docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
<mask> return result, nil <mask> } <mask> } <mask> <mask> // check safebrowsing if no match <mask> if setts.SafeBrowsingEnabled { <mask> result, err = d.checkSafeBrowsing(host) <mask> if err != nil { <mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cach...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
log.Info("SafeBrowsing: failed: %v", err)
<mask> // check safebrowsing if no match <mask> if setts.SafeBrowsingEnabled { <mask> result, err = d.checkSafeBrowsing(host) <mask> if err != nil { <mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache <mask> log.Printf("Failed to do safebrowsing HTTP lookup...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
<mask> return result, nil <mask> } <mask> } <mask> <mask> // check parental if no match <mask> if setts.ParentalEnabled { <mask> result, err = d.checkParental(host) <mask> if err != nil { <mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
log.Printf("Parental: failed: %v", err)
<mask> // check parental if no match <mask> if setts.ParentalEnabled { <mask> result, err = d.checkParental(host) <mask> if err != nil { <mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache <mask> log.Printf("Failed to do parental HTTP lookup, ignoring check...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
<mask> return result, nil <mask> } <mask> } <mask> <mask> // nothing matched, return nothing <mask> return Result{}, nil <mask> } <mask> <mask> // Process rewrites table <mask> // . Find CNAME for a domain name </s> + dnsfilter: use AG DNS server for SB/PC services * move SS/SB/PC services to secu...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
<mask> } <mask> return res <mask> } <mask> <mask> /* <mask> expire byte[4] <mask> res Result <mask> */ <mask> func (d *Dnsfilter) setCacheResult(cache cache.Cache, host string, res Result) { <mask> var buf bytes.Buffer <mask> <mask> expire := uint(time.Now().Unix()) + d.Config.CacheTime*60 <mask> va...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
<mask> <mask> return Result{}, nil <mask> } <mask> <mask> // <mask> // lifecycle helper functions <mask> // <mask> <mask> // Return TRUE if this host's IP should be cached <mask> func (d *Dnsfilter) shouldBeInDialCache(host string) bool { <mask> return host == d.safeBrowsingServer || <mask> host == d...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
<mask> if gctx.parentalCache == nil { <mask> cacheConf.MaxSize = c.ParentalCacheSize <mask> gctx.parentalCache = cache.New(cacheConf) <mask> } <mask> <mask> if len(c.ResolverAddress) != 0 && gctx.dialCache == nil { <mask> dur := time.Duration(c.CacheTime) * time.Minute <mask> gctx.dialCache =...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
err := d.initSecurityServices() if err != nil { log.Error("dnsfilter: initialize services: %s", err) return nil
<mask> } <mask> <mask> d := new(Dnsfilter) <mask> <mask> // Customize the Transport to have larger connection pool, <mask> // We are not (re)using http.DefaultTransport because of race conditions found by tests <mask> d.transport = &http.Transport{ <mask> Proxy: http.ProxyFromEnvironmen...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
<mask> d.client = http.Client{ <mask> Transport: d.transport, <mask> Timeout: defaultHTTPTimeout, <mask> } <mask> d.safeBrowsingServer = defaultSafebrowsingServer <mask> d.parentalServer = defaultParentalServer <mask> if c != nil { <mask> d.Config = *c <mask> } <mask> <mask> if filters != nil...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
<mask> } <mask> return d <mask> } <mask> <mask> // <mask> // config manipulation helpers <mask> // <mask> <mask> // SetSafeBrowsingServer lets you optionally change hostname of safesearch lookup <mask> func (d *Dnsfilter) SetSafeBrowsingServer(host string) { <mask> if len(host) == 0 { <mask> d.safeBr...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter.go
<mask> <mask> import ( <mask> "fmt" <mask> "net" <mask> "net/http" <mask> "net/http/httptest" <mask> "path" <mask> "runtime" <mask> "testing" <mask> "time" <mask> </s> + dnsfilter: use AG DNS server for SB/PC services * move SS/SB/PC services to security.go * remove old useless code (HTTP client)...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
<mask> "net/http/httptest" <mask> "path" <mask> "runtime" <mask> "testing" <mask> "time" <mask> <mask> "github.com/AdguardTeam/urlfilter" <mask> "github.com/bluele/gcache" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/assert" </s> + dnsfilter: use AG DNS server for SB/PC service...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
<mask> "testing" <mask> "time" <mask> <mask> "github.com/AdguardTeam/urlfilter" <mask> "github.com/bluele/gcache" <mask> "github.com/miekg/dns" <mask> "github.com/stretchr/testify/assert" <mask> ) <mask> <mask> var setts RequestFilteringSettings </s> + dnsfilter: use AG DNS server for SB/PC services ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
<mask> // SAFE BROWSING <mask> // SAFE SEARCH <mask> // PARENTAL <mask> // FILTERING <mask> // CLIENTS SETTINGS <mask> // BENCHMARKS <mask> <mask> // HELPERS <mask> <mask> func purgeCaches() { </s> + dnsfilter: use AG DNS server for SB/PC services * move SS/SB/PC services to security.go * remove old usele...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) defer d.Close() gctx.stats.Safebrowsing.Requests = 0 d.checkMatch(t, "wmconvirus.narod.ru") d.checkMatch(t, "test.wmconvirus.narod.ru") d.checkMatchEmpty(t, "yandex.ru") d.checkMatchEmpty(t, "pornhub.com") // test cached result d.safeBrowsingServer = "1...
<mask> <mask> // SAFE BROWSING <mask> <mask> func TestSafeBrowsing(t *testing.T) { <mask> testCases := []string{ <mask> "", <mask> "sb.adtidy.org", <mask> } <mask> for _, tc := range testCases { <mask> t.Run(fmt.Sprintf("%s in %s", tc, _Func()), func(t *testing.T) { <mask> d := NewForTest(&Conf...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
<mask> } <mask> }) <mask> } <mask> <mask> // the only way to verify that custom server option is working is to point it at a server that does serve safebrowsing <mask> func TestSafeBrowsingCustomServerFail(t *testing.T) { <mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil) <mask> defer d.Close...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
d := NewForTest(&Config{SafeSearchEnabled: true}, nil)
<mask> <mask> // SAFE SEARCH <mask> <mask> func TestSafeSearch(t *testing.T) { <mask> d := NewForTest(nil, nil) <mask> defer d.Close() <mask> _, ok := d.SafeSearchDomain("www.google.com") <mask> if ok { <mask> t.Errorf("Expected safesearch to error when disabled") <mask> } <mask> <mask> d = NewFo...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
<mask> d := NewForTest(&Config{ParentalEnabled: true}, nil) <mask> defer d.Close() <mask> d.ParentalSensitivity = 3 <mask> d.checkMatch(t, "pornhub.com") <mask> d.checkMatch(t, "pornhub.com") <mask> if gctx.stats.Parental.Requests != 1 { <mask> t.Errorf("Parental lookup positive cache is not working") <...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
<mask> } <mask> d.checkMatch(t, "www.pornhub.com") <mask> d.checkMatchEmpty(t, "www.yandex.ru") <mask> d.checkMatchEmpty(t, "yandex.ru") <mask> l := gctx.stats.Parental.Requests <mask> d.checkMatchEmpty(t, "yandex.ru") <mask> if gctx.stats.Parental.Requests != l { <mask> t.Errorf("Parental lookup negat...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
// test cached result d.parentalServer = "127.0.0.1" d.checkMatch(t, "pornhub.com") d.checkMatchEmpty(t, "yandex.ru") d.parentalServer = defaultParentalServer
<mask> d.checkMatchEmpty(t, "yandex.ru") <mask> d.checkMatchEmpty(t, "api.jquery.com") <mask> } <mask> <mask> // FILTERING <mask> <mask> var blockingRules = "||example.org^\n" </s> + dnsfilter: use AG DNS server for SB/PC services * move SS/SB/PC services to security.go * remove old useless code (HTTP clie...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
<mask> } <mask> } <mask> }) <mask> } <mask> <mask> func TestDnsfilterDialCache(t *testing.T) { <mask> d := Dnsfilter{} <mask> gctx.dialCache = gcache.New(1).LRU().Expiration(30 * time.Minute).Build() <mask> <mask> d.shouldBeInDialCache("hostname") <mask> if searchInDialCache("hostname") != "" { ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/dnsfilter_test.go
"bytes" "crypto/sha256" "encoding/binary" "encoding/gob" "encoding/hex"
<mask> package dnsfilter <mask> <mask> import ( <mask> "bufio" <mask> "encoding/json" <mask> "errors" <mask> "fmt" <mask> "io" <mask> "net" </s> + dnsfilter: use AG DNS server for SB/PC services * move SS/SB/PC services to security.go * remove old useless code (HTTP client) </s> remove "context" "cr...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/security.go
"net"
<mask> "errors" <mask> "fmt" <mask> "io" <mask> "net/http" <mask> "strconv" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/dnsproxy/upstream" </s> + dnsfilter: use AG DNS server for SB/PC services * move SS/SB/PC services to security.go * remove old useless code (HTTP client) <...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/security.go
"time"
<mask> "strconv" <mask> "strings" <mask> <mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/miekg/dns" <mask> "golang.org/x/net/publicsuffix" </s> + dnsfilter: use AG DNS server for SB/PC services ...
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/security.go
"github.com/AdguardTeam/dnsproxy/upstream" "github.com/AdguardTeam/golibs/cache"
<mask> "strconv" <mask> "strings" <mask> "time" <mask> <mask> "github.com/AdguardTeam/golibs/log" <mask> "github.com/miekg/dns" <mask> "golang.org/x/net/publicsuffix" <mask> ) <mask> </s> + dnsfilter: use AG DNS server for SB/PC services * move SS/SB/PC services to security.go * remove old useless co...
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/security.go
"github.com/miekg/dns" "golang.org/x/net/publicsuffix"
<mask> "github.com/AdguardTeam/dnsproxy/upstream" <mask> "github.com/AdguardTeam/golibs/cache" <mask> "github.com/AdguardTeam/golibs/log" <mask> ) <mask> <mask> const dnsTimeout = 3 * time.Second <mask> const defaultSafebrowsingServer = "https://dns-family.adguard.com/dns-query" </s> + dnsfilter: use AG DNS...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
dnsfilter/security.go
<mask> github.com/AdguardTeam/dnsproxy v0.19.6 <mask> github.com/AdguardTeam/golibs v0.2.4 <mask> github.com/AdguardTeam/urlfilter v0.6.1 <mask> github.com/NYTimes/gziphandler v1.1.1 <mask> github.com/bluele/gcache v0.0.0-20190518031135-bc40bd653833 <mask> github.com/etcd-io/bbolt v1.3.3 <mask> github.com...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
go.mod
github.com/go-test/deep v1.0.4 // indirect
<mask> github.com/AdguardTeam/urlfilter v0.6.1 <mask> github.com/NYTimes/gziphandler v1.1.1 <mask> github.com/bluele/gcache v0.0.0-20190518031135-bc40bd653833 <mask> github.com/etcd-io/bbolt v1.3.3 <mask> github.com/go-test/deep v1.0.4 <mask> github.com/gobuffalo/packr v1.19.0 <mask> github.com/joomcode/e...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
go.mod
<mask> github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a h1:idn718Q4B6AGu/h5Sxe66HYVdqdGu2l9Iebqhi/AEoA= <mask> github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY= <mask> github.com/beefsack/go-rate v0.0.0-20180408011153-efa76...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866
go.sum
<mask> if ip == nil { <mask> return 0, nil <mask> } <mask> val = ip <mask> if ip.To4() != nil { <mask> val = ip.To4() <mask> } <mask> <mask> default: <mask> return 0, nil <mask> } <mask> </s> Pull request: 2508 ip conversion vol.2 Merge in DNS/adguard-home from 2508-ip-conversion-vol...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/dhcpd.go
assert.True(t, net.IP{192, 168, 10, 101}.Equal(ll[0].IP))
<mask> <mask> ll := s.srv4.GetLeases(LeasesAll) <mask> <mask> assert.Equal(t, "aa:aa:aa:aa:aa:bb", ll[0].HWAddr.String()) <mask> assert.Equal(t, "192.168.10.101", ll[0].IP.String()) <mask> assert.EqualValues(t, leaseExpireStatic, ll[0].Expiry.Unix()) <mask> <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ll...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/dhcpd_test.go
assert.True(t, net.IP{192, 168, 10, 100}.Equal(ll[1].IP))
<mask> assert.Equal(t, "192.168.10.101", ll[0].IP.String()) <mask> assert.EqualValues(t, leaseExpireStatic, ll[0].Expiry.Unix()) <mask> <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ll[1].HWAddr.String()) <mask> assert.Equal(t, "192.168.10.100", ll[1].IP.String()) <mask> assert.Equal(t, exp1.Unix(), ll[1].Exp...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/dhcpd_test.go
assert.True(t, net.IP{1, 2, 3, 4}.Equal(net.IP(val)))
<mask> assert.EqualValues(t, 0, code) <mask> <mask> code, val = parseOptionString("123 ip 1.2.3.4") <mask> assert.EqualValues(t, 123, code) <mask> assert.Equal(t, "1.2.3.4", net.IP(string(val)).String()) <mask> <mask> code, _ = parseOptionString("256 ip 1.1.1.1") <mask> assert.EqualValues(t, 0, code) <...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/dhcpd_test.go
RangeStart net.IP `json:"range_start"`
<mask> } <mask> } <mask> <mask> type v6ServerConfJSON struct { <mask> RangeStart string `json:"range_start"` <mask> LeaseDuration uint32 `json:"lease_duration"` <mask> } <mask> <mask> func v6JSONToServerConf(j v6ServerConfJSON) V6ServerConf { <mask> return V6ServerConf{ </s> Pull request: 2508 ip co...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/dhcphttp.go
result.V4.StaticIP.IP = util.GetSubnet(interfaceName).String()
<mask> result.V4.StaticIP.Static = "error" <mask> result.V4.StaticIP.Error = err.Error() <mask> } else if !isStaticIP { <mask> result.V4.StaticIP.Static = "no" <mask> result.V4.StaticIP.IP = util.GetSubnet(interfaceName) <mask> } <mask> <mask> if found4 { <mask> result.V4.OtherServer.Found = "yes...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/dhcphttp.go
RangeStart net.IP `yaml:"range_start"`
<mask> InterfaceName string `yaml:"-" json:"-"` <mask> <mask> // The first IP address for dynamic leases <mask> // The last allowed IP address ends with 0xff byte <mask> RangeStart string `yaml:"range_start" json:"range_start"` <mask> <mask> LeaseDuration uint32 `yaml:"lease_duration" json:"lease_duration...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/server.go
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP))
<mask> <mask> // check <mask> ls = s.GetLeases(LeasesStatic) <mask> assert.Len(t, ls, 1) <mask> assert.Equal(t, "192.168.10.150", ls[0].IP.String()) <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String()) <mask> assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix()) <mask> <mask> // ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP))
<mask> // check <mask> ls := s.GetLeases(LeasesStatic) <mask> assert.Len(t, ls, 2) <mask> <mask> assert.Equal(t, "192.168.10.150", ls[0].IP.String()) <mask> assert.Equal(t, "33:aa:aa:aa:aa:aa", ls[0].HWAddr.String()) <mask> assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix()) <mask> <mask> as...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 152}.Equal(ls[1].IP))
<mask> assert.Equal(t, "192.168.10.150", ls[0].IP.String()) <mask> assert.Equal(t, "33:aa:aa:aa:aa:aa", ls[0].HWAddr.String()) <mask> assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix()) <mask> <mask> assert.Equal(t, "192.168.10.152", ls[1].IP.String()) <mask> assert.Equal(t, "22:aa:aa:aa:aa:aa", l...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 150}.Equal(resp.YourIPAddr)) assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0])) assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier())) assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask())))
<mask> <mask> // check "Offer" <mask> assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType()) <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String()) <mask> assert.Equal(t, "192.168.10.150", resp.YourIPAddr.String()) <mask> assert.Equal(t, "192.168.10.1", resp.Router()[0].String()) <ma...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 150}.Equal(resp.YourIPAddr)) assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0])) assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier())) assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask())))
<mask> <mask> // check "Ack" <mask> assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType()) <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String()) <mask> assert.Equal(t, "192.168.10.150", resp.YourIPAddr.String()) <mask> assert.Equal(t, "192.168.10.1", resp.Router()[0].String()) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 1}.Equal(dnsAddrs[0]))
<mask> assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds()) <mask> <mask> dnsAddrs := resp.DNS() <mask> assert.Len(t, dnsAddrs, 1) <mask> assert.Equal(t, "192.168.10.1", dnsAddrs[0].String()) <mask> <mask> // check lease <mask> ls := s.GetLeases(LeasesStatic) <mask> asser...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP))
<mask> <mask> // check lease <mask> ls := s.GetLeases(LeasesStatic) <mask> assert.Len(t, ls, 1) <mask> assert.Equal(t, "192.168.10.150", ls[0].IP.String()) <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String()) <mask> } <mask> <mask> func TestV4DynamicLeaseGet(t *testing.T) { <mask> conf :...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 100}.Equal(resp.YourIPAddr)) assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0])) assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier())) assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask())))
<mask> <mask> // check "Offer" <mask> assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType()) <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String()) <mask> assert.Equal(t, "192.168.10.100", resp.YourIPAddr.String()) <mask> assert.Equal(t, "192.168.10.1", resp.Router()[0].String()) <ma...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{1, 2, 3, 4}.Equal(net.IP(resp.Options[uint8(dhcpv4.OptionRelayAgentInformation)])))
<mask> assert.Equal(t, "192.168.10.1", resp.ServerIdentifier().String()) <mask> assert.Equal(t, "255.255.255.0", net.IP(resp.SubnetMask()).String()) <mask> assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds()) <mask> assert.Equal(t, []byte("012"), resp.Options[uint8(dhcpv4.OptionFQD...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 100}.Equal(resp.YourIPAddr)) assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0])) assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier())) assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask())))
<mask> <mask> // check "Ack" <mask> assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType()) <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String()) <mask> assert.Equal(t, "192.168.10.100", resp.YourIPAddr.String()) <mask> assert.Equal(t, "192.168.10.1", resp.Router()[0].String()) <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 1}.Equal(dnsAddrs[0]))
<mask> assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds()) <mask> <mask> dnsAddrs := resp.DNS() <mask> assert.Len(t, dnsAddrs, 1) <mask> assert.Equal(t, "192.168.10.1", dnsAddrs[0].String()) <mask> <mask> // check lease <mask> ls := s.GetLeases(LeasesDynamic) <mask> asse...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
assert.True(t, net.IP{192, 168, 10, 100}.Equal(ls[0].IP))
<mask> <mask> // check lease <mask> ls := s.GetLeases(LeasesDynamic) <mask> assert.Len(t, ls, 1) <mask> assert.Equal(t, "192.168.10.100", ls[0].IP.String()) <mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String()) <mask> <mask> start := net.IP{192, 168, 10, 100} <mask> stop := net.IP{192, 16...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v4_test.go
s.conf.ipStart = conf.RangeStart
<mask> if !conf.Enabled { <mask> return s, nil <mask> } <mask> <mask> s.conf.ipStart = net.ParseIP(conf.RangeStart) <mask> if s.conf.ipStart == nil || s.conf.ipStart.To16() == nil { <mask> return s, fmt.Errorf("dhcpv6: invalid range-start IP: %s", conf.RangeStart) <mask> } <mask> <mask> if conf.Le...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v6.go
RangeStart: net.ParseIP("2001::1"),
<mask> <mask> func TestV6StaticLeaseAddRemove(t *testing.T) { <mask> conf := V6ServerConf{ <mask> Enabled: true, <mask> RangeStart: "2001::1", <mask> notify: notify6, <mask> } <mask> s, err := v6Create(conf) <mask> assert.Nil(t, err) <mask> </s> Pull request: 2508 ip conversion vol.2 Merg...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v6_test.go
RangeStart: net.ParseIP("2001::1"),
<mask> <mask> func TestV6StaticLeaseAddReplaceDynamic(t *testing.T) { <mask> conf := V6ServerConf{ <mask> Enabled: true, <mask> RangeStart: "2001::1", <mask> notify: notify6, <mask> } <mask> sIface, err := v6Create(conf) <mask> s := sIface.(*v6Server) <mask> assert.Nil(t, err) </s> Pull re...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v6_test.go
RangeStart: net.ParseIP("2001::1"),
<mask> <mask> func TestV6GetLease(t *testing.T) { <mask> conf := V6ServerConf{ <mask> Enabled: true, <mask> RangeStart: "2001::1", <mask> notify: notify6, <mask> } <mask> sIface, err := v6Create(conf) <mask> s := sIface.(*v6Server) <mask> assert.Nil(t, err) </s> Pull request: 2508 ip conve...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v6_test.go
RangeStart: net.ParseIP("2001::2"),
<mask> <mask> func TestV6GetDynamicLease(t *testing.T) { <mask> conf := V6ServerConf{ <mask> Enabled: true, <mask> RangeStart: "2001::2", <mask> notify: notify6, <mask> } <mask> sIface, err := v6Create(conf) <mask> s := sIface.(*v6Server) <mask> assert.Nil(t, err) </s> Pull request: 2508 i...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dhcpd/v6_test.go
ClientIP net.IP
<mask> SafeBrowsingEnabled bool <mask> ParentalEnabled bool <mask> <mask> ClientName string <mask> ClientIP string <mask> ClientTags []string <mask> <mask> ServicesRules []ServiceEntry <mask> } <mask> </s> Pull request: 2508 ip conversion vol.2 Merge in DNS/adguard-home from 2508-ip-conversio...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsfilter/dnsfilter.go
// TODO(e.burkov): Wait for urlfilter update to pass net.IP. ClientIP: setts.ClientIP.String(), ClientName: setts.ClientName, DNSType: qtype,
<mask> <mask> ureq := urlfilter.DNSRequest{ <mask> Hostname: host, <mask> SortedClientTags: setts.ClientTags, <mask> ClientIP: setts.ClientIP, <mask> ClientName: setts.ClientName, <mask> DNSType: qtype, <mask> } <mask> <mask> if d.filteringEngineAllow != nil { <m...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsfilter/dnsfilter.go
assert.True(t, net.IP{1, 1, 1, 1}.Equal(r.IPList[0]))
<mask> // match exact <mask> r := d.processRewrites("host.com", dns.TypeA) <mask> assert.Equal(t, Rewritten, r.Reason) <mask> assert.Len(t, r.IPList, 1) <mask> assert.Equal(t, "1.1.1.1", r.IPList[0].String()) <mask> <mask> // match L2 <mask> r = d.processRewrites("sub.host.com", dns.TypeA) <mask> asse...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsfilter/rewrites_test.go
assert.True(t, net.IP{2, 2, 2, 2}.Equal(r.IPList[0]))
<mask> // match L2 <mask> r = d.processRewrites("sub.host.com", dns.TypeA) <mask> assert.Equal(t, Rewritten, r.Reason) <mask> assert.Len(t, r.IPList, 1) <mask> assert.Equal(t, "2.2.2.2", r.IPList[0].String()) <mask> <mask> // match L3 <mask> r = d.processRewrites("my.sub.host.com", dns.TypeA) <mask> a...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsfilter/rewrites_test.go
assert.True(t, net.IP{3, 3, 3, 3}.Equal(r.IPList[0]))
<mask> // match L3 <mask> r = d.processRewrites("my.sub.host.com", dns.TypeA) <mask> assert.Equal(t, Rewritten, r.Reason) <mask> assert.Len(t, r.IPList, 1) <mask> assert.Equal(t, "3.3.3.3", r.IPList[0].String()) <mask> } <mask> <mask> func TestRewritesExceptionCNAME(t *testing.T) { <mask> d := DNSFilter...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsfilter/rewrites_test.go
assert.True(t, net.IP{2, 2, 2, 2}.Equal(r.IPList[0]))
<mask> // match sub-domain <mask> r := d.processRewrites("my.host.com", dns.TypeA) <mask> assert.Equal(t, Rewritten, r.Reason) <mask> assert.Len(t, r.IPList, 1) <mask> assert.Equal(t, "2.2.2.2", r.IPList[0].String()) <mask> <mask> // match sub-domain, but handle exception <mask> r = d.processRewrites("s...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsfilter/rewrites_test.go
assert.True(t, net.IP{2, 2, 2, 2}.Equal(r.IPList[0]))
<mask> // match sub-domain <mask> r := d.processRewrites("my.host.com", dns.TypeA) <mask> assert.Equal(t, Rewritten, r.Reason) <mask> assert.Len(t, r.IPList, 1) <mask> assert.Equal(t, "2.2.2.2", r.IPList[0].String()) <mask> <mask> // match sub-domain, but handle exception <mask> r = d.processRewrites("m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsfilter/rewrites_test.go
assert.True(t, net.IP{1, 2, 3, 4}.Equal(r.IPList[0]))
<mask> // match domain <mask> r := d.processRewrites("host.com", dns.TypeA) <mask> assert.Equal(t, Rewritten, r.Reason) <mask> assert.Len(t, r.IPList, 1) <mask> assert.Equal(t, "1.2.3.4", r.IPList[0].String()) <mask> <mask> // match exception <mask> r = d.processRewrites("host.com", dns.TypeAAAA) <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsfilter/rewrites_test.go
func (a *accessCtx) IsBlockedIP(ip net.IP) (bool, string) { ipStr := ip.String()
<mask> // IsBlockedIP - return TRUE if this client should be blocked <mask> // Returns the item from the "disallowedClients" list that lead to blocking IP. <mask> // If it returns TRUE and an empty string, it means that the "allowedClients" is not empty, <mask> // but the ip does not belong to it. <mask> func (a *...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access.go
_, ok := a.allowedClients[ipStr]
<mask> a.lock.Lock() <mask> defer a.lock.Unlock() <mask> <mask> if len(a.allowedClients) != 0 || len(a.allowedClientsIPNet) != 0 { <mask> _, ok := a.allowedClients[ip] <mask> if ok { <mask> return false, "" <mask> } <mask> <mask> if len(a.allowedClientsIPNet) != 0 { </s> Pull request: 2508 ip...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access.go
<mask> return false, "" <mask> } <mask> <mask> if len(a.allowedClientsIPNet) != 0 { <mask> ipAddr := net.ParseIP(ip) <mask> for _, ipnet := range a.allowedClientsIPNet { <mask> if ipnet.Contains(ipAddr) { <mask> return false, "" <mask> } <mask> } </s> Pull request: 2508 ip conve...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access.go
if ipnet.Contains(ip) {
<mask> <mask> if len(a.allowedClientsIPNet) != 0 { <mask> ipAddr := net.ParseIP(ip) <mask> for _, ipnet := range a.allowedClientsIPNet { <mask> if ipnet.Contains(ipAddr) { <mask> return false, "" <mask> } <mask> } <mask> } <mask> </s> Pull request: 2508 ip conversion vol.2 Merge ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access.go
_, ok := a.disallowedClients[ipStr]
<mask> <mask> return true, "" <mask> } <mask> <mask> _, ok := a.disallowedClients[ip] <mask> if ok { <mask> return true, ip <mask> } <mask> <mask> if len(a.disallowedClientsIPNet) != 0 { </s> Pull request: 2508 ip conversion vol.2 Merge in DNS/adguard-home from 2508-ip-conversion-vol2 to master ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access.go
return true, ipStr
<mask> } <mask> <mask> _, ok := a.disallowedClients[ip] <mask> if ok { <mask> return true, ip <mask> } <mask> <mask> if len(a.disallowedClientsIPNet) != 0 { <mask> ipAddr := net.ParseIP(ip) <mask> for _, ipnet := range a.disallowedClientsIPNet { </s> Pull request: 2508 ip conversion vol.2 Merge...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access.go
<mask> return true, ip <mask> } <mask> <mask> if len(a.disallowedClientsIPNet) != 0 { <mask> ipAddr := net.ParseIP(ip) <mask> for _, ipnet := range a.disallowedClientsIPNet { <mask> if ipnet.Contains(ipAddr) { <mask> return true, ipnet.String() <mask> } <mask> } </s> Pull request: 2508 i...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access.go
if ipnet.Contains(ip) {
<mask> <mask> if len(a.disallowedClientsIPNet) != 0 { <mask> ipAddr := net.ParseIP(ip) <mask> for _, ipnet := range a.disallowedClientsIPNet { <mask> if ipnet.Contains(ipAddr) { <mask> return true, ipnet.String() <mask> } <mask> } <mask> } <mask> </s> Pull request: 2508 ip conversion vol....
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access.go
"net"
<mask> package dnsforward <mask> <mask> import ( <mask> "testing" <mask> <mask> "github.com/stretchr/testify/assert" <mask> ) </s> Pull request: 2508 ip conversion vol.2 Merge in DNS/adguard-home from 2508-ip-conversion-vol2 to master Closes #2508. Squashed commit of the following: commit 5b9d33f9cd3527...
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
disallowed, disallowedRule := a.IsBlockedIP(net.IPv4(1, 1, 1, 1))
<mask> func TestIsBlockedIPAllowed(t *testing.T) { <mask> a := &accessCtx{} <mask> assert.Nil(t, a.Init([]string{"1.1.1.1", "2.2.0.0/16"}, nil, nil)) <mask> <mask> disallowed, disallowedRule := a.IsBlockedIP("1.1.1.1") <mask> assert.False(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> <mas...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(1, 1, 1, 2))
<mask> disallowed, disallowedRule := a.IsBlockedIP("1.1.1.1") <mask> assert.False(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> <mask> disallowed, disallowedRule = a.IsBlockedIP("1.1.1.2") <mask> assert.True(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> <mask> disallowed,...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(2, 2, 1, 1))
<mask> disallowed, disallowedRule = a.IsBlockedIP("1.1.1.2") <mask> assert.True(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> <mask> disallowed, disallowedRule = a.IsBlockedIP("2.2.1.1") <mask> assert.False(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> <mask> disallowed, ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(2, 3, 1, 1))
<mask> disallowed, disallowedRule = a.IsBlockedIP("2.2.1.1") <mask> assert.False(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> <mask> disallowed, disallowedRule = a.IsBlockedIP("2.3.1.1") <mask> assert.True(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> } <mask> <mask> fun...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
disallowed, disallowedRule := a.IsBlockedIP(net.IPv4(1, 1, 1, 1))
<mask> func TestIsBlockedIPDisallowed(t *testing.T) { <mask> a := &accessCtx{} <mask> assert.Nil(t, a.Init(nil, []string{"1.1.1.1", "2.2.0.0/16"}, nil)) <mask> <mask> disallowed, disallowedRule := a.IsBlockedIP("1.1.1.1") <mask> assert.True(t, disallowed) <mask> assert.Equal(t, "1.1.1.1", disallowedRule) ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(1, 1, 1, 2))
<mask> disallowed, disallowedRule := a.IsBlockedIP("1.1.1.1") <mask> assert.True(t, disallowed) <mask> assert.Equal(t, "1.1.1.1", disallowedRule) <mask> <mask> disallowed, disallowedRule = a.IsBlockedIP("1.1.1.2") <mask> assert.False(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(2, 2, 1, 1))
<mask> disallowed, disallowedRule = a.IsBlockedIP("1.1.1.2") <mask> assert.False(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> <mask> disallowed, disallowedRule = a.IsBlockedIP("2.2.1.1") <mask> assert.True(t, disallowed) <mask> assert.Equal(t, "2.2.0.0/16", disallowedRule) <mask> <mask>...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(2, 3, 1, 1))
<mask> disallowed, disallowedRule = a.IsBlockedIP("2.2.1.1") <mask> assert.True(t, disallowed) <mask> assert.Equal(t, "2.2.0.0/16", disallowedRule) <mask> <mask> disallowed, disallowedRule = a.IsBlockedIP("2.3.1.1") <mask> assert.False(t, disallowed) <mask> assert.Empty(t, disallowedRule) <mask> } <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/access_test.go
FilterHandler func(clientAddr net.IP, settings *dnsfilter.RequestFilteringSettings) `yaml:"-"`
<mask> // Callbacks for other modules <mask> // -- <mask> <mask> // Filtering callback function <mask> FilterHandler func(clientAddr string, settings *dnsfilter.RequestFilteringSettings) `yaml:"-"` <mask> <mask> // GetCustomUpstreamByClient - a callback function that returns upstreams configuration <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/config.go
// TODO(e.burkov): Replace argument type with net.IP.
<mask> FilterHandler func(clientAddr string, settings *dnsfilter.RequestFilteringSettings) `yaml:"-"` <mask> <mask> // GetCustomUpstreamByClient - a callback function that returns upstreams configuration <mask> // based on the client IP address. Returns nil if there are no custom upstreams for the client <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/config.go
func (s *Server) IsBlockedIP(ip net.IP) (bool, string) {
<mask> } <mask> } <mask> <mask> // IsBlockedIP - return TRUE if this client should be blocked <mask> func (s *Server) IsBlockedIP(ip string) (bool, string) { <mask> return s.access.IsBlockedIP(ip) <mask> } </s> Pull request: 2508 ip conversion vol.2 Merge in DNS/adguard-home from 2508-ip-conversion-vol2 to ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/dnsforward.go
assert.True(t, net.IP{192, 168, 0, 1}.Equal(reply.Answer[0].(*dns.A).A))
<mask> <mask> assert.Nil(t, err) <mask> assert.Equal(t, dns.RcodeSuccess, reply.Rcode) <mask> assert.NotNil(t, reply.Answer) <mask> assert.Equal(t, "192.168.0.1", reply.Answer[0].(*dns.A).A.String()) <mask> assert.Nil(t, s.Stop()) <mask> } <mask> <mask> // testUpstream is a mock of real upstream. <mask...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/dnsforward_test.go
s.conf.FilterHandler = func(_ net.IP, settings *dnsfilter.RequestFilteringSettings) {
<mask> <mask> func TestClientRulesForCNAMEMatching(t *testing.T) { <mask> s := createTestServer(t) <mask> testUpstm := &testUpstream{testCNAMEs, testIPv4, nil} <mask> s.conf.FilterHandler = func(_ string, settings *dnsfilter.RequestFilteringSettings) { <mask> settings.FilteringEnabled = false <mask> } <m...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/dnsforward_test.go
assert.True(t, net.IP{0, 0, 0, 1}.Equal(a.A))
<mask> assert.Nil(t, err) <mask> assert.Len(t, reply.Answer, 1) <mask> a, ok := reply.Answer[0].(*dns.A) <mask> assert.True(t, ok) <mask> assert.Equal(t, "0.0.0.1", a.A.String()) <mask> <mask> req = createTestMessageWithType("null.example.org.", dns.TypeAAAA) <mask> reply, err = dns.Exchange(req, addr.S...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/dnsforward_test.go
assert.True(t, net.IP{1, 2, 3, 4}.Equal(a.A))
<mask> assert.Nil(t, err) <mask> assert.Len(t, reply.Answer, 1) <mask> a, ok := reply.Answer[0].(*dns.A) <mask> assert.True(t, ok) <mask> assert.Equal(t, "1.2.3.4", a.A.String()) <mask> <mask> req = createTestMessageWithType("test.com.", dns.TypeAAAA) <mask> reply, err = dns.Exchange(req, addr.String())...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/dnsforward_test.go
assert.True(t, net.IP{1, 2, 3, 4}.Equal(reply.Answer[1].(*dns.A).A))
<mask> reply, err = dns.Exchange(req, addr.String()) <mask> assert.Nil(t, err) <mask> assert.Len(t, reply.Answer, 2) <mask> assert.Equal(t, "test.com.", reply.Answer[0].(*dns.CNAME).Target) <mask> assert.Equal(t, "1.2.3.4", reply.Answer[1].(*dns.A).A.String()) <mask> <mask> req = createTestMessageWithType...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/dnsforward_test.go
ip := IPFromAddr(d.Addr)
<mask> "github.com/miekg/dns" <mask> ) <mask> <mask> func (s *Server) beforeRequestHandler(_ *proxy.Proxy, d *proxy.DNSContext) (bool, error) { <mask> ip := IPStringFromAddr(d.Addr) <mask> disallowed, _ := s.access.IsBlockedIP(ip) <mask> if disallowed { <mask> log.Tracef("Client IP %s is blocked by setti...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/filter.go
s.conf.FilterHandler(IPFromAddr(d.Addr), &setts)
<mask> func (s *Server) getClientRequestFilteringSettings(d *proxy.DNSContext) *dnsfilter.RequestFilteringSettings { <mask> setts := s.dnsFilter.GetConfig() <mask> setts.FilteringEnabled = true <mask> if s.conf.FilterHandler != nil { <mask> clientAddr := IPStringFromAddr(d.Addr) <mask> s.conf.FilterHandler...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/filter.go
ClientIP: IPFromAddr(d.Addr),
<mask> Answer: d.Res, <mask> OrigAnswer: ctx.origResp, <mask> Result: ctx.result, <mask> Elapsed: elapsed, <mask> ClientIP: ipFromAddr(d.Addr), <mask> } <mask> <mask> switch d.Proto { <mask> case proxy.ProtoHTTPS: <mask> p.ClientProto = querylog.ClientProtoDOH </s> Pull ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/stats.go
// IPFromAddr gets IP address from addr. func IPFromAddr(addr net.Addr) (ip net.IP) {
<mask> <mask> "github.com/AdguardTeam/golibs/utils" <mask> ) <mask> <mask> // ipFromAddr gets IP address from addr. <mask> func ipFromAddr(addr net.Addr) (ip net.IP) { <mask> switch addr := addr.(type) { <mask> case *net.UDPAddr: <mask> return addr.IP <mask> case *net.TCPAddr: <mask> return addr.IP...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/util.go
func IPStringFromAddr(addr net.Addr) (ipStr string) { if ip := IPFromAddr(addr); ip != nil {
<mask> <mask> // IPStringFromAddr extracts IP address from net.Addr. <mask> // Note: we can't use net.SplitHostPort(a.String()) because of IPv6 zone: <mask> // https://github.com/AdguardTeam/AdGuardHome/internal/issues/1261 <mask> func IPStringFromAddr(addr net.Addr) (ipstr string) { <mask> if ip := ipFromAddr(...
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/dnsforward/util.go
list map[string]*Client // name -> client idIndex map[string]*Client // IP -> client // TODO(e.burkov): Think of a way to not require string conversion for // IP addresses. ipHost map[string]*ClientHost // IP -> Hostname lock sync.Mutex
<mask> WhoisInfo [][]string // [[key,value], ...] <mask> } <mask> <mask> type clientsContainer struct { <mask> list map[string]*Client // name -> client <mask> idIndex map[string]*Client // IP -> client <mask> ipHost map[string]*ClientHost // IP -> Hostname <mask> lock sync.Mutex <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/home/clients.go
func (clients *clientsContainer) Exists(ip net.IP, source clientSource) bool {
<mask> clients.addFromHostsFile() <mask> } <mask> <mask> // Exists checks if client with this IP already exists <mask> func (clients *clientsContainer) Exists(ip string, source clientSource) bool { <mask> clients.lock.Lock() <mask> defer clients.lock.Unlock() <mask> <mask> _, ok := clients.findByIP(ip) ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/home/clients.go
ch, ok := clients.ipHost[ip.String()]
<mask> if ok { <mask> return true <mask> } <mask> <mask> ch, ok := clients.ipHost[ip] <mask> if !ok { <mask> return false <mask> } <mask> if source > ch.Source { <mask> return false // we're going to overwrite this client's info with a stronger source </s> Pull request: 2508 ip conversion vol.2 ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/home/clients.go
func (clients *clientsContainer) Find(ip net.IP) (Client, bool) {
<mask> return a2 <mask> } <mask> <mask> // Find searches for a client by IP <mask> func (clients *clientsContainer) Find(ip string) (Client, bool) { <mask> clients.lock.Lock() <mask> defer clients.lock.Unlock() <mask> <mask> c, ok := clients.findByIP(ip) <mask> if !ok { </s> Pull request: 2508 ip conv...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/home/clients.go
c, ok := clients.findByIP(net.ParseIP(ip))
<mask> func (clients *clientsContainer) FindUpstreams(ip string) *proxy.UpstreamConfig { <mask> clients.lock.Lock() <mask> defer clients.lock.Unlock() <mask> <mask> c, ok := clients.findByIP(ip) <mask> if !ok { <mask> return nil <mask> } <mask> <mask> if len(c.Upstreams) == 0 { </s> Pull request: 2...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/home/clients.go
func (clients *clientsContainer) findByIP(ip net.IP) (Client, bool) { if ip == nil {
<mask> return c.upstreamConfig <mask> } <mask> <mask> // Find searches for a client by IP (and does not lock anything) <mask> func (clients *clientsContainer) findByIP(ip string) (Client, bool) { <mask> ipAddr := net.ParseIP(ip) <mask> if ipAddr == nil { <mask> return Client{}, false <mask> } <mask> ...
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/home/clients.go
c, ok := clients.idIndex[ip.String()]
<mask> if ipAddr == nil { <mask> return Client{}, false <mask> } <mask> <mask> c, ok := clients.idIndex[ip] <mask> if ok { <mask> return *c, true <mask> } <mask> <mask> for _, c = range clients.list { </s> Pull request: 2508 ip conversion vol.2 Merge in DNS/adguard-home from 2508-ip-conversion-v...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/home/clients.go
if ipnet.Contains(ip) {
<mask> _, ipnet, err := net.ParseCIDR(id) <mask> if err != nil { <mask> continue <mask> } <mask> if ipnet.Contains(ipAddr) { <mask> return *c, true <mask> } <mask> } <mask> } <mask> </s> Pull request: 2508 ip conversion vol.2 Merge in DNS/adguard-home from 2508-ip-conversion-vol2 ...
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01
internal/home/clients.go