docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
"io/fs"
<mask> package aghnet <mask> <mask> import ( <mask> "net" <mask> "os" <mask> "testing" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest" </s> Pull request: 3597 arpdb Merge in DNS/adguard-home from 3597-wrt-netlink to master Updates #3597. Squashed commit of the following: commit 17...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/aghnet/net_test.go
"os"
<mask> "io/fs" <mask> "net" <mask> "testing" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest" <mask> "github.com/AdguardTeam/golibs/netutil" <mask> "github.com/AdguardTeam/golibs/testutil" </s> Pull request: 3597 arpdb Merge in DNS/adguard-home from 3597-wrt-netlink to master Updates...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/aghnet/net_test.go
// testdata is the filesystem containing data for testing the package. var testdata fs.FS = os.DirFS("./testdata")
<mask> "github.com/stretchr/testify/require" <mask> ) <mask> <mask> func TestMain(m *testing.M) { <mask> aghtest.DiscardLogOutput(m) <mask> } <mask> </s> Pull request: 3597 arpdb Merge in DNS/adguard-home from 3597-wrt-netlink to master Updates #3597. Squashed commit of the following: commit 1709582cd20...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/aghnet/net_test.go
// MaxCmdOutputSize is the maximum length of performed shell command output in // bytes. const MaxCmdOutputSize = 64 * 1024
<mask> func HaveAdminRights() (bool, error) { <mask> return haveAdminRights() <mask> } <mask> <mask> // MaxCmdOutputSize is the maximum length of performed shell command output. <mask> const MaxCmdOutputSize = 2 * 1024 <mask> <mask> // RunCommand runs shell command. <mask> func RunCommand(command string, ar...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/aghos/os.go
func RunCommand(command string, arguments ...string) (code int, output string, err error) {
<mask> // MaxCmdOutputSize is the maximum length of performed shell command output. <mask> const MaxCmdOutputSize = 2 * 1024 <mask> <mask> // RunCommand runs shell command. <mask> func RunCommand(command string, arguments ...string) (int, string, error) { <mask> cmd := exec.Command(command, arguments...) <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/aghos/os.go
return 1, "", fmt.Errorf("command %q failed: %w: %s", command, err, out)
<mask> <mask> if errors.As(err, new(*exec.ExitError)) { <mask> return cmd.ProcessState.ExitCode(), string(out), nil <mask> } else if err != nil { <mask> return 1, "", fmt.Errorf("exec.Command(%s) failed: %w: %s", command, err, string(out)) <mask> } <mask> <mask> return cmd.ProcessState.ExitCode(), str...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/aghos/os.go
<mask> import ( <mask> "bytes" <mask> "fmt" <mask> "net" <mask> "os/exec" <mask> "runtime" <mask> "sort" <mask> "strings" <mask> "sync" <mask> "time" <mask> </s> Pull request: 3597 arpdb Merge in DNS/adguard-home from 3597-wrt-netlink to master Updates #3597. Squashed commit of the following: ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
<mask> "net" <mask> "os/exec" <mask> "runtime" <mask> "sort" <mask> "strings" <mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet" <mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd" </s> Pull request: 3597 arpdb Merge in DNS/adguard-home from 3597-...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
// arpdb stores the neighbors retrieved from ARP. arpdb aghnet.ARPDB
<mask> // etcHosts contains list of rewrite rules taken from the operating system's <mask> // hosts database. <mask> etcHosts *aghnet.HostsContainer <mask> <mask> testing bool // if TRUE, this object is used for internal tests <mask> } <mask> <mask> // Init initializes clients container </s> Pull request...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
arpdb aghnet.ARPDB,
<mask> objects []*clientObject, <mask> dhcpServer *dhcpd.Server, <mask> etcHosts *aghnet.HostsContainer, <mask> ) { <mask> if clients.list != nil { <mask> log.Fatal("clients.list != nil") <mask> } </s> Pull request: 3597 arpdb Merge in DNS/adguard-home from 3597-wrt-netlink to master Updates #3597. Sq...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
clients.arpdb = arpdb
<mask> clients.allTags = stringutil.NewSet(clientTags...) <mask> <mask> clients.dhcpServer = dhcpServer <mask> clients.etcHosts = etcHosts <mask> clients.addFromConfig(objects) <mask> <mask> if clients.testing { <mask> return </s> Pull request: 3597 arpdb Merge in DNS/adguard-home from 3597-wrt-netli...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
if err := clients.arpdb.Refresh(); err != nil { log.Error("refreshing arp container: %s", err) clients.arpdb = aghnet.EmptyARPDB{}
<mask> <mask> // addFromSystemARP adds the IP-hostname pairings from the output of the arp -a <mask> // command. <mask> func (clients *clientsContainer) addFromSystemARP() { <mask> if runtime.GOOS == "windows" { <mask> return <mask> } <mask> <mask> cmd := exec.Command("arp", "-a") <mask> log.Tracef("e...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
ns := clients.arpdb.Neighbors() if len(ns) == 0 { log.Debug("refreshing arp container: the update is empty")
<mask> if runtime.GOOS == "windows" { <mask> return <mask> } <mask> <mask> cmd := exec.Command("arp", "-a") <mask> log.Tracef("executing %q %q", cmd.Path, cmd.Args) <mask> data, err := cmd.Output() <mask> if err != nil || cmd.ProcessState.ExitCode() != 0 { <mask> log.Debug("command %q has failed: %q...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
added := 0 for _, n := range ns { if clients.addHostLocked(n.IP, "", ClientSourceARP) { added++
<mask> defer clients.lock.Unlock() <mask> <mask> clients.rmHostsBySrc(ClientSourceARP) <mask> <mask> n := 0 <mask> // TODO(a.garipov): Rewrite to use bufio.Scanner. <mask> lines := strings.Split(string(data), "\n") <mask> for _, ln := range lines { <mask> lparen := strings.Index(ln, " (") <mask> r...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep"...
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
log.Debug("clients: added %d client aliases from arp neighborhood", added)
<mask> n++ <mask> } <mask> } <mask> <mask> log.Debug("clients: added %d client aliases from 'arp -a' command output", n) <mask> } <mask> <mask> // updateFromDHCP adds the clients that have a non-empty hostname from the DHCP <mask> // server. <mask> func (clients *clientsContainer) updateFromDHCP(add ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients.go
clients.Init(nil, nil, nil, nil)
<mask> func TestClients(t *testing.T) { <mask> clients := clientsContainer{} <mask> clients.testing = true <mask> <mask> clients.Init(nil, nil, nil) <mask> <mask> t.Run("add_success", func(t *testing.T) { <mask> c := &Client{ <mask> IDs: []string{"1.1.1.1", "1:2:3::4", "aa:aa:aa:aa:aa:aa"}, <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients_test.go
clients.Init(nil, nil, nil, nil)
<mask> func TestClientsWHOIS(t *testing.T) { <mask> clients := clientsContainer{ <mask> testing: true, <mask> } <mask> clients.Init(nil, nil, nil) <mask> whois := &RuntimeClientWHOISInfo{ <mask> Country: "AU", <mask> Orgname: "Example Org", <mask> } <mask> </s> Pull request: 3597 arpdb Merge in ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients_test.go
clients.Init(nil, nil, nil, nil)
<mask> func TestClientsAddExisting(t *testing.T) { <mask> clients := clientsContainer{ <mask> testing: true, <mask> } <mask> clients.Init(nil, nil, nil) <mask> <mask> t.Run("simple", func(t *testing.T) { <mask> ip := net.IP{1, 1, 1, 1} <mask> <mask> // Add a client. </s> Pull request: 3597 arpdb ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients_test.go
clients.Init(nil, nil, nil, nil)
<mask> func TestClientsCustomUpstream(t *testing.T) { <mask> clients := clientsContainer{ <mask> testing: true, <mask> } <mask> clients.Init(nil, nil, nil) <mask> <mask> // Add client with upstreams. <mask> ok, err := clients.Add(&Client{ <mask> IDs: []string{"1.1.1.1", "1:2:3::4", "aa:aa:aa:aa:aa:a...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/clients_test.go
var arpdb aghnet.ARPDB arpdb, err = aghnet.NewARPDB() if err != nil { log.Info("warning: creating arpdb: %s; using stub", err) arpdb = aghnet.EmptyARPDB{} } Context.clients.Init(config.Clients, Context.dhcpServer, Context.etcHosts, arpdb)
<mask> return err <mask> } <mask> } <mask> <mask> Context.clients.Init(config.Clients, Context.dhcpServer, Context.etcHosts) <mask> <mask> if args.bindPort != 0 { <mask> uc := aghalg.UniqChecker{} <mask> addPorts( <mask> uc, </s> Pull request: 3597 arpdb Merge in DNS/adguard-home from 3597-...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/573cbafe3f2f222d7c6413d8fe30c90ae295882d
internal/home/home.go
<mask> <mask> const COLUMN_MIN_WIDTH = 200; <mask> <mask> class AutoClients extends Component { <mask> getStats = (ip, stats) => { <mask> if (stats) { <mask> const statsForCurrentIP = stats.find(item => item.name === ip); <mask> return statsForCurrentIP && statsForCurrentIP...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/AutoClients.js
accessor: row => this.props.normalizedTopClients[row.ip] || 0, sortMethod: (a, b) => b - a, id: 'statistics',
<mask> Cell: whoisCell(this.props.t), <mask> }, <mask> { <mask> Header: this.props.t('requests_count'), <mask> accessor: 'statistics', <mask> minWidth: COLUMN_MIN_WIDTH, <mask> Cell: (row) => { <mask> const clientIP = ro...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/AutoClients.js
const { value: clientStats } = row;
<mask> Header: this.props.t('requests_count'), <mask> accessor: 'statistics', <mask> minWidth: COLUMN_MIN_WIDTH, <mask> Cell: (row) => { <mask> const clientIP = row.original.ip; <mask> const clientStats = clientIP && this.getStats(cli...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/AutoClients.js
defaultSorted={[ { id: 'statistics', asc: true, }, ]}
<mask> <ReactTable <mask> data={autoClients || []} <mask> columns={this.columns} <mask> className="-striped -highlight card-table-overflow" <mask> showPagination={true} <mask> defaultPageSize={10} ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/AutoClients.js
normalizedTopClients: PropTypes.object.isRequired,
<mask> <mask> AutoClients.propTypes = { <mask> t: PropTypes.func.isRequired, <mask> autoClients: PropTypes.array.isRequired, <mask> topClients: PropTypes.array.isRequired, <mask> }; <mask> <mask> export default withNamespaces()(AutoClients); </s> - client: sort clients table by requests count by ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/AutoClients.js
<mask> use_global_blocked_services: true, <mask> }; <mask> }; <mask> <mask> getStats = (name, stats) => { <mask> if (stats) { <mask> const currentStats = stats.find(item => item.info && item.info.name === name); <mask> return currentStats && currentSt...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/ClientsTable.js
id: 'statistics', accessor: row => this.props.normalizedTopClients[row.name] || 0, sortMethod: (a, b) => b - a,
<mask> Cell: whoisCell(this.props.t), <mask> }, <mask> { <mask> Header: this.props.t('requests_count'), <mask> accessor: 'statistics', <mask> minWidth: 120, <mask> Cell: (row) => { <mask> const { name } = row.original; ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/ClientsTable.js
const { value: clientStats } = row;
<mask> Header: this.props.t('requests_count'), <mask> accessor: 'statistics', <mask> minWidth: 120, <mask> Cell: (row) => { <mask> const { name } = row.original; <mask> const clientStats = this.getStats(name, this.props.topClients); ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/ClientsTable.js
defaultSorted={[ { id: 'statistics', asc: true, }, ]}
<mask> data={clients || []} <mask> columns={this.columns} <mask> className="-striped -highlight card-table-overflow" <mask> showPagination={true} <mask> defaultPageSize={10} <mask> ...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/ClientsTable.js
normalizedTopClients: PropTypes.object.isRequired,
<mask> <mask> ClientsTable.propTypes = { <mask> t: PropTypes.func.isRequired, <mask> clients: PropTypes.array.isRequired, <mask> topClients: PropTypes.array.isRequired, <mask> toggleClientModal: PropTypes.func.isRequired, <mask> deleteClient: PropTypes.func.isRequired, <mask> addClient:...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/ClientsTable.js
normalizedTopClients={stats.normalizedTopClients}
<mask> {!stats.processingStats && !dashboard.processingClients && ( <mask> <Fragment> <mask> <ClientsTable <mask> clients={dashboard.clients} <mask> topClients={stats.topClients} <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/index.js
normalizedTopClients={stats.normalizedTopClients}
<mask> processingUpdating={clients.processingUpdating} <mask> /> <mask> <AutoClients <mask> autoClients={dashboard.autoClients} <mask> topClients={stats.topClients} <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/components/Settings/Clients/index.js
export const normalizeTopClients = clients => clients.reduce((accumulator, clientObj) => { const { name, count } = clientObj; const idToCountMap = accumulator; idToCountMap[name] = count; return idToCountMap; }, {});
<mask> <mask> export const normalizeTextarea = text => text && text.replace(/[;, ]/g, '\n').split('\n').filter(n => n); <mask> <mask> export const getClientInfo = (clients, ip) => { <mask> const client = clients <mask> .find(item => item.ip_addrs && item.ip_addrs.find(clientIp => clientIp === ip)); ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/helpers/helpers.js
import { normalizeTopClients } from '../helpers/helpers';
<mask> import { handleActions } from 'redux-actions'; <mask> <mask> import * as actions from '../actions/stats'; <mask> <mask> const defaultStats = { <mask> dnsQueries: [], <mask> blockedFiltering: [], </s> - client: sort clients table by requests count by default </s> remove const { n...
[ "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/reducers/stats.js
normalizedTopClients: normalizeTopClients(topClients),
<mask> topBlockedDomains, <mask> topClients, <mask> topQueriedDomains, <mask> numBlockedFiltering, <mask> numDnsQueries, <mask> numReplacedParental, </s> - client: sort clients table by requests count by default </s> ...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c031c1c6eb765ad4d32da6d4744cecfdc19a41
client/src/reducers/stats.js
if gctx.safebrowsingCache == nil {
<mask> func New(c *Config, filters map[int]string) *Dnsfilter { <mask> <mask> if c != nil { <mask> // initialize objects only once <mask> if c.SafeBrowsingEnabled && gctx.safebrowsingCache == nil { <mask> gctx.safebrowsingCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build() <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c510631e44d8a36a7fb086b23143b36110a956
dnsfilter/dnsfilter.go
if gctx.safeSearchCache == nil {
<mask> // initialize objects only once <mask> if c.SafeBrowsingEnabled && gctx.safebrowsingCache == nil { <mask> gctx.safebrowsingCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build() <mask> } <mask> if c.SafeSearchEnabled && gctx.safeSearchCache == nil { <mask> gctx.safeSe...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c510631e44d8a36a7fb086b23143b36110a956
dnsfilter/dnsfilter.go
if gctx.parentalCache == nil {
<mask> } <mask> if c.SafeSearchEnabled && gctx.safeSearchCache == nil { <mask> gctx.safeSearchCache = gcache.New(defaultCacheSize).LRU().Expiration(defaultCacheTime).Build() <mask> } <mask> if c.ParentalEnabled && gctx.parentalCache == nil { <mask> gctx.parentalCache = gcache.New(defaultCacheSize).L...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/57c510631e44d8a36a7fb086b23143b36110a956
dnsfilter/dnsfilter.go
github.com/AdguardTeam/dnsproxy v0.49.1
<mask> <mask> go 1.19 <mask> <mask> require ( <mask> github.com/AdguardTeam/dnsproxy v0.48.3 <mask> github.com/AdguardTeam/golibs v0.13.2 <mask> github.com/AdguardTeam/urlfilter v0.16.1 <mask> github.com/NYTimes/gziphandler v1.1.1 <mask> github.com/ameshkov/dnscrypt/v2 v2.2.7 <mask> github.com/digineo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/584182e2649fb3617fb423d7838592608ab8612d
go.mod
github.com/AdguardTeam/dnsproxy v0.49.1 h1:JpStBK05uCgA3ldleaNLRmIwE9V7vRg7/kVJQSdnQYg= github.com/AdguardTeam/dnsproxy v0.49.1/go.mod h1:Y7g7jRTd/u7+KJ/QvnGI2PCE8vnisp6EsW47/Sz0DZw=
<mask> github.com/AdguardTeam/dnsproxy v0.48.3 h1:h9xgDSmd1MqsPFNApyaPVXolmSTtzOWOcfWvPeDEP6s= <mask> github.com/AdguardTeam/dnsproxy v0.48.3/go.mod h1:Y7g7jRTd/u7+KJ/QvnGI2PCE8vnisp6EsW47/Sz0DZw= <mask> github.com/AdguardTeam/golibs v0.4.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4= <mask> github.com/Ad...
[ "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/584182e2649fb3617fb423d7838592608ab8612d
go.sum
wantSet: `checking bootstrap a: invalid address: bootstrap a:53: ` + `ParseAddr("a"): unable to parse IP`,
<mask> name: "upstream_dns_bad", <mask> wantSet: `validating upstream servers: validating upstream "!!!": not an ip:port`, <mask> }, { <mask> name: "bootstraps_bad", <mask> wantSet: `checking bootstrap a: invalid address: ` + <mask> `Resolver a is not eligible to be a bootstrap DNS server`, <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/584182e2649fb3617fb423d7838592608ab8612d
internal/dnsforward/http_test.go
assert.True(t, strings.HasSuffix(s, tc.want), "got %q", s)
<mask> s := logOutput.String() <mask> if tc.want == "" { <mask> assert.Empty(t, s) <mask> } else { <mask> assert.True(t, strings.HasSuffix(s, tc.want), <mask> "got %q", s) <mask> } <mask> <mask> logOutput.Reset() <mask> }) <mask> } </s> Pull request 1835: bootstrap-plain Mer...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/584182e2649fb3617fb423d7838592608ab8612d
internal/querylog/decode_test.go
<mask> "net" <mask> "testing" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering" <mask> "github.com/AdguardTeam/dnsproxy/proxyutil" <mask> "github.com/AdguardTeam/golibs/stringutil" <mask> "github.com/AdguardTeam/golibs/testutil" <mask> "github.com/AdguardTeam/golibs/timeutil" <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/584182e2649fb3617fb423d7838592608ab8612d
internal/querylog/qlog_test.go
a := testutil.RequireTypeAssert[*dns.A](t, msg.Answer[0]) assert.Equal(t, answer, a.A.To16())
<mask> msg := &dns.Msg{} <mask> require.NoError(t, msg.Unpack(entry.Answer)) <mask> require.Len(t, msg.Answer, 1) <mask> <mask> ip := proxyutil.IPFromRR(msg.Answer[0]).To16() <mask> assert.Equal(t, answer, ip) <mask> } </s> Pull request 1835: bootstrap-plain Merge in DNS/adguard-home from bootstrap-plain...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/584182e2649fb3617fb423d7838592608ab8612d
internal/querylog/qlog_test.go
// override bind host/port from the console
<mask> err = parseConfig() <mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> if bindHost != nil { <mask> config.BindHost = *bindHost <mask> } <mask> if bindPort != nil { <mask> config.BindPort = *bindPort </s> Added filterId to the querylog Updated the openapi.yaml accordingly ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
app.go
runFiltersUpdatesTimer()
<mask> } <mask> <mask> address := net.JoinHostPort(config.BindHost, strconv.Itoa(config.BindPort)) <mask> <mask> runFilterRefreshers() <mask> <mask> http.Handle("/", optionalAuthHandler(http.FileServer(box))) <mask> registerControlHandlers() <mask> <mask> err = startDNSServer() </s> Added filterId ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
app.go
// Saving it to the filters dir now err = filter.save() if err != nil { log.Fatal(err) }
<mask> _, err := filter.update(true) <mask> if err != nil { <mask> log.Fatal(err) <mask> } <mask> } <mask> <mask> // No more "dnsfilter.txt", filters are now loaded from config.ourDataDir/filters/ <mask> dnsFilterPath := filepath.Join(config.ourBinaryDir, "dnsfilter.txt") <mask> _, err :=...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
app.go
url, enabled, lastUpdated: lastUpdated = Date.now(), name = 'Default name', rulesCount: rulesCount = 0,
<mask> export const normalizeFilteringStatus = (filteringStatus) => { <mask> const { enabled, filters, user_rules: userRules } = filteringStatus; <mask> const newFilters = filters ? filters.map((filter) => { <mask> const { <mask> url, enabled, last_updated: lastUpdated = Date.now(), nam...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
client/src/helpers/helpers.js
// Just a counter that we use for incrementing the filter ID var NextFilterId int
<mask> <mask> // Directory where we'll store all downloaded filters contents <mask> const FiltersDir = "filters" <mask> <mask> // configuration is loaded from YAML <mask> type configuration struct { <mask> // Config filename (can be overriden via the command line arguments) <mask> ourConfigFilename string ...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
// Config filename (can be overriden via the command line arguments)
<mask> var NextFilterId int <mask> <mask> // configuration is loaded from YAML <mask> type configuration struct { <mask> ourConfigFilename string <mask> // Basically, this is our working directory <mask> ourBinaryDir string <mask> // Directory to store data (i.e. filters contents) <mask> ourDataDir strin...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
// Basically, this is our working directory ourBinaryDir string
<mask> <mask> // configuration is loaded from YAML <mask> type configuration struct { <mask> ourConfigFilename string <mask> ourBinaryDir string <mask> // Directory to store data (i.e. filters contents) <mask> ourDataDir string <mask> <mask> // Schema version of the config file. This value is used ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
ID int `json:"id" yaml:"id"` // auto-assigned when filter is added (see NextFilterId)
<mask> UpstreamDNS []string `yaml:"upstream_dns"` <mask> } <mask> <mask> type filter struct { <mask> ID int `json:"ID"` // auto-assigned when filter is added <mask> URL string `json:"url"` <mask> Name string `json:"name" yaml:"name"` <mask> Enabled bool `jso...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
RulesCount int `json:"rulesCount" yaml:"-"`
<mask> ID int `json:"ID"` // auto-assigned when filter is added <mask> URL string `json:"url"` <mask> Name string `json:"name" yaml:"name"` <mask> Enabled bool `json:"enabled"` <mask> RulesCount int `json:"rules_count" yaml:"-"` <mask> contents []byte <mask> LastUpd...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
LastUpdated time.Time `json:"lastUpdated" yaml:"last_updated"`
<mask> Name string `json:"name" yaml:"name"` <mask> Enabled bool `json:"enabled"` <mask> RulesCount int `json:"rules_count" yaml:"-"` <mask> contents []byte <mask> LastUpdated time.Time `json:"last_updated" yaml:"-"` <mask> } <mask> <mask> var defaultDNS = []string{"tls://1.1.1.1", "tl...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
var contents []byte
<mask> // Creates a helper object for working with the user rules <mask> func getUserFilter() filter { <mask> <mask> // TODO: This should be calculated when UserRules are set <mask> contents := []byte{} <mask> for _, rule := range config.UserRules { <mask> contents = append(contents, []byte(rule)...) <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
// Loads configuration from the YAML file
<mask> <mask> return userFilter <mask> } <mask> <mask> func parseConfig() error { <mask> configFile := filepath.Join(config.ourBinaryDir, config.ourConfigFilename) <mask> log.Printf("Reading YAML file: %s", configFile) <mask> if _, err := os.Stat(configFile); os.IsNotExist(err) { </s> Added filterId to t...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
configFile := filepath.Join(config.ourBinaryDir, config.ourConfigFilename) log.Printf("Reading YAML file: %s", configFile) if _, err := os.Stat(configFile); os.IsNotExist(err) {
<mask> return userFilter <mask> } <mask> <mask> func parseConfig() error { <mask> configfile := filepath.Join(config.ourBinaryDir, config.ourConfigFilename) <mask> log.Printf("Reading YAML file: %s", configfile) <mask> if _, err := os.Stat(configfile); os.IsNotExist(err) { <mask> // do nothing, file does...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
log.Printf("YAML file doesn't exist, skipping: %s", configFile)
<mask> configfile := filepath.Join(config.ourBinaryDir, config.ourConfigFilename) <mask> log.Printf("Reading YAML file: %s", configfile) <mask> if _, err := os.Stat(configfile); os.IsNotExist(err) { <mask> // do nothing, file doesn't exist <mask> log.Printf("YAML file doesn't exist, skipping: %s", configfil...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
yamlFile, err := ioutil.ReadFile(configFile)
<mask> // do nothing, file doesn't exist <mask> log.Printf("YAML file doesn't exist, skipping: %s", configfile) <mask> return nil <mask> } <mask> yamlFile, err := ioutil.ReadFile(configfile) <mask> if err != nil { <mask> log.Printf("Couldn't read config file: %s", err) <mask> return err <mask> } ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
// Saves configuration to the YAML file and also saves the user filter contents to a file
<mask> return nil <mask> } <mask> <mask> func writeConfig() error { <mask> configFile := filepath.Join(config.ourBinaryDir, config.ourConfigFilename) <mask> log.Printf("Writing YAML file: %s", configFile) <mask> yamlText, err := yaml.Marshal(&config) </s> Added filterId to the querylog Updated the openapi....
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
configFile := filepath.Join(config.ourBinaryDir, config.ourConfigFilename) log.Printf("Writing YAML file: %s", configFile)
<mask> return nil <mask> } <mask> <mask> func writeConfig() error { <mask> configfile := filepath.Join(config.ourBinaryDir, config.ourConfigFilename) <mask> log.Printf("Writing YAML file: %s", configfile) <mask> yamlText, err := yaml.Marshal(&config) <mask> if err != nil { <mask> log.Printf("Couldn't g...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
err = writeFileSafe(configFile, yamlText)
<mask> if err != nil { <mask> log.Printf("Couldn't generate YAML file: %s", err) <mask> return err <mask> } <mask> err = writeFileSafe(configfile, yamlText) <mask> if err != nil { <mask> log.Printf("Couldn't save YAML config: %s", err) <mask> return err <mask> } <mask> </s> Added filterId to th...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
coreFile := filepath.Join(config.ourBinaryDir, config.CoreDNS.coreFile) log.Printf("Writing DNS config: %s", coreFile) configText, err := generateCoreDNSConfigText()
<mask> // -------------- <mask> // coredns config <mask> // -------------- <mask> func writeCoreDNSConfig() error { <mask> corefile := filepath.Join(config.ourBinaryDir, config.CoreDNS.coreFile) <mask> log.Printf("Writing DNS config: %s", corefile) <mask> configtext, err := generateCoreDNSConfigText() <mask>...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
err = writeFileSafe(coreFile, []byte(configText))
<mask> if err != nil { <mask> log.Printf("Couldn't generate DNS config: %s", err) <mask> return err <mask> } <mask> err = writeFileSafe(corefile, []byte(configtext)) <mask> if err != nil { <mask> log.Printf("Couldn't save DNS config: %s", err) <mask> return err <mask> } <mask> return nil </s> A...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
// generate CoreDNS config text
<mask> ` <mask> <mask> var removeEmptyLines = regexp.MustCompile("([\t ]*\n)+") <mask> <mask> // generate config text <mask> func generateCoreDNSConfigText() (string, error) { <mask> t, err := template.New("config").Parse(coreDNSConfigTemplate) <mask> if err != nil { <mask> log.Printf("Couldn't generate ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
configText := configBytes.String()
<mask> if err != nil { <mask> log.Printf("Couldn't generate DNS config: %s", err) <mask> return "", err <mask> } <mask> configtext := configBytes.String() <mask> <mask> // remove empty lines from generated config <mask> configtext = removeEmptyLines.ReplaceAllString(configtext, "\n") <mask> return c...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
configText = removeEmptyLines.ReplaceAllString(configText, "\n") return configText, nil
<mask> } <mask> configtext := configBytes.String() <mask> <mask> // remove empty lines from generated config <mask> configtext = removeEmptyLines.ReplaceAllString(configtext, "\n") <mask> return configtext, nil <mask> } </s> Added filterId to the querylog Updated the openapi.yaml accordingly Some minor re...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
config.go
coreDnsPlugin "github.com/AdguardTeam/AdGuardHome/coredns_plugin"
<mask> "strconv" <mask> "strings" <mask> "time" <mask> <mask> coredns_plugin "github.com/AdguardTeam/AdGuardHome/coredns_plugin" <mask> "github.com/miekg/dns" <mask> "gopkg.in/asaskevich/govalidator.v4" <mask> ) <mask> <mask> const updatePeriod = time.Minute * 30 </s> Added filterId to the querylog U...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
var filterTitleRegexp = regexp.MustCompile(`^! Title: +(.*)$`)
<mask> ) <mask> <mask> const updatePeriod = time.Minute * 30 <mask> <mask> var filterTitle = regexp.MustCompile(`^! Title: +(.*)$`) <mask> <mask> // cached version.json to avoid hammering github.io for each page reload <mask> var versionCheckJSON []byte <mask> var versionCheckLastTime time.Time <mask> </...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
coreDnsPlugin.Reload <- true
<mask> // ------------------- <mask> // coredns run control <mask> // ------------------- <mask> func tellCoreDNSToReload() { <mask> coredns_plugin.Reload <- true <mask> } <mask> <mask> func writeAllConfigsAndReloadCoreDNS() error { <mask> err := writeAllConfigs() <mask> if err != nil { </s> Added filter...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
//noinspection GoUnusedParameter
<mask> returnOK(w, r) <mask> } <mask> <mask> func returnOK(w http.ResponseWriter, r *http.Request) { <mask> _, err := fmt.Fprintf(w, "OK\n") <mask> if err != nil { <mask> errortext := fmt.Sprintf("Couldn't write body: %s", err) <mask> log.Println(errortext) </s> Added filterId to the querylog Updated t...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
//noinspection GoUnusedParameter
<mask> http.Error(w, errortext, http.StatusInternalServerError) <mask> } <mask> } <mask> <mask> func handleStatus(w http.ResponseWriter, r *http.Request) { <mask> data := map[string]interface{}{ <mask> "dns_address": config.BindHost, <mask> "dns_port": config.CoreDNS.Port, <mask> "p...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
return fmt.Errorf("couldn't communicate with DNS server %s: %s", input, err)
<mask> } <mask> <mask> resp, rtt, err := c.Exchange(&req, host) <mask> if err != nil { <mask> return fmt.Errorf("Couldn't communicate with DNS server %s: %s", input, err) <mask> } <mask> trace("exchange with %s took %v", input, rtt) <mask> if len(resp.Answer) != 1 { <mask> return fmt.Errorf("DNS ser...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
hosts := make([]string, 0)
<mask> } <mask> <mask> func sanitiseDNSServers(input string) ([]string, error) { <mask> fields := strings.Fields(input) <mask> hosts := []string{} <mask> for _, field := range fields { <mask> sanitized, err := sanitizeDNSServer(field) <mask> if err != nil { <mask> return hosts, err <mask> } </s>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
return "", fmt.Errorf("invalid DNS server field: %s", h)
<mask> return "", err <mask> } <mask> ip := net.ParseIP(h) <mask> if ip == nil { <mask> return "", fmt.Errorf("Invalid DNS server field: %s", h) <mask> } <mask> } <mask> return prefix + host, nil <mask> } <mask> </s> Added filterId to the querylog Updated the openapi.yaml accordingly Some mi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
//noinspection GoUnusedParameter
<mask> } <mask> return net.JoinHostPort(input, port) <mask> } <mask> <mask> func handleGetVersionJSON(w http.ResponseWriter, r *http.Request) { <mask> now := time.Now() <mask> if now.Sub(versionCheckLastTime) <= versionCheckPeriod && len(versionCheckJSON) != 0 { <mask> // return cached copy <mask> w.H...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
//noinspection GoUnusedParameter
<mask> config.CoreDNS.FilteringEnabled = false <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> func handleFilteringStatus(w http.ResponseWriter, r *http.Request) { <mask> data := map[string]interface{}{ <mask> "enabled": config.CoreDNS.FilteringEnabled, <mask> } <mask> </s> Added...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
<mask> httpError(w, http.StatusBadRequest, "Failed to parse request body json: %s", err) <mask> return <mask> } <mask> <mask> filter.Enabled = true <mask> if len(filter.URL) == 0 { <mask> http.Error(w, "URL parameter was not specified", 400) <mask> return <mask> } <mask> </s> Added filterId to ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
// Check for duplicates
<mask> http.Error(w, "URL parameter is not valid request URL", 400) <mask> return <mask> } <mask> <mask> // check for duplicates <mask> for i := range config.Filters { <mask> if config.Filters[i].URL == filter.URL { <mask> errortext := fmt.Sprintf("Filter URL already added -- %s", filter.URL) <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("Filter URL already added -- %s", filter.URL) log.Println(errorText) http.Error(w, errorText, http.StatusBadRequest)
<mask> <mask> // check for duplicates <mask> for i := range config.Filters { <mask> if config.Filters[i].URL == filter.URL { <mask> errortext := fmt.Sprintf("Filter URL already added -- %s", filter.URL) <mask> log.Println(errortext) <mask> http.Error(w, errortext, http.StatusBadRequest) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
// Set necessary properties filter.ID = NextFilterId filter.Enabled = true NextFilterId++ // Download the filter contents
<mask> return <mask> } <mask> } <mask> <mask> ok, err := filter.update(true) <mask> if err != nil { <mask> errorText := fmt.Sprintf("Couldn't fetch filter from url %s: %s", filter.URL, err) <mask> log.Println(errorText) <mask> http.Error(w, errorText, http.StatusBadRequest) <mask> return </s...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("Couldn't fetch filter from url %s: %s", filter.URL, err) log.Println(errorText) http.Error(w, errorText, http.StatusBadRequest)
<mask> } <mask> <mask> ok, err := filter.update(true) <mask> if err != nil { <mask> errortext := fmt.Sprintf("Couldn't fetch filter from url %s: %s", filter.URL, err) <mask> log.Println(errortext) <mask> http.Error(w, errortext, http.StatusBadRequest) <mask> return <mask> } <mask> if filter.Rule...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("Filter at the url %s has no rules (maybe it points to blank page?)", filter.URL) log.Println(errorText) http.Error(w, errorText, http.StatusBadRequest)
<mask> http.Error(w, errortext, http.StatusBadRequest) <mask> return <mask> } <mask> if filter.RulesCount == 0 { <mask> errortext := fmt.Sprintf("Filter at url %s has no rules (maybe it points to blank page?)", filter.URL) <mask> log.Println(errortext) <mask> http.Error(w, errortext, http.StatusBadRe...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("Filter at the url %s is invalid (maybe it points to blank page?)", filter.URL) log.Println(errorText) http.Error(w, errorText, http.StatusBadRequest) return } // Save the filter contents err = filter.save() if err != nil { errorText := fmt.Sprintf("Failed to save filter %d due t...
<mask> http.Error(w, errortext, http.StatusBadRequest) <mask> return <mask> } <mask> if !ok { <mask> errortext := fmt.Sprintf("Filter at url %s is invalid (maybe it points to blank page?)", filter.URL) <mask> log.Println(errortext) <mask> http.Error(w, errortext, http.StatusBadRequest) <mask> retu...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("Couldn't write config file: %s", err) log.Println(errorText) http.Error(w, errorText, http.StatusInternalServerError)
<mask> // URL is deemed valid, append it to filters, update config, write new filter file and tell coredns to reload it <mask> config.Filters = append(config.Filters, filter) <mask> err = writeAllConfigs() <mask> if err != nil { <mask> errortext := fmt.Sprintf("Couldn't write config file: %s", err) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("Couldn't write body: %s", err) log.Println(errorText) http.Error(w, errorText, http.StatusInternalServerError)
<mask> tellCoreDNSToReload() <mask> <mask> _, err = fmt.Fprintf(w, "OK %d rules\n", filter.RulesCount) <mask> if err != nil { <mask> errortext := fmt.Sprintf("Couldn't write body: %s", err) <mask> log.Println(errortext) <mask> http.Error(w, errortext, http.StatusInternalServerError) <mask> } <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
<mask> http.Error(w, errortext, http.StatusInternalServerError) <mask> } <mask> } <mask> <mask> // TODO: Start using filter ID <mask> func handleFilteringRemoveURL(w http.ResponseWriter, r *http.Request) { <mask> parameters, err := parseParametersFromBody(r.Body) <mask> if err != nil { <mask> errortext...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("failed to parse parameters from body: %s", err) log.Println(errorText) http.Error(w, errorText, 400)
<mask> // TODO: Start using filter ID <mask> func handleFilteringRemoveURL(w http.ResponseWriter, r *http.Request) { <mask> parameters, err := parseParametersFromBody(r.Body) <mask> if err != nil { <mask> errortext := fmt.Sprintf("failed to parse parameters from body: %s", err) <mask> log.Println(errortext)...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("Couldn't remove the filter file: %s", err) http.Error(w, errorText, http.StatusInternalServerError)
<mask> } else { <mask> // Remove the filter file <mask> err := os.Remove(filter.getFilterFilePath()) <mask> if err != nil { <mask> errortext := fmt.Sprintf("Couldn't remove the filter file: %s", err) <mask> http.Error(w, errortext, http.StatusInternalServerError) <mask> return <mask> }...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
<mask> config.Filters = newFilters <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> // TODO: Start using filter ID <mask> func handleFilteringEnableURL(w http.ResponseWriter, r *http.Request) { <mask> parameters, err := parseParametersFromBody(r.Body) <mask> if err != nil { <mask> e...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("failed to parse parameters from body: %s", err) log.Println(errorText) http.Error(w, errorText, 400)
<mask> // TODO: Start using filter ID <mask> func handleFilteringEnableURL(w http.ResponseWriter, r *http.Request) { <mask> parameters, err := parseParametersFromBody(r.Body) <mask> if err != nil { <mask> errortext := fmt.Sprintf("failed to parse parameters from body: %s", err) <mask> log.Println(errortext)...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
checkFiltersUpdates(false)
<mask> return <mask> } <mask> <mask> // kick off refresh of rules from new URLs <mask> refreshFiltersIfNeccessary() <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> // TODO: Start using filter ID <mask> func handleFilteringDisableURL(w http.ResponseWriter, r *http.Request) { </s>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
<mask> refreshFiltersIfNeccessary() <mask> httpUpdateConfigReloadDNSReturnOK(w, r) <mask> } <mask> <mask> // TODO: Start using filter ID <mask> func handleFilteringDisableURL(w http.ResponseWriter, r *http.Request) { <mask> parameters, err := parseParametersFromBody(r.Body) <mask> if err != nil { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("failed to parse parameters from body: %s", err) log.Println(errorText) http.Error(w, errorText, 400)
<mask> // TODO: Start using filter ID <mask> func handleFilteringDisableURL(w http.ResponseWriter, r *http.Request) { <mask> parameters, err := parseParametersFromBody(r.Body) <mask> if err != nil { <mask> errortext := fmt.Sprintf("failed to parse parameters from body: %s", err) <mask> log.Println(errortext...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
errorText := fmt.Sprintf("Failed to read request body: %s", err) log.Println(errorText) http.Error(w, errorText, 400)
<mask> <mask> func handleFilteringSetRules(w http.ResponseWriter, r *http.Request) { <mask> body, err := ioutil.ReadAll(r.Body) <mask> if err != nil { <mask> errortext := fmt.Sprintf("Failed to read request body: %s", err) <mask> log.Println(errortext) <mask> http.Error(w, errortext, 400) <mask> retu...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
updated := checkFiltersUpdates(force != "")
<mask> } <mask> <mask> func handleFilteringRefresh(w http.ResponseWriter, r *http.Request) { <mask> force := r.URL.Query().Get("force") <mask> if force != "" { <mask> config.Lock() <mask> for i := range config.Filters { <mask> filter := &config.Filters[i] // otherwise we will be operating on a copy <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
// Sets up a timer that will be checking for filters updates periodically func runFiltersUpdatesTimer() {
<mask> updated := refreshFiltersIfNeccessary() <mask> fmt.Fprintf(w, "OK %d filters updated\n", updated) <mask> } <mask> <mask> func runFilterRefreshers() { <mask> go func() { <mask> for range time.Tick(time.Second) { <mask> refreshFiltersIfNeccessary() <mask> } <mask> }() </s> Added filterId to ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
for range time.Tick(time.Minute) { checkFiltersUpdates(false)
<mask> } <mask> <mask> func runFilterRefreshers() { <mask> go func() { <mask> for range time.Tick(time.Second) { <mask> refreshFiltersIfNeccessary() <mask> } <mask> }() <mask> } <mask> <mask> func refreshFiltersIfNeccessary() int { </s> Added filterId to the querylog Updated the openapi.yaml acco...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
// Checks filters updates if necessary // If force is true, it ignores the filter.LastUpdated field value func checkFiltersUpdates(force bool) int {
<mask> } <mask> }() <mask> } <mask> <mask> func refreshFiltersIfNeccessary() int { <mask> config.Lock() <mask> <mask> // deduplicate <mask> // TODO: move it somewhere else <mask> { </s> Added filterId to the querylog Updated the openapi.yaml accordingly Some minor refactoring/renaming Fix other revi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go
<mask> <mask> func refreshFiltersIfNeccessary() int { <mask> config.Lock() <mask> <mask> // deduplicate <mask> // TODO: move it somewhere else <mask> { <mask> i := 0 // output index, used for deletion later <mask> urls := map[string]bool{} <mask> for _, filter := range config.Filters { <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/591065aa3aeff1cdee5cba0abdc7af0ceb09f54e
control.go