docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
hwaddr := s.findReservedHWaddr(reqIP) | <mask> //
<mask>
<mask> log.Tracef("lease IP is different from requested IP: %s vs %s", lease.IP, reqIP)
<mask>
<mask> hwaddr := s.getIPpool(reqIP)
<mask> if hwaddr == nil {
<mask> // not in pool, check if it's in DHCP range
<mask> if dhcp4.IPInRange(s.leaseStart, s.leaseStop, reqIP) {
<mask> // o... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/60fa3b2e95e5fc111884f13c8bfa465f030a0b40 | dhcpd/dhcpd.go |
// Leases returns the list of current DHCP leases (thread-safe) | <mask> log.Tracef("Replying with NAK: request IP %s is outside of DHCP range [%s, %s], asked by %v", reqIP, s.leaseStart, s.leaseStop, p.CHAddr())
<mask> return dhcp4.ReplyPacket(p, dhcp4.NAK, s.ipnet.IP, nil, 0, nil)
<mask> }
<mask>
<mask> // Leases returns the list of current DHCP leases
<mask> func (s *Serv... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/60fa3b2e95e5fc111884f13c8bfa465f030a0b40 | dhcpd/dhcpd.go |
<mask> package querylog
<mask>
<mask> import (
<mask> "encoding/base64"
<mask> "fmt"
<mask> "net"
<mask> "strconv"
<mask> "strings"
<mask> "time"
</s> *(querylog): decode methods to a new file </s> remove "strings"
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/dnsfilter"
</s> add </s> ... | [
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61a24ffc71eda26e10a11e3a9c8506909b6c4b52 | querylog/json.go | |
<mask> "encoding/base64"
<mask> "fmt"
<mask> "net"
<mask> "strconv"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
</s> *(querylog): decode methods to a new file </s> remove "encod... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61a24ffc71eda26e10a11e3a9c8506909b6c4b52 | querylog/json.go | |
<mask> "strconv"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/dnsfilter"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // decodeLogEntry - decodes query log entry from a line
</s> *(querylog): decode methods to a ne... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61a24ffc71eda26e10a11e3a9c8506909b6c4b52 | querylog/json.go | |
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // decodeLogEntry - decodes query log entry from a line
<mask> // nolint (gocyclo)
<mask> func decodeLogEntry(ent *logEntry, str string) {
<mask> var b bool
<mask> var i int
<mask> var err error
<mask> for ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/61a24ffc71eda26e10a11e3a9c8506909b6c4b52 | querylog/json.go | |
<mask> entries, _ = l.search(params)
<mask> assert.Equal(t, 10, len(entries))
<mask> }
<mask>
<mask> func TestJSON(t *testing.T) {
<mask> s := `
<mask> {"keystr":"val","obj":{"keybool":true,"keyint":123456}}
<mask> `
<mask> k, v, jtype := readJSON(&s)
<mask> assert.Equal(t, jtype, int32(jsonTStr))
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/61a24ffc71eda26e10a11e3a9c8506909b6c4b52 | querylog/qlog_test.go | |
safeSearch, err := safesearch.NewDefault( | <mask> SafeSearchConf: safeSearchConf,
<mask> SafeSearchCacheSize: 1000,
<mask> CacheTime: 30,
<mask> }
<mask> safeSearch, err := safesearch.NewDefaultSafeSearch(
<mask> safeSearchConf,
<mask> filterConf.SafeSearchCacheSize,
<mask> time.Minute*time.Duration(filterConf.CacheTime),
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/dnsforward/dnsforward_test.go |
"", | <mask> safeSearch, err := safesearch.NewDefault(
<mask> safeSearchConf,
<mask> filterConf.SafeSearchCacheSize,
<mask> time.Minute*time.Duration(filterConf.CacheTime),
<mask> )
<mask> require.NoError(t, err)
<mask>
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the fol... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/dnsforward/dnsforward_test.go |
import "github.com/miekg/dns" | <mask> package filtering
<mask>
<mask> import (
<mask> "github.com/AdguardTeam/urlfilter/rules"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // SafeSearch interface describes a service for search engines hosts rewrites.
<mask> type SafeSearch interface {
<mask> // SearchHost returns a replacement... | [
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch.go |
// CheckHost checks host with safe search filter. CheckHost must be safe
// for concurrent use. qtype must be either [dns.TypeA] or [dns.TypeAAAA]. | <mask> )
<mask>
<mask> // SafeSearch interface describes a service for search engines hosts rewrites.
<mask> type SafeSearch interface {
<mask> // SearchHost returns a replacement address for the search engine host.
<mask> SearchHost(host string, qtype uint16) (res *rules.DNSRewrite)
<mask>
<mask> // Check... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch.go |
// Update updates the configuration of the safe search filter. Update must
// be safe for concurrent use. An implementation of Update may ignore some
// fields, but it must document which.
Update(conf SafeSearchConfig) (err error) | <mask> // for concurrent use. qtype must be either [dns.TypeA] or [dns.TypeAAAA].
<mask> CheckHost(host string, qtype uint16) (res Result, err error)
<mask> }
<mask>
<mask> // SafeSearchConfig is a struct with safe search related settings.
<mask> type SafeSearchConfig struct {
<mask> // CustomResolver is th... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch.go |
qtype uint16, | <mask> // checkSafeSearch checks host with safe search engine. Matches
<mask> // [hostChecker.check].
<mask> func (d *DNSFilter) checkSafeSearch(
<mask> host string,
<mask> _ uint16,
<mask> setts *Settings,
<mask> ) (res Result, err error) {
<mask> if !setts.ProtectionEnabled || !setts.SafeSearchEnabled {
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch.go |
if !setts.ProtectionEnabled ||
!setts.SafeSearchEnabled ||
(qtype != dns.TypeA && qtype != dns.TypeAAAA) { | <mask> host string,
<mask> _ uint16,
<mask> setts *Settings,
<mask> ) (res Result, err error) {
<mask> if !setts.ProtectionEnabled || !setts.SafeSearchEnabled {
<mask> return Result{}, nil
<mask> }
<mask>
<mask> if d.safeSearch == nil {
<mask> return Result{}, nil
</s> Pull request 1803: 5685-fix-... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch.go |
return clientSafeSearch.CheckHost(host, qtype) | <mask> }
<mask>
<mask> clientSafeSearch := setts.ClientSafeSearch
<mask> if clientSafeSearch != nil {
<mask> return clientSafeSearch.CheckHost(host, dns.TypeA)
<mask> }
<mask>
<mask> return d.safeSearch.CheckHost(host, dns.TypeA)
<mask> }
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch.go |
return d.safeSearch.CheckHost(host, qtype) | <mask> if clientSafeSearch != nil {
<mask> return clientSafeSearch.CheckHost(host, dns.TypeA)
<mask> }
<mask>
<mask> return d.safeSearch.CheckHost(host, dns.TypeA)
<mask> }
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:
commit 5312147abfa0914c896acbf1e88f8c... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch.go |
<mask> |www.google.to^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com
<mask> |www.google.tt^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com
<mask> |www.google.vg^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com
<mask> |www.google.vu^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com
<mask> |www.goo... | [
"keep",
"keep",
"keep",
"keep",
"replace"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/rules/google.txt | |
|www.google.ws^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com | <mask> |www.google.tt^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com
<mask> |www.google.vg^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com
<mask> |www.google.vu^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com
<mask> |www.google.ws^$dnsrewrite=NOERROR;CNAME;forcesafesearch.google.com
</s> Pull reque... | [
"keep",
"keep",
"keep",
"add"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/rules/google.txt |
<mask> |yandex.pl^$dnsrewrite=NOERROR;A;213.180.193.56
<mask> |yandex.ru^$dnsrewrite=NOERROR;A;213.180.193.56
<mask> |yandex.tj^$dnsrewrite=NOERROR;A;213.180.193.56
<mask> |yandex.tm^$dnsrewrite=NOERROR;A;213.180.193.56
<mask> |yandex.uz^$dnsrewrite=NOERROR;A;213.180.193.56 </s> Pull request 1803: 5685-fix-safe-se... | [
"keep",
"keep",
"keep",
"keep",
"replace"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/rules/yandex.txt | |
|yandex.uz^$dnsrewrite=NOERROR;A;213.180.193.56 | <mask> |yandex.ru^$dnsrewrite=NOERROR;A;213.180.193.56
<mask> |yandex.tj^$dnsrewrite=NOERROR;A;213.180.193.56
<mask> |yandex.tm^$dnsrewrite=NOERROR;A;213.180.193.56
<mask> |yandex.uz^$dnsrewrite=NOERROR;A;213.180.193.56
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:... | [
"keep",
"keep",
"keep",
"add"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/rules/yandex.txt |
<mask> |www.youtube.com^$dnsrewrite=NOERROR;CNAME;restrictmoderate.youtube.com
<mask> |m.youtube.com^$dnsrewrite=NOERROR;CNAME;restrictmoderate.youtube.com
<mask> |youtubei.googleapis.com^$dnsrewrite=NOERROR;CNAME;restrictmoderate.youtube.com
<mask> |youtube.googleapis.com^$dnsrewrite=NOERROR;CNAME;restrictmoderate... | [
"keep",
"keep",
"keep",
"keep",
"replace"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/rules/youtube.txt | |
"sync" | <mask> "net"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/urlfilter"
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
// Default is the default safe search filter that uses filtering rules with the
// dnsrewrite modifier.
type Default struct {
// mu protects engine.
mu *sync.RWMutex
// engine is the filtering engine that contains the DNS rewrite rules.
// engine may be nil, which means that this safe search filter is disabled.
e... | <mask> panic(fmt.Errorf("safesearch: invalid sources: not found service %q", service))
<mask> }
<mask> }
<mask>
<mask> // DefaultSafeSearch is the default safesearch struct.
<mask> type DefaultSafeSearch struct {
<mask> engine *urlfilter.DNSEngine
<mask> safeSearchCache cache.Cache
<mask> resol... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
// NewDefault returns an initialized default safe search filter. name is used
// for logging.
func NewDefault( | <mask> resolver filtering.Resolver
<mask> cacheTime time.Duration
<mask> }
<mask>
<mask> // NewDefaultSafeSearch returns new safesearch struct. CacheTime is an element
<mask> // TTL (in minutes).
<mask> func NewDefaultSafeSearch(
<mask> conf filtering.SafeSearchConfig,
<mask> cacheSize uint,... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
name string, | <mask> // for logging.
<mask> func NewDefault(
<mask> conf filtering.SafeSearchConfig,
<mask> cacheSize uint,
<mask> cacheTTL time.Duration,
<mask> ) (ss *Default, err error) {
<mask> var resolver filtering.Resolver = net.DefaultResolver
<mask> if conf.CustomResolver != nil {
</s> Pull request 1803: 5685-... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
cacheTTL time.Duration,
) (ss *Default, err error) { | <mask> // TTL (in minutes).
<mask> func NewDefaultSafeSearch(
<mask> conf filtering.SafeSearchConfig,
<mask> cacheSize uint,
<mask> cacheTime time.Duration,
<mask> ) (ss *DefaultSafeSearch, err error) {
<mask> engine, err := newEngine(filtering.SafeSearchListID, conf)
<mask> if err != nil {
<mask> retur... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss = &Default{
mu: &sync.RWMutex{},
cache: cache.New(cache.Config{ | <mask> if conf.CustomResolver != nil {
<mask> resolver = conf.CustomResolver
<mask> }
<mask>
<mask> return &DefaultSafeSearch{
<mask> engine: engine,
<mask> safeSearchCache: cache.New(cache.Config{
<mask> EnableLRU: true,
<mask> MaxSize: cacheSize,
<mask> }),
<mask> cacheTime: cacheTime... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
resolver: resolver,
// Use %s, because the client safe-search names already contain double
// quotes.
logPrefix: fmt.Sprintf("safesearch %s: ", name),
cacheTTL: cacheTTL,
}
err = ss.resetEngine(filtering.SafeSearchListID, conf)
if err != nil {
// Don't wrap the error, because it's informative enough as... | <mask> safeSearchCache: cache.New(cache.Config{
<mask> EnableLRU: true,
<mask> MaxSize: cacheSize,
<mask> }),
<mask> cacheTime: cacheTime,
<mask> resolver: resolver,
<mask> }, nil
<mask> }
<mask>
<mask> // newEngine creates new engine for provided safe search configuration.
<mask> func new... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
// log is a helper for logging that includes the name of the safe search
// filter. level must be one of [log.DEBUG], [log.INFO], and [log.ERROR].
func (ss *Default) log(level log.Level, msg string, args ...any) {
switch level {
case log.DEBUG:
log.Debug(ss.logPrefix+msg, args...)
case log.INFO:
log.Info(ss.lo... | <mask> resolver: resolver,
<mask> }, nil
<mask> }
<mask>
<mask> // newEngine creates new engine for provided safe search configuration.
<mask> func newEngine(listID int, conf filtering.SafeSearchConfig) (engine *urlfilter.DNSEngine, err error) {
<mask> var sb strings.Builder
<mask> for service, serviceRu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
return fmt.Errorf("creating rule storage: %w", err) | <mask> }
<mask>
<mask> rs, err := filterlist.NewRuleStorage([]filterlist.RuleList{strList})
<mask> if err != nil {
<mask> return nil, fmt.Errorf("creating rule storage: %w", err)
<mask> }
<mask>
<mask> engine = urlfilter.NewDNSEngine(rs)
<mask> log.Info("safesearch: filter %d: reset %d rules", listID... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.engine = urlfilter.NewDNSEngine(rs) | <mask> if err != nil {
<mask> return nil, fmt.Errorf("creating rule storage: %w", err)
<mask> }
<mask>
<mask> engine = urlfilter.NewDNSEngine(rs)
<mask> log.Info("safesearch: filter %d: reset %d rules", listID, engine.RulesCount)
<mask>
<mask> return engine, nil
<mask> }
<mask>
<mask> // type check... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.log(log.INFO, "reset %d rules", ss.engine.RulesCount) | <mask>
<mask> // type check
<mask> var _ filtering.SafeSearch = (*DefaultSafeSearch)(nil)
<mask>
<mask> // SearchHost implements the [filtering.SafeSearch] interface for *DefaultSafeSearch.
<mask> func (ss *DefaultSafeSearch) SearchHost(host string, qtype uint16) (res *rules.DNSRewrite) {
<mask> r, _ := ss.en... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
// type check
var _ filtering.SafeSearch = (*Default)(nil)
| <mask>
<mask> return nil
<mask> }
<mask>
<mask> // CheckHost implements the [filtering.SafeSearch] interface for
<mask> // *DefaultSafeSearch.
<mask> func (ss *Default) CheckHost(
<mask> host string,
<mask> qtype rules.RRType,
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
func (ss *Default) CheckHost( | <mask> }
<mask>
<mask> // CheckHost implements the [filtering.SafeSearch] interface for
<mask> // *DefaultSafeSearch.
<mask> func (ss *DefaultSafeSearch) CheckHost(
<mask> host string,
<mask> qtype uint16,
<mask> ) (res filtering.Result, err error) {
<mask> if log.GetLevel() >= log.DEBUG {
<mask> timer ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
qtype rules.RRType, | <mask> // CheckHost implements the [filtering.SafeSearch] interface for
<mask> // *DefaultSafeSearch.
<mask> func (ss *DefaultSafeSearch) CheckHost(
<mask> host string,
<mask> qtype uint16,
<mask> ) (res filtering.Result, err error) {
<mask> if log.GetLevel() >= log.DEBUG {
<mask> timer := log.StartTimer()... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
start := time.Now()
defer func() {
ss.log(log.DEBUG, "lookup for %q finished in %s", host, time.Since(start))
}()
if qtype != dns.TypeA && qtype != dns.TypeAAAA {
return filtering.Result{}, fmt.Errorf("unsupported question type %s", dns.Type(qtype)) | <mask> func (ss *DefaultSafeSearch) CheckHost(
<mask> host string,
<mask> qtype uint16,
<mask> ) (res filtering.Result, err error) {
<mask> if log.GetLevel() >= log.DEBUG {
<mask> timer := log.StartTimer()
<mask> defer timer.LogElapsed("safesearch: lookup for %s", host)
<mask> }
<mask>
<mask> // Che... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
cachedValue, isFound := ss.getCachedResult(host, qtype) | <mask> defer timer.LogElapsed("safesearch: lookup for %s", host)
<mask> }
<mask>
<mask> // Check cache. Return cached result if it was found
<mask> cachedValue, isFound := ss.getCachedResult(host)
<mask> if isFound {
<mask> log.Debug("safesearch: found in cache: %s", host)
<mask>
<mask> return cach... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.log(log.DEBUG, "found in cache: %q", host) | <mask>
<mask> // Check cache. Return cached result if it was found
<mask> cachedValue, isFound := ss.getCachedResult(host)
<mask> if isFound {
<mask> log.Debug("safesearch: found in cache: %s", host)
<mask>
<mask> return cachedValue, nil
<mask> }
<mask>
<mask> rewrite := ss.SearchHost(host, qtype)... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
rewrite := ss.searchHost(host, qtype) | <mask>
<mask> return cachedValue, nil
<mask> }
<mask>
<mask> rewrite := ss.SearchHost(host, qtype)
<mask> if rewrite == nil {
<mask> return filtering.Result{}, nil
<mask> }
<mask>
<mask> dRes, err := ss.newResult(rewrite, qtype)
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squash... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
fltRes, err := ss.newResult(rewrite, qtype) | <mask> if rewrite == nil {
<mask> return filtering.Result{}, nil
<mask> }
<mask>
<mask> dRes, err := ss.newResult(rewrite, qtype)
<mask> if err != nil {
<mask> log.Debug("safesearch: failed to lookup addresses for %s: %s", host, err)
<mask>
<mask> return filtering.Result{}, err
<mask> }
</s> Pul... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.log(log.DEBUG, "looking up addresses for %q: %s", host, err) | <mask> }
<mask>
<mask> dRes, err := ss.newResult(rewrite, qtype)
<mask> if err != nil {
<mask> log.Debug("safesearch: failed to lookup addresses for %s: %s", host, err)
<mask>
<mask> return filtering.Result{}, err
<mask> }
<mask>
<mask> if dRes != nil {
</s> Pull request 1803: 5685-fix-safe-searc... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
if fltRes != nil {
res = *fltRes
ss.setCacheResult(host, qtype, res) | <mask>
<mask> return filtering.Result{}, err
<mask> }
<mask>
<mask> if dRes != nil {
<mask> res = *dRes
<mask> ss.setCacheResult(host, res)
<mask>
<mask> return res, nil
<mask> }
<mask>
<mask> return filtering.Result{}, fmt.Errorf("no ipv4 addresses in safe search response for %s", host)
</... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
return filtering.Result{}, fmt.Errorf("no ipv4 addresses for %q", host) | <mask>
<mask> return res, nil
<mask> }
<mask>
<mask> return filtering.Result{}, fmt.Errorf("no ipv4 addresses in safe search response for %s", host)
<mask> }
<mask>
<mask> // newResult creates Result object from rewrite rule.
<mask> func (ss *DefaultSafeSearch) newResult(
<mask> rewrite *rules.DNSRewr... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
// searchHost looks up DNS rewrites in the internal DNS filtering engine.
func (ss *Default) searchHost(host string, qtype rules.RRType) (res *rules.DNSRewrite) {
ss.mu.RLock()
defer ss.mu.RUnlock()
if ss.engine == nil {
return nil
}
r, _ := ss.engine.MatchRequest(&urlfilter.DNSRequest{
Hostname: strings.ToL... | <mask>
<mask> return filtering.Result{}, fmt.Errorf("no ipv4 addresses in safe search response for %s", host)
<mask> }
<mask>
<mask> // newResult creates Result object from rewrite rule.
<mask> func (ss *DefaultSafeSearch) newResult(
<mask> rewrite *rules.DNSRewrite,
<mask> qtype uint16,
<mask> ) (res *fi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
qtype rules.RRType, | <mask>
<mask> // newResult creates Result object from rewrite rule.
<mask> func (ss *DefaultSafeSearch) newResult(
<mask> rewrite *rules.DNSRewrite,
<mask> qtype uint16,
<mask> ) (res *filtering.Result, err error) {
<mask> res = &filtering.Result{
<mask> Rules: []*filtering.ResultRule{{
<mask> FilterL... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
if rewrite.RRType == qtype { | <mask> Reason: filtering.FilteredSafeSearch,
<mask> IsFiltered: true,
<mask> }
<mask>
<mask> if rewrite.RRType == qtype && (qtype == dns.TypeA || qtype == dns.TypeAAAA) {
<mask> ip, ok := rewrite.Value.(net.IP)
<mask> if !ok || ip == nil {
<mask> return nil, nil
<mask> }
<mask>
</s> Pull... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
host := rewrite.NewCNAME
if host == "" { | <mask>
<mask> return res, nil
<mask> }
<mask>
<mask> if rewrite.NewCNAME == "" {
<mask> return nil, nil
<mask> }
<mask>
<mask> ips, err := ss.resolver.LookupIP(context.Background(), "ip", rewrite.NewCNAME)
<mask> if err != nil {
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squash... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.log(log.DEBUG, "resolving %q", host)
ips, err := ss.resolver.LookupIP(context.Background(), qtypeToProto(qtype), host) | <mask> if rewrite.NewCNAME == "" {
<mask> return nil, nil
<mask> }
<mask>
<mask> ips, err := ss.resolver.LookupIP(context.Background(), "ip", rewrite.NewCNAME)
<mask> if err != nil {
<mask> return nil, err
<mask> }
<mask>
<mask> for _, ip := range ips {
</s> Pull request 1803: 5685-fix-safe-searc... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.log(log.DEBUG, "resolved %s", ips)
| <mask> if err != nil {
<mask> return nil, err
<mask> }
<mask>
<mask> for _, ip := range ips {
<mask> // TODO(a.garipov): Remove this filtering once the resolver we use
<mask> // actually learns about network.
<mask> ip = fitToProto(ip, qtype)
</s> Pull request 1803: 5685-fix-safe-search
Updates #5... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
// TODO(a.garipov): Remove this filtering once the resolver we use
// actually learns about network.
ip = fitToProto(ip, qtype)
if ip == nil { | <mask> return nil, err
<mask> }
<mask>
<mask> for _, ip := range ips {
<mask> if ip = ip.To4(); ip == nil {
<mask> continue
<mask> }
<mask>
<mask> res.Rules[0].IP = ip
<mask>
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:
commit 5312147abfa091... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
// qtypeToProto returns "ip4" for [dns.TypeA] and "ip6" for [dns.TypeAAAA].
// It panics for other types.
func qtypeToProto(qtype rules.RRType) (proto string) {
switch qtype {
case dns.TypeA:
return "ip4"
case dns.TypeAAAA:
return "ip6"
default:
panic(fmt.Errorf("safesearch: unsupported question type %s", dns... | <mask>
<mask> return nil, nil
<mask> }
<mask>
<mask> // setCacheResult stores data in cache for host.
<mask> func (ss *DefaultSafeSearch) setCacheResult(host string, res filtering.Result) {
<mask> expire := uint32(time.Now().Add(ss.cacheTime).Unix())
<mask> exp := make([]byte, 4)
<mask> binary.BigEndian.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.log(log.ERROR, "cache encoding: %s", err) | <mask> buf := bytes.NewBuffer(exp)
<mask>
<mask> err := gob.NewEncoder(buf).Encode(res)
<mask> if err != nil {
<mask> log.Error("safesearch: cache encoding: %s", err)
<mask>
<mask> return
<mask> }
<mask>
<mask> val := buf.Bytes()
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
_ = ss.cache.Set([]byte(dns.Type(qtype).String()+" "+host), val) | <mask> return
<mask> }
<mask>
<mask> val := buf.Bytes()
<mask> _ = ss.safeSearchCache.Set([]byte(host), val)
<mask>
<mask> log.Debug("safesearch: stored in cache: %s (%d bytes)", host, len(val))
<mask> }
<mask>
<mask> // getCachedResult returns stored data from cache for host.
</s> Pull request 1803... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.log(log.DEBUG, "stored in cache: %q, %d bytes", host, len(val)) | <mask>
<mask> val := buf.Bytes()
<mask> _ = ss.safeSearchCache.Set([]byte(host), val)
<mask>
<mask> log.Debug("safesearch: stored in cache: %s (%d bytes)", host, len(val))
<mask> }
<mask>
<mask> // getCachedResult returns stored data from cache for host.
<mask> func (ss *DefaultSafeSearch) getCachedResul... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
// getCachedResult returns stored data from cache for host. qtype is expected
// to be either [dns.TypeA] or [dns.TypeAAAA].
func (ss *Default) getCachedResult(
host string,
qtype rules.RRType,
) (res filtering.Result, ok bool) { | <mask>
<mask> log.Debug("safesearch: stored in cache: %s (%d bytes)", host, len(val))
<mask> }
<mask>
<mask> // getCachedResult returns stored data from cache for host.
<mask> func (ss *DefaultSafeSearch) getCachedResult(host string) (res filtering.Result, ok bool) {
<mask> res = filtering.Result{}
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
data := ss.cache.Get([]byte(dns.Type(qtype).String() + " " + host)) | <mask> // getCachedResult returns stored data from cache for host.
<mask> func (ss *DefaultSafeSearch) getCachedResult(host string) (res filtering.Result, ok bool) {
<mask> res = filtering.Result{}
<mask>
<mask> data := ss.safeSearchCache.Get([]byte(host))
<mask> if data == nil {
<mask> return res, false
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.cache.Del([]byte(host)) | <mask> }
<mask>
<mask> exp := binary.BigEndian.Uint32(data[:4])
<mask> if exp <= uint32(time.Now().Unix()) {
<mask> ss.safeSearchCache.Del([]byte(host))
<mask>
<mask> return res, false
<mask> }
<mask>
<mask> buf := bytes.NewBuffer(data[4:])
</s> Pull request 1803: 5685-fix-safe-search
Updates #5... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
ss.log(log.ERROR, "cache decoding: %s", err) | <mask> buf := bytes.NewBuffer(data[4:])
<mask>
<mask> err := gob.NewDecoder(buf).Decode(&res)
<mask> if err != nil {
<mask> log.Debug("safesearch: cache decoding: %s", err)
<mask>
<mask> return filtering.Result{}, false
<mask> }
<mask>
<mask> return res, true
</s> Pull request 1803: 5685-fix-safe... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch.go |
package safesearch_test | <mask> package safesearch
<mask>
<mask> import (
<mask> "context"
<mask> "net"
<mask> "testing"
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:
commit 5312147abfa0914c896acbf1e88f8c8f1af90f2b
Author: Ainar Garipov <A.Garipov@AdGuard.COM>
Date: Thu Apr 6 14:0... | [
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
<mask> package safesearch
<mask>
<mask> import (
<mask> "context"
<mask> "net"
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:
commit 5312147abfa0914c896ac... | [
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go | |
"github.com/AdguardTeam/AdGuardHome/internal/filtering/safesearch"
"github.com/AdguardTeam/golibs/testutil" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/urlfilter/rules"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
func TestMain(m *testing.M) {
testutil.DiscardLogOutput(m)
}
// Common test constants. | <mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
<mask> const (
<mask> // TODO(a.garipov): Add IPv6 tests.
<mask> testQType = dns.TypeA
<mask> testCacheSize = 5000
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
// TODO(a.garipov): Add IPv6 tests.
testQType = dns.TypeA
testCacheSize = 5000
testCacheTTL = 30 * time.Minute | <mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
<mask> const (
<mask> safeSearchCacheSize = 5000
<mask> cacheTime = 30 * time.Minute
<mask> )
<mask>
<mask> var defaultSafeSearchConf = filtering.SafeSearchConfig{
<mask> Enabled: true,
<mask> Bing: true,
</s> Pull reques... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
// testConf is the default safe search configuration for tests.
var testConf = filtering.SafeSearchConfig{
CustomResolver: nil,
Enabled: true,
| <mask> safeSearchCacheSize = 5000
<mask> cacheTime = 30 * time.Minute
<mask> )
<mask>
<mask> var defaultSafeSearchConf = filtering.SafeSearchConfig{
<mask> Enabled: true,
<mask> Bing: true,
<mask> DuckDuckGo: true,
<mask> Google: true,
<mask> Pixabay: true,
<mask> Yandex: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
// yandexIP is the expected IP address of Yandex safe search results. Keep in
// sync with the rules data. | <mask> YouTube: true,
<mask> }
<mask>
<mask> var yandexIP = net.IPv4(213, 180, 193, 56)
<mask>
<mask> func TestDefault_CheckHost_yandex(t *testing.T) {
<mask> conf := testConf
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:
commit 5312147abfa0914c896acbf1e... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
func TestDefault_CheckHost_yandex(t *testing.T) {
conf := testConf
ss, err := safesearch.NewDefault(conf, "", testCacheSize, testCacheTTL) | <mask> }
<mask>
<mask> var yandexIP = net.IPv4(213, 180, 193, 56)
<mask>
<mask> func newForTest(t testing.TB, ssConf filtering.SafeSearchConfig) (ss *DefaultSafeSearch) {
<mask> ss, err := NewDefaultSafeSearch(ssConf, safeSearchCacheSize, cacheTime)
<mask> require.NoError(t, err)
<mask>
<mask> return ss
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
<mask> func newForTest(t testing.TB, ssConf filtering.SafeSearchConfig) (ss *DefaultSafeSearch) {
<mask> ss, err := NewDefaultSafeSearch(ssConf, safeSearchCacheSize, cacheTime)
<mask> require.NoError(t, err)
<mask>
<mask> return ss
<mask> }
<mask>
<mask> func TestSafeSearch(t *testing.T) {
<mask> ss := n... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go | |
var res filtering.Result
res, err = ss.CheckHost(host, testQType) | <mask> "yandex.by",
<mask> "yandex.kz",
<mask> "www.yandex.com",
<mask> } {
<mask> res, err := ss.CheckHost(host, dns.TypeA)
<mask> require.NoError(t, err)
<mask>
<mask> assert.True(t, res.IsFiltered)
<mask>
<mask> require.Len(t, res.Rules, 1)
</s> Pull request 1803: 5685-fix-safe-search
Up... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
func TestDefault_CheckHost_google(t *testing.T) { | <mask> assert.EqualValues(t, filtering.SafeSearchListID, res.Rules[0].FilterListID)
<mask> }
<mask> }
<mask>
<mask> func TestCheckHostSafeSearchGoogle(t *testing.T) {
<mask> resolver := &aghtest.TestResolver{}
<mask> ip, _ := resolver.HostToIPs("forcesafesearch.google.com")
<mask>
<mask> ss := newForTe... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
conf := testConf
conf.CustomResolver = resolver
ss, err := safesearch.NewDefault(conf, "", testCacheSize, testCacheTTL)
require.NoError(t, err) | <mask> func TestCheckHostSafeSearchGoogle(t *testing.T) {
<mask> resolver := &aghtest.TestResolver{}
<mask> ip, _ := resolver.HostToIPs("forcesafesearch.google.com")
<mask>
<mask> ss := newForTest(t, defaultSafeSearchConf)
<mask> ss.resolver = resolver
<mask>
<mask> // Check host for each domain.
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
var res filtering.Result
res, err = ss.CheckHost(host, testQType) | <mask> "www.google.it",
<mask> "www.google.je",
<mask> } {
<mask> t.Run(host, func(t *testing.T) {
<mask> res, err := ss.CheckHost(host, dns.TypeA)
<mask> require.NoError(t, err)
<mask>
<mask> assert.True(t, res.IsFiltered)
<mask>
<mask> require.Len(t, res.Rules, 1)
</s> Pull request 180... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
func TestDefault_Update(t *testing.T) {
conf := testConf
ss, err := safesearch.NewDefault(conf, "", testCacheSize, testCacheTTL) | <mask> })
<mask> }
<mask> }
<mask>
<mask> func TestSafeSearchCacheYandex(t *testing.T) {
<mask> const domain = "yandex.ru"
<mask>
<mask> ss := newForTest(t, filtering.SafeSearchConfig{Enabled: false})
<mask>
<mask> // Check host with disabled safesearch.
<mask> res, err := ss.CheckHost(domain, dns.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
res, err := ss.CheckHost("www.yandex.com", testQType) | <mask> // Check host with disabled safesearch.
<mask> res, err := ss.CheckHost(domain, dns.TypeA)
<mask> require.NoError(t, err)
<mask>
<mask> assert.False(t, res.IsFiltered)
<mask> assert.Empty(t, res.Rules)
<mask>
<mask> ss = newForTest(t, defaultSafeSearchConf)
<mask> res, err = ss.CheckHost(domain... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
assert.True(t, res.IsFiltered) | <mask> ss = newForTest(t, defaultSafeSearchConf)
<mask> res, err = ss.CheckHost(domain, dns.TypeA)
<mask> require.NoError(t, err)
<mask>
<mask> // For yandex we already know valid IP.
<mask> require.Len(t, res.Rules, 1)
<mask>
<mask> assert.Equal(t, res.Rules[0].IP, yandexIP)
<mask>
<mask> // Check ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
err = ss.Update(filtering.SafeSearchConfig{
Enabled: true,
Google: false,
})
require.NoError(t, err) | <mask>
<mask> // For yandex we already know valid IP.
<mask> require.Len(t, res.Rules, 1)
<mask>
<mask> assert.Equal(t, res.Rules[0].IP, yandexIP)
<mask>
<mask> // Check cache.
<mask> cachedValue, isFound := ss.getCachedResult(domain)
<mask> require.True(t, isFound)
<mask> require.Len(t, cachedValue... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
res, err = ss.CheckHost("www.yandex.com", testQType) | <mask> const domain = "www.google.ru"
<mask>
<mask> ss := newForTest(t, filtering.SafeSearchConfig{Enabled: false})
<mask>
<mask> res, err := ss.CheckHost(domain, dns.TypeA)
<mask> require.NoError(t, err)
<mask>
<mask> assert.False(t, res.IsFiltered)
<mask> assert.Empty(t, res.Rules)
<mask>
</s> Pu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
<mask> res, err := ss.CheckHost(domain, dns.TypeA)
<mask> require.NoError(t, err)
<mask>
<mask> assert.False(t, res.IsFiltered)
<mask> assert.Empty(t, res.Rules)
<mask>
<mask> resolver := &aghtest.TestResolver{}
<mask> ss = newForTest(t, defaultSafeSearchConf)
<mask> ss.resolver = resolver
<mask>
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go | |
err = ss.Update(filtering.SafeSearchConfig{
Enabled: false,
Google: true,
}) | <mask>
<mask> assert.False(t, res.IsFiltered)
<mask> assert.Empty(t, res.Rules)
<mask>
<mask> resolver := &aghtest.TestResolver{}
<mask> ss = newForTest(t, defaultSafeSearchConf)
<mask> ss.resolver = resolver
<mask>
<mask> // Lookup for safesearch domain.
<mask> rewrite := ss.SearchHost(domain, dns.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
res, err = ss.CheckHost("www.yandex.com", testQType) | <mask>
<mask> ips, err := resolver.LookupIP(context.Background(), "ip", rewrite.NewCNAME)
<mask> require.NoError(t, err)
<mask>
<mask> var foundIP net.IP
<mask> for _, ip := range ips {
<mask> if ip.To4() != nil {
<mask> foundIP = ip
<mask>
<mask> break
<mask> }
<mask> }
<mask>
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
<mask> }
<mask>
<mask> res, err = ss.CheckHost(domain, dns.TypeA)
<mask> require.NoError(t, err)
<mask> require.Len(t, res.Rules, 1)
<mask>
<mask> assert.True(t, res.Rules[0].IP.Equal(foundIP))
<mask>
<mask> // Check cache.
<mask> cachedValue, isFound := ss.getCachedResult(domain)
<mask> require.T... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go | |
assert.False(t, res.IsFiltered) | <mask> }
<mask>
<mask> const googleHost = "www.google.com"
<mask>
<mask> var dnsRewriteSink *rules.DNSRewrite
<mask>
<mask> func BenchmarkSafeSearch(b *testing.B) {
<mask> ss := newForTest(b, defaultSafeSearchConf)
<mask>
<mask> for n := 0; n < b.N; n++ {
<mask> dnsRewriteSink = ss.SearchHost(googleH... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearch/safesearch_test.go |
conf := *req
err = d.safeSearch.Update(conf)
if err != nil {
aghhttp.Error(r, w, http.StatusBadRequest, "updating: %s", err)
return
}
| <mask> return
<mask> }
<mask>
<mask> func() {
<mask> d.confLock.Lock()
<mask> defer d.confLock.Unlock()
<mask>
<mask> d.Config.SafeSearchConf = conf
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:
commit 5312147abfa0914c896acbf1e88f8c8f1af90f2b
Autho... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearchhttp.go |
d.Config.SafeSearchConf = conf | <mask> func() {
<mask> d.confLock.Lock()
<mask> defer d.confLock.Unlock()
<mask>
<mask> d.Config.SafeSearchConf = *req
<mask> }()
<mask>
<mask> d.Config.ConfigModified()
<mask>
<mask> aghhttp.OK(w)
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:
c... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/filtering/safesearchhttp.go |
"time" | <mask>
<mask> import (
<mask> "encoding"
<mask> "fmt"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering/safesearch"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> )
<mask>
</s> Pull request 1803: 5685-fix-safe-se... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/client.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering/safesearch" | <mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> )
<mask>
<mask> // Client contains information about persistent clients.
<mask> type Client struct {
<mask> // upstreamConfig is the custom upstream config for this client. If
</s> ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/client.go |
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering/sa... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients.go | |
// safeSearchCacheSize is the size of the safe search cache to use for
// persistent clients.
safeSearchCacheSize uint
// safeSearchCacheTTL is the TTL of the safe search cache to use for
// persistent clients.
safeSearchCacheTTL time.Duration
| <mask> lock sync.Mutex
<mask>
<mask> // testing is a flag that disables some features for internal tests.
<mask> //
<mask> // TODO(a.garipov): Awful. Remove.
<mask> testing bool
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit of the following:
commit 5312147abfa0914c896acbf1... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients.go |
clients.safeSearchCacheSize = filteringConf.SafeSearchCacheSize
clients.safeSearchCacheTTL = time.Minute * time.Duration(filteringConf.CacheTime)
| <mask> clients.arpdb = arpdb
<mask> clients.addFromConfig(objects, filteringConf)
<mask>
<mask> if clients.testing {
<mask> return
<mask> }
<mask>
<mask> clients.updateFromDHCP(true)
<mask> if clients.dhcpServer != nil {
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squashed commit o... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients.go |
err := cli.setSafeSearch( | <mask>
<mask> if o.SafeSearchConf.Enabled {
<mask> o.SafeSearchConf.CustomResolver = safeSearchResolver{}
<mask>
<mask> ss, err := safesearch.NewDefaultSafeSearch(
<mask> o.SafeSearchConf,
<mask> filteringConf.SafeSearchCacheSize,
<mask> time.Minute*time.Duration(filteringConf.CacheTime),
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients.go |
log.Error("clients: init client safesearch %q: %s", cli.Name, err) | <mask> filteringConf.SafeSearchCacheSize,
<mask> time.Minute*time.Duration(filteringConf.CacheTime),
<mask> )
<mask> if err != nil {
<mask> log.Error("clients: init client safesearch %s: %s", cli.Name, err)
<mask>
<mask> continue
<mask> }
<mask>
<mask> cli.SafeSearch = ss
</s> P... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients.go |
<mask> log.Error("clients: init client safesearch %s: %s", cli.Name, err)
<mask>
<mask> continue
<mask> }
<mask>
<mask> cli.SafeSearch = ss
<mask> }
<mask>
<mask> for _, s := range o.BlockedServices {
<mask> if filtering.BlockedSvcKnown(s) {
<mask> cli.BlockedServices = append(cli... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients.go | |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/golibs/testutil"
<mask>
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
</s> Pull request 1803: 5685-fix-safe-searc... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients_test.go |
// newClientsContainer is a helper that creates a new clients container for
// tests.
func newClientsContainer() (c *clientsContainer) {
c = &clientsContainer{
testing: true,
}
c.Init(nil, nil, nil, nil, &filtering.Config{}) | <mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
<mask> func TestClients(t *testing.T) {
<mask> clients := clientsContainer{}
<mask> clients.testing = true
<mask>
<mask> clients.Init(nil, nil, nil, nil, nil)
<mask>
<mask> t.Run("add_success", f... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients_test.go |
return c
}
func TestClients(t *testing.T) {
clients := newClientsContainer() | <mask> func TestClients(t *testing.T) {
<mask> clients := clientsContainer{}
<mask> clients.testing = true
<mask>
<mask> clients.Init(nil, nil, nil, nil, nil)
<mask>
<mask> t.Run("add_success", func(t *testing.T) {
<mask> var (
<mask> cliNone = "1.2.3.4"
<mask> cli1 = "1.1.1.1"
</s> Pull req... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients_test.go |
clients := newClientsContainer() | <mask> })
<mask> }
<mask>
<mask> func TestClientsWHOIS(t *testing.T) {
<mask> clients := clientsContainer{
<mask> testing: true,
<mask> }
<mask> clients.Init(nil, nil, nil, nil, nil)
<mask> whois := &RuntimeClientWHOISInfo{
<mask> Country: "AU",
<mask> Orgname: "Example Org",
<mask> }
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients_test.go |
clients := newClientsContainer() | <mask> })
<mask> }
<mask>
<mask> func TestClientsAddExisting(t *testing.T) {
<mask> clients := clientsContainer{
<mask> testing: true,
<mask> }
<mask> clients.Init(nil, nil, nil, nil, nil)
<mask>
<mask> t.Run("simple", func(t *testing.T) {
<mask> ip := netip.MustParseAddr("1.1.1.1")
<mask>
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients_test.go |
clients := newClientsContainer() | <mask> })
<mask> }
<mask>
<mask> func TestClientsCustomUpstream(t *testing.T) {
<mask> clients := clientsContainer{
<mask> testing: true,
<mask> }
<mask> clients.Init(nil, nil, nil, nil, nil)
<mask>
<mask> // Add client with upstreams.
<mask> ok, err := clients.Add(&Client{
<mask> IDs: []string... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clients_test.go |
<mask>
<mask> type runtimeClientJSON struct {
<mask> WHOISInfo *RuntimeClientWHOISInfo `json:"whois_info"`
<mask>
<mask> Name string `json:"name"`
<mask> IP netip.Addr `json:"ip"`
<mask> Source clientSource `json:"source"`
<mask> }
<mask>
<mask> type clientListJSON struct {
</s> Pull req... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clientshttp.go | |
Name string `json:"name"` | <mask> type runtimeClientJSON struct {
<mask> WHOISInfo *RuntimeClientWHOISInfo `json:"whois_info"`
<mask>
<mask> IP netip.Addr `json:"ip"`
<mask> Source clientSource `json:"source"`
<mask> }
<mask>
<mask> type clientListJSON struct {
</s> Pull request 1803: 5685-fix-safe-search
Updates #5685.
Squ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clientshttp.go |
func (clients *clientsContainer) jsonToClient(cj clientJSON) (c *Client, err error) { | <mask> _ = aghhttp.WriteJSONResponse(w, r, data)
<mask> }
<mask>
<mask> // jsonToClient converts JSON object to Client object.
<mask> func jsonToClient(cj clientJSON) (c *Client) {
<mask> var safeSearchConf filtering.SafeSearchConfig
<mask> if cj.SafeSearchConf != nil {
<mask> safeSearchConf = *cj.SafeSea... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/61b4043775ecc3e06aebcdabc070b732c6dd0ff0 | internal/home/clientshttp.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.