docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
case filtering.FilteredSafeBrowsing: | <mask> e.Time = uint32(elapsed / 1000)
<mask> e.Result = stats.RNotFiltered
<mask>
<mask> switch res.Reason {
<mask> case dnsfilter.FilteredSafeBrowsing:
<mask> e.Result = stats.RSafeBrowsing
<mask> case dnsfilter.FilteredParental:
<mask> e.Result = stats.RParental
<mask> case dnsfilter.FilteredSafe... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats.go |
case filtering.FilteredParental: | <mask>
<mask> switch res.Reason {
<mask> case dnsfilter.FilteredSafeBrowsing:
<mask> e.Result = stats.RSafeBrowsing
<mask> case dnsfilter.FilteredParental:
<mask> e.Result = stats.RParental
<mask> case dnsfilter.FilteredSafeSearch:
<mask> e.Result = stats.RSafeSearch
<mask> case dnsfilter.FilteredB... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats.go |
case filtering.FilteredSafeSearch: | <mask> case dnsfilter.FilteredSafeBrowsing:
<mask> e.Result = stats.RSafeBrowsing
<mask> case dnsfilter.FilteredParental:
<mask> e.Result = stats.RParental
<mask> case dnsfilter.FilteredSafeSearch:
<mask> e.Result = stats.RSafeSearch
<mask> case dnsfilter.FilteredBlockList:
<mask> fallthrough
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats.go |
case filtering.FilteredBlockList: | <mask> case dnsfilter.FilteredParental:
<mask> e.Result = stats.RParental
<mask> case dnsfilter.FilteredSafeSearch:
<mask> e.Result = stats.RSafeSearch
<mask> case dnsfilter.FilteredBlockList:
<mask> fallthrough
<mask> case dnsfilter.FilteredInvalid:
<mask> fallthrough
<mask> case dnsfilter.Filter... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats.go |
case filtering.FilteredInvalid: | <mask> case dnsfilter.FilteredSafeSearch:
<mask> e.Result = stats.RSafeSearch
<mask> case dnsfilter.FilteredBlockList:
<mask> fallthrough
<mask> case dnsfilter.FilteredInvalid:
<mask> fallthrough
<mask> case dnsfilter.FilteredBlockedService:
<mask> e.Result = stats.RFiltered
<mask> }
<mask>
</s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats.go |
case filtering.FilteredBlockedService: | <mask> case dnsfilter.FilteredBlockList:
<mask> fallthrough
<mask> case dnsfilter.FilteredInvalid:
<mask> fallthrough
<mask> case dnsfilter.FilteredBlockedService:
<mask> e.Result = stats.RFiltered
<mask> }
<mask>
<mask> s.stats.Update(e)
<mask> }
</s> Pull request: all: less annoying pkg names
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "net"
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/A... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason filtering.Reason | <mask> clientID string
<mask> wantLogProto querylog.ClientProto
<mask> wantStatClient string
<mask> wantCode resultCode
<mask> reason dnsfilter.Reason
<mask> wantStatResult stats.Result
<mask> }{{
<mask> name: "success_udp",
<mask> proto: proxy.ProtoUDP... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.NotFilteredNotFound, | <mask> clientID: "",
<mask> wantLogProto: "",
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.NotFilteredNotFound,
<mask> wantStatResult: stats.RNotFiltered,
<mask> }, {
<mask> name: "success_tls_client_id",
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.NotFilteredNotFound, | <mask> clientID: "cli42",
<mask> wantLogProto: querylog.ClientProtoDOT,
<mask> wantStatClient: "cli42",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.NotFilteredNotFound,
<mask> wantStatResult: stats.RNotFiltered,
<mask> }, {
<mask> name: "success_tl... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.NotFilteredNotFound, | <mask> clientID: "",
<mask> wantLogProto: querylog.ClientProtoDOT,
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.NotFilteredNotFound,
<mask> wantStatResult: stats.RNotFiltered,
<mask> }, {
<mask> name: "success_quic"... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.NotFilteredNotFound, | <mask> clientID: "",
<mask> wantLogProto: querylog.ClientProtoDOQ,
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.NotFilteredNotFound,
<mask> wantStatResult: stats.RNotFiltered,
<mask> }, {
<mask> name: "success_https... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.NotFilteredNotFound, | <mask> clientID: "",
<mask> wantLogProto: querylog.ClientProtoDOH,
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.NotFilteredNotFound,
<mask> wantStatResult: stats.RNotFiltered,
<mask> }, {
<mask> name: "success_dnscr... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.NotFilteredNotFound, | <mask> clientID: "",
<mask> wantLogProto: querylog.ClientProtoDNSCrypt,
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.NotFilteredNotFound,
<mask> wantStatResult: stats.RNotFiltered,
<mask> }, {
<mask> name: "success_... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.FilteredBlockList, | <mask> clientID: "",
<mask> wantLogProto: "",
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.FilteredBlockList,
<mask> wantStatResult: stats.RFiltered,
<mask> }, {
<mask> name: "success_udp_sb",
<mask> proto: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.FilteredSafeBrowsing, | <mask> clientID: "",
<mask> wantLogProto: "",
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.FilteredSafeBrowsing,
<mask> wantStatResult: stats.RSafeBrowsing,
<mask> }, {
<mask> name: "success_udp_ss",
<mask> proto... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.FilteredSafeSearch, | <mask> clientID: "",
<mask> wantLogProto: "",
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.FilteredSafeSearch,
<mask> wantStatResult: stats.RSafeSearch,
<mask> }, {
<mask> name: "success_udp_pc",
<mask> proto: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
reason: filtering.FilteredParental, | <mask> clientID: "",
<mask> wantLogProto: "",
<mask> wantStatClient: "1.2.3.4",
<mask> wantCode: resultCodeSuccess,
<mask> reason: dnsfilter.FilteredParental,
<mask> wantStatResult: stats.RParental,
<mask> }}
<mask>
<mask> ups, err := upstream.AddressToUpstream("1.1.1.1", u... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
result: &filtering.Result{ | <mask> stats: st,
<mask> },
<mask> proxyCtx: pctx,
<mask> startTime: time.Now(),
<mask> result: &dnsfilter.Result{
<mask> Reason: tc.reason,
<mask> },
<mask> clientID: tc.clientID,
<mask> }
<mask>
</s> Pull request: all: less annoying pkg names
Merge in DNS/adguard-... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/dnsforward/stats_test.go |
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/clients.go | |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghstrings"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "gith... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/clients.go |
if !filtering.BlockedSvcKnown(s) { | <mask> Upstreams: cy.Upstreams,
<mask> }
<mask>
<mask> for _, s := range cy.BlockedServices {
<mask> if !dnsfilter.BlockedSvcKnown(s) {
<mask> log.Debug("clients: skipping unknown blocked-service %q", s)
<mask> continue
<mask> }
<mask> cli.BlockedServices = append(cli.BlockedServices, ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/clients.go |
<mask> "path/filepath"
<mask> "sync"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "gith... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/config.go | |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "sync"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask> "github.com/AdguardTeam/AdGuardHom... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/config.go |
DnsfilterConf filtering.Config `yaml:",inline"` | <mask> dnsforward.FilteringConfig `yaml:",inline"`
<mask>
<mask> FilteringEnabled bool `yaml:"filtering_enabled"` // whether or not use filter lists
<mask> FiltersUpdateIntervalHours uint32 `yaml:"filters_update_interval"` // time period to update filters (in hours)
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/config.go |
ProtectionEnabled: true, // whether or not use any of filtering features | <mask> BindHosts: []net.IP{{0, 0, 0, 0}},
<mask> Port: 53,
<mask> StatsInterval: 1,
<mask> FilteringConfig: dnsforward.FilteringConfig{
<mask> ProtectionEnabled: true, // whether or not use any of dnsfilter features
<mask> BlockingMode: "default", // mode how to answer filte... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/config.go |
c := filtering.Config{} | <mask> config.DNS.AnonymizeClientIP = dc.AnonymizeClientIP
<mask> }
<mask>
<mask> if Context.dnsFilter != nil {
<mask> c := dnsfilter.Config{}
<mask> Context.dnsFilter.WriteDiskConfig(&c)
<mask> config.DNS.DnsfilterConf = c
<mask> }
<mask>
<mask> if s := Context.dnsServer; s != nil {
</s> Pull ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/config.go |
<mask> "path/filepath"
<mask> "strconv"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/dns.go | |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.c... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/dns.go |
Context.dnsFilter = filtering.New(&filterConf, nil) | <mask> filterConf := config.DNS.DnsfilterConf
<mask> filterConf.EtcHosts = Context.etcHosts
<mask> filterConf.ConfigModified = onConfigModified
<mask> filterConf.HTTPRegister = httpRegister
<mask> Context.dnsFilter = dnsfilter.New(&filterConf, nil)
<mask>
<mask> p := dnsforward.DNSCreateParams{
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/dns.go |
func applyAdditionalFiltering(clientAddr net.IP, clientID string, setts *filtering.Settings) { | <mask> }
<mask>
<mask> // applyAdditionalFiltering adds additional client information and settings if
<mask> // the client has them.
<mask> func applyAdditionalFiltering(clientAddr net.IP, clientID string, setts *dnsfilter.FilteringSettings) {
<mask> Context.dnsFilter.ApplyBlockedServices(setts, nil, true)
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/dns.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "sync"
<mask> "sync/atomic"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> var nextFilterID = time.Now().Unix() // semi-stable way to generate an unique ID
<mask>
</s> Pull request: all: less... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/filter.go |
{Filter: filtering.Filter{ID: 1}, Enabled: true, URL: "https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt", Name: "AdGuard DNS filter"},
{Filter: filtering.Filter{ID: 2}, Enabled: false, URL: "https://adaway.org/hosts.txt", Name: "AdAway Default Blocklist"},
{Filter: filtering.Filter{ID: 4}, Enabl... | <mask> }
<mask>
<mask> func defaultFilters() []filter {
<mask> return []filter{
<mask> {Filter: dnsfilter.Filter{ID: 1}, Enabled: true, URL: "https://adguardteam.github.io/AdGuardSDNSFilter/Filters/filter.txt", Name: "AdGuard DNS filter"},
<mask> {Filter: dnsfilter.Filter{ID: 2}, Enabled: false, URL: "https... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/filter.go |
filtering.Filter `yaml:",inline"` | <mask> LastUpdated time.Time `yaml:"-"`
<mask> checksum uint32 // checksum of the file data
<mask> white bool
<mask>
<mask> dnsfilter.Filter `yaml:",inline"`
<mask> }
<mask>
<mask> const (
<mask> statusFound = 1
<mask> statusEnabledChanged = 2
</s> Pull request: all: less annoyin... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/filter.go |
// On Windows we don't pass files to filtering - we pass the whole data.
// . Pass new filters to filtering object - it analyzes new data while the old filters are still active
// . filtering activates new filters | <mask> // . If filter data hasn't changed, just set new update time on file
<mask> // . If filter data has changed:
<mask> // . rename the temporary file (<temp> -> 1.txt)
<mask> // Note that this method works only on UNIX.
<mask> // On Windows we don't pass files to dnsfilter - we pass the whole da... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/filter.go |
var whiteFilters []filtering.Filter
filters := []filtering.Filter{{ | <mask> return filepath.Join(Context.getDataDir(), filterDir, strconv.FormatInt(filter.ID, 10)+".txt")
<mask> }
<mask>
<mask> func enableFilters(async bool) {
<mask> var whiteFilters []dnsfilter.Filter
<mask> filters := []dnsfilter.Filter{{
<mask> Data: []byte(strings.Join(config.UserRules, "\n")),
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/filter.go |
filters = append(filters, filtering.Filter{ | <mask> if !filter.Enabled {
<mask> continue
<mask> }
<mask>
<mask> filters = append(filters, dnsfilter.Filter{
<mask> ID: filter.ID,
<mask> FilePath: filter.Path(),
<mask> })
<mask> }
<mask> for _, filter := range config.WhitelistFilters {
</s> Pull request: all: less annoying pkg n... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/filter.go |
whiteFilters = append(whiteFilters, filtering.Filter{ | <mask> if !filter.Enabled {
<mask> continue
<mask> }
<mask>
<mask> whiteFilters = append(whiteFilters, dnsfilter.Filter{
<mask> ID: filter.ID,
<mask> FilePath: filter.Path(),
<mask> })
<mask> }
<mask>
</s> Pull request: all: less annoying pkg names
Merge in DNS/adguard-home from im... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/filter.go |
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghos"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/home.go | |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "github.com/AdguardTeam/AdGuardHome/internal/aghos"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsforward"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/querylog"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/stats"
<mask>... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/home.go |
dnsFilter *filtering.DNSFilter // DNS filtering module | <mask> queryLog querylog.QueryLog // query log module
<mask> dnsServer *dnsforward.Server // DNS module
<mask> rdns *RDNS // rDNS module
<mask> whois *Whois // WHOIS module
<mask> dnsFilter *dnsfilter.DNSFilter // DNS filtering module
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/home.go |
// clients package uses filtering package's static data (filtering.BlockedSvcKnown()),
// so we have to initialize filtering's static data first, | <mask> }
<mask>
<mask> setupContext(args)
<mask>
<mask> // clients package uses dnsfilter package's static data (dnsfilter.BlockedSvcKnown()),
<mask> // so we have to initialize dnsfilter's static data first,
<mask> // but also avoid relying on automatic Go init() function
<mask> dnsfilter.InitModule(... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/home.go |
filtering.InitModule() | <mask>
<mask> // clients package uses dnsfilter package's static data (dnsfilter.BlockedSvcKnown()),
<mask> // so we have to initialize dnsfilter's static data first,
<mask> // but also avoid relying on automatic Go init() function
<mask> dnsfilter.InitModule()
<mask>
<mask> setupConfig(args)
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/home/home.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "net"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/urlfilter/rules"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
</s> Pull request: all: less annoying pkg names
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.Rules = []*filtering.ResultRule{{}} | <mask> }
<mask>
<mask> l := len(ent.Result.Rules)
<mask> if l == 0 {
<mask> ent.Result.Rules = []*dnsfilter.ResultRule{{}}
<mask> l++
<mask> }
<mask>
<mask> ent.Result.Rules[l-1].Text = s
<mask>
</s> Pull request: all: less annoying pkg names
Merge in DNS/adguard-home from imp-naming to m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.Rules = []*filtering.ResultRule{{}} | <mask> }
<mask>
<mask> l := len(ent.Result.Rules)
<mask> if l == 0 {
<mask> ent.Result.Rules = []*dnsfilter.ResultRule{{}}
<mask> l++
<mask> }
<mask>
<mask> ent.Result.Rules[l-1].FilterListID = i
<mask>
</s> Pull request: all: less annoying pkg names
Merge in DNS/adguard-home from imp-nam... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.Reason = filtering.Reason(i) | <mask> i, err := v.Int64()
<mask> if err != nil {
<mask> return err
<mask> }
<mask> ent.Result.Reason = dnsfilter.Reason(i)
<mask> return nil
<mask> },
<mask> "ServiceName": func(t json.Token, ent *logEntry) error {
<mask> s, ok := t.(string)
<mask> if !ok {
</s> Pull request: all: less an... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.Rules = append(ent.Result.Rules, &filtering.ResultRule{}) | <mask> return
<mask> }
<mask>
<mask> if len(ent.Result.Rules) < i+1 {
<mask> ent.Result.Rules = append(ent.Result.Rules, &dnsfilter.ResultRule{})
<mask> }
<mask>
<mask> if n, ok := vToken.(json.Number); ok {
<mask> ent.Result.Rules[i].FilterListID, _ = n.Int64()
<mask> }
</s> Pull reques... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.Rules = append(ent.Result.Rules, &filtering.ResultRule{}) | <mask> return
<mask> }
<mask>
<mask> if len(ent.Result.Rules) < i+1 {
<mask> ent.Result.Rules = append(ent.Result.Rules, &dnsfilter.ResultRule{})
<mask> }
<mask>
<mask> if ipStr, ok := vToken.(string); ok {
<mask> ent.Result.Rules[i].IP = net.ParseIP(ipStr)
<mask> }
</s> Pull request: al... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.Rules = append(ent.Result.Rules, &filtering.ResultRule{}) | <mask> return
<mask> }
<mask>
<mask> if len(ent.Result.Rules) < i+1 {
<mask> ent.Result.Rules = append(ent.Result.Rules, &dnsfilter.ResultRule{})
<mask> }
<mask>
<mask> if s, ok := vToken.(string); ok {
<mask> ent.Result.Rules[i].Text = s
<mask> }
</s> Pull request: all: less annoying pk... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.DNSRewriteResult = &filtering.DNSRewriteResult{} | <mask> return
<mask> }
<mask>
<mask> if ent.Result.DNSRewriteResult == nil {
<mask> ent.Result.DNSRewriteResult = &dnsfilter.DNSRewriteResult{}
<mask> }
<mask>
<mask> if n, ok := vToken.(json.Number); ok {
<mask> rcode64, _ := n.Int64()
<mask> ent.Result.DNSRewriteResult.RCode = rules.RC... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.DNSRewriteResult = &filtering.DNSRewriteResult{} | <mask> ent.Result.DNSRewriteResult.RCode = rules.RCode(rcode64)
<mask> }
<mask> case "Response":
<mask> if ent.Result.DNSRewriteResult == nil {
<mask> ent.Result.DNSRewriteResult = &dnsfilter.DNSRewriteResult{}
<mask> }
<mask>
<mask> if ent.Result.DNSRewriteResult.Response == nil {
<mask> en... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
ent.Result.DNSRewriteResult.Response = filtering.DNSRewriteResultResponse{} | <mask> ent.Result.DNSRewriteResult = &dnsfilter.DNSRewriteResult{}
<mask> }
<mask>
<mask> if ent.Result.DNSRewriteResult.Response == nil {
<mask> ent.Result.DNSRewriteResult.Response = dnsfilter.DNSRewriteResultResponse{}
<mask> }
<mask>
<mask> // TODO(a.garipov): I give up. This whole file is ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/urlfilter/rules"
<mask> "github.com/miekg/dns"
<mask> "github.com/... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode_test.go |
Result: filtering.Result{ | <mask> QClass: "IN",
<mask> ClientID: "cli42",
<mask> ClientProto: "",
<mask> Answer: ans,
<mask> Result: dnsfilter.Result{
<mask> IsFiltered: true,
<mask> Reason: dnsfilter.FilteredBlockList,
<mask> ReverseHosts: []string{"example.net"},
<mask> IPList: ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode_test.go |
Reason: filtering.FilteredBlockList, | <mask> ClientProto: "",
<mask> Answer: ans,
<mask> Result: dnsfilter.Result{
<mask> IsFiltered: true,
<mask> Reason: dnsfilter.FilteredBlockList,
<mask> ReverseHosts: []string{"example.net"},
<mask> IPList: []net.IP{net.IPv4(127, 0, 0, 2)},
<mask> Rules: []*dnsfil... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode_test.go |
Rules: []*filtering.ResultRule{{ | <mask> IsFiltered: true,
<mask> Reason: dnsfilter.FilteredBlockList,
<mask> ReverseHosts: []string{"example.net"},
<mask> IPList: []net.IP{net.IPv4(127, 0, 0, 2)},
<mask> Rules: []*dnsfilter.ResultRule{{
<mask> FilterListID: 42,
<mask> Text: "||an.yandex.ru",
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode_test.go |
DNSRewriteResult: &filtering.DNSRewriteResult{ | <mask> IP: net.IPv4(127, 0, 0, 3),
<mask> }},
<mask> CanonName: "example.com",
<mask> ServiceName: "example.org",
<mask> DNSRewriteResult: &dnsfilter.DNSRewriteResult{
<mask> RCode: dns.RcodeSuccess,
<mask> Response: dnsfilter.DNSRewriteResultResponse{
<mask> dns... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode_test.go |
Response: filtering.DNSRewriteResultResponse{ | <mask> CanonName: "example.com",
<mask> ServiceName: "example.org",
<mask> DNSRewriteResult: &dnsfilter.DNSRewriteResult{
<mask> RCode: dns.RcodeSuccess,
<mask> Response: dnsfilter.DNSRewriteResultResponse{
<mask> dns.TypeA: []rules.RRValue{net.IPv4(127, 0, 0, 2)},
<mask> },
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/decode_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "strconv"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // TODO(a.garipov): Use a proper structured approach here.
</s> Pull request: all: less... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/json.go |
func resultRulesToJSONRules(rules []*filtering.ResultRule) (jsonRules []jobject) { | <mask>
<mask> return jsonEntry
<mask> }
<mask>
<mask> func resultRulesToJSONRules(rules []*dnsfilter.ResultRule) (jsonRules []jobject) {
<mask> jsonRules = make([]jobject, len(rules))
<mask> for i, r := range rules {
<mask> jsonRules[i] = jobject{
<mask> "filter_list_id": r.FilterListID,
<mask> "... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/json.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "strings"
<mask> "sync"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> const (
</s> Pull request: all: less annoying pkg names
Merge in DNS/adguard-home from im... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/qlog.go |
Result filtering.Result | <mask>
<mask> Answer []byte `json:",omitempty"` // sometimes empty answers happen like binerdunt.top or rev2.globalrootservers.net
<mask> OrigAnswer []byte `json:",omitempty"`
<mask>
<mask> Result dnsfilter.Result
<mask> Elapsed time.Duration
<mask> Upstream string `json:",omitempty"` // if empty, ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/qlog.go |
params.Result = &filtering.Result{} | <mask> return
<mask> }
<mask>
<mask> if params.Result == nil {
<mask> params.Result = &dnsfilter.Result{}
<mask> }
<mask>
<mask> now := time.Now()
<mask> entry := logEntry{
<mask> IP: l.getClientIP(params.ClientIP),
</s> Pull request: all: less annoying pkg names
Merge in DNS/adguard-home fro... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/qlog.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/dnsproxy/proxyutil"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/qlog_test.go |
res := filtering.Result{ | <mask> },
<mask> A: answerStr,
<mask> }},
<mask> }
<mask> res := dnsfilter.Result{
<mask> IsFiltered: true,
<mask> Reason: dnsfilter.Rewritten,
<mask> ServiceName: "SomeService",
<mask> Rules: []*dnsfilter.ResultRule{{
<mask> FilterListID: 1,
</s> Pull request: all: less annoying p... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/qlog_test.go |
Reason: filtering.Rewritten, | <mask> }},
<mask> }
<mask> res := dnsfilter.Result{
<mask> IsFiltered: true,
<mask> Reason: dnsfilter.Rewritten,
<mask> ServiceName: "SomeService",
<mask> Rules: []*dnsfilter.ResultRule{{
<mask> FilterListID: 1,
<mask> Text: "SomeRule",
<mask> }},
</s> Pull request: all: les... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/qlog_test.go |
Rules: []*filtering.ResultRule{{ | <mask> res := dnsfilter.Result{
<mask> IsFiltered: true,
<mask> Reason: dnsfilter.Rewritten,
<mask> ServiceName: "SomeService",
<mask> Rules: []*dnsfilter.ResultRule{{
<mask> FilterListID: 1,
<mask> Text: "SomeRule",
<mask> }},
<mask> }
<mask> params := AddParams{
</s> Pull r... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/qlog_test.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "path/filepath"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/agherr"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> // QueryLog - main interface
</s> Pull... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/querylog.go |
Result *filtering.Result // Filtering result (optional) | <mask> type AddParams struct {
<mask> Question *dns.Msg
<mask> Answer *dns.Msg // The response we sent to the client (optional)
<mask> OrigAnswer *dns.Msg // The response from an upstream server (optional)
<mask> Result *dnsfilter.Result // Filtering result (optional)
<mask> E... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/querylog.go |
"github.com/AdguardTeam/AdGuardHome/internal/filtering" | <mask> "strings"
<mask> "unicode"
<mask> "unicode/utf8"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> )
<mask>
<mask> type criterionType int
<mask>
<mask> const (
</s> Pull request: all: less annoying pkg names
Merge in DNS/adguard-home from imp-naming to master
Squash... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
func (c *searchCriterion) ctFilteringStatusCase(res filtering.Result) bool { | <mask>
<mask> return c.ctDomainOrClientCaseNonStrict(term, clientID, name, host, ip)
<mask> }
<mask>
<mask> func (c *searchCriterion) ctFilteringStatusCase(res dnsfilter.Result) bool {
<mask> switch c.value {
<mask> case filteringStatusAll:
<mask> return true
<mask>
<mask> case filteringStatusFiltere... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
filtering.NotFilteredAllowList,
filtering.Rewritten,
filtering.RewrittenAutoHosts,
filtering.RewrittenRule, | <mask>
<mask> case filteringStatusFiltered:
<mask> return res.IsFiltered ||
<mask> res.Reason.In(
<mask> dnsfilter.NotFilteredAllowList,
<mask> dnsfilter.Rewritten,
<mask> dnsfilter.RewrittenAutoHosts,
<mask> dnsfilter.RewrittenRule,
<mask> )
<mask>
<mask> case filteringStatusBloc... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
res.Reason.In(filtering.FilteredBlockList, filtering.FilteredBlockedService) | <mask> )
<mask>
<mask> case filteringStatusBlocked:
<mask> return res.IsFiltered &&
<mask> res.Reason.In(dnsfilter.FilteredBlockList, dnsfilter.FilteredBlockedService)
<mask>
<mask> case filteringStatusBlockedService:
<mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredBlockedService
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
return res.IsFiltered && res.Reason == filtering.FilteredBlockedService | <mask> return res.IsFiltered &&
<mask> res.Reason.In(dnsfilter.FilteredBlockList, dnsfilter.FilteredBlockedService)
<mask>
<mask> case filteringStatusBlockedService:
<mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredBlockedService
<mask>
<mask> case filteringStatusBlockedParental:
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
return res.IsFiltered && res.Reason == filtering.FilteredParental | <mask> case filteringStatusBlockedService:
<mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredBlockedService
<mask>
<mask> case filteringStatusBlockedParental:
<mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredParental
<mask>
<mask> case filteringStatusBlockedSafebrowsing:
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
return res.IsFiltered && res.Reason == filtering.FilteredSafeBrowsing | <mask> case filteringStatusBlockedParental:
<mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredParental
<mask>
<mask> case filteringStatusBlockedSafebrowsing:
<mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredSafeBrowsing
<mask>
<mask> case filteringStatusWhitelisted:
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
return res.Reason == filtering.NotFilteredAllowList | <mask> case filteringStatusBlockedSafebrowsing:
<mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredSafeBrowsing
<mask>
<mask> case filteringStatusWhitelisted:
<mask> return res.Reason == dnsfilter.NotFilteredAllowList
<mask>
<mask> case filteringStatusRewritten:
<mask> return res.Reason.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
filtering.Rewritten,
filtering.RewrittenAutoHosts,
filtering.RewrittenRule, | <mask> return res.Reason == dnsfilter.NotFilteredAllowList
<mask>
<mask> case filteringStatusRewritten:
<mask> return res.Reason.In(
<mask> dnsfilter.Rewritten,
<mask> dnsfilter.RewrittenAutoHosts,
<mask> dnsfilter.RewrittenRule,
<mask> )
<mask>
<mask> case filteringStatusSafeSearch:
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
return res.IsFiltered && res.Reason == filtering.FilteredSafeSearch | <mask> dnsfilter.RewrittenRule,
<mask> )
<mask>
<mask> case filteringStatusSafeSearch:
<mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredSafeSearch
<mask>
<mask> case filteringStatusProcessed:
<mask> return !res.Reason.In(
<mask> dnsfilter.FilteredBlockList,
<mask> dnsfilter.F... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
filtering.FilteredBlockList,
filtering.FilteredBlockedService,
filtering.NotFilteredAllowList, | <mask> return res.IsFiltered && res.Reason == dnsfilter.FilteredSafeSearch
<mask>
<mask> case filteringStatusProcessed:
<mask> return !res.Reason.In(
<mask> dnsfilter.FilteredBlockList,
<mask> dnsfilter.FilteredBlockedService,
<mask> dnsfilter.NotFilteredAllowList,
<mask> )
<mask>
<mask> de... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f2f8de92215eb2911241c036b8a5ed136d0eaed | internal/querylog/searchcriterion.go |
"filter_confirm_delete": "Are you sure you want to delete filter?", | <mask> "client_updated": "Client \"{{key}}\" successfully updated",
<mask> "table_statistics": "Requests count (last 24 hours)",
<mask> "clients_not_found": "No clients found",
<mask> "client_confirm_delete": "Are you sure you want to delete client \"{{key}}\"?",
<mask> "auto_clients_title": "... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f5ac19b592c2a63e52a5e5319e9e8eb687c7410 | client/src/__locales/en.json |
removeFilter(config) { | <mask> };
<mask> return this.makeRequest(path, method, config);
<mask> }
<mask>
<mask> removeFilter(url) {
<mask> const { path, method } = this.FILTERING_REMOVE_FILTER;
<mask> const parameter = 'url';
<mask> const requestBody = `${parameter}=${url}`;
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f5ac19b592c2a63e52a5e5319e9e8eb687c7410 | client/src/api/Api.js |
const parameters = {
data: config,
headers: { 'Content-Type': 'application/json' }, | <mask> }
<mask>
<mask> removeFilter(url) {
<mask> const { path, method } = this.FILTERING_REMOVE_FILTER;
<mask> const parameter = 'url';
<mask> const requestBody = `${parameter}=${url}`;
<mask> const config = {
<mask> data: requestBody,
<mask> he... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f5ac19b592c2a63e52a5e5319e9e8eb687c7410 | client/src/api/Api.js |
return this.makeRequest(path, method, parameters); | <mask> const config = {
<mask> data: requestBody,
<mask> header: { 'Content-Type': 'text/plain' },
<mask> };
<mask> return this.makeRequest(path, method, config);
<mask> }
<mask>
<mask> setRules(rules) {
<mask> const { path, method } = this.FILTE... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f5ac19b592c2a63e52a5e5319e9e8eb687c7410 | client/src/api/Api.js |
GET_CLIENTS = { path: 'clients', method: 'GET' };
ADD_CLIENT = { path: 'clients/add', method: 'POST' };
DELETE_CLIENT = { path: 'clients/delete', method: 'POST' };
UPDATE_CLIENT = { path: 'clients/update', method: 'POST' }; | <mask> return this.makeRequest(path, method, parameters);
<mask> }
<mask>
<mask> // Per-client settings
<mask> GET_CLIENTS = { path: 'clients', method: 'GET' }
<mask> ADD_CLIENT = { path: 'clients/add', method: 'POST' }
<mask> DELETE_CLIENT = { path: 'clients/delete', method: 'POST' ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f5ac19b592c2a63e52a5e5319e9e8eb687c7410 | client/src/api/Api.js |
handleDelete = (url) => {
// eslint-disable-next-line no-alert
if (window.confirm(this.props.t('filter_confirm_delete'))) {
this.props.removeFilter({ url });
}
}
| <mask> };
<mask>
<mask> columns = [{
<mask> Header: <Trans>enabled_table_header</Trans>,
<mask> accessor: 'enabled',
<mask> Cell: this.renderCheckbox,
</s> * client: use JSON for filtering/remove_url </s> remove GET_CLIENTS = { path: 'clients', method: 'GET' }
ADD_CLIENT ... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f5ac19b592c2a63e52a5e5319e9e8eb687c7410 | client/src/components/Filters/index.js |
onClick={() => this.handleDelete(value)} | <mask> Cell: ({ value }) => (
<mask> <button
<mask> type="button"
<mask> className="btn btn-icon btn-outline-secondary btn-sm"
<mask> onClick={() => this.props.removeFilter(value)}
<mask> title={this.props.t('delete_table_action')... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f5ac19b592c2a63e52a5e5319e9e8eb687c7410 | client/src/components/Filters/index.js |
<mask> package dnsfilter
<mask>
<mask> import (
<mask> "bufio"
<mask> "bytes"
<mask> "context"
<mask> "crypto/sha256"
<mask> "encoding/binary"
<mask> "encoding/gob"
</s> + dnsfilter: use AG DNS server for SB/PC services
* move SS/SB/PC services to security.go
* remove old useless code (HTTP client) </... | [
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask>
<mask> import (
<mask> "bufio"
<mask> "bytes"
<mask> "context"
<mask> "crypto/sha256"
<mask> "encoding/binary"
<mask> "encoding/gob"
<mask> "encoding/json"
<mask> "fmt"
<mask> "io/ioutil"
<mask> "net"
<mask> "net/http"
<mask> "os"
</s> + dnsfilter: use AG DNS server for SB/PC services... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> "os"
<mask> "runtime"
<mask> "strings"
<mask> "sync"
<mask> "sync/atomic"
<mask> "time"
<mask>
<mask> "github.com/joomcode/errorx"
<mask>
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "git... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/urlfilter"
<mask> "github.com/bluele/gcache"
<mask> "github.com/miekg/dns"
<mask> "golang.org/x/net/publicsuffix"
<mask> )
<mask>
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/urlfilter"
<mask> "github.com/bluele/gcache"
<mask> "github.com/miekg/dns"
<mask> "golang.org/x/net/publicsuffix"
<mask> )
<mask>
<mask> const defaultHTTPTimeout = 5 * time.Minute
<mask> const defaultHTTPMaxIdleConnections = 100
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> "github.com/miekg/dns"
<mask> "golang.org/x/net/publicsuffix"
<mask> )
<mask>
<mask> const defaultHTTPTimeout = 5 * time.Minute
<mask> const defaultHTTPMaxIdleConnections = 100
<mask>
<mask> const defaultSafebrowsingServer = "sb.adtidy.org"
<mask> const defaultSafebrowsingURL = "%s://%s/safebrowsing... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> // Config allows you to configure DNS filtering with New() or just change variables directly.
<mask> type Config struct {
<mask> ParentalSensitivity int `yaml:"parental_sensitivity"` // must be either 3, 10, 13 or 17
<mask> ParentalEnabled bool `yaml:"parental_enabled"`
<mask> UsePlainHTTP ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
parentalServer string // access via methods
safeBrowsingServer string // access via methods
parentalUpstream upstream.Upstream
safeBrowsingUpstream upstream.Upstream | <mask> rulesStorage *urlfilter.RuleStorage
<mask> filteringEngine *urlfilter.DNSEngine
<mask> engineLock sync.RWMutex
<mask>
<mask> // HTTP lookups for safebrowsing and parental
<mask> client http.Client // handle for http client -- single instance as recommended by docs
<mask> transport *h... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go |
<mask> }
<mask>
<mask> // Close - close the object
<mask> func (d *Dnsfilter) Close() {
<mask> if d != nil && d.transport != nil {
<mask> d.transport.CloseIdleConnections()
<mask> }
<mask> if d.rulesStorage != nil {
<mask> d.rulesStorage.Close()
<mask> }
<mask> }
<mask>
</s> + dnsfilter: use AG D... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> }
<mask>
<mask> type dnsFilterContext struct {
<mask> stats Stats
<mask> dialCache gcache.Cache // "host" -> "IP" cache for safebrowsing and parental control servers
<mask> safebrowsingCache cache.Cache
<mask> parentalCache cache.Cache
<mask> safeSearchCache cache.Cache
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> return result, nil
<mask> }
<mask> }
<mask>
<mask> // check safeSearch if no match
<mask> if setts.SafeSearchEnabled {
<mask> result, err = d.checkSafeSearch(host)
<mask> if err != nil {
<mask> log.Printf("Failed to safesearch HTTP lookup, ignoring check: %v", err)
<mask> return Resu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
log.Info("SafeSearch: failed: %v", err) | <mask> // check safeSearch if no match
<mask> if setts.SafeSearchEnabled {
<mask> result, err = d.checkSafeSearch(host)
<mask> if err != nil {
<mask> log.Printf("Failed to safesearch HTTP lookup, ignoring check: %v", err)
<mask> return Result{}, nil
<mask> }
<mask>
<mask> if result.Reason.Matc... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.