docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
return ensure(http.MethodPost, handler)
<mask> } <mask> } <mask> <mask> func ensurePOST(handler func(http.ResponseWriter, *http.Request)) func(http.ResponseWriter, *http.Request) { <mask> return ensure("POST", handler) <mask> } <mask> <mask> func ensureGET(handler func(http.ResponseWriter, *http.Request)) func(http.ResponseWriter, *http.Request) ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
internal/home/control.go
return ensure(http.MethodGet, handler)
<mask> return ensure("POST", handler) <mask> } <mask> <mask> func ensureGET(handler func(http.ResponseWriter, *http.Request)) func(http.ResponseWriter, *http.Request) { <mask> return ensure("GET", handler) <mask> } <mask> <mask> // Bridge between http.Handler object and Go function <mask> type httpHandler ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
internal/home/control.go
'properties':
<mask> 'content': <mask> 'application/json': <mask> 'schema': <mask> 'type': 'object' <mask> 'parameters': <mask> 'enabled': <mask> 'type': 'boolean' <mask> 'examples': <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
'properties':
<mask> 'content': <mask> 'application/json': <mask> 'schema': <mask> 'type': 'object' <mask> 'parameters': <mask> 'enable': <mask> 'type': 'boolean' <mask> 'sensitivity': <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
'properties':
<mask> 'content': <mask> 'application/json': <mask> 'schema': <mask> 'type': 'object' <mask> 'parameters': <mask> 'enabled': <mask> 'type': 'boolean' <mask> 'examples': <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
- 'dns_addresses'
<mask> 'ServerStatus': <mask> 'type': 'object' <mask> 'description': 'AdGuard Home server status and configuration' <mask> 'required': <mask> - 'dns_address' <mask> - 'dns_port' <mask> - 'protection_enabled' <mask> - 'querylog_enabled' <mask> - 'running' <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
- 'http_port'
<mask> - 'dns_addresses' <mask> - 'dns_port' <mask> - 'protection_enabled' <mask> - 'running' <mask> - 'version' <mask> - 'language' <mask> 'properties': <mask> 'dns_addresses': </s> Pull request: all: imp http handlers, imp docs Merge in DNS/adguard-home from...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
<mask> 'required': <mask> - 'dns_address' <mask> - 'dns_port' <mask> - 'protection_enabled' <mask> - 'querylog_enabled' <mask> - 'running' <mask> - 'bootstrap_dns' <mask> - 'upstream_dns' <mask> - 'version' <mask> - 'language' </s> Pull request: all...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
<mask> - 'dns_port' <mask> - 'protection_enabled' <mask> - 'querylog_enabled' <mask> - 'running' <mask> - 'bootstrap_dns' <mask> - 'upstream_dns' <mask> - 'version' <mask> - 'language' <mask> 'properties': <mask> 'dns_address': <mask> 't...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
'dns_addresses': 'example': ['127.0.0.1'] 'items': 'type': 'string' 'type': 'array'
<mask> - 'upstream_dns' <mask> - 'version' <mask> - 'language' <mask> 'properties': <mask> 'dns_address': <mask> 'type': 'string' <mask> 'example': '127.0.0.1' <mask> 'dns_port': <mask> 'type': 'integer' <mask> 'format': 'uint16' ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
'http_port': 'type': 'integer' 'format': 'uint16' 'example': 80 'minimum': 1 'maximum': 65535
<mask> 'example': 53 <mask> 'minimum': 1 <mask> 'maximum': 65535 <mask> 'protection_enabled': <mask> 'type': 'boolean' <mask> 'dhcp_available': <mask> 'type': 'boolean' <mask> 'running': </s> Pull request: all: imp http handlers, imp doc...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
<mask> 'protection_enabled': <mask> 'type': 'boolean' <mask> 'dhcp_available': <mask> 'type': 'boolean' <mask> 'querylog_enabled': <mask> 'type': 'boolean' <mask> 'running': <mask> 'type': 'boolean' <mask> 'version': <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
<mask> 'properties': <mask> 'status': <mask> 'type': 'string' <mask> 'default': '' <mask> 'example': '' <mask> 'can_autofix': <mask> 'type': 'boolean' <mask> 'example': false <mask> 'CheckConfigStaticIpInfoStatic': <mask> 'type'...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
<mask> 'description': 'Current dynamic IP address. Set if static=no' <mask> 'error': <mask> 'type': 'string' <mask> 'default': '' <mask> 'example': '' <mask> 'description': 'Error text. Set if static=error' <mask> 'InitialConfigurationBeta': <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4474e9fcf9073af593df76b4844f4091c1c7946e
openapi/openapi.yaml
BootstrapDNS string `yaml:"bootstrap_dns"`
<mask> QueryLogEnabled bool `yaml:"querylog_enabled"` <mask> Pprof string `yaml:"-"` <mask> Cache string `yaml:"-"` <mask> Prometheus string `yaml:"-"` <mask> UpstreamDNS []string `yaml:"upstream_dns"` <mask> } <ma...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
config.go
BootstrapDNS: "8.8.8.8:53",
<mask> BlockedResponseTTL: 10, // in seconds <mask> QueryLogEnabled: true, <mask> UpstreamDNS: defaultDNS, <mask> Cache: "cache", <mask> Prometheus: "prometheus :9153", <mask> }, <mask> Filters: []filter{ </s> Added bootstrap DNS to the config file DNS healthcheck...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
config.go
{{if .UpstreamDNS}}upstream {{range .UpstreamDNS}}{{.}} {{end}} { bootstrap {{.BootstrapDNS}} }{{end}}
<mask> {{.Pprof}} <mask> hosts { <mask> fallthrough <mask> } <mask> {{if .UpstreamDNS}}upstream {{range .UpstreamDNS}}{{.}} {{end}} { bootstrap 8.8.8.8:53 }{{end}} <mask> {{.Cache}} <mask> {{.Prometheus}} <mask> } <mask> ` <mask> </s> Added bootstrap DNS to the config file DN...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
config.go
<mask> "encoding/json" <mask> "fmt" <mask> "io/ioutil" <mask> "log" <mask> "net" <mask> "net/http" <mask> "os" <mask> "path/filepath" <mask> "regexp" <mask> "strconv" </s> Added bootstrap DNS to the config file DNS healthcheck now uses the upstream package methods </s> remove if resp.Response || ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
"github.com/AdguardTeam/AdGuardHome/upstream"
<mask> "strconv" <mask> "strings" <mask> "time" <mask> <mask> corednsplugin "github.com/AdguardTeam/AdGuardHome/coredns_plugin" <mask> "gopkg.in/asaskevich/govalidator.v4" <mask> ) <mask> <mask> const updatePeriod = time.Minute * 30 </s> Added bootstrap DNS to the config file DNS healthcheck now uses t...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
<mask> "strings" <mask> "time" <mask> <mask> corednsplugin "github.com/AdguardTeam/AdGuardHome/coredns_plugin" <mask> "github.com/miekg/dns" <mask> "gopkg.in/asaskevich/govalidator.v4" <mask> ) <mask> <mask> const updatePeriod = time.Minute * 30 <mask> </s> Added bootstrap DNS to the config file DNS ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
"bootstrap_dns": config.CoreDNS.BootstrapDNS,
<mask> "dns_port": config.CoreDNS.Port, <mask> "protection_enabled": config.CoreDNS.ProtectionEnabled, <mask> "querylog_enabled": config.CoreDNS.QueryLogEnabled, <mask> "running": isRunning(), <mask> "upstream_dns": config.CoreDNS.UpstreamDNS, <mask> "version": ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
hosts := strings.Fields(string(body))
<mask> http.Error(w, errorText, http.StatusBadRequest) <mask> return <mask> } <mask> // if empty body -- user is asking for default servers <mask> hosts, err := sanitiseDNSServers(string(body)) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "Invalid DNS servers were given: %s", err) ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
u, err := upstream.NewUpstream(input, config.CoreDNS.BootstrapDNS)
<mask> } <mask> } <mask> <mask> func checkDNS(input string) error { <mask> input, err := sanitizeDNSServer(input) <mask> if err != nil { <mask> return err <mask> } <mask> <mask> req := dns.Msg{} </s> Added bootstrap DNS to the config file DNS healthcheck now uses the upstream package methods </s> re...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
alive, err := upstream.IsAlive(u)
<mask> if err != nil { <mask> return err <mask> } <mask> <mask> req := dns.Msg{} <mask> req.Id = dns.Id() <mask> req.RecursionDesired = true <mask> req.Question = []dns.Question{ <mask> {Name: "google-public-dns-a.google.com.", Qtype: dns.TypeA, Qclass: dns.ClassINET}, <mask> } <mask> <mask> p...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
<mask> } <mask> <mask> prefix, host := splitDNSServerPrefixServer(input) <mask> <mask> c := dns.Client{ <mask> Timeout: time.Minute, <mask> } <mask> switch prefix { <mask> case "tls://": <mask> c.Net = "tcp-tls" <mask> } <mask> <mask> resp, rtt, err := c.Exchange(&req, host) <mask> if err ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
<mask> resp, rtt, err := c.Exchange(&req, host) <mask> if err != nil { <mask> return fmt.Errorf("couldn't communicate with DNS server %s: %s", input, err) <mask> } <mask> trace("exchange with %s took %v", input, rtt) <mask> if len(resp.Answer) != 1 { <mask> return fmt.Errorf("DNS server %s returned wron...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
if !alive { return fmt.Errorf("DNS server has not passed the healthcheck: %s", input)
<mask> } <mask> return prefix <mask> } <mask> <mask> func splitDNSServerPrefixServer(input string) (string, string) { <mask> prefix := getDNSServerPrefix(input) <mask> host := strings.TrimPrefix(input, prefix) <mask> return prefix, host <mask> } <mask> <mask> func sanitizeDNSServer(input string) (stri...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "k...
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
<mask> if ip == nil { <mask> return "", fmt.Errorf("invalid DNS server field: %s", h) <mask> } <mask> } <mask> return prefix + host, nil <mask> } <mask> <mask> func appendPortIfMissing(prefix, input string) string { <mask> port := "53" <mask> switch prefix { <mask> case "tls://": </s> Added boo...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
return nil
<mask> } <mask> return prefix + host, nil <mask> } <mask> <mask> func appendPortIfMissing(prefix, input string) string { <mask> port := "53" <mask> switch prefix { <mask> case "tls://": <mask> port = "853" <mask> } <mask> _, _, err := net.SplitHostPort(input) <mask> if err == nil { <mask> retu...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
control.go
bootstrap_dns: 8.8.8.8:53
<mask> dns_port: 53 <mask> protection_enabled: true <mask> querylog_enabled: true <mask> running: true <mask> upstream_dns: <mask> - 1.1.1.1 <m...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
openapi.yaml
if resp.Rcode != dns.RcodeServerFailure {
<mask> <mask> // If we got a header, we're alright, basically only care about I/O errors 'n stuff. <mask> if err != nil && resp != nil { <mask> // Silly check, something sane came back. <mask> if resp.Response || resp.Opcode == dns.OpcodeQuery { <mask> err = nil <mask> } <mask> } <mask> <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
upstream/helpers.go
// Persistent connections cache -- almost similar to the same used in the CoreDNS forward plugin
<mask> ) <mask> <mask> const ( <mask> defaultExpire = 10 * time.Second <mask> minDialTimeout = 100 * time.Millisecond <mask> maxDialTimeout = 30 * time.Second </s> Added bootstrap DNS to the config file DNS healthcheck now uses the upstream package methods </s> remove "github.com/miekg/dns" ...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/451922b858c77145342bc568f7773433d281fee6
upstream/persistent.go
<mask> } <mask> } <mask> <mask> func handleBlockedServicesList(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> config.RLock() <mask> list := config.DNS.BlockedServices <mask> config.RUnlock() <mask> <mask> w.Header().Set("Content-Type", "applicatio...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/blocked_services.go
<mask> } <mask> } <mask> <mask> func handleBlockedServicesSet(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> list := []string{} <mask> err := json.NewDecoder(r.Body).Decode(&list) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "j...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/blocked_services.go
httpRegister(http.MethodGet, "/control/blocked_services/list", handleBlockedServicesList) httpRegister(http.MethodPost, "/control/blocked_services/set", handleBlockedServicesSet)
<mask> } <mask> <mask> // RegisterBlockedServicesHandlers - register HTTP handlers <mask> func RegisterBlockedServicesHandlers() { <mask> http.HandleFunc("/control/blocked_services/list", postInstall(optionalAuth(ensureGET(handleBlockedServicesList)))) <mask> http.HandleFunc("/control/blocked_services/set", po...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/blocked_services.go
<mask> } <mask> <mask> // respond with information about configured clients <mask> func handleGetClients(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> data := clientListJSON{} <mask> <mask> config.clients.lock.Lock() <mask> for _, c := range config....
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/clients.go
<mask> } <mask> <mask> // Add a new client <mask> func handleAddClient(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> body, err := ioutil.ReadAll(r.Body) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "failed to read request body: %s", err) ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/clients.go
<mask> } <mask> <mask> // Remove client <mask> func handleDelClient(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> body, err := ioutil.ReadAll(r.Body) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "failed to read request body: %s", err) <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/clients.go
<mask> } <mask> <mask> // Update client's properties <mask> func handleUpdateClient(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> body, err := ioutil.ReadAll(r.Body) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "failed to read request bod...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/clients.go
httpRegister(http.MethodGet, "/control/clients", handleGetClients) httpRegister(http.MethodPost, "/control/clients/add", handleAddClient) httpRegister(http.MethodPost, "/control/clients/delete", handleDelClient) httpRegister(http.MethodPost, "/control/clients/update", handleUpdateClient)
<mask> } <mask> <mask> // RegisterClientsHandlers registers HTTP handlers <mask> func RegisterClientsHandlers() { <mask> http.HandleFunc("/control/clients", postInstall(optionalAuth(ensureGET(handleGetClients)))) <mask> http.HandleFunc("/control/clients/add", postInstall(optionalAuth(ensurePOST(handleAddClient...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/clients.go
<mask> import ( <mask> "bytes" <mask> "encoding/json" <mask> "fmt" <mask> "io/ioutil" <mask> "net" <mask> "net/http" <mask> "os" <mask> "sort" <mask> "strconv" </s> * control: refactor: all handlers are registered via httpRegister() * move some code to home/control_filtering.go </s> remove "os" <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> "fmt" <mask> "io/ioutil" <mask> "net" <mask> "net/http" <mask> "os" <mask> "sort" <mask> "strconv" <mask> "strings" <mask> "time" <mask> </s> * control: refactor: all handlers are registered via httpRegister() * move some code to home/control_filtering.go </s> remove "io/ioutil" </s> add ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/AdguardTeam/golibs/utils" <mask> "github.com/NYTimes/gziphandler" <mask> "github.com/miekg/dns" <mask> govalidator "gopkg.in/asaskevich/govalidator.v4" <mask> ) <mask> <mask> const updatePeriod = time.Hour * 24 <mask> <mask> var protocols = ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> return dnsAddresses <mask> } <mask> <mask> func handleStatus(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> data := map[string]interface{}{ <mask> "dns_addresses": getDNSAddresses(), <mask> "http_port": config.BindPort, <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> } <mask> } <mask> <mask> func handleProtectionEnable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.ProtectionEnabled = true <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleProtectionDisable(w http.ResponseW...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleProtectionDisable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.ProtectionEnabled = false <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> // --...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> // ----- <mask> // stats <mask> // ----- <mask> func handleQueryLogEnable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.QueryLogEnabled = true <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleQueryLogDisable(w...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleQueryLogDisable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.QueryLogEnabled = false <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func hand...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleQueryLog(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> data := config.dnsServer.GetQueryLog() <mask> <mask> jsonVal, err := json.Marshal(data) <mask> if err != nil { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> } <mask> } <mask> <mask> func handleStatsTop(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> s := config.dnsServer.GetStatsTop() <mask> <mask> // use manual json marshalling because we want maps to be sorted by value <mask> statsJSON := bytes.Buffer{} ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> } <mask> <mask> // handleStatsReset resets the stats caches <mask> func handleStatsReset(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.dnsServer.PurgeStats() <mask> _, err := fmt.Fprintf(w, "OK\n") <mask> if err != nil { <mask> httpError(w, ht...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> } <mask> <mask> // handleStats returns aggregated stats data for the 24 hours <mask> func handleStats(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> summed := config.dnsServer.GetAggregatedStats() <mask> <mask> statsJSON, err := json.Marshal(summed) <ma...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> } <mask> <mask> // HandleStatsHistory returns historical stats data for the 24 hours <mask> func handleStatsHistory(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> // handle time unit and prepare our time window size <mask> timeUnitString := r.URL.Query().G...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> AllServers bool `json:"all_servers"` // --all-servers param for dnsproxy <mask> } <mask> <mask> func handleSetUpstreamConfig(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> newconfig := upstreamConfig{} <mask> err := json.NewDecoder(r.Body).Decode(...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> return nil <mask> } <mask> <mask> func handleTestUpstreamDNS(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> upstreamConfig := upstreamConfig{} <mask> err := json.NewDecoder(r.Body).Decode(&upstreamConfig) <mask> if err != nil { <mask> httpError(w, ht...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> log.Debug("DNS %s works OK", input) <mask> return nil <mask> } <mask> <mask> // --------- <mask> // filtering <mask> // --------- <mask> <mask> func handleFilteringEnable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.FilteringEnabled = tr...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> // safebrowsing <mask> // ------------ <mask> <mask> func handleSafeBrowsingEnable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.SafeBrowsingEnabled = true <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleSaf...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleSafeBrowsingDisable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.SafeBrowsingEnabled = false <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> f...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleSafeBrowsingStatus(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> data := map[string]interface{}{ <mask> "enabled": config.DNS.SafeBrowsingEnabled, <mask> } <mask> jsonVal, err...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> // -------- <mask> // parental <mask> // -------- <mask> func handleParentalEnable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> parameters, err := parseParametersFromBody(r.Body) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "failed...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleParentalDisable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.ParentalEnabled = false <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func hand...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleParentalStatus(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> data := map[string]interface{}{ <mask> "enabled": config.DNS.ParentalEnabled, <mask> } <mask> if config.DNS.Parent...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> // safebrowsing <mask> // ------------ <mask> <mask> func handleSafeSearchEnable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.SafeSearchEnabled = true <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleSafeSea...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleSafeSearchDisable(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> config.DNS.SafeSearchEnabled = false <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleSafeSearchStatus(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> data := map[string]interface{}{ <mask> "enabled": config.DNS.SafeSearchEnabled, <mask> } <mask> jsonVal, err := ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> // -------------- <mask> // DNS-over-HTTPS <mask> // -------------- <mask> func handleDOH(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> if r.TLS == nil { <mask> httpError(w, http.StatusNotFound, "Not Found") <mask> return <mask> } <mask> </s> * co...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
httpRegister(http.MethodGet, "/control/status", handleStatus) httpRegister(http.MethodPost, "/control/enable_protection", handleProtectionEnable) httpRegister(http.MethodPost, "/control/disable_protection", handleProtectionDisable) httpRegister(http.MethodGet, "/control/querylog", handleQueryLog) httpRegister(http...
<mask> // ------------------------ <mask> // registration of handlers <mask> // ------------------------ <mask> func registerControlHandlers() { <mask> http.HandleFunc("/control/status", postInstall(optionalAuth(ensureGET(handleStatus)))) <mask> http.HandleFunc("/control/enable_protection", postInstall(optional...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
httpRegister(http.MethodPost, "/control/update", handleUpdate) httpRegister(http.MethodPost, "/control/filtering/enable", handleFilteringEnable) httpRegister(http.MethodPost, "/control/filtering/disable", handleFilteringDisable) httpRegister(http.MethodPost, "/control/filtering/add_url", handleFilteringAddURL) htt...
<mask> http.HandleFunc("/control/stats", postInstall(optionalAuth(ensureGET(handleStats)))) <mask> http.HandleFunc("/control/stats_history", postInstall(optionalAuth(ensureGET(handleStatsHistory)))) <mask> http.HandleFunc("/control/stats_reset", postInstall(optionalAuth(ensurePOST(handleStatsReset)))) <mask> ht...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control.go
<mask> BlockedHosts []string `json:"blocked_hosts"` <mask> } <mask> <mask> func handleAccessList(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> config.controlLock.Lock() <mask> j := accessListJSON{ <mask> AllowedClients: config.DNS.AllowedCli...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_access.go
<mask> return nil <mask> } <mask> <mask> func handleAccessSet(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> j := accessListJSON{} <mask> err := json.NewDecoder(r.Body).Decode(&j) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "j...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_access.go
<mask> } <mask> <mask> // Get initial installation settings <mask> func handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> data := firstRunData{} <mask> data.WebPort = 80 <mask> data.DNSPort = 53 <mask> <mask> ifaces, err := getValidNe...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_install.go
<mask> } <mask> <mask> // Check if ports are available, respond with results <mask> func handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> reqData := checkConfigReq{} <mask> respData := checkConfigResp{} <mask> err := json.NewDecoder(r.Bod...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_install.go
<mask> } <mask> <mask> // Apply new configuration, start DNS server, restart Web server <mask> func handleInstallConfigure(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> newSettings := applyConfigReq{} <mask> err := json.NewDecoder(r.Body).Decode(&newSettings) <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_install.go
httpRegister(http.MethodGet, "/control/tls/status", handleTLSStatus) httpRegister(http.MethodPost, "/control/tls/configure", handleTLSConfigure) httpRegister(http.MethodPost, "/control/tls/validate", handleTLSValidate)
<mask> ) <mask> <mask> // RegisterTLSHandlers registers HTTP handlers for TLS configuration <mask> func RegisterTLSHandlers() { <mask> http.HandleFunc("/control/tls/status", postInstall(optionalAuth(ensureGET(handleTLSStatus)))) <mask> http.HandleFunc("/control/tls/configure", postInstall(optionalAuth(ensurePO...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_tls.go
<mask> http.HandleFunc("/control/tls/validate", postInstall(optionalAuth(ensurePOST(handleTLSValidate)))) <mask> } <mask> <mask> func handleTLSStatus(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> marshalTLS(w, config.TLS) <mask> } <mask> <mask> func handleTLS...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_tls.go
<mask> marshalTLS(w, config.TLS) <mask> } <mask> <mask> func handleTLSValidate(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> data, err := unmarshalTLS(r) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "Failed to unmarshal TLS config: %s", ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_tls.go
<mask> marshalTLS(w, data) <mask> } <mask> <mask> func handleTLSConfigure(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> data, err := unmarshalTLS(r) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, "Failed to unmarshal TLS config: %s", err) ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_tls.go
<mask> } <mask> <mask> // Get the latest available version from the Internet <mask> func handleGetVersionJSON(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> if config.disableUpdate { <mask> log.Tracef("New app version check is disabled by user") <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_update.go
httpError(w, http.StatusInternalServerError, "New app version check is disabled by user")
<mask> func handleGetVersionJSON(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> if config.disableUpdate { <mask> log.Tracef("New app version check is disabled by user") <mask> return <mask> } <mask> <mask> req := getVersionJSONRequest{} <mask> er...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_update.go
<mask> } <mask> <mask> // Perform an update procedure to the latest available version <mask> func handleUpdate(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> if len(config.versionCheckJSON) == 0 { <mask> httpError(w, http.StatusBadRequest, "/update requ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/control_update.go
<mask> return leases <mask> } <mask> <mask> func handleDHCPStatus(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> leases := convertLeases(config.dhcpServer.Leases(), true) <mask> staticLeases := convertLeases(config.dhcpServer.StaticLeases(), false) <mask> stat...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dhcp.go
<mask> StaticLeases []leaseJSON `json:"static_leases"` <mask> } <mask> <mask> func handleDHCPSetConfig(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> newconfig := dhcpServerConfigJSON{} <mask> err := json.NewDecoder(r.Body).Decode(&newconfig) <mask> if e...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dhcp.go
<mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleDHCPInterfaces(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> response := map[string]interface{}{} <mask> <mask> ifaces, err := getValidNetInterfaces() <mask> if err != nil { <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dhcp.go
<mask> // . Search for another DHCP server running <mask> // . Check if a static IP is configured for the network interface <mask> // Respond with results <mask> func handleDHCPFindActiveServer(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> body, err := ioutil.ReadA...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dhcp.go
<mask> return nil <mask> } <mask> <mask> func handleDHCPAddStaticLease(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> lj := leaseJSON{} <mask> err := json.NewDecoder(r.Body).Decode(&lj) <mask> if err != nil { <mask> httpError(w, http.StatusBadReque...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dhcp.go
<mask> returnOK(w) <mask> } <mask> <mask> func handleDHCPRemoveStaticLease(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> lj := leaseJSON{} <mask> err := json.NewDecoder(r.Body).Decode(&lj) <mask> if err != nil { <mask> httpError(w, http.StatusBadR...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dhcp.go
<mask> Answer string `json:"answer"` <mask> } <mask> <mask> func handleRewriteList(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> arr := []*rewriteEntryJSON{} <mask> <mask> config.RLock() <mask> for _, ent := range config.DNS.Rewrites { </s> * cont...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dns_rewrites.go
<mask> } <mask> } <mask> <mask> func handleRewriteAdd(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> jsent := rewriteEntryJSON{} <mask> err := json.NewDecoder(r.Body).Decode(&jsent) <mask> if err != nil { <mask> httpError(w, http.StatusBadRequest, ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dns_rewrites.go
<mask> returnOK(w) <mask> } <mask> <mask> func handleRewriteDelete(w http.ResponseWriter, r *http.Request) { <mask> log.Tracef("%s %v", r.Method, r.URL) <mask> <mask> jsent := rewriteEntryJSON{} <mask> err := json.NewDecoder(r.Body).Decode(&jsent) <mask> if err != nil { <mask> httpError(w, http.Statu...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dns_rewrites.go
httpRegister(http.MethodGet, "/control/rewrite/list", handleRewriteList) httpRegister(http.MethodPost, "/control/rewrite/add", handleRewriteAdd) httpRegister(http.MethodPost, "/control/rewrite/delete", handleRewriteDelete)
<mask> returnOK(w) <mask> } <mask> <mask> func registerRewritesHandlers() { <mask> http.HandleFunc("/control/rewrite/list", postInstall(optionalAuth(ensureGET(handleRewriteList)))) <mask> http.HandleFunc("/control/rewrite/add", postInstall(optionalAuth(ensurePOST(handleRewriteAdd)))) <mask> http.HandleFunc(...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/dns_rewrites.go
log.Debug("%s %v", r.Method, r.URL)
<mask> func ensure(method string, handler func(http.ResponseWriter, *http.Request)) func(http.ResponseWriter, *http.Request) { <mask> return func(w http.ResponseWriter, r *http.Request) { <mask> if r.Method != method { <mask> http.Error(w, "This request must be "+method, http.StatusMethodNotAllowed) <mask> ...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/helpers.go
func ensureHandler(method string, handler func(http.ResponseWriter, *http.Request)) http.Handler {
<mask> func (h *httpHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) { <mask> h.handler(w, r) <mask> } <mask> <mask> func ensureGETHandler(handler func(http.ResponseWriter, *http.Request)) http.Handler { <mask> h := httpHandler{} <mask> h.handler = ensure("GET", handler) <mask> return &h <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/helpers.go
h.handler = ensure(method, handler)
<mask> } <mask> <mask> func ensureGETHandler(handler func(http.ResponseWriter, *http.Request)) http.Handler { <mask> h := httpHandler{} <mask> h.handler = ensure("GET", handler) <mask> return &h <mask> } <mask> <mask> func optionalAuth(handler func(http.ResponseWriter, *http.Request)) func(http.ResponseWr...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/452a668a5ba66efa265621104fe3be17ae156ed5
home/helpers.go
http.Handle("/", optionalAuthHandler(http.FileServer(box)))
<mask> <mask> runStatsCollectors() <mask> runFilterRefreshers() <mask> <mask> http.Handle("/", http.FileServer(box)) <mask> registerControlHandlers() <mask> <mask> err = startDNSServer() <mask> if err != nil { <mask> log.Fatal(err) </s> Implement simple basic auth. Closes #326. </s> remove http....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4548eb8d118c75749a3916bde022ebe4b13a7ef4
app.go
AuthName string `yaml:"auth_name"` AuthPass string `yaml:"auth_pass"`
<mask> <mask> BindHost string `yaml:"bind_host"` <mask> BindPort int `yaml:"bind_port"` <mask> CoreDNS coreDNSConfig `yaml:"coredns"` <mask> Filters []filter `yaml:"filters"` <mask> UserRules []string `yaml:"user_rules"` <mask> <mask> sync.Mutex `yaml:"-"` </s> Implemen...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4548eb8d118c75749a3916bde022ebe4b13a7ef4
config.go
http.HandleFunc("/control/start", optionalAuth(ensurePOST(handleStart))) http.HandleFunc("/control/stop", optionalAuth(ensurePOST(handleStop))) http.HandleFunc("/control/restart", optionalAuth(ensurePOST(handleRestart))) http.HandleFunc("/control/status", optionalAuth(ensureGET(handleStatus))) http.HandleFunc("/co...
<mask> } <mask> } <mask> <mask> func registerControlHandlers() { <mask> http.HandleFunc("/control/start", ensurePOST(handleStart)) <mask> http.HandleFunc("/control/stop", ensurePOST(handleStop)) <mask> http.HandleFunc("/control/restart", ensurePOST(handleRestart)) <mask> http.HandleFunc("/control/status",...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/4548eb8d118c75749a3916bde022ebe4b13a7ef4
control.go
"net/netip"
<mask> "bytes" <mask> "fmt" <mask> "net" <mask> "os" <mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/errors" </s> Pull request: Migrate to netip.Addr vol.1 Merge in DNS/adguard-home from 2926-lla-v6 to master Updates #2926. Updates #5035. Squashed commit of the following: commit 2e770d4b6d...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4582b1c9198dcbc1927b74080839e81ba347265a
internal/aghnet/dhcp_unix.go
func ifaceIPv4Subnet(iface *net.Interface) (subnet netip.Prefix, err error) {
<mask> return ok4, ok6, err4, err6 <mask> } <mask> <mask> // ifaceIPv4Subnet returns the first suitable IPv4 subnetwork iface has. <mask> func ifaceIPv4Subnet(iface *net.Interface) (subnet *net.IPNet, err error) { <mask> var addrs []net.Addr <mask> if addrs, err = iface.Addrs(); err != nil { <mask> return...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4582b1c9198dcbc1927b74080839e81ba347265a
internal/aghnet/dhcp_unix.go
return netip.Prefix{}, err
<mask> // ifaceIPv4Subnet returns the first suitable IPv4 subnetwork iface has. <mask> func ifaceIPv4Subnet(iface *net.Interface) (subnet *net.IPNet, err error) { <mask> var addrs []net.Addr <mask> if addrs, err = iface.Addrs(); err != nil { <mask> return nil, err <mask> } <mask> <mask> for _, a := range...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4582b1c9198dcbc1927b74080839e81ba347265a
internal/aghnet/dhcp_unix.go
var ip net.IP var maskLen int
<mask> } <mask> <mask> for _, a := range addrs { <mask> switch a := a.(type) { <mask> case *net.IPAddr: <mask> ip = a.IP <mask> maskLen, _ = ip.DefaultMask().Size() <mask> case *net.IPNet: </s> Pull request: Migrate to netip.Addr vol.1 Merge in DNS/adguard-home from 2926-lla-v6 to master Updat...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/4582b1c9198dcbc1927b74080839e81ba347265a
internal/aghnet/dhcp_unix.go