docstring_tokens
stringlengths 18
16.9k
| code_tokens
stringlengths 75
1.81M
| html_url
stringlengths 74
116
| file_name
stringlengths 3
311
|
---|---|---|---|
keep keep add keep keep keep keep keep keep
|
<mask> }
<mask> }
<mask>
<mask> // command-line arguments
<mask> type options struct {
<mask> verbose bool // is verbose logging enabled
<mask> configFilename string // path to the config file
<mask> workDir string // path to the working directory where we will store the filters data and the querylog
<mask> bindHost string // host address to bind HTTP server on
</s> + app: add '--pidfile FILE' command-line parameter </s> add pidFile string // File name to save PID to </s> add // Write PID to a file
func writePIDFile(fn string) bool {
data := fmt.Sprintf("%d", os.Getpid())
err := ioutil.WriteFile(fn, []byte(data), 0644)
if err != nil {
log.Error("Couldn't write PID to file %s: %v", fn, err)
return false
}
return true
}
</s> add var pidFileName string // PID file name. Empty if no PID file was created. </s> add cleanupAlways() </s> remove os.Exit(1)
</s> add </s> remove os.Exit(1)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/7746a3e6a9f204e7b7ab498c2f484cf426fb1a18
|
app.go
|
keep keep keep add keep keep keep keep keep
|
<mask> workDir string // path to the working directory where we will store the filters data and the querylog
<mask> bindHost string // host address to bind HTTP server on
<mask> bindPort int // port to serve HTTP pages on
<mask> logFile string // Path to the log file. If empty, write to stdout. If "syslog", writes to syslog
<mask>
<mask> // service control action (see service.ControlAction array + "status" command)
<mask> serviceControlAction string
<mask>
<mask> // runningAsService flag is set to true when options are passed from the service runner
</s> + app: add '--pidfile FILE' command-line parameter </s> add // This function is called before application exits
func cleanupAlways() {
if len(pidFileName) != 0 {
os.Remove(pidFileName)
}
}
</s> add var pidFileName string // PID file name. Empty if no PID file was created. </s> add // Write PID to a file
func writePIDFile(fn string) bool {
data := fmt.Sprintf("%d", os.Getpid())
err := ioutil.WriteFile(fn, []byte(data), 0644)
if err != nil {
log.Error("Couldn't write PID to file %s: %v", fn, err)
return false
}
return true
}
</s> add {"pidfile", "", "File name to save PID to", func(value string) { o.pidFile = value }, nil}, </s> add cleanupAlways() </s> remove os.Exit(1)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/7746a3e6a9f204e7b7ab498c2f484cf426fb1a18
|
app.go
|
keep keep keep add keep keep keep keep keep keep
|
<mask> }, nil},
<mask> {"logfile", "l", "path to the log file. If empty, writes to stdout, if 'syslog' -- system log", func(value string) {
<mask> o.logFile = value
<mask> }, nil},
<mask> {"verbose", "v", "enable verbose output", nil, func() { o.verbose = true }},
<mask> {"help", "", "print this help", nil, func() {
<mask> printHelp()
<mask> os.Exit(64)
<mask> }},
<mask> }
</s> + app: add '--pidfile FILE' command-line parameter </s> add if len(args.pidFile) != 0 && writePIDFile(args.pidFile) {
pidFileName = args.pidFile
}
</s> add pidFile string // File name to save PID to </s> add // Write PID to a file
func writePIDFile(fn string) bool {
data := fmt.Sprintf("%d", os.Getpid())
err := ioutil.WriteFile(fn, []byte(data), 0644)
if err != nil {
log.Error("Couldn't write PID to file %s: %v", fn, err)
return false
}
return true
}
</s> add // This function is called before application exits
func cleanupAlways() {
if len(pidFileName) != 0 {
os.Remove(pidFileName)
}
}
</s> remove os.Exit(1)
</s> add </s> add cleanupAlways()
|
https://github.com/AdguardTeam/AdGuardHome/commit/7746a3e6a9f204e7b7ab498c2f484cf426fb1a18
|
app.go
|
keep keep keep add keep keep keep keep
|
<mask> // Stop stops the program
<mask> func (p *program) Stop(s service.Service) error {
<mask> // Stop should not block. Return with a few seconds.
<mask> cleanup()
<mask> os.Exit(0)
<mask> return nil
<mask> }
<mask>
</s> + app: add '--pidfile FILE' command-line parameter </s> add // Write PID to a file
func writePIDFile(fn string) bool {
data := fmt.Sprintf("%d", os.Getpid())
err := ioutil.WriteFile(fn, []byte(data), 0644)
if err != nil {
log.Error("Couldn't write PID to file %s: %v", fn, err)
return false
}
return true
}
</s> add cleanupAlways() </s> add // This function is called before application exits
func cleanupAlways() {
if len(pidFileName) != 0 {
os.Remove(pidFileName)
}
}
</s> remove os.Exit(1)
</s> add </s> add cleanupAlways() </s> add var pidFileName string // PID file name. Empty if no PID file was created.
|
https://github.com/AdguardTeam/AdGuardHome/commit/7746a3e6a9f204e7b7ab498c2f484cf426fb1a18
|
service.go
|
keep keep keep add keep keep keep keep keep keep
|
<mask>
<mask> // WriteDiskConfig - write configuration
<mask> func (clients *clientsContainer) WriteDiskConfig(objects *[]clientObject) {
<mask> clients.lock.Lock()
<mask> for _, cli := range clients.list {
<mask> cy := clientObject{
<mask> Name: cli.Name,
<mask> UseGlobalSettings: !cli.UseOwnSettings,
<mask> FilteringEnabled: cli.FilteringEnabled,
<mask> ParentalEnabled: cli.ParentalEnabled,
</s> Prevent spurious diffs in config file by sorting Client objects before writing </s> remove clients.lock.Unlock()
</s> add // Maps aren't guaranteed to iterate in the same order each time, so the
// above loop can generate different orderings when writing to the
// config file: this produces lots of diffs in config files, so sort
// objects by name before writing.
sort.Slice(clientObjects, func(i, j int) bool {
return clientObjects[i].Name < clientObjects[j].Name
})
*objects = append(*objects, clientObjects...) </s> remove *objects = append(*objects, cy)
</s> add clientObjects = append(clientObjects, cy)
|
https://github.com/AdguardTeam/AdGuardHome/commit/774937728b13aba0a1c7e7b8acaea9edb362926a
|
internal/home/clients.go
|
keep keep replace keep replace keep
|
<mask> cy.Upstreams = stringutil.CloneSlice(cli.Upstreams)
<mask>
<mask> *objects = append(*objects, cy)
<mask> }
<mask> clients.lock.Unlock()
<mask> }
</s> Prevent spurious diffs in config file by sorting Client objects before writing </s> add defer clients.lock.Unlock()
clientObjects := []clientObject{}
|
https://github.com/AdguardTeam/AdGuardHome/commit/774937728b13aba0a1c7e7b8acaea9edb362926a
|
internal/home/clients.go
|
keep keep keep keep replace replace replace replace replace keep keep keep keep keep
|
<mask> // Duration: "1h1m", time.Duration: "1h1m0s"
<mask> //
<mask> func (d Duration) String() (str string) {
<mask> str = d.Duration.String()
<mask> secs := d.Seconds()
<mask> var secsInt int
<mask> if secsInt = int(secs); float64(secsInt) != secs || secsInt%60 != 0 {
<mask> return str
<mask> }
<mask>
<mask> const (
<mask> tailMin = len(`0s`)
<mask> tailMinSec = len(`0m0s`)
<mask> )
</s> Pull request: Fix duration
Merge in DNS/adguard-home from fix-duration to master
Squashed commit of the following:
commit b6d960076e6263718ec612bc7a998c48fb92079f
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:24:37 2021 +0300
home: imp docs & fmt
commit b3d1e5dbbb9c9abe92b10a51cc1f8d7afee73e12
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:16:20 2021 +0300
home: fix duration </s> remove return str[:len(str)-tailMinSec]
</s> add default:
return str[:len(str)-tailMinSec]
} </s> remove if (secsInt%3600)/60 != 0 {
</s> add switch rounded := d.Duration / time.Second; {
case
rounded == 0,
rounded*time.Second != d.Duration,
rounded%60 != 0:
// Return the uncutted value if it's either equal to zero or has
// fractions of a second or even whole seconds in it.
return str
case (rounded%secsInHour)/minsInHour != 0: </s> remove }
</s> add </s> add }, {
name: "0s",
val: 0, </s> add secsInHour = time.Hour / time.Second
minsInHour = time.Hour / time.Minute
|
https://github.com/AdguardTeam/AdGuardHome/commit/77821ec8168f73cb68684b9ec06b9613889dfb65
|
internal/home/duration.go
|
keep add keep keep keep keep keep
|
<mask> tailMin = len(`0s`)
<mask> tailMinSec = len(`0m0s`)
<mask> )
<mask>
<mask> switch rounded := d.Duration / time.Second; {
<mask> case
<mask> rounded == 0,
</s> Pull request: Fix duration
Merge in DNS/adguard-home from fix-duration to master
Squashed commit of the following:
commit b6d960076e6263718ec612bc7a998c48fb92079f
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:24:37 2021 +0300
home: imp docs & fmt
commit b3d1e5dbbb9c9abe92b10a51cc1f8d7afee73e12
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:16:20 2021 +0300
home: fix duration </s> remove if (secsInt%3600)/60 != 0 {
</s> add switch rounded := d.Duration / time.Second; {
case
rounded == 0,
rounded*time.Second != d.Duration,
rounded%60 != 0:
// Return the uncutted value if it's either equal to zero or has
// fractions of a second or even whole seconds in it.
return str
case (rounded%secsInHour)/minsInHour != 0: </s> remove secs := d.Seconds()
var secsInt int
if secsInt = int(secs); float64(secsInt) != secs || secsInt%60 != 0 {
return str
}
</s> add </s> add }, {
name: "0s",
val: 0, </s> remove }
</s> add </s> remove return str[:len(str)-tailMinSec]
</s> add default:
return str[:len(str)-tailMinSec]
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/77821ec8168f73cb68684b9ec06b9613889dfb65
|
internal/home/duration.go
|
keep keep replace keep replace keep keep keep
|
<mask> )
<mask>
<mask> if (secsInt%3600)/60 != 0 {
<mask> return str[:len(str)-tailMin]
<mask> }
<mask>
<mask> return str[:len(str)-tailMinSec]
<mask> }
</s> Pull request: Fix duration
Merge in DNS/adguard-home from fix-duration to master
Squashed commit of the following:
commit b6d960076e6263718ec612bc7a998c48fb92079f
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:24:37 2021 +0300
home: imp docs & fmt
commit b3d1e5dbbb9c9abe92b10a51cc1f8d7afee73e12
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:16:20 2021 +0300
home: fix duration </s> remove return str[:len(str)-tailMinSec]
</s> add default:
return str[:len(str)-tailMinSec]
} </s> remove secs := d.Seconds()
var secsInt int
if secsInt = int(secs); float64(secsInt) != secs || secsInt%60 != 0 {
return str
}
</s> add </s> add secsInHour = time.Hour / time.Second
minsInHour = time.Hour / time.Minute </s> add }, {
name: "0s",
val: 0,
|
https://github.com/AdguardTeam/AdGuardHome/commit/77821ec8168f73cb68684b9ec06b9613889dfb65
|
internal/home/duration.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> if (secsInt%3600)/60 != 0 {
<mask> return str[:len(str)-tailMin]
<mask> }
<mask>
<mask> return str[:len(str)-tailMinSec]
<mask> }
<mask>
<mask> // MarshalText implements the encoding.TextMarshaler interface for Duration.
<mask> func (d Duration) MarshalText() (text []byte, err error) {
<mask> return []byte(d.String()), nil
</s> Pull request: Fix duration
Merge in DNS/adguard-home from fix-duration to master
Squashed commit of the following:
commit b6d960076e6263718ec612bc7a998c48fb92079f
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:24:37 2021 +0300
home: imp docs & fmt
commit b3d1e5dbbb9c9abe92b10a51cc1f8d7afee73e12
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:16:20 2021 +0300
home: fix duration </s> remove }
</s> add </s> remove secs := d.Seconds()
var secsInt int
if secsInt = int(secs); float64(secsInt) != secs || secsInt%60 != 0 {
return str
}
</s> add </s> remove if (secsInt%3600)/60 != 0 {
</s> add switch rounded := d.Duration / time.Second; {
case
rounded == 0,
rounded*time.Second != d.Duration,
rounded%60 != 0:
// Return the uncutted value if it's either equal to zero or has
// fractions of a second or even whole seconds in it.
return str
case (rounded%secsInHour)/minsInHour != 0: </s> add }, {
name: "0s",
val: 0, </s> add secsInHour = time.Hour / time.Second
minsInHour = time.Hour / time.Minute
|
https://github.com/AdguardTeam/AdGuardHome/commit/77821ec8168f73cb68684b9ec06b9613889dfb65
|
internal/home/duration.go
|
keep keep add keep keep keep keep
|
<mask> }, {
<mask> name: "1m1.001s",
<mask> val: time.Minute + time.Second + time.Millisecond,
<mask> }}
<mask>
<mask> for _, tc := range testCases {
<mask> t.Run(tc.name, func(t *testing.T) {
</s> Pull request: Fix duration
Merge in DNS/adguard-home from fix-duration to master
Squashed commit of the following:
commit b6d960076e6263718ec612bc7a998c48fb92079f
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:24:37 2021 +0300
home: imp docs & fmt
commit b3d1e5dbbb9c9abe92b10a51cc1f8d7afee73e12
Author: Eugene Burkov <[email protected]>
Date: Fri Aug 27 15:16:20 2021 +0300
home: fix duration </s> add secsInHour = time.Hour / time.Second
minsInHour = time.Hour / time.Minute </s> remove secs := d.Seconds()
var secsInt int
if secsInt = int(secs); float64(secsInt) != secs || secsInt%60 != 0 {
return str
}
</s> add </s> remove return str[:len(str)-tailMinSec]
</s> add default:
return str[:len(str)-tailMinSec]
} </s> remove if (secsInt%3600)/60 != 0 {
</s> add switch rounded := d.Duration / time.Second; {
case
rounded == 0,
rounded*time.Second != d.Duration,
rounded%60 != 0:
// Return the uncutted value if it's either equal to zero or has
// fractions of a second or even whole seconds in it.
return str
case (rounded%secsInHour)/minsInHour != 0: </s> remove }
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/77821ec8168f73cb68684b9ec06b9613889dfb65
|
internal/home/duration_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> go 1.17
<mask>
<mask> require (
<mask> github.com/AdguardTeam/dnsproxy v0.41.4
<mask> github.com/AdguardTeam/golibs v0.10.6
<mask> github.com/AdguardTeam/urlfilter v0.15.2
<mask> github.com/NYTimes/gziphandler v1.1.1
<mask> github.com/ameshkov/dnscrypt/v2 v2.2.3
<mask> github.com/digineo/go-ipset/v2 v2.2.1
<mask> github.com/fsnotify/fsnotify v1.5.1
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove github.com/AdguardTeam/golibs v0.10.6 h1:6UG6LxWFnG7TfjNzeApw+T68Kqqov0fcDYk9RjhTdhc=
</s> add </s> add github.com/AdguardTeam/golibs v0.10.8 h1:diU9gP9qG1qeLbAkzIwfUerpHSqzR6zaBgzvRMR/m6Q=
github.com/AdguardTeam/golibs v0.10.8/go.mod h1:rSfQRGHIdgfxriDDNgNJ7HmE5zRoURq8R+VdR81Zuzw= </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> add want: assert.False, </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add var err error
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
go.mod
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> github.com/AdguardTeam/dnsproxy v0.41.4/go.mod h1:GCdEbTw683vBqksJIccPSYzBg2yIFbRiDnXltyIinug=
<mask> github.com/AdguardTeam/golibs v0.4.0/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/AdguardTeam/golibs v0.4.2/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/AdguardTeam/golibs v0.10.4/go.mod h1:rSfQRGHIdgfxriDDNgNJ7HmE5zRoURq8R+VdR81Zuzw=
<mask> github.com/AdguardTeam/golibs v0.10.6 h1:6UG6LxWFnG7TfjNzeApw+T68Kqqov0fcDYk9RjhTdhc=
<mask> github.com/AdguardTeam/golibs v0.10.6/go.mod h1:rSfQRGHIdgfxriDDNgNJ7HmE5zRoURq8R+VdR81Zuzw=
<mask> github.com/AdguardTeam/gomitmproxy v0.2.0/go.mod h1:Qdv0Mktnzer5zpdpi5rAwixNJzW2FN91LjKJCkVbYGU=
<mask> github.com/AdguardTeam/urlfilter v0.15.2 h1:LZGgrm4l4Ys9eAqB+UUmZfiC6vHlDlYFhx0WXqo6LtQ=
<mask> github.com/AdguardTeam/urlfilter v0.15.2/go.mod h1:46YZDOV1+qtdRDuhZKVPSSp7JWWes0KayqHrKAFBdEI=
<mask> github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> add github.com/AdguardTeam/golibs v0.10.8 h1:diU9gP9qG1qeLbAkzIwfUerpHSqzR6zaBgzvRMR/m6Q=
github.com/AdguardTeam/golibs v0.10.8/go.mod h1:rSfQRGHIdgfxriDDNgNJ7HmE5zRoURq8R+VdR81Zuzw= </s> remove github.com/AdguardTeam/golibs v0.10.6
</s> add github.com/AdguardTeam/golibs v0.10.8 </s> remove want: true,
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add var err error </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
go.sum
|
keep keep add keep keep keep keep keep
|
<mask> github.com/AdguardTeam/golibs v0.4.2/go.mod h1:skKsDKIBB7kkFflLJBpfGX+G8QFTx0WKUzB6TIgtUj4=
<mask> github.com/AdguardTeam/golibs v0.10.4/go.mod h1:rSfQRGHIdgfxriDDNgNJ7HmE5zRoURq8R+VdR81Zuzw=
<mask> github.com/AdguardTeam/golibs v0.10.6/go.mod h1:rSfQRGHIdgfxriDDNgNJ7HmE5zRoURq8R+VdR81Zuzw=
<mask> github.com/AdguardTeam/gomitmproxy v0.2.0/go.mod h1:Qdv0Mktnzer5zpdpi5rAwixNJzW2FN91LjKJCkVbYGU=
<mask> github.com/AdguardTeam/urlfilter v0.15.2 h1:LZGgrm4l4Ys9eAqB+UUmZfiC6vHlDlYFhx0WXqo6LtQ=
<mask> github.com/AdguardTeam/urlfilter v0.15.2/go.mod h1:46YZDOV1+qtdRDuhZKVPSSp7JWWes0KayqHrKAFBdEI=
<mask> github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
<mask> github.com/BurntSushi/toml v0.4.1 h1:GaI7EiDXDRfa8VshkTj7Fym7ha+y8/XxIgD2okUIjLw=
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove github.com/AdguardTeam/golibs v0.10.6 h1:6UG6LxWFnG7TfjNzeApw+T68Kqqov0fcDYk9RjhTdhc=
</s> add </s> remove github.com/AdguardTeam/golibs v0.10.6
</s> add github.com/AdguardTeam/golibs v0.10.8 </s> remove want: true,
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add var err error </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
go.sum
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> if ip, _ = netutil.IPAndPortFromAddr(dctx.proxyCtx.Addr); ip == nil {
<mask> return rc
<mask> }
<mask>
<mask> dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
<mask>
<mask> return rc
<mask> }
<mask>
<mask> // hostToIP tries to get an IP leased by DHCP and returns the copy of address
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add </s> add if ip == nil {
continue
}
</s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask>
<mask> // Restrict an access to local addresses for external clients. We also
<mask> // assume that all the DHCP leases we give are locally-served or at least
<mask> // don't need to be inaccessible externally.
<mask> if !s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> log.Debug("dns: addr %s is not from locally-served network", ip)
<mask>
<mask> return resultCodeSuccess
<mask> }
<mask>
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> add // PrivateNets is the set of IP networks for which the private reverse DNS
// resolver should be used.
PrivateNets []string `yaml:"private_networks"`
</s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add </s> remove dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
</s> add dctx.isLocalClient = s.privateNets.Contains(ip) </s> remove if !lnc.IsLocallyServedNetwork(subnet.IP) {
</s> add if !privateNets.Contains(subnet.IP) { </s> add if ip == nil {
continue
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask>
<mask> s.serverLock.RLock()
<mask> defer s.serverLock.RUnlock()
<mask>
<mask> if !s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> if s.conf.UsePrivateRDNS {
<mask> s.recDetector.add(*d.Req)
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) { </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> remove err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, snd)
</s> add err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, privateNets) </s> remove err = req.validate(s.subnetDetector)
</s> add err = req.validate(s.privateNets)
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> import (
<mask> "net"
<mask> "testing"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/miekg/dns"
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> add "github.com/AdguardTeam/golibs/netutil" </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove github.com/AdguardTeam/golibs v0.10.6
</s> add github.com/AdguardTeam/golibs v0.10.8
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep add keep keep keep keep
|
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> add "github.com/AdguardTeam/golibs/netutil" </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep replace replace keep replace keep keep keep
|
<mask>
<mask> func TestServer_ProcessDetermineLocal(t *testing.T) {
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask> s := &Server{
<mask> subnetDetector: snd,
<mask> }
<mask>
<mask> testCases := []struct {
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add ss := netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove var err error
srv.subnetDetector, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add srv.privateNets = netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove err = ValidateUpstreamsPrivate(set, snd)
</s> add err := ValidateUpstreamsPrivate(set, ss)
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep add keep keep keep keep
|
<mask> }
<mask>
<mask> testCases := []struct {
<mask> name string
<mask> cliIP net.IP
<mask> }{{
<mask> want: assert.True,
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove want bool
</s> add </s> add want: assert.True, </s> remove subnetDetector: snd,
</s> add privateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add ss := netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> remove var err error
srv.subnetDetector, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add srv.privateNets = netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> add want: assert.False,
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask>
<mask> testCases := []struct {
<mask> name string
<mask> cliIP net.IP
<mask> want bool
<mask> }{{
<mask> name: "local",
<mask> cliIP: net.IP{192, 168, 0, 1},
<mask> want: true,
<mask> }, {
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> add want: assert.True, </s> remove want: true,
</s> add </s> add want: assert.False, </s> add want assert.BoolAssertionFunc </s> remove want: false,
</s> add }, {
want: assert.False,
name: "invalid",
cliIP: net.IP{1, 2, 3, 4, 5},
}, {
want: assert.False,
name: "nil",
cliIP: nil, </s> remove var err error
srv.subnetDetector, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add srv.privateNets = netutil.SubnetSetFunc(netutil.IsLocallyServed)
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep keep add keep keep keep keep keep
|
<mask> want assert.BoolAssertionFunc
<mask> name string
<mask> cliIP net.IP
<mask> }{{
<mask> name: "local",
<mask> cliIP: net.IP{192, 168, 0, 1},
<mask> }, {
<mask> want: assert.False,
<mask> name: "external",
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove want bool
</s> add </s> add want: assert.False, </s> remove want: true,
</s> add </s> remove want: false,
</s> add }, {
want: assert.False,
name: "invalid",
cliIP: net.IP{1, 2, 3, 4, 5},
}, {
want: assert.False,
name: "nil",
cliIP: nil, </s> add want assert.BoolAssertionFunc </s> remove var err error
srv.subnetDetector, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add srv.privateNets = netutil.SubnetSetFunc(netutil.IsLocallyServed)
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> want bool
<mask> }{{
<mask> name: "local",
<mask> cliIP: net.IP{192, 168, 0, 1},
<mask> want: true,
<mask> }, {
<mask> name: "external",
<mask> cliIP: net.IP{250, 249, 0, 1},
<mask> want: false,
<mask> }}
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> add want: assert.False, </s> add want: assert.True, </s> remove want bool
</s> add </s> remove want: false,
</s> add }, {
want: assert.False,
name: "invalid",
cliIP: net.IP{1, 2, 3, 4, 5},
}, {
want: assert.False,
name: "nil",
cliIP: nil, </s> add want assert.BoolAssertionFunc </s> remove var err error
srv.subnetDetector, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add srv.privateNets = netutil.SubnetSetFunc(netutil.IsLocallyServed)
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep keep add keep keep keep keep keep
|
<mask> want: assert.True,
<mask> name: "local",
<mask> cliIP: net.IP{192, 168, 0, 1},
<mask> }, {
<mask> name: "external",
<mask> cliIP: net.IP{250, 249, 0, 1},
<mask> }, {
<mask> want: assert.False,
<mask> name: "invalid",
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove want: true,
</s> add </s> add want: assert.True, </s> remove want: false,
</s> add }, {
want: assert.False,
name: "invalid",
cliIP: net.IP{1, 2, 3, 4, 5},
}, {
want: assert.False,
name: "nil",
cliIP: nil, </s> remove want bool
</s> add </s> add want assert.BoolAssertionFunc </s> remove var err error
srv.subnetDetector, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add srv.privateNets = netutil.SubnetSetFunc(netutil.IsLocallyServed)
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> want: true,
<mask> }, {
<mask> name: "external",
<mask> cliIP: net.IP{250, 249, 0, 1},
<mask> want: false,
<mask> }}
<mask>
<mask> for _, tc := range testCases {
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> proxyCtx := &proxy.DNSContext{
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove want: true,
</s> add </s> add want: assert.False, </s> remove want bool
</s> add </s> add want: assert.True, </s> remove err = ValidateUpstreamsPrivate(set, snd)
</s> add err := ValidateUpstreamsPrivate(set, ss) </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> proxyCtx: proxyCtx,
<mask> }
<mask> s.processDetermineLocal(dctx)
<mask>
<mask> assert.Equal(t, tc.want, dctx.isLocalClient)
<mask> })
<mask> }
<mask> }
<mask>
<mask> func TestServer_ProcessInternalHosts_localRestriction(t *testing.T) {
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add ss := netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add </s> remove err = ValidateUpstreamsPrivate(set, snd)
</s> add err := ValidateUpstreamsPrivate(set, ss) </s> remove subnetDetector: snd,
</s> add privateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dns_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> // must be a valid domain name plus dots on each side.
<mask> localDomainSuffix string
<mask>
<mask> ipset ipsetCtx
<mask> subnetDetector *aghnet.SubnetDetector
<mask> localResolvers *proxy.Proxy
<mask> sysResolvers aghnet.SystemResolvers
<mask> recDetector *recursionDetector
<mask>
<mask> // anonymizer masks the client's IP addresses if needed.
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> add // PrivateNets is the set of IP networks for which the private reverse DNS
// resolver should be used.
PrivateNets []string `yaml:"private_networks"`
</s> remove DNSFilter *filtering.DNSFilter
Stats stats.Stats
QueryLog querylog.QueryLog
DHCPServer dhcpd.ServerInterface
SubnetDetector *aghnet.SubnetDetector
Anonymizer *aghnet.IPMut
LocalDomain string
</s> add DNSFilter *filtering.DNSFilter
Stats stats.Stats
QueryLog querylog.QueryLog
DHCPServer dhcpd.ServerInterface
PrivateNets netutil.SubnetSet
Anonymizer *aghnet.IPMut
LocalDomain string </s> remove subnetDetector *aghnet.SubnetDetector
</s> add </s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward.go
|
keep keep keep keep replace replace replace replace replace replace replace keep keep keep keep keep
|
<mask> const defaultLocalDomainSuffix = ".lan."
<mask>
<mask> // DNSCreateParams are parameters to create a new server.
<mask> type DNSCreateParams struct {
<mask> DNSFilter *filtering.DNSFilter
<mask> Stats stats.Stats
<mask> QueryLog querylog.QueryLog
<mask> DHCPServer dhcpd.ServerInterface
<mask> SubnetDetector *aghnet.SubnetDetector
<mask> Anonymizer *aghnet.IPMut
<mask> LocalDomain string
<mask> }
<mask>
<mask> // domainNameToSuffix converts a domain name into a local domain suffix.
<mask> func domainNameToSuffix(tld string) (suffix string) {
<mask> l := len(tld) + 2
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove subnetDetector *aghnet.SubnetDetector
</s> add privateNets netutil.SubnetSet </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add </s> remove if !lnc.IsLocallyServedNetwork(subnet.IP) {
</s> add if !privateNets.Contains(subnet.IP) { </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> add if ip == nil {
continue
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> s = &Server{
<mask> dnsFilter: p.DNSFilter,
<mask> stats: p.Stats,
<mask> queryLog: p.QueryLog,
<mask> subnetDetector: p.SubnetDetector,
<mask> localDomainSuffix: localDomainSuffix,
<mask> recDetector: newRecursionDetector(recursionTTL, cachedRecurrentReqNum),
<mask> clientIDCache: cache.New(cache.Config{
<mask> EnableLRU: true,
<mask> MaxCount: defaultClientIDCacheCount,
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add </s> remove subnetDetector: snd,
</s> add privateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove want bool
</s> add </s> remove want: true,
</s> add </s> remove want: false,
</s> add }, {
want: assert.False,
name: "invalid",
cliIP: net.IP{1, 2, 3, 4, 5},
}, {
want: assert.False,
name: "nil",
cliIP: nil, </s> remove DHCPServer: &testDHCP{},
DNSFilter: flt,
SubnetDetector: snd,
</s> add DHCPServer: &testDHCP{},
DNSFilter: flt,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed),
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> StartTime: time.Now(),
<mask> }
<mask>
<mask> resolver := s.internalProxy
<mask> if s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> if !s.conf.UsePrivateRDNS {
<mask> return "", nil
<mask> }
<mask>
<mask> resolver = s.localResolvers
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> remove dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
</s> add dctx.isLocalClient = s.privateNets.Contains(ip) </s> remove err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, snd)
</s> add err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, privateNets) </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> remove err = req.validate(s.subnetDetector)
</s> add err = req.validate(s.privateNets) </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward.go
|
keep keep add keep keep keep keep keep
|
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/testutil"
<mask> "github.com/AdguardTeam/golibs/timeutil"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> add "github.com/AdguardTeam/golibs/netutil" </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward_test.go
|
keep keep replace replace replace replace keep replace replace replace keep keep keep
|
<mask> f.SetEnabled(true)
<mask>
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask> require.NotNil(t, snd)
<mask>
<mask> s, err = NewServer(DNSCreateParams{
<mask> DHCPServer: &testDHCP{},
<mask> DNSFilter: f,
<mask> SubnetDetector: snd,
<mask> })
<mask> require.NoError(t, err)
<mask>
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed),
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward_test.go
|
keep keep keep replace replace replace replace keep replace replace replace replace replace keep keep keep keep
|
<mask> Data: []byte(rules),
<mask> }}
<mask>
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask> require.NotNil(t, snd)
<mask>
<mask> f := filtering.New(&filtering.Config{}, filters)
<mask> var s *Server
<mask> s, err = NewServer(DNSCreateParams{
<mask> DHCPServer: &testDHCP{},
<mask> DNSFilter: f,
<mask> SubnetDetector: snd,
<mask> })
<mask> require.NoError(t, err)
<mask>
<mask> conf := &ServerConfig{
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add var err error </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed),
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward_test.go
|
keep keep keep keep replace replace replace replace replace replace replace replace replace keep keep keep keep keep
|
<mask> }
<mask> f := filtering.New(c, nil)
<mask> f.SetEnabled(true)
<mask>
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask> require.NotNil(t, snd)
<mask>
<mask> var s *Server
<mask> s, err = NewServer(DNSCreateParams{
<mask> DHCPServer: &testDHCP{},
<mask> DNSFilter: f,
<mask> SubnetDetector: snd,
<mask> })
<mask> require.NoError(t, err)
<mask>
<mask> assert.NoError(t, s.Prepare(&ServerConfig{
<mask> UDPListenAddrs: []*net.UDPAddr{{}},
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add var err error </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add </s> remove var snd *aghnet.SubnetDetector
snd, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add </s> remove DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed),
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward_test.go
|
keep keep keep keep replace replace replace replace replace replace replace replace replace keep keep keep keep keep
|
<mask>
<mask> func (d *testDHCP) SetOnLeaseChanged(onLeaseChanged dhcpd.OnLeaseChangedT) {}
<mask>
<mask> func TestPTRResponseFromDHCPLeases(t *testing.T) {
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask> require.NotNil(t, snd)
<mask>
<mask> var s *Server
<mask> s, err = NewServer(DNSCreateParams{
<mask> DNSFilter: filtering.New(&filtering.Config{}, nil),
<mask> DHCPServer: &testDHCP{},
<mask> SubnetDetector: snd,
<mask> })
<mask> require.NoError(t, err)
<mask>
<mask> s.conf.UDPListenAddrs = []*net.UDPAddr{{}}
<mask> s.conf.TCPListenAddrs = []*net.TCPAddr{{}}
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove DHCPServer: &testDHCP{},
DNSFilter: flt,
SubnetDetector: snd,
</s> add DHCPServer: &testDHCP{},
DNSFilter: flt,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add </s> remove var snd *aghnet.SubnetDetector
snd, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward_test.go
|
keep keep replace replace replace replace replace keep keep replace replace replace keep keep keep
|
<mask> flt.SetEnabled(true)
<mask>
<mask> var snd *aghnet.SubnetDetector
<mask> snd, err = aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask> require.NotNil(t, snd)
<mask>
<mask> var s *Server
<mask> s, err = NewServer(DNSCreateParams{
<mask> DHCPServer: &testDHCP{},
<mask> DNSFilter: flt,
<mask> SubnetDetector: snd,
<mask> })
<mask> require.NoError(t, err)
<mask>
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add var err error </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward_test.go
|
keep keep keep keep replace replace replace keep keep keep keep keep
|
<mask> })
<mask> srv.conf.ResolveClients = true
<mask> srv.conf.UsePrivateRDNS = true
<mask>
<mask> var err error
<mask> srv.subnetDetector, err = aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask>
<mask> localIP := net.IP{192, 168, 1, 1}
<mask> testCases := []struct {
<mask> name string
<mask> want string
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove want bool
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add ss := netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> add want assert.BoolAssertionFunc </s> remove subnetDetector: snd,
</s> add privateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> add want: assert.True, </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add var err error
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/dnsforward_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> import (
<mask> "net"
<mask> "testing"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/netutil"
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> add "github.com/AdguardTeam/golibs/netutil" </s> add "github.com/AdguardTeam/golibs/netutil" </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove github.com/AdguardTeam/golibs v0.10.6
</s> add github.com/AdguardTeam/golibs v0.10.8
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/filter_test.go
|
keep replace replace replace replace keep replace replace replace keep keep keep
|
<mask>
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask> require.NotNil(t, snd)
<mask>
<mask> s, err := NewServer(DNSCreateParams{
<mask> DHCPServer: &testDHCP{},
<mask> DNSFilter: f,
<mask> SubnetDetector: snd,
<mask> })
<mask> require.NoError(t, err)
<mask>
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add var err error </s> remove var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed),
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/filter_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> "strings"
<mask> "time"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghhttp"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/AdguardTeam/golibs/errors"
<mask> "github.com/AdguardTeam/golibs/log"
<mask> "github.com/AdguardTeam/golibs/netutil"
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove Context.subnetDetector, err = aghnet.NewSubnetDetector()
fatalOnError(err)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> return nil
<mask> }
<mask>
<mask> // validate returns an error if any field of req is invalid.
<mask> func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
<mask> if req.Upstreams != nil {
<mask> err = ValidateUpstreams(*req.Upstreams)
<mask> if err != nil {
<mask> return fmt.Errorf("validating upstream servers: %w", err)
<mask> }
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, snd)
</s> add err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, privateNets) </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> remove err = req.validate(s.subnetDetector)
</s> add err = req.validate(s.privateNets) </s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add </s> remove dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
</s> add dctx.isLocalClient = s.privateNets.Contains(ip) </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> }
<mask> }
<mask>
<mask> if req.LocalPTRUpstreams != nil {
<mask> err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, snd)
<mask> if err != nil {
<mask> return fmt.Errorf("validating private upstream servers: %w", err)
<mask> }
<mask> }
<mask>
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> remove err = req.validate(s.subnetDetector)
</s> add err = req.validate(s.privateNets) </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) { </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> remove DNSFilter: Context.dnsFilter,
Stats: Context.stats,
QueryLog: Context.queryLog,
SubnetDetector: Context.subnetDetector,
Anonymizer: anonymizer,
LocalDomain: config.DHCP.LocalDomainName,
</s> add DNSFilter: Context.dnsFilter,
Stats: Context.stats,
QueryLog: Context.queryLog,
PrivateNets: privateNets,
Anonymizer: anonymizer,
LocalDomain: config.DHCP.LocalDomainName,
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask>
<mask> return
<mask> }
<mask>
<mask> err = req.validate(s.subnetDetector)
<mask> if err != nil {
<mask> aghhttp.Error(r, w, http.StatusBadRequest, "%s", err)
<mask>
<mask> return
<mask> }
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, snd)
</s> add err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, privateNets) </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) { </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> remove dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
</s> add dctx.isLocalClient = s.privateNets.Contains(ip) </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http.go
|
keep keep keep keep replace replace replace replace replace replace replace replace replace replace replace keep keep keep keep keep
|
<mask> func IsCommentOrEmpty(s string) (ok bool) {
<mask> return len(s) == 0 || s[0] == '#'
<mask> }
<mask>
<mask> // LocalNetChecker is used to check if the IP address belongs to a local
<mask> // network.
<mask> type LocalNetChecker interface {
<mask> // IsLocallyServedNetwork returns true if ip is contained in any of address
<mask> // registries defined by RFC 6303.
<mask> IsLocallyServedNetwork(ip net.IP) (ok bool)
<mask> }
<mask>
<mask> // type check
<mask> var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
<mask>
<mask> // newUpstreamConfig validates upstreams and returns an appropriate upstream
<mask> // configuration or nil if it can't be built.
<mask> //
<mask> // TODO(e.burkov): Perhaps proxy.ParseUpstreamsConfig should validate upstreams
<mask> // slice already so that this function may be considered useless.
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> remove dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
</s> add dctx.isLocalClient = s.privateNets.Contains(ip) </s> add // PrivateNets is the set of IP networks for which the private reverse DNS
// resolver should be used.
PrivateNets []string `yaml:"private_networks"`
</s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> add if ip == nil {
continue
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http.go
|
keep keep keep keep replace replace keep keep keep keep keep
|
<mask>
<mask> // ValidateUpstreamsPrivate validates each upstream and returns an error if any
<mask> // upstream is invalid or if there are no default upstreams specified. It also
<mask> // checks each domain of domain-specific upstreams for being ARPA pointing to
<mask> // a locally-served network. lnc must not be nil.
<mask> func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
<mask> conf, err := newUpstreamConfig(upstreams)
<mask> if err != nil {
<mask> return err
<mask> }
<mask>
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> add // PrivateNets is the set of IP networks for which the private reverse DNS
// resolver should be used.
PrivateNets []string `yaml:"private_networks"`
</s> remove subnetDetector *aghnet.SubnetDetector
</s> add privateNets netutil.SubnetSet </s> remove dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
</s> add dctx.isLocalClient = s.privateNets.Contains(ip)
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask>
<mask> continue
<mask> }
<mask>
<mask> if !lnc.IsLocallyServedNetwork(subnet.IP) {
<mask> errs = append(
<mask> errs,
<mask> fmt.Errorf("arpa domain %q should point to a locally-served network", domain),
<mask> )
<mask> }
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> add if ip == nil {
continue
}
</s> remove DNSFilter *filtering.DNSFilter
Stats stats.Stats
QueryLog querylog.QueryLog
DHCPServer dhcpd.ServerInterface
SubnetDetector *aghnet.SubnetDetector
Anonymizer *aghnet.IPMut
LocalDomain string
</s> add DNSFilter *filtering.DNSFilter
Stats stats.Stats
QueryLog querylog.QueryLog
DHCPServer dhcpd.ServerInterface
PrivateNets netutil.SubnetSet
Anonymizer *aghnet.IPMut
LocalDomain string </s> add // PrivateNets is the set of IP networks for which the private reverse DNS
// resolver should be used.
PrivateNets []string `yaml:"private_networks"`
</s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http.go
|
keep keep add keep keep keep keep keep
|
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/filtering"
<mask> "github.com/AdguardTeam/golibs/testutil"
<mask> "github.com/stretchr/testify/assert"
<mask> "github.com/stretchr/testify/require"
<mask> )
<mask>
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> add "github.com/AdguardTeam/golibs/netutil" </s> add "github.com/AdguardTeam/golibs/netutil" </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add </s> remove "github.com/AdguardTeam/AdGuardHome/internal/aghnet"
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http_test.go
|
keep keep keep keep replace replace keep keep keep keep keep
|
<mask> }
<mask> }
<mask>
<mask> func TestValidateUpstreamsPrivate(t *testing.T) {
<mask> snd, err := aghnet.NewSubnetDetector()
<mask> require.NoError(t, err)
<mask>
<mask> testCases := []struct {
<mask> name string
<mask> wantErr string
<mask> u string
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove subnetDetector: snd,
</s> add privateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove var err error
srv.subnetDetector, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add srv.privateNets = netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add </s> add want assert.BoolAssertionFunc </s> remove want bool
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed),
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http_test.go
|
keep keep keep keep replace keep keep keep keep
|
<mask> for _, tc := range testCases {
<mask> set := []string{"192.168.0.1", tc.u}
<mask>
<mask> t.Run(tc.name, func(t *testing.T) {
<mask> err = ValidateUpstreamsPrivate(set, snd)
<mask> testutil.AssertErrorMsg(t, tc.wantErr, err)
<mask> })
<mask> }
<mask> }
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove want: false,
</s> add }, {
want: assert.False,
name: "invalid",
cliIP: net.IP{1, 2, 3, 4, 5},
}, {
want: assert.False,
name: "nil",
cliIP: nil, </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> add if ip == nil {
continue
}
</s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add ss := netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> remove subnetDetector: snd,
</s> add privateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed),
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/dnsforward/http_test.go
|
keep add keep keep keep keep keep
|
<mask> ResolveClients bool `yaml:"resolve_clients"`
<mask>
<mask> // UsePrivateRDNS defines if the PTR requests for unknown addresses from
<mask> // locally-served networks should be resolved via private PTR resolvers.
<mask> UsePrivateRDNS bool `yaml:"use_private_ptr_resolvers"`
<mask>
<mask> // LocalPTRResolvers is the slice of addresses to be used as upstreams
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> remove subnetDetector *aghnet.SubnetDetector
</s> add privateNets netutil.SubnetSet </s> add if ip == nil {
continue
}
</s> remove dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
</s> add dctx.isLocalClient = s.privateNets.Contains(ip)
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/home/config.go
|
keep keep keep keep replace replace replace replace replace replace keep keep keep keep keep
|
<mask> filterConf.HTTPRegister = httpRegister
<mask> Context.dnsFilter = filtering.New(&filterConf, nil)
<mask>
<mask> p := dnsforward.DNSCreateParams{
<mask> DNSFilter: Context.dnsFilter,
<mask> Stats: Context.stats,
<mask> QueryLog: Context.queryLog,
<mask> SubnetDetector: Context.subnetDetector,
<mask> Anonymizer: anonymizer,
<mask> LocalDomain: config.DHCP.LocalDomainName,
<mask> }
<mask> if Context.dhcpServer != nil {
<mask> p.DHCPServer = Context.dhcpServer
<mask> }
<mask>
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, snd)
</s> add err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, privateNets) </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> remove err = req.validate(s.subnetDetector)
</s> add err = req.validate(s.privateNets) </s> remove Context.subnetDetector, err = aghnet.NewSubnetDetector()
fatalOnError(err)
</s> add </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DHCPServer: &testDHCP{},
DNSFilter: f,
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove var snd *aghnet.SubnetDetector
snd, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/home/dns.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask>
<mask> if config.DNS.ResolveClients && !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Context.subnetDetector.IsSpecialNetwork(ip) {
<mask> Context.whois.Begin(ip)
<mask> }
<mask> }
<mask>
<mask> func ipsToTCPAddrs(ips []net.IP, port int) (tcpAddrs []*net.TCPAddr) {
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> add if ip == nil {
continue
}
</s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) { </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) { </s> remove if !lnc.IsLocallyServedNetwork(subnet.IP) {
</s> add if !privateNets.Contains(subnet.IP) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/home/dns.go
|
keep keep add keep keep keep keep keep keep
|
<mask>
<mask> const topClientsNumber = 100 // the number of clients to get
<mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) {
<mask> if config.DNS.ResolveClients && !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !netutil.IsSpecialPurpose(ip) {
<mask> Context.whois.Begin(ip)
<mask> }
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> remove dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
</s> add dctx.isLocalClient = s.privateNets.Contains(ip) </s> remove err = ValidateUpstreamsPrivate(set, snd)
</s> add err := ValidateUpstreamsPrivate(set, ss) </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> add // PrivateNets is the set of IP networks for which the private reverse DNS
// resolver should be used.
PrivateNets []string `yaml:"private_networks"`
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/home/dns.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> for _, ip := range Context.stats.GetTopClientsIP(topClientsNumber) {
<mask> if config.DNS.ResolveClients && !ip.IsLoopback() {
<mask> Context.rdns.Begin(ip)
<mask> }
<mask> if !Context.subnetDetector.IsSpecialNetwork(ip) {
<mask> Context.whois.Begin(ip)
<mask> }
<mask> }
<mask>
<mask> return nil
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> add if ip == nil {
continue
}
</s> remove if !Context.subnetDetector.IsSpecialNetwork(ip) {
</s> add if !netutil.IsSpecialPurpose(ip) { </s> remove err = ValidateUpstreamsPrivate(set, snd)
</s> add err := ValidateUpstreamsPrivate(set, ss) </s> remove if s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if s.privateNets.Contains(ip) { </s> remove err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, snd)
</s> add err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, privateNets) </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/home/dns.go
|
keep keep keep keep replace replace keep keep keep keep keep
|
<mask> hostsWatcher aghos.FSWatcher
<mask>
<mask> updater *updater.Updater
<mask>
<mask> subnetDetector *aghnet.SubnetDetector
<mask>
<mask> // mux is our custom http.ServeMux.
<mask> mux *http.ServeMux
<mask>
<mask> // Runtime properties
<mask> // --
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove subnetDetector *aghnet.SubnetDetector
</s> add privateNets netutil.SubnetSet </s> add // PrivateNets is the set of IP networks for which the private reverse DNS
// resolver should be used.
PrivateNets []string `yaml:"private_networks"`
</s> remove // LocalNetChecker is used to check if the IP address belongs to a local
// network.
type LocalNetChecker interface {
// IsLocallyServedNetwork returns true if ip is contained in any of address
// registries defined by RFC 6303.
IsLocallyServedNetwork(ip net.IP) (ok bool)
}
// type check
var _ LocalNetChecker = (*aghnet.SubnetDetector)(nil)
</s> add </s> remove if !s.subnetDetector.IsLocallyServedNetwork(ip) {
</s> add if !s.privateNets.Contains(ip) { </s> remove // a locally-served network. lnc must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, lnc LocalNetChecker) (err error) {
</s> add // a locally-served network. privateNets must not be nil.
func ValidateUpstreamsPrivate(upstreams []string, privateNets netutil.SubnetSet) (err error) { </s> remove DNSFilter *filtering.DNSFilter
Stats stats.Stats
QueryLog querylog.QueryLog
DHCPServer dhcpd.ServerInterface
SubnetDetector *aghnet.SubnetDetector
Anonymizer *aghnet.IPMut
LocalDomain string
</s> add DNSFilter *filtering.DNSFilter
Stats stats.Stats
QueryLog querylog.QueryLog
DHCPServer dhcpd.ServerInterface
PrivateNets netutil.SubnetSet
Anonymizer *aghnet.IPMut
LocalDomain string
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/home/home.go
|
keep keep keep keep replace replace replace keep keep keep keep keep
|
<mask>
<mask> Context.web, err = initWeb(args, clientBuildFS)
<mask> fatalOnError(err)
<mask>
<mask> Context.subnetDetector, err = aghnet.NewSubnetDetector()
<mask> fatalOnError(err)
<mask>
<mask> if !Context.firstRun {
<mask> err = initDNSServer()
<mask> fatalOnError(err)
<mask>
<mask> Context.tls.Start()
</s> Pull request: 3142 custom private subnets
Merge in DNS/adguard-home from 3142-custom-subnets to master
Updates #3142.
Squashed commit of the following:
commit 11469ade75b9dc32ee6d93e3aa35cf79dbaa28b2
Author: Eugene Burkov <[email protected]>
Date: Thu Mar 17 19:56:02 2022 +0300
all: upd golibs, use subnet set </s> remove err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, snd)
</s> add err = ValidateUpstreamsPrivate(*req.LocalPTRUpstreams, privateNets) </s> remove err = req.validate(s.subnetDetector)
</s> add err = req.validate(s.privateNets) </s> remove var err error
srv.subnetDetector, err = aghnet.NewSubnetDetector()
require.NoError(t, err)
</s> add srv.privateNets = netutil.SubnetSetFunc(netutil.IsLocallyServed) </s> remove DNSFilter: Context.dnsFilter,
Stats: Context.stats,
QueryLog: Context.queryLog,
SubnetDetector: Context.subnetDetector,
Anonymizer: anonymizer,
LocalDomain: config.DHCP.LocalDomainName,
</s> add DNSFilter: Context.dnsFilter,
Stats: Context.stats,
QueryLog: Context.queryLog,
PrivateNets: privateNets,
Anonymizer: anonymizer,
LocalDomain: config.DHCP.LocalDomainName, </s> remove snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
require.NotNil(t, snd)
var s *Server
s, err = NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
SubnetDetector: snd,
</s> add s, err := NewServer(DNSCreateParams{
DNSFilter: filtering.New(&filtering.Config{}, nil),
DHCPServer: &testDHCP{},
PrivateNets: netutil.SubnetSetFunc(netutil.IsLocallyServed), </s> remove func (req *dnsConfig) validate(snd *aghnet.SubnetDetector) (err error) {
</s> add func (req *dnsConfig) validate(privateNets netutil.SubnetSet) (err error) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/778585865ebd2234596b8acbe5510bcb96de45fc
|
internal/home/home.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> }
<mask> }
<mask>
<mask> // request was not filtered so let it be processed further
<mask> s.recDetector.add(*req)
<mask> if ctx.err = s.dnsProxy.Resolve(d); ctx.err != nil {
<mask> return resultCodeError
<mask> }
<mask>
<mask> ctx.responseFromUpstream = true
</s> Pull request: 3185 fix recursion vol.2
Merge in DNS/adguard-home from fix-recursion to master
Closes #3185.
Squashed commit of the following:
commit c78650b762163f39b2eb4b10f76f1845913134b2
Author: Eugene Burkov <[email protected]>
Date: Mon May 31 13:12:46 2021 +0300
all: fix changelog
commit e43017a4b6d245f14e1a3bdf735a9c9f03501156
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:39:05 2021 +0300
dnsforward: reduce recursion ttl
commit 79208a82bdad8280c439669413aef8dc7df0a85c
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:29:27 2021 +0300
dnsforward: only check recursion for private rdns
commit 1b8075b086f33e58e273dfcf4168a6ba0473ebae
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:18:11 2021 +0300
dnsforward: rm recursion detecting from upstream </s> remove s.recDetector.add(*req)
</s> add var resolver *proxy.Proxy = s.internalProxy
if s.subnetDetector.IsLocallyServedNetwork(ip) {
if !s.conf.UsePrivateRDNS {
return "", nil
}
resolver = s.localResolvers
s.recDetector.add(*req)
}
</s> remove var resolver *proxy.Proxy = s.localResolvers
if !s.subnetDetector.IsLocallyServedNetwork(ip) {
resolver = s.internalProxy
} else if !s.conf.UsePrivateRDNS {
return "", nil
}
</s> add </s> remove // check checks if the passed req was already sent by s.
</s> add // check checks if the passed req was already sent by the server. </s> remove recursionTTL = 5 * time.Second
</s> add recursionTTL = 1 * time.Second
|
https://github.com/AdguardTeam/AdGuardHome/commit/78d47d88842b51c6a7838e96a2e3d6b18c765e77
|
internal/dnsforward/dns.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> }
<mask>
<mask> const (
<mask> // recursionTTL is the time recursive request is cached for.
<mask> recursionTTL = 5 * time.Second
<mask> // cachedRecurrentReqNum is the maximum number of cached recurrent
<mask> // requests.
<mask> cachedRecurrentReqNum = 1000
<mask> )
<mask>
</s> Pull request: 3185 fix recursion vol.2
Merge in DNS/adguard-home from fix-recursion to master
Closes #3185.
Squashed commit of the following:
commit c78650b762163f39b2eb4b10f76f1845913134b2
Author: Eugene Burkov <[email protected]>
Date: Mon May 31 13:12:46 2021 +0300
all: fix changelog
commit e43017a4b6d245f14e1a3bdf735a9c9f03501156
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:39:05 2021 +0300
dnsforward: reduce recursion ttl
commit 79208a82bdad8280c439669413aef8dc7df0a85c
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:29:27 2021 +0300
dnsforward: only check recursion for private rdns
commit 1b8075b086f33e58e273dfcf4168a6ba0473ebae
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:18:11 2021 +0300
dnsforward: rm recursion detecting from upstream </s> remove // check checks if the passed req was already sent by s.
</s> add // check checks if the passed req was already sent by the server. </s> remove s.recDetector.add(*req)
</s> add </s> remove s.recDetector.add(*req)
</s> add var resolver *proxy.Proxy = s.internalProxy
if s.subnetDetector.IsLocallyServedNetwork(ip) {
if !s.conf.UsePrivateRDNS {
return "", nil
}
resolver = s.localResolvers
s.recDetector.add(*req)
}
</s> remove var resolver *proxy.Proxy = s.localResolvers
if !s.subnetDetector.IsLocallyServedNetwork(ip) {
resolver = s.internalProxy
} else if !s.conf.UsePrivateRDNS {
return "", nil
}
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/78d47d88842b51c6a7838e96a2e3d6b18c765e77
|
internal/dnsforward/dnsforward.go
|
keep keep keep keep replace replace replace replace replace replace replace keep keep keep keep keep
|
<mask> if !s.conf.ResolveClients {
<mask> return "", nil
<mask> }
<mask>
<mask> var resolver *proxy.Proxy = s.localResolvers
<mask> if !s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> resolver = s.internalProxy
<mask> } else if !s.conf.UsePrivateRDNS {
<mask> return "", nil
<mask> }
<mask>
<mask> arpa := dns.Fqdn(aghnet.ReverseAddr(ip))
<mask> req := &dns.Msg{
<mask> MsgHdr: dns.MsgHdr{
<mask> Id: dns.Id(),
<mask> RecursionDesired: true,
</s> Pull request: 3185 fix recursion vol.2
Merge in DNS/adguard-home from fix-recursion to master
Closes #3185.
Squashed commit of the following:
commit c78650b762163f39b2eb4b10f76f1845913134b2
Author: Eugene Burkov <[email protected]>
Date: Mon May 31 13:12:46 2021 +0300
all: fix changelog
commit e43017a4b6d245f14e1a3bdf735a9c9f03501156
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:39:05 2021 +0300
dnsforward: reduce recursion ttl
commit 79208a82bdad8280c439669413aef8dc7df0a85c
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:29:27 2021 +0300
dnsforward: only check recursion for private rdns
commit 1b8075b086f33e58e273dfcf4168a6ba0473ebae
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:18:11 2021 +0300
dnsforward: rm recursion detecting from upstream </s> remove s.recDetector.add(*req)
</s> add var resolver *proxy.Proxy = s.internalProxy
if s.subnetDetector.IsLocallyServedNetwork(ip) {
if !s.conf.UsePrivateRDNS {
return "", nil
}
resolver = s.localResolvers
s.recDetector.add(*req)
}
</s> remove s.recDetector.add(*req)
</s> add </s> remove // check checks if the passed req was already sent by s.
</s> add // check checks if the passed req was already sent by the server. </s> remove recursionTTL = 5 * time.Second
</s> add recursionTTL = 1 * time.Second
|
https://github.com/AdguardTeam/AdGuardHome/commit/78d47d88842b51c6a7838e96a2e3d6b18c765e77
|
internal/dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> Req: req,
<mask> StartTime: time.Now(),
<mask> }
<mask>
<mask> s.recDetector.add(*req)
<mask> if err = resolver.Resolve(ctx); err != nil {
<mask> return "", err
<mask> }
<mask>
<mask> resp := ctx.Res
</s> Pull request: 3185 fix recursion vol.2
Merge in DNS/adguard-home from fix-recursion to master
Closes #3185.
Squashed commit of the following:
commit c78650b762163f39b2eb4b10f76f1845913134b2
Author: Eugene Burkov <[email protected]>
Date: Mon May 31 13:12:46 2021 +0300
all: fix changelog
commit e43017a4b6d245f14e1a3bdf735a9c9f03501156
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:39:05 2021 +0300
dnsforward: reduce recursion ttl
commit 79208a82bdad8280c439669413aef8dc7df0a85c
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:29:27 2021 +0300
dnsforward: only check recursion for private rdns
commit 1b8075b086f33e58e273dfcf4168a6ba0473ebae
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:18:11 2021 +0300
dnsforward: rm recursion detecting from upstream </s> remove var resolver *proxy.Proxy = s.localResolvers
if !s.subnetDetector.IsLocallyServedNetwork(ip) {
resolver = s.internalProxy
} else if !s.conf.UsePrivateRDNS {
return "", nil
}
</s> add </s> remove s.recDetector.add(*req)
</s> add </s> remove // check checks if the passed req was already sent by s.
</s> add // check checks if the passed req was already sent by the server. </s> remove recursionTTL = 5 * time.Second
</s> add recursionTTL = 1 * time.Second
|
https://github.com/AdguardTeam/AdGuardHome/commit/78d47d88842b51c6a7838e96a2e3d6b18c765e77
|
internal/dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> recentRequests cache.Cache
<mask> ttl time.Duration
<mask> }
<mask>
<mask> // check checks if the passed req was already sent by s.
<mask> func (rd *recursionDetector) check(msg dns.Msg) (ok bool) {
<mask> if len(msg.Question) == 0 {
<mask> return false
<mask> }
<mask>
</s> Pull request: 3185 fix recursion vol.2
Merge in DNS/adguard-home from fix-recursion to master
Closes #3185.
Squashed commit of the following:
commit c78650b762163f39b2eb4b10f76f1845913134b2
Author: Eugene Burkov <[email protected]>
Date: Mon May 31 13:12:46 2021 +0300
all: fix changelog
commit e43017a4b6d245f14e1a3bdf735a9c9f03501156
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:39:05 2021 +0300
dnsforward: reduce recursion ttl
commit 79208a82bdad8280c439669413aef8dc7df0a85c
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:29:27 2021 +0300
dnsforward: only check recursion for private rdns
commit 1b8075b086f33e58e273dfcf4168a6ba0473ebae
Author: Eugene Burkov <[email protected]>
Date: Sun May 30 22:18:11 2021 +0300
dnsforward: rm recursion detecting from upstream </s> remove var resolver *proxy.Proxy = s.localResolvers
if !s.subnetDetector.IsLocallyServedNetwork(ip) {
resolver = s.internalProxy
} else if !s.conf.UsePrivateRDNS {
return "", nil
}
</s> add </s> remove s.recDetector.add(*req)
</s> add </s> remove s.recDetector.add(*req)
</s> add var resolver *proxy.Proxy = s.internalProxy
if s.subnetDetector.IsLocallyServedNetwork(ip) {
if !s.conf.UsePrivateRDNS {
return "", nil
}
resolver = s.localResolvers
s.recDetector.add(*req)
}
</s> remove recursionTTL = 5 * time.Second
</s> add recursionTTL = 1 * time.Second
|
https://github.com/AdguardTeam/AdGuardHome/commit/78d47d88842b51c6a7838e96a2e3d6b18c765e77
|
internal/dnsforward/recursiondetector.go
|
keep keep add keep keep keep keep keep
|
<mask> EnableDNSSEC bool `yaml:"enable_dnssec"` // Set DNSSEC flag in outcoming DNS request
<mask> EnableEDNSClientSubnet bool `yaml:"edns_client_subnet"` // Enable EDNS Client Subnet option
<mask> MaxGoroutines uint32 `yaml:"max_goroutines"` // Max. number of parallel goroutines for processing incoming requests
<mask> }
<mask>
<mask> // TLSConfig is the TLS configuration for HTTPS, DNS-over-HTTPS, and DNS-over-TLS
<mask> type TLSConfig struct {
<mask> TLSListenAddr *net.TCPAddr `yaml:"-" json:"-"`
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 2. Set default values in the case if nothing is configured
</s> add // Set default values in the case if nothing is configured </s> remove // 3. Prepare DNS servers settings
</s> add // Initialize IPSET configuration
// --
s.ipset.init(s.conf.IPSETList)
// Prepare DNS servers settings </s> remove // 3. Create DNS proxy configuration
</s> add // Create DNS proxy configuration </s> remove // 4. Prepare a DNS proxy instance that we use for internal DNS queries
</s> add // Prepare a DNS proxy instance that we use for internal DNS queries </s> remove // 1. Initialize the server configuration
</s> add // Initialize the server configuration </s> remove // 5. Initialize DNS access module
</s> add // Initialize DNS access module
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/config.go
|
keep keep keep add keep keep keep keep keep keep
|
<mask> queryLog querylog.QueryLog // Query log instance
<mask> stats stats.Stats
<mask> access *accessCtx
<mask>
<mask> tableHostToIP map[string]net.IP // "hostname -> IP" table for internal addresses (DHCP)
<mask> tableHostToIPLock sync.Mutex
<mask>
<mask> tablePTR map[string]string // "IP -> hostname" table for reverse lookup
<mask> tablePTRLock sync.Mutex
<mask>
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 4. Prepare a DNS proxy instance that we use for internal DNS queries
</s> add // Prepare a DNS proxy instance that we use for internal DNS queries </s> remove // 5. Initialize DNS access module
</s> add // Initialize DNS access module </s> add // IPSET configuration - add IP addresses of the specified domain names to an ipset list
// Syntax:
// "DOMAIN[,DOMAIN].../IPSET_NAME"
IPSETList []string `yaml:"ipset"` </s> remove // 7. Create the main DNS proxy instance
</s> add // Create the main DNS proxy instance </s> remove // 3. Prepare DNS servers settings
</s> add // Initialize IPSET configuration
// --
s.ipset.init(s.conf.IPSETList)
// Prepare DNS servers settings </s> remove // 2. Set default values in the case if nothing is configured
</s> add // Set default values in the case if nothing is configured
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> }
<mask>
<mask> // Prepare the object
<mask> func (s *Server) Prepare(config *ServerConfig) error {
<mask> // 1. Initialize the server configuration
<mask> // --
<mask> if config != nil {
<mask> s.conf = *config
<mask> if s.conf.BlockingMode == "custom_ip" {
<mask> s.conf.BlockingIPAddrv4 = net.ParseIP(s.conf.BlockingIPv4)
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 3. Create DNS proxy configuration
</s> add // Create DNS proxy configuration </s> remove // 6. Register web handlers if necessary
</s> add // Register web handlers if necessary </s> remove // 3. Prepare DNS servers settings
</s> add // Initialize IPSET configuration
// --
s.ipset.init(s.conf.IPSETList)
// Prepare DNS servers settings </s> remove // 5. Initialize DNS access module
</s> add // Initialize DNS access module </s> remove // 4. Prepare a DNS proxy instance that we use for internal DNS queries
</s> add // Prepare a DNS proxy instance that we use for internal DNS queries </s> remove // 2. Set default values in the case if nothing is configured
</s> add // Set default values in the case if nothing is configured
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/dnsforward.go
|
keep keep keep replace keep keep keep replace keep keep keep keep
|
<mask> }
<mask> }
<mask>
<mask> // 2. Set default values in the case if nothing is configured
<mask> // --
<mask> s.initDefaultSettings()
<mask>
<mask> // 3. Prepare DNS servers settings
<mask> // --
<mask> err := s.prepareUpstreamSettings()
<mask> if err != nil {
<mask> return err
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 3. Create DNS proxy configuration
</s> add // Create DNS proxy configuration </s> remove // 6. Register web handlers if necessary
</s> add // Register web handlers if necessary </s> remove // 4. Prepare a DNS proxy instance that we use for internal DNS queries
</s> add // Prepare a DNS proxy instance that we use for internal DNS queries </s> remove // 5. Initialize DNS access module
</s> add // Initialize DNS access module </s> remove // 1. Initialize the server configuration
</s> add // Initialize the server configuration
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> if err != nil {
<mask> return err
<mask> }
<mask>
<mask> // 3. Create DNS proxy configuration
<mask> // --
<mask> var proxyConfig proxy.Config
<mask> proxyConfig, err = s.createProxyConfig()
<mask> if err != nil {
<mask> return err
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 6. Register web handlers if necessary
</s> add // Register web handlers if necessary </s> remove // 3. Prepare DNS servers settings
</s> add // Initialize IPSET configuration
// --
s.ipset.init(s.conf.IPSETList)
// Prepare DNS servers settings </s> remove // 5. Initialize DNS access module
</s> add // Initialize DNS access module </s> remove // 4. Prepare a DNS proxy instance that we use for internal DNS queries
</s> add // Prepare a DNS proxy instance that we use for internal DNS queries </s> remove // 7. Create the main DNS proxy instance
</s> add // Create the main DNS proxy instance </s> remove // 1. Initialize the server configuration
</s> add // Initialize the server configuration
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep replace keep keep keep
|
<mask> if err != nil {
<mask> return err
<mask> }
<mask>
<mask> // 4. Prepare a DNS proxy instance that we use for internal DNS queries
<mask> // --
<mask> s.prepareIntlProxy()
<mask>
<mask> // 5. Initialize DNS access module
<mask> // --
<mask> s.access = &accessCtx{}
<mask> err = s.access.Init(s.conf.AllowedClients, s.conf.DisallowedClients, s.conf.BlockedHosts)
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 3. Create DNS proxy configuration
</s> add // Create DNS proxy configuration </s> remove // 3. Prepare DNS servers settings
</s> add // Initialize IPSET configuration
// --
s.ipset.init(s.conf.IPSETList)
// Prepare DNS servers settings </s> remove // 7. Create the main DNS proxy instance
</s> add // Create the main DNS proxy instance </s> remove // 6. Register web handlers if necessary
</s> add // Register web handlers if necessary </s> remove // 1. Initialize the server configuration
</s> add // Initialize the server configuration
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> if err != nil {
<mask> return err
<mask> }
<mask>
<mask> // 6. Register web handlers if necessary
<mask> // --
<mask> if !webRegistered && s.conf.HTTPRegister != nil {
<mask> webRegistered = true
<mask> s.registerHandlers()
<mask> }
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 7. Create the main DNS proxy instance
</s> add // Create the main DNS proxy instance </s> remove // 3. Create DNS proxy configuration
</s> add // Create DNS proxy configuration </s> remove // 1. Initialize the server configuration
</s> add // Initialize the server configuration </s> remove // 3. Prepare DNS servers settings
</s> add // Initialize IPSET configuration
// --
s.ipset.init(s.conf.IPSETList)
// Prepare DNS servers settings </s> remove // 4. Prepare a DNS proxy instance that we use for internal DNS queries
</s> add // Prepare a DNS proxy instance that we use for internal DNS queries </s> remove // 5. Initialize DNS access module
</s> add // Initialize DNS access module
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> webRegistered = true
<mask> s.registerHandlers()
<mask> }
<mask>
<mask> // 7. Create the main DNS proxy instance
<mask> // --
<mask> s.dnsProxy = &proxy.Proxy{Config: proxyConfig}
<mask> return nil
<mask> }
<mask>
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 6. Register web handlers if necessary
</s> add // Register web handlers if necessary </s> remove // 3. Create DNS proxy configuration
</s> add // Create DNS proxy configuration </s> remove // 4. Prepare a DNS proxy instance that we use for internal DNS queries
</s> add // Prepare a DNS proxy instance that we use for internal DNS queries </s> remove // 5. Initialize DNS access module
</s> add // Initialize DNS access module </s> remove // 2. Set default values in the case if nothing is configured
</s> add // Set default values in the case if nothing is configured </s> remove // 3. Prepare DNS servers settings
</s> add // Initialize IPSET configuration
// --
s.ipset.init(s.conf.IPSETList)
// Prepare DNS servers settings
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/dnsforward.go
|
keep keep add keep keep keep keep keep keep
|
<mask> processUpstream,
<mask> processDNSSECAfterResponse,
<mask> processFilteringAfterResponse,
<mask> processQueryLogsAndStats,
<mask> }
<mask> for _, process := range mods {
<mask> r := process(ctx)
<mask> switch r {
<mask> case resultDone:
</s> + DNS: add "ipset" configuration setting
Close #1191
Squashed commit of the following:
commit ba14b53f9e3d98ad8127aa3af1def0da4269e8c4
Merge: 362f4c44 6b614295
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 14:03:19 2020 +0300
Merge remote-tracking branch 'origin/master' into 1191-ipset
commit 362f4c44915cb8946db2e80f9a3f5afd74fe5de1
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:50:56 2020 +0300
minor
commit 28e12459166fe3d13fb0dbe59ac11b7d86adb9b4
Author: Simon Zolin <[email protected]>
Date: Wed Sep 2 12:43:25 2020 +0300
minor
commit bdbd7324501f6111bea1e91eda7d730c7ea57b11
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 18:40:04 2020 +0300
move code, ipset-v6
commit 77f4d943e74b70b5bc5aea279875ab1e2fab2192
Author: Simon Zolin <[email protected]>
Date: Tue Sep 1 15:53:27 2020 +0300
comment
commit 16401325bbefeba08e447257b12a8424b78c9475
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 17:43:23 2020 +0300
minor
commit c8410e9a519b87911bc50f504e8b4aaf8dce6e02
Author: Simon Zolin <[email protected]>
Date: Mon Aug 31 15:30:52 2020 +0300
+ DNS: add "ipset" configuration setting </s> remove // 3. Prepare DNS servers settings
</s> add // Initialize IPSET configuration
// --
s.ipset.init(s.conf.IPSETList)
// Prepare DNS servers settings </s> remove // 2. Set default values in the case if nothing is configured
</s> add // Set default values in the case if nothing is configured </s> remove // 6. Register web handlers if necessary
</s> add // Register web handlers if necessary </s> remove // 1. Initialize the server configuration
</s> add // Initialize the server configuration </s> remove // 3. Create DNS proxy configuration
</s> add // Create DNS proxy configuration </s> remove // 4. Prepare a DNS proxy instance that we use for internal DNS queries
</s> add // Prepare a DNS proxy instance that we use for internal DNS queries
|
https://github.com/AdguardTeam/AdGuardHome/commit/7931e50673ce0251fb632cd62fefdfcadf002988
|
dnsforward/handle_dns.go
|
keep keep keep add keep keep keep keep keep keep
|
<mask> }
<mask> if err != nil {
<mask> if isConnClosed(err) {
<mask> log.Printf("ReadFrom() returned because we're reading from a closed connection, exiting loop")
<mask> break
<mask> }
<mask> log.Printf("Got error when reading from udp listen: %s", err)
<mask> }
<mask> }
<mask> }
</s> dnsforward library -- consistently nullify and close listening socket when we're done with it. </s> add s.udpListen = nil </s> add s.udpListen = nil </s> add s.udpListen = nil </s> remove s.udpListen = nil
</s> add </s> add s.udpListen = nil
|
https://github.com/AdguardTeam/AdGuardHome/commit/7944f23d9521963a954df2767321411169ae170b
|
dnsforward/dnsforward.go
|
keep keep keep add keep keep keep keep keep keep
|
<mask> addr = defaultValues.UDPListenAddr
<mask> }
<mask> s.udpListen, err = net.ListenUDP("udp", addr)
<mask> if err != nil {
<mask> return errorx.Decorate(err, "Couldn't listen to UDP socket")
<mask> }
<mask> log.Println(s.udpListen.LocalAddr(), s.UDPListenAddr)
<mask> }
<mask>
<mask> if s.dnsFilter == nil {
</s> dnsforward library -- consistently nullify and close listening socket when we're done with it. </s> add s.udpListen = nil </s> add s.udpListen = nil </s> add s.udpListen = nil </s> remove s.udpListen = nil
</s> add </s> add var err error
s.Lock()
if s.udpListen != nil {
err = s.udpListen.Close()
s.udpListen = nil
}
s.Unlock()
if err != nil {
log.Printf("Failed to close udp connection while exiting loop: %s", err)
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/7944f23d9521963a954df2767321411169ae170b
|
dnsforward/dnsforward.go
|
keep add keep keep keep keep
|
<mask> if s.udpListen != nil {
<mask> err := s.udpListen.Close()
<mask> if err != nil {
<mask> return errorx.Decorate(err, "Couldn't close UDP listening socket")
<mask> }
<mask> }
</s> dnsforward library -- consistently nullify and close listening socket when we're done with it. </s> remove s.udpListen = nil
</s> add </s> add s.udpListen = nil </s> add s.udpListen = nil </s> add s.udpListen = nil </s> add var err error
s.Lock()
if s.udpListen != nil {
err = s.udpListen.Close()
s.udpListen = nil
}
s.Unlock()
if err != nil {
log.Printf("Failed to close udp connection while exiting loop: %s", err)
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/7944f23d9521963a954df2767321411169ae170b
|
dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> err := s.udpListen.Close()
<mask> if err != nil {
<mask> return errorx.Decorate(err, "Couldn't close UDP listening socket")
<mask> }
<mask> s.udpListen = nil
<mask> }
<mask> return nil
<mask> }
<mask>
<mask> //
</s> dnsforward library -- consistently nullify and close listening socket when we're done with it. </s> add s.udpListen = nil </s> add s.udpListen = nil </s> add s.udpListen = nil </s> add s.udpListen = nil </s> add var err error
s.Lock()
if s.udpListen != nil {
err = s.udpListen.Close()
s.udpListen = nil
}
s.Unlock()
if err != nil {
log.Printf("Failed to close udp connection while exiting loop: %s", err)
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/7944f23d9521963a954df2767321411169ae170b
|
dnsforward/dnsforward.go
|
keep add keep keep keep keep keep
|
<mask> if s.udpListen != nil {
<mask> err = s.udpListen.Close()
<mask> }
<mask> s.Unlock()
<mask> if err != nil {
<mask> return errorx.Decorate(err, "Couldn't close UDP listening socket")
<mask> }
</s> dnsforward library -- consistently nullify and close listening socket when we're done with it. </s> add s.udpListen = nil </s> add s.udpListen = nil </s> remove s.udpListen = nil
</s> add </s> add s.udpListen = nil </s> add var err error
s.Lock()
if s.udpListen != nil {
err = s.udpListen.Close()
s.udpListen = nil
}
s.Unlock()
if err != nil {
log.Printf("Failed to close udp connection while exiting loop: %s", err)
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/7944f23d9521963a954df2767321411169ae170b
|
dnsforward/dnsforward.go
|
keep add keep keep keep keep keep keep
|
<mask> if s.udpListen != nil {
<mask> err = s.udpListen.Close()
<mask> }
<mask> s.Unlock()
<mask> if err != nil {
<mask> return errorx.Decorate(err, "Couldn't close UDP listening socket")
<mask> }
<mask> newListen, err = net.ListenUDP("udp", newAddr)
</s> dnsforward library -- consistently nullify and close listening socket when we're done with it. </s> add s.udpListen = nil </s> add s.udpListen = nil </s> add s.udpListen = nil </s> remove s.udpListen = nil
</s> add </s> add var err error
s.Lock()
if s.udpListen != nil {
err = s.udpListen.Close()
s.udpListen = nil
}
s.Unlock()
if err != nil {
log.Printf("Failed to close udp connection while exiting loop: %s", err)
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/7944f23d9521963a954df2767321411169ae170b
|
dnsforward/dnsforward.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> package main
<mask>
<mask> import (
<mask> "bytes"
<mask> "context"
<mask> "encoding/json"
<mask> "fmt"
<mask> "io/ioutil"
<mask> "net"
<mask> "net/http"
</s> * control: move /install handlers to a separate file </s> remove func registerInstallHandlers() {
http.HandleFunc("/control/install/get_addresses", preInstall(ensureGET(handleInstallGetAddresses)))
http.HandleFunc("/control/install/check_config", preInstall(ensurePOST(handleInstallCheckConfig)))
http.HandleFunc("/control/install/configure", preInstall(ensurePOST(handleInstallConfigure)))
}
</s> add </s> remove type firstRunData struct {
WebPort int `json:"web_port"`
DNSPort int `json:"dns_port"`
Interfaces map[string]interface{} `json:"interfaces"`
}
// Get initial installation settings
func handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
data := firstRunData{}
data.WebPort = 80
data.DNSPort = 53
ifaces, err := getValidNetInterfacesForWeb()
if err != nil {
httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
return
}
data.Interfaces = make(map[string]interface{})
for _, iface := range ifaces {
data.Interfaces[iface.Name] = iface
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(data)
if err != nil {
httpError(w, http.StatusInternalServerError, "Unable to marshal default addresses to json: %s", err)
return
}
}
type checkConfigReqEnt struct {
Port int `json:"port"`
IP string `json:"ip"`
Autofix bool `json:"autofix"`
}
type checkConfigReq struct {
Web checkConfigReqEnt `json:"web"`
DNS checkConfigReqEnt `json:"dns"`
}
type checkConfigRespEnt struct {
Status string `json:"status"`
CanAutofix bool `json:"can_autofix"`
}
type checkConfigResp struct {
Web checkConfigRespEnt `json:"web"`
DNS checkConfigRespEnt `json:"dns"`
}
// Check if ports are available, respond with results
func handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
reqData := checkConfigReq{}
respData := checkConfigResp{}
err := json.NewDecoder(r.Body).Decode(&reqData)
if err != nil {
httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
return
}
if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort {
err = checkPortAvailable(reqData.Web.IP, reqData.Web.Port)
if err != nil {
respData.Web.Status = fmt.Sprintf("%v", err)
}
}
if reqData.DNS.Port != 0 {
err = checkPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
if errorIsAddrInUse(err) {
canAutofix := checkDNSStubListener()
if canAutofix && reqData.DNS.Autofix {
err = disableDNSStubListener()
if err != nil {
log.Error("Couldn't disable DNSStubListener: %s", err)
}
err = checkPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
canAutofix = false
}
respData.DNS.CanAutofix = canAutofix
}
if err == nil {
err = checkPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
}
if err != nil {
respData.DNS.Status = fmt.Sprintf("%v", err)
}
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(respData)
if err != nil {
httpError(w, http.StatusInternalServerError, "Unable to marshal JSON: %s", err)
return
}
}
// Check if DNSStubListener is active
func checkDNSStubListener() bool {
cmd := exec.Command("systemctl", "is-enabled", "systemd-resolved")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err := cmd.Output()
if err != nil || cmd.ProcessState.ExitCode() != 0 {
log.Error("command %s has failed: %v code:%d",
cmd.Path, err, cmd.ProcessState.ExitCode())
return false
}
cmd = exec.Command("grep", "-E", "#?DNSStubListener=yes", "/etc/systemd/resolved.conf")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err = cmd.Output()
if err != nil || cmd.ProcessState.ExitCode() != 0 {
log.Error("command %s has failed: %v code:%d",
cmd.Path, err, cmd.ProcessState.ExitCode())
return false
}
return true
}
// Deactivate DNSStubListener
func disableDNSStubListener() error {
cmd := exec.Command("sed", "-r", "-i.orig", "s/#?DNSStubListener=yes/DNSStubListener=no/g", "/etc/systemd/resolved.conf")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err := cmd.Output()
if err != nil {
return err
}
if cmd.ProcessState.ExitCode() != 0 {
return fmt.Errorf("process %s exited with an error: %d",
cmd.Path, cmd.ProcessState.ExitCode())
}
cmd = exec.Command("systemctl", "reload-or-restart", "systemd-resolved")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err = cmd.Output()
if err != nil {
return err
}
if cmd.ProcessState.ExitCode() != 0 {
return fmt.Errorf("process %s exited with an error: %d",
cmd.Path, cmd.ProcessState.ExitCode())
}
return nil
}
type applyConfigReqEnt struct {
IP string `json:"ip"`
Port int `json:"port"`
}
type applyConfigReq struct {
Web applyConfigReqEnt `json:"web"`
DNS applyConfigReqEnt `json:"dns"`
Username string `json:"username"`
Password string `json:"password"`
}
// Copy installation parameters between two configuration objects
func copyInstallSettings(dst *configuration, src *configuration) {
dst.BindHost = src.BindHost
dst.BindPort = src.BindPort
dst.DNS.BindHost = src.DNS.BindHost
dst.DNS.Port = src.DNS.Port
dst.AuthName = src.AuthName
dst.AuthPass = src.AuthPass
}
// Apply new configuration, start DNS server, restart Web server
func handleInstallConfigure(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
newSettings := applyConfigReq{}
err := json.NewDecoder(r.Body).Decode(&newSettings)
if err != nil {
httpError(w, http.StatusBadRequest, "Failed to parse 'configure' JSON: %s", err)
return
}
if newSettings.Web.Port == 0 || newSettings.DNS.Port == 0 {
httpError(w, http.StatusBadRequest, "port value can't be 0")
return
}
restartHTTP := true
if config.BindHost == newSettings.Web.IP && config.BindPort == newSettings.Web.Port {
// no need to rebind
restartHTTP = false
}
// validate that hosts and ports are bindable
if restartHTTP {
err = checkPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s",
net.JoinHostPort(newSettings.Web.IP, strconv.Itoa(newSettings.Web.Port)), err)
return
}
}
err = checkPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "%s", err)
return
}
err = checkPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "%s", err)
return
}
var curConfig configuration
copyInstallSettings(&curConfig, &config)
config.firstRun = false
config.BindHost = newSettings.Web.IP
config.BindPort = newSettings.Web.Port
config.DNS.BindHost = newSettings.DNS.IP
config.DNS.Port = newSettings.DNS.Port
config.AuthName = newSettings.Username
config.AuthPass = newSettings.Password
err = startDNSServer()
if err != nil {
config.firstRun = true
copyInstallSettings(&config, &curConfig)
httpError(w, http.StatusInternalServerError, "Couldn't start DNS server: %s", err)
return
}
err = config.write()
if err != nil {
config.firstRun = true
copyInstallSettings(&config, &curConfig)
httpError(w, http.StatusInternalServerError, "Couldn't write config: %s", err)
return
}
// this needs to be done in a goroutine because Shutdown() is a blocking call, and it will block
// until all requests are finished, and _we_ are inside a request right now, so it will block indefinitely
if restartHTTP {
go func() {
httpServer.Shutdown(context.TODO())
}()
}
returnOK(w)
}
</s> add </s> remove "os/exec"
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/79b0fac01a544e35207420fed78e1c2a63d428d8
|
control.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> "io/ioutil"
<mask> "net"
<mask> "net/http"
<mask> "os"
<mask> "os/exec"
<mask> "sort"
<mask> "strconv"
<mask> "strings"
<mask> "sync"
<mask> "time"
</s> * control: move /install handlers to a separate file </s> remove func registerInstallHandlers() {
http.HandleFunc("/control/install/get_addresses", preInstall(ensureGET(handleInstallGetAddresses)))
http.HandleFunc("/control/install/check_config", preInstall(ensurePOST(handleInstallCheckConfig)))
http.HandleFunc("/control/install/configure", preInstall(ensurePOST(handleInstallConfigure)))
}
</s> add </s> remove type firstRunData struct {
WebPort int `json:"web_port"`
DNSPort int `json:"dns_port"`
Interfaces map[string]interface{} `json:"interfaces"`
}
// Get initial installation settings
func handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
data := firstRunData{}
data.WebPort = 80
data.DNSPort = 53
ifaces, err := getValidNetInterfacesForWeb()
if err != nil {
httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
return
}
data.Interfaces = make(map[string]interface{})
for _, iface := range ifaces {
data.Interfaces[iface.Name] = iface
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(data)
if err != nil {
httpError(w, http.StatusInternalServerError, "Unable to marshal default addresses to json: %s", err)
return
}
}
type checkConfigReqEnt struct {
Port int `json:"port"`
IP string `json:"ip"`
Autofix bool `json:"autofix"`
}
type checkConfigReq struct {
Web checkConfigReqEnt `json:"web"`
DNS checkConfigReqEnt `json:"dns"`
}
type checkConfigRespEnt struct {
Status string `json:"status"`
CanAutofix bool `json:"can_autofix"`
}
type checkConfigResp struct {
Web checkConfigRespEnt `json:"web"`
DNS checkConfigRespEnt `json:"dns"`
}
// Check if ports are available, respond with results
func handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
reqData := checkConfigReq{}
respData := checkConfigResp{}
err := json.NewDecoder(r.Body).Decode(&reqData)
if err != nil {
httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
return
}
if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort {
err = checkPortAvailable(reqData.Web.IP, reqData.Web.Port)
if err != nil {
respData.Web.Status = fmt.Sprintf("%v", err)
}
}
if reqData.DNS.Port != 0 {
err = checkPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
if errorIsAddrInUse(err) {
canAutofix := checkDNSStubListener()
if canAutofix && reqData.DNS.Autofix {
err = disableDNSStubListener()
if err != nil {
log.Error("Couldn't disable DNSStubListener: %s", err)
}
err = checkPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
canAutofix = false
}
respData.DNS.CanAutofix = canAutofix
}
if err == nil {
err = checkPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
}
if err != nil {
respData.DNS.Status = fmt.Sprintf("%v", err)
}
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(respData)
if err != nil {
httpError(w, http.StatusInternalServerError, "Unable to marshal JSON: %s", err)
return
}
}
// Check if DNSStubListener is active
func checkDNSStubListener() bool {
cmd := exec.Command("systemctl", "is-enabled", "systemd-resolved")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err := cmd.Output()
if err != nil || cmd.ProcessState.ExitCode() != 0 {
log.Error("command %s has failed: %v code:%d",
cmd.Path, err, cmd.ProcessState.ExitCode())
return false
}
cmd = exec.Command("grep", "-E", "#?DNSStubListener=yes", "/etc/systemd/resolved.conf")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err = cmd.Output()
if err != nil || cmd.ProcessState.ExitCode() != 0 {
log.Error("command %s has failed: %v code:%d",
cmd.Path, err, cmd.ProcessState.ExitCode())
return false
}
return true
}
// Deactivate DNSStubListener
func disableDNSStubListener() error {
cmd := exec.Command("sed", "-r", "-i.orig", "s/#?DNSStubListener=yes/DNSStubListener=no/g", "/etc/systemd/resolved.conf")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err := cmd.Output()
if err != nil {
return err
}
if cmd.ProcessState.ExitCode() != 0 {
return fmt.Errorf("process %s exited with an error: %d",
cmd.Path, cmd.ProcessState.ExitCode())
}
cmd = exec.Command("systemctl", "reload-or-restart", "systemd-resolved")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err = cmd.Output()
if err != nil {
return err
}
if cmd.ProcessState.ExitCode() != 0 {
return fmt.Errorf("process %s exited with an error: %d",
cmd.Path, cmd.ProcessState.ExitCode())
}
return nil
}
type applyConfigReqEnt struct {
IP string `json:"ip"`
Port int `json:"port"`
}
type applyConfigReq struct {
Web applyConfigReqEnt `json:"web"`
DNS applyConfigReqEnt `json:"dns"`
Username string `json:"username"`
Password string `json:"password"`
}
// Copy installation parameters between two configuration objects
func copyInstallSettings(dst *configuration, src *configuration) {
dst.BindHost = src.BindHost
dst.BindPort = src.BindPort
dst.DNS.BindHost = src.DNS.BindHost
dst.DNS.Port = src.DNS.Port
dst.AuthName = src.AuthName
dst.AuthPass = src.AuthPass
}
// Apply new configuration, start DNS server, restart Web server
func handleInstallConfigure(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
newSettings := applyConfigReq{}
err := json.NewDecoder(r.Body).Decode(&newSettings)
if err != nil {
httpError(w, http.StatusBadRequest, "Failed to parse 'configure' JSON: %s", err)
return
}
if newSettings.Web.Port == 0 || newSettings.DNS.Port == 0 {
httpError(w, http.StatusBadRequest, "port value can't be 0")
return
}
restartHTTP := true
if config.BindHost == newSettings.Web.IP && config.BindPort == newSettings.Web.Port {
// no need to rebind
restartHTTP = false
}
// validate that hosts and ports are bindable
if restartHTTP {
err = checkPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s",
net.JoinHostPort(newSettings.Web.IP, strconv.Itoa(newSettings.Web.Port)), err)
return
}
}
err = checkPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "%s", err)
return
}
err = checkPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "%s", err)
return
}
var curConfig configuration
copyInstallSettings(&curConfig, &config)
config.firstRun = false
config.BindHost = newSettings.Web.IP
config.BindPort = newSettings.Web.Port
config.DNS.BindHost = newSettings.DNS.IP
config.DNS.Port = newSettings.DNS.Port
config.AuthName = newSettings.Username
config.AuthPass = newSettings.Password
err = startDNSServer()
if err != nil {
config.firstRun = true
copyInstallSettings(&config, &curConfig)
httpError(w, http.StatusInternalServerError, "Couldn't start DNS server: %s", err)
return
}
err = config.write()
if err != nil {
config.firstRun = true
copyInstallSettings(&config, &curConfig)
httpError(w, http.StatusInternalServerError, "Couldn't write config: %s", err)
return
}
// this needs to be done in a goroutine because Shutdown() is a blocking call, and it will block
// until all requests are finished, and _we_ are inside a request right now, so it will block indefinitely
if restartHTTP {
go func() {
httpServer.Shutdown(context.TODO())
}()
}
returnOK(w)
}
</s> add </s> remove "context"
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/79b0fac01a544e35207420fed78e1c2a63d428d8
|
control.go
|
keep keep keep keep replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace replace keep keep keep keep keep
|
<mask> return
<mask> }
<mask> }
<mask>
<mask> type firstRunData struct {
<mask> WebPort int `json:"web_port"`
<mask> DNSPort int `json:"dns_port"`
<mask> Interfaces map[string]interface{} `json:"interfaces"`
<mask> }
<mask>
<mask> // Get initial installation settings
<mask> func handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) {
<mask> log.Tracef("%s %v", r.Method, r.URL)
<mask> data := firstRunData{}
<mask> data.WebPort = 80
<mask> data.DNSPort = 53
<mask>
<mask> ifaces, err := getValidNetInterfacesForWeb()
<mask> if err != nil {
<mask> httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
<mask> return
<mask> }
<mask>
<mask> data.Interfaces = make(map[string]interface{})
<mask> for _, iface := range ifaces {
<mask> data.Interfaces[iface.Name] = iface
<mask> }
<mask>
<mask> w.Header().Set("Content-Type", "application/json")
<mask> err = json.NewEncoder(w).Encode(data)
<mask> if err != nil {
<mask> httpError(w, http.StatusInternalServerError, "Unable to marshal default addresses to json: %s", err)
<mask> return
<mask> }
<mask> }
<mask>
<mask> type checkConfigReqEnt struct {
<mask> Port int `json:"port"`
<mask> IP string `json:"ip"`
<mask> Autofix bool `json:"autofix"`
<mask> }
<mask> type checkConfigReq struct {
<mask> Web checkConfigReqEnt `json:"web"`
<mask> DNS checkConfigReqEnt `json:"dns"`
<mask> }
<mask>
<mask> type checkConfigRespEnt struct {
<mask> Status string `json:"status"`
<mask> CanAutofix bool `json:"can_autofix"`
<mask> }
<mask> type checkConfigResp struct {
<mask> Web checkConfigRespEnt `json:"web"`
<mask> DNS checkConfigRespEnt `json:"dns"`
<mask> }
<mask>
<mask> // Check if ports are available, respond with results
<mask> func handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) {
<mask> log.Tracef("%s %v", r.Method, r.URL)
<mask> reqData := checkConfigReq{}
<mask> respData := checkConfigResp{}
<mask> err := json.NewDecoder(r.Body).Decode(&reqData)
<mask> if err != nil {
<mask> httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
<mask> return
<mask> }
<mask>
<mask> if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort {
<mask> err = checkPortAvailable(reqData.Web.IP, reqData.Web.Port)
<mask> if err != nil {
<mask> respData.Web.Status = fmt.Sprintf("%v", err)
<mask> }
<mask> }
<mask>
<mask> if reqData.DNS.Port != 0 {
<mask> err = checkPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask>
<mask> if errorIsAddrInUse(err) {
<mask> canAutofix := checkDNSStubListener()
<mask> if canAutofix && reqData.DNS.Autofix {
<mask>
<mask> err = disableDNSStubListener()
<mask> if err != nil {
<mask> log.Error("Couldn't disable DNSStubListener: %s", err)
<mask> }
<mask>
<mask> err = checkPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask> canAutofix = false
<mask> }
<mask>
<mask> respData.DNS.CanAutofix = canAutofix
<mask> }
<mask>
<mask> if err == nil {
<mask> err = checkPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
<mask> }
<mask>
<mask> if err != nil {
<mask> respData.DNS.Status = fmt.Sprintf("%v", err)
<mask> }
<mask> }
<mask>
<mask> w.Header().Set("Content-Type", "application/json")
<mask> err = json.NewEncoder(w).Encode(respData)
<mask> if err != nil {
<mask> httpError(w, http.StatusInternalServerError, "Unable to marshal JSON: %s", err)
<mask> return
<mask> }
<mask> }
<mask>
<mask> // Check if DNSStubListener is active
<mask> func checkDNSStubListener() bool {
<mask> cmd := exec.Command("systemctl", "is-enabled", "systemd-resolved")
<mask> log.Tracef("executing %s %v", cmd.Path, cmd.Args)
<mask> _, err := cmd.Output()
<mask> if err != nil || cmd.ProcessState.ExitCode() != 0 {
<mask> log.Error("command %s has failed: %v code:%d",
<mask> cmd.Path, err, cmd.ProcessState.ExitCode())
<mask> return false
<mask> }
<mask>
<mask> cmd = exec.Command("grep", "-E", "#?DNSStubListener=yes", "/etc/systemd/resolved.conf")
<mask> log.Tracef("executing %s %v", cmd.Path, cmd.Args)
<mask> _, err = cmd.Output()
<mask> if err != nil || cmd.ProcessState.ExitCode() != 0 {
<mask> log.Error("command %s has failed: %v code:%d",
<mask> cmd.Path, err, cmd.ProcessState.ExitCode())
<mask> return false
<mask> }
<mask>
<mask> return true
<mask> }
<mask>
<mask> // Deactivate DNSStubListener
<mask> func disableDNSStubListener() error {
<mask> cmd := exec.Command("sed", "-r", "-i.orig", "s/#?DNSStubListener=yes/DNSStubListener=no/g", "/etc/systemd/resolved.conf")
<mask> log.Tracef("executing %s %v", cmd.Path, cmd.Args)
<mask> _, err := cmd.Output()
<mask> if err != nil {
<mask> return err
<mask> }
<mask> if cmd.ProcessState.ExitCode() != 0 {
<mask> return fmt.Errorf("process %s exited with an error: %d",
<mask> cmd.Path, cmd.ProcessState.ExitCode())
<mask> }
<mask>
<mask> cmd = exec.Command("systemctl", "reload-or-restart", "systemd-resolved")
<mask> log.Tracef("executing %s %v", cmd.Path, cmd.Args)
<mask> _, err = cmd.Output()
<mask> if err != nil {
<mask> return err
<mask> }
<mask> if cmd.ProcessState.ExitCode() != 0 {
<mask> return fmt.Errorf("process %s exited with an error: %d",
<mask> cmd.Path, cmd.ProcessState.ExitCode())
<mask> }
<mask>
<mask> return nil
<mask> }
<mask>
<mask> type applyConfigReqEnt struct {
<mask> IP string `json:"ip"`
<mask> Port int `json:"port"`
<mask> }
<mask> type applyConfigReq struct {
<mask> Web applyConfigReqEnt `json:"web"`
<mask> DNS applyConfigReqEnt `json:"dns"`
<mask> Username string `json:"username"`
<mask> Password string `json:"password"`
<mask> }
<mask>
<mask> // Copy installation parameters between two configuration objects
<mask> func copyInstallSettings(dst *configuration, src *configuration) {
<mask> dst.BindHost = src.BindHost
<mask> dst.BindPort = src.BindPort
<mask> dst.DNS.BindHost = src.DNS.BindHost
<mask> dst.DNS.Port = src.DNS.Port
<mask> dst.AuthName = src.AuthName
<mask> dst.AuthPass = src.AuthPass
<mask> }
<mask>
<mask> // Apply new configuration, start DNS server, restart Web server
<mask> func handleInstallConfigure(w http.ResponseWriter, r *http.Request) {
<mask> log.Tracef("%s %v", r.Method, r.URL)
<mask> newSettings := applyConfigReq{}
<mask> err := json.NewDecoder(r.Body).Decode(&newSettings)
<mask> if err != nil {
<mask> httpError(w, http.StatusBadRequest, "Failed to parse 'configure' JSON: %s", err)
<mask> return
<mask> }
<mask>
<mask> if newSettings.Web.Port == 0 || newSettings.DNS.Port == 0 {
<mask> httpError(w, http.StatusBadRequest, "port value can't be 0")
<mask> return
<mask> }
<mask>
<mask> restartHTTP := true
<mask> if config.BindHost == newSettings.Web.IP && config.BindPort == newSettings.Web.Port {
<mask> // no need to rebind
<mask> restartHTTP = false
<mask> }
<mask>
<mask> // validate that hosts and ports are bindable
<mask> if restartHTTP {
<mask> err = checkPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
<mask> if err != nil {
<mask> httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s",
<mask> net.JoinHostPort(newSettings.Web.IP, strconv.Itoa(newSettings.Web.Port)), err)
<mask> return
<mask> }
<mask> }
<mask>
<mask> err = checkPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
<mask> if err != nil {
<mask> httpError(w, http.StatusBadRequest, "%s", err)
<mask> return
<mask> }
<mask>
<mask> err = checkPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
<mask> if err != nil {
<mask> httpError(w, http.StatusBadRequest, "%s", err)
<mask> return
<mask> }
<mask>
<mask> var curConfig configuration
<mask> copyInstallSettings(&curConfig, &config)
<mask>
<mask> config.firstRun = false
<mask> config.BindHost = newSettings.Web.IP
<mask> config.BindPort = newSettings.Web.Port
<mask> config.DNS.BindHost = newSettings.DNS.IP
<mask> config.DNS.Port = newSettings.DNS.Port
<mask> config.AuthName = newSettings.Username
<mask> config.AuthPass = newSettings.Password
<mask>
<mask> err = startDNSServer()
<mask> if err != nil {
<mask> config.firstRun = true
<mask> copyInstallSettings(&config, &curConfig)
<mask> httpError(w, http.StatusInternalServerError, "Couldn't start DNS server: %s", err)
<mask> return
<mask> }
<mask>
<mask> err = config.write()
<mask> if err != nil {
<mask> config.firstRun = true
<mask> copyInstallSettings(&config, &curConfig)
<mask> httpError(w, http.StatusInternalServerError, "Couldn't write config: %s", err)
<mask> return
<mask> }
<mask>
<mask> // this needs to be done in a goroutine because Shutdown() is a blocking call, and it will block
<mask> // until all requests are finished, and _we_ are inside a request right now, so it will block indefinitely
<mask> if restartHTTP {
<mask> go func() {
<mask> httpServer.Shutdown(context.TODO())
<mask> }()
<mask> }
<mask>
<mask> returnOK(w)
<mask> }
<mask>
<mask> // --------------
<mask> // DNS-over-HTTPS
<mask> // --------------
<mask> func handleDOH(w http.ResponseWriter, r *http.Request) {
<mask> log.Tracef("%s %v", r.Method, r.URL)
</s> * control: move /install handlers to a separate file </s> remove func registerInstallHandlers() {
http.HandleFunc("/control/install/get_addresses", preInstall(ensureGET(handleInstallGetAddresses)))
http.HandleFunc("/control/install/check_config", preInstall(ensurePOST(handleInstallCheckConfig)))
http.HandleFunc("/control/install/configure", preInstall(ensurePOST(handleInstallConfigure)))
}
</s> add </s> remove "os/exec"
</s> add </s> remove "context"
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/79b0fac01a544e35207420fed78e1c2a63d428d8
|
control.go
|
keep keep keep keep replace replace replace replace replace replace keep keep keep keep keep
|
<mask>
<mask> // ------------------------
<mask> // registration of handlers
<mask> // ------------------------
<mask> func registerInstallHandlers() {
<mask> http.HandleFunc("/control/install/get_addresses", preInstall(ensureGET(handleInstallGetAddresses)))
<mask> http.HandleFunc("/control/install/check_config", preInstall(ensurePOST(handleInstallCheckConfig)))
<mask> http.HandleFunc("/control/install/configure", preInstall(ensurePOST(handleInstallConfigure)))
<mask> }
<mask>
<mask> func registerControlHandlers() {
<mask> http.HandleFunc("/control/status", postInstall(optionalAuth(ensureGET(handleStatus))))
<mask> http.HandleFunc("/control/enable_protection", postInstall(optionalAuth(ensurePOST(handleProtectionEnable))))
<mask> http.HandleFunc("/control/disable_protection", postInstall(optionalAuth(ensurePOST(handleProtectionDisable))))
<mask> http.Handle("/control/querylog", postInstallHandler(optionalAuthHandler(gziphandler.GzipHandler(ensureGETHandler(handleQueryLog)))))
</s> * control: move /install handlers to a separate file </s> remove type firstRunData struct {
WebPort int `json:"web_port"`
DNSPort int `json:"dns_port"`
Interfaces map[string]interface{} `json:"interfaces"`
}
// Get initial installation settings
func handleInstallGetAddresses(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
data := firstRunData{}
data.WebPort = 80
data.DNSPort = 53
ifaces, err := getValidNetInterfacesForWeb()
if err != nil {
httpError(w, http.StatusInternalServerError, "Couldn't get interfaces: %s", err)
return
}
data.Interfaces = make(map[string]interface{})
for _, iface := range ifaces {
data.Interfaces[iface.Name] = iface
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(data)
if err != nil {
httpError(w, http.StatusInternalServerError, "Unable to marshal default addresses to json: %s", err)
return
}
}
type checkConfigReqEnt struct {
Port int `json:"port"`
IP string `json:"ip"`
Autofix bool `json:"autofix"`
}
type checkConfigReq struct {
Web checkConfigReqEnt `json:"web"`
DNS checkConfigReqEnt `json:"dns"`
}
type checkConfigRespEnt struct {
Status string `json:"status"`
CanAutofix bool `json:"can_autofix"`
}
type checkConfigResp struct {
Web checkConfigRespEnt `json:"web"`
DNS checkConfigRespEnt `json:"dns"`
}
// Check if ports are available, respond with results
func handleInstallCheckConfig(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
reqData := checkConfigReq{}
respData := checkConfigResp{}
err := json.NewDecoder(r.Body).Decode(&reqData)
if err != nil {
httpError(w, http.StatusBadRequest, "Failed to parse 'check_config' JSON data: %s", err)
return
}
if reqData.Web.Port != 0 && reqData.Web.Port != config.BindPort {
err = checkPortAvailable(reqData.Web.IP, reqData.Web.Port)
if err != nil {
respData.Web.Status = fmt.Sprintf("%v", err)
}
}
if reqData.DNS.Port != 0 {
err = checkPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
if errorIsAddrInUse(err) {
canAutofix := checkDNSStubListener()
if canAutofix && reqData.DNS.Autofix {
err = disableDNSStubListener()
if err != nil {
log.Error("Couldn't disable DNSStubListener: %s", err)
}
err = checkPacketPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
canAutofix = false
}
respData.DNS.CanAutofix = canAutofix
}
if err == nil {
err = checkPortAvailable(reqData.DNS.IP, reqData.DNS.Port)
}
if err != nil {
respData.DNS.Status = fmt.Sprintf("%v", err)
}
}
w.Header().Set("Content-Type", "application/json")
err = json.NewEncoder(w).Encode(respData)
if err != nil {
httpError(w, http.StatusInternalServerError, "Unable to marshal JSON: %s", err)
return
}
}
// Check if DNSStubListener is active
func checkDNSStubListener() bool {
cmd := exec.Command("systemctl", "is-enabled", "systemd-resolved")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err := cmd.Output()
if err != nil || cmd.ProcessState.ExitCode() != 0 {
log.Error("command %s has failed: %v code:%d",
cmd.Path, err, cmd.ProcessState.ExitCode())
return false
}
cmd = exec.Command("grep", "-E", "#?DNSStubListener=yes", "/etc/systemd/resolved.conf")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err = cmd.Output()
if err != nil || cmd.ProcessState.ExitCode() != 0 {
log.Error("command %s has failed: %v code:%d",
cmd.Path, err, cmd.ProcessState.ExitCode())
return false
}
return true
}
// Deactivate DNSStubListener
func disableDNSStubListener() error {
cmd := exec.Command("sed", "-r", "-i.orig", "s/#?DNSStubListener=yes/DNSStubListener=no/g", "/etc/systemd/resolved.conf")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err := cmd.Output()
if err != nil {
return err
}
if cmd.ProcessState.ExitCode() != 0 {
return fmt.Errorf("process %s exited with an error: %d",
cmd.Path, cmd.ProcessState.ExitCode())
}
cmd = exec.Command("systemctl", "reload-or-restart", "systemd-resolved")
log.Tracef("executing %s %v", cmd.Path, cmd.Args)
_, err = cmd.Output()
if err != nil {
return err
}
if cmd.ProcessState.ExitCode() != 0 {
return fmt.Errorf("process %s exited with an error: %d",
cmd.Path, cmd.ProcessState.ExitCode())
}
return nil
}
type applyConfigReqEnt struct {
IP string `json:"ip"`
Port int `json:"port"`
}
type applyConfigReq struct {
Web applyConfigReqEnt `json:"web"`
DNS applyConfigReqEnt `json:"dns"`
Username string `json:"username"`
Password string `json:"password"`
}
// Copy installation parameters between two configuration objects
func copyInstallSettings(dst *configuration, src *configuration) {
dst.BindHost = src.BindHost
dst.BindPort = src.BindPort
dst.DNS.BindHost = src.DNS.BindHost
dst.DNS.Port = src.DNS.Port
dst.AuthName = src.AuthName
dst.AuthPass = src.AuthPass
}
// Apply new configuration, start DNS server, restart Web server
func handleInstallConfigure(w http.ResponseWriter, r *http.Request) {
log.Tracef("%s %v", r.Method, r.URL)
newSettings := applyConfigReq{}
err := json.NewDecoder(r.Body).Decode(&newSettings)
if err != nil {
httpError(w, http.StatusBadRequest, "Failed to parse 'configure' JSON: %s", err)
return
}
if newSettings.Web.Port == 0 || newSettings.DNS.Port == 0 {
httpError(w, http.StatusBadRequest, "port value can't be 0")
return
}
restartHTTP := true
if config.BindHost == newSettings.Web.IP && config.BindPort == newSettings.Web.Port {
// no need to rebind
restartHTTP = false
}
// validate that hosts and ports are bindable
if restartHTTP {
err = checkPortAvailable(newSettings.Web.IP, newSettings.Web.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "Impossible to listen on IP:port %s due to %s",
net.JoinHostPort(newSettings.Web.IP, strconv.Itoa(newSettings.Web.Port)), err)
return
}
}
err = checkPacketPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "%s", err)
return
}
err = checkPortAvailable(newSettings.DNS.IP, newSettings.DNS.Port)
if err != nil {
httpError(w, http.StatusBadRequest, "%s", err)
return
}
var curConfig configuration
copyInstallSettings(&curConfig, &config)
config.firstRun = false
config.BindHost = newSettings.Web.IP
config.BindPort = newSettings.Web.Port
config.DNS.BindHost = newSettings.DNS.IP
config.DNS.Port = newSettings.DNS.Port
config.AuthName = newSettings.Username
config.AuthPass = newSettings.Password
err = startDNSServer()
if err != nil {
config.firstRun = true
copyInstallSettings(&config, &curConfig)
httpError(w, http.StatusInternalServerError, "Couldn't start DNS server: %s", err)
return
}
err = config.write()
if err != nil {
config.firstRun = true
copyInstallSettings(&config, &curConfig)
httpError(w, http.StatusInternalServerError, "Couldn't write config: %s", err)
return
}
// this needs to be done in a goroutine because Shutdown() is a blocking call, and it will block
// until all requests are finished, and _we_ are inside a request right now, so it will block indefinitely
if restartHTTP {
go func() {
httpServer.Shutdown(context.TODO())
}()
}
returnOK(w)
}
</s> add </s> remove "os/exec"
</s> add </s> remove "context"
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/79b0fac01a544e35207420fed78e1c2a63d428d8
|
control.go
|
keep add keep keep keep keep keep keep
|
<mask> </div>
<mask> </div>
<mask> <div className="col-12">
<mask> <div className="form__group form__group--settings">
<mask> <Field
<mask> name="disable_ipv6"
<mask> type="checkbox"
<mask> component={renderSelectField}
</s> + client: handle DNSSEC setting </s> add dnssec_enabled: false, </s> add dnssec_enabled, </s> add dnssec_enabled,
|
https://github.com/AdguardTeam/AdGuardHome/commit/79bfa6a72b6cda8c0f5211a3a6df0293c4b6c7d1
|
client/src/components/Settings/Dns/Config/Form.js
|
keep add keep keep keep keep
|
<mask> blocking_ipv6,
<mask> edns_cs_enabled,
<mask> disable_ipv6,
<mask> processingSetConfig,
<mask> } = dnsConfig;
<mask>
</s> + client: handle DNSSEC setting </s> add dnssec_enabled: false, </s> add dnssec_enabled, </s> add <div className="col-12">
<div className="form__group form__group--settings">
<Field
name="dnssec_enabled"
type="checkbox"
component={renderSelectField}
placeholder={t('dnssec_enable')}
disabled={processing}
subtitle={t('dnssec_enable_desc')}
/>
</div>
</div>
|
https://github.com/AdguardTeam/AdGuardHome/commit/79bfa6a72b6cda8c0f5211a3a6df0293c4b6c7d1
|
client/src/components/Settings/Dns/Config/index.js
|
keep keep add keep keep keep keep keep keep
|
<mask> blocking_ipv6,
<mask> edns_cs_enabled,
<mask> disable_ipv6,
<mask> }}
<mask> onSubmit={handleFormSubmit}
<mask> processing={processingSetConfig}
<mask> />
<mask> </div>
<mask> </Card>
</s> + client: handle DNSSEC setting </s> add dnssec_enabled: false, </s> add dnssec_enabled, </s> add <div className="col-12">
<div className="form__group form__group--settings">
<Field
name="dnssec_enabled"
type="checkbox"
component={renderSelectField}
placeholder={t('dnssec_enable')}
disabled={processing}
subtitle={t('dnssec_enable_desc')}
/>
</div>
</div>
|
https://github.com/AdguardTeam/AdGuardHome/commit/79bfa6a72b6cda8c0f5211a3a6df0293c4b6c7d1
|
client/src/components/Settings/Dns/Config/index.js
|
keep keep keep add keep keep keep keep
|
<mask> blocking_ipv4: DEFAULT_BLOCKING_IPV4,
<mask> blocking_ipv6: DEFAULT_BLOCKING_IPV6,
<mask> edns_cs_enabled: false,
<mask> disable_ipv6: false,
<mask> },
<mask> );
<mask>
<mask> export default dnsConfig;
</s> + client: handle DNSSEC setting </s> add dnssec_enabled, </s> add dnssec_enabled, </s> add <div className="col-12">
<div className="form__group form__group--settings">
<Field
name="dnssec_enabled"
type="checkbox"
component={renderSelectField}
placeholder={t('dnssec_enable')}
disabled={processing}
subtitle={t('dnssec_enable_desc')}
/>
</div>
</div>
|
https://github.com/AdguardTeam/AdGuardHome/commit/79bfa6a72b6cda8c0f5211a3a6df0293c4b6c7d1
|
client/src/reducers/dnsConfig.js
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> "local_ptr_title": "Private reverse DNS servers",
<mask> "local_ptr_desc": "The DNS servers that AdGuard Home uses for local PTR queries. These servers are used to resolve the hostnames of clients with private IP addresses, for example \"192.168.12.34\", using rDNS. If not set, AdGuard Home uses the default DNS resolvers of your OS.",
<mask> "local_ptr_placeholder": "Enter one server address per line",
<mask> "resolve_clients_title": "Enable reverse resolving of clients' IP addresses",
<mask> "resolve_clients_desc": "If enabled, AdGuard Home will attempt to reversely resolve clients' IP addresses into their hostnames by sending PTR queries to corresponding resolvers (private DNS servers for local clients, upstream server for clients with public IP addresses).",
<mask> "use_private_ptr_resolvers_title": "Use private rDNS resolvers",
<mask> "use_private_ptr_resolvers_desc": "Perform reverse DNS lookups for locally-served addresses using these upstream servers. If disabled, AdGuard Home responds with NXDOMAIN to all such PTR requests except for clients known from DHCP, /etc/hosts, and so on.",
<mask> "check_dhcp_servers": "Check for DHCP servers",
<mask> "save_config": "Save configuration",
<mask> "enabled_dhcp": "DHCP server enabled",
</s> Pull request: client: fix, upd i18n
Merge in DNS/adguard-home from upd-i18n to master
Squashed commit of the following:
commit d4357830bec6f1c4882d9b65d2926a9074d67d45
Author: Ainar Garipov <[email protected]>
Date: Wed May 26 18:45:22 2021 +0300
client: fix more
commit 04e57baf7fd692923f7ec04f708c4011aef009c0
Author: Ainar Garipov <[email protected]>
Date: Wed May 26 18:29:39 2021 +0300
client: fix, upd i18n </s> remove "show_whitelisted_responses": "Whitelisted",
</s> add "show_whitelisted_responses": "Allowed", </s> remove "filter_category_security_desc": "Lists that specialize on blocking malware, phishing, or scam domains",
</s> add "filter_category_security_desc": "Lists designed specifically to block malicious, phishing, and scam domains", </s> remove "host_whitelisted": "The host is whitelisted",
</s> add "host_whitelisted": "The host is allowed",
|
https://github.com/AdguardTeam/AdGuardHome/commit/7a48e92e4d3404feefd5702a485461b39aecd0a4
|
client/src/__locales/en.json
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> "form_enter_host": "Enter a host name",
<mask> "filtered_custom_rules": "Filtered by Custom filtering rules",
<mask> "choose_from_list": "Choose from the list",
<mask> "add_custom_list": "Add a custom list",
<mask> "host_whitelisted": "The host is whitelisted",
<mask> "check_ip": "IP addresses: {{ip}}",
<mask> "check_cname": "CNAME: {{cname}}",
<mask> "check_reason": "Reason: {{reason}}",
<mask> "check_service": "Service name: {{service}}",
<mask> "service_name": "Service name",
</s> Pull request: client: fix, upd i18n
Merge in DNS/adguard-home from upd-i18n to master
Squashed commit of the following:
commit d4357830bec6f1c4882d9b65d2926a9074d67d45
Author: Ainar Garipov <[email protected]>
Date: Wed May 26 18:45:22 2021 +0300
client: fix more
commit 04e57baf7fd692923f7ec04f708c4011aef009c0
Author: Ainar Garipov <[email protected]>
Date: Wed May 26 18:29:39 2021 +0300
client: fix, upd i18n </s> remove "show_whitelisted_responses": "Whitelisted",
</s> add "show_whitelisted_responses": "Allowed", </s> remove "resolve_clients_desc": "If enabled, AdGuard Home will attempt to reversely resolve clients' IP addresses into their hostnames by sending PTR queries to corresponding resolvers (private DNS servers for local clients, upstream server for clients with public IP addresses).",
</s> add "resolve_clients_desc": "If enabled, AdGuard Home will attempt to reversely resolve clients' IP addresses into their hostnames by sending PTR queries to corresponding resolvers (private DNS servers for local clients, upstream servers for clients with public IP addresses).", </s> remove "filter_category_security_desc": "Lists that specialize on blocking malware, phishing, or scam domains",
</s> add "filter_category_security_desc": "Lists designed specifically to block malicious, phishing, and scam domains",
|
https://github.com/AdguardTeam/AdGuardHome/commit/7a48e92e4d3404feefd5702a485461b39aecd0a4
|
client/src/__locales/en.json
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> "dnssec_enable_desc": "Set DNSSEC flag in the outcoming DNS queries and check the result (DNSSEC-enabled resolver is required)",
<mask> "validated_with_dnssec": "Validated with DNSSEC",
<mask> "all_queries": "All queries",
<mask> "show_blocked_responses": "Blocked",
<mask> "show_whitelisted_responses": "Whitelisted",
<mask> "show_processed_responses": "Processed",
<mask> "blocked_safebrowsing": "Blocked by Safebrowsing",
<mask> "blocked_adult_websites": "Blocked Adult Websites",
<mask> "blocked_threats": "Blocked Threats",
<mask> "allowed": "Allowed",
</s> Pull request: client: fix, upd i18n
Merge in DNS/adguard-home from upd-i18n to master
Squashed commit of the following:
commit d4357830bec6f1c4882d9b65d2926a9074d67d45
Author: Ainar Garipov <[email protected]>
Date: Wed May 26 18:45:22 2021 +0300
client: fix more
commit 04e57baf7fd692923f7ec04f708c4011aef009c0
Author: Ainar Garipov <[email protected]>
Date: Wed May 26 18:29:39 2021 +0300
client: fix, upd i18n </s> remove "filter_category_security_desc": "Lists that specialize on blocking malware, phishing, or scam domains",
</s> add "filter_category_security_desc": "Lists designed specifically to block malicious, phishing, and scam domains", </s> remove "resolve_clients_desc": "If enabled, AdGuard Home will attempt to reversely resolve clients' IP addresses into their hostnames by sending PTR queries to corresponding resolvers (private DNS servers for local clients, upstream server for clients with public IP addresses).",
</s> add "resolve_clients_desc": "If enabled, AdGuard Home will attempt to reversely resolve clients' IP addresses into their hostnames by sending PTR queries to corresponding resolvers (private DNS servers for local clients, upstream servers for clients with public IP addresses).", </s> remove "host_whitelisted": "The host is whitelisted",
</s> add "host_whitelisted": "The host is allowed",
|
https://github.com/AdguardTeam/AdGuardHome/commit/7a48e92e4d3404feefd5702a485461b39aecd0a4
|
client/src/__locales/en.json
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> "filter_category_security": "Security",
<mask> "filter_category_regional": "Regional",
<mask> "filter_category_other": "Other",
<mask> "filter_category_general_desc": "Lists that block tracking and advertising on most of the devices",
<mask> "filter_category_security_desc": "Lists that specialize on blocking malware, phishing, or scam domains",
<mask> "filter_category_regional_desc": "Lists that focus on regional ads and tracking servers",
<mask> "filter_category_other_desc": "Other blocklists",
<mask> "setup_config_to_enable_dhcp_server": "Setup configuration to enable DHCP server",
<mask> "original_response": "Original response",
<mask> "click_to_view_queries": "Click to view queries",
</s> Pull request: client: fix, upd i18n
Merge in DNS/adguard-home from upd-i18n to master
Squashed commit of the following:
commit d4357830bec6f1c4882d9b65d2926a9074d67d45
Author: Ainar Garipov <[email protected]>
Date: Wed May 26 18:45:22 2021 +0300
client: fix more
commit 04e57baf7fd692923f7ec04f708c4011aef009c0
Author: Ainar Garipov <[email protected]>
Date: Wed May 26 18:29:39 2021 +0300
client: fix, upd i18n </s> remove "show_whitelisted_responses": "Whitelisted",
</s> add "show_whitelisted_responses": "Allowed", </s> remove "resolve_clients_desc": "If enabled, AdGuard Home will attempt to reversely resolve clients' IP addresses into their hostnames by sending PTR queries to corresponding resolvers (private DNS servers for local clients, upstream server for clients with public IP addresses).",
</s> add "resolve_clients_desc": "If enabled, AdGuard Home will attempt to reversely resolve clients' IP addresses into their hostnames by sending PTR queries to corresponding resolvers (private DNS servers for local clients, upstream servers for clients with public IP addresses).", </s> remove "host_whitelisted": "The host is whitelisted",
</s> add "host_whitelisted": "The host is allowed",
|
https://github.com/AdguardTeam/AdGuardHome/commit/7a48e92e4d3404feefd5702a485461b39aecd0a4
|
client/src/__locales/en.json
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> s.leasesLock.Lock()
<mask> defer s.leasesLock.Unlock()
<mask>
<mask> if s.findReservedHWaddr(l.IP) != nil {
<mask> return fmt.Errorf("IP is already used")
<mask> }
<mask> s.leases = append(s.leases, &l)
<mask> s.reserveIP(l.IP, l.HWAddr)
<mask> s.dbStore()
<mask> return nil
</s> * dhcp: when adding a static lease, it can replace a dynamic lease </s> remove var newLeases []*Lease
for _, lease := range s.leases {
if bytes.Equal(lease.IP.To4(), l.IP) {
if !bytes.Equal(lease.HWAddr, l.HWAddr) ||
lease.Hostname != l.Hostname {
return fmt.Errorf("Lease not found")
}
continue
}
newLeases = append(newLeases, lease)
</s> add err := s.rmLease(l)
if err != nil {
return err </s> remove s.leases = newLeases
s.unreserveIP(l.IP)
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/7acbeb89569cd0260a0e21eae3a2439b419c2e24
|
dhcpd/dhcpd.go
|
keep replace replace replace replace replace replace replace replace replace replace keep replace replace keep keep
|
<mask>
<mask> var newLeases []*Lease
<mask> for _, lease := range s.leases {
<mask> if bytes.Equal(lease.IP.To4(), l.IP) {
<mask> if !bytes.Equal(lease.HWAddr, l.HWAddr) ||
<mask> lease.Hostname != l.Hostname {
<mask> return fmt.Errorf("Lease not found")
<mask> }
<mask> continue
<mask> }
<mask> newLeases = append(newLeases, lease)
<mask> }
<mask> s.leases = newLeases
<mask> s.unreserveIP(l.IP)
<mask> s.dbStore()
<mask> return nil
</s> * dhcp: when adding a static lease, it can replace a dynamic lease </s> remove return fmt.Errorf("IP is already used")
</s> add err := s.rmDynamicLeaseWithIP(l.IP)
if err != nil {
return err
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/7acbeb89569cd0260a0e21eae3a2439b419c2e24
|
dhcpd/dhcpd.go
|
keep keep add keep keep keep keep keep
|
<mask> // origReqDNSSEC shows if the DNSSEC flag in the original request from
<mask> // the client is set.
<mask> origReqDNSSEC bool
<mask> }
<mask>
<mask> // resultCode is the result of a request processing function.
<mask> type resultCode int
<mask>
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> add // processDetermineLocal determines if the client's IP address is from
// locally-served network and saves the result into the context.
func (s *Server) processDetermineLocal(dctx *dnsContext) (rc resultCode) {
rc = resultCodeSuccess
var ip net.IP
if ip = IPFromAddr(dctx.proxyCtx.Addr); ip == nil {
return rc
}
dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
return rc
}
</s> remove return resultCodeSuccess
</s> add // TODO(e.burkov): Inspect special cases when user want to apply
// some rules handled by other processors to the hosts with TLD.
d.Res = s.genNXDomain(req)
return resultCodeFinish </s> remove // processRestrictLocal responds with empty answers to PTR requests for IP
// addresses in locally-served network from external clients.
</s> add // processRestrictLocal responds with NXDOMAIN to PTR requests for IP addresses
// in locally-served network from external clients. </s> remove // TODO(e.burkov): Restrict the access for external clients.
</s> add d := dctx.proxyCtx
if !dctx.isLocalClient {
log.Debug("dns: %q requests for internal host", d.Addr)
d.Res = s.genNXDomain(req)
// Do not even put into query log.
return resultCodeFinish
} </s> remove clientIP := IPFromAddr(d.Addr)
if !s.subnetDetector.IsLocallyServedNetwork(clientIP) {
log.Debug("dns: %q requests for internal ip", clientIP)
d.Res = s.makeResponse(req)
</s> add if !ctx.isLocalClient {
log.Debug("dns: %q requests for internal ip", d.Addr)
d.Res = s.genNXDomain(req) </s> add isLocalCli bool
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns.go
|
keep keep add keep keep keep keep
|
<mask> // appropriate handler.
<mask> mods := []modProcessFunc{
<mask> processInitial,
<mask> s.processInternalHosts,
<mask> s.processRestrictLocal,
<mask> s.processInternalIPAddrs,
<mask> processClientID,
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> add // isLocalClient shows if client's IP address is from locally-served
// network.
isLocalClient bool </s> remove // processRestrictLocal responds with empty answers to PTR requests for IP
// addresses in locally-served network from external clients.
</s> add // processRestrictLocal responds with NXDOMAIN to PTR requests for IP addresses
// in locally-served network from external clients. </s> remove pctx := dctx.proxyCtx
</s> add require.NoError(t, dctx.err)
</s> add // processDetermineLocal determines if the client's IP address is from
// locally-served network and saves the result into the context.
func (s *Server) processDetermineLocal(dctx *dnsContext) (rc resultCode) {
rc = resultCodeSuccess
var ip net.IP
if ip = IPFromAddr(dctx.proxyCtx.Addr); ip == nil {
return rc
}
dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
return rc
}
</s> remove clientIP := IPFromAddr(d.Addr)
if !s.subnetDetector.IsLocallyServedNetwork(clientIP) {
log.Debug("dns: %q requests for internal ip", clientIP)
d.Res = s.makeResponse(req)
</s> add if !ctx.isLocalClient {
log.Debug("dns: %q requests for internal ip", d.Addr)
d.Res = s.genNXDomain(req) </s> remove return resultCodeSuccess
</s> add // TODO(e.burkov): Inspect special cases when user want to apply
// some rules handled by other processors to the hosts with TLD.
d.Res = s.genNXDomain(req)
return resultCodeFinish
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns.go
|
keep add keep keep keep keep keep
|
<mask> }
<mask>
<mask> // hostToIP tries to get an IP leased by DHCP and returns the copy of address
<mask> // since the data inside the internal table may be changed while request
<mask> // processing. It's safe for concurrent use.
<mask> func (s *Server) hostToIP(host string) (ip net.IP, ok bool) {
<mask> s.tableHostToIPLock.Lock()
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> add // isLocalClient shows if client's IP address is from locally-served
// network.
isLocalClient bool </s> remove clientIP := IPFromAddr(d.Addr)
if !s.subnetDetector.IsLocallyServedNetwork(clientIP) {
log.Debug("dns: %q requests for internal ip", clientIP)
d.Res = s.makeResponse(req)
</s> add if !ctx.isLocalClient {
log.Debug("dns: %q requests for internal ip", d.Addr)
d.Res = s.genNXDomain(req) </s> remove return resultCodeSuccess
</s> add // TODO(e.burkov): Inspect special cases when user want to apply
// some rules handled by other processors to the hosts with TLD.
d.Res = s.genNXDomain(req)
return resultCodeFinish </s> remove // processRestrictLocal responds with empty answers to PTR requests for IP
// addresses in locally-served network from external clients.
</s> add // processRestrictLocal responds with NXDOMAIN to PTR requests for IP addresses
// in locally-served network from external clients. </s> remove // TODO(e.burkov): Restrict the access for external clients.
</s> add d := dctx.proxyCtx
if !dctx.isLocalClient {
log.Debug("dns: %q requests for internal host", d.Addr)
d.Res = s.genNXDomain(req)
// Do not even put into query log.
return resultCodeFinish
} </s> remove pctx := dctx.proxyCtx
</s> add require.NoError(t, dctx.err)
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns.go
|
keep keep replace keep keep keep replace keep
|
<mask> }
<mask>
<mask> // TODO(e.burkov): Restrict the access for external clients.
<mask>
<mask> ip, ok := s.hostToIP(host)
<mask> if !ok {
<mask> return resultCodeSuccess
<mask> }
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> remove clientIP := IPFromAddr(d.Addr)
if !s.subnetDetector.IsLocallyServedNetwork(clientIP) {
log.Debug("dns: %q requests for internal ip", clientIP)
d.Res = s.makeResponse(req)
</s> add if !ctx.isLocalClient {
log.Debug("dns: %q requests for internal ip", d.Addr)
d.Res = s.genNXDomain(req) </s> remove // processRestrictLocal responds with empty answers to PTR requests for IP
// addresses in locally-served network from external clients.
</s> add // processRestrictLocal responds with NXDOMAIN to PTR requests for IP addresses
// in locally-served network from external clients. </s> add // processDetermineLocal determines if the client's IP address is from
// locally-served network and saves the result into the context.
func (s *Server) processDetermineLocal(dctx *dnsContext) (rc resultCode) {
rc = resultCodeSuccess
var ip net.IP
if ip = IPFromAddr(dctx.proxyCtx.Addr); ip == nil {
return rc
}
dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
return rc
}
</s> add // isLocalClient shows if client's IP address is from locally-served
// network.
isLocalClient bool </s> remove if tc.wantErrMsg == "" {
assert.NoError(t, dctx.err)
} else {
require.Error(t, dctx.err)
assert.Equal(t, tc.wantErrMsg, dctx.err.Error())
</s> add return
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns.go
|
keep keep keep keep replace replace keep keep keep keep keep
|
<mask>
<mask> return resultCodeSuccess
<mask> }
<mask>
<mask> // processRestrictLocal responds with empty answers to PTR requests for IP
<mask> // addresses in locally-served network from external clients.
<mask> func (s *Server) processRestrictLocal(ctx *dnsContext) (rc resultCode) {
<mask> d := ctx.proxyCtx
<mask> req := d.Req
<mask> q := req.Question[0]
<mask> if q.Qtype != dns.TypePTR {
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> add // processDetermineLocal determines if the client's IP address is from
// locally-served network and saves the result into the context.
func (s *Server) processDetermineLocal(dctx *dnsContext) (rc resultCode) {
rc = resultCodeSuccess
var ip net.IP
if ip = IPFromAddr(dctx.proxyCtx.Addr); ip == nil {
return rc
}
dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
return rc
}
</s> remove // TODO(e.burkov): Restrict the access for external clients.
</s> add d := dctx.proxyCtx
if !dctx.isLocalClient {
log.Debug("dns: %q requests for internal host", d.Addr)
d.Res = s.genNXDomain(req)
// Do not even put into query log.
return resultCodeFinish
} </s> remove clientIP := IPFromAddr(d.Addr)
if !s.subnetDetector.IsLocallyServedNetwork(clientIP) {
log.Debug("dns: %q requests for internal ip", clientIP)
d.Res = s.makeResponse(req)
</s> add if !ctx.isLocalClient {
log.Debug("dns: %q requests for internal ip", d.Addr)
d.Res = s.genNXDomain(req) </s> remove return resultCodeSuccess
</s> add // TODO(e.burkov): Inspect special cases when user want to apply
// some rules handled by other processors to the hosts with TLD.
d.Res = s.genNXDomain(req)
return resultCodeFinish </s> add // isLocalClient shows if client's IP address is from locally-served
// network.
isLocalClient bool </s> remove func TestServer_ProcessInternalHosts(t *testing.T) {
</s> add func TestServer_ProcessDetermineLocal(t *testing.T) {
snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
s := &Server{
subnetDetector: snd,
}
testCases := []struct {
name string
cliIP net.IP
want bool
}{{
name: "local",
cliIP: net.IP{192, 168, 0, 1},
want: true,
}, {
name: "external",
cliIP: net.IP{250, 249, 0, 1},
want: false,
}}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
proxyCtx := &proxy.DNSContext{
Addr: &net.TCPAddr{
IP: tc.cliIP,
},
}
dctx := &dnsContext{
proxyCtx: proxyCtx,
}
s.processDetermineLocal(dctx)
assert.Equal(t, tc.want, dctx.isLocalClient)
})
}
}
func TestServer_ProcessInternalHosts_localRestriction(t *testing.T) {
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns.go
|
keep keep keep keep replace replace replace replace keep keep keep keep keep
|
<mask> // Restrict an access to local addresses for external clients. We also
<mask> // assume that all the DHCP leases we give are locally-served or at
<mask> // least don't need to be unaccessable externally.
<mask> if s.subnetDetector.IsLocallyServedNetwork(ip) {
<mask> clientIP := IPFromAddr(d.Addr)
<mask> if !s.subnetDetector.IsLocallyServedNetwork(clientIP) {
<mask> log.Debug("dns: %q requests for internal ip", clientIP)
<mask> d.Res = s.makeResponse(req)
<mask>
<mask> // Do not even put into query log.
<mask> return resultCodeFinish
<mask> }
<mask> }
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> remove // TODO(e.burkov): Restrict the access for external clients.
</s> add d := dctx.proxyCtx
if !dctx.isLocalClient {
log.Debug("dns: %q requests for internal host", d.Addr)
d.Res = s.genNXDomain(req)
// Do not even put into query log.
return resultCodeFinish
} </s> remove return resultCodeSuccess
</s> add // TODO(e.burkov): Inspect special cases when user want to apply
// some rules handled by other processors to the hosts with TLD.
d.Res = s.genNXDomain(req)
return resultCodeFinish </s> remove // processRestrictLocal responds with empty answers to PTR requests for IP
// addresses in locally-served network from external clients.
</s> add // processRestrictLocal responds with NXDOMAIN to PTR requests for IP addresses
// in locally-served network from external clients. </s> add // processDetermineLocal determines if the client's IP address is from
// locally-served network and saves the result into the context.
func (s *Server) processDetermineLocal(dctx *dnsContext) (rc resultCode) {
rc = resultCodeSuccess
var ip net.IP
if ip = IPFromAddr(dctx.proxyCtx.Addr); ip == nil {
return rc
}
dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
return rc
}
</s> add // isLocalClient shows if client's IP address is from locally-served
// network.
isLocalClient bool </s> remove pctx := dctx.proxyCtx
</s> add require.NoError(t, dctx.err)
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns.go
|
keep keep keep add keep keep keep keep keep keep
|
<mask> import (
<mask> "net"
<mask> "testing"
<mask>
<mask> "github.com/AdguardTeam/AdGuardHome/internal/aghtest"
<mask> "github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
<mask> "github.com/AdguardTeam/dnsproxy/proxy"
<mask> "github.com/AdguardTeam/dnsproxy/upstream"
<mask> "github.com/miekg/dns"
<mask> "github.com/stretchr/testify/assert"
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> remove func TestServer_ProcessInternalHosts(t *testing.T) {
</s> add func TestServer_ProcessDetermineLocal(t *testing.T) {
snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
s := &Server{
subnetDetector: snd,
}
testCases := []struct {
name string
cliIP net.IP
want bool
}{{
name: "local",
cliIP: net.IP{192, 168, 0, 1},
want: true,
}, {
name: "external",
cliIP: net.IP{250, 249, 0, 1},
want: false,
}}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
proxyCtx := &proxy.DNSContext{
Addr: &net.TCPAddr{
IP: tc.cliIP,
},
}
dctx := &dnsContext{
proxyCtx: proxyCtx,
}
s.processDetermineLocal(dctx)
assert.Equal(t, tc.want, dctx.isLocalClient)
})
}
}
func TestServer_ProcessInternalHosts_localRestriction(t *testing.T) { </s> remove qtyp: dns.TypeAAAA,
wantRes: resultCodeSuccess,
</s> add wantRes: resultCodeFinish,
isLocalCli: false,
}, {
name: "external_client_unknown_host",
host: "wronghost.lan",
wantIP: nil,
wantRes: resultCodeFinish,
isLocalCli: false,
}}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
s := &Server{
autohostSuffix: defaultAutohostSuffix,
tableHostToIP: map[string]net.IP{
"example": knownIP,
},
}
req := &dns.Msg{
MsgHdr: dns.MsgHdr{
Id: dns.Id(),
},
Question: []dns.Question{{
Name: dns.Fqdn(tc.host),
Qtype: dns.TypeA,
Qclass: dns.ClassINET,
}},
}
dctx := &dnsContext{
proxyCtx: &proxy.DNSContext{
Req: req,
},
isLocalClient: tc.isLocalCli,
}
res := s.processInternalHosts(dctx)
require.Equal(t, tc.wantRes, res)
pctx := dctx.proxyCtx
if tc.wantRes == resultCodeFinish {
require.NotNil(t, pctx.Res)
assert.Equal(t, dns.RcodeNameError, pctx.Res.Rcode)
assert.Len(t, pctx.Res.Answer, 0)
return
}
if tc.wantIP == nil {
assert.Nil(t, pctx.Res)
} else {
require.NotNil(t, pctx.Res)
ans := pctx.Res.Answer
require.Len(t, ans, 1)
assert.Equal(t, tc.wantIP, ans[0].(*dns.A).A)
}
})
}
}
func TestServer_ProcessInternalHosts(t *testing.T) {
const (
examplecom = "example.com"
examplelan = "example.lan"
)
knownIP := net.IP{1, 2, 3, 4}
testCases := []struct {
name string
host string
suffix string
wantIP net.IP
wantRes resultCode
qtyp uint16
}{{
name: "success_external",
host: examplecom,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA,
}, {
name: "success_external_non_a",
host: examplecom,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeCNAME,
}, {
name: "success_internal",
host: examplelan,
suffix: defaultAutohostSuffix,
wantIP: knownIP,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA,
}, {
name: "success_internal_unknown",
host: "example-new.lan",
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeFinish,
qtyp: dns.TypeA,
}, {
name: "success_internal_aaaa",
host: examplelan,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeAAAA,
}, {
name: "success_custom_suffix",
host: "example.custom",
suffix: ".custom.",
wantIP: knownIP,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA, </s> remove pctx := dctx.proxyCtx
</s> add require.NoError(t, dctx.err)
</s> add isLocalCli bool </s> add s.processDetermineLocal, </s> add // processDetermineLocal determines if the client's IP address is from
// locally-served network and saves the result into the context.
func (s *Server) processDetermineLocal(dctx *dnsContext) (rc resultCode) {
rc = resultCodeSuccess
var ip net.IP
if ip = IPFromAddr(dctx.proxyCtx.Addr); ip == nil {
return rc
}
dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
return rc
}
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns_test.go
|
keep replace keep keep keep keep replace replace keep
|
<mask>
<mask> func TestServer_ProcessInternalHosts(t *testing.T) {
<mask> knownIP := net.IP{1, 2, 3, 4}
<mask> testCases := []struct {
<mask> name string
<mask> host string
<mask> suffix string
<mask> wantErrMsg string
<mask> wantIP net.IP
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> remove qtyp uint16
</s> add </s> remove qtyp: dns.TypeAAAA,
wantRes: resultCodeSuccess,
</s> add wantRes: resultCodeFinish,
isLocalCli: false,
}, {
name: "external_client_unknown_host",
host: "wronghost.lan",
wantIP: nil,
wantRes: resultCodeFinish,
isLocalCli: false,
}}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
s := &Server{
autohostSuffix: defaultAutohostSuffix,
tableHostToIP: map[string]net.IP{
"example": knownIP,
},
}
req := &dns.Msg{
MsgHdr: dns.MsgHdr{
Id: dns.Id(),
},
Question: []dns.Question{{
Name: dns.Fqdn(tc.host),
Qtype: dns.TypeA,
Qclass: dns.ClassINET,
}},
}
dctx := &dnsContext{
proxyCtx: &proxy.DNSContext{
Req: req,
},
isLocalClient: tc.isLocalCli,
}
res := s.processInternalHosts(dctx)
require.Equal(t, tc.wantRes, res)
pctx := dctx.proxyCtx
if tc.wantRes == resultCodeFinish {
require.NotNil(t, pctx.Res)
assert.Equal(t, dns.RcodeNameError, pctx.Res.Rcode)
assert.Len(t, pctx.Res.Answer, 0)
return
}
if tc.wantIP == nil {
assert.Nil(t, pctx.Res)
} else {
require.NotNil(t, pctx.Res)
ans := pctx.Res.Answer
require.Len(t, ans, 1)
assert.Equal(t, tc.wantIP, ans[0].(*dns.A).A)
}
})
}
}
func TestServer_ProcessInternalHosts(t *testing.T) {
const (
examplecom = "example.com"
examplelan = "example.lan"
)
knownIP := net.IP{1, 2, 3, 4}
testCases := []struct {
name string
host string
suffix string
wantIP net.IP
wantRes resultCode
qtyp uint16
}{{
name: "success_external",
host: examplecom,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA,
}, {
name: "success_external_non_a",
host: examplecom,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeCNAME,
}, {
name: "success_internal",
host: examplelan,
suffix: defaultAutohostSuffix,
wantIP: knownIP,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA,
}, {
name: "success_internal_unknown",
host: "example-new.lan",
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeFinish,
qtyp: dns.TypeA,
}, {
name: "success_internal_aaaa",
host: examplelan,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeAAAA,
}, {
name: "success_custom_suffix",
host: "example.custom",
suffix: ".custom.",
wantIP: knownIP,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA, </s> add isLocalCli bool </s> add // processDetermineLocal determines if the client's IP address is from
// locally-served network and saves the result into the context.
func (s *Server) processDetermineLocal(dctx *dnsContext) (rc resultCode) {
rc = resultCodeSuccess
var ip net.IP
if ip = IPFromAddr(dctx.proxyCtx.Addr); ip == nil {
return rc
}
dctx.isLocalClient = s.subnetDetector.IsLocallyServedNetwork(ip)
return rc
}
</s> remove name: "success_external",
host: "example.com",
suffix: defaultAutohostSuffix,
wantErrMsg: "",
wantIP: nil,
qtyp: dns.TypeA,
wantRes: resultCodeSuccess,
}, {
name: "success_external_non_a",
host: "example.com",
suffix: defaultAutohostSuffix,
wantErrMsg: "",
wantIP: nil,
qtyp: dns.TypeCNAME,
wantRes: resultCodeSuccess,
}, {
name: "success_internal",
</s> add name: "local_client_success",
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns_test.go
|
keep keep keep keep replace keep keep keep keep keep
|
<mask> host string
<mask> suffix string
<mask> wantErrMsg string
<mask> wantIP net.IP
<mask> qtyp uint16
<mask> wantRes resultCode
<mask> }{{
<mask> name: "success_external",
<mask> host: "example.com",
<mask> suffix: defaultAutohostSuffix,
</s> Pull request: 2889 internal hosts restriction
Merge in DNS/adguard-home from 2889-imp-autohosts to master
Closes #2889.
Squashed commit of the following:
commit 1d3b649364f991c092851c02d99827769cce8b70
Merge: abc6e1c8 1a214eaa
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:59:51 2021 +0300
Merge branch 'master' into 2889-imp-autohosts
commit abc6e1c8830e41a774c6d239ddd7b722b29df93e
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:34:56 2021 +0300
dnsforward: imp code
commit 4b2b9140d3e2526a935216ba42faba9b86b9ef3f
Author: Eugene Burkov <[email protected]>
Date: Thu Apr 8 17:31:34 2021 +0300
dnsforward: respond with nxdomain
commit 814667417a1b02c152a034852858b96412874f85
Author: Eugene Burkov <[email protected]>
Date: Tue Apr 6 19:16:14 2021 +0300
dnsforward: restrict the access to intl hosts for ext clients </s> remove suffix string
wantErrMsg string
</s> add </s> add isLocalCli bool </s> remove name: "success_external",
host: "example.com",
suffix: defaultAutohostSuffix,
wantErrMsg: "",
wantIP: nil,
qtyp: dns.TypeA,
wantRes: resultCodeSuccess,
}, {
name: "success_external_non_a",
host: "example.com",
suffix: defaultAutohostSuffix,
wantErrMsg: "",
wantIP: nil,
qtyp: dns.TypeCNAME,
wantRes: resultCodeSuccess,
}, {
name: "success_internal",
</s> add name: "local_client_success", </s> remove qtyp: dns.TypeAAAA,
wantRes: resultCodeSuccess,
</s> add wantRes: resultCodeFinish,
isLocalCli: false,
}, {
name: "external_client_unknown_host",
host: "wronghost.lan",
wantIP: nil,
wantRes: resultCodeFinish,
isLocalCli: false,
}}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
s := &Server{
autohostSuffix: defaultAutohostSuffix,
tableHostToIP: map[string]net.IP{
"example": knownIP,
},
}
req := &dns.Msg{
MsgHdr: dns.MsgHdr{
Id: dns.Id(),
},
Question: []dns.Question{{
Name: dns.Fqdn(tc.host),
Qtype: dns.TypeA,
Qclass: dns.ClassINET,
}},
}
dctx := &dnsContext{
proxyCtx: &proxy.DNSContext{
Req: req,
},
isLocalClient: tc.isLocalCli,
}
res := s.processInternalHosts(dctx)
require.Equal(t, tc.wantRes, res)
pctx := dctx.proxyCtx
if tc.wantRes == resultCodeFinish {
require.NotNil(t, pctx.Res)
assert.Equal(t, dns.RcodeNameError, pctx.Res.Rcode)
assert.Len(t, pctx.Res.Answer, 0)
return
}
if tc.wantIP == nil {
assert.Nil(t, pctx.Res)
} else {
require.NotNil(t, pctx.Res)
ans := pctx.Res.Answer
require.Len(t, ans, 1)
assert.Equal(t, tc.wantIP, ans[0].(*dns.A).A)
}
})
}
}
func TestServer_ProcessInternalHosts(t *testing.T) {
const (
examplecom = "example.com"
examplelan = "example.lan"
)
knownIP := net.IP{1, 2, 3, 4}
testCases := []struct {
name string
host string
suffix string
wantIP net.IP
wantRes resultCode
qtyp uint16
}{{
name: "success_external",
host: examplecom,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA,
}, {
name: "success_external_non_a",
host: examplecom,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeCNAME,
}, {
name: "success_internal",
host: examplelan,
suffix: defaultAutohostSuffix,
wantIP: knownIP,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA,
}, {
name: "success_internal_unknown",
host: "example-new.lan",
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeFinish,
qtyp: dns.TypeA,
}, {
name: "success_internal_aaaa",
host: examplelan,
suffix: defaultAutohostSuffix,
wantIP: nil,
wantRes: resultCodeSuccess,
qtyp: dns.TypeAAAA,
}, {
name: "success_custom_suffix",
host: "example.custom",
suffix: ".custom.",
wantIP: knownIP,
wantRes: resultCodeSuccess,
qtyp: dns.TypeA, </s> remove func TestServer_ProcessInternalHosts(t *testing.T) {
</s> add func TestServer_ProcessDetermineLocal(t *testing.T) {
snd, err := aghnet.NewSubnetDetector()
require.NoError(t, err)
s := &Server{
subnetDetector: snd,
}
testCases := []struct {
name string
cliIP net.IP
want bool
}{{
name: "local",
cliIP: net.IP{192, 168, 0, 1},
want: true,
}, {
name: "external",
cliIP: net.IP{250, 249, 0, 1},
want: false,
}}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
proxyCtx := &proxy.DNSContext{
Addr: &net.TCPAddr{
IP: tc.cliIP,
},
}
dctx := &dnsContext{
proxyCtx: proxyCtx,
}
s.processDetermineLocal(dctx)
assert.Equal(t, tc.want, dctx.isLocalClient)
})
}
}
func TestServer_ProcessInternalHosts_localRestriction(t *testing.T) { </s> remove qtyp: dns.TypeA,
</s> add
|
https://github.com/AdguardTeam/AdGuardHome/commit/7afc692632a09a1310aca265c6b788817ead660a
|
internal/dnsforward/dns_test.go
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.