docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
if !force && time.Since(f.LastUpdated) <= updatePeriod {
<mask> if !filter.Enabled { <mask> continue <mask> } <mask> <mask> if !force && time.Since(filter.LastUpdated) <= updatePeriod { <mask> continue <mask> } <mask> <mask> updated, err := filter.update() <mask> if err != nil { </s> * filters: rework update mechanism so that UI doesn't get loc...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
var uf filter uf.ID = f.ID uf.URL = f.URL uf.checksum = f.checksum updateFilters = append(updateFilters, uf) } config.RUnlock() updateCount := 0 for i := range updateFilters { uf := &updateFilters[i] updated, err := uf.update()
<mask> if !force && time.Since(filter.LastUpdated) <= updatePeriod { <mask> continue <mask> } <mask> <mask> updated, err := filter.update() <mask> if err != nil { <mask> log.Printf("Failed to update filter %s: %s\n", filter.URL, err) <mask> continue <mask> } <mask> if updated { </s> * f...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
log.Printf("Failed to update filter %s: %s\n", uf.URL, err)
<mask> } <mask> <mask> updated, err := filter.update() <mask> if err != nil { <mask> log.Printf("Failed to update filter %s: %s\n", filter.URL, err) <mask> continue <mask> } <mask> if updated { <mask> // Saving it to the filters dir now <mask> err = filter.save() </s> * filters: rework...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
err = uf.save()
<mask> continue <mask> } <mask> if updated { <mask> // Saving it to the filters dir now <mask> err = filter.save() <mask> if err != nil { <mask> log.Printf("Failed to save the updated filter %d: %s", filter.ID, err) <mask> continue <mask> } <mask> </s> * filters: rework update mec...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
log.Printf("Failed to save the updated filter %d: %s", uf.ID, err)
<mask> if updated { <mask> // Saving it to the filters dir now <mask> err = filter.save() <mask> if err != nil { <mask> log.Printf("Failed to save the updated filter %d: %s", filter.ID, err) <mask> continue <mask> } <mask> <mask> updateCount++ <mask> </s> * filters: rework update m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
<mask> log.Printf("Failed to save the updated filter %d: %s", filter.ID, err) <mask> continue <mask> } <mask> <mask> updateCount++ <mask> <mask> } else { <mask> mtime := time.Now() <mask> os.Chtimes(filter.Path(), mtime, mtime) <mask> filter.LastUpdated = mtime <mask> } </s> * f...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
e := os.Chtimes(uf.Path(), mtime, mtime) if e != nil { log.Error("os.Chtimes(): %v", e) } uf.LastUpdated = mtime } config.Lock() for k := range config.Filters { f := &config.Filters[k] if f.ID != uf.ID || f.URL != uf.URL { continue } f.LastUpdated = uf.LastUpdated if !updated {...
<mask> updateCount++ <mask> <mask> } else { <mask> mtime := time.Now() <mask> os.Chtimes(filter.Path(), mtime, mtime) <mask> filter.LastUpdated = mtime <mask> } <mask> } <mask> config.Unlock() <mask> <mask> if updateCount > 0 && isRunning() { </s> * filters: rework update mechanism so t...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
config.Unlock()
<mask> f.checksum = uf.checksum <mask> updateCount++ <mask> } <mask> } <mask> <mask> if updateCount > 0 && isRunning() { <mask> err := reconfigureDNSServer() <mask> if err != nil { <mask> msg := fmt.Sprintf("SHOULD NOT HAPPEN: cannot reconfigure DNS server with the new filters: %s", err) </s...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
<mask> os.Chtimes(filter.Path(), mtime, mtime) <mask> filter.LastUpdated = mtime <mask> } <mask> } <mask> config.Unlock() <mask> <mask> if updateCount > 0 && isRunning() { <mask> err := reconfigureDNSServer() <mask> if err != nil { <mask> msg := fmt.Sprintf("SHOULD NOT HAPPEN: cannot reconf...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0647f3fe8666a38cbdc7a747279513338e49568a
filter.go
"version": "11.7.2", "resolved": "https://registry.npmjs.org/react-i18next/-/react-i18next-11.7.2.tgz", "integrity": "sha512-Djj3K3hh5Tecla2CI9rLO3TZBYGMFrGilm0JY4cLofAQONCi5TK6nVmUPKoB59n1ZffgjfgJt6zlbE9aGF6Q0Q==",
<mask> } <mask> } <mask> }, <mask> "react-i18next": { <mask> "version": "11.4.0", <mask> "resolved": "https://registry.npmjs.org/react-i18next/-/react-i18next-11.4.0.tgz", <mask> "integrity": "sha512-lyOZSSQkif4H9HnHN3iEKVkryLI+WkdZSEw3VAZzinZLopfYRMHVY5YxCopdkXPLEHs6S5GjK...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/package-lock.json
"react-i18next": "^11.7.2",
<mask> "query-string": "^6.13.1", <mask> "react": "^16.13.1", <mask> "react-click-outside": "^3.0.1", <mask> "react-dom": "^16.13.1", <mask> "react-i18next": "^11.4.0", <mask> "react-modal": "^3.11.2", <mask> "react-popper-tooltip": "^2.11.1", <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/package.json
"update_failed": "Auto-update failed. Please <a>follow these steps</a> to update manually.",
<mask> "down": "Down", <mask> "fix": "Fix", <mask> "dns_providers": "Here is a <0>list of known DNS providers</0> to choose from.", <mask> "update_now": "Update now", <mask> "update_failed": "Auto-update failed. Please <a href='https://github.com/AdguardTeam/AdGuardHome/wiki/Getting-Started#upd...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/__locales/en.json
import React from 'react';
<mask> import axios from 'axios'; <mask> <mask> import endsWith from 'lodash/endsWith'; <mask> import escapeRegExp from 'lodash/escapeRegExp'; <mask> import { splitByNewLine, sortClients } from '../helpers/helpers'; <mask> import { <mask> BLOCK_ACTIONS, CHECK_TIMEOUT, STATUS_RESPONSE, SETTINGS_NAMES, FORM_N...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/actions/index.js
BLOCK_ACTIONS, CHECK_TIMEOUT, STATUS_RESPONSE, SETTINGS_NAMES, FORM_NAME, GETTING_STARTED_LINK,
<mask> import endsWith from 'lodash/endsWith'; <mask> import escapeRegExp from 'lodash/escapeRegExp'; <mask> import { splitByNewLine, sortClients } from '../helpers/helpers'; <mask> import { <mask> BLOCK_ACTIONS, CHECK_TIMEOUT, STATUS_RESPONSE, SETTINGS_NAMES, FORM_NAME, <mask> } from '../helpers/constants'; ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/actions/index.js
const options = { components: { a: <a href={GETTING_STARTED_LINK} target="_blank" rel="noopener noreferrer" />, }, }; dispatch(addNoticeToast({ error: 'update_failed', options }));
<mask> const { dnsVersion } = getState().dashboard; <mask> <mask> dispatch(getUpdateRequest()); <mask> const handleRequestError = () => { <mask> dispatch(addNoticeToast({ error: 'update_failed' })); <mask> dispatch(getUpdateFailure()); <mask> }; <mask> <mask> const handleR...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/actions/index.js
import { Trans } from 'react-i18next';
<mask> import React, { useEffect, useState } from 'react'; <mask> import PropTypes from 'prop-types'; <mask> import { useTranslation } from 'react-i18next'; <mask> import { useDispatch } from 'react-redux'; <mask> import { TOAST_TIMEOUTS } from '../../helpers/constants'; <mask> import { removeToast } from '../../...
[ "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/components/Toasts/Toast.js
options,
<mask> const Toast = ({ <mask> id, <mask> message, <mask> type, <mask> }) => { <mask> const dispatch = useDispatch(); <mask> const [timerId, setTimerId] = useState(null); <mask> <mask> const clearRemoveToastTimeout = () => clearTimeout(timerId); </s> - client: Add link to 'update_fail...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/components/Toasts/Toast.js
<mask> id, <mask> message, <mask> type, <mask> }) => { <mask> const { t } = useTranslation(); <mask> const dispatch = useDispatch(); <mask> const [timerId, setTimerId] = useState(null); <mask> <mask> const clearRemoveToastTimeout = () => clearTimeout(timerId); <mask> const rem...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/components/Toasts/Toast.js
<p className="toast__content"> <Trans i18nKey={message} {...options} /> </p>
<mask> <mask> return <div className={`toast toast--${type}`} <mask> onMouseOver={clearRemoveToastTimeout} <mask> onMouseOut={setRemoveToastTimeout}> <mask> <p className="toast__content">{t(message)}</p> <mask> <button className="toast__dismiss" onClick={removeC...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/components/Toasts/Toast.js
options: PropTypes.object,
<mask> Toast.propTypes = { <mask> id: PropTypes.string.isRequired, <mask> message: PropTypes.string.isRequired, <mask> type: PropTypes.string.isRequired, <mask> }; <mask> <mask> export default Toast; </s> - client: Add link to 'update_failed' error toast Close #2062 Squashed commit of the followi...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/components/Toasts/Toast.js
export const GETTING_STARTED_LINK = 'https://github.com/AdguardTeam/AdGuardHome/wiki/Getting-Started#update';
<mask> <mask> export const PRIVACY_POLICY_LINK = 'https://adguard.com/privacy/home.html'; <mask> export const PORT_53_FAQ_LINK = 'https://github.com/AdguardTeam/AdGuardHome/wiki/FAQ#bindinuse'; <mask> <mask> export const ADDRESS_IN_USE_TEXT = 'address already in use'; <mask> <mask> export const INSTALL_FIRST_...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/helpers/constants.js
<mask> <mask> export const DEBOUNCE_TIMEOUT = 300; <mask> export const DEBOUNCE_FILTER_TIMEOUT = 500; <mask> export const CHECK_TIMEOUT = 1000; <mask> export const SUCCESS_TOAST_TIMEOUT = 5000; <mask> export const FAILURE_TOAST_TIMEOUT = 30000; <mask> export const HIDE_TOOLTIP_DELAY = 300; <mask> export const ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/helpers/constants.js
export const SUCCESS_TOAST_TIMEOUT = 5000; export const FAILURE_TOAST_TIMEOUT = 30000;
<mask> NOTICE: 'notice', <mask> }; <mask> <mask> export const TOAST_TIMEOUTS = { <mask> [TOAST_TYPES.SUCCESS]: SUCCESS_TOAST_TIMEOUT, <mask> [TOAST_TYPES.ERROR]: FAILURE_TOAST_TIMEOUT, <mask> [TOAST_TYPES.NOTICE]: FAILURE_TOAST_TIMEOUT, <mask> }; </s> - client: Add link to 'update_failed' erro...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/helpers/constants.js
[TOAST_TYPES.SUCCESS]: SUCCESS_TOAST_TIMEOUT, [TOAST_TYPES.ERROR]: FAILURE_TOAST_TIMEOUT, [TOAST_TYPES.NOTICE]: FAILURE_TOAST_TIMEOUT,
<mask> NOTICE: 'notice', <mask> }; <mask> <mask> export const TOAST_TIMEOUTS = { <mask> [TOAST_TYPES.SUCCESS]: 5000, <mask> [TOAST_TYPES.ERROR]: 30000, <mask> [TOAST_TYPES.NOTICE]: 30000, <mask> }; </s> - client: Add link to 'update_failed' error toast Close #2062 Squashed commit of the foll...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/helpers/constants.js
options: payload.options,
<mask> id: nanoid(), <mask> message, <mask> type: TOAST_TYPES.ERROR, <mask> }; <mask> <mask> const newState = { ...state, notices: [...state.notices, errorToast] }; </s> - client: Add link to 'update_failed' error toast Close #2062 Squashed commit of the fol...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/reducers/toasts.js
options: payload.options,
<mask> id: nanoid(), <mask> message: payload.error.toString(), <mask> type: TOAST_TYPES.NOTICE, <mask> }; <mask> <mask> const newState = { ...state, notices: [...state.notices, noticeToast] }; <mask> return newState; <mask> }, </s> - client: Add ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06594bde8f70c5bbf04b03a3e1c9ad99539787e2
client/src/reducers/toasts.js
TLSCiphers []uint16 // list of TLS ciphers to use
<mask> TLSAllowUnencryptedDOH bool <mask> <mask> TLSv12Roots *x509.CertPool // list of root CAs for TLSv1.2 <mask> <mask> // Called when the configuration is changed by HTTP request <mask> ConfigModified func() <mask> <mask> // Register an HTTP handler </s> Merge: + DNS, Web: use only secure TLSv1.2 ci...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06b3378fd778dc71672e1172f3ab5e9a635cf95c
dnsforward/dnsforward.go
upstream.CipherSuites = s.conf.TLSCiphers
<mask> } <mask> upstream.RootCAs = s.conf.TLSv12Roots <mask> <mask> if len(proxyConfig.Upstreams) == 0 { <mask> log.Fatal("len(proxyConfig.Upstreams) == 0") <mask> } <mask> <mask> if !webRegistered && s.conf.HTTPRegister != nil { </s> Merge: + DNS, Web: use only secure TLSv1.2 ciphers Close #1384 Squ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06b3378fd778dc71672e1172f3ab5e9a635cf95c
dnsforward/dnsforward.go
newconfig.TLSCiphers = Context.tlsCiphers
<mask> } <mask> newconfig.TLSv12Roots = Context.tlsRoots <mask> newconfig.TLSAllowUnencryptedDOH = tlsConf.AllowUnencryptedDOH <mask> <mask> newconfig.FilterHandler = applyAdditionalFiltering <mask> newconfig.GetUpstreamsByClient = getUpstreamsByClient <mask> return newconfig </s> Merge: + DNS, Web: use ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06b3378fd778dc71672e1172f3ab5e9a635cf95c
home/dns.go
tlsCiphers []uint16 // list of TLS ciphers to use
<mask> disableUpdate bool // If set, don't check for updates <mask> controlLock sync.Mutex <mask> tlsRoots *x509.CertPool // list of root CAs for TLSv1.2 <mask> transport *http.Transport <mask> client *http.Client <mask> appSignalChannel chan os.Signal // Channel for recei...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06b3378fd778dc71672e1172f3ab5e9a635cf95c
home/home.go
Context.tlsCiphers = util.InitTLSCiphers()
<mask> initConfig() <mask> <mask> Context.tlsRoots = util.LoadSystemRootCAs() <mask> Context.transport = &http.Transport{ <mask> DialContext: customDialContext, <mask> Proxy: getHTTPProxy, <mask> TLSClientConfig: &tls.Config{ </s> Merge: + DNS, Web: use only secure TLSv1.2 ciphers Close #1384 S...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06b3378fd778dc71672e1172f3ab5e9a635cf95c
home/home.go
CipherSuites: Context.tlsCiphers,
<mask> MinVersion: tls.VersionTLS12, <mask> RootCAs: Context.tlsRoots, <mask> }, <mask> } <mask> <mask> printHTTPAddresses("https") <mask> err := w.httpsServer.server.ListenAndServeTLS("", "") <mask> if err != http.ErrServerClosed { </s> Merge: + DNS, Web: use only secure TLSv1.2 cip...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06b3378fd778dc71672e1172f3ab5e9a635cf95c
home/web.go
"crypto/tls"
<mask> package util <mask> <mask> import ( <mask> "crypto/x509" <mask> "io/ioutil" <mask> "os" <mask> "runtime" </s> Merge: + DNS, Web: use only secure TLSv1.2 ciphers Close #1384 Squashed commit of the following: commit cd90abcce573a8e930446ba153565e553e6b81d5 Author: Simon Zolin <s.zolin@adguard.com> D...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06b3378fd778dc71672e1172f3ab5e9a635cf95c
util/tls.go
"golang.org/x/sys/cpu"
<mask> "runtime" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> // LoadSystemRootCAs - load root CAs from the system <mask> // Return the x509 certificate pool object </s> Merge: + DNS, Web: use only secure TLSv1.2 ciphers Close #1384 Squashed commit of the following: commit cd90...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06b3378fd778dc71672e1172f3ab5e9a635cf95c
util/tls.go
github.com/AdguardTeam/dnsproxy v0.44.0
<mask> <mask> go 1.18 <mask> <mask> require ( <mask> github.com/AdguardTeam/dnsproxy v0.43.1 <mask> github.com/AdguardTeam/golibs v0.10.9 <mask> github.com/AdguardTeam/urlfilter v0.16.0 <mask> github.com/NYTimes/gziphandler v1.1.1 <mask> github.com/ameshkov/dnscrypt/v2 v2.2.3 <mask> github.com/digineo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.mod
golang.org/x/crypto v0.0.0-20220817201139-bc19a97f63c8
<mask> github.com/miekg/dns v1.1.50 <mask> github.com/stretchr/testify v1.7.1 <mask> github.com/ti-mo/netfilter v0.4.0 <mask> go.etcd.io/bbolt v1.3.6 <mask> golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa <mask> golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e <mask> golang.org/x/net v0.0.0-2022...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.mod
golang.org/x/net v0.0.0-20220812174116-3211cb980234 golang.org/x/sys v0.0.0-20220817070843-5a390386f1f2
<mask> github.com/ti-mo/netfilter v0.4.0 <mask> go.etcd.io/bbolt v1.3.6 <mask> golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa <mask> golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e <mask> golang.org/x/net v0.0.0-20220728211354-c7608f3a8462 <mask> golang.org/x/sys v0.0.0-20220731174439-a90be44021...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.mod
github.com/marten-seemann/qtls-go1-19 v0.1.0 // indirect
<mask> github.com/josharian/native v1.0.0 // indirect <mask> github.com/marten-seemann/qtls-go1-16 v0.1.5 // indirect <mask> github.com/marten-seemann/qtls-go1-17 v0.1.2 // indirect <mask> github.com/marten-seemann/qtls-go1-18 v0.1.2 // indirect <mask> github.com/marten-seemann/qtls-go1-19 v0.1.0-beta.1 // in...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.mod
golang.org/x/mod v0.6.0-dev.0.20220818022119-ed83ed61efb9 // indirect
<mask> github.com/pkg/errors v0.9.1 // indirect <mask> github.com/pmezard/go-difflib v1.0.0 // indirect <mask> github.com/stretchr/objx v0.1.1 // indirect <mask> github.com/u-root/uio v0.0.0-20220204230159-dac05f7d2cb4 // indirect <mask> golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4 // indirect <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.mod
github.com/AdguardTeam/dnsproxy v0.44.0 h1:JzIxEXF4OyJq4wZVHeZkM1af4VfuwcgrUzjgdBGljsE= github.com/AdguardTeam/dnsproxy v0.44.0/go.mod h1:HsxYYW/bC8uo+4eX9pRW21hFD6gWZdrvcfBb1R6/AzU=
<mask> dmitri.shuralyov.com/html/belt v0.0.0-20180602232347-f7d459c86be0/go.mod h1:JLBrvjyP0v+ecvNYvCpyZgu5/xkfAUhi6wJj28eUfSU= <mask> dmitri.shuralyov.com/service/change v0.0.0-20181023043359-a85b471d5412/go.mod h1:a1inKt/atXimZ4Mv927x+r7UpyzRUf4emIoiiSC2TN4= <mask> dmitri.shuralyov.com/state v0.0.0-20180228185332-...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.sum
<mask> github.com/marten-seemann/qtls-go1-17 v0.1.2 h1:JADBlm0LYiVbuSySCHeY863dNkcpMmDR7s0bLKJeYlQ= <mask> github.com/marten-seemann/qtls-go1-17 v0.1.2/go.mod h1:C2ekUKcDdz9SDWxec1N/MvcXBpaX9l3Nx67XaR84L5s= <mask> github.com/marten-seemann/qtls-go1-18 v0.1.2 h1:JH6jmzbduz0ITVQ7ShevK10Av5+jBEKAHMntXmIV7kM= <mask> gi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.sum
github.com/marten-seemann/qtls-go1-19 v0.1.0 h1:rLFKD/9mp/uq1SYGYuVZhm83wkmU95pK5df3GufyYYU= github.com/marten-seemann/qtls-go1-19 v0.1.0/go.mod h1:5HTDWtVudo/WFsHKRNuOhWlbdjrfs5JHrYb0wIJqGpI=
<mask> github.com/marten-seemann/qtls-go1-17 v0.1.2/go.mod h1:C2ekUKcDdz9SDWxec1N/MvcXBpaX9l3Nx67XaR84L5s= <mask> github.com/marten-seemann/qtls-go1-18 v0.1.2 h1:JH6jmzbduz0ITVQ7ShevK10Av5+jBEKAHMntXmIV7kM= <mask> github.com/marten-seemann/qtls-go1-18 v0.1.2/go.mod h1:mJttiymBAByA49mhlNZZGrH5u1uXYZJ+RW28Py7f4m4= <m...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.sum
golang.org/x/crypto v0.0.0-20220817201139-bc19a97f63c8 h1:GIAS/yBem/gq2MUqgNIzUHW7cJMmx3TGZOrnyYaNQ6c= golang.org/x/crypto v0.0.0-20220817201139-bc19a97f63c8/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
<mask> golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= <mask> golang.org/x/crypto v0.0.0-20200221231518-2aa609cf4a9d/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= <mask> golang.org/x/crypto v0.0.0-20200323165209-0ec3e9974c59/go.mod h1:LzIPMQfyMNh...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.sum
golang.org/x/mod v0.6.0-dev.0.20220818022119-ed83ed61efb9 h1:VtCrPQXM5Wo9l7XN64SjBMczl48j8mkP+2e3OhYlz+0= golang.org/x/mod v0.6.0-dev.0.20220818022119-ed83ed61efb9/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
<mask> golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY= <mask> golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg= <mask> golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.sum
golang.org/x/net v0.0.0-20220812174116-3211cb980234 h1:RDqmgfe7SvlMWoqC3xwQ2blLO3fcWcxMa3eBLRdRW7E= golang.org/x/net v0.0.0-20220812174116-3211cb980234/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk=
<mask> golang.org/x/net v0.0.0-20210928044308-7d9f5e0b762b/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= <mask> golang.org/x/net v0.0.0-20210929193557-e81a3d93ecf6/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= <mask> golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod h1:CfG3xpIq0wQ8r1q4Su4U...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.sum
golang.org/x/sys v0.0.0-20220817070843-5a390386f1f2 h1:fqTvyMIIj+HRzMmnzr9NtpHP6uVpvB5fkHcgPDC4nu8= golang.org/x/sys v0.0.0-20220817070843-5a390386f1f2/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
<mask> golang.org/x/sys v0.0.0-20220128215802-99c3d69c2c27/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= <mask> golang.org/x/sys v0.0.0-20220209214540-3681064d5158/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= <mask> golang.org/x/sys v0.0.0-20220412211240-33da011f77ad/go.mod h1:oPkhp1MJrh7nUepCBck5...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/06e4658da9e9c31df369804d29f1165ec0fe7d63
go.sum
<mask> "object-assign": "^4.1.1", <mask> "prop-types": "^15.6.0" <mask> } <mask> }, <mask> "react-fast-compare": { <mask> "version": "2.0.4", <mask> "resolved": "https://registry.npmjs.org/react-fast-compare/-/react-fast-compare-2.0.4.tgz", <mask> "integrity": "sh...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/073643537612437430c7035cda679a758ca94d13
client/package-lock.json
<mask> "requires": { <mask> "prop-types": "^15.6.0" <mask> } <mask> }, <mask> "react-side-effect": { <mask> "version": "1.2.0", <mask> "resolved": "https://registry.npmjs.org/react-side-effect/-/react-side-effect-1.2.0.tgz", <mask> "integrity": "sha512-v1ht1aHg5k/th...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/073643537612437430c7035cda679a758ca94d13
client/package-lock.json
<mask> "inherits": "^2.0.1", <mask> "safe-buffer": "^5.0.1" <mask> } <mask> }, <mask> "shallowequal": { <mask> "version": "1.1.0", <mask> "resolved": "https://registry.npmjs.org/shallowequal/-/shallowequal-1.1.0.tgz", <mask> "integrity": "sha512-y0m1JoUZSlPAjXVtPP...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/073643537612437430c7035cda679a758ca94d13
client/package-lock.json
<mask> "prop-types": "^15.7.2", <mask> "react": "^16.4.0", <mask> "react-click-outside": "^3.0.1", <mask> "react-dom": "^16.4.0", <mask> "react-helmet": "^5.2.1", <mask> "react-i18next": "^8.2.0", <mask> "react-modal": "^3.4.5", <mask> "react-redux": "^5.0.7", <mask> "react-...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/073643537612437430c7035cda679a758ca94d13
client/package.json
<mask> import escapeRegExp from 'lodash/escapeRegExp'; <mask> import endsWith from 'lodash/endsWith'; <mask> import { Trans, withNamespaces } from 'react-i18next'; <mask> import { HashLink as Link } from 'react-router-hash-link'; <mask> import { Helmet } from 'react-helmet'; <mask> <mask> import { <mask> f...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/073643537612437430c7035cda679a758ca94d13
client/src/components/Logs/index.js
<mask> ); <mask> <mask> return ( <mask> <Fragment> <mask> <Helmet> <mask> <meta httpEquiv="x-dns-prefetch-control" content="off" /> <mask> </Helmet> <mask> <PageTitle title={t('query_log')}>{refreshButton}</PageTitl...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/073643537612437430c7035cda679a758ca94d13
client/src/components/Logs/index.js
export const getDnsAddress = (ip, port = 0) => {
<mask> export const getIpList = (interfaces) => Object.values(interfaces) <mask> .reduce((acc, curr) => acc.concat(curr.ip_addresses), []) <mask> .sort(); <mask> <mask> export const getDnsAddress = (ip, port = '') => { <mask> const isStandardDnsPort = port === STANDARD_DNS_PORT; <mask> let addre...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07497beb78d4711e8d0c4da83ce52ad15cc7e51d
client/src/helpers/helpers.js
export const getWebAddress = (ip, port = 0) => {
<mask> <mask> return address; <mask> }; <mask> <mask> export const getWebAddress = (ip, port = '') => { <mask> const isStandardWebPort = port === STANDARD_WEB_PORT; <mask> let address = `http://${ip}`; <mask> <mask> if (port && !isStandardWebPort) { <mask> if (ip.includes(':') && !i...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07497beb78d4711e8d0c4da83ce52ad15cc7e51d
client/src/helpers/helpers.js
* @param value {string|number}
<mask> // Validation functions <mask> // https://redux-form.com/8.3.0/examples/fieldlevelvalidation/ <mask> // If the value is valid, the validation function should return undefined. <mask> /** <mask> * @param value {string} <mask> * @returns {undefined|string} <mask> */ <mask> export const validateRequiredV...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07497beb78d4711e8d0c4da83ce52ad15cc7e51d
client/src/helpers/validators.js
// Names of services to block (globally). // Per-client settings can override this configuration. BlockedServices []string `yaml:"blocked_services"`
<mask> <mask> Rewrites []RewriteEntry `yaml:"rewrites"` <mask> <mask> // Called when the configuration is changed by HTTP request <mask> ConfigModified func() `yaml:"-"` <mask> <mask> // Register an HTTP handler <mask> HTTPRegister func(string, string, func(http.ResponseWriter, *http.Request)) `yaml:"-"...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
dnsfilter/dnsfilter.go
// BlockedServices
<mask> func (d *Dnsfilter) WriteDiskConfig(c *Config) { <mask> d.confLock.Lock() <mask> *c = d.Config <mask> c.Rewrites = rewriteArrayDup(d.Config.Rewrites) <mask> d.confLock.Unlock() <mask> } <mask> <mask> // SetFilters - set new filters (synchronously or asynchronously) <mask> // When filters are set as...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
dnsfilter/dnsfilter.go
bsvcs := []string{} for _, s := range d.BlockedServices { if !BlockedSvcKnown(s) { log.Debug("skipping unknown blocked-service '%s'", s) continue } bsvcs = append(bsvcs, s) } d.BlockedServices = bsvcs initBlockedServices()
<mask> d.Config = *c <mask> d.prepareRewrites() <mask> } <mask> <mask> if blockFilters != nil { <mask> err := d.initFiltering(nil, blockFilters) <mask> if err != nil { <mask> log.Error("Can't initialize filtering subsystem: %s", err) <mask> d.Close() <mask> return nil </s> * refactor: mov...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
dnsfilter/dnsfilter.go
d.registerBlockedServicesHandlers()
<mask> d.registerSecurityHandlers() <mask> d.registerRewritesHandlers() <mask> } <mask> } <mask> <mask> // </s> * refactor: move blocked-services functions to dnsfilter </s> remove ApplyBlockedServices(setts, config.DNS.BlockedServices) </s> add Context.dnsFilter.ApplyBlockedServices(setts, nil, true) <...
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
dnsfilter/dnsfilter.go
"github.com/AdguardTeam/AdGuardHome/dnsfilter"
<mask> "sync" <mask> "time" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/dhcpd" <mask> "github.com/AdguardTeam/AdGuardHome/dnsforward" <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/AdguardTeam/golibs/utils" </s> * refactor: move blo...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/clients.go
if !dnsfilter.BlockedSvcKnown(s) {
<mask> Upstreams: cy.Upstreams, <mask> } <mask> <mask> for _, s := range cy.BlockedServices { <mask> if !blockedSvcKnown(s) { <mask> log.Debug("Clients: skipping unknown blocked-service '%s'", s) <mask> continue <mask> } <mask> cli.BlockedServices = append(cli.BlockedServices, s) <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/clients.go
<mask> <mask> FilteringEnabled bool `yaml:"filtering_enabled"` // whether or not use filter lists <mask> FiltersUpdateIntervalHours uint32 `yaml:"filters_update_interval"` // time period to update filters (in hours) <mask> DnsfilterConf dnsfilter.Config `yaml:"...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/config.go
<mask> log.Error("Couldn't parse config file: %s", err) <mask> return err <mask> } <mask> <mask> bsvcs := []string{} <mask> for _, s := range config.DNS.BlockedServices { <mask> if !blockedSvcKnown(s) { <mask> log.Debug("skipping unknown blocked-service '%s'", s) <mask> continue <mask> } <m...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/config.go
<mask> "net/url" <mask> "strconv" <mask> "strings" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/util" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/dnsforward" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/NYTimes/gziphandler" <mask> ) <mask> </s> * refactor: move blocked-...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/control.go
"github.com/AdguardTeam/AdGuardHome/util"
<mask> "strconv" <mask> "strings" <mask> <mask> "github.com/AdguardTeam/AdGuardHome/dnsforward" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/NYTimes/gziphandler" <mask> ) <mask> <mask> // ---------------- </s> * refactor: move blocked-services functions to dnsfilter </s> remove "githu...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/control.go
<mask> <mask> httpRegister("GET", "/control/profile", handleGetProfile) <mask> <mask> RegisterTLSHandlers() <mask> RegisterBlockedServicesHandlers() <mask> RegisterAuthHandlers() <mask> <mask> http.HandleFunc("/dns-query", postInstall(handleDOH)) <mask> } <mask> </s> * refactor: move blocked-service...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/control.go
Context.dnsFilter.ApplyBlockedServices(&setts, nil, true)
<mask> host := q.Get("name") <mask> <mask> setts := Context.dnsFilter.GetConfig() <mask> setts.FilteringEnabled = true <mask> ApplyBlockedServices(&setts, config.DNS.BlockedServices) <mask> result, err := Context.dnsFilter.CheckHost(host, dns.TypeA, &setts) <mask> if err != nil { <mask> httpError(w, ht...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/control_filtering.go
Context.dnsFilter.ApplyBlockedServices(setts, nil, true)
<mask> } <mask> <mask> // If a client has his own settings, apply them <mask> func applyAdditionalFiltering(clientAddr string, setts *dnsfilter.RequestFilteringSettings) { <mask> ApplyBlockedServices(setts, config.DNS.BlockedServices) <mask> <mask> if len(clientAddr) == 0 { <mask> return <mask> } <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/dns.go
Context.dnsFilter.ApplyBlockedServices(setts, c.BlockedServices, false)
<mask> <mask> log.Debug("Using settings for client with IP %s", clientAddr) <mask> <mask> if c.UseOwnBlockedServices { <mask> ApplyBlockedServices(setts, c.BlockedServices) <mask> } <mask> <mask> setts.ClientTags = c.Tags <mask> <mask> if !c.UseOwnSettings { </s> * refactor: move blocked-services ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/dns.go
<mask> requireAdminRights() <mask> } <mask> <mask> initConfig() <mask> initServices() <mask> <mask> Context.tlsRoots = util.LoadSystemRootCAs() <mask> Context.transport = &http.Transport{ <mask> DialContext: customDialContext, <mask> Proxy: getHTTPProxy, </s> * refactor: move blocked-servi...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0789e4b20dea132f5d66ee18f7d1fbd05c10b014
home/home.go
<mask> log.Tracef("SafeSearchDomain for %s was found but failed to lookup for %s cause %s", host, safeHost, err) <mask> return Result{}, err <mask> } <mask> <mask> res.IP = addrs[0] <mask> // The next bug may occurs: LookupIP returns DNS64 mapped ipv4 address with zero-prefix <mask> for _, i := range ad...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0794704f740db3c6ab73ee4d6287dc6f40ec4911
dnsfilter/dnsfilter.go
if ipv4 := i.To4(); ipv4 != nil {
<mask> <mask> res.IP = addrs[0] <mask> // The next bug may occurs: LookupIP returns DNS64 mapped ipv4 address with zero-prefix <mask> for _, i := range addrs { <mask> if ipv4 := i.To4(); ipv4 != nil && len(i) == net.IPv6len { <mask> res.IP = ipv4 <mask> break <mask> } <mask> } <mask> </s> - d...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0794704f740db3c6ab73ee4d6287dc6f40ec4911
dnsfilter/dnsfilter.go
if len(res.IP) == 0 { return Result{}, fmt.Errorf("no ipv4 addresses in safe search response for %s", safeHost) }
<mask> break <mask> } <mask> } <mask> <mask> // Cache result <mask> err = safeSearchCache.Set(host, res) <mask> if err != nil { <mask> return Result{}, nil <mask> } <mask> return res, nil </s> - dnsfilter: fix safesearch issue #268 </s> remove if ipv4 := i.To4(); ipv4 != nil && len(i) == net....
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0794704f740db3c6ab73ee4d6287dc6f40ec4911
dnsfilter/dnsfilter.go
<mask> rules: []string{"||twitter.com^", "||twttr.com^", "||t.co^", "||twimg.com^"}, <mask> }, { <mask> name: "youtube", <mask> rules: []string{ <mask> "||youtube.com^", <mask> "||ytimg.com^", <mask> "||youtu.be^", <mask> "||googlevideo.com^", <mask> "||youtubei.googleapis.com^", <mask> "||yout...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07d48af10c50808c3183b779ba193487cd900192
internal/filtering/blocked.go
"||wide-youtube.l.google.com^", "||youtu.be^",
<mask> "||youtube.com^", <mask> "||ytimg.com^", <mask> "||youtu.be^", <mask> "||googlevideo.com^", <mask> "||youtubei.googleapis.com^", <mask> "||youtube-nocookie.com^", <mask> "||youtube", <mask> }, <mask> }, { <mask> name: "twitch", <mask> rules: []string{"||twitch.tv^", "||ttvnw.net^", "...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07d48af10c50808c3183b779ba193487cd900192
internal/filtering/blocked.go
"||youtube-nocookie.com^", "||youtube.com^", "||youtubei.googleapis.com^", "||ytimg.com^",
<mask> "||wide-youtube.l.google.com^", <mask> "||youtu.be^", <mask> "||youtube", <mask> }, <mask> }, { <mask> name: "twitch", <mask> rules: []string{"||twitch.tv^", "||ttvnw.net^", "||jtvnw.net^", "||twitchcdn.net^"}, <mask> }, { </s> Pull request: 4755-youtube-domain Updates #4755. Squashed commit...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07d48af10c50808c3183b779ba193487cd900192
internal/filtering/blocked.go
func clientFind(ip string) (*Client, bool) {
<mask> return ok <mask> } <mask> <mask> // Search for a client by IP <mask> func clientFind(ip string) (Client, bool) { <mask> clients.lock.Lock() <mask> defer clients.lock.Unlock() <mask> <mask> c, ok := clients.ipIndex[ip] <mask> if ok { </s> Fix #727 - use default parental sensitivity when it's not...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
clients.go
return c, true
<mask> defer clients.lock.Unlock() <mask> <mask> c, ok := clients.ipIndex[ip] <mask> if ok { <mask> return *c, true <mask> } <mask> <mask> for _, c = range clients.list { <mask> if len(c.MAC) != 0 { <mask> mac, err := net.ParseMAC(c.MAC) </s> Fix #727 - use default parental sensitivity when it'...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
clients.go
return c, true
<mask> if ipAddr == nil { <mask> continue <mask> } <mask> if ip == ipAddr.String() { <mask> return *c, true <mask> } <mask> } <mask> } <mask> <mask> return Client{}, false </s> Fix #727 - use default parental sensitivity when it's not set </s> remove return Client{}, false </s> add...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
clients.go
return nil, false
<mask> } <mask> } <mask> } <mask> <mask> return Client{}, false <mask> } <mask> <mask> // Check if Client object's fields are correct <mask> func clientCheck(c *Client) error { <mask> if len(c.Name) == 0 { </s> Fix #727 - use default parental sensitivity when it's not set </s> remove return *c,...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
clients.go
if !ok || c == nil || !c.UseOwnSettings {
<mask> <mask> // If a client has his own settings, apply them <mask> func applyClientSettings(clientAddr string, setts *dnsfilter.RequestFilteringSettings) { <mask> c, ok := clientFind(clientAddr) <mask> if !ok || !c.UseOwnSettings { <mask> return <mask> } <mask> <mask> log.Debug("Using settings for cl...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
dns.go
setts.ParentalEnabled = c.ParentalEnabled
<mask> log.Debug("Using settings for client with IP %s", clientAddr) <mask> setts.FilteringEnabled = c.FilteringEnabled <mask> setts.SafeSearchEnabled = c.SafeSearchEnabled <mask> setts.SafeBrowsingEnabled = c.SafeBrowsingEnabled <mask> setts.ParentalEnabled = c.UseOwnSettings <mask> } <mask> <mask> func ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
dns.go
const defaultParentalSensitivity = 13 // use "TEEN" by default const maxDialCacheSize = 2 // the number of host names for safebrowsing and parental control
<mask> const defaultSafebrowsingServer = "sb.adtidy.org" <mask> const defaultSafebrowsingURL = "%s://%s/safebrowsing-lookup-hash.html?prefixes=%s" <mask> const defaultParentalServer = "pctrl.adguard.com" <mask> const defaultParentalURL = "%s://%s/check-parental-control-hash?prefixes=%s&sensitivity=%d" <mask> const...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
dnsfilter/dnsfilter.go
sensitivity := d.ParentalSensitivity if sensitivity == 0 { sensitivity = defaultParentalSensitivity } url := fmt.Sprintf(defaultParentalURL, schema, d.parentalServer, hashparam, sensitivity)
<mask> schema := "https" <mask> if d.UsePlainHTTP { <mask> schema = "http" <mask> } <mask> url := fmt.Sprintf(defaultParentalURL, schema, d.parentalServer, hashparam, d.ParentalSensitivity) <mask> return url <mask> } <mask> handleBody := func(body []byte, hashes map[string]bool) (Result, error) {...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
dnsfilter/dnsfilter.go
go l.flushLogBuffer(false) // nolint
<mask> // if buffer needs to be flushed to disk, do it now <mask> if needFlush { <mask> // write to file <mask> // do it in separate goroutine -- we are stalling DNS response this whole time <mask> go l.flushLogBuffer(false) <mask> } <mask> <mask> return &entry <mask> } <mask> </s> Fix #727 - use...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07db927246cd6913f9dd05c1a5c6adc413306383
dnsforward/querylog.go
<mask> return s.genBlockedHost(m, s.conf.SafeBrowsingBlockHost, d) <mask> case dnsfilter.FilteredParental: <mask> return s.genBlockedHost(m, s.conf.ParentalBlockHost, d) <mask> default: <mask> if result.IP != nil { <mask> return s.genResponseWithIP(m, result.IP) <mask> } <mask> <mask> if s.conf...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07ebcc2bf3bf4e4d3535f0d1d5191cbc82ba876d
dnsforward/dnsforward.go
} else if s.conf.BlockingMode == "nxdomain" { return s.genNXDomain(m)
<mask> return s.genAAAARecord(m, s.conf.BlockingIPAddrv6) <mask> } <mask> } <mask> <mask> if result.IP != nil { <mask> return s.genResponseWithIP(m, result.IP) <mask> } <mask> return s.genNXDomain(m) </s> * DNS: nxdomain: don't return IP address for a blocked domain Don't return IP address ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07ebcc2bf3bf4e4d3535f0d1d5191cbc82ba876d
dnsforward/dnsforward.go
if result.IP != nil { return s.genResponseWithIP(m, result.IP) }
<mask> } else if s.conf.BlockingMode == "nxdomain" { <mask> return s.genNXDomain(m) <mask> } <mask> <mask> return s.genNXDomain(m) <mask> } <mask> } <mask> </s> * DNS: nxdomain: don't return IP address for a blocked domain Don't return IP address for a blocked domain when blocking mode is "nxdoma...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07ebcc2bf3bf4e4d3535f0d1d5191cbc82ba876d
dnsforward/dnsforward.go
if !(bm == "default" || bm == "nxdomain" || bm == "null_ip" || bm == "custom_ip") {
<mask> } <mask> <mask> func checkBlockingMode(req dnsConfigJSON) bool { <mask> bm := req.BlockingMode <mask> if !(bm == "nxdomain" || bm == "null_ip" || bm == "custom_ip") { <mask> return false <mask> } <mask> <mask> if bm == "custom_ip" { <mask> ip := net.ParseIP(req.BlockingIPv4) </s> * DNS: nxdo...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07ebcc2bf3bf4e4d3535f0d1d5191cbc82ba876d
dnsforward/dnsforward_http.go
- "default"
<mask> blocking_mode: <mask> type: "string" <mask> enum: <mask> - "nxdomain" <mask> - "null_ip" <mask> - "custom_ip" <mask> blocking_ipv4: <mask> type: "string" <mask> blocking_ip...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07ebcc2bf3bf4e4d3535f0d1d5191cbc82ba876d
openapi/openapi.yaml
BlockingMode: "nxdomain", // mode how to answer filtered requests
<mask> Port: 53, <mask> FilteringConfig: dnsforward.FilteringConfig{ <mask> ProtectionEnabled: true, // whether or not use any of dnsfilter features <mask> FilteringEnabled: true, // whether or not use filter lists <mask> BlockedResponseTTL: 10, // in seconds <mask> QueryLogEnabled: tr...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07ffcbec3dfb58f0df22b9c842231135653fa4a3
config.go
BlockingMode string `yaml:"blocking_mode"` // mode how to answer filtered requests
<mask> ProtectionEnabled bool `yaml:"protection_enabled"` // whether or not use any of dnsfilter features <mask> FilteringEnabled bool `yaml:"filtering_enabled"` // whether or not use filter lists <mask> BlockedResponseTTL uint32 `yaml:"blocked_response_ttl"` // if 0, then default is used (3600)...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07ffcbec3dfb58f0df22b9c842231135653fa4a3
dnsforward/dnsforward.go
if s.BlockingMode == "null_ip" { return s.genARecord(m, net.IPv4zero) }
<mask> return s.genARecord(m, result.IP) <mask> } <mask> <mask> return s.genNXDomain(m) <mask> } <mask> } <mask> <mask> func (s *Server) genServerFailure(request *dns.Msg) *dns.Msg { </s> * dnsforward, config: add unspecified IP blocking option * dnsforward: prioritize host files over null filter *...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/07ffcbec3dfb58f0df22b9c842231135653fa4a3
dnsforward/dnsforward.go
github.com/AdguardTeam/dnsproxy v0.9.11
<mask> module github.com/AdguardTeam/AdGuardHome <mask> <mask> require ( <mask> github.com/AdguardTeam/dnsproxy v0.9.10 <mask> github.com/StackExchange/wmi v0.0.0-20180725035823-b12b22c5341f // indirect <mask> github.com/bluele/gcache v0.0.0-20171010155617-472614239ac7 <mask> github.com/go-ole/go-ole v1.2.1...
[ "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0820983d81d3317640b04072679858c1a54bcb9e
go.mod
github.com/hmage/golibs v0.0.0-20190121112702-20153bd03c24
<mask> github.com/bluele/gcache v0.0.0-20171010155617-472614239ac7 <mask> github.com/go-ole/go-ole v1.2.1 // indirect <mask> github.com/go-test/deep v1.0.1 <mask> github.com/gobuffalo/packr v1.19.0 <mask> github.com/hmage/golibs v0.0.0-20181229160906-c8491df0bfc4 <mask> github.com/joomcode/errorx v0.1.0 <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0820983d81d3317640b04072679858c1a54bcb9e
go.mod
golang.org/x/net v0.0.0-20190119204137-ed066c81e75e golang.org/x/sys v0.0.0-20190122071731-054c452bb702
<mask> github.com/shirou/gopsutil v2.18.10+incompatible <mask> github.com/shirou/w32 v0.0.0-20160930032740-bb4de0191aa4 // indirect <mask> github.com/stretchr/testify v1.2.2 <mask> go.uber.org/goleak v0.10.0 <mask> golang.org/x/net v0.0.0-20181220203305-927f97764cc3 <mask> golang.org/x/sys v0.0.0-2018122814...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0820983d81d3317640b04072679858c1a54bcb9e
go.mod
github.com/AdguardTeam/dnsproxy v0.9.11 h1:1rsXJTHUqwxTLaGMUD2NrzHw2j88Nk9EhTX6EgmdVlM= github.com/AdguardTeam/dnsproxy v0.9.11/go.mod h1:JAmwpTphfUBBw6TIOFGxL49/oSl+J97kaRW8viqXNe8=
<mask> github.com/AdguardTeam/dnsproxy v0.9.10 h1:q364WlTvC+CS8kJbMy7TCyt4Niqixxw584MQJtCGhJU= <mask> github.com/AdguardTeam/dnsproxy v0.9.10/go.mod h1:IqBhopgNpzB168kMurbjXf86dn50geasBIuGVxY63j0= <mask> github.com/StackExchange/wmi v0.0.0-20180725035823-b12b22c5341f h1:5ZfJxyXo8KyX8DgGXC5B7ILL8y51fci/qYz2B4j8iLY= ...
[ "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0820983d81d3317640b04072679858c1a54bcb9e
go.sum
github.com/ameshkov/dnscrypt v1.0.6 h1:55wfnNF8c4E3JXDNlwPl2Pbs7UPPIh+kI6KK3THqYS0= github.com/ameshkov/dnscrypt v1.0.6/go.mod h1:ZvT9LaNaJfDNXKIbkYFf24HUgHuQR6MNT6nwVvN4jMQ=
<mask> github.com/aead/chacha20 v0.0.0-20180709150244-8b13a72661da h1:KjTM2ks9d14ZYCvmHS9iAKVt9AyzRSqNU1qabPih5BY= <mask> github.com/aead/chacha20 v0.0.0-20180709150244-8b13a72661da/go.mod h1:eHEWzANqSiWQsof+nXEI9bUVUyV6F53Fp89EuCh2EAA= <mask> github.com/aead/poly1305 v0.0.0-20180717145839-3fee0db0b635 h1:52m0LGchQB...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0820983d81d3317640b04072679858c1a54bcb9e
go.sum
github.com/hmage/golibs v0.0.0-20190121112702-20153bd03c24 h1:yyDtaSMcAZdm1I6uL8YLghpWiJljfBHs8NC/P86PYQk= github.com/hmage/golibs v0.0.0-20190121112702-20153bd03c24/go.mod h1:H6Ev6svFxUVPFThxLtdnFfcE9e3GWufpfmcVFpqV6HM=
<mask> github.com/gobuffalo/packd v0.0.0-20181031195726-c82734870264 h1:roWyi0eEdiFreSqW9V1wT9pNOVzrpo2NWsxja53slX0= <mask> github.com/gobuffalo/packd v0.0.0-20181031195726-c82734870264/go.mod h1:Yf2toFaISlyQrr5TfO3h6DB9pl9mZRmyvBGQb/aQ/pI= <mask> github.com/gobuffalo/packr v1.19.0 h1:3UDmBDxesCOPF8iZdMDBBWKfkBoYujI...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0820983d81d3317640b04072679858c1a54bcb9e
go.sum
golang.org/x/crypto v0.0.0-20190122013713-64072686203f h1:u1CmMhe3a44hy8VIgpInORnI01UVaUYheqR7x9BxT3c= golang.org/x/crypto v0.0.0-20190122013713-64072686203f/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
<mask> go.uber.org/goleak v0.10.0/go.mod h1:VCZuO8V8mFPlL0F5J5GK1rtHV3DrFcQ1R8ryq7FK0aI= <mask> golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9 h1:mKdxBk7AujPs8kU4m80U72y/zjbZ3UcXC7dClwKbUI0= <mask> golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= ...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/0820983d81d3317640b04072679858c1a54bcb9e
go.sum