docstring_tokens stringlengths 0 76.5k | code_tokens stringlengths 75 1.81M | label_window listlengths 4 2.12k | html_url stringlengths 74 116 | file_name stringlengths 3 311 |
|---|---|---|---|---|
<mask> return result, nil
<mask> }
<mask> }
<mask>
<mask> // check safebrowsing if no match
<mask> if setts.SafeBrowsingEnabled {
<mask> result, err = d.checkSafeBrowsing(host)
<mask> if err != nil {
<mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cach... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
log.Info("SafeBrowsing: failed: %v", err) | <mask> // check safebrowsing if no match
<mask> if setts.SafeBrowsingEnabled {
<mask> result, err = d.checkSafeBrowsing(host)
<mask> if err != nil {
<mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache
<mask> log.Printf("Failed to do safebrowsing HTTP lookup... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go |
<mask> return result, nil
<mask> }
<mask> }
<mask>
<mask> // check parental if no match
<mask> if setts.ParentalEnabled {
<mask> result, err = d.checkParental(host)
<mask> if err != nil {
<mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
log.Printf("Parental: failed: %v", err) | <mask> // check parental if no match
<mask> if setts.ParentalEnabled {
<mask> result, err = d.checkParental(host)
<mask> if err != nil {
<mask> // failed to do HTTP lookup -- treat it as if we got empty response, but don't save cache
<mask> log.Printf("Failed to do parental HTTP lookup, ignoring check... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go |
<mask> return result, nil
<mask> }
<mask> }
<mask>
<mask> // nothing matched, return nothing
<mask> return Result{}, nil
<mask> }
<mask>
<mask> // Process rewrites table
<mask> // . Find CNAME for a domain name
</s> + dnsfilter: use AG DNS server for SB/PC services
* move SS/SB/PC services to secu... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> }
<mask> return res
<mask> }
<mask>
<mask> /*
<mask> expire byte[4]
<mask> res Result
<mask> */
<mask> func (d *Dnsfilter) setCacheResult(cache cache.Cache, host string, res Result) {
<mask> var buf bytes.Buffer
<mask>
<mask> expire := uint(time.Now().Unix()) + d.Config.CacheTime*60
<mask> va... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask>
<mask> return Result{}, nil
<mask> }
<mask>
<mask> //
<mask> // lifecycle helper functions
<mask> //
<mask>
<mask> // Return TRUE if this host's IP should be cached
<mask> func (d *Dnsfilter) shouldBeInDialCache(host string) bool {
<mask> return host == d.safeBrowsingServer ||
<mask> host == d... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> if gctx.parentalCache == nil {
<mask> cacheConf.MaxSize = c.ParentalCacheSize
<mask> gctx.parentalCache = cache.New(cacheConf)
<mask> }
<mask>
<mask> if len(c.ResolverAddress) != 0 && gctx.dialCache == nil {
<mask> dur := time.Duration(c.CacheTime) * time.Minute
<mask> gctx.dialCache =... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
err := d.initSecurityServices()
if err != nil {
log.Error("dnsfilter: initialize services: %s", err)
return nil | <mask> }
<mask>
<mask> d := new(Dnsfilter)
<mask>
<mask> // Customize the Transport to have larger connection pool,
<mask> // We are not (re)using http.DefaultTransport because of race conditions found by tests
<mask> d.transport = &http.Transport{
<mask> Proxy: http.ProxyFromEnvironmen... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go |
<mask> d.client = http.Client{
<mask> Transport: d.transport,
<mask> Timeout: defaultHTTPTimeout,
<mask> }
<mask> d.safeBrowsingServer = defaultSafebrowsingServer
<mask> d.parentalServer = defaultParentalServer
<mask> if c != nil {
<mask> d.Config = *c
<mask> }
<mask>
<mask> if filters != nil... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask> }
<mask> return d
<mask> }
<mask>
<mask> //
<mask> // config manipulation helpers
<mask> //
<mask>
<mask> // SetSafeBrowsingServer lets you optionally change hostname of safesearch lookup
<mask> func (d *Dnsfilter) SetSafeBrowsingServer(host string) {
<mask> if len(host) == 0 {
<mask> d.safeBr... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter.go | |
<mask>
<mask> import (
<mask> "fmt"
<mask> "net"
<mask> "net/http"
<mask> "net/http/httptest"
<mask> "path"
<mask> "runtime"
<mask> "testing"
<mask> "time"
<mask>
</s> + dnsfilter: use AG DNS server for SB/PC services
* move SS/SB/PC services to security.go
* remove old useless code (HTTP client)... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go | |
<mask> "net/http/httptest"
<mask> "path"
<mask> "runtime"
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/urlfilter"
<mask> "github.com/bluele/gcache"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
</s> + dnsfilter: use AG DNS server for SB/PC service... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go | |
<mask> "testing"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/urlfilter"
<mask> "github.com/bluele/gcache"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> )
<mask>
<mask> var setts RequestFilteringSettings
</s> + dnsfilter: use AG DNS server for SB/PC services
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go | |
<mask> // SAFE BROWSING
<mask> // SAFE SEARCH
<mask> // PARENTAL
<mask> // FILTERING
<mask> // CLIENTS SETTINGS
<mask> // BENCHMARKS
<mask>
<mask> // HELPERS
<mask>
<mask> func purgeCaches() {
</s> + dnsfilter: use AG DNS server for SB/PC services
* move SS/SB/PC services to security.go
* remove old usele... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go | |
d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil)
defer d.Close()
gctx.stats.Safebrowsing.Requests = 0
d.checkMatch(t, "wmconvirus.narod.ru")
d.checkMatch(t, "test.wmconvirus.narod.ru")
d.checkMatchEmpty(t, "yandex.ru")
d.checkMatchEmpty(t, "pornhub.com")
// test cached result
d.safeBrowsingServer = "1... | <mask>
<mask> // SAFE BROWSING
<mask>
<mask> func TestSafeBrowsing(t *testing.T) {
<mask> testCases := []string{
<mask> "",
<mask> "sb.adtidy.org",
<mask> }
<mask> for _, tc := range testCases {
<mask> t.Run(fmt.Sprintf("%s in %s", tc, _Func()), func(t *testing.T) {
<mask> d := NewForTest(&Conf... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"re... | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go |
<mask> }
<mask> })
<mask> }
<mask>
<mask> // the only way to verify that custom server option is working is to point it at a server that does serve safebrowsing
<mask> func TestSafeBrowsingCustomServerFail(t *testing.T) {
<mask> d := NewForTest(&Config{SafeBrowsingEnabled: true}, nil)
<mask> defer d.Close... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go | |
d := NewForTest(&Config{SafeSearchEnabled: true}, nil) | <mask>
<mask> // SAFE SEARCH
<mask>
<mask> func TestSafeSearch(t *testing.T) {
<mask> d := NewForTest(nil, nil)
<mask> defer d.Close()
<mask> _, ok := d.SafeSearchDomain("www.google.com")
<mask> if ok {
<mask> t.Errorf("Expected safesearch to error when disabled")
<mask> }
<mask>
<mask> d = NewFo... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go |
<mask> d := NewForTest(&Config{ParentalEnabled: true}, nil)
<mask> defer d.Close()
<mask> d.ParentalSensitivity = 3
<mask> d.checkMatch(t, "pornhub.com")
<mask> d.checkMatch(t, "pornhub.com")
<mask> if gctx.stats.Parental.Requests != 1 {
<mask> t.Errorf("Parental lookup positive cache is not working")
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go | |
<mask> }
<mask> d.checkMatch(t, "www.pornhub.com")
<mask> d.checkMatchEmpty(t, "www.yandex.ru")
<mask> d.checkMatchEmpty(t, "yandex.ru")
<mask> l := gctx.stats.Parental.Requests
<mask> d.checkMatchEmpty(t, "yandex.ru")
<mask> if gctx.stats.Parental.Requests != l {
<mask> t.Errorf("Parental lookup negat... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go | |
// test cached result
d.parentalServer = "127.0.0.1"
d.checkMatch(t, "pornhub.com")
d.checkMatchEmpty(t, "yandex.ru")
d.parentalServer = defaultParentalServer | <mask> d.checkMatchEmpty(t, "yandex.ru")
<mask> d.checkMatchEmpty(t, "api.jquery.com")
<mask> }
<mask>
<mask> // FILTERING
<mask>
<mask> var blockingRules = "||example.org^\n"
</s> + dnsfilter: use AG DNS server for SB/PC services
* move SS/SB/PC services to security.go
* remove old useless code (HTTP clie... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go |
<mask> }
<mask> }
<mask> })
<mask> }
<mask>
<mask> func TestDnsfilterDialCache(t *testing.T) {
<mask> d := Dnsfilter{}
<mask> gctx.dialCache = gcache.New(1).LRU().Expiration(30 * time.Minute).Build()
<mask>
<mask> d.shouldBeInDialCache("hostname")
<mask> if searchInDialCache("hostname") != "" {
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace",
"replace"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/dnsfilter_test.go | |
"bytes"
"crypto/sha256"
"encoding/binary"
"encoding/gob"
"encoding/hex" | <mask> package dnsfilter
<mask>
<mask> import (
<mask> "bufio"
<mask> "encoding/json"
<mask> "errors"
<mask> "fmt"
<mask> "io"
<mask> "net"
</s> + dnsfilter: use AG DNS server for SB/PC services
* move SS/SB/PC services to security.go
* remove old useless code (HTTP client) </s> remove "context"
"cr... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/security.go |
"net" | <mask> "errors"
<mask> "fmt"
<mask> "io"
<mask> "net/http"
<mask> "strconv"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
</s> + dnsfilter: use AG DNS server for SB/PC services
* move SS/SB/PC services to security.go
* remove old useless code (HTTP client) <... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/security.go |
"time" | <mask> "strconv"
<mask> "strings"
<mask>
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> "golang.org/x/net/publicsuffix"
</s> + dnsfilter: use AG DNS server for SB/PC services
... | [
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/security.go |
"github.com/AdguardTeam/dnsproxy/upstream"
"github.com/AdguardTeam/golibs/cache" | <mask> "strconv"
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/miekg/dns"
<mask> "golang.org/x/net/publicsuffix"
<mask> )
<mask>
</s> + dnsfilter: use AG DNS server for SB/PC services
* move SS/SB/PC services to security.go
* remove old useless co... | [
"keep",
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/security.go |
"github.com/miekg/dns"
"golang.org/x/net/publicsuffix" | <mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/cache"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> )
<mask>
<mask> const dnsTimeout = 3 * time.Second
<mask> const defaultSafebrowsingServer = "https://dns-family.adguard.com/dns-query"
</s> + dnsfilter: use AG DNS... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | dnsfilter/security.go |
<mask> github.com/AdguardTeam/dnsproxy v0.19.6
<mask> github.com/AdguardTeam/golibs v0.2.4
<mask> github.com/AdguardTeam/urlfilter v0.6.1
<mask> github.com/NYTimes/gziphandler v1.1.1
<mask> github.com/bluele/gcache v0.0.0-20190518031135-bc40bd653833
<mask> github.com/etcd-io/bbolt v1.3.3
<mask> github.com... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | go.mod | |
github.com/go-test/deep v1.0.4 // indirect | <mask> github.com/AdguardTeam/urlfilter v0.6.1
<mask> github.com/NYTimes/gziphandler v1.1.1
<mask> github.com/bluele/gcache v0.0.0-20190518031135-bc40bd653833
<mask> github.com/etcd-io/bbolt v1.3.3
<mask> github.com/go-test/deep v1.0.4
<mask> github.com/gobuffalo/packr v1.19.0
<mask> github.com/joomcode/e... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | go.mod |
<mask> github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a h1:idn718Q4B6AGu/h5Sxe66HYVdqdGu2l9Iebqhi/AEoA=
<mask> github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY=
<mask> github.com/beefsack/go-rate v0.0.0-20180408011153-efa76... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7f69848084a68cdf1e227a555454991295fc5866 | go.sum | |
<mask> if ip == nil {
<mask> return 0, nil
<mask> }
<mask> val = ip
<mask> if ip.To4() != nil {
<mask> val = ip.To4()
<mask> }
<mask>
<mask> default:
<mask> return 0, nil
<mask> }
<mask>
</s> Pull request: 2508 ip conversion vol.2
Merge in DNS/adguard-home from 2508-ip-conversion-vol... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/dhcpd.go | |
assert.True(t, net.IP{192, 168, 10, 101}.Equal(ll[0].IP)) | <mask>
<mask> ll := s.srv4.GetLeases(LeasesAll)
<mask>
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:bb", ll[0].HWAddr.String())
<mask> assert.Equal(t, "192.168.10.101", ll[0].IP.String())
<mask> assert.EqualValues(t, leaseExpireStatic, ll[0].Expiry.Unix())
<mask>
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ll... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/dhcpd_test.go |
assert.True(t, net.IP{192, 168, 10, 100}.Equal(ll[1].IP)) | <mask> assert.Equal(t, "192.168.10.101", ll[0].IP.String())
<mask> assert.EqualValues(t, leaseExpireStatic, ll[0].Expiry.Unix())
<mask>
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ll[1].HWAddr.String())
<mask> assert.Equal(t, "192.168.10.100", ll[1].IP.String())
<mask> assert.Equal(t, exp1.Unix(), ll[1].Exp... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/dhcpd_test.go |
assert.True(t, net.IP{1, 2, 3, 4}.Equal(net.IP(val))) | <mask> assert.EqualValues(t, 0, code)
<mask>
<mask> code, val = parseOptionString("123 ip 1.2.3.4")
<mask> assert.EqualValues(t, 123, code)
<mask> assert.Equal(t, "1.2.3.4", net.IP(string(val)).String())
<mask>
<mask> code, _ = parseOptionString("256 ip 1.1.1.1")
<mask> assert.EqualValues(t, 0, code)
<... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/dhcpd_test.go |
RangeStart net.IP `json:"range_start"` | <mask> }
<mask> }
<mask>
<mask> type v6ServerConfJSON struct {
<mask> RangeStart string `json:"range_start"`
<mask> LeaseDuration uint32 `json:"lease_duration"`
<mask> }
<mask>
<mask> func v6JSONToServerConf(j v6ServerConfJSON) V6ServerConf {
<mask> return V6ServerConf{
</s> Pull request: 2508 ip co... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/dhcphttp.go |
result.V4.StaticIP.IP = util.GetSubnet(interfaceName).String() | <mask> result.V4.StaticIP.Static = "error"
<mask> result.V4.StaticIP.Error = err.Error()
<mask> } else if !isStaticIP {
<mask> result.V4.StaticIP.Static = "no"
<mask> result.V4.StaticIP.IP = util.GetSubnet(interfaceName)
<mask> }
<mask>
<mask> if found4 {
<mask> result.V4.OtherServer.Found = "yes... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/dhcphttp.go |
RangeStart net.IP `yaml:"range_start"` | <mask> InterfaceName string `yaml:"-" json:"-"`
<mask>
<mask> // The first IP address for dynamic leases
<mask> // The last allowed IP address ends with 0xff byte
<mask> RangeStart string `yaml:"range_start" json:"range_start"`
<mask>
<mask> LeaseDuration uint32 `yaml:"lease_duration" json:"lease_duration... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/server.go |
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP)) | <mask>
<mask> // check
<mask> ls = s.GetLeases(LeasesStatic)
<mask> assert.Len(t, ls, 1)
<mask> assert.Equal(t, "192.168.10.150", ls[0].IP.String())
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
<mask> assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix())
<mask>
<mask> // ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP)) | <mask> // check
<mask> ls := s.GetLeases(LeasesStatic)
<mask> assert.Len(t, ls, 2)
<mask>
<mask> assert.Equal(t, "192.168.10.150", ls[0].IP.String())
<mask> assert.Equal(t, "33:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
<mask> assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix())
<mask>
<mask> as... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 152}.Equal(ls[1].IP)) | <mask> assert.Equal(t, "192.168.10.150", ls[0].IP.String())
<mask> assert.Equal(t, "33:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
<mask> assert.EqualValues(t, leaseExpireStatic, ls[0].Expiry.Unix())
<mask>
<mask> assert.Equal(t, "192.168.10.152", ls[1].IP.String())
<mask> assert.Equal(t, "22:aa:aa:aa:aa:aa", l... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 150}.Equal(resp.YourIPAddr))
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0]))
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier()))
assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask()))) | <mask>
<mask> // check "Offer"
<mask> assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
<mask> assert.Equal(t, "192.168.10.150", resp.YourIPAddr.String())
<mask> assert.Equal(t, "192.168.10.1", resp.Router()[0].String())
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 150}.Equal(resp.YourIPAddr))
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0]))
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier()))
assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask()))) | <mask>
<mask> // check "Ack"
<mask> assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType())
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
<mask> assert.Equal(t, "192.168.10.150", resp.YourIPAddr.String())
<mask> assert.Equal(t, "192.168.10.1", resp.Router()[0].String())
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 1}.Equal(dnsAddrs[0])) | <mask> assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
<mask>
<mask> dnsAddrs := resp.DNS()
<mask> assert.Len(t, dnsAddrs, 1)
<mask> assert.Equal(t, "192.168.10.1", dnsAddrs[0].String())
<mask>
<mask> // check lease
<mask> ls := s.GetLeases(LeasesStatic)
<mask> asser... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 150}.Equal(ls[0].IP)) | <mask>
<mask> // check lease
<mask> ls := s.GetLeases(LeasesStatic)
<mask> assert.Len(t, ls, 1)
<mask> assert.Equal(t, "192.168.10.150", ls[0].IP.String())
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
<mask> }
<mask>
<mask> func TestV4DynamicLeaseGet(t *testing.T) {
<mask> conf :... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 100}.Equal(resp.YourIPAddr))
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0]))
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier()))
assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask()))) | <mask>
<mask> // check "Offer"
<mask> assert.Equal(t, dhcpv4.MessageTypeOffer, resp.MessageType())
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
<mask> assert.Equal(t, "192.168.10.100", resp.YourIPAddr.String())
<mask> assert.Equal(t, "192.168.10.1", resp.Router()[0].String())
<ma... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{1, 2, 3, 4}.Equal(net.IP(resp.Options[uint8(dhcpv4.OptionRelayAgentInformation)]))) | <mask> assert.Equal(t, "192.168.10.1", resp.ServerIdentifier().String())
<mask> assert.Equal(t, "255.255.255.0", net.IP(resp.SubnetMask()).String())
<mask> assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
<mask> assert.Equal(t, []byte("012"), resp.Options[uint8(dhcpv4.OptionFQD... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 100}.Equal(resp.YourIPAddr))
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.Router()[0]))
assert.True(t, net.IP{192, 168, 10, 1}.Equal(resp.ServerIdentifier()))
assert.True(t, net.IP{255, 255, 255, 0}.Equal(net.IP(resp.SubnetMask()))) | <mask>
<mask> // check "Ack"
<mask> assert.Equal(t, dhcpv4.MessageTypeAck, resp.MessageType())
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", resp.ClientHWAddr.String())
<mask> assert.Equal(t, "192.168.10.100", resp.YourIPAddr.String())
<mask> assert.Equal(t, "192.168.10.1", resp.Router()[0].String())
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 1}.Equal(dnsAddrs[0])) | <mask> assert.Equal(t, s.conf.leaseTime.Seconds(), resp.IPAddressLeaseTime(-1).Seconds())
<mask>
<mask> dnsAddrs := resp.DNS()
<mask> assert.Len(t, dnsAddrs, 1)
<mask> assert.Equal(t, "192.168.10.1", dnsAddrs[0].String())
<mask>
<mask> // check lease
<mask> ls := s.GetLeases(LeasesDynamic)
<mask> asse... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
assert.True(t, net.IP{192, 168, 10, 100}.Equal(ls[0].IP)) | <mask>
<mask> // check lease
<mask> ls := s.GetLeases(LeasesDynamic)
<mask> assert.Len(t, ls, 1)
<mask> assert.Equal(t, "192.168.10.100", ls[0].IP.String())
<mask> assert.Equal(t, "aa:aa:aa:aa:aa:aa", ls[0].HWAddr.String())
<mask>
<mask> start := net.IP{192, 168, 10, 100}
<mask> stop := net.IP{192, 16... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v4_test.go |
s.conf.ipStart = conf.RangeStart | <mask> if !conf.Enabled {
<mask> return s, nil
<mask> }
<mask>
<mask> s.conf.ipStart = net.ParseIP(conf.RangeStart)
<mask> if s.conf.ipStart == nil || s.conf.ipStart.To16() == nil {
<mask> return s, fmt.Errorf("dhcpv6: invalid range-start IP: %s", conf.RangeStart)
<mask> }
<mask>
<mask> if conf.Le... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v6.go |
RangeStart: net.ParseIP("2001::1"), | <mask>
<mask> func TestV6StaticLeaseAddRemove(t *testing.T) {
<mask> conf := V6ServerConf{
<mask> Enabled: true,
<mask> RangeStart: "2001::1",
<mask> notify: notify6,
<mask> }
<mask> s, err := v6Create(conf)
<mask> assert.Nil(t, err)
<mask>
</s> Pull request: 2508 ip conversion vol.2
Merg... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v6_test.go |
RangeStart: net.ParseIP("2001::1"), | <mask>
<mask> func TestV6StaticLeaseAddReplaceDynamic(t *testing.T) {
<mask> conf := V6ServerConf{
<mask> Enabled: true,
<mask> RangeStart: "2001::1",
<mask> notify: notify6,
<mask> }
<mask> sIface, err := v6Create(conf)
<mask> s := sIface.(*v6Server)
<mask> assert.Nil(t, err)
</s> Pull re... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v6_test.go |
RangeStart: net.ParseIP("2001::1"), | <mask>
<mask> func TestV6GetLease(t *testing.T) {
<mask> conf := V6ServerConf{
<mask> Enabled: true,
<mask> RangeStart: "2001::1",
<mask> notify: notify6,
<mask> }
<mask> sIface, err := v6Create(conf)
<mask> s := sIface.(*v6Server)
<mask> assert.Nil(t, err)
</s> Pull request: 2508 ip conve... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v6_test.go |
RangeStart: net.ParseIP("2001::2"), | <mask>
<mask> func TestV6GetDynamicLease(t *testing.T) {
<mask> conf := V6ServerConf{
<mask> Enabled: true,
<mask> RangeStart: "2001::2",
<mask> notify: notify6,
<mask> }
<mask> sIface, err := v6Create(conf)
<mask> s := sIface.(*v6Server)
<mask> assert.Nil(t, err)
</s> Pull request: 2508 i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dhcpd/v6_test.go |
ClientIP net.IP | <mask> SafeBrowsingEnabled bool
<mask> ParentalEnabled bool
<mask>
<mask> ClientName string
<mask> ClientIP string
<mask> ClientTags []string
<mask>
<mask> ServicesRules []ServiceEntry
<mask> }
<mask>
</s> Pull request: 2508 ip conversion vol.2
Merge in DNS/adguard-home from 2508-ip-conversio... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsfilter/dnsfilter.go |
// TODO(e.burkov): Wait for urlfilter update to pass net.IP.
ClientIP: setts.ClientIP.String(),
ClientName: setts.ClientName,
DNSType: qtype, | <mask>
<mask> ureq := urlfilter.DNSRequest{
<mask> Hostname: host,
<mask> SortedClientTags: setts.ClientTags,
<mask> ClientIP: setts.ClientIP,
<mask> ClientName: setts.ClientName,
<mask> DNSType: qtype,
<mask> }
<mask>
<mask> if d.filteringEngineAllow != nil {
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsfilter/dnsfilter.go |
assert.True(t, net.IP{1, 1, 1, 1}.Equal(r.IPList[0])) | <mask> // match exact
<mask> r := d.processRewrites("host.com", dns.TypeA)
<mask> assert.Equal(t, Rewritten, r.Reason)
<mask> assert.Len(t, r.IPList, 1)
<mask> assert.Equal(t, "1.1.1.1", r.IPList[0].String())
<mask>
<mask> // match L2
<mask> r = d.processRewrites("sub.host.com", dns.TypeA)
<mask> asse... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsfilter/rewrites_test.go |
assert.True(t, net.IP{2, 2, 2, 2}.Equal(r.IPList[0])) | <mask> // match L2
<mask> r = d.processRewrites("sub.host.com", dns.TypeA)
<mask> assert.Equal(t, Rewritten, r.Reason)
<mask> assert.Len(t, r.IPList, 1)
<mask> assert.Equal(t, "2.2.2.2", r.IPList[0].String())
<mask>
<mask> // match L3
<mask> r = d.processRewrites("my.sub.host.com", dns.TypeA)
<mask> a... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsfilter/rewrites_test.go |
assert.True(t, net.IP{3, 3, 3, 3}.Equal(r.IPList[0])) | <mask> // match L3
<mask> r = d.processRewrites("my.sub.host.com", dns.TypeA)
<mask> assert.Equal(t, Rewritten, r.Reason)
<mask> assert.Len(t, r.IPList, 1)
<mask> assert.Equal(t, "3.3.3.3", r.IPList[0].String())
<mask> }
<mask>
<mask> func TestRewritesExceptionCNAME(t *testing.T) {
<mask> d := DNSFilter... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsfilter/rewrites_test.go |
assert.True(t, net.IP{2, 2, 2, 2}.Equal(r.IPList[0])) | <mask> // match sub-domain
<mask> r := d.processRewrites("my.host.com", dns.TypeA)
<mask> assert.Equal(t, Rewritten, r.Reason)
<mask> assert.Len(t, r.IPList, 1)
<mask> assert.Equal(t, "2.2.2.2", r.IPList[0].String())
<mask>
<mask> // match sub-domain, but handle exception
<mask> r = d.processRewrites("s... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsfilter/rewrites_test.go |
assert.True(t, net.IP{2, 2, 2, 2}.Equal(r.IPList[0])) | <mask> // match sub-domain
<mask> r := d.processRewrites("my.host.com", dns.TypeA)
<mask> assert.Equal(t, Rewritten, r.Reason)
<mask> assert.Len(t, r.IPList, 1)
<mask> assert.Equal(t, "2.2.2.2", r.IPList[0].String())
<mask>
<mask> // match sub-domain, but handle exception
<mask> r = d.processRewrites("m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsfilter/rewrites_test.go |
assert.True(t, net.IP{1, 2, 3, 4}.Equal(r.IPList[0])) | <mask> // match domain
<mask> r := d.processRewrites("host.com", dns.TypeA)
<mask> assert.Equal(t, Rewritten, r.Reason)
<mask> assert.Len(t, r.IPList, 1)
<mask> assert.Equal(t, "1.2.3.4", r.IPList[0].String())
<mask>
<mask> // match exception
<mask> r = d.processRewrites("host.com", dns.TypeAAAA)
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsfilter/rewrites_test.go |
func (a *accessCtx) IsBlockedIP(ip net.IP) (bool, string) {
ipStr := ip.String()
| <mask> // IsBlockedIP - return TRUE if this client should be blocked
<mask> // Returns the item from the "disallowedClients" list that lead to blocking IP.
<mask> // If it returns TRUE and an empty string, it means that the "allowedClients" is not empty,
<mask> // but the ip does not belong to it.
<mask> func (a *... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access.go |
_, ok := a.allowedClients[ipStr] | <mask> a.lock.Lock()
<mask> defer a.lock.Unlock()
<mask>
<mask> if len(a.allowedClients) != 0 || len(a.allowedClientsIPNet) != 0 {
<mask> _, ok := a.allowedClients[ip]
<mask> if ok {
<mask> return false, ""
<mask> }
<mask>
<mask> if len(a.allowedClientsIPNet) != 0 {
</s> Pull request: 2508 ip... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access.go |
<mask> return false, ""
<mask> }
<mask>
<mask> if len(a.allowedClientsIPNet) != 0 {
<mask> ipAddr := net.ParseIP(ip)
<mask> for _, ipnet := range a.allowedClientsIPNet {
<mask> if ipnet.Contains(ipAddr) {
<mask> return false, ""
<mask> }
<mask> }
</s> Pull request: 2508 ip conve... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access.go | |
if ipnet.Contains(ip) { | <mask>
<mask> if len(a.allowedClientsIPNet) != 0 {
<mask> ipAddr := net.ParseIP(ip)
<mask> for _, ipnet := range a.allowedClientsIPNet {
<mask> if ipnet.Contains(ipAddr) {
<mask> return false, ""
<mask> }
<mask> }
<mask> }
<mask>
</s> Pull request: 2508 ip conversion vol.2
Merge ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access.go |
_, ok := a.disallowedClients[ipStr] | <mask>
<mask> return true, ""
<mask> }
<mask>
<mask> _, ok := a.disallowedClients[ip]
<mask> if ok {
<mask> return true, ip
<mask> }
<mask>
<mask> if len(a.disallowedClientsIPNet) != 0 {
</s> Pull request: 2508 ip conversion vol.2
Merge in DNS/adguard-home from 2508-ip-conversion-vol2 to master
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access.go |
return true, ipStr | <mask> }
<mask>
<mask> _, ok := a.disallowedClients[ip]
<mask> if ok {
<mask> return true, ip
<mask> }
<mask>
<mask> if len(a.disallowedClientsIPNet) != 0 {
<mask> ipAddr := net.ParseIP(ip)
<mask> for _, ipnet := range a.disallowedClientsIPNet {
</s> Pull request: 2508 ip conversion vol.2
Merge... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access.go |
<mask> return true, ip
<mask> }
<mask>
<mask> if len(a.disallowedClientsIPNet) != 0 {
<mask> ipAddr := net.ParseIP(ip)
<mask> for _, ipnet := range a.disallowedClientsIPNet {
<mask> if ipnet.Contains(ipAddr) {
<mask> return true, ipnet.String()
<mask> }
<mask> }
</s> Pull request: 2508 i... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access.go | |
if ipnet.Contains(ip) { | <mask>
<mask> if len(a.disallowedClientsIPNet) != 0 {
<mask> ipAddr := net.ParseIP(ip)
<mask> for _, ipnet := range a.disallowedClientsIPNet {
<mask> if ipnet.Contains(ipAddr) {
<mask> return true, ipnet.String()
<mask> }
<mask> }
<mask> }
<mask>
</s> Pull request: 2508 ip conversion vol.... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access.go |
"net" | <mask> package dnsforward
<mask>
<mask> import (
<mask> "testing"
<mask>
<mask> "github.com/stretchr/testify/assert"
<mask> )
</s> Pull request: 2508 ip conversion vol.2
Merge in DNS/adguard-home from 2508-ip-conversion-vol2 to master
Closes #2508.
Squashed commit of the following:
commit 5b9d33f9cd3527... | [
"keep",
"keep",
"add",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
disallowed, disallowedRule := a.IsBlockedIP(net.IPv4(1, 1, 1, 1)) | <mask> func TestIsBlockedIPAllowed(t *testing.T) {
<mask> a := &accessCtx{}
<mask> assert.Nil(t, a.Init([]string{"1.1.1.1", "2.2.0.0/16"}, nil, nil))
<mask>
<mask> disallowed, disallowedRule := a.IsBlockedIP("1.1.1.1")
<mask> assert.False(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask>
<mas... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(1, 1, 1, 2)) | <mask> disallowed, disallowedRule := a.IsBlockedIP("1.1.1.1")
<mask> assert.False(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask>
<mask> disallowed, disallowedRule = a.IsBlockedIP("1.1.1.2")
<mask> assert.True(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask>
<mask> disallowed,... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(2, 2, 1, 1)) | <mask> disallowed, disallowedRule = a.IsBlockedIP("1.1.1.2")
<mask> assert.True(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask>
<mask> disallowed, disallowedRule = a.IsBlockedIP("2.2.1.1")
<mask> assert.False(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask>
<mask> disallowed, ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(2, 3, 1, 1)) | <mask> disallowed, disallowedRule = a.IsBlockedIP("2.2.1.1")
<mask> assert.False(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask>
<mask> disallowed, disallowedRule = a.IsBlockedIP("2.3.1.1")
<mask> assert.True(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask> }
<mask>
<mask> fun... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
disallowed, disallowedRule := a.IsBlockedIP(net.IPv4(1, 1, 1, 1)) | <mask> func TestIsBlockedIPDisallowed(t *testing.T) {
<mask> a := &accessCtx{}
<mask> assert.Nil(t, a.Init(nil, []string{"1.1.1.1", "2.2.0.0/16"}, nil))
<mask>
<mask> disallowed, disallowedRule := a.IsBlockedIP("1.1.1.1")
<mask> assert.True(t, disallowed)
<mask> assert.Equal(t, "1.1.1.1", disallowedRule)
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(1, 1, 1, 2)) | <mask> disallowed, disallowedRule := a.IsBlockedIP("1.1.1.1")
<mask> assert.True(t, disallowed)
<mask> assert.Equal(t, "1.1.1.1", disallowedRule)
<mask>
<mask> disallowed, disallowedRule = a.IsBlockedIP("1.1.1.2")
<mask> assert.False(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask>
<mask> ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(2, 2, 1, 1)) | <mask> disallowed, disallowedRule = a.IsBlockedIP("1.1.1.2")
<mask> assert.False(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask>
<mask> disallowed, disallowedRule = a.IsBlockedIP("2.2.1.1")
<mask> assert.True(t, disallowed)
<mask> assert.Equal(t, "2.2.0.0/16", disallowedRule)
<mask>
<mask>... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
disallowed, disallowedRule = a.IsBlockedIP(net.IPv4(2, 3, 1, 1)) | <mask> disallowed, disallowedRule = a.IsBlockedIP("2.2.1.1")
<mask> assert.True(t, disallowed)
<mask> assert.Equal(t, "2.2.0.0/16", disallowedRule)
<mask>
<mask> disallowed, disallowedRule = a.IsBlockedIP("2.3.1.1")
<mask> assert.False(t, disallowed)
<mask> assert.Empty(t, disallowedRule)
<mask> }
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/access_test.go |
FilterHandler func(clientAddr net.IP, settings *dnsfilter.RequestFilteringSettings) `yaml:"-"` | <mask> // Callbacks for other modules
<mask> // --
<mask>
<mask> // Filtering callback function
<mask> FilterHandler func(clientAddr string, settings *dnsfilter.RequestFilteringSettings) `yaml:"-"`
<mask>
<mask> // GetCustomUpstreamByClient - a callback function that returns upstreams configuration
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/config.go |
// TODO(e.burkov): Replace argument type with net.IP. | <mask> FilterHandler func(clientAddr string, settings *dnsfilter.RequestFilteringSettings) `yaml:"-"`
<mask>
<mask> // GetCustomUpstreamByClient - a callback function that returns upstreams configuration
<mask> // based on the client IP address. Returns nil if there are no custom upstreams for the client
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/config.go |
func (s *Server) IsBlockedIP(ip net.IP) (bool, string) { | <mask> }
<mask> }
<mask>
<mask> // IsBlockedIP - return TRUE if this client should be blocked
<mask> func (s *Server) IsBlockedIP(ip string) (bool, string) {
<mask> return s.access.IsBlockedIP(ip)
<mask> }
</s> Pull request: 2508 ip conversion vol.2
Merge in DNS/adguard-home from 2508-ip-conversion-vol2 to ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/dnsforward.go |
assert.True(t, net.IP{192, 168, 0, 1}.Equal(reply.Answer[0].(*dns.A).A)) | <mask>
<mask> assert.Nil(t, err)
<mask> assert.Equal(t, dns.RcodeSuccess, reply.Rcode)
<mask> assert.NotNil(t, reply.Answer)
<mask> assert.Equal(t, "192.168.0.1", reply.Answer[0].(*dns.A).A.String())
<mask> assert.Nil(t, s.Stop())
<mask> }
<mask>
<mask> // testUpstream is a mock of real upstream.
<mask... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/dnsforward_test.go |
s.conf.FilterHandler = func(_ net.IP, settings *dnsfilter.RequestFilteringSettings) { | <mask>
<mask> func TestClientRulesForCNAMEMatching(t *testing.T) {
<mask> s := createTestServer(t)
<mask> testUpstm := &testUpstream{testCNAMEs, testIPv4, nil}
<mask> s.conf.FilterHandler = func(_ string, settings *dnsfilter.RequestFilteringSettings) {
<mask> settings.FilteringEnabled = false
<mask> }
<m... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/dnsforward_test.go |
assert.True(t, net.IP{0, 0, 0, 1}.Equal(a.A)) | <mask> assert.Nil(t, err)
<mask> assert.Len(t, reply.Answer, 1)
<mask> a, ok := reply.Answer[0].(*dns.A)
<mask> assert.True(t, ok)
<mask> assert.Equal(t, "0.0.0.1", a.A.String())
<mask>
<mask> req = createTestMessageWithType("null.example.org.", dns.TypeAAAA)
<mask> reply, err = dns.Exchange(req, addr.S... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/dnsforward_test.go |
assert.True(t, net.IP{1, 2, 3, 4}.Equal(a.A)) | <mask> assert.Nil(t, err)
<mask> assert.Len(t, reply.Answer, 1)
<mask> a, ok := reply.Answer[0].(*dns.A)
<mask> assert.True(t, ok)
<mask> assert.Equal(t, "1.2.3.4", a.A.String())
<mask>
<mask> req = createTestMessageWithType("test.com.", dns.TypeAAAA)
<mask> reply, err = dns.Exchange(req, addr.String())... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/dnsforward_test.go |
assert.True(t, net.IP{1, 2, 3, 4}.Equal(reply.Answer[1].(*dns.A).A)) | <mask> reply, err = dns.Exchange(req, addr.String())
<mask> assert.Nil(t, err)
<mask> assert.Len(t, reply.Answer, 2)
<mask> assert.Equal(t, "test.com.", reply.Answer[0].(*dns.CNAME).Target)
<mask> assert.Equal(t, "1.2.3.4", reply.Answer[1].(*dns.A).A.String())
<mask>
<mask> req = createTestMessageWithType... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/dnsforward_test.go |
ip := IPFromAddr(d.Addr) | <mask> "github.com/miekg/dns"
<mask> )
<mask>
<mask> func (s *Server) beforeRequestHandler(_ *proxy.Proxy, d *proxy.DNSContext) (bool, error) {
<mask> ip := IPStringFromAddr(d.Addr)
<mask> disallowed, _ := s.access.IsBlockedIP(ip)
<mask> if disallowed {
<mask> log.Tracef("Client IP %s is blocked by setti... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/filter.go |
s.conf.FilterHandler(IPFromAddr(d.Addr), &setts) | <mask> func (s *Server) getClientRequestFilteringSettings(d *proxy.DNSContext) *dnsfilter.RequestFilteringSettings {
<mask> setts := s.dnsFilter.GetConfig()
<mask> setts.FilteringEnabled = true
<mask> if s.conf.FilterHandler != nil {
<mask> clientAddr := IPStringFromAddr(d.Addr)
<mask> s.conf.FilterHandler... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/filter.go |
ClientIP: IPFromAddr(d.Addr), | <mask> Answer: d.Res,
<mask> OrigAnswer: ctx.origResp,
<mask> Result: ctx.result,
<mask> Elapsed: elapsed,
<mask> ClientIP: ipFromAddr(d.Addr),
<mask> }
<mask>
<mask> switch d.Proto {
<mask> case proxy.ProtoHTTPS:
<mask> p.ClientProto = querylog.ClientProtoDOH
</s> Pull ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/stats.go |
// IPFromAddr gets IP address from addr.
func IPFromAddr(addr net.Addr) (ip net.IP) { | <mask>
<mask> "github.com/AdguardTeam/golibs/utils"
<mask> )
<mask>
<mask> // ipFromAddr gets IP address from addr.
<mask> func ipFromAddr(addr net.Addr) (ip net.IP) {
<mask> switch addr := addr.(type) {
<mask> case *net.UDPAddr:
<mask> return addr.IP
<mask> case *net.TCPAddr:
<mask> return addr.IP... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/util.go |
func IPStringFromAddr(addr net.Addr) (ipStr string) {
if ip := IPFromAddr(addr); ip != nil { | <mask>
<mask> // IPStringFromAddr extracts IP address from net.Addr.
<mask> // Note: we can't use net.SplitHostPort(a.String()) because of IPv6 zone:
<mask> // https://github.com/AdguardTeam/AdGuardHome/internal/issues/1261
<mask> func IPStringFromAddr(addr net.Addr) (ipstr string) {
<mask> if ip := ipFromAddr(... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/dnsforward/util.go |
list map[string]*Client // name -> client
idIndex map[string]*Client // IP -> client
// TODO(e.burkov): Think of a way to not require string conversion for
// IP addresses.
ipHost map[string]*ClientHost // IP -> Hostname
lock sync.Mutex | <mask> WhoisInfo [][]string // [[key,value], ...]
<mask> }
<mask>
<mask> type clientsContainer struct {
<mask> list map[string]*Client // name -> client
<mask> idIndex map[string]*Client // IP -> client
<mask> ipHost map[string]*ClientHost // IP -> Hostname
<mask> lock sync.Mutex
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/home/clients.go |
func (clients *clientsContainer) Exists(ip net.IP, source clientSource) bool { | <mask> clients.addFromHostsFile()
<mask> }
<mask>
<mask> // Exists checks if client with this IP already exists
<mask> func (clients *clientsContainer) Exists(ip string, source clientSource) bool {
<mask> clients.lock.Lock()
<mask> defer clients.lock.Unlock()
<mask>
<mask> _, ok := clients.findByIP(ip)
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/home/clients.go |
ch, ok := clients.ipHost[ip.String()] | <mask> if ok {
<mask> return true
<mask> }
<mask>
<mask> ch, ok := clients.ipHost[ip]
<mask> if !ok {
<mask> return false
<mask> }
<mask> if source > ch.Source {
<mask> return false // we're going to overwrite this client's info with a stronger source
</s> Pull request: 2508 ip conversion vol.2
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/home/clients.go |
func (clients *clientsContainer) Find(ip net.IP) (Client, bool) { | <mask> return a2
<mask> }
<mask>
<mask> // Find searches for a client by IP
<mask> func (clients *clientsContainer) Find(ip string) (Client, bool) {
<mask> clients.lock.Lock()
<mask> defer clients.lock.Unlock()
<mask>
<mask> c, ok := clients.findByIP(ip)
<mask> if !ok {
</s> Pull request: 2508 ip conv... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/home/clients.go |
c, ok := clients.findByIP(net.ParseIP(ip)) | <mask> func (clients *clientsContainer) FindUpstreams(ip string) *proxy.UpstreamConfig {
<mask> clients.lock.Lock()
<mask> defer clients.lock.Unlock()
<mask>
<mask> c, ok := clients.findByIP(ip)
<mask> if !ok {
<mask> return nil
<mask> }
<mask>
<mask> if len(c.Upstreams) == 0 {
</s> Pull request: 2... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/home/clients.go |
func (clients *clientsContainer) findByIP(ip net.IP) (Client, bool) {
if ip == nil { | <mask> return c.upstreamConfig
<mask> }
<mask>
<mask> // Find searches for a client by IP (and does not lock anything)
<mask> func (clients *clientsContainer) findByIP(ip string) (Client, bool) {
<mask> ipAddr := net.ParseIP(ip)
<mask> if ipAddr == nil {
<mask> return Client{}, false
<mask> }
<mask>
... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"replace",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/home/clients.go |
c, ok := clients.idIndex[ip.String()] | <mask> if ipAddr == nil {
<mask> return Client{}, false
<mask> }
<mask>
<mask> c, ok := clients.idIndex[ip]
<mask> if ok {
<mask> return *c, true
<mask> }
<mask>
<mask> for _, c = range clients.list {
</s> Pull request: 2508 ip conversion vol.2
Merge in DNS/adguard-home from 2508-ip-conversion-v... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/home/clients.go |
if ipnet.Contains(ip) { | <mask> _, ipnet, err := net.ParseCIDR(id)
<mask> if err != nil {
<mask> continue
<mask> }
<mask> if ipnet.Contains(ipAddr) {
<mask> return *c, true
<mask> }
<mask> }
<mask> }
<mask>
</s> Pull request: 2508 ip conversion vol.2
Merge in DNS/adguard-home from 2508-ip-conversion-vol2 ... | [
"keep",
"keep",
"keep",
"keep",
"replace",
"keep",
"keep",
"keep",
"keep",
"keep"
] | https://github.com/AdguardTeam/AdGuardHome/commit/7fab31beaeb8c7d1c9892746bbf37e99d4f9dc01 | internal/home/clients.go |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.