docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
"github.com/AdguardTeam/AdGuardHome/internal/testutil" | <mask> "sync"
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/util"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/dnsforward/dnsforward_test.go |
func TestMain(m *testing.M) {
testutil.DiscardLogOutput(m)
}
| <mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> const (
<mask> tlsServerName = "testdns.adguard.com"
<mask> testMessagesCount = 10
<mask> )
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes #2273.
Squashed commit of t... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/dnsforward/dnsforward_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/testutil" | <mask> "time"
<mask>
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func TestMain(m *testing.M) {
<mask> testutil.DiscardLogOutput(m)
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes #2273.
Squashed commit of the follo... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/home/auth_test.go |
func TestMain(m *testing.M) {
testutil.DiscardLogOutput(m)
}
| <mask> )
<mask>
<mask> func prepareTestDir() string {
<mask> const dir = "./agh-test"
<mask> _ = os.RemoveAll(dir)
<mask> _ = os.MkdirAll(dir, 0755)
<mask> return dir
<mask> }
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes #2273.
Squas... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/home/auth_test.go |
// TODO(e.burkov): remove this weird buildtag.
| <mask> // +build !race
<mask>
<mask> package home
<mask>
<mask> import (
<mask> "context"
<mask> "encoding/base64"
<mask> "io/ioutil"
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes #2273.
Squashed commit of the following:
commit 7571a... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/home/home_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/testutil" | <mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func TestMain(m *testing.M) {
<mask> testutil.DiscardLogOutput(m)
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home fr... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/querylog/qlog_test.go |
func TestMain(m *testing.M) {
testutil.DiscardLogOutput(m)
}
| <mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func prepareTestDir() string {
<mask> const dir = "./agh-test"
<mask> _ = os.RemoveAll(dir)
<mask> _ = os.MkdirAll(dir, 0755)
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-cl... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/querylog/qlog_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/testutil" | <mask> "sync/atomic"
<mask> "testing"
<mask>
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func TestMain(m *testing.M) {
<mask> testutil.DiscardLogOutput(m)
<mask> }
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes ... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/stats/stats_test.go |
func TestMain(m *testing.M) {
testutil.DiscardLogOutput(m)
}
| <mask> )
<mask>
<mask> func UIntArrayEquals(a, b []uint64) bool {
<mask> if len(a) != len(b) {
<mask> return false
<mask> }
<mask>
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes #2273.
Squashed commit of the following:
commit 7571a33f... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/stats/stats_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/testutil" | <mask> "os"
<mask> "testing"
<mask>
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func TestMain(m *testing.M) {
<mask> testutil.DiscardLogOutput(m)
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes #2273.
Squashed co... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/update/update_test.go |
func TestMain(m *testing.M) {
testutil.DiscardLogOutput(m)
}
| <mask> "github.com/AdguardTeam/AdGuardHome/internal/testutil"
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func startHTTPServer(data string) (net.Listener, uint16) {
<mask> mux := http.NewServeMux()
<mask> mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
<mask> _, ... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/update/update_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/testutil" | <mask> "strings"
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> func TestMain(m *testing.M) {
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes #227... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/util/auto_hosts_test.go |
func TestMain(m *testing.M) {
testutil.DiscardLogOutput(m)
}
| <mask> )
<mask>
<mask> func prepareTestDir() string {
<mask> const dir = "./agh-test"
<mask> _ = os.RemoveAll(dir)
<mask> _ = os.MkdirAll(dir, 0o755)
<mask> return dir
<mask> }
</s> Pull request: 2273 clean tests output
Merge in DNS/adguard-home from 2273-clean-tests-output to master
Closes #2273.
Squa... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/6358240e9b0f10acdc05b470a64535df8cfcf67e | internal/util/auto_hosts_test.go |
github.com/AdguardTeam/golibs v0.8.4 | <mask> go 1.16
<mask>
<mask> require (
<mask> github.com/AdguardTeam/dnsproxy v0.39.0
<mask> github.com/AdguardTeam/golibs v0.8.0
<mask> github.com/AdguardTeam/urlfilter v0.14.6
<mask> github.com/NYTimes/gziphandler v1.1.1
<mask> github.com/ameshkov/dnscrypt/v2 v2.2.1
<mask> github.com/digineo/go-ipset/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | go.mod |
github.com/google/go-cmp v0.5.5 | <mask> github.com/ameshkov/dnscrypt/v2 v2.2.1
<mask> github.com/digineo/go-ipset/v2 v2.2.1
<mask> github.com/fsnotify/fsnotify v1.4.9
<mask> github.com/go-ping/ping v0.0.0-20210506233800-ff8be3320020
<mask> github.com/google/go-cmp v0.5.5 // indirect
<mask> github.com/google/renameio v1.0.1
<mask> github.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | go.mod |
<mask> dmitri.shuralyov.com/state v0.0.0-20180228185332-28bcc343414c/go.mod h1:0PRwlb0D6DFvNNtx+9ybjezNCa8XF0xaYcETyp6rHWU=
<mask> git.apache.org/thrift.git v0.0.0-20180902110319-2566ecd5d999/go.mod h1:fPE2ZNJGynbRyZ4dJvy6G277gSllfV2HJqblrnkyeyg=
<mask> github.com/AdguardTeam/dhcp v0.0.0-20210519141215-51808c73c0bf ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | go.sum | |
<mask> github.com/AdguardTeam/dnsproxy v0.39.0 h1:5/PN2mpUeCTWtvqXUbSPTMJSOad4lJscPzm+C2f4jB4=
<mask> github.com/AdguardTeam/dnsproxy v0.39.0/go.mod h1:aNXKNdTyKfgAG2OS712SYSaGIM9AasZsZxfiY4YiR/0=
<mask> github.com/AdguardTeam/golibs v0.4.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/Ad... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | go.sum | |
github.com/AdguardTeam/golibs v0.8.4 h1:jd6GwvQQtfSLOKn30qisDVujvas3q7Agjm3BOEqRWpQ=
github.com/AdguardTeam/golibs v0.8.4/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4= | <mask> github.com/AdguardTeam/golibs v0.4.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/AdguardTeam/golibs v0.4.2/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/AdguardTeam/golibs v0.8.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/A... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | go.sum |
<mask> github.com/aead/chacha20 v0.0.0-20180709150244-8b13a72661da h1:KjTM2ks9d14ZYCvmHS9iAKVt9AyzRSqNU1qabPih5BY=
<mask> github.com/aead/chacha20 v0.0.0-20180709150244-8b13a72661da/go.mod h1:eHEWzANqSiWQsof+nXEI9bUVUyV6F53Fp89EuCh2EAA=
<mask> github.com/aead/poly1305 v0.0.0-20180717145839-3fee0db0b635 h1:52m0LGchQB... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | go.sum | |
<mask> github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
<mask> github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714 h1:/jC7qQFrv8CrSJVmaolDVOxTfS9kc36uB6H40kdbQq8=
<mask> github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714/go.mod h1:2Goc3h8EklBH5mspfH... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | go.sum | |
<mask> "strings"
<mask> "syscall"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> // ErrNoStaticIPInfo is returned by IfaceHasStaticIP when no informatio... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> // ErrNoStaticIPInfo is returned by IfaceHasStaticIP when no information about
<mask> // the IP being static is available.
</s> Pull request: all: replace aghstrings with st... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net.go |
stringutil.WriteToBuilder(b, strconv.Itoa(int(val)), dot) | <mask> if ip4 := ip.To4(); ip4 != nil {
<mask> strLen, suffix = arpaV4MaxLen, arpaV4Suffix[1:]
<mask> ip = ip4
<mask> writeByte = func(val byte) {
<mask> aghstrings.WriteToBuilder(b, strconv.Itoa(int(val)), dot)
<mask> }
<mask>
<mask> } else if ip6 := ip.To16(); ip6 != nil {
<mask> strLen, suff... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net.go |
stringutil.WriteToBuilder( | <mask> } else if ip6 := ip.To16(); ip6 != nil {
<mask> strLen, suffix = arpaV6MaxLen, arpaV6Suffix[1:]
<mask> ip = ip6
<mask> writeByte = func(val byte) {
<mask> aghstrings.WriteToBuilder(
<mask> b,
<mask> strconv.FormatUint(uint64(val&0xF), 16),
<mask> dot,
<mask> strconv.FormatUint(... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net.go |
stringutil.WriteToBuilder(b, suffix) | <mask> b.Grow(strLen)
<mask> for i := len(ip) - 1; i >= 0; i-- {
<mask> writeByte(ip[i])
<mask> }
<mask> aghstrings.WriteToBuilder(b, suffix)
<mask>
<mask> return b.String()
<mask> }
<mask>
<mask> // CollectAllIfacesAddrs returns the slice of all network interfaces IP
</s> Pull request: all: replace... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net.go |
<mask> "strings"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghio"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghos"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/google/renameio/maybe"
<mask> "go... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net_linux.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghio"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghos"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/google/renameio/maybe"
<mask> "golang.org/x/sys/unix"
<mask> )
<mask>
<mask> // recurrentChecker is used to check all the f... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net_linux.go |
func (rc *recurrentChecker) handlePatterns(sourcesSet *stringutil.Set, patterns []string) ( | <mask> return subsources, has, nil
<mask> }
<mask>
<mask> // handlePatterns parses the patterns and takes care of duplicates.
<mask> func (rc *recurrentChecker) handlePatterns(sourcesSet *aghstrings.Set, patterns []string) (
<mask> subsources []string,
<mask> err error,
<mask> ) {
<mask> subsources = make... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net_linux.go |
for sourcesSet := stringutil.NewSet(rc.initPath); i < len(sources); i++ { | <mask>
<mask> var patterns, subsources []string
<mask> // The slice of sources is separate from the set of sources to keep the
<mask> // order in which the files are walked.
<mask> for sourcesSet := aghstrings.NewSet(rc.initPath); i < len(sources); i++ {
<mask> patterns, has, err = rc.checkFile(sources[i],... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net_linux.go |
if len(line) == 0 || line[0] == '#' { | <mask> func ifacesStaticConfig(r io.Reader, ifaceName string) (subsources []string, has bool, err error) {
<mask> s := bufio.NewScanner(r)
<mask> for s.Scan() {
<mask> line := strings.TrimSpace(s.Text())
<mask> if aghstrings.IsCommentOrEmpty(line) {
<mask> continue
<mask> }
<mask>
<mask> // TODO(... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/net_linux.go |
<mask> "strings"
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> )
<mask>
<mask> // defaultHostGen is the default method of generating host for Refresh.
<mask> func defaultHostGen() (host string) {
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/systemresolvers_others.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> )
<mask>
<mask> // defaultHostGen is the default method of generating host for Refresh.
<mask> func defaultHostGen() (host string) {
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adguard-home from add-string... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/systemresolvers_others.go |
addrs *stringutil.Set | <mask> resolver *net.Resolver
<mask> hostGenFunc HostGenFunc
<mask>
<mask> // addrs is the set that contains cached local resolvers' addresses.
<mask> addrs *aghstrings.Set
<mask> addrsLock sync.RWMutex
<mask> }
<mask>
<mask> const (
<mask> // errBadAddrPassed is returned when dialFunc can't pa... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/systemresolvers_others.go |
addrs: stringutil.NewSet(), | <mask> resolver: &net.Resolver{
<mask> PreferGo: true,
<mask> },
<mask> hostGenFunc: hostGenFunc,
<mask> addrs: aghstrings.NewSet(),
<mask> }
<mask> s.resolver.Dial = s.dialFunc
<mask>
<mask> return s
<mask> }
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adgua... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/aghnet/systemresolvers_others.go |
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/go-ping/ping"
<mask> "github.com/in... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dhcpd/v4.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/go-ping/ping"
<mask> "github.com/insomniacslk/dhcp/dhcpv4"
<mask> "github.com/insomniacslk/dhcp/dhcpv4/server4"
<mask> )
<mask>
... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dhcpd/v4.go |
leaseHosts *stringutil.Set | <mask> // leased.
<mask> leasedOffsets *bitSet
<mask>
<mask> // leaseHosts is the set of all hostnames of all known DHCP clients.
<mask> leaseHosts *aghstrings.Set
<mask>
<mask> // leases contains all dynamic and static leases.
<mask> leases []*Lease
<mask>
<mask> // leasesLock protects leases, leas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dhcpd/v4.go |
s.leaseHosts = stringutil.NewSet() | <mask> return
<mask> }
<mask>
<mask> s.leasedOffsets = newBitSet()
<mask> s.leaseHosts = aghstrings.NewSet()
<mask> s.leases = nil
<mask>
<mask> for _, l := range leases {
<mask> if !l.IsStatic() {
<mask> l.Hostname = s.validHostnameForClient(l.Hostname, l.IP)
</s> Pull request: all: replace ag... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dhcpd/v4.go |
s.leaseHosts = stringutil.NewSet() | <mask> // Create DHCPv4 server
<mask> func v4Create(conf V4ServerConf) (srv DHCPServer, err error) {
<mask> s := &v4Server{}
<mask> s.conf = conf
<mask> s.leaseHosts = aghstrings.NewSet()
<mask>
<mask> // TODO(a.garipov): Don't use a disabled server in other places or just
<mask> // use an interface.
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dhcpd/v4.go |
<mask> "net/http"
<mask> "strings"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/urlfilter"
<mask> "github.com/AdguardTeam/urlfilter/filterlist"
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/access.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/urlfilter"
<mask> "github.com/AdguardTeam/urlfilter/filterlist"
<mask> )
<mask>
<mask> // accessCtx controls IP and client blocking that takes place before all other
<mask> ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/access.go |
allowedClientIDs *stringutil.Set
blockedClientIDs *stringutil.Set | <mask> type accessCtx struct {
<mask> allowedIPs *aghnet.IPMap
<mask> blockedIPs *aghnet.IPMap
<mask>
<mask> allowedClientIDs *aghstrings.Set
<mask> blockedClientIDs *aghstrings.Set
<mask>
<mask> blockedHostsEng *urlfilter.DNSEngine
<mask>
<mask> // TODO(a.garipov): Create a type for a set of IP netw... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/access.go |
clientIDs *stringutil.Set, | <mask> func processAccessClients(
<mask> clientStrs []string,
<mask> ips *aghnet.IPMap,
<mask> nets *[]*net.IPNet,
<mask> clientIDs *aghstrings.Set,
<mask> ) (err error) {
<mask> for i, s := range clientStrs {
<mask> if ip := net.ParseIP(s); ip != nil {
<mask> ips.Set(ip, unit{})
<mask> } else if ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/access.go |
allowedClientIDs: stringutil.NewSet(),
blockedClientIDs: stringutil.NewSet(), | <mask> a = &accessCtx{
<mask> allowedIPs: aghnet.NewIPMap(0),
<mask> blockedIPs: aghnet.NewIPMap(0),
<mask>
<mask> allowedClientIDs: aghstrings.NewSet(),
<mask> blockedClientIDs: aghstrings.NewSet(),
<mask> }
<mask>
<mask> err = processAccessClients(allowed, a.allowedIPs, &a.allowedNets, a.allowed... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/access.go |
stringutil.WriteToBuilder(b, strings.ToLower(h), "\n") | <mask> }
<mask>
<mask> b := &strings.Builder{}
<mask> for _, h := range blockedHosts {
<mask> aghstrings.WriteToBuilder(b, strings.ToLower(h), "\n")
<mask> }
<mask>
<mask> lists := []filterlist.RuleList{
<mask> &filterlist.StringRuleList{
<mask> ID: int(0),
</s> Pull request: all: r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/access.go |
AllowedClients: stringutil.CloneSlice(s.conf.AllowedClients),
DisallowedClients: stringutil.CloneSlice(s.conf.DisallowedClients),
BlockedHosts: stringutil.CloneSlice(s.conf.BlockedHosts), | <mask> s.serverLock.RLock()
<mask> defer s.serverLock.RUnlock()
<mask>
<mask> return accessListJSON{
<mask> AllowedClients: aghstrings.CloneSlice(s.conf.AllowedClients),
<mask> DisallowedClients: aghstrings.CloneSlice(s.conf.DisallowedClients),
<mask> BlockedHosts: aghstrings.CloneSlice(s.conf.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/access.go |
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/config.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/ameshkov/dnscrypt/v2"
<mask> )
<mask>
<mask> // BlockingMode is an enum of all allowed blocking modes... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/config.go |
upstreams = stringutil.SplitTrimmed(string(data), "\n")
| <mask> data, err := os.ReadFile(s.conf.UpstreamDNSFileName)
<mask> if err != nil {
<mask> return err
<mask> }
<mask> d := string(data)
<mask> for len(d) != 0 {
<mask> s := aghstrings.SplitNext(&d, '\n')
<mask> upstreams = append(upstreams, s)
<mask> }
<mask> log.Debug("dns: using %d ups... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/config.go |
upstreams = stringutil.FilterOut(upstreams, IsCommentOrEmpty) | <mask> } else {
<mask> upstreams = s.conf.UpstreamDNS
<mask> }
<mask>
<mask> upstreams = aghstrings.FilterOut(upstreams, aghstrings.IsCommentOrEmpty)
<mask> upstreamConfig, err := proxy.ParseUpstreamsConfig(
<mask> upstreams,
<mask> &upstream.Options{
<mask> Bootstrap: s.conf.BootstrapDNS,
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/config.go |
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/A... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dns.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // To transfer information between modules
<mask> type dnsContext struct {
</s> Pull request: all: r... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dns.go |
id := stringutil.Coalesce(ctx.clientID, ipStringFromAddr(d.Addr)) | <mask> }
<mask>
<mask> if d.Addr != nil && s.conf.GetCustomUpstreamByClient != nil {
<mask> // Use the clientID first, since it has a higher priority.
<mask> id := aghstrings.Coalesce(ctx.clientID, ipStringFromAddr(d.Addr))
<mask> upsConf, err := s.conf.GetCustomUpstreamByClient(id)
<mask> if err != n... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dns.go |
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/Adgu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dnsforward.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // DefaultTimeout is the default upstream timeout
<mask> const DefaultTimeout = 10 * time.Second
<mask>
</s> Pull request: all: replace aghstrings with stringutil
... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dnsforward.go |
c.RatelimitWhitelist = stringutil.CloneSlice(sc.RatelimitWhitelist)
c.BootstrapDNS = stringutil.CloneSlice(sc.BootstrapDNS)
c.AllowedClients = stringutil.CloneSlice(sc.AllowedClients)
c.DisallowedClients = stringutil.CloneSlice(sc.DisallowedClients)
c.BlockedHosts = stringutil.CloneSlice(sc.BlockedHosts)
c.Truste... | <mask> defer s.serverLock.RUnlock()
<mask>
<mask> sc := s.conf.FilteringConfig
<mask> *c = sc
<mask> c.RatelimitWhitelist = aghstrings.CloneSlice(sc.RatelimitWhitelist)
<mask> c.BootstrapDNS = aghstrings.CloneSlice(sc.BootstrapDNS)
<mask> c.AllowedClients = aghstrings.CloneSlice(sc.AllowedClients)
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dnsforward.go |
return stringutil.CloneSlice(s.conf.LocalPTRResolvers), | <mask> func (s *Server) RDNSSettings() (localPTRResolvers []string, resolveClients, resolvePTR bool) {
<mask> s.serverLock.RLock()
<mask> defer s.serverLock.RUnlock()
<mask>
<mask> return aghstrings.CloneSlice(s.conf.LocalPTRResolvers),
<mask> s.conf.ResolveClients,
<mask> s.conf.UsePrivateRDNS
<mask> }... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dnsforward.go |
ourAddrsSet := stringutil.NewSet(ourAddrs...) | <mask> if err != nil {
<mask> return nil, err
<mask> }
<mask>
<mask> ourAddrsSet := aghstrings.NewSet(ourAddrs...)
<mask>
<mask> // TODO(e.burkov): The approach of subtracting sets of strings is not
<mask> // really applicable here since in case of listening on all network
<mask> // interfaces we sho... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dnsforward.go |
return stringutil.FilterOut(addrs, ourAddrsSet.Has), nil | <mask> // TODO(e.burkov): The approach of subtracting sets of strings is not
<mask> // really applicable here since in case of listening on all network
<mask> // interfaces we should check the whole interface's network to cut off
<mask> // all the loopback addresses as well.
<mask> return aghstrings.FilterOut... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/dnsforward.go |
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/errors"... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> func httpError(r *http.Request, w http.ResponseWriter, code int, format string, args ...interface{}) {
</s> Pull re... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http.go |
upstreams := stringutil.CloneSliceOrEmpty(s.conf.UpstreamDNS) | <mask> func (s *Server) getDNSConfig() dnsConfig {
<mask> s.serverLock.RLock()
<mask> defer s.serverLock.RUnlock()
<mask>
<mask> upstreams := aghstrings.CloneSliceOrEmpty(s.conf.UpstreamDNS)
<mask> upstreamFile := s.conf.UpstreamDNSFileName
<mask> bootstraps := aghstrings.CloneSliceOrEmpty(s.conf.Bootstrap... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http.go |
bootstraps := stringutil.CloneSliceOrEmpty(s.conf.BootstrapDNS) | <mask> defer s.serverLock.RUnlock()
<mask>
<mask> upstreams := aghstrings.CloneSliceOrEmpty(s.conf.UpstreamDNS)
<mask> upstreamFile := s.conf.UpstreamDNSFileName
<mask> bootstraps := aghstrings.CloneSliceOrEmpty(s.conf.BootstrapDNS)
<mask> protectionEnabled := s.conf.ProtectionEnabled
<mask> blockingMode ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http.go |
localPTRUpstreams := stringutil.CloneSliceOrEmpty(s.conf.LocalPTRResolvers) | <mask> cacheMaxTTL := s.conf.CacheMaxTTL
<mask> cacheOptimistic := s.conf.CacheOptimistic
<mask> resolveClients := s.conf.ResolveClients
<mask> usePrivateRDNS := s.conf.UsePrivateRDNS
<mask> localPTRUpstreams := aghstrings.CloneSliceOrEmpty(s.conf.LocalPTRResolvers)
<mask> var upstreamMode string
<mask> i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http.go |
// IsCommentOrEmpty returns true of the string starts with a "#" character or is
// an empty string. This function is useful for filtering out non-upstream
// lines from upstream configs.
func IsCommentOrEmpty(s string) (ok bool) {
return len(s) == 0 || s[0] == '#'
}
| <mask> PrivateUpstreams []string `json:"private_upstream"`
<mask> }
<mask>
<mask> // ValidateUpstreams validates each upstream and returns an error if any
<mask> // upstream is invalid or if there are no default upstreams specified.
<mask> //
<mask> // TODO(e.burkov): Move into aghnet or even into dnsproxy.
<... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http.go |
upstreams = stringutil.FilterOut(upstreams, IsCommentOrEmpty) | <mask> //
<mask> // TODO(e.burkov): Move into aghnet or even into dnsproxy.
<mask> func ValidateUpstreams(upstreams []string) (err error) {
<mask> // No need to validate comments
<mask> upstreams = aghstrings.FilterOut(upstreams, aghstrings.IsCommentOrEmpty)
<mask>
<mask> // Consider this case valid because ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http.go |
if IsCommentOrEmpty(input) { | <mask> return nil
<mask> }
<mask>
<mask> func checkDNS(input string, bootstrap []string, timeout time.Duration, ef excFunc) (err error) {
<mask> if aghstrings.IsCommentOrEmpty(input) {
<mask> return nil
<mask> }
<mask>
<mask> // Separate upstream from domains list.
<mask> var useDefault bool
</s> Pu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http.go |
func TestIsCommentOrEmpty(t *testing.T) {
assert.True(t, IsCommentOrEmpty(""))
assert.True(t, IsCommentOrEmpty("# comment"))
assert.False(t, IsCommentOrEmpty("1.2.3.4"))
}
| <mask> }
<mask> }
<mask>
<mask> // TODO(a.garipov): Rewrite to check the actual error messages.
<mask> func TestValidateUpstream(t *testing.T) {
<mask> testCases := []struct {
<mask> name string
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adguard-home from add-stringutil to... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/dnsforward/http_test.go |
<mask> "sync"
<mask> "sync/atomic"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/filtering/filtering.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/urlfilter"
<mask> "github.com/AdguardTeam/urlfilter/filterlist"
<mask> "github.com/AdguardTeam/urlfilter/rules"
<mask> "github.com/miekg/... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/filtering/filtering.go |
cnames := stringutil.NewSet() | <mask> if len(rr) != 0 {
<mask> res.Reason = Rewritten
<mask> }
<mask>
<mask> cnames := aghstrings.NewSet()
<mask> origHost := host
<mask> for len(rr) != 0 && rr[0].Type == dns.TypeCNAME {
<mask> log.Debug("rewrite: CNAME for %s is %s", host, rr[0].Answer)
<mask>
<mask> if host == rr[0].Answer { ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/filtering/filtering.go |
<mask> "sort"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> "golang.o... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/filtering/safebrowsing.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask>
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> "golang.org/x/net/publicsuffix"
<mask> )
<mask>
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/a... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/filtering/safebrowsing.go |
stringutil.WriteToBuilder(b, hex.EncodeToString(hash[0:2]), ".") | <mask>
<mask> for hash := range c.hashToHost {
<mask> // TODO(e.burkov, a.garipov): Find out and document why exactly
<mask> // this slice.
<mask> aghstrings.WriteToBuilder(b, hex.EncodeToString(hash[0:2]), ".")
<mask> }
<mask>
<mask> if c.svc == "SafeBrowsing" {
<mask> aghstrings.WriteToBuilder(b... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/filtering/safebrowsing.go |
stringutil.WriteToBuilder(b, sbTXTSuffix) | <mask> aghstrings.WriteToBuilder(b, hex.EncodeToString(hash[0:2]), ".")
<mask> }
<mask>
<mask> if c.svc == "SafeBrowsing" {
<mask> aghstrings.WriteToBuilder(b, sbTXTSuffix)
<mask>
<mask> return b.String()
<mask> }
<mask>
<mask> aghstrings.WriteToBuilder(b, pcTXTSuffix)
</s> Pull request: all: re... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/filtering/safebrowsing.go |
stringutil.WriteToBuilder(b, pcTXTSuffix) | <mask>
<mask> return b.String()
<mask> }
<mask>
<mask> aghstrings.WriteToBuilder(b, pcTXTSuffix)
<mask>
<mask> return b.String()
<mask> }
<mask>
<mask> // Find the target hash in TXT response
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adguard-home from add-stringutil to... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/filtering/safebrowsing.go |
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/Adg... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/clients.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> const clientsUpdatePeriod = 10 * time.Minute
<mask>
<mask> var webHandlersRegistered = false
<mask>
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adguard-home from add... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/clients.go |
allTags *stringutil.Set | <mask> ipToRC *aghnet.IPMap
<mask>
<mask> lock sync.Mutex
<mask>
<mask> allTags *aghstrings.Set
<mask>
<mask> // dhcpServer is used for looking up clients IP addresses by MAC addresses
<mask> dhcpServer *dhcpd.Server
<mask>
<mask> // dnsServer is used for checking clients IP status access list statu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/clients.go |
clients.allTags = stringutil.NewSet(clientTags...) | <mask> clients.list = make(map[string]*Client)
<mask> clients.idIndex = make(map[string]*Client)
<mask> clients.ipToRC = aghnet.NewIPMap(0)
<mask>
<mask> clients.allTags = aghstrings.NewSet(clientTags...)
<mask>
<mask> clients.dhcpServer = dhcpServer
<mask> clients.etcHosts = etcHosts
<mask> clients.a... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/clients.go |
cy.Tags = stringutil.CloneSlice(cli.Tags)
cy.IDs = stringutil.CloneSlice(cli.IDs)
cy.BlockedServices = stringutil.CloneSlice(cli.BlockedServices)
cy.Upstreams = stringutil.CloneSlice(cli.Upstreams) | <mask> SafeBrowsingEnabled: cli.SafeBrowsingEnabled,
<mask> UseGlobalBlockedServices: !cli.UseOwnBlockedServices,
<mask> }
<mask>
<mask> cy.Tags = aghstrings.CloneSlice(cli.Tags)
<mask> cy.IDs = aghstrings.CloneSlice(cli.IDs)
<mask> cy.BlockedServices = aghstrings.CloneSlice(cli.BlockedServic... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/clients.go |
c.IDs = stringutil.CloneSlice(c.IDs)
c.Tags = stringutil.CloneSlice(c.Tags)
c.BlockedServices = stringutil.CloneSlice(c.BlockedServices)
c.Upstreams = stringutil.CloneSlice(c.Upstreams) | <mask> if !ok {
<mask> return nil, false
<mask> }
<mask>
<mask> c.IDs = aghstrings.CloneSlice(c.IDs)
<mask> c.Tags = aghstrings.CloneSlice(c.Tags)
<mask> c.BlockedServices = aghstrings.CloneSlice(c.BlockedServices)
<mask> c.Upstreams = aghstrings.CloneSlice(c.Upstreams)
<mask> return c, true
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/clients.go |
upstreams := stringutil.FilterOut(c.Upstreams, dnsforward.IsCommentOrEmpty) | <mask> if !ok {
<mask> return nil, nil
<mask> }
<mask>
<mask> upstreams := aghstrings.FilterOut(c.Upstreams, aghstrings.IsCommentOrEmpty)
<mask> if len(upstreams) == 0 {
<mask> return nil, nil
<mask> }
<mask>
<mask> if c.upstreamConfig != nil {
</s> Pull request: all: replace aghstrings with stri... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/clients.go |
<mask> "io"
<mask> "net/http"
<mask> "strings"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> // TODO(a.garipov): Get rid of a global variable?
<mask> var allowedLanguages = aghstrings.NewSet(
</s> Pull request: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/i18n.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask>
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> // TODO(a.garipov): Get rid of a global variable?
<mask> var allowedLanguages = stringutil.NewSet(
<mask> "be",
<mask> "bg",
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adguard-home from add-stringutil to... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/i18n.go |
var allowedLanguages = stringutil.NewSet( | <mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> // TODO(a.garipov): Get rid of a global variable?
<mask> var allowedLanguages = aghstrings.NewSet(
<mask> "be",
<mask> "bg",
<mask> "cs",
<mask> "da",
<mask> "de",
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/i18n.go |
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/rdns_test.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adguard-home from ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/rdns_test.go |
allTags: stringutil.NewSet(), | <mask> clients: &clientsContainer{
<mask> list: map[string]*Client{},
<mask> idIndex: tc.cliIDIndex,
<mask> ipToRC: aghnet.NewIPMap(0),
<mask> allTags: aghstrings.NewSet(),
<mask> },
<mask> }
<mask> ipCache.Clear()
<mask> ipCache.Set(net.IP{1, 2, 3, 4}, ttl)
<mask>
</s> Pull ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/rdns_test.go |
allTags: stringutil.NewSet(), | <mask> cc := &clientsContainer{
<mask> list: map[string]*Client{},
<mask> idIndex: map[string]*Client{},
<mask> ipToRC: aghnet.NewIPMap(0),
<mask> allTags: aghstrings.NewSet(),
<mask> }
<mask> ch := make(chan net.IP)
<mask> rdns := &RDNS{
<mask> exchanger: &rDNSExchanger{
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/rdns_test.go |
<mask> "fmt"
<mask> "net/http"
<mask> "os"
<mask> "path/filepath"
<mask> "reflect"
<mask> "runtime"
<mask> "strings"
<mask> "sync"
<mask> "time"
<mask>
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adguard-home from add-stringutil to master
Squashed commit of the followi... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/tls.go | |
"github.com/google/go-cmp/cmp" | <mask>
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "golang.org/x/sys/cpu"
<mask> )
<mask>
<mask> var tlsWebHandlersRegistered = false
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS/adguard-home from add-stringutil to master
Squa... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/tls.go |
if !cmp.Equal(t.conf, data) { | <mask> }
<mask> status = validateCertificates(string(data.CertificateChainData), string(data.PrivateKeyData), data.ServerName)
<mask> restartHTTPS := false
<mask> t.confLock.Lock()
<mask> if !reflect.DeepEqual(t.conf, data) {
<mask> log.Printf("tls config settings have changed, will restart HTTPS server")
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/tls.go |
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghio"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/whois.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghio"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> const (
<mask> defaultServer = "whois.arin.net"
<mask> defaultPort = "43"
</s> Pull... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/whois.go |
v = stringutil.Coalesce(orgname, v) | <mask> case "city", "country":
<mask> v = trimValue(v)
<mask> case "descr", "netname":
<mask> k = "orgname"
<mask> v = aghstrings.Coalesce(orgname, v)
<mask> orgname = v
<mask> case "whois":
<mask> k = "whois"
<mask> case "referralserver":
<mask> k = "whois"
</s> Pull request: all: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/home/whois.go |
<mask> "strconv"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/golibs/jsonutil"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "golang.org/x/net/idna"
<mask> )
<mask>
</s> Pull request: all: replace aghstrings ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/querylog/http.go | |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "github.com/AdguardTeam/golibs/jsonutil"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "golang.org/x/net/idna"
<mask> )
<mask>
<mask> type qlogConfig struct {
<mask> Enabled bool `json:"enabled"`
<mask> // Use float64 here to support fractional numbers and not mess the API
</s> Pull request: a... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/querylog/http.go |
if !stringutil.InSlice(filteringStatusValues, val) { | <mask> // twice.
<mask> asciiVal = ""
<mask> }
<mask> case ctFilteringStatus:
<mask> if !aghstrings.InSlice(filteringStatusValues, val) {
<mask> return false, sc, fmt.Errorf("invalid value %s", val)
<mask> }
<mask> default:
<mask> return false, sc, fmt.Errorf(
<mask> "invalid criterion t... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/querylog/http.go |
"github.com/AdguardTeam/golibs/stringutil" | <mask> "runtime/debug"
<mask> "strconv"
<mask> "strings"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> )
<mask>
<mask> // Channel constants.
<mask> const (
<mask> ChannelDevelopment = "development"
</s> Pull request: all: replace aghstrings with stringutil
Merge in DNS... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/63ee95dfbed2ee4320779dfca78f4cb5e4ad86e6 | internal/version/version.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.