok {
return true, nil | <mask> return false, fmt.Errorf("couldn't send a packet to %s: %w", dst, err)
<mask> }
<mask>
<mask> for {
<mask> // wait for answer
<mask> log.Tracef("Waiting %v for an answer", defaultDiscoverTime)
<mask> // TODO: replicate dhclient's behaviour of retrying several times with progressively bigger tim... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
log.Debug("%s", err) | <mask> log.Debug("DHCPv4: didn't receive DHCP response")
<mask> return false, nil
<mask> }
<mask> if err != nil {
<mask> return false, fmt.Errorf("couldn't receive packet: %w", err)
<mask> }
<mask>
<mask> log.Tracef("Received packet (%v bytes)", n)
<mask>
<mask> response, err := dhcpv4.Fr... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
}
} | <mask> if err != nil {
<mask> log.Debug("%s", err)
<mask> }
<mask>
<mask> // TODO(a.garipov): Refactor further. Inspect error handling, remove the next
<mask> // parameter, address the TODO, etc.
<mask> func tryConn(req *dhcpv4.DHCPv4, c net.PacketConn, iface *net.Interface) (ok, next bool, err error) {... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
// TODO(a.garipov): Refactor further. Inspect error handling, remove the next
// parameter, address the TODO, etc.
func tryConn(req *dhcpv4.DHCPv4, c net.PacketConn, iface *net.Interface) (ok, next bool, err error) {
// TODO: replicate dhclient's behavior of retrying several times with
// progressively longer timeou... | <mask> if err != nil {
<mask> return false, fmt.Errorf("couldn't receive packet: %w", err)
<mask> }
<mask>
<mask> log.Tracef("Received packet (%v bytes)", n)
<mask>
<mask> response, err := dhcpv4.FromBytes(b[:n])
<mask> if err != nil {
<mask> log.Debug("DHCPv4: dhcpv4.FromBytes: %s", err)
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
b := make([]byte, 1500)
_ = c.SetReadDeadline(time.Now().Add(defaultDiscoverTime))
n, _, err := c.ReadFrom(b)
if err != nil {
if isTimeout(err) {
log.Debug("dhcpv4: didn't receive dhcp response")
return false, false, nil | <mask> }
<mask>
<mask> log.Tracef("Received packet (%v bytes)", n)
<mask>
<mask> response, err := dhcpv4.FromBytes(b[:n])
<mask> if err != nil {
<mask> log.Debug("DHCPv4: dhcpv4.FromBytes: %s", err)
<mask> continue
<mask> }
<mask>
<mask> log.Debug("DHCPv4: received message from server: %... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
return false, false, fmt.Errorf("receiving packet: %w", err)
} | <mask> log.Debug("DHCPv4: dhcpv4.FromBytes: %s", err)
<mask> continue
<mask> }
<mask>
<mask> log.Debug("DHCPv4: received message from server: %s", response.Summary())
<mask>
<mask> if !(response.OpCode == dhcpv4.OpcodeBootReply &&
<mask> response.HWType == iana.HWTypeEthernet &&
<mask> byte... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
log.Tracef("received packet, %d bytes", n) | <mask> }
<mask>
<mask> log.Debug("DHCPv4: received message from server: %s", response.Summary())
<mask>
<mask> if !(response.OpCode == dhcpv4.OpcodeBootReply &&
<mask> response.HWType == iana.HWTypeEthernet &&
<mask> bytes.Equal(response.ClientHWAddr, iface.HardwareAddr) &&
<mask> bytes.Equal(r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
response, err := dhcpv4.FromBytes(b[:n])
if err != nil {
log.Debug("dhcpv4: encoding: %s", err)
return false, true, err | <mask> log.Debug("DHCPv4: received message from server doesn't match our request")
<mask> continue
<mask> }
<mask>
<mask> log.Tracef("The packet is from an active DHCP server")
<mask> // that's a DHCP server there
<mask> return true, nil
<mask> }
<mask> }
<mask>
<mask> // CheckIfOtherDHCPSer... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
ifaceIPNet, err := ifaceIPv6Addrs(iface)
if err != nil {
return false, fmt.Errorf("getting ipv6 addrs for iface %s: %w", ifaceName, err)
} | <mask> if err != nil {
<mask> return false, fmt.Errorf("dhcpv6: net.InterfaceByName: %s: %w", ifaceName, err)
<mask> }
<mask>
<mask> ifaceIPNet := getIfaceIPv6(*iface)
<mask> if len(ifaceIPNet) == 0 {
<mask> return false, fmt.Errorf("dhcpv6: couldn't find IPv6 address of interface %s %+v", ifaceName, if... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
return false, fmt.Errorf("interface %s has no ipv6 addresses", ifaceName) | <mask> }
<mask>
<mask> ifaceIPNet := getIfaceIPv6(*iface)
<mask> if len(ifaceIPNet) == 0 {
<mask> return false, fmt.Errorf("dhcpv6: couldn't find IPv6 address of interface %s %+v", ifaceName, iface)
<mask> }
<mask>
<mask> srcIP := ifaceIPNet[0]
<mask> src := net.JoinHostPort(srcIP.String(), "546")
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/check_other_dhcp.go |
} else if err4 != nil { | <mask> othSrv := map[string]interface{}{}
<mask> foundVal := "no"
<mask> if found4 {
<mask> foundVal = "yes"
<mask> } else if err != nil {
<mask> foundVal = "error"
<mask> othSrv["error"] = err4.Error()
<mask> }
<mask> othSrv["found"] = foundVal
<mask> v4["other_server"] = othSrv
</s> Pull reque... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/dhcp_http.go |
<mask> }
<mask> return operr.Timeout()
<mask> }
<mask>
<mask> // Get IPv4 address list
<mask> func getIfaceIPv4(iface net.Interface) []net.IP {
<mask> addrs, err := iface.Addrs()
<mask> if err != nil {
<mask> return nil
<mask> }
<mask>
<mask> var res []net.IP
<mask> for _, a := range addrs {
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep"... | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/helpers.go | |
func ip4InRange(start, stop, ip net.IP) bool { | <mask> func (s *v4Server) WriteDiskConfig6(c *V6ServerConf) {
<mask> }
<mask>
<mask> // Return TRUE if IP address is within range [start..stop]
<mask> func ip4InRange(start net.IP, stop net.IP, ip net.IP) bool {
<mask> if len(start) != 4 || len(stop) != 4 {
<mask> return false
<mask> }
<mask> from := bin... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
func (s *v4Server) processDiscover(req, resp *dhcpv4.DHCPv4) *Lease { | <mask> s.conf.notify(LeaseChangedAdded)
<mask> }
<mask>
<mask> // Process Discover request and return lease
<mask> func (s *v4Server) processDiscover(req *dhcpv4.DHCPv4, resp *dhcpv4.DHCPv4) *Lease {
<mask> mac := req.ClientHWAddr
<mask>
<mask> s.leasesLock.Lock()
<mask> defer s.leasesLock.Unlock()
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
func (s *v4Server) processRequest(req, resp *dhcpv4.DHCPv4) (*Lease, bool) { | <mask> }
<mask>
<mask> // Process Request request and return lease
<mask> // Return false if we don't need to reply
<mask> func (s *v4Server) processRequest(req *dhcpv4.DHCPv4, resp *dhcpv4.DHCPv4) (*Lease, bool) {
<mask> var lease *Lease
<mask> mac := req.ClientHWAddr
<mask> hostname := req.Options.Get(dhc... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
func (s *v4Server) process(req, resp *dhcpv4.DHCPv4) int { | <mask> // Find a lease associated with MAC and prepare response
<mask> // Return 1: OK
<mask> // Return 0: error; reply with Nak
<mask> // Return -1: error; don't reply
<mask> func (s *v4Server) process(req *dhcpv4.DHCPv4, resp *dhcpv4.DHCPv4) int {
<mask> var lease *Lease
<mask>
<mask> resp.UpdateOption(dhc... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
// ifaceIPv4Addrs returns the interface's IPv4 addresses.
func ifaceIPv4Addrs(iface *net.Interface) (ips []net.IP, err error) {
addrs, err := iface.Addrs()
if err != nil {
return nil, err
}
for _, a := range addrs {
ipnet, ok := a.(*net.IPNet)
if !ok {
continue
}
if ip := ipnet.IP.To4(); ip != nil {
... | <mask> return
<mask> }
<mask> }
<mask>
<mask> // Start - start server
<mask> func (s *v4Server) Start() error {
<mask> if !s.conf.Enabled {
<mask> return nil
<mask> }
<mask>
</s> Pull request: * dhcpd: send secondary dns as well
Merge in DNS/adguard-home from 1708-secondary-dns to master
Updates #... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
ifaceName := s.conf.InterfaceName
iface, err := net.InterfaceByName(ifaceName) | <mask> if !s.conf.Enabled {
<mask> return nil
<mask> }
<mask>
<mask> iface, err := net.InterfaceByName(s.conf.InterfaceName)
<mask> if err != nil {
<mask> return fmt.Errorf("dhcpv4: Couldn't find interface by name %s: %w", s.conf.InterfaceName, err)
<mask> }
<mask>
<mask> log.Debug("dhcpv4: starti... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
return fmt.Errorf("dhcpv4: finding interface %s by name: %w", ifaceName, err) | <mask> }
<mask>
<mask> iface, err := net.InterfaceByName(s.conf.InterfaceName)
<mask> if err != nil {
<mask> return fmt.Errorf("dhcpv4: Couldn't find interface by name %s: %w", s.conf.InterfaceName, err)
<mask> }
<mask>
<mask> log.Debug("dhcpv4: starting...")
<mask> s.conf.dnsIPAddrs = getIfaceIPv4(*... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
dnsIPAddrs, err := ifaceIPv4Addrs(iface)
if err != nil {
return fmt.Errorf("dhcpv4: getting ipv4 addrs for iface %s: %w", ifaceName, err)
}
switch len(dnsIPAddrs) {
case 0:
log.Debug("dhcpv4: no ipv4 address for interface %s", iface.Name)
| <mask> return fmt.Errorf("dhcpv4: Couldn't find interface by name %s: %w", s.conf.InterfaceName, err)
<mask> }
<mask>
<mask> log.Debug("dhcpv4: starting...")
<mask> s.conf.dnsIPAddrs = getIfaceIPv4(*iface)
<mask> if len(s.conf.dnsIPAddrs) == 0 {
<mask> log.Debug("dhcpv4: no IPv6 address for interface %s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
case 1:
// Some Android devices use 8.8.8.8 if there is no secondary DNS
// server. Fix that by setting the secondary DNS address to our
// address as well.
//
// See https://github.com/AdguardTeam/AdGuardHome/issues/1708.
log.Debug("dhcpv4: setting secondary dns ip to iself for interface %s", iface.Name)... | <mask> case 0:
<mask> log.Debug("dhcpv4: no ipv4 address for interface %s", iface.Name)
<mask>
<mask> return nil
<mask> }
<mask>
<mask> s.conf.dnsIPAddrs = dnsIPAddrs
<mask>
<mask> laddr := &net.UDPAddr{
<mask> IP: net.ParseIP("0.0.0.0"),
</s> Pull request: * dhcpd: send secondary dns as well
... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
s.conf.dnsIPAddrs = dnsIPAddrs
| <mask> default:
<mask> // Go on.
<mask> }
<mask>
<mask> laddr := &net.UDPAddr{
<mask> IP: net.ParseIP("0.0.0.0"),
<mask> Port: dhcpv4.ServerPort,
<mask> }
<mask> s.srv, err = server4.NewServer(iface.Name, laddr, s.packetHandler, server4.WithDebugLogger())
</s> Pull request: * dhcpd: send seconda... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v4.go |
// ifaceIPv6Addrs returns the interface's IPv6 addresses.
func ifaceIPv6Addrs(iface *net.Interface) (ips []net.IP, err error) { | <mask> return
<mask> }
<mask> }
<mask>
<mask> // Get IPv6 address list
<mask> func getIfaceIPv6(iface net.Interface) []net.IP {
<mask> addrs, err := iface.Addrs()
<mask> if err != nil {
<mask> return nil
<mask> }
<mask>
</s> Pull request: * dhcpd: send secondary dns as well
Merge in DNS/adguard-h... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
return nil, err | <mask> // Get IPv6 address list
<mask> func getIfaceIPv6(iface net.Interface) []net.IP {
<mask> addrs, err := iface.Addrs()
<mask> if err != nil {
<mask> return nil
<mask> }
<mask>
<mask> var res []net.IP
<mask> for _, a := range addrs {
<mask> ipnet, ok := a.(*net.IPNet)
</s> Pull request: * dhcpd... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
<mask> if err != nil {
<mask> return nil
<mask> }
<mask>
<mask> var res []net.IP
<mask> for _, a := range addrs {
<mask> ipnet, ok := a.(*net.IPNet)
<mask> if !ok {
<mask> continue
<mask> }
</s> Pull request: * dhcpd: send secondary dns as well
Merge in DNS/adguard-home from 1708-secondary-d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go | |
if ip := ipnet.IP.To16(); ip != nil {
ips = append(ips, ip) | <mask> ipnet, ok := a.(*net.IPNet)
<mask> if !ok {
<mask> continue
<mask> }
<mask> if ipnet.IP.To4() == nil {
<mask> res = append(res, ipnet.IP)
<mask> }
<mask> }
<mask> return res
<mask> }
<mask>
</s> Pull request: * dhcpd: send secondary dns as well
Merge in DNS/adguard-home from 1708-... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
return ips, nil | <mask> if ipnet.IP.To4() == nil {
<mask> res = append(res, ipnet.IP)
<mask> }
<mask> }
<mask> return res
<mask> }
<mask>
<mask> // initialize RA module
<mask> func (s *v6Server) initRA(iface *net.Interface) error {
<mask> // choose the source IP address - should be link-local-unicast
</s> Pull req... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
// Start starts the IPv6 DHCP server. | <mask> s.ra.packetSendPeriod = 1 * time.Second
<mask> return s.ra.Init()
<mask> }
<mask>
<mask> // Start - start server
<mask> func (s *v6Server) Start() error {
<mask> if !s.conf.Enabled {
<mask> return nil
<mask> }
<mask>
</s> Pull request: * dhcpd: send secondary dns as well
Merge in DNS/adguard-... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
ifaceName := s.conf.InterfaceName
iface, err := net.InterfaceByName(ifaceName)
if err != nil {
return fmt.Errorf("dhcpv6: finding interface %s by name: %w", ifaceName, err)
}
log.Debug("dhcpv4: starting...")
dnsIPAddrs, err := ifaceIPv6Addrs(iface) | <mask> if !s.conf.Enabled {
<mask> return nil
<mask> }
<mask>
<mask> iface, err := net.InterfaceByName(s.conf.InterfaceName)
<mask> if err != nil {
<mask> return fmt.Errorf("couldn't find interface by name %s: %w", s.conf.InterfaceName, err)
<mask> }
<mask>
<mask> s.conf.dnsIPAddrs = getIfaceIPv6(... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
return fmt.Errorf("dhcpv6: getting ipv6 addrs for iface %s: %w", ifaceName, err) | <mask> }
<mask>
<mask> iface, err := net.InterfaceByName(s.conf.InterfaceName)
<mask> if err != nil {
<mask> return fmt.Errorf("couldn't find interface by name %s: %w", s.conf.InterfaceName, err)
<mask> }
<mask>
<mask> s.conf.dnsIPAddrs = getIfaceIPv6(*iface)
<mask> if len(s.conf.dnsIPAddrs) == 0 {
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
switch len(dnsIPAddrs) {
case 0:
log.Debug("dhcpv6: no ipv6 address for interface %s", iface.Name)
| <mask> if err != nil {
<mask> return fmt.Errorf("couldn't find interface by name %s: %w", s.conf.InterfaceName, err)
<mask> }
<mask>
<mask> s.conf.dnsIPAddrs = getIfaceIPv6(*iface)
<mask> if len(s.conf.dnsIPAddrs) == 0 {
<mask> log.Debug("DHCPv6: no IPv6 address for interface %s", iface.Name)
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
case 1:
// See the comment in (*v4Server).Start.
log.Debug("dhcpv6: setting secondary dns ip to iself for interface %s", iface.Name)
dnsIPAddrs = append(dnsIPAddrs, dnsIPAddrs[0])
default:
// Go on. | <mask> case 0:
<mask> log.Debug("dhcpv6: no ipv6 address for interface %s", iface.Name)
<mask>
<mask> return nil
<mask> }
<mask>
<mask> s.conf.dnsIPAddrs = dnsIPAddrs
<mask>
<mask> err = s.initRA(iface)
</s> Pull request: * dhcpd: send secondary dns as well
Merge in DNS/adguard-home from 1708-seco... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
s.conf.dnsIPAddrs = dnsIPAddrs
| <mask> default:
<mask> // Go on.
<mask> }
<mask>
<mask> err = s.initRA(iface)
<mask> if err != nil {
<mask> return err
<mask> }
</s> Pull request: * dhcpd: send secondary dns as well
Merge in DNS/adguard-home from 1708-secondary-dns to master
Updates #1708.
Squashed commit of the following:
commi... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3cc5bf210d432ef1c75e25fba8f7bb20d8e213b9 | internal/dhcpd/v6.go |
client = &dnscrypt.Client{Timeout: defaultTimeout, AdjustPayloadSize: true} | <mask> if client == nil || serverInfo == nil || (serverInfo != nil && serverInfo.ServerCert.NotAfter < now) {
<mask> p.Lock()
<mask>
<mask> // Using "udp" for DNSCrypt upstreams by default
<mask> client = &dnscrypt.Client{Proto: "udp", Timeout: defaultTimeout}
<mask> si, _, err := client.Dial(p.boot.add... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032 | dnsforward/upstream.go |
github.com/ameshkov/dnscrypt v1.0.0 | <mask> module github.com/AdguardTeam/AdGuardHome
<mask>
<mask> require (
<mask> github.com/StackExchange/wmi v0.0.0-20180725035823-b12b22c5341f // indirect
<mask> github.com/ameshkov/dnscrypt v0.0.0-20181217090431-1215bb8b150f
<mask> github.com/beefsack/go-rate v0.0.0-20180408011153-efa7637bb9b6
<mask> gith... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032 | go.mod |
golang.org/x/net v0.0.0-20181217023233-e147a9138326
golang.org/x/sys v0.0.0-20181217223516-dcdaa6325bcb // indirect | <mask> github.com/shirou/gopsutil v2.18.10+incompatible
<mask> github.com/shirou/w32 v0.0.0-20160930032740-bb4de0191aa4 // indirect
<mask> go.uber.org/goleak v0.10.0
<mask> golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9
<mask> golang.org/x/net v0.0.0-20181213202711-891ebc4b82d6
<mask> gopkg.in/asask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032 | go.mod |
github.com/ameshkov/dnscrypt v1.0.0 h1:Y7YexPCxtVCTDXlXu9n17+1H5YS25vftx8vV8Dhuu+E=
github.com/ameshkov/dnscrypt v1.0.0/go.mod h1:EC7Z1GguyEEwhuLXrcgkRTE3GdyPDSWq2OXefhydGWo= | <mask> github.com/aead/poly1305 v0.0.0-20180717145839-3fee0db0b635/go.mod h1:lmLxL+FV291OopO93Bwf9fQLQeLyt33VJRUg5VJ30us=
<mask> github.com/ameshkov/dnscrypt v0.0.0-20181217090431-1215bb8b150f h1:vOaSvI9B3wqzV1g8raDeVzRJnq5RHQxsz0MVXudxdNU=
<mask> github.com/ameshkov/dnscrypt v0.0.0-20181217090431-1215bb8b150f/go.mo... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032 | go.sum |
golang.org/x/net v0.0.0-20181217023233-e147a9138326 h1:iCzOf0xz39Tstp+Tu/WwyGjUXCk34QhQORRxBeXXTA4=
golang.org/x/net v0.0.0-20181217023233-e147a9138326/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= | <mask> golang.org/x/net v0.0.0-20181213202711-891ebc4b82d6 h1:gT0Y6H7hbVPUtvtk0YGxMXPgN+p8fYlqWkgJeUCZcaQ=
<mask> golang.org/x/net v0.0.0-20181213202711-891ebc4b82d6/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
<mask> golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f h1:wMNYb4v58l5UBM7MYRLPG6ZhfOqbKu7X5... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032 | go.sum |
golang.org/x/sys v0.0.0-20181217223516-dcdaa6325bcb h1:zzdd4xkMwu/GRxhSUJaCPh4/jil9kAbsU7AUmXboO+A=
golang.org/x/sys v0.0.0-20181217223516-dcdaa6325bcb/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= | <mask> golang.org/x/sys v0.0.0-20181213200352-4d1cda033e06 h1:0oC8rFnE+74kEmuHZ46F6KHsMr5Gx2gUQPuNz28iQZM=
<mask> golang.org/x/sys v0.0.0-20181213200352-4d1cda033e06/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
<mask> gopkg.in/asaskevich/govalidator.v4 v4.0.0-20160518190739-766470278477 h1:5xUJw+lg4zao9W4H... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3d179079661e3c97041a8448ec3aecea40199032 | go.sum |
// Create a ClientHost implicitly so that we don't do this check again | <mask> log.Debug("Clients: set WHOIS info for auto-client %s: %v", ch.Host, ch.WhoisInfo)
<mask> return
<mask> }
<mask>
<mask> ch = &ClientHost{
<mask> Source: ClientSourceWHOIS,
<mask> }
<mask> ch.WhoisInfo = info
<mask> clients.ipHost[ip] = ch
<mask> log.Debug("Clients: set WHOIS info for auto-... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3dd91cf17962b4b5d39f31424adeeab579416666 | home/clients.go |
IDs: []string{"1.1.1.1", "1:2:3::4", "aa:aa:aa:aa:aa:aa", "2.2.2.0/24"}, | <mask> testIP := "1.2.3.4"
<mask>
<mask> // add a client
<mask> c = Client{
<mask> IDs: []string{"1.1.1.1", "1:2:3::4", "aa:aa:aa:aa:aa:aa"},
<mask> Name: "client1",
<mask> }
<mask> ok, err := clients.Add(c)
<mask> assert.True(t, ok)
<mask> assert.Nil(t, err)
</s> -: add one more test | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3dd91cf17962b4b5d39f31424adeeab579416666 | home/clients_test.go |
// don't allow duplicates by CIDR
ok, err = clients.AddHost("2.2.2.2", "test", ClientSourceRDNS)
assert.False(t, ok)
assert.Nil(t, err) | <mask> // try adding a duplicate IP which for a Mac-based client
<mask> ok, err = clients.AddHost(testIP, "test", ClientSourceRDNS)
<mask> assert.False(t, ok)
<mask> assert.Nil(t, err)
<mask> }
</s> -: add one more test </s> remove IDs: []string{"1.1.1.1", "1:2:3::4", "aa:aa:aa:aa:aa:aa"},
</s> add IDs:... | [
"keep",
"keep",
"keep",
"add",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3dd91cf17962b4b5d39f31424adeeab579416666 | home/clients_test.go |
"errors" | <mask> // Package dnsforward contains a DNS forwarding server.
<mask> package dnsforward
<mask>
<mask> import (
<mask> "fmt"
<mask> "net"
<mask> "net/http"
<mask> "os"
<mask> "runtime"
</s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling
Merge in DNS/adguard-home from ipset-fix... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/dnsforward.go |
"os" | <mask> "errors"
<mask> "fmt"
<mask> "net"
<mask> "net/http"
<mask> "runtime"
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
</s> Pull request: dnsforward: imp ipset caching, logging, and ep... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/dnsforward.go |
if !errors.Is(err, os.ErrPermission) {
return fmt.Errorf("cannot initialize ipset: %w", err)
}
// ipset cannot currently be initialized if the server was
// installed from Snap or when the user or the binary doesn't
// have the required permissions.
//
// Log and go on.
log.Error("cannot initialize ... | <mask> // Initialize IPSET configuration
<mask> // --
<mask> err := s.ipset.init(s.conf.IPSETList)
<mask> if err != nil {
<mask> // ipset cannot be initialized in a Snap version (and maybe - without root)
<mask> // this needs to be handled properly
<mask> // TODO: Handle this properly
<mask> log.Inf... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/dnsforward.go |
// TODO(a.garipov): Currently, the ipset list is static, and we don't
// read the IPs already in sets, so we can assume that all incoming IPs
// are either added to all corresponding ipsets or not. When that stops
// being the case, for example if we add dynamic reconfiguration of
// ipsets, this map will need to... | <mask> nameToIpset map[string]ipsetProps
<mask> domainToIpsets map[string][]ipsetProps
<mask>
<mask> addedIPs map[[16]byte]struct{}
<mask>
<mask> ipv4Conn *ipset.Conn
<mask> ipv6Conn *ipset.Conn
</s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling
Merge in DNS/adguard-home fr... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/ipset_linux.go |
var err error
| <mask>
<mask> // process adds the resolved IP addresses to the domain's ipsets, if any.
<mask> func (c *ipsetCtx) process(ctx *dnsContext) (rc resultCode) {
<mask> if c == nil {
<mask> return resultCodeSuccess
<mask> }
<mask>
</s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling
M... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/ipset_linux.go |
log.Debug("ipset: starting processing")
| <mask> }
<mask>
<mask> c.mu.Lock()
<mask> defer c.mu.Unlock()
<mask>
<mask> if c.skipIpsetProcessing(ctx) {
<mask> log.Debug("ipset: skipped processing for request")
</s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling
Merge in DNS/adguard-home from ipset-fix to master
Updates... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/ipset_linux.go |
log.Debug("ipset: no ipsets for host %s", host)
| <mask> host = strings.TrimSuffix(host, ".")
<mask> host = strings.ToLower(host)
<mask> sets := c.lookupHost(host)
<mask> if len(sets) == 0 {
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> log.Debug("ipset: found ipsets %+v for host %s", sets, host)
<mask>
</s> Pull request: dnsforward: imp i... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/ipset_linux.go |
<mask>
<mask> v4s = append(v4s, ip)
<mask> }
<mask>
<mask> var err error
<mask> setLoop:
<mask> for _, set := range sets {
<mask> switch set.family {
<mask> case netfilter.ProtoIPv4:
<mask> err = c.addIPs(host, set, v4s)
</s> Pull request: dnsforward: imp ipset caching, logging, and eperm handl... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/ipset_linux.go | |
} else {
log.Debug("ipset: processed %d new ips", len(v4s)+len(v6s))
}
for _, ip := range v4s {
var iparr [16]byte
copy(iparr[:], ip.To16())
c.addedIPs[iparr] = struct{}{}
}
for _, ip := range v6s {
var iparr [16]byte
copy(iparr[:], ip.To16())
c.addedIPs[iparr] = struct{}{} | <mask> }
<mask> if err != nil {
<mask> log.Error("ipset: adding host ips: %s", err)
<mask> }
<mask>
<mask> return resultCodeSuccess
<mask> }
</s> Pull request: dnsforward: imp ipset caching, logging, and eperm handling
Merge in DNS/adguard-home from ipset-fix to master
Updates #2619.
Squashed commit o... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e0238aa99c18fe5eae1a4a122f43daf8918bd75 | internal/dnsforward/ipset_linux.go |
msg := fmt.Sprintf("failed to read request body: %s", err)
log.Error(msg)
http.Error(w, msg, http.StatusBadRequest) | <mask> // Respond with results
<mask> func (s *Server) handleDHCPFindActiveServer(w http.ResponseWriter, r *http.Request) {
<mask> body, err := ioutil.ReadAll(r.Body)
<mask> if err != nil {
<mask> errorText := fmt.Sprintf("failed to read request body: %s", err)
<mask> log.Error(errorText)
<mask> http.Err... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/dhcp_http.go |
msg := "empty interface name specified"
log.Error(msg)
http.Error(w, msg, http.StatusBadRequest) | <mask> }
<mask>
<mask> interfaceName := strings.TrimSpace(string(body))
<mask> if interfaceName == "" {
<mask> errorText := fmt.Sprintf("empty interface name specified")
<mask> log.Error(errorText)
<mask> http.Error(w, errorText, http.StatusBadRequest)
<mask> return
<mask> }
<mask>
<mask> foun... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/dhcp_http.go |
<mask>
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func check(t *testing.T, result bool, msg string) {
<mask> if !result {
<mask> t.Fatal(msg)
<mask> }
<mask> }
<mask>
<mask> func testNotify(flags uint32) {
<mask> }
<mask>
<mask> // Leases database store/load
<mask> func T... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/dhcpd_test.go | |
// DefaultServers is the address of all link-local DHCP servers and
// relay agents.
var DefaultServers = &net.UDPAddr{
IP: net.IPv4bcast,
Port: ServerPort,
} | <mask> // ServerPort is the port that DHCP servers and relay agents listen on.
<mask> ServerPort = 67
<mask> )
<mask>
<mask> var (
<mask> // DefaultServers is the address of all link-local DHCP servers and
<mask> // relay agents.
<mask> DefaultServers = &net.UDPAddr{
<mask> IP: net.IPv4bcast,
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/nclient4/client.go |
<mask> return
<mask> }
<mask> }
<mask>
<mask> // nolint
<mask> func withBufferCap(n int) ClientOpt {
<mask> return func(c *Client) (err error) {
<mask> c.bufferCap = n
<mask> return
<mask> }
<mask> }
<mask>
<mask> // WithRetry configures the number of retransmissions to attempt.
<mask> //
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/nclient4/client.go | |
func withBufferCap(n int) ClientOpt {
return func(c *Client) (err error) {
c.bufferCap = n
return
}
}
| <mask> p.ClientHWAddr = net.HardwareAddr{0xa, 0xb, 0xc, 0xd, 0xe, 0xf}
<mask> return p
<mask> }
<mask>
<mask> func TestSendAndRead(t *testing.T) {
<mask> for _, tt := range []struct {
<mask> desc string
<mask> send *dhcpv4.DHCPv4
<mask> server []*dhcpv4.DHCPv4
</s> Pull request:* all: fix all st... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/nclient4/client_test.go |
m := make(map[string]string) | <mask> if err != nil {
<mask> return nil
<mask> }
<mask>
<mask> m := make(map[string]string, 0)
<mask>
<mask> matches := re.FindAllStringSubmatch(out, -1)
<mask> for i := range matches {
<mask> port := matches[i][1]
<mask> device := matches[i][2]
</s> Pull request:* all: fix all staticcheck simp... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/network_utils.go |
func ip6InRange(start, ip net.IP) bool { | <mask> }
<mask>
<mask> // Return TRUE if IP address is within range [start..0xff]
<mask> // nolint(staticcheck)
<mask> func ip6InRange(start net.IP, ip net.IP) bool {
<mask> if len(start) != 16 {
<mask> return false
<mask> }
<mask> //lint:ignore SA1021 TODO(e.burkov): Ignore this for now, think about usi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/v6.go |
lifetime = time.Until(lease.Expiry) | <mask> case dhcpv6.MessageTypeSolicit:
<mask> //
<mask>
<mask> case dhcpv6.MessageTypeConfirm:
<mask> lifetime = lease.Expiry.Sub(time.Now())
<mask>
<mask> case dhcpv6.MessageTypeRequest,
<mask> dhcpv6.MessageTypeRenew,
<mask> dhcpv6.MessageTypeRebind:
<mask>
</s> Pull request:* all: fix all st... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/v6.go |
func (s *v6Server) process(msg *dhcpv6.Message, req, resp dhcpv6.DHCPv6) bool { | <mask> return lifetime
<mask> }
<mask>
<mask> // Find a lease associated with MAC and prepare response
<mask> func (s *v6Server) process(msg *dhcpv6.Message, req dhcpv6.DHCPv6, resp dhcpv6.DHCPv6) bool {
<mask> switch msg.Type() {
<mask> case dhcpv6.MessageTypeSolicit,
<mask> dhcpv6.MessageTypeRequest,
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dhcpd/v6.go |
func (d *Dnsfilter) SetFilters(blockFilters, allowFilters []Filter, async bool) error { | <mask>
<mask> // SetFilters - set new filters (synchronously or asynchronously)
<mask> // When filters are set asynchronously, the old filters continue working until the new filters are ready.
<mask> // In this case the caller must ensure that the old filter files are intact.
<mask> func (d *Dnsfilter) SetFilter... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
// fileExists returns true if file exists. | <mask> //
<mask> // Adding rule and matching against the rules
<mask> //
<mask>
<mask> // Return TRUE if file exists
<mask> func fileExists(fn string) bool {
<mask> _, err := os.Stat(fn)
<mask> if err != nil {
<mask> return false
<mask> }
</s> Pull request:* all: fix all staticcheck simplification and ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
return err == nil | <mask>
<mask> // Return TRUE if file exists
<mask> func fileExists(fn string) bool {
<mask> _, err := os.Stat(fn)
<mask> if err != nil {
<mask> return false
<mask> }
<mask> return true
<mask> }
<mask>
<mask> func createFilteringEngine(filters []Filter) (*filterlist.RuleStorage, *urlfilter.DNSEngine, ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
// it's difficult to update this file while it's being
// used. | <mask> IgnoreCosmetic: true,
<mask> }
<mask> } else if runtime.GOOS == "windows" {
<mask> // On Windows we don't pass a file to urlfilter because
<mask> // it's difficult to update this file while it's being used.
<mask> data, err := ioutil.ReadFile(f.FilePath)
<mask> if err != nil {
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
// Initialize urlfilter objects. | <mask> filteringEngine := urlfilter.NewDNSEngine(rulesStorage)
<mask> return rulesStorage, filteringEngine, nil
<mask> }
<mask>
<mask> // Initialize urlfilter objects
<mask> func (d *Dnsfilter) initFiltering(allowFilters, blockFilters []Filter) error {
<mask> rulesStorage, filteringEngine, err := createFilte... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
// matchHost is a low-level way to check only if hostname is filtered by rules,
// skipping expensive safebrowsing and parental lookups. | <mask>
<mask> return nil
<mask> }
<mask>
<mask> // matchHost is a low-level way to check only if hostname is filtered by rules, skipping expensive safebrowsing and parental lookups
<mask> func (d *Dnsfilter) matchHost(host string, qtype uint16, setts RequestFilteringSettings) (Result, error) {
<mask> d.engin... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
// InitModule manually initializes blocked services map. | <mask> }
<mask> return res
<mask> }
<mask>
<mask> // InitModule() - manually initialize blocked services map
<mask> func InitModule() {
<mask> initBlockedServices()
<mask> }
<mask>
<mask> // New creates properly initialized DNS Filter that is ready to be used
</s> Pull request:* all: fix all staticcheck... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
// New creates properly initialized DNS Filter that is ready to be used. | <mask> func InitModule() {
<mask> initBlockedServices()
<mask> }
<mask>
<mask> // New creates properly initialized DNS Filter that is ready to be used
<mask> func New(c *Config, blockFilters []Filter) *Dnsfilter {
<mask> if c != nil {
<mask> cacheConf := cache.Config{
<mask> EnableLRU: true,
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
<mask> cacheConf := cache.Config{
<mask> EnableLRU: true,
<mask> }
<mask>
<mask> // initialize objects only once
<mask>
<mask> if gctx.safebrowsingCache == nil {
<mask> cacheConf.MaxSize = c.SafeBrowsingCacheSize
<mask> gctx.safebrowsingCache = cache.New(cacheConf)
<mask> }
<mask>
</s>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go | |
// GetStats return dns filtering stats since startup. | <mask> //
<mask> // stats
<mask> //
<mask>
<mask> // GetStats return dns filtering stats since startup
<mask> func (d *Dnsfilter) GetStats() Stats {
<mask> return gctx.stats
<mask> }
</s> Pull request:* all: fix all staticcheck simplification and unused warnings
Merge in DNS/adguard-home from 2270-fix-s-u-w... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter.go |
<mask>
<mask> import (
<mask> "fmt"
<mask> "net"
<mask> "os"
<mask> "path"
<mask> "runtime"
<mask> "testing"
<mask>
<mask> "github.com/AdguardTeam/urlfilter/rules"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
</s> Pull request:* all: fix all staticcheck simplificatio... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter_test.go | |
<mask> gctx.safeSearchCache.Clear()
<mask> }
<mask> }
<mask>
<mask> func _Func() string {
<mask> pc := make([]uintptr, 10) // at least 1 entry needed
<mask> runtime.Callers(2, pc)
<mask> f := runtime.FuncForPC(pc[0])
<mask> return path.Base(f.Name())
<mask> }
<mask>
<mask> func NewForTest(c *Config... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter_test.go | |
func (d *Dnsfilter) checkMatchIP(t *testing.T, hostname, ip string, qtype uint16) { | <mask> t.Errorf("Expected hostname %s to match", hostname)
<mask> }
<mask> }
<mask>
<mask> func (d *Dnsfilter) checkMatchIP(t *testing.T, hostname string, ip string, qtype uint16) {
<mask> t.Helper()
<mask> ret, err := d.CheckHost(hostname, qtype, &setts)
<mask> if err != nil {
<mask> t.Errorf("Error ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter_test.go |
filters := []Filter{{ | <mask> 0.0.0.2 host2
<mask> ::1 host2
<mask> `,
<mask> addr, addr6)
<mask> filters := []Filter{Filter{
<mask> ID: 0, Data: []byte(text),
<mask> }}
<mask> d := NewForTest(nil, filters)
<mask> defer d.Close()
<mask>
</s> Pull request:* all: fix all staticcheck simplification and unused warnings
Merge... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter_test.go |
const nl = "\n"
const (
blockingRules = `||example.org^` + nl
whitelistRules = `||example.org^` + nl + `@@||test.example.org` + nl
importantRules = `@@||example.org^` + nl + `||test.example.org^$important` + nl
regexRules = `/example\.org/` + nl + `@@||test.example.org^` + nl
maskRules = `test*.example.... | <mask> }
<mask>
<mask> // FILTERING
<mask>
<mask> var blockingRules = "||example.org^\n"
<mask> var whitelistRules = "||example.org^\n@@||test.example.org\n"
<mask> var importantRules = "@@||example.org^\n||test.example.org^$important\n"
<mask> var regexRules = "/example\\.org/\n@@||test.example.org^\n"
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter_test.go |
filters := []Filter{{ | <mask>
<mask> func TestMatching(t *testing.T) {
<mask> for _, test := range tests {
<mask> t.Run(fmt.Sprintf("%s-%s", test.testname, test.hostname), func(t *testing.T) {
<mask> filters := []Filter{Filter{
<mask> ID: 0, Data: []byte(test.rules),
<mask> }}
<mask> d := NewForTest(nil, filters)
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/3e1f922252e2a9b735b0be28733067f3b85bb6f3 | internal/dnsfilter/dnsfilter_test.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.