Compare commits
311 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
64c922a1d8 | ||
|
|
905c783ca9 | ||
|
|
4eac62e6ce | ||
|
|
418409ac47 | ||
|
|
4895bfdc55 | ||
|
|
976902f861 | ||
|
|
b06a1cfec0 | ||
|
|
449fce9d6a | ||
|
|
6b45caadfb | ||
|
|
06b49cb810 | ||
|
|
ae58133a0d | ||
|
|
2b0bfb126e | ||
|
|
97841e3f32 | ||
|
|
2fc2baf6f8 | ||
|
|
06355a71da | ||
|
|
9782c430af | ||
|
|
cafdf14008 | ||
|
|
e7569de5c6 | ||
|
|
2b69fe15ed | ||
|
|
bb1f2d02c5 | ||
|
|
3bd093ceb9 | ||
|
|
05c0eab4a8 | ||
|
|
57745f2953 | ||
|
|
9f5ac14aa1 | ||
|
|
8f2aa58fe8 | ||
|
|
01e23d3b69 | ||
|
|
c2da171c85 | ||
|
|
b44dd16ad8 | ||
|
|
ba00016be8 | ||
|
|
e301f483c6 | ||
|
|
ebf25a8ddf | ||
|
|
56d6644194 | ||
|
|
51401dac81 | ||
|
|
18b07898ea | ||
|
|
223739f4a7 | ||
|
|
02ff6a11f0 | ||
|
|
2bff464f65 | ||
|
|
8fe0fe27ea | ||
|
|
5c00caa296 | ||
|
|
344337a3d5 | ||
|
|
e1287564c3 | ||
|
|
8f61de83bf | ||
|
|
f3810cf241 | ||
|
|
3d385f409e | ||
|
|
19bdd47b3c | ||
|
|
32c728ccf8 | ||
|
|
327d67c9ef | ||
|
|
edd7f82351 | ||
|
|
012d43b950 | ||
|
|
e2298f6f1e | ||
|
|
18350f94a6 | ||
|
|
1a9d5df5cb | ||
|
|
8ef1eb8c2a | ||
|
|
7c2018acbc | ||
|
|
2079f6a3eb | ||
|
|
d9419446bf | ||
|
|
c0cbccb63c | ||
|
|
5444dda08a | ||
|
|
224617aae6 | ||
|
|
c941c8a100 | ||
|
|
07a25cd094 | ||
|
|
54d98c10fe | ||
|
|
4a897c40b5 | ||
|
|
9af45d3cab | ||
|
|
9c60b399a8 | ||
|
|
01dbf8e50a | ||
|
|
58d0302c74 | ||
|
|
90ea6a13de | ||
|
|
4f80a7979f | ||
|
|
3812101c25 | ||
|
|
8c79c8b32d | ||
|
|
0afc437252 | ||
|
|
6ae53fea6e | ||
|
|
d925ccf45a | ||
|
|
24243a4b4d | ||
|
|
ef9ebc29b7 | ||
|
|
bd4e0f2b28 | ||
|
|
e952c9f85a | ||
|
|
df67e9a0bd | ||
|
|
7e47ed0879 | ||
|
|
1952ec1527 | ||
|
|
9ca5205d6a | ||
|
|
8a8da9d162 | ||
|
|
6440c71492 | ||
|
|
0b66b2debb | ||
|
|
351c142b91 | ||
|
|
8ce6aed66f | ||
|
|
778d18d816 | ||
|
|
2ea436bbbc | ||
|
|
b5a820b6f4 | ||
|
|
37f5043493 | ||
|
|
7638fb75a3 | ||
|
|
fdad6d3b7b | ||
|
|
074e300974 | ||
|
|
523e068195 | ||
|
|
9a7c617311 | ||
|
|
c214899b75 | ||
|
|
e31a8c8064 | ||
|
|
31cc27df1b | ||
|
|
d60051b5cb | ||
|
|
6770ae2a99 | ||
|
|
84738809ef | ||
|
|
43a08f7eef | ||
|
|
89aeec5f97 | ||
|
|
00ee5415a5 | ||
|
|
b5bd79b61e | ||
|
|
7080c236eb | ||
|
|
bb073eb51e | ||
|
|
7372d49aca | ||
|
|
1d771d4a0a | ||
|
|
dcffdbd98e | ||
|
|
abcc2e4125 | ||
|
|
e453381382 | ||
|
|
9a9913998a | ||
|
|
a3cdb66fe6 | ||
|
|
39aa84e2fd | ||
|
|
1ec2270eb5 | ||
|
|
5d1ee9b538 | ||
|
|
03d3cf57e9 | ||
|
|
2a5465ddb0 | ||
|
|
84efc786d4 | ||
|
|
12e5fb6f7f | ||
|
|
5c66900fdb | ||
|
|
2710ead089 | ||
|
|
839aa420e0 | ||
|
|
4ee42d4092 | ||
|
|
b2950f0718 | ||
|
|
7b1793476d | ||
|
|
f8750ef231 | ||
|
|
cc9283530f | ||
|
|
5a61e56766 | ||
|
|
8f71d514ee | ||
|
|
1b122b228f | ||
|
|
e88c0cdd38 | ||
|
|
3ceb188b81 | ||
|
|
0bc52ecb3c | ||
|
|
36d6c37df3 | ||
|
|
8fd793fdab | ||
|
|
be1909aedb | ||
|
|
e83b4d84ec | ||
|
|
b39b3f38fe | ||
|
|
d50765925b | ||
|
|
e0f8971155 | ||
|
|
f1d53f5610 | ||
|
|
4b4e6b1c72 | ||
|
|
095af716c9 | ||
|
|
e4e9f050df | ||
|
|
638b9b9428 | ||
|
|
0d4d18c595 | ||
|
|
33350c168d | ||
|
|
1bbb882225 | ||
|
|
6e86e8e5c5 | ||
|
|
7cb4c8793a | ||
|
|
4d2c636d9b | ||
|
|
9895d6de43 | ||
|
|
f62b6f94c5 | ||
|
|
e00d9a6c59 | ||
|
|
d2e573bbed | ||
|
|
8c0b6ee70d | ||
|
|
b9c7b1f559 | ||
|
|
7b5b876b0c | ||
|
|
848fb50132 | ||
|
|
6206402cae | ||
|
|
b24dc91ef2 | ||
|
|
d2d58f9058 | ||
|
|
e6fb75f715 | ||
|
|
3b31049636 | ||
|
|
5db091d800 | ||
|
|
8278ecb6a2 | ||
|
|
084eeba24a | ||
|
|
0134840300 | ||
|
|
05335aaf3f | ||
|
|
fb38741036 | ||
|
|
5a07feaffd | ||
|
|
e555c287bf | ||
|
|
ad52f32a3b | ||
|
|
665b27cfbe | ||
|
|
871d558ffd | ||
|
|
881e00e7e3 | ||
|
|
29963b9d75 | ||
|
|
bea8ec2d98 | ||
|
|
851f5fad58 | ||
|
|
1125837420 | ||
|
|
34f9a13da3 | ||
|
|
1432ab4b52 | ||
|
|
8f3a8e3572 | ||
|
|
87d5903cfc | ||
|
|
a50639af23 | ||
|
|
c4b1a70dac | ||
|
|
94677c7a39 | ||
|
|
cd2295ef05 | ||
|
|
944bb42074 | ||
|
|
1350364804 | ||
|
|
3625395d32 | ||
|
|
c32ed90a2e | ||
|
|
9af8c00bca | ||
|
|
0af476ac8e | ||
|
|
3b58e8ce3c | ||
|
|
1fffb80066 | ||
|
|
5f7e6e69e3 | ||
|
|
14e84b23d1 | ||
|
|
562576b8d4 | ||
|
|
532962527f | ||
|
|
99d1914542 | ||
|
|
6fa534dac1 | ||
|
|
3b6da33535 | ||
|
|
ded4a22a67 | ||
|
|
ab0589916f | ||
|
|
3226690d70 | ||
|
|
4d235491f2 | ||
|
|
96b7890404 | ||
|
|
760cc01217 | ||
|
|
c394a05fc1 | ||
|
|
11ab4483e0 | ||
|
|
65747a7f28 | ||
|
|
ca9ddc4222 | ||
|
|
6a2237b513 | ||
|
|
4afccfad8d | ||
|
|
9a32a1d638 | ||
|
|
e091914a06 | ||
|
|
7b584668ac | ||
|
|
30019327da | ||
|
|
fc8eeeaf0a | ||
|
|
11201881c0 | ||
|
|
498dcb8bcb | ||
|
|
5564239bea | ||
|
|
5319c5f53f | ||
|
|
49b9e1ce1f | ||
|
|
82a61aef09 | ||
|
|
3c58a8f091 | ||
|
|
4a62b80e75 | ||
|
|
52c1687d83 | ||
|
|
238a0f46e0 | ||
|
|
bbf5d2d178 | ||
|
|
1c4ea24da1 | ||
|
|
f277460b9d | ||
|
|
15c1643d34 | ||
|
|
e7f0a05e1a | ||
|
|
8506b5d5a5 | ||
|
|
0d629127a9 | ||
|
|
d6d8d2148d | ||
|
|
5a3f2004bc | ||
|
|
0e86fc8094 | ||
|
|
3c6c4b88ef | ||
|
|
4b4a10be7e | ||
|
|
4f1491858b | ||
|
|
33433b1aaf | ||
|
|
d85ebe0d34 | ||
|
|
235bd85510 | ||
|
|
5c29345f48 | ||
|
|
ebcb2b84ae | ||
|
|
080021e73d | ||
|
|
f447e28c86 | ||
|
|
f3b2ca644c | ||
|
|
4fdead0add | ||
|
|
059c6e9df7 | ||
|
|
a3f0efa8bc | ||
|
|
a79ad5abeb | ||
|
|
c6f8a14643 | ||
|
|
d262357c87 | ||
|
|
5da3730015 | ||
|
|
b444a4887b | ||
|
|
cc7133927f | ||
|
|
4b01042a4f | ||
|
|
4b94ef998d | ||
|
|
db5764b3d7 | ||
|
|
3c0115b71c | ||
|
|
c401c790bc | ||
|
|
271dcacf19 | ||
|
|
983d29d033 | ||
|
|
078f6e1cc4 | ||
|
|
9f8f6bc814 | ||
|
|
ef35178396 | ||
|
|
b3781c6d8f | ||
|
|
2319739f6d | ||
|
|
f9ac1ca698 | ||
|
|
9802bf2f37 | ||
|
|
843433e35d | ||
|
|
15c651ca96 | ||
|
|
4c1e56ccce | ||
|
|
906dfc680a | ||
|
|
583197f1c8 | ||
|
|
5fca3b1002 | ||
|
|
1edf5ae52a | ||
|
|
39f7f41e6d | ||
|
|
3139ad605f | ||
|
|
a9de069f6b | ||
|
|
4a8e2aab51 | ||
|
|
749c5f178c | ||
|
|
680989bc2e | ||
|
|
418989989b | ||
|
|
9a06a6ac10 | ||
|
|
ff7bae0bba | ||
|
|
215ee946dd | ||
|
|
cc13b9318d | ||
|
|
9d26eec6b0 | ||
|
|
bb969a0005 | ||
|
|
37b8fda889 | ||
|
|
0c9487a53d | ||
|
|
a039704f1b | ||
|
|
ec9be5aed6 | ||
|
|
542aacb002 | ||
|
|
e7e391f85c | ||
|
|
8ccd773b4b | ||
|
|
cb52a43940 | ||
|
|
2463809356 | ||
|
|
b71df4d8ed | ||
|
|
4cd60e818a | ||
|
|
31aad9471b | ||
|
|
34dac9e091 | ||
|
|
c1c81bb8f6 |
2
.dockerignore
Normal file
2
.dockerignore
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
dist
|
||||||
|
bin
|
||||||
28
.github/ISSUE_TEMPLATE/bug_report.md
vendored
28
.github/ISSUE_TEMPLATE/bug_report.md
vendored
@@ -1,28 +0,0 @@
|
|||||||
---
|
|
||||||
name: Bug report
|
|
||||||
about: Create a report to help us improve
|
|
||||||
title: ''
|
|
||||||
labels: ''
|
|
||||||
assignees: ''
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
**Describe the bug**
|
|
||||||
A clear and concise description of what the bug is.
|
|
||||||
|
|
||||||
**To Reproduce**
|
|
||||||
Steps to reproduce the behavior:
|
|
||||||
1. What version of AdGuardHome sync used?
|
|
||||||
2. What version of AdGuardHome us used?
|
|
||||||
3. How does the configuration look?
|
|
||||||
4. What is the error message?
|
|
||||||
|
|
||||||
**Expected behavior**
|
|
||||||
A clear and concise description of what you expected to happen.
|
|
||||||
|
|
||||||
**Log Files**
|
|
||||||
If applicable, add log files or json responses from AdGuardHome to help explain your problem.
|
|
||||||
Please set the environment variable `LOG_LEVEL=debug` to generate debug logs.
|
|
||||||
|
|
||||||
**Additional context**
|
|
||||||
Add any other context about the problem here.
|
|
||||||
78
.github/ISSUE_TEMPLATE/bug_report.yaml
vendored
Normal file
78
.github/ISSUE_TEMPLATE/bug_report.yaml
vendored
Normal file
@@ -0,0 +1,78 @@
|
|||||||
|
name: Bug report
|
||||||
|
description: Create a report to help us improve
|
||||||
|
labels: ['bug']
|
||||||
|
body:
|
||||||
|
- type: markdown
|
||||||
|
attributes:
|
||||||
|
value: |
|
||||||
|
Thanks for taking the time to fill out this issue report! If you have usage questions, please try the [FAQ](https://github.com/bakito/adguardhome-sync/wiki/FAQ) first.
|
||||||
|
- type: textarea
|
||||||
|
id: what-happened
|
||||||
|
attributes:
|
||||||
|
label: What happened?
|
||||||
|
description: Also tell us, what did you expect to happen?
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: adguardhome-sync-version
|
||||||
|
attributes:
|
||||||
|
label: AdguardHome-Sync Version
|
||||||
|
description: |
|
||||||
|
- What version of adguardhome-sync was running when you discovered this issue?
|
||||||
|
- Are you running the docker or binary version?
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: adguardhome-version
|
||||||
|
attributes:
|
||||||
|
label: AdguardHome Version
|
||||||
|
description: What version of adguardhome was running when you discovered this issue?
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: os-information
|
||||||
|
attributes:
|
||||||
|
label: OS Information
|
||||||
|
description: |
|
||||||
|
- What Operating System are you running? `cat /etc/os-release`
|
||||||
|
- What is the architecture of your CPU? `uname -m`
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: config
|
||||||
|
attributes:
|
||||||
|
label: Configuration
|
||||||
|
description: |
|
||||||
|
- How did you configure adguardhome-sync?
|
||||||
|
- Please provide your configuration
|
||||||
|
render: shell
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: applied-config
|
||||||
|
attributes:
|
||||||
|
label: Current Applied Configuration
|
||||||
|
description: |
|
||||||
|
- Run adguardhome-sync with environment variable `PRINT_CONFIG_ONLY=true` and provide the output here
|
||||||
|
render: shell
|
||||||
|
- type: textarea
|
||||||
|
id: logs
|
||||||
|
attributes:
|
||||||
|
label: Relevant DEBUG log output
|
||||||
|
description: |
|
||||||
|
Please copy and paste any relevant **debug** log output. This will be automatically formatted into code, so no need for backticks.
|
||||||
|
Enable debug logs by defining the following environment variable `LOG_LEVEL=debug`.
|
||||||
|
|
||||||
|
Please also check adguardhome logs and paste any relevant logs/errors to this issue.
|
||||||
|
render: shell
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Anything else?
|
||||||
|
description: |
|
||||||
|
Links? References? Anything that will provide more context about the issue you are encountering!
|
||||||
|
|
||||||
|
Tip: You can attach images or log files by clicking this area to highlight it and then dragging files in.
|
||||||
|
validations:
|
||||||
|
required: false
|
||||||
1
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
1
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
blank_issues_enabled: false
|
||||||
20
.github/ISSUE_TEMPLATE/feature_request.md
vendored
20
.github/ISSUE_TEMPLATE/feature_request.md
vendored
@@ -1,20 +0,0 @@
|
|||||||
---
|
|
||||||
name: Feature request
|
|
||||||
about: Suggest an idea for this project
|
|
||||||
title: ''
|
|
||||||
labels: enhancement
|
|
||||||
assignees: ''
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
**Is your feature request related to a problem? Please describe.**
|
|
||||||
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
|
|
||||||
|
|
||||||
**Describe the solution you'd like**
|
|
||||||
A clear and concise description of what you want to happen.
|
|
||||||
|
|
||||||
**Describe alternatives you've considered**
|
|
||||||
A clear and concise description of any alternative solutions or features you've considered.
|
|
||||||
|
|
||||||
**Additional context**
|
|
||||||
Add any other context or screenshots about the feature request here.
|
|
||||||
36
.github/ISSUE_TEMPLATE/feature_request.yaml
vendored
Normal file
36
.github/ISSUE_TEMPLATE/feature_request.yaml
vendored
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
name: Feature request
|
||||||
|
description: Suggest an idea for this project
|
||||||
|
labels: ['enhancement']
|
||||||
|
body:
|
||||||
|
- type: markdown
|
||||||
|
attributes:
|
||||||
|
value: |
|
||||||
|
Thanks for taking the time to fill out this issue report!
|
||||||
|
- type: textarea
|
||||||
|
id: relation
|
||||||
|
attributes:
|
||||||
|
label: Is your feature request related to a problem? Please describe.
|
||||||
|
description: A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: solution
|
||||||
|
attributes:
|
||||||
|
label: Describe the solution you'd like*
|
||||||
|
description: |
|
||||||
|
A clear and concise description of what you want to happen.
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: alternatives
|
||||||
|
attributes:
|
||||||
|
label: Describe alternatives you've considered
|
||||||
|
description: |
|
||||||
|
A clear and concise description of any alternative solutions or features you've considered.
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Anything else?
|
||||||
|
description: |
|
||||||
|
Add any other context or screenshots about the feature request here.
|
||||||
|
validations:
|
||||||
|
required: false
|
||||||
60
.github/ISSUE_TEMPLATE/general_issue.yaml
vendored
Normal file
60
.github/ISSUE_TEMPLATE/general_issue.yaml
vendored
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
name: General Issue
|
||||||
|
description: Report an issue with your setup
|
||||||
|
labels: []
|
||||||
|
body:
|
||||||
|
- type: markdown
|
||||||
|
attributes:
|
||||||
|
value: |
|
||||||
|
Thanks for taking the time to fill out this issue report! If you have usage questions, please try the [FAQ](https://github.com/bakito/adguardhome-sync/wiki/FAQ) first.
|
||||||
|
- type: textarea
|
||||||
|
id: what-happened
|
||||||
|
attributes:
|
||||||
|
label: What happened?
|
||||||
|
description: Also tell us, what did you expect to happen?
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: adguardhome-sync-version
|
||||||
|
attributes:
|
||||||
|
label: AdguardHome-Sync Version
|
||||||
|
description: What version of adguardhome-sync was running when you discovered this issue?
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: adguardhome-version
|
||||||
|
attributes:
|
||||||
|
label: AdguardHome Version
|
||||||
|
description: What version of adguardhome was running when you discovered this issue?
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: config
|
||||||
|
attributes:
|
||||||
|
label: Configuration
|
||||||
|
description: |
|
||||||
|
- How did you configure adguardhome-sync?
|
||||||
|
- Please provide your configuration
|
||||||
|
render: shell
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
id: logs
|
||||||
|
attributes:
|
||||||
|
label: Relevant log output
|
||||||
|
description: |
|
||||||
|
Please copy and paste any relevant **debug** log output. This will be automatically formatted into code, so no need for backticks.
|
||||||
|
Enable debug logs by defining the following environment variable `LOG_LEVEL=debug`.
|
||||||
|
|
||||||
|
Please also check adguardhome logs and paste any relevant logs/errors to this issue.
|
||||||
|
render: shell
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Anything else?
|
||||||
|
description: |
|
||||||
|
Links? References? Anything that will provide more context about the issue you are encountering!
|
||||||
|
|
||||||
|
Tip: You can attach images or log files by clicking this area to highlight it and then dragging files in.
|
||||||
|
validations:
|
||||||
|
required: false
|
||||||
15
.github/dependabot.yml
vendored
15
.github/dependabot.yml
vendored
@@ -1,15 +0,0 @@
|
|||||||
# To get started with Dependabot version updates, you'll need to specify which
|
|
||||||
# package ecosystems to update and where the package manifests are located.
|
|
||||||
# Please see the documentation for all configuration options:
|
|
||||||
# https://help.github.com/github/administering-a-repository/configuration-options-for-dependency-updates
|
|
||||||
|
|
||||||
version: 2
|
|
||||||
updates:
|
|
||||||
- package-ecosystem: "gomod" # See documentation for possible values
|
|
||||||
directory: "/" # Location of package manifests
|
|
||||||
schedule:
|
|
||||||
interval: "weekly"
|
|
||||||
- package-ecosystem: "github-actions"
|
|
||||||
directory: "/"
|
|
||||||
schedule:
|
|
||||||
interval: "weekly"
|
|
||||||
16
.github/workflows/codeql-analysis.yml
vendored
16
.github/workflows/codeql-analysis.yml
vendored
@@ -20,6 +20,10 @@ on:
|
|||||||
schedule:
|
schedule:
|
||||||
- cron: '32 19 * * 6'
|
- cron: '32 19 * * 6'
|
||||||
|
|
||||||
|
concurrency:
|
||||||
|
group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.ref }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
analyze:
|
analyze:
|
||||||
name: Analyze
|
name: Analyze
|
||||||
@@ -40,9 +44,15 @@ jobs:
|
|||||||
- name: Checkout repository
|
- name: Checkout repository
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
|
||||||
|
- name: Set up Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version-file: "go.mod"
|
||||||
|
|
||||||
# Initializes the CodeQL tools for scanning.
|
# Initializes the CodeQL tools for scanning.
|
||||||
- name: Initialize CodeQL
|
- name: Initialize CodeQL
|
||||||
uses: github/codeql-action/init@v2
|
uses: github/codeql-action/init@v3
|
||||||
with:
|
with:
|
||||||
languages: ${{ matrix.language }}
|
languages: ${{ matrix.language }}
|
||||||
# If you wish to specify custom queries, you can do so here or in a config file.
|
# If you wish to specify custom queries, you can do so here or in a config file.
|
||||||
@@ -53,7 +63,7 @@ jobs:
|
|||||||
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
|
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
|
||||||
# If this step fails, then you should remove it and run the build manually (see below)
|
# If this step fails, then you should remove it and run the build manually (see below)
|
||||||
- name: Autobuild
|
- name: Autobuild
|
||||||
uses: github/codeql-action/autobuild@v2
|
uses: github/codeql-action/autobuild@v3
|
||||||
|
|
||||||
# ℹ️ Command-line programs to run using the OS shell.
|
# ℹ️ Command-line programs to run using the OS shell.
|
||||||
# 📚 https://git.io/JvXDl
|
# 📚 https://git.io/JvXDl
|
||||||
@@ -67,4 +77,4 @@ jobs:
|
|||||||
# make release
|
# make release
|
||||||
|
|
||||||
- name: Perform CodeQL Analysis
|
- name: Perform CodeQL Analysis
|
||||||
uses: github/codeql-action/analyze@v2
|
uses: github/codeql-action/analyze@v3
|
||||||
|
|||||||
@@ -1,13 +1,20 @@
|
|||||||
name: docker-image
|
name: docker-images
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
workflow_dispatch: # allows manual triggering
|
||||||
branches:
|
schedule:
|
||||||
- main
|
- cron: '0 0 * * *'
|
||||||
|
#pull_request:
|
||||||
|
# branches:
|
||||||
|
# - main
|
||||||
release:
|
release:
|
||||||
types:
|
types:
|
||||||
- published
|
- published
|
||||||
|
|
||||||
|
concurrency:
|
||||||
|
group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.ref }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
images:
|
images:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
@@ -39,35 +46,40 @@ jobs:
|
|||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
- name: Checkout
|
- name: Checkout
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
- name: Modify Dockerfile
|
- name: Modify Dockerfile
|
||||||
run: |
|
run: |
|
||||||
sed -i -e "s|FROM scratch|FROM ${{ matrix.build.fromImage }}|g" Dockerfile
|
sed -i -e "s|FROM scratch|FROM ${{ matrix.build.fromImage }}|g" Dockerfile
|
||||||
|
|
||||||
- name: Build and push ${{github.event.release.tag_name }}
|
- name: Build images ${{github.event.release.tag_name }}
|
||||||
id: docker_build_release
|
id: docker_build_release
|
||||||
uses: docker/build-push-action@v5
|
uses: docker/build-push-action@v6
|
||||||
if: ${{ github.event.release.tag_name != '' }}
|
if: ${{ github.event.release.tag_name != '' }}
|
||||||
with:
|
with:
|
||||||
context: .
|
context: .
|
||||||
pull: true
|
pull: true
|
||||||
push: true
|
push: true
|
||||||
tags: quay.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}latest,quay.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}${{ github.event.release.tag_name }},ghcr.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}latest,ghcr.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}${{ github.event.release.tag_name }}
|
tags: quay.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}latest,quay.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}${{ github.event.release.tag_name }},ghcr.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}latest,ghcr.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}${{ github.event.release.tag_name }}
|
||||||
platforms: linux/amd64,linux/arm64,linux/arm/v7
|
platforms: linux/amd64,linux/arm/v6,linux/arm/v7,linux/arm64/v8,linux/arm64,linux/ppc64le
|
||||||
provenance: false
|
provenance: false
|
||||||
build-args: |
|
build-args: |
|
||||||
VERSION=${{ github.event.release.tag_name }}
|
VERSION=${{ github.event.release.tag_name }}
|
||||||
BUILD=${{ env.curr_date }}
|
BUILD=${{ env.curr_date }}
|
||||||
|
|
||||||
- name: Build and push main
|
- name: Check for commits in the last 24 hours
|
||||||
id: docker_build_main
|
run: echo "NEW_COMMIT_COUNT=$(git log --oneline --since '24 hours ago' | wc -l)" >> $GITHUB_ENV
|
||||||
uses: docker/build-push-action@v5
|
|
||||||
if: ${{ github.event.release.tag_name == '' }}
|
if: ${{ github.event.release.tag_name == '' }}
|
||||||
|
|
||||||
|
- name: Build images
|
||||||
|
id: docker_build_main
|
||||||
|
uses: docker/build-push-action@v6
|
||||||
|
if: ${{ github.event.release.tag_name == '' && env.NEW_COMMIT_COUNT > 0 }}
|
||||||
with:
|
with:
|
||||||
context: .
|
context: .
|
||||||
pull: true
|
pull: true
|
||||||
push: true
|
push: ${{ github.ref == 'refs/heads/main' }}
|
||||||
tags: quay.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}main,ghcr.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}main
|
tags: quay.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}main,ghcr.io/bakito/adguardhome-sync:${{ matrix.build.tagPrefix }}main
|
||||||
platforms: linux/amd64,linux/arm64,linux/arm/v7
|
platforms: linux/amd64,linux/arm/v6,linux/arm/v7,linux/arm64/v8,linux/arm64,linux/ppc64le
|
||||||
provenance: false
|
provenance: false
|
||||||
build-args: |
|
build-args: |
|
||||||
VERSION=main
|
VERSION=main
|
||||||
@@ -75,4 +87,3 @@ jobs:
|
|||||||
|
|
||||||
- name: Image digest
|
- name: Image digest
|
||||||
run: echo ${{ steps.docker_build.outputs.digest }}
|
run: echo ${{ steps.docker_build.outputs.digest }}
|
||||||
|
|
||||||
28
.github/workflows/e2e.yaml
vendored
28
.github/workflows/e2e.yaml
vendored
@@ -8,13 +8,27 @@ on:
|
|||||||
branches:
|
branches:
|
||||||
- main
|
- main
|
||||||
|
|
||||||
|
concurrency:
|
||||||
|
group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.ref }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
e2e:
|
e2e:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
build:
|
||||||
|
- mode: env
|
||||||
|
protocol: https
|
||||||
|
- mode: file
|
||||||
|
protocol: http
|
||||||
steps:
|
steps:
|
||||||
- name: Checkout
|
- name: Checkout
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Setup jq
|
||||||
|
uses: dcarbone/install-jq-action@v3
|
||||||
|
|
||||||
- name: Install kind with registry
|
- name: Install kind with registry
|
||||||
uses: bakito/kind-with-registry-action@main
|
uses: bakito/kind-with-registry-action@main
|
||||||
|
|
||||||
@@ -22,14 +36,20 @@ jobs:
|
|||||||
run: ./testdata/e2e/bin/build-image.sh
|
run: ./testdata/e2e/bin/build-image.sh
|
||||||
|
|
||||||
- name: Install Helm Chart
|
- name: Install Helm Chart
|
||||||
run: ./testdata/e2e/bin/install-chart.sh
|
run: ./testdata/e2e/bin/install-chart.sh ${{ matrix.build.mode }}
|
||||||
|
- name: Wait for pod to start
|
||||||
|
run: ./testdata/e2e/bin/wait-for-start.sh ${{ matrix.build.protocol }}
|
||||||
|
- name: Show origin pre Logs
|
||||||
|
run: ./testdata/e2e/bin/show-origin-logs.sh pre
|
||||||
- name: Wait for sync to finish
|
- name: Wait for sync to finish
|
||||||
run: ./testdata/e2e/bin/wait-for-sync.sh
|
run: ./testdata/e2e/bin/wait-for-sync.sh ${{ matrix.build.protocol }}
|
||||||
- name: Show origin Logs
|
- name: Show origin post Logs
|
||||||
run: ./testdata/e2e/bin/show-origin-logs.sh
|
run: ./testdata/e2e/bin/show-origin-logs.sh post
|
||||||
- name: Show Replica Logs
|
- name: Show Replica Logs
|
||||||
run: ./testdata/e2e/bin/show-replica-logs.sh
|
run: ./testdata/e2e/bin/show-replica-logs.sh
|
||||||
- name: Show Sync Logs
|
- name: Show Sync Logs
|
||||||
run: ./testdata/e2e/bin/show-sync-logs.sh
|
run: ./testdata/e2e/bin/show-sync-logs.sh
|
||||||
|
- name: Show Sync Metrics
|
||||||
|
run: ./testdata/e2e/bin/show-sync-metrics.sh ${{ matrix.build.protocol }}
|
||||||
- name: Read latest replica config
|
- name: Read latest replica config
|
||||||
run: ./testdata/e2e/bin/read-latest-replica-config.sh
|
run: ./testdata/e2e/bin/read-latest-replica-config.sh
|
||||||
|
|||||||
31
.github/workflows/go.yml
vendored
31
.github/workflows/go.yml
vendored
@@ -6,6 +6,10 @@ on:
|
|||||||
pull_request:
|
pull_request:
|
||||||
branches: [ main ]
|
branches: [ main ]
|
||||||
|
|
||||||
|
concurrency:
|
||||||
|
group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.ref }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
golangci:
|
golangci:
|
||||||
name: lint
|
name: lint
|
||||||
@@ -14,32 +18,38 @@ jobs:
|
|||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
- name: Set up Go
|
- name: Set up Go
|
||||||
uses: actions/setup-go@v4
|
uses: actions/setup-go@v5
|
||||||
with:
|
with:
|
||||||
go-version-file: "go.mod"
|
go-version-file: "go.mod"
|
||||||
|
|
||||||
- name: golangci-lint
|
- name: Lint
|
||||||
uses: golangci/golangci-lint-action@v3
|
run: make lint
|
||||||
with:
|
|
||||||
skip-pkg-cache: true
|
|
||||||
|
|
||||||
test:
|
test:
|
||||||
name: test
|
name: test
|
||||||
runs-on: ubuntu-latest
|
runs-on: ${{ matrix.os }}
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
os: [ubuntu-latest, windows-latest, macos-latest]
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
|
|
||||||
- name: Check out code into the Go module directory
|
- name: Check out code into the Go module directory
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
- name: Set up Go
|
- name: Set up Go
|
||||||
uses: actions/setup-go@v4
|
uses: actions/setup-go@v5
|
||||||
with:
|
with:
|
||||||
go-version-file: "go.mod"
|
go-version-file: "go.mod"
|
||||||
|
|
||||||
|
- name: Model
|
||||||
|
run: make model
|
||||||
|
|
||||||
- name: Test
|
- name: Test
|
||||||
run: make test-ci
|
run: make test-ci
|
||||||
|
|
||||||
- name: Send coverage
|
- name: Send coverage
|
||||||
|
if: runner.os == 'Linux'
|
||||||
uses: shogo82148/actions-goveralls@v1
|
uses: shogo82148/actions-goveralls@v1
|
||||||
with:
|
with:
|
||||||
path-to-profile: coverage.out
|
path-to-profile: coverage.out
|
||||||
@@ -53,12 +63,9 @@ jobs:
|
|||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
- name: Set up Go
|
- name: Set up Go
|
||||||
uses: actions/setup-go@v4
|
uses: actions/setup-go@v5
|
||||||
with:
|
with:
|
||||||
go-version-file: "go.mod"
|
go-version-file: "go.mod"
|
||||||
|
|
||||||
- name: Run GoReleaser
|
- name: Run GoReleaser
|
||||||
uses: goreleaser/goreleaser-action@v5
|
run: make test-release
|
||||||
with:
|
|
||||||
version: latest
|
|
||||||
args: --skip-publish --snapshot --rm-dist
|
|
||||||
|
|||||||
17
.github/workflows/stale.yml
vendored
Normal file
17
.github/workflows/stale.yml
vendored
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
name: Mark stale issues and pull requests
|
||||||
|
|
||||||
|
on:
|
||||||
|
schedule:
|
||||||
|
- cron: "0 0 * * *"
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
stale:
|
||||||
|
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- uses: actions/stale@v9
|
||||||
|
with:
|
||||||
|
repo-token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
stale-issue-message: 'This issue has been inactive for 60 days. If the issue is still relevant please comment to re-activate the issue. If no action is taken within 7 days, the issue will be marked closed.'
|
||||||
|
stale-pr-message: 'This pull request has been inactive for 60 days. If the pull request is still relevant please comment to re-activate the pull request. If no action is taken within 7 days, the pull request will be marked closed.'
|
||||||
16
.github/workflows/virustotal.yaml
vendored
Normal file
16
.github/workflows/virustotal.yaml
vendored
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
name: Scan GitHub Release with VirusTotal
|
||||||
|
|
||||||
|
on:
|
||||||
|
release:
|
||||||
|
types: [released]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
scan_release:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Analyze Build Assets
|
||||||
|
uses: bakito/virustotal-action@main
|
||||||
|
with:
|
||||||
|
release_name: ${{github.event.release.tag_name}}
|
||||||
|
vt_api_key: ${{secrets.VT_API_KEY}}
|
||||||
5
.gitignore
vendored
5
.gitignore
vendored
@@ -1,5 +1,6 @@
|
|||||||
.vscode
|
.vscode
|
||||||
.idea
|
.idea
|
||||||
|
.fleet
|
||||||
.run
|
.run
|
||||||
coverage.out*
|
coverage.out*
|
||||||
dist
|
dist
|
||||||
@@ -8,5 +9,7 @@ main
|
|||||||
.adguardhome-sync.yaml
|
.adguardhome-sync.yaml
|
||||||
tmp
|
tmp
|
||||||
bin
|
bin
|
||||||
config.yaml
|
!testdata/e2e/bin
|
||||||
|
config*.yaml
|
||||||
*.log
|
*.log
|
||||||
|
wiki
|
||||||
|
|||||||
209
.golangci.yaml
Normal file
209
.golangci.yaml
Normal file
@@ -0,0 +1,209 @@
|
|||||||
|
version: '2'
|
||||||
|
linters:
|
||||||
|
enable:
|
||||||
|
- asciicheck
|
||||||
|
- bidichk
|
||||||
|
- bodyclose
|
||||||
|
- canonicalheader
|
||||||
|
- containedctx
|
||||||
|
- copyloopvar
|
||||||
|
- decorder
|
||||||
|
- dogsled
|
||||||
|
- dupword
|
||||||
|
- durationcheck
|
||||||
|
- err113
|
||||||
|
- errname
|
||||||
|
- errorlint
|
||||||
|
- exptostd
|
||||||
|
- fatcontext
|
||||||
|
- forcetypeassert
|
||||||
|
- gocheckcompilerdirectives
|
||||||
|
- gochecksumtype
|
||||||
|
- gocritic
|
||||||
|
- godot
|
||||||
|
- gomodguard
|
||||||
|
- goprintffuncname
|
||||||
|
- gosmopolitan
|
||||||
|
- grouper
|
||||||
|
- iface
|
||||||
|
- importas
|
||||||
|
- inamedparam
|
||||||
|
- interfacebloat
|
||||||
|
- intrange
|
||||||
|
- loggercheck
|
||||||
|
- makezero
|
||||||
|
- mirror
|
||||||
|
- misspell
|
||||||
|
- nilerr
|
||||||
|
- nilnesserr
|
||||||
|
- noctx
|
||||||
|
- nolintlint
|
||||||
|
- nosprintfhostport
|
||||||
|
- perfsprint
|
||||||
|
- predeclared
|
||||||
|
- promlinter
|
||||||
|
- protogetter
|
||||||
|
- reassign
|
||||||
|
- revive
|
||||||
|
- rowserrcheck
|
||||||
|
- sloglint
|
||||||
|
- spancheck
|
||||||
|
- sqlclosecheck
|
||||||
|
- staticcheck
|
||||||
|
- tagalign
|
||||||
|
- testableexamples
|
||||||
|
- testifylint
|
||||||
|
- thelper
|
||||||
|
- unconvert
|
||||||
|
- unparam
|
||||||
|
- usestdlibvars
|
||||||
|
- usetesting
|
||||||
|
- wastedassign
|
||||||
|
- whitespace
|
||||||
|
- zerologlint
|
||||||
|
disable:
|
||||||
|
- asasalint
|
||||||
|
- contextcheck
|
||||||
|
- cyclop
|
||||||
|
- depguard
|
||||||
|
- dupl
|
||||||
|
- errchkjson
|
||||||
|
- exhaustive
|
||||||
|
- exhaustruct
|
||||||
|
- forbidigo
|
||||||
|
- funlen
|
||||||
|
- ginkgolinter
|
||||||
|
- gochecknoglobals
|
||||||
|
- gochecknoinits
|
||||||
|
- gocognit
|
||||||
|
- goconst
|
||||||
|
- gocyclo
|
||||||
|
- godox
|
||||||
|
- goheader
|
||||||
|
- gomoddirectives
|
||||||
|
- gosec
|
||||||
|
- ireturn
|
||||||
|
- lll
|
||||||
|
- maintidx
|
||||||
|
- musttag
|
||||||
|
- nakedret
|
||||||
|
- nestif
|
||||||
|
- nilnil
|
||||||
|
- nlreturn
|
||||||
|
- nonamedreturns
|
||||||
|
- paralleltest
|
||||||
|
- prealloc
|
||||||
|
- recvcheck
|
||||||
|
- tagliatelle
|
||||||
|
- testpackage
|
||||||
|
- tparallel
|
||||||
|
- varnamelen
|
||||||
|
- wrapcheck
|
||||||
|
- wsl
|
||||||
|
settings:
|
||||||
|
gocritic:
|
||||||
|
enable-all: true
|
||||||
|
disabled-checks:
|
||||||
|
- emptyFallthrough
|
||||||
|
- hugeParam
|
||||||
|
- rangeValCopy
|
||||||
|
- unnamedResult
|
||||||
|
- whyNoLint
|
||||||
|
govet:
|
||||||
|
disable:
|
||||||
|
- fieldalignment
|
||||||
|
- shadow
|
||||||
|
enable-all: true
|
||||||
|
misspell:
|
||||||
|
locale: US
|
||||||
|
revive:
|
||||||
|
enable-all-rules: true
|
||||||
|
rules:
|
||||||
|
- name: add-constant
|
||||||
|
disabled: true
|
||||||
|
- name: cognitive-complexity
|
||||||
|
disabled: true
|
||||||
|
- name: cyclomatic
|
||||||
|
disabled: true
|
||||||
|
- name: deep-exit
|
||||||
|
disabled: true
|
||||||
|
- name: dot-imports
|
||||||
|
severity: warning
|
||||||
|
disabled: false
|
||||||
|
exclude: [""]
|
||||||
|
arguments:
|
||||||
|
- allowedPackages: ["github.com/onsi/ginkgo/v2", "github.com/onsi/gomega"]
|
||||||
|
- name: empty-block
|
||||||
|
disabled: true
|
||||||
|
- name: exported
|
||||||
|
disabled: true
|
||||||
|
- name: filename-format
|
||||||
|
arguments:
|
||||||
|
- ^[a-z][-0-9_a-z]*(?:\.gen)?\.go$
|
||||||
|
- name: flag-parameter
|
||||||
|
disabled: true
|
||||||
|
- name: function-length
|
||||||
|
disabled: true
|
||||||
|
- name: function-result-limit
|
||||||
|
disabled: true
|
||||||
|
- name: import-shadowing
|
||||||
|
disabled: true
|
||||||
|
- name: line-length-limit
|
||||||
|
disabled: true
|
||||||
|
- name: max-control-nesting
|
||||||
|
disabled: true
|
||||||
|
- name: max-public-structs
|
||||||
|
disabled: true
|
||||||
|
- name: nested-structs
|
||||||
|
disabled: true
|
||||||
|
- name: package-comments
|
||||||
|
disabled: true
|
||||||
|
- name: unused-parameter
|
||||||
|
disabled: true
|
||||||
|
- name: unused-receiver
|
||||||
|
disabled: true
|
||||||
|
staticcheck:
|
||||||
|
checks:
|
||||||
|
- 'all'
|
||||||
|
- '-ST1000'
|
||||||
|
exclusions:
|
||||||
|
generated: lax
|
||||||
|
presets:
|
||||||
|
- common-false-positives
|
||||||
|
- legacy
|
||||||
|
- std-error-handling
|
||||||
|
rules:
|
||||||
|
- linters:
|
||||||
|
- err113
|
||||||
|
text: do not define dynamic errors, use wrapped static errors instead
|
||||||
|
- linters:
|
||||||
|
- forbidigo
|
||||||
|
path: ^internal/cmds/
|
||||||
|
- linters:
|
||||||
|
- forcetypeassert
|
||||||
|
path: _test\.go$
|
||||||
|
- linters:
|
||||||
|
- forbidigo
|
||||||
|
path: assets/scripts/generate-commit.go
|
||||||
|
formatters:
|
||||||
|
enable:
|
||||||
|
- gci
|
||||||
|
- gofmt
|
||||||
|
- gofumpt
|
||||||
|
- goimports
|
||||||
|
- golines
|
||||||
|
settings:
|
||||||
|
gci:
|
||||||
|
sections:
|
||||||
|
- standard
|
||||||
|
- default
|
||||||
|
- prefix(github.com/bakito/adguardhome-sync)
|
||||||
|
gofumpt:
|
||||||
|
module-path: github.com/bakito/adguardhome-sync
|
||||||
|
extra-rules: true
|
||||||
|
goimports:
|
||||||
|
local-prefixes:
|
||||||
|
- github.com/bakito/adguardhome-sync
|
||||||
|
golines:
|
||||||
|
max-len: 128
|
||||||
|
tab-len: 4
|
||||||
@@ -1,37 +0,0 @@
|
|||||||
run:
|
|
||||||
timeout: 5m
|
|
||||||
|
|
||||||
linters:
|
|
||||||
enable:
|
|
||||||
- asciicheck
|
|
||||||
- bodyclose
|
|
||||||
- dogsled
|
|
||||||
- durationcheck
|
|
||||||
- errcheck
|
|
||||||
- errorlint
|
|
||||||
- exportloopref
|
|
||||||
- gci
|
|
||||||
- gofmt
|
|
||||||
- gofumpt
|
|
||||||
- goimports
|
|
||||||
- gosec
|
|
||||||
- gosimple
|
|
||||||
- govet
|
|
||||||
- importas
|
|
||||||
- ineffassign
|
|
||||||
- megacheck
|
|
||||||
- misspell
|
|
||||||
- nakedret
|
|
||||||
- nolintlint
|
|
||||||
- staticcheck
|
|
||||||
- unconvert
|
|
||||||
- unparam
|
|
||||||
- unused
|
|
||||||
linters-settings:
|
|
||||||
gosec:
|
|
||||||
# Exclude generated files
|
|
||||||
exclude-generated: true
|
|
||||||
gofmt:
|
|
||||||
# simplify code: gofmt with `-s` option, true by default
|
|
||||||
simplify: true
|
|
||||||
|
|
||||||
@@ -1,3 +1,4 @@
|
|||||||
|
version: 2
|
||||||
# This is an example goreleaser.yaml file with some sane defaults.
|
# This is an example goreleaser.yaml file with some sane defaults.
|
||||||
# Make sure to check the documentation at http://goreleaser.com
|
# Make sure to check the documentation at http://goreleaser.com
|
||||||
builds:
|
builds:
|
||||||
@@ -30,16 +31,17 @@ builds:
|
|||||||
hooks:
|
hooks:
|
||||||
post:
|
post:
|
||||||
# don't upx windows binaries as they make trouble with virus scanners
|
# don't upx windows binaries as they make trouble with virus scanners
|
||||||
- bash -c 'if [[ "{{ .Path }}" != *.exe ]]; then upx {{ .Path }}; fi'
|
- bash -c 'if [[ "{{ .Path }}" != *.exe ]] && [[ "{{ .Path }}" != *darwin* ]]; then upx {{ .Path }}; fi'
|
||||||
checksum:
|
checksum:
|
||||||
name_template: 'checksums.txt'
|
name_template: 'checksums.txt'
|
||||||
snapshot:
|
snapshot:
|
||||||
name_template: "{{ .Tag }}-next"
|
version_template: "{{ .Tag }}-next"
|
||||||
changelog:
|
changelog:
|
||||||
sort: asc
|
sort: asc
|
||||||
filters:
|
filters:
|
||||||
exclude:
|
exclude:
|
||||||
- '^docs:'
|
- '^docs:'
|
||||||
- '^test:'
|
- '^test:'
|
||||||
|
- '^chore'
|
||||||
release:
|
release:
|
||||||
prerelease: auto
|
prerelease: auto
|
||||||
|
|||||||
104
.toolbox.mk
Normal file
104
.toolbox.mk
Normal file
@@ -0,0 +1,104 @@
|
|||||||
|
## toolbox - start
|
||||||
|
## Generated with https://github.com/bakito/toolbox
|
||||||
|
|
||||||
|
## Current working directory
|
||||||
|
TB_LOCALDIR ?= $(shell which cygpath > /dev/null 2>&1 && cygpath -m $$(pwd) || pwd)
|
||||||
|
## Location to install dependencies to
|
||||||
|
TB_LOCALBIN ?= $(TB_LOCALDIR)/bin
|
||||||
|
$(TB_LOCALBIN):
|
||||||
|
if [ ! -e $(TB_LOCALBIN) ]; then mkdir -p $(TB_LOCALBIN); fi
|
||||||
|
|
||||||
|
## Tool Binaries
|
||||||
|
TB_CONTROLLER_GEN ?= $(TB_LOCALBIN)/controller-gen
|
||||||
|
TB_GINKGO ?= $(TB_LOCALBIN)/ginkgo
|
||||||
|
TB_GOFUMPT ?= $(TB_LOCALBIN)/gofumpt
|
||||||
|
TB_GOLANGCI_LINT ?= $(TB_LOCALBIN)/golangci-lint
|
||||||
|
TB_GOLINES ?= $(TB_LOCALBIN)/golines
|
||||||
|
TB_GORELEASER ?= $(TB_LOCALBIN)/goreleaser
|
||||||
|
TB_MOCKGEN ?= $(TB_LOCALBIN)/mockgen
|
||||||
|
TB_OAPI_CODEGEN ?= $(TB_LOCALBIN)/oapi-codegen
|
||||||
|
TB_SEMVER ?= $(TB_LOCALBIN)/semver
|
||||||
|
|
||||||
|
## Tool Versions
|
||||||
|
# renovate: packageName=sigs.k8s.io/controller-tools/cmd/controller-gen
|
||||||
|
TB_CONTROLLER_GEN_VERSION ?= v0.18.0
|
||||||
|
# renovate: packageName=mvdan.cc/gofumpt
|
||||||
|
TB_GOFUMPT_VERSION ?= v0.8.0
|
||||||
|
# renovate: packageName=github.com/golangci/golangci-lint/v2
|
||||||
|
TB_GOLANGCI_LINT_VERSION ?= v2.1.6
|
||||||
|
# renovate: packageName=github.com/segmentio/golines
|
||||||
|
TB_GOLINES_VERSION ?= v0.12.2
|
||||||
|
# renovate: packageName=github.com/goreleaser/goreleaser/v2
|
||||||
|
TB_GORELEASER_VERSION ?= v2.9.0
|
||||||
|
# renovate: packageName=go.uber.org/mock/mockgen
|
||||||
|
TB_MOCKGEN_VERSION ?= v0.5.2
|
||||||
|
# renovate: packageName=github.com/oapi-codegen/oapi-codegen/v2
|
||||||
|
TB_OAPI_CODEGEN_VERSION ?= v2.4.1
|
||||||
|
# renovate: packageName=github.com/bakito/semver
|
||||||
|
TB_SEMVER_VERSION ?= v1.1.3
|
||||||
|
|
||||||
|
## Tool Installer
|
||||||
|
.PHONY: tb.controller-gen
|
||||||
|
tb.controller-gen: $(TB_CONTROLLER_GEN) ## Download controller-gen locally if necessary.
|
||||||
|
$(TB_CONTROLLER_GEN): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/controller-gen || GOBIN=$(TB_LOCALBIN) go install sigs.k8s.io/controller-tools/cmd/controller-gen@$(TB_CONTROLLER_GEN_VERSION)
|
||||||
|
.PHONY: tb.ginkgo
|
||||||
|
tb.ginkgo: $(TB_GINKGO) ## Download ginkgo locally if necessary.
|
||||||
|
$(TB_GINKGO): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/ginkgo || GOBIN=$(TB_LOCALBIN) go install github.com/onsi/ginkgo/v2/ginkgo
|
||||||
|
.PHONY: tb.gofumpt
|
||||||
|
tb.gofumpt: $(TB_GOFUMPT) ## Download gofumpt locally if necessary.
|
||||||
|
$(TB_GOFUMPT): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/gofumpt || GOBIN=$(TB_LOCALBIN) go install mvdan.cc/gofumpt@$(TB_GOFUMPT_VERSION)
|
||||||
|
.PHONY: tb.golangci-lint
|
||||||
|
tb.golangci-lint: $(TB_GOLANGCI_LINT) ## Download golangci-lint locally if necessary.
|
||||||
|
$(TB_GOLANGCI_LINT): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/golangci-lint || GOBIN=$(TB_LOCALBIN) go install github.com/golangci/golangci-lint/v2/cmd/golangci-lint@$(TB_GOLANGCI_LINT_VERSION)
|
||||||
|
.PHONY: tb.golines
|
||||||
|
tb.golines: $(TB_GOLINES) ## Download golines locally if necessary.
|
||||||
|
$(TB_GOLINES): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/golines || GOBIN=$(TB_LOCALBIN) go install github.com/segmentio/golines@$(TB_GOLINES_VERSION)
|
||||||
|
.PHONY: tb.goreleaser
|
||||||
|
tb.goreleaser: $(TB_GORELEASER) ## Download goreleaser locally if necessary.
|
||||||
|
$(TB_GORELEASER): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/goreleaser || GOBIN=$(TB_LOCALBIN) go install github.com/goreleaser/goreleaser/v2@$(TB_GORELEASER_VERSION)
|
||||||
|
.PHONY: tb.mockgen
|
||||||
|
tb.mockgen: $(TB_MOCKGEN) ## Download mockgen locally if necessary.
|
||||||
|
$(TB_MOCKGEN): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/mockgen || GOBIN=$(TB_LOCALBIN) go install go.uber.org/mock/mockgen@$(TB_MOCKGEN_VERSION)
|
||||||
|
.PHONY: tb.oapi-codegen
|
||||||
|
tb.oapi-codegen: $(TB_OAPI_CODEGEN) ## Download oapi-codegen locally if necessary.
|
||||||
|
$(TB_OAPI_CODEGEN): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/oapi-codegen || GOBIN=$(TB_LOCALBIN) go install github.com/oapi-codegen/oapi-codegen/v2/cmd/oapi-codegen@$(TB_OAPI_CODEGEN_VERSION)
|
||||||
|
.PHONY: tb.semver
|
||||||
|
tb.semver: $(TB_SEMVER) ## Download semver locally if necessary.
|
||||||
|
$(TB_SEMVER): $(TB_LOCALBIN)
|
||||||
|
test -s $(TB_LOCALBIN)/semver || GOBIN=$(TB_LOCALBIN) go install github.com/bakito/semver@$(TB_SEMVER_VERSION)
|
||||||
|
|
||||||
|
## Reset Tools
|
||||||
|
.PHONY: tb.reset
|
||||||
|
tb.reset:
|
||||||
|
@rm -f \
|
||||||
|
$(TB_LOCALBIN)/controller-gen \
|
||||||
|
$(TB_LOCALBIN)/ginkgo \
|
||||||
|
$(TB_LOCALBIN)/gofumpt \
|
||||||
|
$(TB_LOCALBIN)/golangci-lint \
|
||||||
|
$(TB_LOCALBIN)/golines \
|
||||||
|
$(TB_LOCALBIN)/goreleaser \
|
||||||
|
$(TB_LOCALBIN)/mockgen \
|
||||||
|
$(TB_LOCALBIN)/oapi-codegen \
|
||||||
|
$(TB_LOCALBIN)/semver
|
||||||
|
|
||||||
|
## Update Tools
|
||||||
|
.PHONY: tb.update
|
||||||
|
tb.update: tb.reset
|
||||||
|
toolbox makefile --renovate -f $(TB_LOCALDIR)/Makefile \
|
||||||
|
sigs.k8s.io/controller-tools/cmd/controller-gen@github.com/kubernetes-sigs/controller-tools \
|
||||||
|
mvdan.cc/gofumpt@github.com/mvdan/gofumpt \
|
||||||
|
github.com/golangci/golangci-lint/v2/cmd/golangci-lint \
|
||||||
|
github.com/segmentio/golines \
|
||||||
|
github.com/goreleaser/goreleaser/v2 \
|
||||||
|
go.uber.org/mock/mockgen@github.com/uber-go/mock \
|
||||||
|
github.com/oapi-codegen/oapi-codegen/v2/cmd/oapi-codegen \
|
||||||
|
github.com/bakito/semver
|
||||||
|
## toolbox - end
|
||||||
15
Dockerfile
15
Dockerfile
@@ -1,10 +1,8 @@
|
|||||||
FROM golang:1.21-bullseye as builder
|
FROM golang:1.24-alpine AS builder
|
||||||
|
|
||||||
WORKDIR /go/src/app
|
WORKDIR /go/src/app
|
||||||
|
|
||||||
RUN apt-get update && \
|
RUN apk update && apk add upx ca-certificates tzdata
|
||||||
apt-get install -y upx && \
|
|
||||||
apt-get upgrade -y # upgrade to get latest ca-certs
|
|
||||||
|
|
||||||
ARG VERSION=main
|
ARG VERSION=main
|
||||||
ARG BUILD="N/A"
|
ARG BUILD="N/A"
|
||||||
@@ -15,8 +13,10 @@ ENV GO111MODULE=on \
|
|||||||
|
|
||||||
COPY . /go/src/app/
|
COPY . /go/src/app/
|
||||||
|
|
||||||
RUN go build -a -installsuffix cgo -ldflags="-w -s -X github.com/bakito/adguardhome-sync/version.Version=${VERSION} -X github.com/bakito/adguardhome-sync/version.Build=${BUILD}" -o adguardhome-sync . \
|
|
||||||
&& upx -q adguardhome-sync
|
RUN go build -a -installsuffix cgo -ldflags="-w -s -X github.com/bakito/adguardhome-sync/version.Version=${VERSION} -X github.com/bakito/adguardhome-sync/version.Build=${BUILD}" -o adguardhome-sync .
|
||||||
|
|
||||||
|
RUN go version && upx -q adguardhome-sync
|
||||||
|
|
||||||
# application image
|
# application image
|
||||||
FROM scratch
|
FROM scratch
|
||||||
@@ -26,6 +26,7 @@ LABEL maintainer="bakito <github@bakito.ch>"
|
|||||||
EXPOSE 8080
|
EXPOSE 8080
|
||||||
ENTRYPOINT ["/opt/go/adguardhome-sync"]
|
ENTRYPOINT ["/opt/go/adguardhome-sync"]
|
||||||
CMD ["run", "--config", "/config/adguardhome-sync.yaml"]
|
CMD ["run", "--config", "/config/adguardhome-sync.yaml"]
|
||||||
COPY --from=builder /go/src/app/adguardhome-sync /opt/go/adguardhome-sync
|
|
||||||
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/ca-certificates.crt
|
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/ca-certificates.crt
|
||||||
|
COPY --from=builder /usr/share/zoneinfo/ /usr/share/zoneinfo/
|
||||||
|
COPY --from=builder /go/src/app/adguardhome-sync /opt/go/adguardhome-sync
|
||||||
USER 1001
|
USER 1001
|
||||||
|
|||||||
127
Makefile
127
Makefile
@@ -1,110 +1,57 @@
|
|||||||
|
# Include toolbox tasks
|
||||||
|
include ./.toolbox.mk
|
||||||
|
|
||||||
# Run go lint against code
|
# Run go lint against code
|
||||||
lint: golangci-lint
|
lint: tb.golangci-lint
|
||||||
$(GOLANGCI_LINT) run --fix
|
$(TB_GOLANGCI_LINT) run --fix
|
||||||
|
|
||||||
# Run go mod tidy
|
# Run go mod tidy
|
||||||
tidy:
|
tidy:
|
||||||
go mod tidy
|
go mod tidy
|
||||||
|
|
||||||
generate: deepcopy-gen
|
generate: model mocks deepcopy-gen
|
||||||
|
deepcopy-gen: tb.controller-gen
|
||||||
@mkdir -p ./tmp
|
@mkdir -p ./tmp
|
||||||
@touch ./tmp/deepcopy-gen-boilerplate.go.txt
|
@touch ./tmp/deepcopy-gen-boilerplate.go.txt
|
||||||
$(DEEPCOPY_GEN) -h ./tmp/deepcopy-gen-boilerplate.go.txt -i ./pkg/types
|
$(TB_CONTROLLER_GEN) paths=./pkg/types object
|
||||||
|
|
||||||
|
fmt: tb.golines tb.gofumpt
|
||||||
|
$(TB_GOLINES) --base-formatter="$(TB_GOFUMPT)" --max-len=120 --write-output .
|
||||||
|
|
||||||
# Run tests
|
# Run tests
|
||||||
test: generate lint test-ci
|
test: generate fmt lint test-ci
|
||||||
|
|
||||||
|
fuzz:
|
||||||
|
go test -fuzz=FuzzMask -v ./pkg/types/ -fuzztime=60s
|
||||||
|
|
||||||
# Run ci tests
|
# Run ci tests
|
||||||
test-ci: mocks tidy
|
test-ci: mocks tidy tb.ginkgo
|
||||||
go test ./... -coverprofile=coverage.out.tmp
|
$(TB_GINKGO) --cover --coverprofile coverage.out.tmp ./...
|
||||||
cat coverage.out.tmp | grep -v "_generated.go" > coverage.out
|
cat coverage.out.tmp | grep -v "_generated.go" > coverage.out
|
||||||
go tool cover -func=coverage.out
|
go tool cover -func=coverage.out
|
||||||
|
|
||||||
mocks: mockgen
|
mocks: tb.mockgen
|
||||||
$(MOCKGEN) -package client -destination pkg/mocks/client/mock.go github.com/bakito/adguardhome-sync/pkg/client Client
|
$(TB_MOCKGEN) -package client -destination pkg/mocks/client/mock.go github.com/bakito/adguardhome-sync/pkg/client Client
|
||||||
|
$(TB_MOCKGEN) -package client -destination pkg/mocks/flags/mock.go github.com/bakito/adguardhome-sync/pkg/config Flags
|
||||||
|
|
||||||
release: semver goreleaser
|
release: tb.semver tb.goreleaser
|
||||||
@version=$$($(LOCALBIN)/semver); \
|
@version=$$($(TB_SEMVER)); \
|
||||||
git tag -s $$version -m"Release $$version"
|
git tag -s $$version -m"Release $$version"
|
||||||
$(GORELEASER) --clean
|
$(TB_GORELEASER) --clean
|
||||||
|
|
||||||
test-release: goreleaser
|
test-release: tb.goreleaser
|
||||||
$(GORELEASER) --skip-publish --snapshot --clean
|
$(TB_GORELEASER) --skip=publish --snapshot --clean
|
||||||
|
|
||||||
## toolbox - start
|
|
||||||
## Current working directory
|
|
||||||
LOCALDIR ?= $(shell which cygpath > /dev/null 2>&1 && cygpath -m $$(pwd) || pwd)
|
|
||||||
## Location to install dependencies to
|
|
||||||
LOCALBIN ?= $(LOCALDIR)/bin
|
|
||||||
$(LOCALBIN):
|
|
||||||
mkdir -p $(LOCALBIN)
|
|
||||||
|
|
||||||
## Tool Binaries
|
|
||||||
SEMVER ?= $(LOCALBIN)/semver
|
|
||||||
OAPI_CODEGEN ?= $(LOCALBIN)/oapi-codegen
|
|
||||||
MOCKGEN ?= $(LOCALBIN)/mockgen
|
|
||||||
GOLANGCI_LINT ?= $(LOCALBIN)/golangci-lint
|
|
||||||
GORELEASER ?= $(LOCALBIN)/goreleaser
|
|
||||||
DEEPCOPY_GEN ?= $(LOCALBIN)/deepcopy-gen
|
|
||||||
|
|
||||||
## Tool Versions
|
|
||||||
SEMVER_VERSION ?= v1.1.3
|
|
||||||
OAPI_CODEGEN_VERSION ?= v2.0.0
|
|
||||||
MOCKGEN_VERSION ?= v1.6.0
|
|
||||||
GOLANGCI_LINT_VERSION ?= v1.55.2
|
|
||||||
GORELEASER_VERSION ?= v1.22.1
|
|
||||||
DEEPCOPY_GEN_VERSION ?= v0.28.4
|
|
||||||
|
|
||||||
## Tool Installer
|
|
||||||
.PHONY: semver
|
|
||||||
semver: $(SEMVER) ## Download semver locally if necessary.
|
|
||||||
$(SEMVER): $(LOCALBIN)
|
|
||||||
test -s $(LOCALBIN)/semver || GOBIN=$(LOCALBIN) go install github.com/bakito/semver@$(SEMVER_VERSION)
|
|
||||||
.PHONY: oapi-codegen
|
|
||||||
oapi-codegen: $(OAPI_CODEGEN) ## Download oapi-codegen locally if necessary.
|
|
||||||
$(OAPI_CODEGEN): $(LOCALBIN)
|
|
||||||
test -s $(LOCALBIN)/oapi-codegen || GOBIN=$(LOCALBIN) go install github.com/deepmap/oapi-codegen/v2/cmd/oapi-codegen@$(OAPI_CODEGEN_VERSION)
|
|
||||||
.PHONY: mockgen
|
|
||||||
mockgen: $(MOCKGEN) ## Download mockgen locally if necessary.
|
|
||||||
$(MOCKGEN): $(LOCALBIN)
|
|
||||||
test -s $(LOCALBIN)/mockgen || GOBIN=$(LOCALBIN) go install github.com/golang/mock/mockgen@$(MOCKGEN_VERSION)
|
|
||||||
.PHONY: golangci-lint
|
|
||||||
golangci-lint: $(GOLANGCI_LINT) ## Download golangci-lint locally if necessary.
|
|
||||||
$(GOLANGCI_LINT): $(LOCALBIN)
|
|
||||||
test -s $(LOCALBIN)/golangci-lint || GOBIN=$(LOCALBIN) go install github.com/golangci/golangci-lint/cmd/golangci-lint@$(GOLANGCI_LINT_VERSION)
|
|
||||||
.PHONY: goreleaser
|
|
||||||
goreleaser: $(GORELEASER) ## Download goreleaser locally if necessary.
|
|
||||||
$(GORELEASER): $(LOCALBIN)
|
|
||||||
test -s $(LOCALBIN)/goreleaser || GOBIN=$(LOCALBIN) go install github.com/goreleaser/goreleaser@$(GORELEASER_VERSION)
|
|
||||||
.PHONY: deepcopy-gen
|
|
||||||
deepcopy-gen: $(DEEPCOPY_GEN) ## Download deepcopy-gen locally if necessary.
|
|
||||||
$(DEEPCOPY_GEN): $(LOCALBIN)
|
|
||||||
test -s $(LOCALBIN)/deepcopy-gen || GOBIN=$(LOCALBIN) go install k8s.io/code-generator/cmd/deepcopy-gen@$(DEEPCOPY_GEN_VERSION)
|
|
||||||
|
|
||||||
## Update Tools
|
|
||||||
.PHONY: update-toolbox-tools
|
|
||||||
update-toolbox-tools:
|
|
||||||
@rm -f \
|
|
||||||
$(LOCALBIN)/semver \
|
|
||||||
$(LOCALBIN)/oapi-codegen \
|
|
||||||
$(LOCALBIN)/mockgen \
|
|
||||||
$(LOCALBIN)/golangci-lint \
|
|
||||||
$(LOCALBIN)/goreleaser \
|
|
||||||
$(LOCALBIN)/deepcopy-gen
|
|
||||||
toolbox makefile -f $(LOCALDIR)/Makefile \
|
|
||||||
github.com/bakito/semver \
|
|
||||||
github.com/deepmap/oapi-codegen/v2/cmd/oapi-codegen \
|
|
||||||
github.com/golang/mock/mockgen \
|
|
||||||
github.com/golangci/golangci-lint/cmd/golangci-lint \
|
|
||||||
github.com/goreleaser/goreleaser \
|
|
||||||
k8s.io/code-generator/cmd/deepcopy-gen@github.com/kubernetes/code-generator
|
|
||||||
## toolbox - end
|
|
||||||
|
|
||||||
start-replica:
|
start-replica:
|
||||||
|
docker rm -f adguardhome-replica
|
||||||
docker run --pull always --name adguardhome-replica -p 9091:3000 --rm adguard/adguardhome:latest
|
docker run --pull always --name adguardhome-replica -p 9091:3000 --rm adguard/adguardhome:latest
|
||||||
# docker run --pull always --name adguardhome-replica -p 9090:80 -p 9091:3000 --rm adguard/adguardhome:v0.107.13
|
# docker run --pull always --name adguardhome-replica -p 9090:80 -p 9091:3000 --rm adguard/adguardhome:v0.107.13
|
||||||
|
|
||||||
|
copy-replica-config:
|
||||||
|
docker cp adguardhome-replica:/opt/adguardhome/conf/AdGuardHome.yaml tmp/AdGuardHome.yaml
|
||||||
|
|
||||||
start-replica2:
|
start-replica2:
|
||||||
|
docker rm -f adguardhome-replica2
|
||||||
docker run --pull always --name adguardhome-replica2 -p 9093:3000 --rm adguard/adguardhome:latest
|
docker run --pull always --name adguardhome-replica2 -p 9093:3000 --rm adguard/adguardhome:latest
|
||||||
# docker run --pull always --name adguardhome-replica -p 9090:80 -p 9091:3000 --rm adguard/adguardhome:v0.107.13
|
# docker run --pull always --name adguardhome-replica -p 9090:80 -p 9091:3000 --rm adguard/adguardhome:v0.107.13
|
||||||
|
|
||||||
@@ -126,12 +73,18 @@ kind-create:
|
|||||||
kind-test:
|
kind-test:
|
||||||
@./testdata/e2e/bin/install-chart.sh
|
@./testdata/e2e/bin/install-chart.sh
|
||||||
|
|
||||||
model: oapi-codegen
|
# renovate: packageName=AdguardTeam/AdGuardHome
|
||||||
|
ADGUARD_HOME_VERSION ?= v0.107.61
|
||||||
|
|
||||||
|
model: tb.oapi-codegen
|
||||||
@mkdir -p tmp
|
@mkdir -p tmp
|
||||||
go run openapi/main.go v0.107.40
|
go run openapi/main.go $(ADGUARD_HOME_VERSION)
|
||||||
$(OAPI_CODEGEN) -package model -generate types,client -config .oapi-codegen.yaml tmp/schema.yaml > pkg/client/model/model_generated.go
|
$(TB_OAPI_CODEGEN) -package model -generate types,client -config .oapi-codegen.yaml tmp/schema.yaml > pkg/client/model/model_generated.go
|
||||||
|
|
||||||
model-diff:
|
model-diff:
|
||||||
go run openapi/main.go v0.107.40
|
go run openapi/main.go $(ADGUARD_HOME_VERSION)
|
||||||
go run openapi/main.go
|
go run openapi/main.go
|
||||||
diff tmp/schema.yaml tmp/schema-master.yaml
|
diff tmp/schema.yaml tmp/schema-master.yaml
|
||||||
|
|
||||||
|
zellij:
|
||||||
|
zellij -l ./testdata/test-layout.kdl
|
||||||
|
|||||||
255
README.md
255
README.md
@@ -1,4 +1,5 @@
|
|||||||
[](https://github.com/bakito/adguardhome-sync/actions/workflows/go.yml)
|
[](https://github.com/bakito/adguardhome-sync/actions/workflows/go.yml)
|
||||||
|
[](https://github.com/bakito/adguardhome-sync/actions/workflows/e2e.yaml)
|
||||||
[](https://goreportcard.com/report/github.com/bakito/adguardhome-sync)
|
[](https://goreportcard.com/report/github.com/bakito/adguardhome-sync)
|
||||||
[](https://coveralls.io/github/bakito/adguardhome-sync?branch=main)
|
[](https://coveralls.io/github/bakito/adguardhome-sync?branch=main)
|
||||||
|
|
||||||
@@ -6,6 +7,12 @@
|
|||||||
|
|
||||||
Synchronize [AdGuardHome](https://github.com/AdguardTeam/AdGuardHome) config to replica instances.
|
Synchronize [AdGuardHome](https://github.com/AdguardTeam/AdGuardHome) config to replica instances.
|
||||||
|
|
||||||
|
## FAQ & Deprecations
|
||||||
|
|
||||||
|
Please check the wiki
|
||||||
|
for [FAQ](https://github.com/bakito/adguardhome-sync/wiki/FAQ)
|
||||||
|
and [Deprecations](https://github.com/bakito/adguardhome-sync/wiki/Deprecations).
|
||||||
|
|
||||||
## Current sync features
|
## Current sync features
|
||||||
|
|
||||||
- General Settings
|
- General Settings
|
||||||
@@ -15,6 +22,7 @@ Synchronize [AdGuardHome](https://github.com/AdguardTeam/AdGuardHome) config to
|
|||||||
- Clients
|
- Clients
|
||||||
- DNS Config
|
- DNS Config
|
||||||
- DHCP Config
|
- DHCP Config
|
||||||
|
- Theme
|
||||||
|
|
||||||
By default, all features are enabled. Single features can be disabled in the config.
|
By default, all features are enabled. Single features can be disabled in the config.
|
||||||
|
|
||||||
@@ -39,7 +47,9 @@ Both the origin instance must be initially setup via the AdguardHome installatio
|
|||||||
|
|
||||||
## Username / Password vs. Cookie
|
## Username / Password vs. Cookie
|
||||||
|
|
||||||
Some instances of AdGuard Home do not support basic authentication. For instance, many routers with built-in Adguard Home support do not. If this is the case, a valid cookie may be provided instead. If the router protects the AdGuard instance behind its own authentication, the cookie from an authenticated request may allow the sync to succeed.
|
Some instances of AdGuard Home do not support basic authentication. For instance, many routers with built-in Adguard
|
||||||
|
Home support do not. If this is the case, a valid cookie may be provided instead. If the router protects the AdGuard
|
||||||
|
instance behind its own authentication, the cookie from an authenticated request may allow the sync to succeed.
|
||||||
|
|
||||||
- This has been tested successfully against GL.Inet routers with AdGuard Home.
|
- This has been tested successfully against GL.Inet routers with AdGuard Home.
|
||||||
- Note: due to the short validity of cookies, this approach is likely only suitable for one-time syncs
|
- Note: due to the short validity of cookies, this approach is likely only suitable for one-time syncs
|
||||||
@@ -53,18 +63,63 @@ export ORIGIN_URL=https://192.168.1.2:3000
|
|||||||
export ORIGIN_USERNAME=username
|
export ORIGIN_USERNAME=username
|
||||||
export ORIGIN_PASSWORD=password
|
export ORIGIN_PASSWORD=password
|
||||||
# export ORIGIN_COOKIE=Origin-Cookie-Name=CCCOOOKKKIIIEEE
|
# export ORIGIN_COOKIE=Origin-Cookie-Name=CCCOOOKKKIIIEEE
|
||||||
export REPLICA_URL=http://192.168.1.3
|
export REPLICA1_URL=http://192.168.1.3
|
||||||
export REPLICA_USERNAME=username
|
export REPLICA1_USERNAME=username
|
||||||
export REPLICA_PASSWORD=password
|
export REPLICA1_PASSWORD=password
|
||||||
# export REPLICA_COOKIE=Replica-Cookie-Name=CCCOOOKKKIIIEEE
|
# export REPLICA_COOKIE=Replica-Cookie-Name=CCCOOOKKKIIIEEE
|
||||||
|
|
||||||
# run once
|
# run once
|
||||||
adguardhome-sync run
|
adguardhome-sync run
|
||||||
|
|
||||||
# run as daemon
|
# run as daemon
|
||||||
adguardhome-sync run --cron "*/10 * * * *"
|
adguardhome-sync run --cron "0 */2 * * *"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Run as Linux Service via Systemd
|
||||||
|
|
||||||
|
> Verified on Ubuntu Linux 24.04
|
||||||
|
|
||||||
|
Assume you have downloaded the the `adguardhome-sync` binary to `/opt/adguardhome-sync`.
|
||||||
|
|
||||||
|
Create systemd service file `/opt/adguardhome-sync/adguardhome-sync.service`:
|
||||||
|
|
||||||
|
```
|
||||||
|
[Unit]
|
||||||
|
Description = AdGuardHome Sync
|
||||||
|
After = network.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ExecStart = /opt/adguardhome-sync/adguardhome-sync --config /opt/adguardhome-sync/adguardhome-sync.yaml run
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy = multi-user.target
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
Create a configuration file `/opt/adguardhome-sync/adguardhome-sync.yaml`, please follow [Config file](#config-file-1)
|
||||||
|
section below for details.
|
||||||
|
|
||||||
|
Install and enable service:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo cp /opt/adguardhome-sync/adguardhome-sync.service /etc/systemd/system/
|
||||||
|
|
||||||
|
sudo systemctl enable adguardhome-sync.service
|
||||||
|
|
||||||
|
sudo systemctl start adguardhome-sync.service
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
Then you can check the status:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo systemctl status adguardhome-sync.service
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
If web UI has been enabled in configuration (default port is 8080), can also check the status via
|
||||||
|
`http://<server-IP>:8080`
|
||||||
|
|
||||||
## Run Windows
|
## Run Windows
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
@@ -81,20 +136,19 @@ set ORIGIN_USERNAME=username
|
|||||||
set ORIGIN_PASSWORD=password
|
set ORIGIN_PASSWORD=password
|
||||||
# set ORIGIN_COOKIE=Origin-Cookie-Name=CCCOOOKKKIIIEEE
|
# set ORIGIN_COOKIE=Origin-Cookie-Name=CCCOOOKKKIIIEEE
|
||||||
|
|
||||||
set REPLICA_URL=http://192.168.2.2:3000
|
set REPLICA1_URL=http://192.168.2.2:3000
|
||||||
set REPLICA_USERNAME=username
|
set REPLICA1_USERNAME=username
|
||||||
set REPLICA_PASSWORD=password
|
set REPLICA1_PASSWORD=password
|
||||||
# set REPLICA_COOKIE=Replica-Cookie-Name=CCCOOOKKKIIIEEE
|
# set REPLICA1_COOKIE=Replica-Cookie-Name=CCCOOOKKKIIIEEE
|
||||||
|
|
||||||
set FEATURES_DHCP=false
|
set FEATURES_DHCP_SERVER_CONFIG=false
|
||||||
set FEATURES_DHCP_SERVERCONFIG=false
|
set FEATURES_DHCP_STATIC_LEASES=false
|
||||||
set FEATURES_DHCP_STATICLEASES=false
|
|
||||||
|
|
||||||
# run once
|
# run once
|
||||||
adguardhome-sync run
|
adguardhome-sync run
|
||||||
|
|
||||||
# run as daemon
|
# run as daemon
|
||||||
adguardhome-sync run --cron "*/10 * * * *"
|
adguardhome-sync run --cron "0 */2 * * *"
|
||||||
```
|
```
|
||||||
|
|
||||||
## docker cli
|
## docker cli
|
||||||
@@ -127,53 +181,68 @@ services:
|
|||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
```
|
```
|
||||||
|
|
||||||
### env
|
## Config via environment variables
|
||||||
|
|
||||||
```yaml
|
For Replicas replace `#` with the index number for the replica. E.g: `REPLICA#_URL` -> `REPLICA1_URL`
|
||||||
---
|
|
||||||
version: "2.1"
|
|
||||||
services:
|
|
||||||
adguardhome-sync:
|
|
||||||
image: ghcr.io/bakito/adguardhome-sync
|
|
||||||
container_name: adguardhome-sync
|
|
||||||
command: run
|
|
||||||
environment:
|
|
||||||
LOG_LEVEL: "info"
|
|
||||||
ORIGIN_URL: "https://192.168.1.2:3000"
|
|
||||||
ORIGIN_USERNAME: "username"
|
|
||||||
ORIGIN_PASSWORD: "password"
|
|
||||||
REPLICA_URL: "http://192.168.1.3"
|
|
||||||
REPLICA_USERNAME: "username"
|
|
||||||
REPLICA_PASSWORD: "password"
|
|
||||||
REPLICA1_URL: "http://192.168.1.4"
|
|
||||||
REPLICA1_USERNAME: "username"
|
|
||||||
REPLICA1_PASSWORD: "password"
|
|
||||||
REPLICA1_APIPATH: "/some/path/control"
|
|
||||||
# REPLICA1_AUTOSETUP: true # if true, AdGuardHome is automatically initialized.
|
|
||||||
# REPLICA1_INTERFACENAME: 'ens18' # use custom dhcp interface name
|
|
||||||
# REPLICA1_DHCPSERVERENABLED: true/false (optional) enables/disables the dhcp server on the replica
|
|
||||||
CRON: "*/10 * * * *" # run every 10 minutes
|
|
||||||
RUNONSTART: true
|
|
||||||
|
|
||||||
# Configure the sync API server, disabled if api port is 0
|
| Name | Type | Description |
|
||||||
API_PORT: 8080
|
|:-------------------------------------|--------|:----------------------------------------------------------|
|
||||||
|
| ORIGIN_URL (string) | string | URL of adguardhome instance |
|
||||||
|
| ORIGIN_WEB_URL (string) | string | Web URL of adguardhome instance |
|
||||||
|
| ORIGIN_API_PATH (string) | string | API Path |
|
||||||
|
| ORIGIN_USERNAME (string) | string | Adguardhome username |
|
||||||
|
| ORIGIN_PASSWORD (string) | string | Adguardhome password |
|
||||||
|
| ORIGIN_COOKIE (string) | string | Adguardhome cookie |
|
||||||
|
| ORIGIN_REQUEST_HEADERS (map) | map | Request Headers 'key1:value1,key2:value2' |
|
||||||
|
| ORIGIN_INSECURE_SKIP_VERIFY (bool) | bool | Skip TLS verification |
|
||||||
|
| ORIGIN_AUTO_SETUP (bool) | bool | Automatically setup the instance if it is not initialized |
|
||||||
|
| ORIGIN_INTERFACE_NAME (string) | string | Network interface name |
|
||||||
|
| ORIGIN_DHCP_SERVER_ENABLED (bool) | bool | Enable DHCP server |
|
||||||
|
| REPLICA#_URL (string) | string | URL of adguardhome instance |
|
||||||
|
| REPLICA#_WEB_URL (string) | string | Web URL of adguardhome instance |
|
||||||
|
| REPLICA#_API_PATH (string) | string | API Path |
|
||||||
|
| REPLICA#_USERNAME (string) | string | Adguardhome username |
|
||||||
|
| REPLICA#_PASSWORD (string) | string | Adguardhome password |
|
||||||
|
| REPLICA#_COOKIE (string) | string | Adguardhome cookie |
|
||||||
|
| REPLICA#_REQUEST_HEADERS (map) | map | Request Headers 'key1:value1,key2:value2' |
|
||||||
|
| REPLICA#_INSECURE_SKIP_VERIFY (bool) | bool | Skip TLS verification |
|
||||||
|
| REPLICA#_AUTO_SETUP (bool) | bool | Automatically setup the instance if it is not initialized |
|
||||||
|
| REPLICA#_INTERFACE_NAME (string) | string | Network interface name |
|
||||||
|
| REPLICA#_DHCP_SERVER_ENABLED (bool) | bool | Enable DHCP server |
|
||||||
|
| CRON (string) | string | Cron expression for the sync interval |
|
||||||
|
| RUN_ON_START (bool) | bool | Run the sung on startup |
|
||||||
|
| PRINT_CONFIG_ONLY (bool) | bool | Print current config only and stop the application |
|
||||||
|
| CONTINUE_ON_ERROR (bool) | bool | Continue sync on errors |
|
||||||
|
| API_PORT (int) | int | API port |
|
||||||
|
| API_USERNAME (string) | string | API username |
|
||||||
|
| API_PASSWORD (string) | string | API password |
|
||||||
|
| API_DARK_MODE (bool) | bool | API dark mode |
|
||||||
|
| API_METRICS_ENABLED (bool) | bool | Enable metrics |
|
||||||
|
| API_METRICS_SCRAPE_INTERVAL (int64) | int64 | Interval for metrics scraping |
|
||||||
|
| API_METRICS_QUERY_LOG_LIMIT (int) | int | Metrics log query limit |
|
||||||
|
| API_TLS_CERT_DIR (string) | string | API TLS certificate directory |
|
||||||
|
| API_TLS_CERT_NAME (string) | string | API TLS certificate file name |
|
||||||
|
| API_TLS_KEY_NAME (string) | string | API TLS key file name |
|
||||||
|
| FEATURES_DNS_ACCESS_LISTS (bool) | bool | Sync DNS access lists |
|
||||||
|
| FEATURES_DNS_SERVER_CONFIG (bool) | bool | Sync DNS server config |
|
||||||
|
| FEATURES_DNS_REWRITES (bool) | bool | Sync DNS rewrites |
|
||||||
|
| FEATURES_DHCP_SERVER_CONFIG (bool) | bool | Sync DHCP server config |
|
||||||
|
| FEATURES_DHCP_STATIC_LEASES (bool) | bool | Sync DHCP static leases |
|
||||||
|
| FEATURES_GENERAL_SETTINGS (bool) | bool | Sync general settings |
|
||||||
|
| FEATURES_QUERY_LOG_CONFIG (bool) | bool | Sync query log config |
|
||||||
|
| FEATURES_STATS_CONFIG (bool) | bool | Sync stats config |
|
||||||
|
| FEATURES_CLIENT_SETTINGS (bool) | bool | Sync client settings |
|
||||||
|
| FEATURES_SERVICES (bool) | bool | Sync services |
|
||||||
|
| FEATURES_FILTERS (bool) | bool | Sync filters |
|
||||||
|
| FEATURES_THEME (bool) | bool | Sync the weg UI theme |
|
||||||
|
|
||||||
# Configure sync features; by default all features are enabled.
|
### Unraid
|
||||||
# FEATURES_GENERALSETTINGS: true
|
|
||||||
# FEATURES_QUERYLOGCONFIG: true
|
⚠️ Disclaimer: Tere exists an unraid tepmlate for this application. This template is not managed by this project.
|
||||||
# FEATURES_STATSCONFIG: true
|
Also, as unraid is not known to me, I can not give any support on unraind templates.
|
||||||
# FEATURES_CLIENTSETTINGS: true
|
|
||||||
# FEATURES_SERVICES: true
|
Note when running the Docker container in Unraid please remove unneeded env variables if don't needed.
|
||||||
# FEATURES_FILTERS: true
|
If replica2 isn't used this can cause sync errors.
|
||||||
# FEATURES_DHCP_SERVERCONFIG: true
|
|
||||||
# FEATURES_DHCP_STATICLEASES: true
|
|
||||||
# FEATURES_DNS_SERVERCONFIG: true
|
|
||||||
# FEATURES_DNS_ACCESSLISTS: true
|
|
||||||
# FEATURES_DNS_REWRITES: true
|
|
||||||
ports:
|
|
||||||
- 8080:8080
|
|
||||||
restart: unless-stopped
|
|
||||||
```
|
|
||||||
|
|
||||||
### Config file
|
### Config file
|
||||||
|
|
||||||
@@ -181,11 +250,14 @@ location: $HOME/.adguardhome-sync.yaml
|
|||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# cron expression to run in daemon mode. (default; "" = runs only once)
|
# cron expression to run in daemon mode. (default; "" = runs only once)
|
||||||
cron: "*/10 * * * *"
|
cron: "0 */2 * * *"
|
||||||
|
|
||||||
# runs the synchronisation on startup
|
# runs the synchronisation on startup
|
||||||
runOnStart: true
|
runOnStart: true
|
||||||
|
|
||||||
|
# If enabled, the synchronisation task will not fail on single errors, but will log the errors and continue
|
||||||
|
continueOnError: false
|
||||||
|
|
||||||
origin:
|
origin:
|
||||||
# url of the origin instance
|
# url of the origin instance
|
||||||
url: https://192.168.1.2:3000
|
url: https://192.168.1.2:3000
|
||||||
@@ -194,16 +266,10 @@ origin:
|
|||||||
username: username
|
username: username
|
||||||
password: password
|
password: password
|
||||||
# cookie: Origin-Cookie-Name=CCCOOOKKKIIIEEE
|
# cookie: Origin-Cookie-Name=CCCOOOKKKIIIEEE
|
||||||
|
# requestHeaders: # Additional request headers
|
||||||
|
# AAA: bbb
|
||||||
|
|
||||||
# replica instance (optional, if only one)
|
# replicas instances
|
||||||
replica:
|
|
||||||
# url of the replica instance
|
|
||||||
url: http://192.168.1.3
|
|
||||||
username: username
|
|
||||||
password: password
|
|
||||||
# cookie: Replica-Cookie-Name=CCCOOOKKKIIIEEE
|
|
||||||
|
|
||||||
# replicas instances (optional, if more than one)
|
|
||||||
replicas:
|
replicas:
|
||||||
# url of the replica instance
|
# url of the replica instance
|
||||||
- url: http://192.168.1.3
|
- url: http://192.168.1.3
|
||||||
@@ -215,6 +281,9 @@ replicas:
|
|||||||
password: password
|
password: password
|
||||||
# cookie: Replica2-Cookie-Name=CCCOOOKKKIIIEEE
|
# cookie: Replica2-Cookie-Name=CCCOOOKKKIIIEEE
|
||||||
# autoSetup: true # if true, AdGuardHome is automatically initialized.
|
# autoSetup: true # if true, AdGuardHome is automatically initialized.
|
||||||
|
# webURL: "https://some-other.url" # used in the web interface (default: <replica-url>
|
||||||
|
# requestHeaders: # Additional request headers
|
||||||
|
# AAA: bbb
|
||||||
|
|
||||||
# Configure the sync API server, disabled if api port is 0
|
# Configure the sync API server, disabled if api port is 0
|
||||||
api:
|
api:
|
||||||
@@ -223,6 +292,23 @@ api:
|
|||||||
# if username and password are defined, basic auth is applied to the sync API
|
# if username and password are defined, basic auth is applied to the sync API
|
||||||
username: username
|
username: username
|
||||||
password: password
|
password: password
|
||||||
|
# enable api dark mode
|
||||||
|
darkMode: true
|
||||||
|
|
||||||
|
# enable metrics on path '/metrics' (api port must be != 0)
|
||||||
|
# metrics:
|
||||||
|
# enabled: true
|
||||||
|
# scrapeInterval: 30s
|
||||||
|
# queryLogLimit: 10000
|
||||||
|
|
||||||
|
# enable tls for the api server
|
||||||
|
# tls:
|
||||||
|
# # the directory of the provided tls certs
|
||||||
|
# certDir: /path/to/certs
|
||||||
|
# # the name of the cert file (default: tls.crt)
|
||||||
|
# certName: foo.crt
|
||||||
|
# # the name of the key file (default: tls.key)
|
||||||
|
# keyName: bar.key
|
||||||
|
|
||||||
# Configure sync features; by default all features are enabled.
|
# Configure sync features; by default all features are enabled.
|
||||||
features:
|
features:
|
||||||
@@ -241,9 +327,32 @@ features:
|
|||||||
rewrites: true
|
rewrites: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Home Assistant AdGuard Home Add-on users
|
||||||
|
|
||||||
|
To enable syncing with a Home Assistant instance using
|
||||||
|
the [AdGuard Home Add-on](https://github.com/hassio-addons/addon-adguard-home), you will need to enable the disabled
|
||||||
|
ports, under the Network heading
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
And then set the port of your choice for the Web interface
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Don't forget to save and restart the add-on.
|
||||||
|
|
||||||
|
Depending on your setup, you may also need to disable SSL for the add-on.
|
||||||
|
|
||||||
|
The username:password required for the Home Assistant replica is the one you use to login to your instance, however it's
|
||||||
|
recommended to setup a new local only user with minimal permissions.
|
||||||
|
|
||||||
|
All credit for this method goes to [Brunty](https://github.com/brunty) who has a far
|
||||||
|
more [detailed write up](https://brunty.me/post/replicate-adguard-home-settings-into-home-assistant-adguard-home-addon/)
|
||||||
|
about this on his blog.
|
||||||
|
|
||||||
## Log Level
|
## Log Level
|
||||||
|
|
||||||
The log level can be set with the environment variable: LOG_LEVEL
|
The log level can be set with the environment variable: `LOG_LEVEL`
|
||||||
|
|
||||||
The following log levels are supported (default: info)
|
The following log levels are supported (default: info)
|
||||||
|
|
||||||
@@ -251,3 +360,13 @@ The following log levels are supported (default: info)
|
|||||||
- info
|
- info
|
||||||
- warn
|
- warn
|
||||||
- error
|
- error
|
||||||
|
|
||||||
|
## Log Format
|
||||||
|
|
||||||
|
Default log format is `console`.
|
||||||
|
It can be changed to `json` by setting the environment variable: `LOG_FORMAT=json`.
|
||||||
|
|
||||||
|
## Video Tutorials
|
||||||
|
|
||||||
|
- [Como replicar la configuración de tu servidor DNS Adguard automáticamente - Tu servidor Part #12](https://www.youtube.com/watch?v=1LPeu_JG064) (
|
||||||
|
Spanish) by [Jonatan Castro](https://github.com/jcastro)
|
||||||
|
|||||||
153
cmd/root.go
153
cmd/root.go
@@ -3,74 +3,19 @@ package cmd
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"regexp"
|
|
||||||
"strings"
|
"github.com/spf13/cobra"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/log"
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/types"
|
|
||||||
"github.com/bakito/adguardhome-sync/version"
|
"github.com/bakito/adguardhome-sync/version"
|
||||||
"github.com/mitchellh/go-homedir"
|
|
||||||
"github.com/spf13/cobra"
|
|
||||||
"github.com/spf13/viper"
|
|
||||||
"go.uber.org/zap"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
configCron = "cron"
|
|
||||||
configRunOnStart = "runOnStart"
|
|
||||||
|
|
||||||
configAPIPort = "api.port"
|
|
||||||
configAPIUsername = "api.username"
|
|
||||||
configAPIPassword = "api.password"
|
|
||||||
configAPIDarkMode = "api.darkMode"
|
|
||||||
|
|
||||||
configFeatureDHCPServerConfig = "features.dhcp.serverConfig"
|
|
||||||
configFeatureDHCPStaticLeases = "features.dhcp.staticLeases"
|
|
||||||
configFeatureDNServerConfig = "features.dns.serverConfig"
|
|
||||||
configFeatureDNSPAccessLists = "features.dns.accessLists"
|
|
||||||
configFeatureDNSRewrites = "features.dns.rewrites"
|
|
||||||
configFeatureGeneralSettings = "features.generalSettings"
|
|
||||||
configFeatureQueryLogConfig = "features.queryLogConfig"
|
|
||||||
configFeatureStatsConfig = "features.statsConfig"
|
|
||||||
configFeatureClientSettings = "features.clientSettings"
|
|
||||||
configFeatureServices = "features.services"
|
|
||||||
configFeatureFilters = "features.filters"
|
|
||||||
|
|
||||||
configOriginURL = "origin.url"
|
|
||||||
configOriginAPIPath = "origin.apiPath"
|
|
||||||
configOriginUsername = "origin.username"
|
|
||||||
configOriginPassword = "origin.password"
|
|
||||||
configOriginCookie = "origin.cookie"
|
|
||||||
configOriginInsecureSkipVerify = "origin.insecureSkipVerify"
|
|
||||||
|
|
||||||
configReplicaURL = "replica.url"
|
|
||||||
configReplicaAPIPath = "replica.apiPath"
|
|
||||||
configReplicaUsername = "replica.username"
|
|
||||||
configReplicaPassword = "replica.password"
|
|
||||||
configReplicaCookie = "replica.cookie"
|
|
||||||
configReplicaInsecureSkipVerify = "replica.insecureSkipVerify"
|
|
||||||
configReplicaAutoSetup = "replica.autoSetup"
|
|
||||||
configReplicaInterfaceName = "replica.interfaceName"
|
|
||||||
|
|
||||||
envReplicasUsernameFormat = "REPLICA%s_USERNAME" // #nosec G101
|
|
||||||
envReplicasPasswordFormat = "REPLICA%s_PASSWORD" // #nosec G101
|
|
||||||
envReplicasCookieFormat = "REPLICA%s_COOKIE" // #nosec G101
|
|
||||||
envReplicasAPIPathFormat = "REPLICA%s_APIPATH"
|
|
||||||
envReplicasInsecureSkipVerifyFormat = "REPLICA%s_INSECURESKIPVERIFY"
|
|
||||||
envReplicasAutoSetup = "REPLICA%s_AUTOSETUP"
|
|
||||||
envReplicasInterfaceName = "REPLICA%s_INTERFACENAME"
|
|
||||||
// Deprecated: use envReplicasInterfaceName instead
|
|
||||||
envReplicasInterfaceNameDeprecated = "REPLICA%s_INTERFACWENAME"
|
|
||||||
envDHCPServerEnabled = "REPLICA%s_DHCPSERVERENABLED"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
cfgFile string
|
cfgFile string
|
||||||
logger = log.GetLogger("root")
|
logger = log.GetLogger("root")
|
||||||
envReplicasURLPattern = regexp.MustCompile(`^REPLICA(\d+)_URL=(.*)`)
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// rootCmd represents the base command when called without any subcommands
|
// rootCmd represents the base command when called without any subcommands.
|
||||||
var rootCmd = &cobra.Command{
|
var rootCmd = &cobra.Command{
|
||||||
Use: "adguardhome-sync",
|
Use: "adguardhome-sync",
|
||||||
Short: "Synchronize config from one AdGuardHome instance to another",
|
Short: "Synchronize config from one AdGuardHome instance to another",
|
||||||
@@ -81,14 +26,12 @@ var rootCmd = &cobra.Command{
|
|||||||
// This is called by main.main(). It only needs to happen once to the rootCmd.
|
// This is called by main.main(). It only needs to happen once to the rootCmd.
|
||||||
func Execute() {
|
func Execute() {
|
||||||
if err := rootCmd.Execute(); err != nil {
|
if err := rootCmd.Execute(); err != nil {
|
||||||
fmt.Println(err)
|
_, _ = fmt.Println(err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
cobra.OnInitialize(initConfig)
|
|
||||||
|
|
||||||
// Here you will define your flags and configuration settings.
|
// Here you will define your flags and configuration settings.
|
||||||
// Cobra supports persistent flags, which, if defined here,
|
// Cobra supports persistent flags, which, if defined here,
|
||||||
// will be global for your application.
|
// will be global for your application.
|
||||||
@@ -99,87 +42,3 @@ func init() {
|
|||||||
// when this action is called directly.
|
// when this action is called directly.
|
||||||
rootCmd.Flags().BoolP("toggle", "t", false, "Help message for toggle")
|
rootCmd.Flags().BoolP("toggle", "t", false, "Help message for toggle")
|
||||||
}
|
}
|
||||||
|
|
||||||
// initConfig reads in config file and ENV variables if set.
|
|
||||||
func initConfig() {
|
|
||||||
if cfgFile != "" {
|
|
||||||
// Use config file from the flag.
|
|
||||||
viper.SetConfigFile(cfgFile)
|
|
||||||
} else {
|
|
||||||
// Find home directory.
|
|
||||||
home, err := homedir.Dir()
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Search config in home directory with name ".adguardhome-sync" (without extension).
|
|
||||||
viper.AddConfigPath(home)
|
|
||||||
viper.SetConfigName(".adguardhome-sync")
|
|
||||||
}
|
|
||||||
viper.SetEnvKeyReplacer(strings.NewReplacer("-", "_", ".", "_"))
|
|
||||||
viper.AutomaticEnv() // read in environment variables that match
|
|
||||||
|
|
||||||
// If a config file is found, read it in.
|
|
||||||
if err := viper.ReadInConfig(); err == nil {
|
|
||||||
logger.Info("Using config file:", viper.ConfigFileUsed())
|
|
||||||
} else if cfgFile != "" {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func getConfig(logger *zap.SugaredLogger) (*types.Config, error) {
|
|
||||||
cfg := &types.Config{}
|
|
||||||
if err := viper.Unmarshal(cfg); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(cfg.Replicas) == 0 {
|
|
||||||
cfg.Replicas = append(cfg.Replicas, collectEnvReplicas(logger)...)
|
|
||||||
}
|
|
||||||
return cfg, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Manually collect replicas from env.
|
|
||||||
func collectEnvReplicas(logger *zap.SugaredLogger) []types.AdGuardInstance {
|
|
||||||
var replicas []types.AdGuardInstance
|
|
||||||
for _, v := range os.Environ() {
|
|
||||||
if envReplicasURLPattern.MatchString(v) {
|
|
||||||
sm := envReplicasURLPattern.FindStringSubmatch(v)
|
|
||||||
re := types.AdGuardInstance{
|
|
||||||
URL: sm[2],
|
|
||||||
Username: os.Getenv(fmt.Sprintf(envReplicasUsernameFormat, sm[1])),
|
|
||||||
Password: os.Getenv(fmt.Sprintf(envReplicasPasswordFormat, sm[1])),
|
|
||||||
Cookie: os.Getenv(fmt.Sprintf(envReplicasCookieFormat, sm[1])),
|
|
||||||
APIPath: os.Getenv(fmt.Sprintf(envReplicasAPIPathFormat, sm[1])),
|
|
||||||
InsecureSkipVerify: strings.EqualFold(os.Getenv(fmt.Sprintf(envReplicasInsecureSkipVerifyFormat, sm[1])), "true"),
|
|
||||||
AutoSetup: strings.EqualFold(os.Getenv(fmt.Sprintf(envReplicasAutoSetup, sm[1])), "true"),
|
|
||||||
InterfaceName: os.Getenv(fmt.Sprintf(envReplicasInterfaceName, sm[1])),
|
|
||||||
}
|
|
||||||
|
|
||||||
if re.InterfaceName == "" {
|
|
||||||
if in, ok := os.LookupEnv(fmt.Sprintf(envReplicasInterfaceNameDeprecated, sm[1])); ok {
|
|
||||||
logger.
|
|
||||||
With("correct", envReplicasInterfaceName, "deprecated", envReplicasInterfaceNameDeprecated).
|
|
||||||
Warn("Deprecated env variable is used, please use the correct one")
|
|
||||||
re.InterfaceName = in
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if dhcpEnabled, ok := os.LookupEnv(fmt.Sprintf(envDHCPServerEnabled, sm[1])); ok {
|
|
||||||
if strings.EqualFold(dhcpEnabled, "true") {
|
|
||||||
re.DHCPServerEnabled = boolPtr(true)
|
|
||||||
} else if strings.EqualFold(dhcpEnabled, "false") {
|
|
||||||
re.DHCPServerEnabled = boolPtr(false)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
replicas = append(replicas, re)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return replicas
|
|
||||||
}
|
|
||||||
|
|
||||||
func boolPtr(b bool) *bool {
|
|
||||||
return &b
|
|
||||||
}
|
|
||||||
|
|||||||
116
cmd/root_test.go
116
cmd/root_test.go
@@ -1,116 +0,0 @@
|
|||||||
package cmd
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/log"
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/types"
|
|
||||||
. "github.com/onsi/ginkgo/v2"
|
|
||||||
. "github.com/onsi/gomega"
|
|
||||||
"go.uber.org/zap"
|
|
||||||
)
|
|
||||||
|
|
||||||
var envVars = []string{
|
|
||||||
"FEATURES_GENERALSETTINGS",
|
|
||||||
"FEATURES_QUERYLOGCONFIG",
|
|
||||||
"FEATURES_STATSCONFIG",
|
|
||||||
"FEATURES_CLIENTSETTINGS",
|
|
||||||
"FEATURES_SERVICES",
|
|
||||||
"FEATURES_FILTERS",
|
|
||||||
"FEATURES_DHCP_SERVERCONFIG",
|
|
||||||
"FEATURES_DHCP_STATICLEASES",
|
|
||||||
"FEATURES_DNS_SERVERCONFIG",
|
|
||||||
"FEATURES_DNS_ACCESSLISTS",
|
|
||||||
"FEATURES_DNS_REWRITES",
|
|
||||||
"REPLICA1_INTERFACENAME",
|
|
||||||
"REPLICA1_INTERFACWENAME",
|
|
||||||
"REPLICA1_DHCPSERVERENABLED",
|
|
||||||
}
|
|
||||||
|
|
||||||
var _ = Describe("Run", func() {
|
|
||||||
var logger *zap.SugaredLogger
|
|
||||||
BeforeEach(func() {
|
|
||||||
logger = log.GetLogger("root")
|
|
||||||
for _, envVar := range envVars {
|
|
||||||
Ω(os.Unsetenv(envVar)).ShouldNot(HaveOccurred())
|
|
||||||
}
|
|
||||||
initConfig()
|
|
||||||
})
|
|
||||||
AfterEach(func() {
|
|
||||||
for _, envVar := range envVars {
|
|
||||||
Ω(os.Unsetenv(envVar)).ShouldNot(HaveOccurred())
|
|
||||||
}
|
|
||||||
})
|
|
||||||
Context("getConfig", func() {
|
|
||||||
It("features should be true by default", func() {
|
|
||||||
cfg, err := getConfig(logger)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
verifyFeatures(cfg, true)
|
|
||||||
})
|
|
||||||
It("features should be false", func() {
|
|
||||||
for _, envVar := range envVars {
|
|
||||||
Ω(os.Setenv(envVar, "false")).ShouldNot(HaveOccurred())
|
|
||||||
}
|
|
||||||
cfg, err := getConfig(logger)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
verifyFeatures(cfg, false)
|
|
||||||
})
|
|
||||||
Context("interface name", func() {
|
|
||||||
It("should set interface name of replica 1", func() {
|
|
||||||
Ω(os.Setenv("REPLICA1_URL", "https://foo.bar")).ShouldNot(HaveOccurred())
|
|
||||||
Ω(os.Setenv(fmt.Sprintf(envReplicasInterfaceName, "1"), "eth0")).ShouldNot(HaveOccurred())
|
|
||||||
cfg, err := getConfig(logger)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
Ω(cfg.Replicas[0].InterfaceName).Should(Equal("eth0"))
|
|
||||||
})
|
|
||||||
It("should set interface name of replica 1 from deprecated env", func() {
|
|
||||||
Ω(os.Setenv("REPLICA1_URL", "https://foo.bar")).ShouldNot(HaveOccurred())
|
|
||||||
Ω(os.Setenv(fmt.Sprintf(envReplicasInterfaceNameDeprecated, "1"), "eth0")).ShouldNot(HaveOccurred())
|
|
||||||
cfg, err := getConfig(logger)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
Ω(cfg.Replicas[0].InterfaceName).Should(Equal("eth0"))
|
|
||||||
})
|
|
||||||
It("deprecated should not overwrite the correct", func() {
|
|
||||||
Ω(os.Setenv("REPLICA1_URL", "https://foo.bar")).ShouldNot(HaveOccurred())
|
|
||||||
Ω(os.Setenv(fmt.Sprintf(envReplicasInterfaceNameDeprecated, "1"), "eth1")).ShouldNot(HaveOccurred())
|
|
||||||
Ω(os.Setenv(fmt.Sprintf(envReplicasInterfaceName, "1"), "eth0")).ShouldNot(HaveOccurred())
|
|
||||||
cfg, err := getConfig(logger)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
Ω(cfg.Replicas[0].InterfaceName).Should(Equal("eth0"))
|
|
||||||
})
|
|
||||||
})
|
|
||||||
Context("dhcp server", func() {
|
|
||||||
It("should enable the dhcp server of replica 1", func() {
|
|
||||||
Ω(os.Setenv("REPLICA1_URL", "https://foo.bar")).ShouldNot(HaveOccurred())
|
|
||||||
Ω(os.Setenv(fmt.Sprintf(envDHCPServerEnabled, "1"), "true")).ShouldNot(HaveOccurred())
|
|
||||||
cfg, err := getConfig(logger)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
Ω(cfg.Replicas[0].DHCPServerEnabled).ShouldNot(BeNil())
|
|
||||||
Ω(*cfg.Replicas[0].DHCPServerEnabled).Should(BeTrue())
|
|
||||||
})
|
|
||||||
It("should disable the dhcp server of replica 1", func() {
|
|
||||||
Ω(os.Setenv("REPLICA1_URL", "https://foo.bar")).ShouldNot(HaveOccurred())
|
|
||||||
Ω(os.Setenv(fmt.Sprintf(envDHCPServerEnabled, "1"), "false")).ShouldNot(HaveOccurred())
|
|
||||||
cfg, err := getConfig(logger)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
Ω(cfg.Replicas[0].DHCPServerEnabled).ShouldNot(BeNil())
|
|
||||||
Ω(*cfg.Replicas[0].DHCPServerEnabled).Should(BeFalse())
|
|
||||||
})
|
|
||||||
})
|
|
||||||
})
|
|
||||||
})
|
|
||||||
|
|
||||||
func verifyFeatures(cfg *types.Config, value bool) {
|
|
||||||
Ω(cfg.Features.GeneralSettings).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.QueryLogConfig).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.StatsConfig).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.ClientSettings).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.Services).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.Filters).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.DHCP.ServerConfig).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.DHCP.StaticLeases).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.DNS.ServerConfig).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.DNS.AccessLists).Should(Equal(value))
|
|
||||||
Ω(cfg.Features.DNS.Rewrites).Should(Equal(value))
|
|
||||||
}
|
|
||||||
134
cmd/run.go
134
cmd/run.go
@@ -1,96 +1,92 @@
|
|||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/config"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/log"
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/sync"
|
"github.com/bakito/adguardhome-sync/pkg/sync"
|
||||||
"github.com/spf13/cobra"
|
|
||||||
"github.com/spf13/viper"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// runCmd represents the run command
|
// runCmd represents the run command.
|
||||||
var doCmd = &cobra.Command{
|
var doCmd = &cobra.Command{
|
||||||
Use: "run",
|
Use: "run",
|
||||||
Short: "Start a synchronisation from origin to replica",
|
Short: "Start a synchronization from origin to replica",
|
||||||
Long: `Synchronizes the configuration form an origin instance to a replica`,
|
Long: `Synchronizes the configuration form an origin instance to a replica`,
|
||||||
RunE: func(cmd *cobra.Command, args []string) error {
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
logger = log.GetLogger("run")
|
logger = log.GetLogger("run")
|
||||||
cfg, err := getConfig(logger)
|
cfg, err := config.Get(cfgFile, cmd.Flags())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Error(err)
|
logger.Error(err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
return sync.Sync(cfg)
|
if err := cfg.Init(); err != nil {
|
||||||
|
logger.Error(err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if cfg.PrintConfigOnly() {
|
||||||
|
if err := cfg.Print(); err != nil {
|
||||||
|
logger.Error(err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return sync.Sync(cfg.Get())
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
rootCmd.AddCommand(doCmd)
|
rootCmd.AddCommand(doCmd)
|
||||||
doCmd.PersistentFlags().String("cron", "", "The cron expression to run in daemon mode")
|
doCmd.PersistentFlags().String(config.FlagCron, "", "The cron expression to run in daemon mode")
|
||||||
_ = viper.BindPFlag(configCron, doCmd.PersistentFlags().Lookup("cron"))
|
doCmd.PersistentFlags().Bool(config.FlagRunOnStart, true, "Run the sync job on start.")
|
||||||
doCmd.PersistentFlags().Bool("runOnStart", true, "Run the sync job on start.")
|
doCmd.PersistentFlags().Bool(config.FlagPrintConfigOnly, false, "Prints the configuration only and exists. "+
|
||||||
_ = viper.BindPFlag(configRunOnStart, doCmd.PersistentFlags().Lookup("runOnStart"))
|
"Can be used to debug the config E.g: when having authentication issues.")
|
||||||
doCmd.PersistentFlags().Int("api-port", 8080, "Sync API Port, the API endpoint will be started to enable remote triggering; if 0 port API is disabled.")
|
doCmd.PersistentFlags().Bool(config.FlagContinueOnError, false, "If enabled, the synchronization task "+
|
||||||
_ = viper.BindPFlag(configAPIPort, doCmd.PersistentFlags().Lookup("api-port"))
|
"will not fail on single errors, but will log the errors and continue.")
|
||||||
doCmd.PersistentFlags().String("api-username", "", "Sync API username")
|
|
||||||
_ = viper.BindPFlag(configAPIUsername, doCmd.PersistentFlags().Lookup("api-username"))
|
|
||||||
doCmd.PersistentFlags().String("api-password", "", "Sync API password")
|
|
||||||
_ = viper.BindPFlag(configAPIPassword, doCmd.PersistentFlags().Lookup("api-password"))
|
|
||||||
doCmd.PersistentFlags().String("api-darkMode", "", "API UI in dark mode")
|
|
||||||
_ = viper.BindPFlag(configAPIDarkMode, doCmd.PersistentFlags().Lookup("api-darkMode"))
|
|
||||||
|
|
||||||
doCmd.PersistentFlags().Bool("feature-dhcp-server-config", true, "Enable DHCP server config feature")
|
doCmd.PersistentFlags().
|
||||||
_ = viper.BindPFlag(configFeatureDHCPServerConfig, doCmd.PersistentFlags().Lookup("feature-dhcp-server-config"))
|
Int(config.FlagAPIPort, 8080, "Sync API Port, the API endpoint will be started to enable remote triggering; if 0 port API is disabled.")
|
||||||
doCmd.PersistentFlags().Bool("feature-dhcp-static-leases", true, "Enable DHCP server static leases feature")
|
doCmd.PersistentFlags().String(config.FlagAPIUsername, "", "Sync API username")
|
||||||
_ = viper.BindPFlag(configFeatureDHCPStaticLeases, doCmd.PersistentFlags().Lookup("feature-dhcp-static-leases"))
|
doCmd.PersistentFlags().String(config.FlagAPIPassword, "", "Sync API password")
|
||||||
|
doCmd.PersistentFlags().String(config.FlagAPIDarkMode, "", "API UI in dark mode")
|
||||||
|
|
||||||
doCmd.PersistentFlags().Bool("feature-dns-server-config", true, "Enable DNS server config feature")
|
doCmd.PersistentFlags().Bool(config.FlagFeatureDhcpServerConfig, true, "Enable DHCP server config feature")
|
||||||
_ = viper.BindPFlag(configFeatureDNServerConfig, doCmd.PersistentFlags().Lookup("feature-dns-server-config"))
|
doCmd.PersistentFlags().Bool(config.FlagFeatureDhcpStaticLeases, true, "Enable DHCP server static leases feature")
|
||||||
doCmd.PersistentFlags().Bool("feature-dns-access-lists", true, "Enable DNS server access lists feature")
|
|
||||||
_ = viper.BindPFlag(configFeatureDNSPAccessLists, doCmd.PersistentFlags().Lookup("feature-dns-access-lists"))
|
|
||||||
doCmd.PersistentFlags().Bool("feature-dns-rewrites", true, "Enable DNS rewrites feature")
|
|
||||||
_ = viper.BindPFlag(configFeatureDNSRewrites, doCmd.PersistentFlags().Lookup("feature-dns-rewrites"))
|
|
||||||
doCmd.PersistentFlags().Bool("feature-general-settings", true, "Enable general settings feature")
|
|
||||||
_ = viper.BindPFlag(configFeatureGeneralSettings, doCmd.PersistentFlags().Lookup("feature-general-settings"))
|
|
||||||
_ = viper.BindPFlag("features.generalSettings", doCmd.PersistentFlags().Lookup("feature-general-settings"))
|
|
||||||
doCmd.PersistentFlags().Bool("feature-query-log-config", true, "Enable query log config feature")
|
|
||||||
_ = viper.BindPFlag(configFeatureQueryLogConfig, doCmd.PersistentFlags().Lookup("feature-query-log-config"))
|
|
||||||
doCmd.PersistentFlags().Bool("feature-stats-config", true, "Enable stats config feature")
|
|
||||||
_ = viper.BindPFlag(configFeatureStatsConfig, doCmd.PersistentFlags().Lookup("feature-stats-config"))
|
|
||||||
doCmd.PersistentFlags().Bool("feature-client-settings", true, "Enable client settings feature")
|
|
||||||
_ = viper.BindPFlag(configFeatureClientSettings, doCmd.PersistentFlags().Lookup("feature-client-settings"))
|
|
||||||
doCmd.PersistentFlags().Bool("feature-services", true, "Enable services sync feature")
|
|
||||||
_ = viper.BindPFlag(configFeatureServices, doCmd.PersistentFlags().Lookup("feature-services"))
|
|
||||||
doCmd.PersistentFlags().Bool("feature-filters", true, "Enable filters sync feature")
|
|
||||||
_ = viper.BindPFlag(configFeatureFilters, doCmd.PersistentFlags().Lookup("feature-filters"))
|
|
||||||
|
|
||||||
doCmd.PersistentFlags().String("origin-url", "", "Origin instance url")
|
doCmd.PersistentFlags().Bool(config.FlagFeatureDNSServerConfig, true, "Enable DNS server config feature")
|
||||||
_ = viper.BindPFlag(configOriginURL, doCmd.PersistentFlags().Lookup("origin-url"))
|
doCmd.PersistentFlags().Bool(config.FlagFeatureDNSAccessLists, true, "Enable DNS server access lists feature")
|
||||||
doCmd.PersistentFlags().String("origin-api-path", "/control", "Origin instance API path")
|
doCmd.PersistentFlags().Bool(config.FlagFeatureDNSRewrites, true, "Enable DNS rewrites feature")
|
||||||
_ = viper.BindPFlag(configOriginAPIPath, doCmd.PersistentFlags().Lookup("origin-api-path"))
|
|
||||||
doCmd.PersistentFlags().String("origin-username", "", "Origin instance username")
|
|
||||||
_ = viper.BindPFlag(configOriginUsername, doCmd.PersistentFlags().Lookup("origin-username"))
|
|
||||||
doCmd.PersistentFlags().String("origin-password", "", "Origin instance password")
|
|
||||||
_ = viper.BindPFlag(configOriginPassword, doCmd.PersistentFlags().Lookup("origin-password"))
|
|
||||||
doCmd.PersistentFlags().String("origin-cookie", "", "If Set, uses a cookie for authentication")
|
|
||||||
_ = viper.BindPFlag(configOriginCookie, doCmd.PersistentFlags().Lookup("origin-cookie"))
|
|
||||||
doCmd.PersistentFlags().Bool("origin-insecure-skip-verify", false, "Enable Origin instance InsecureSkipVerify")
|
|
||||||
_ = viper.BindPFlag(configOriginInsecureSkipVerify, doCmd.PersistentFlags().Lookup("origin-insecure-skip-verify"))
|
|
||||||
|
|
||||||
doCmd.PersistentFlags().String("replica-url", "", "Replica instance url")
|
doCmd.PersistentFlags().Bool(config.FlagFeatureGeneral, true, "Enable general settings feature")
|
||||||
_ = viper.BindPFlag(configReplicaURL, doCmd.PersistentFlags().Lookup("replica-url"))
|
doCmd.PersistentFlags().Bool(config.FlagFeatureQueryLog, true, "Enable query log config feature")
|
||||||
doCmd.PersistentFlags().String("replica-api-path", "/control", "Replica instance API path")
|
doCmd.PersistentFlags().Bool(config.FlagFeatureStats, true, "Enable stats config feature")
|
||||||
_ = viper.BindPFlag(configReplicaAPIPath, doCmd.PersistentFlags().Lookup("replica-api-path"))
|
doCmd.PersistentFlags().Bool(config.FlagFeatureClient, true, "Enable client settings feature")
|
||||||
doCmd.PersistentFlags().String("replica-username", "", "Replica instance username")
|
doCmd.PersistentFlags().Bool(config.FlagFeatureServices, true, "Enable services sync feature")
|
||||||
_ = viper.BindPFlag(configReplicaUsername, doCmd.PersistentFlags().Lookup("replica-username"))
|
doCmd.PersistentFlags().Bool(config.FlagFeatureFilters, true, "Enable filters sync feature")
|
||||||
doCmd.PersistentFlags().String("replica-password", "", "Replica instance password")
|
|
||||||
_ = viper.BindPFlag(configReplicaPassword, doCmd.PersistentFlags().Lookup("replica-password"))
|
doCmd.PersistentFlags().String(config.FlagOriginURL, "", "Origin instance url")
|
||||||
doCmd.PersistentFlags().String("replica-cookie", "", "If Set, uses a cookie for authentication")
|
doCmd.PersistentFlags().
|
||||||
_ = viper.BindPFlag(configReplicaCookie, doCmd.PersistentFlags().Lookup("replica-cookie"))
|
String(config.FlagOriginWebURL, "", "Origin instance web url used in the web interface (default: <origin-url>)")
|
||||||
doCmd.PersistentFlags().Bool("replica-insecure-skip-verify", false, "Enable Replica instance InsecureSkipVerify")
|
doCmd.PersistentFlags().String(config.FlagOriginAPIPath, "/control", "Origin instance API path")
|
||||||
_ = viper.BindPFlag(configReplicaInsecureSkipVerify, doCmd.PersistentFlags().Lookup("replica-insecure-skip-verify"))
|
doCmd.PersistentFlags().String(config.FlagOriginUsername, "", "Origin instance username")
|
||||||
doCmd.PersistentFlags().Bool("replica-auto-setup", false, "Enable automatic setup of new AdguardHome instances. This replaces the setup wizard.")
|
doCmd.PersistentFlags().String(config.FlagOriginPassword, "", "Origin instance password")
|
||||||
_ = viper.BindPFlag(configReplicaAutoSetup, doCmd.PersistentFlags().Lookup("replica-auto-setup"))
|
doCmd.PersistentFlags().String(config.FlagOriginCookie, "", "If Set, uses a cookie for authentication")
|
||||||
doCmd.PersistentFlags().String("replica-interface-name", "", "Optional change the interface name of the replica if it differs from the master")
|
doCmd.PersistentFlags().Bool(config.FlagOriginISV, false, "Enable Origin instance InsecureSkipVerify")
|
||||||
_ = viper.BindPFlag(configReplicaInterfaceName, doCmd.PersistentFlags().Lookup("replica-interface-name"))
|
|
||||||
|
doCmd.PersistentFlags().String(config.FlagReplicaURL, "", "Replica instance url")
|
||||||
|
doCmd.PersistentFlags().
|
||||||
|
String(config.FlagReplicaWebURL, "", "Replica instance web url used in the web interface (default: <replica-url>)")
|
||||||
|
doCmd.PersistentFlags().String(config.FlagReplicaAPIPath, "/control", "Replica instance API path")
|
||||||
|
doCmd.PersistentFlags().String(config.FlagReplicaUsername, "", "Replica instance username")
|
||||||
|
doCmd.PersistentFlags().String(config.FlagReplicaPassword, "", "Replica instance password")
|
||||||
|
doCmd.PersistentFlags().String(config.FlagReplicaCookie, "", "If Set, uses a cookie for authentication")
|
||||||
|
doCmd.PersistentFlags().Bool(config.FlagReplicaISV, false, "Enable Replica instance InsecureSkipVerify")
|
||||||
|
doCmd.PersistentFlags().
|
||||||
|
Bool(config.FlagReplicaAutoSetup, false, "Enable automatic setup of new AdguardHome instances. This replaces the setup wizard.")
|
||||||
|
doCmd.PersistentFlags().
|
||||||
|
String(config.FlagReplicaInterfaceName, "", "Optional change the interface name of the replica if it differs from the master")
|
||||||
}
|
}
|
||||||
|
|||||||
62
docs/main.go
Normal file
62
docs/main.go
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
// Print the available environment variables
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"reflect"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
_, _ = fmt.Println("| Name | Type | Description |")
|
||||||
|
_, _ = fmt.Println("| :--- | ---- |:----------- |")
|
||||||
|
printEnvTags(reflect.TypeOf(types.Config{}), "")
|
||||||
|
}
|
||||||
|
|
||||||
|
// printEnvTags recursively prints all fields with `env` tags.
|
||||||
|
func printEnvTags(t reflect.Type, prefix string) {
|
||||||
|
if t.Kind() == reflect.Ptr {
|
||||||
|
t = t.Elem()
|
||||||
|
}
|
||||||
|
if t.Kind() != reflect.Struct {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, field := range reflect.VisibleFields(t) {
|
||||||
|
if field.PkgPath != "" { // unexported field
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
envTag := field.Tag.Get("env")
|
||||||
|
if envTag == "" {
|
||||||
|
switch field.Name {
|
||||||
|
case "Origin":
|
||||||
|
envTag = "ORIGIN"
|
||||||
|
case "Replica":
|
||||||
|
envTag = "REPLICA#"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
combinedTag := envTag
|
||||||
|
if prefix != "" && envTag != "" {
|
||||||
|
combinedTag = prefix + "_" + envTag
|
||||||
|
} else if prefix != "" {
|
||||||
|
combinedTag = prefix
|
||||||
|
}
|
||||||
|
|
||||||
|
ft := field.Type
|
||||||
|
if ft.Kind() == reflect.Ptr {
|
||||||
|
ft = ft.Elem()
|
||||||
|
}
|
||||||
|
|
||||||
|
if ft.Kind() == reflect.Struct && ft.Name() != "Time" { // skip time.Time
|
||||||
|
printEnvTags(ft, strings.TrimSuffix(combinedTag, "_"))
|
||||||
|
} else if envTag != "" {
|
||||||
|
envVar := strings.Trim(combinedTag, "_") + " (" + ft.Kind().String() + ")"
|
||||||
|
docs := field.Tag.Get("documentation")
|
||||||
|
|
||||||
|
_, _ = fmt.Printf("| %s | %s | %s |\n", envVar, ft.Kind().String(), docs)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
113
go.mod
113
go.mod
@@ -1,80 +1,77 @@
|
|||||||
module github.com/bakito/adguardhome-sync
|
module github.com/bakito/adguardhome-sync
|
||||||
|
|
||||||
go 1.20
|
go 1.24.2
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/gin-gonic/gin v1.9.1
|
github.com/caarlos0/env/v11 v11.3.1
|
||||||
github.com/go-resty/resty/v2 v2.10.0
|
github.com/gin-gonic/gin v1.10.0
|
||||||
github.com/golang/mock v1.6.0
|
github.com/go-faker/faker/v4 v4.6.1
|
||||||
github.com/google/uuid v1.4.0
|
github.com/go-resty/resty/v2 v2.16.5
|
||||||
|
github.com/google/uuid v1.6.0
|
||||||
github.com/jinzhu/copier v0.4.0
|
github.com/jinzhu/copier v0.4.0
|
||||||
github.com/mitchellh/go-homedir v1.1.0
|
github.com/oapi-codegen/runtime v1.1.1
|
||||||
github.com/oapi-codegen/runtime v1.1.0
|
github.com/onsi/ginkgo/v2 v2.23.4
|
||||||
github.com/onsi/ginkgo/v2 v2.13.1
|
github.com/onsi/gomega v1.37.0
|
||||||
github.com/onsi/gomega v1.30.0
|
github.com/prometheus/client_golang v1.22.0
|
||||||
github.com/robfig/cron/v3 v3.0.1
|
github.com/robfig/cron/v3 v3.0.1
|
||||||
github.com/spf13/cobra v1.8.0
|
github.com/santhosh-tekuri/jsonschema/v6 v6.0.1
|
||||||
github.com/spf13/viper v1.17.0
|
github.com/spf13/cobra v1.9.1
|
||||||
go.uber.org/zap v1.26.0
|
go.uber.org/mock v0.5.2
|
||||||
golang.org/x/mod v0.14.0
|
go.uber.org/zap v1.27.0
|
||||||
|
golang.org/x/mod v0.24.0
|
||||||
gopkg.in/yaml.v3 v3.0.1
|
gopkg.in/yaml.v3 v3.0.1
|
||||||
k8s.io/apimachinery v0.28.4
|
k8s.io/apimachinery v0.33.1
|
||||||
|
k8s.io/utils v0.0.0-20250502105355-0f33e8f1c979
|
||||||
)
|
)
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/apapsch/go-jsonmerge/v2 v2.0.0 // indirect
|
github.com/apapsch/go-jsonmerge/v2 v2.0.0 // indirect
|
||||||
github.com/bytedance/sonic v1.10.0 // indirect
|
github.com/beorn7/perks v1.0.1 // indirect
|
||||||
github.com/chenzhuoyu/base64x v0.0.0-20230717121745-296ad89f973d // indirect
|
github.com/bytedance/sonic v1.13.2 // indirect
|
||||||
github.com/chenzhuoyu/iasm v0.9.0 // indirect
|
github.com/bytedance/sonic/loader v0.2.4 // indirect
|
||||||
github.com/fsnotify/fsnotify v1.6.0 // indirect
|
github.com/cespare/xxhash/v2 v2.3.0 // indirect
|
||||||
github.com/gabriel-vasile/mimetype v1.4.2 // indirect
|
github.com/cloudwego/base64x v0.1.5 // indirect
|
||||||
github.com/gin-contrib/sse v0.1.0 // indirect
|
github.com/fxamacker/cbor/v2 v2.8.0 // indirect
|
||||||
github.com/go-logr/logr v1.3.0 // indirect
|
github.com/gabriel-vasile/mimetype v1.4.9 // indirect
|
||||||
|
github.com/gin-contrib/sse v1.1.0 // indirect
|
||||||
|
github.com/go-logr/logr v1.4.2 // indirect
|
||||||
github.com/go-playground/locales v0.14.1 // indirect
|
github.com/go-playground/locales v0.14.1 // indirect
|
||||||
github.com/go-playground/universal-translator v0.18.1 // indirect
|
github.com/go-playground/universal-translator v0.18.1 // indirect
|
||||||
github.com/go-playground/validator/v10 v10.15.1 // indirect
|
github.com/go-playground/validator/v10 v10.26.0 // indirect
|
||||||
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 // indirect
|
github.com/go-task/slim-sprig/v3 v3.0.0 // indirect
|
||||||
github.com/goccy/go-json v0.10.2 // indirect
|
github.com/goccy/go-json v0.10.5 // indirect
|
||||||
github.com/gogo/protobuf v1.3.2 // indirect
|
github.com/gogo/protobuf v1.3.2 // indirect
|
||||||
github.com/google/go-cmp v0.6.0 // indirect
|
github.com/google/go-cmp v0.7.0 // indirect
|
||||||
github.com/google/gofuzz v1.2.0 // indirect
|
github.com/google/pprof v0.0.0-20250501235452-c0086092b71a // indirect
|
||||||
github.com/google/pprof v0.0.0-20210720184732-4bb14d4b1be1 // indirect
|
|
||||||
github.com/hashicorp/hcl v1.0.0 // indirect
|
|
||||||
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
||||||
github.com/json-iterator/go v1.1.12 // indirect
|
github.com/json-iterator/go v1.1.12 // indirect
|
||||||
github.com/klauspost/cpuid/v2 v2.2.5 // indirect
|
github.com/klauspost/cpuid/v2 v2.2.10 // indirect
|
||||||
github.com/leodido/go-urn v1.2.4 // indirect
|
github.com/leodido/go-urn v1.4.0 // indirect
|
||||||
github.com/magiconair/properties v1.8.7 // indirect
|
github.com/mattn/go-isatty v0.0.20 // indirect
|
||||||
github.com/mattn/go-isatty v0.0.19 // indirect
|
|
||||||
github.com/mitchellh/mapstructure v1.5.0 // indirect
|
|
||||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
|
||||||
github.com/modern-go/reflect2 v1.0.2 // indirect
|
github.com/modern-go/reflect2 v1.0.2 // indirect
|
||||||
github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e // indirect
|
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
|
||||||
github.com/pelletier/go-toml/v2 v2.1.0 // indirect
|
github.com/pelletier/go-toml/v2 v2.2.4 // indirect
|
||||||
github.com/sagikazarmark/locafero v0.3.0 // indirect
|
github.com/prometheus/client_model v0.6.2 // indirect
|
||||||
github.com/sagikazarmark/slog-shim v0.1.0 // indirect
|
github.com/prometheus/common v0.63.0 // indirect
|
||||||
github.com/sourcegraph/conc v0.3.0 // indirect
|
github.com/prometheus/procfs v0.16.1 // indirect
|
||||||
github.com/spf13/afero v1.10.0 // indirect
|
github.com/spf13/pflag v1.0.6 // indirect
|
||||||
github.com/spf13/cast v1.5.1 // indirect
|
|
||||||
github.com/spf13/pflag v1.0.5 // indirect
|
|
||||||
github.com/subosito/gotenv v1.6.0 // indirect
|
|
||||||
github.com/twitchyliquid64/golang-asm v0.15.1 // indirect
|
github.com/twitchyliquid64/golang-asm v0.15.1 // indirect
|
||||||
github.com/ugorji/go/codec v1.2.11 // indirect
|
github.com/ugorji/go/codec v1.2.12 // indirect
|
||||||
|
github.com/x448/float16 v0.8.4 // indirect
|
||||||
|
go.uber.org/automaxprocs v1.6.0 // indirect
|
||||||
go.uber.org/multierr v1.11.0 // indirect
|
go.uber.org/multierr v1.11.0 // indirect
|
||||||
golang.org/x/arch v0.4.0 // indirect
|
golang.org/x/arch v0.16.0 // indirect
|
||||||
golang.org/x/crypto v0.14.0 // indirect
|
golang.org/x/crypto v0.37.0 // indirect
|
||||||
golang.org/x/exp v0.0.0-20230905200255-921286631fa9 // indirect
|
golang.org/x/net v0.39.0 // indirect
|
||||||
golang.org/x/net v0.17.0 // indirect
|
golang.org/x/sys v0.32.0 // indirect
|
||||||
golang.org/x/sys v0.14.0 // indirect
|
golang.org/x/text v0.24.0 // indirect
|
||||||
golang.org/x/text v0.13.0 // indirect
|
golang.org/x/tools v0.32.0 // indirect
|
||||||
golang.org/x/tools v0.14.0 // indirect
|
google.golang.org/protobuf v1.36.6 // indirect
|
||||||
google.golang.org/protobuf v1.31.0 // indirect
|
|
||||||
gopkg.in/check.v1 v1.0.0-20200902074654-038fdea0a05b // indirect
|
|
||||||
gopkg.in/inf.v0 v0.9.1 // indirect
|
gopkg.in/inf.v0 v0.9.1 // indirect
|
||||||
gopkg.in/ini.v1 v1.67.0 // indirect
|
k8s.io/klog/v2 v2.130.1 // indirect
|
||||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 // indirect
|
||||||
k8s.io/klog/v2 v2.100.1 // indirect
|
sigs.k8s.io/randfill v1.0.0 // indirect
|
||||||
k8s.io/utils v0.0.0-20230726121419-3b25d923346b // indirect
|
sigs.k8s.io/structured-merge-diff/v4 v4.7.0 // indirect
|
||||||
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
|
sigs.k8s.io/yaml v1.4.0 // indirect
|
||||||
sigs.k8s.io/structured-merge-diff/v4 v4.3.0 // indirect
|
|
||||||
)
|
)
|
||||||
|
|||||||
706
go.sum
706
go.sum
@@ -1,656 +1,220 @@
|
|||||||
cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
|
|
||||||
cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
|
|
||||||
cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU=
|
|
||||||
cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU=
|
|
||||||
cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY=
|
|
||||||
cloud.google.com/go v0.44.3/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY=
|
|
||||||
cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc=
|
|
||||||
cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0=
|
|
||||||
cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To=
|
|
||||||
cloud.google.com/go v0.52.0/go.mod h1:pXajvRH/6o3+F9jDHZWQ5PbGhn+o8w9qiu/CffaVdO4=
|
|
||||||
cloud.google.com/go v0.53.0/go.mod h1:fp/UouUEsRkN6ryDKNW/Upv/JBKnv6WDthjR6+vze6M=
|
|
||||||
cloud.google.com/go v0.54.0/go.mod h1:1rq2OEkV3YMf6n/9ZvGWI3GWw0VoqH/1x2nd8Is/bPc=
|
|
||||||
cloud.google.com/go v0.56.0/go.mod h1:jr7tqZxxKOVYizybht9+26Z/gUq7tiRzu+ACVAMbKVk=
|
|
||||||
cloud.google.com/go v0.57.0/go.mod h1:oXiQ6Rzq3RAkkY7N6t3TcE6jE+CIBBbA36lwQ1JyzZs=
|
|
||||||
cloud.google.com/go v0.62.0/go.mod h1:jmCYTdRCQuc1PHIIJ/maLInMho30T/Y0M4hTdTShOYc=
|
|
||||||
cloud.google.com/go v0.65.0/go.mod h1:O5N8zS7uWy9vkA9vayVHs65eM1ubvY4h553ofrNHObY=
|
|
||||||
cloud.google.com/go v0.72.0/go.mod h1:M+5Vjvlc2wnp6tjzE102Dw08nGShTscUx2nZMufOKPI=
|
|
||||||
cloud.google.com/go v0.74.0/go.mod h1:VV1xSbzvo+9QJOxLDaJfTjx5e+MePCpCWwvftOeQmWk=
|
|
||||||
cloud.google.com/go v0.75.0/go.mod h1:VGuuCn7PG0dwsd5XPVm2Mm3wlh3EL55/79EKB6hlPTY=
|
|
||||||
cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o=
|
|
||||||
cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE=
|
|
||||||
cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvftPBK2Dvzc=
|
|
||||||
cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg=
|
|
||||||
cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc=
|
|
||||||
cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ=
|
|
||||||
cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE=
|
|
||||||
cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk=
|
|
||||||
cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I=
|
|
||||||
cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw=
|
|
||||||
cloud.google.com/go/pubsub v1.2.0/go.mod h1:jhfEVHT8odbXTkndysNHCcx0awwzvfOlguIAii9o8iA=
|
|
||||||
cloud.google.com/go/pubsub v1.3.1/go.mod h1:i+ucay31+CNRpDW4Lu78I4xXG+O1r/MAHgjpRVR+TSU=
|
|
||||||
cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw=
|
|
||||||
cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0ZeosJ0Rtdos=
|
|
||||||
cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk=
|
|
||||||
cloud.google.com/go/storage v1.8.0/go.mod h1:Wv1Oy7z6Yz3DshWRJFhqM/UCfaWIRTdp0RXyy7KQOVs=
|
|
||||||
cloud.google.com/go/storage v1.10.0/go.mod h1:FLPqc6j+Ki4BU591ie1oL6qBQGu2Bl/tZ9ullr3+Kg0=
|
|
||||||
cloud.google.com/go/storage v1.14.0/go.mod h1:GrKmX003DSIwi9o29oFT7YDnHYwZoctc3fOKtUw0Xmo=
|
|
||||||
dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU=
|
|
||||||
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
|
||||||
github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo=
|
|
||||||
github.com/RaveNoX/go-jsoncommentstrip v1.0.0/go.mod h1:78ihd09MekBnJnxpICcwzCMzGrKSKYe4AqU6PDYYpjk=
|
github.com/RaveNoX/go-jsoncommentstrip v1.0.0/go.mod h1:78ihd09MekBnJnxpICcwzCMzGrKSKYe4AqU6PDYYpjk=
|
||||||
github.com/apapsch/go-jsonmerge/v2 v2.0.0 h1:axGnT1gRIfimI7gJifB699GoE/oq+F2MU7Dml6nw9rQ=
|
github.com/apapsch/go-jsonmerge/v2 v2.0.0 h1:axGnT1gRIfimI7gJifB699GoE/oq+F2MU7Dml6nw9rQ=
|
||||||
github.com/apapsch/go-jsonmerge/v2 v2.0.0/go.mod h1:lvDnEdqiQrp0O42VQGgmlKpxL1AP2+08jFMw88y4klk=
|
github.com/apapsch/go-jsonmerge/v2 v2.0.0/go.mod h1:lvDnEdqiQrp0O42VQGgmlKpxL1AP2+08jFMw88y4klk=
|
||||||
|
github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
|
||||||
|
github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
|
||||||
github.com/bmatcuk/doublestar v1.1.1/go.mod h1:UD6OnuiIn0yFxxA2le/rnRU1G4RaI4UvFv1sNto9p6w=
|
github.com/bmatcuk/doublestar v1.1.1/go.mod h1:UD6OnuiIn0yFxxA2le/rnRU1G4RaI4UvFv1sNto9p6w=
|
||||||
github.com/bytedance/sonic v1.5.0/go.mod h1:ED5hyg4y6t3/9Ku1R6dU/4KyJ48DZ4jPhfY1O2AihPM=
|
github.com/bytedance/sonic v1.13.2 h1:8/H1FempDZqC4VqjptGo14QQlJx8VdZJegxs6wwfqpQ=
|
||||||
github.com/bytedance/sonic v1.10.0-rc/go.mod h1:ElCzW+ufi8qKqNW0FY314xriJhyJhuoJ3gFZdAHF7NM=
|
github.com/bytedance/sonic v1.13.2/go.mod h1:o68xyaF9u2gvVBuGHPlUVCy+ZfmNNO5ETf1+KgkJhz4=
|
||||||
github.com/bytedance/sonic v1.10.0 h1:qtNZduETEIWJVIyDl01BeNxur2rW9OwTQ/yBqFRkKEk=
|
github.com/bytedance/sonic/loader v0.1.1/go.mod h1:ncP89zfokxS5LZrJxl5z0UJcsk4M4yY2JpfqGeCtNLU=
|
||||||
github.com/bytedance/sonic v1.10.0/go.mod h1:iZcSUejdk5aukTND/Eu/ivjQuEL0Cu9/rf50Hi0u/g4=
|
github.com/bytedance/sonic/loader v0.2.4 h1:ZWCw4stuXUsn1/+zQDqeE7JKP+QO47tz7QCNan80NzY=
|
||||||
github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
|
github.com/bytedance/sonic/loader v0.2.4/go.mod h1:N8A3vUdtUebEY2/VQC0MyhYeKUFosQU6FxH2JmUe6VI=
|
||||||
github.com/chenzhuoyu/base64x v0.0.0-20211019084208-fb5309c8db06/go.mod h1:DH46F32mSOjUmXrMHnKwZdA8wcEefY7UVqBKYGjpdQY=
|
github.com/caarlos0/env/v11 v11.3.1 h1:cArPWC15hWmEt+gWk7YBi7lEXTXCvpaSdCiZE2X5mCA=
|
||||||
github.com/chenzhuoyu/base64x v0.0.0-20221115062448-fe3a3abad311/go.mod h1:b583jCggY9gE99b6G5LEC39OIiVsWj+R97kbl5odCEk=
|
github.com/caarlos0/env/v11 v11.3.1/go.mod h1:qupehSf/Y0TUTsxKywqRt/vJjN5nz6vauiYEUUr8P4U=
|
||||||
github.com/chenzhuoyu/base64x v0.0.0-20230717121745-296ad89f973d h1:77cEq6EriyTZ0g/qfRdp61a3Uu/AWrgIq2s0ClJV1g0=
|
github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
|
||||||
github.com/chenzhuoyu/base64x v0.0.0-20230717121745-296ad89f973d/go.mod h1:8EPpVsBuRksnlj1mLy4AWzRNQYxauNi62uWcE3to6eA=
|
github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
|
||||||
github.com/chenzhuoyu/iasm v0.9.0 h1:9fhXjVzq5hUy2gkhhgHl95zG2cEAhw9OSGs8toWWAwo=
|
github.com/cloudwego/base64x v0.1.5 h1:XPciSp1xaq2VCSt6lF0phncD4koWyULpl5bUxbfCyP4=
|
||||||
github.com/chenzhuoyu/iasm v0.9.0/go.mod h1:Xjy2NpN3h7aUqeqM+woSuuvxmIe6+DDsiNLIrkAmYog=
|
github.com/cloudwego/base64x v0.1.5/go.mod h1:0zlkT4Wn5C6NdauXdJRhSKRlJvmclQ1hhJgA0rcu/8w=
|
||||||
github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI=
|
github.com/cloudwego/iasm v0.2.0/go.mod h1:8rXZaNYT2n95jn+zTI1sDr+IgcD2GVs0nlbbQPiEFhY=
|
||||||
github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI=
|
github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g=
|
||||||
github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
|
|
||||||
github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
|
|
||||||
github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
|
|
||||||
github.com/cncf/udpa/go v0.0.0-20200629203442-efcf912fb354/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
|
|
||||||
github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
|
|
||||||
github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
|
|
||||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||||
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc h1:U9qPSI2PIWSS1VwoXQT9A3Wy9MM3WgvqSxFWenqJduM=
|
github.com/dlclark/regexp2 v1.11.0 h1:G/nrcoOa7ZXlpoa/91N3X7mM3r8eIlMBBJZvsz/mxKI=
|
||||||
github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
|
github.com/dlclark/regexp2 v1.11.0/go.mod h1:DHkYz0B9wPfa6wondMfaivmHpzrQ3v9q8cnmRbL6yW8=
|
||||||
github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
|
github.com/fxamacker/cbor/v2 v2.8.0 h1:fFtUGXUzXPHTIUdne5+zzMPTfffl3RD5qYnkY40vtxU=
|
||||||
github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
|
github.com/fxamacker/cbor/v2 v2.8.0/go.mod h1:vM4b+DJCtHn+zz7h3FFp/hDAI9WNWCsZj23V5ytsSxQ=
|
||||||
github.com/envoyproxy/go-control-plane v0.9.7/go.mod h1:cwu0lG7PUMfa9snN8LXBig5ynNVH9qI8YYLbd1fK2po=
|
github.com/gabriel-vasile/mimetype v1.4.9 h1:5k+WDwEsD9eTLL8Tz3L0VnmVh9QxGjRmjBvAG7U/oYY=
|
||||||
github.com/envoyproxy/go-control-plane v0.9.9-0.20201210154907-fd9021fe5dad/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk=
|
github.com/gabriel-vasile/mimetype v1.4.9/go.mod h1:WnSQhFKJuBlRyLiKohA/2DtIlPFAbguNaG7QCHcyGok=
|
||||||
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
|
github.com/gin-contrib/sse v1.1.0 h1:n0w2GMuUpWDVp7qSpvze6fAu9iRxJY4Hmj6AmBOU05w=
|
||||||
github.com/frankban/quicktest v1.14.4 h1:g2rn0vABPOOXmZUj+vbmUp0lPoXEMuhTpIluN0XL9UY=
|
github.com/gin-contrib/sse v1.1.0/go.mod h1:hxRZ5gVpWMT7Z0B0gSNYqqsSCNIJMjzvm6fqCz9vjwM=
|
||||||
github.com/fsnotify/fsnotify v1.6.0 h1:n+5WquG0fcWoWp6xPWfHdbskMCQaFnG6PfBrh1Ky4HY=
|
github.com/gin-gonic/gin v1.10.0 h1:nTuyha1TYqgedzytsKYqna+DfLos46nTv2ygFy86HFU=
|
||||||
github.com/fsnotify/fsnotify v1.6.0/go.mod h1:sl3t1tCWJFWoRz9R8WJCbQihKKwmorjAbSClcnxKAGw=
|
github.com/gin-gonic/gin v1.10.0/go.mod h1:4PMNQiOhvDRa013RKVbsiNwoyezlm2rm0uX/T7kzp5Y=
|
||||||
github.com/gabriel-vasile/mimetype v1.4.2 h1:w5qFW6JKBz9Y393Y4q372O9A7cUSequkh1Q7OhCmWKU=
|
github.com/go-faker/faker/v4 v4.6.1 h1:xUyVpAjEtB04l6XFY0V/29oR332rOSPWV4lU8RwDt4k=
|
||||||
github.com/gabriel-vasile/mimetype v1.4.2/go.mod h1:zApsH/mKG4w07erKIaJPFiX0Tsq9BFQgN3qGY5GnNgA=
|
github.com/go-faker/faker/v4 v4.6.1/go.mod h1:arSdxNCSt7mOhdk8tEolvHeIJ7eX4OX80wXjKKvkKBY=
|
||||||
github.com/gin-contrib/sse v0.1.0 h1:Y/yl/+YNO8GZSjAhjMsSuLt29uWRFHdHYUb5lYOV9qE=
|
github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
|
||||||
github.com/gin-contrib/sse v0.1.0/go.mod h1:RHrZQHXnP2xjPF+u1gW/2HnVO7nvIa9PG3Gm+fLHvGI=
|
github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
|
||||||
github.com/gin-gonic/gin v1.9.1 h1:4idEAncQnU5cB7BeOkPtxjfCSye0AAm1R0RVIqJ+Jmg=
|
|
||||||
github.com/gin-gonic/gin v1.9.1/go.mod h1:hPrL7YrpYKXt5YId3A/Tnip5kqbEAP+KLuI3SUcPTeU=
|
|
||||||
github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU=
|
|
||||||
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
|
|
||||||
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
|
|
||||||
github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
|
||||||
github.com/go-logr/logr v1.3.0 h1:2y3SDp0ZXuc6/cjLSZ+Q3ir+QB9T/iG5yYRXqsagWSY=
|
|
||||||
github.com/go-logr/logr v1.3.0/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
|
|
||||||
github.com/go-playground/assert/v2 v2.2.0 h1:JvknZsQTYeFEAhQwI4qEt9cyV5ONwRHC+lYKSsYSR8s=
|
github.com/go-playground/assert/v2 v2.2.0 h1:JvknZsQTYeFEAhQwI4qEt9cyV5ONwRHC+lYKSsYSR8s=
|
||||||
|
github.com/go-playground/assert/v2 v2.2.0/go.mod h1:VDjEfimB/XKnb+ZQfWdccd7VUvScMdVu0Titje2rxJ4=
|
||||||
github.com/go-playground/locales v0.14.1 h1:EWaQ/wswjilfKLTECiXz7Rh+3BjFhfDFKv/oXslEjJA=
|
github.com/go-playground/locales v0.14.1 h1:EWaQ/wswjilfKLTECiXz7Rh+3BjFhfDFKv/oXslEjJA=
|
||||||
github.com/go-playground/locales v0.14.1/go.mod h1:hxrqLVvrK65+Rwrd5Fc6F2O76J/NuW9t0sjnWqG1slY=
|
github.com/go-playground/locales v0.14.1/go.mod h1:hxrqLVvrK65+Rwrd5Fc6F2O76J/NuW9t0sjnWqG1slY=
|
||||||
github.com/go-playground/universal-translator v0.18.1 h1:Bcnm0ZwsGyWbCzImXv+pAJnYK9S473LQFuzCbDbfSFY=
|
github.com/go-playground/universal-translator v0.18.1 h1:Bcnm0ZwsGyWbCzImXv+pAJnYK9S473LQFuzCbDbfSFY=
|
||||||
github.com/go-playground/universal-translator v0.18.1/go.mod h1:xekY+UJKNuX9WP91TpwSH2VMlDf28Uj24BCp08ZFTUY=
|
github.com/go-playground/universal-translator v0.18.1/go.mod h1:xekY+UJKNuX9WP91TpwSH2VMlDf28Uj24BCp08ZFTUY=
|
||||||
github.com/go-playground/validator/v10 v10.15.1 h1:BSe8uhN+xQ4r5guV/ywQI4gO59C2raYcGffYWZEjZzM=
|
github.com/go-playground/validator/v10 v10.26.0 h1:SP05Nqhjcvz81uJaRfEV0YBSSSGMc/iMaVtFbr3Sw2k=
|
||||||
github.com/go-playground/validator/v10 v10.15.1/go.mod h1:9iXMNT7sEkjXb0I+enO7QXmzG6QCsPWY4zveKFVRSyU=
|
github.com/go-playground/validator/v10 v10.26.0/go.mod h1:I5QpIEbmr8On7W0TktmJAumgzX4CA1XNl4ZmDuVHKKo=
|
||||||
github.com/go-resty/resty/v2 v2.10.0 h1:Qla4W/+TMmv0fOeeRqzEpXPLfTUnR5HZ1+lGs+CkiCo=
|
github.com/go-resty/resty/v2 v2.16.5 h1:hBKqmWrr7uRc3euHVqmh1HTHcKn99Smr7o5spptdhTM=
|
||||||
github.com/go-resty/resty/v2 v2.10.0/go.mod h1:iiP/OpA0CkcL3IGt1O0+/SIItFUbkkyw5BGXiVdTu+A=
|
github.com/go-resty/resty/v2 v2.16.5/go.mod h1:hkJtXbA2iKHzJheXYvQ8snQES5ZLGKMwQ07xAwp/fiA=
|
||||||
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
|
github.com/go-task/slim-sprig/v3 v3.0.0 h1:sUs3vkvUymDpBKi3qH1YSqBQk9+9D/8M2mN1vB6EwHI=
|
||||||
github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572/go.mod h1:9Pwr4B2jHnOSGXyyzV8ROjYa2ojvAY6HCGYYfMoC3Ls=
|
github.com/go-task/slim-sprig/v3 v3.0.0/go.mod h1:W848ghGpv3Qj3dhTPRyJypKRiqCdHZiAzKg9hl15HA8=
|
||||||
github.com/goccy/go-json v0.10.2 h1:CrxCmQqYDkv1z7lO7Wbh2HN93uovUHgrECaO5ZrCXAU=
|
github.com/goccy/go-json v0.10.5 h1:Fq85nIqj+gXn/S5ahsiTlK3TmC85qgirsdTP/+DeaC4=
|
||||||
github.com/goccy/go-json v0.10.2/go.mod h1:6MelG93GURQebXPDq3khkgXZkazVtN9CRI+MGFi0w8I=
|
github.com/goccy/go-json v0.10.5/go.mod h1:oq7eo15ShAhp70Anwd5lgX2pLfOS3QCiwU/PULtXL6M=
|
||||||
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
|
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
|
||||||
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
|
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
|
||||||
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
|
|
||||||
github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
|
||||||
github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
|
||||||
github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
|
||||||
github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
|
|
||||||
github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
|
|
||||||
github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y=
|
|
||||||
github.com/golang/mock v1.4.0/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
|
|
||||||
github.com/golang/mock v1.4.1/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
|
|
||||||
github.com/golang/mock v1.4.3/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
|
|
||||||
github.com/golang/mock v1.4.4/go.mod h1:l3mdAwkq5BuhzHwde/uurv3sEJeZMXNpwsxVWU71h+4=
|
|
||||||
github.com/golang/mock v1.6.0 h1:ErTB+efbowRARo13NNdxyJji2egdxLGQhRaY+DUumQc=
|
|
||||||
github.com/golang/mock v1.6.0/go.mod h1:p6yTPP+5HYm5mzsMV8JkE6ZKdX+/wYM6Hr+LicevLPs=
|
|
||||||
github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
|
|
||||||
github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
|
|
||||||
github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
|
|
||||||
github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
|
|
||||||
github.com/golang/protobuf v1.3.4/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
|
|
||||||
github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk=
|
|
||||||
github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
|
|
||||||
github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
|
|
||||||
github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
|
|
||||||
github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
|
|
||||||
github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
|
|
||||||
github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8=
|
|
||||||
github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
|
|
||||||
github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
|
|
||||||
github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
|
|
||||||
github.com/golang/protobuf v1.5.3 h1:KhyjKVUg7Usr/dYsdSqoFveMYd5ko72D+zANwlG1mmg=
|
|
||||||
github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
|
||||||
github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
|
||||||
github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
|
|
||||||
github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
|
|
||||||
github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
|
|
||||||
github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
|
||||||
github.com/google/go-cmp v0.4.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
|
||||||
github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
|
||||||
github.com/google/go-cmp v0.5.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
|
||||||
github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
|
||||||
github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
|
||||||
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
|
||||||
github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
||||||
github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
|
github.com/google/go-cmp v0.7.0 h1:wk8382ETsv4JYUZwIsn6YpYiWiBsYLSJiTsyBybVuN8=
|
||||||
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
github.com/google/go-cmp v0.7.0/go.mod h1:pXiqmnSA92OHEEa9HXL2W4E7lf9JzCmGVUdgjX3N/iU=
|
||||||
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
||||||
github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
|
github.com/google/pprof v0.0.0-20250501235452-c0086092b71a h1:rDA3FfmxwXR+BVKKdz55WwMJ1pD2hJQNW31d+l3mPk4=
|
||||||
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
github.com/google/pprof v0.0.0-20250501235452-c0086092b71a/go.mod h1:5hDyRhoBCxViHszMt12TnOpEI4VVi+U8Gm9iphldiMA=
|
||||||
github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs=
|
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
||||||
github.com/google/martian/v3 v3.0.0/go.mod h1:y5Zk1BBys9G+gd6Jrk0W3cC1+ELVxBWuIGO+w/tUAp0=
|
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
||||||
github.com/google/martian/v3 v3.1.0/go.mod h1:y5Zk1BBys9G+gd6Jrk0W3cC1+ELVxBWuIGO+w/tUAp0=
|
|
||||||
github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
|
|
||||||
github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
|
|
||||||
github.com/google/pprof v0.0.0-20191218002539-d4f498aebedc/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
|
|
||||||
github.com/google/pprof v0.0.0-20200212024743-f11f1df84d12/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
|
|
||||||
github.com/google/pprof v0.0.0-20200229191704-1ebb73c60ed3/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
|
|
||||||
github.com/google/pprof v0.0.0-20200430221834-fc25d7d30c6d/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
|
|
||||||
github.com/google/pprof v0.0.0-20200708004538-1a94d8640e99/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
|
|
||||||
github.com/google/pprof v0.0.0-20201023163331-3e6fc7fc9c4c/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
|
||||||
github.com/google/pprof v0.0.0-20201203190320-1bf35d6f28c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
|
||||||
github.com/google/pprof v0.0.0-20201218002935-b9804c9f04c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
|
||||||
github.com/google/pprof v0.0.0-20210720184732-4bb14d4b1be1 h1:K6RDEckDVWvDI9JAJYCmNdQXq6neHJOYx3V6jnqNEec=
|
|
||||||
github.com/google/pprof v0.0.0-20210720184732-4bb14d4b1be1/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
|
||||||
github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
|
|
||||||
github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
|
||||||
github.com/google/uuid v1.4.0 h1:MtMxsa51/r9yyhkyLsVeVt0B+BGQZzpQiTQ4eHZ8bc4=
|
|
||||||
github.com/google/uuid v1.4.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
|
||||||
github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg=
|
|
||||||
github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk=
|
|
||||||
github.com/googleapis/google-cloud-go-testing v0.0.0-20200911160855-bcd43fbb19e8/go.mod h1:dvDLG8qkwmyD9a/MJJN3XJcT3xFxOKAvTZGvuZmac9g=
|
|
||||||
github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
|
|
||||||
github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
|
|
||||||
github.com/hashicorp/hcl v1.0.0 h1:0Anlzjpi4vEasTeNFn2mLJgTSwt0+6sfsiTG8qcWGx4=
|
|
||||||
github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
|
|
||||||
github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
|
||||||
github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
|
||||||
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
|
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
|
||||||
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
|
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
|
||||||
github.com/jinzhu/copier v0.4.0 h1:w3ciUoD19shMCRargcpm0cm91ytaBhDvuRpz1ODO/U8=
|
github.com/jinzhu/copier v0.4.0 h1:w3ciUoD19shMCRargcpm0cm91ytaBhDvuRpz1ODO/U8=
|
||||||
github.com/jinzhu/copier v0.4.0/go.mod h1:DfbEm0FYsaqBcKcFuvmOZb218JkPGtvSHsKg8S8hyyg=
|
github.com/jinzhu/copier v0.4.0/go.mod h1:DfbEm0FYsaqBcKcFuvmOZb218JkPGtvSHsKg8S8hyyg=
|
||||||
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
|
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
|
||||||
github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
|
github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
|
||||||
github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU=
|
|
||||||
github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk=
|
|
||||||
github.com/juju/gnuflag v0.0.0-20171113085948-2ce1bb71843d/go.mod h1:2PavIy+JPciBPrBUjwbNvtwB6RQlve+hkpll6QSNmOE=
|
github.com/juju/gnuflag v0.0.0-20171113085948-2ce1bb71843d/go.mod h1:2PavIy+JPciBPrBUjwbNvtwB6RQlve+hkpll6QSNmOE=
|
||||||
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
|
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
|
||||||
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
|
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
|
||||||
|
github.com/klauspost/compress v1.18.0 h1:c/Cqfb0r+Yi+JtIEq73FWXVkRonBlf0CRNYc8Zttxdo=
|
||||||
|
github.com/klauspost/compress v1.18.0/go.mod h1:2Pp+KzxcywXVXMr50+X0Q/Lsb43OQHYWRCY2AiWywWQ=
|
||||||
github.com/klauspost/cpuid/v2 v2.0.9/go.mod h1:FInQzS24/EEf25PyTYn52gqo7WaD8xa0213Md/qVLRg=
|
github.com/klauspost/cpuid/v2 v2.0.9/go.mod h1:FInQzS24/EEf25PyTYn52gqo7WaD8xa0213Md/qVLRg=
|
||||||
github.com/klauspost/cpuid/v2 v2.2.5 h1:0E5MSMDEoAulmXNFquVs//DdoomxaoTY1kUhbc/qbZg=
|
github.com/klauspost/cpuid/v2 v2.2.10 h1:tBs3QSyvjDyFTq3uoc/9xFpCuOsJQFNPiAhYdw2skhE=
|
||||||
github.com/klauspost/cpuid/v2 v2.2.5/go.mod h1:Lcz8mBdAVJIBVzewtcLocK12l3Y+JytZYpaMropDUws=
|
github.com/klauspost/cpuid/v2 v2.2.10/go.mod h1:hqwkgyIinND0mEev00jJYCxPNVRVXFQeu1XKlok6oO0=
|
||||||
github.com/knz/go-libedit v1.10.1/go.mod h1:MZTVkCWyz0oBc7JOWP3wNAzd002ZbM/5hgShxwh4x8M=
|
github.com/knz/go-libedit v1.10.1/go.mod h1:MZTVkCWyz0oBc7JOWP3wNAzd002ZbM/5hgShxwh4x8M=
|
||||||
github.com/kr/fs v0.1.0/go.mod h1:FFnZGqtBN9Gxj7eW1uZ42v5BccTP0vu6NEaFoC2HwRg=
|
|
||||||
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
|
|
||||||
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
|
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
|
||||||
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
|
github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=
|
||||||
github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
|
|
||||||
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
|
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
|
||||||
github.com/leodido/go-urn v1.2.4 h1:XlAE/cm/ms7TE/VMVoduSpNBoyc2dOxHs5MZSwAN63Q=
|
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
|
||||||
github.com/leodido/go-urn v1.2.4/go.mod h1:7ZrI8mTSeBSHl/UaRyKQW1qZeMgak41ANeCNaVckg+4=
|
github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc=
|
||||||
github.com/magiconair/properties v1.8.7 h1:IeQXZAiQcpL9mgcAe1Nu6cX9LLw6ExEHKjN0VQdvPDY=
|
github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
|
||||||
github.com/magiconair/properties v1.8.7/go.mod h1:Dhd985XPs7jluiymwWYZ0G4Z61jb3vdS329zhj2hYo0=
|
github.com/leodido/go-urn v1.4.0 h1:WT9HwE9SGECu3lg4d/dIA+jxlljEa1/ffXKmRjqdmIQ=
|
||||||
github.com/mattn/go-isatty v0.0.19 h1:JITubQf0MOLdlGRuRq+jtsDlekdYPia9ZFsB8h/APPA=
|
github.com/leodido/go-urn v1.4.0/go.mod h1:bvxc+MVxLKB4z00jd1z+Dvzr47oO32F/QSNjSBOlFxI=
|
||||||
github.com/mattn/go-isatty v0.0.19/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
|
github.com/mattn/go-isatty v0.0.20 h1:xfD0iDuEKnDkl03q4limB+vH+GxLEtL/jb4xVJSWWEY=
|
||||||
github.com/mitchellh/go-homedir v1.1.0 h1:lukF9ziXFxDFPkA1vsr5zpc1XuPDn/wFntq5mG+4E0Y=
|
github.com/mattn/go-isatty v0.0.20/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
|
||||||
github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
|
|
||||||
github.com/mitchellh/mapstructure v1.5.0 h1:jeMsZIYE/09sWLaz43PL7Gy6RuMjD2eJVyuac5Z2hdY=
|
|
||||||
github.com/mitchellh/mapstructure v1.5.0/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo=
|
|
||||||
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
||||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
|
||||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
||||||
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
|
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
|
||||||
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
|
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
|
||||||
github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e h1:fD57ERR4JtEqsWbfPhv4DMiApHyliiK5xCTNVSPiaAs=
|
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
|
||||||
github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
|
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
|
||||||
github.com/oapi-codegen/runtime v1.1.0 h1:rJpoNUawn5XTvekgfkvSZr0RqEnoYpFkyvrzfWeFKWM=
|
github.com/oapi-codegen/runtime v1.1.1 h1:EXLHh0DXIJnWhdRPN2w4MXAzFyE4CskzhNLUmtpMYro=
|
||||||
github.com/oapi-codegen/runtime v1.1.0/go.mod h1:BeSfBkWWWnAnGdyS+S/GnlbmHKzf8/hwkvelJZDeKA8=
|
github.com/oapi-codegen/runtime v1.1.1/go.mod h1:SK9X900oXmPWilYR5/WKPzt3Kqxn/uS/+lbpREv+eCg=
|
||||||
github.com/onsi/ginkgo/v2 v2.13.1 h1:LNGfMbR2OVGBfXjvRZIZ2YCTQdGKtPLvuI1rMCCj3OU=
|
github.com/onsi/ginkgo/v2 v2.23.4 h1:ktYTpKJAVZnDT4VjxSbiBenUjmlL/5QkBEocaWXiQus=
|
||||||
github.com/onsi/ginkgo/v2 v2.13.1/go.mod h1:XStQ8QcGwLyF4HdfcZB8SFOS/MWCgDuXMSBe6zrvLgM=
|
github.com/onsi/ginkgo/v2 v2.23.4/go.mod h1:Bt66ApGPBFzHyR+JO10Zbt0Gsp4uWxu5mIOTusL46e8=
|
||||||
github.com/onsi/gomega v1.30.0 h1:hvMK7xYz4D3HapigLTeGdId/NcfQx1VHMJc60ew99+8=
|
github.com/onsi/gomega v1.37.0 h1:CdEG8g0S133B4OswTDC/5XPSzE1OeP29QOioj2PID2Y=
|
||||||
github.com/onsi/gomega v1.30.0/go.mod h1:9sxs+SwGrKI0+PWe4Fxa9tFQQBG5xSsSbMXOI8PPpoQ=
|
github.com/onsi/gomega v1.37.0/go.mod h1:8D9+Txp43QWKhM24yyOBEdpkzN8FvJyAwecBgsU4KU0=
|
||||||
github.com/pelletier/go-toml/v2 v2.1.0 h1:FnwAJ4oYMvbT/34k9zzHuZNrhlz48GB3/s6at6/MHO4=
|
github.com/pelletier/go-toml/v2 v2.2.4 h1:mye9XuhQ6gvn5h28+VilKrrPoQVanw5PMw/TB0t5Ec4=
|
||||||
github.com/pelletier/go-toml/v2 v2.1.0/go.mod h1:tJU2Z3ZkXwnxa4DPO899bsyIoywizdUvyaeZurnPPDc=
|
github.com/pelletier/go-toml/v2 v2.2.4/go.mod h1:2gIqNv+qfxSVS7cM2xJQKtLSTLUE9V8t9Stt+h56mCY=
|
||||||
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
github.com/pkg/sftp v1.13.1/go.mod h1:3HaPG6Dq1ILlpPZRO0HVMrsydcdLt6HRDccSgb87qRg=
|
|
||||||
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
|
github.com/prashantv/gostub v1.1.0 h1:BTyx3RfQjRHnUWaGF9oQos79AlQ5k8WNktv7VGvVH4g=
|
||||||
github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
|
github.com/prashantv/gostub v1.1.0/go.mod h1:A5zLQHz7ieHGG7is6LLXLz7I8+3LZzsrV0P1IAHhP5U=
|
||||||
|
github.com/prometheus/client_golang v1.22.0 h1:rb93p9lokFEsctTys46VnV1kLCDpVZ0a/Y92Vm0Zc6Q=
|
||||||
|
github.com/prometheus/client_golang v1.22.0/go.mod h1:R7ljNsLXhuQXYZYtw6GAE9AZg8Y7vEW5scdCXrWRXC0=
|
||||||
|
github.com/prometheus/client_model v0.6.2 h1:oBsgwpGs7iVziMvrGhE53c/GrLUsZdHnqNwqPLxwZyk=
|
||||||
|
github.com/prometheus/client_model v0.6.2/go.mod h1:y3m2F6Gdpfy6Ut/GBsUqTWZqCUvMVzSfMLjcu6wAwpE=
|
||||||
|
github.com/prometheus/common v0.63.0 h1:YR/EIY1o3mEFP/kZCD7iDMnLPlGyuU2Gb3HIcXnA98k=
|
||||||
|
github.com/prometheus/common v0.63.0/go.mod h1:VVFF/fBIoToEnWRVkYoXEkq3R3paCoxG9PXP74SnV18=
|
||||||
|
github.com/prometheus/procfs v0.16.1 h1:hZ15bTNuirocR6u0JZ6BAHHmwS1p8B4P6MRqxtzMyRg=
|
||||||
|
github.com/prometheus/procfs v0.16.1/go.mod h1:teAbpZRB1iIAJYREa1LsoWUXykVXA1KlTmWl8x/U+Is=
|
||||||
github.com/robfig/cron/v3 v3.0.1 h1:WdRxkvbJztn8LMz/QEvLN5sBU+xKpSqwwUO1Pjr4qDs=
|
github.com/robfig/cron/v3 v3.0.1 h1:WdRxkvbJztn8LMz/QEvLN5sBU+xKpSqwwUO1Pjr4qDs=
|
||||||
github.com/robfig/cron/v3 v3.0.1/go.mod h1:eQICP3HwyT7UooqI/z+Ov+PtYAWygg1TEWWzGIFLtro=
|
github.com/robfig/cron/v3 v3.0.1/go.mod h1:eQICP3HwyT7UooqI/z+Ov+PtYAWygg1TEWWzGIFLtro=
|
||||||
github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
|
github.com/rogpeppe/go-internal v1.13.1 h1:KvO1DLK/DRN07sQ1LQKScxyZJuNnedQ5/wKSR38lUII=
|
||||||
github.com/rogpeppe/go-internal v1.10.0 h1:TMyTOH3F/DB16zRVcYyreMH6GnZZrwQVAoYjRBZyWFQ=
|
github.com/rogpeppe/go-internal v1.13.1/go.mod h1:uMEvuHeurkdAXX61udpOXGD/AzZDWNMNyH2VO9fmH0o=
|
||||||
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
|
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
|
||||||
github.com/sagikazarmark/locafero v0.3.0 h1:zT7VEGWC2DTflmccN/5T1etyKvxSxpHsjb9cJvm4SvQ=
|
github.com/santhosh-tekuri/jsonschema/v6 v6.0.1 h1:PKK9DyHxif4LZo+uQSgXNqs0jj5+xZwwfKHgph2lxBw=
|
||||||
github.com/sagikazarmark/locafero v0.3.0/go.mod h1:w+v7UsPNFwzF1cHuOajOOzoq4U7v/ig1mpRjqV+Bu1U=
|
github.com/santhosh-tekuri/jsonschema/v6 v6.0.1/go.mod h1:JXeL+ps8p7/KNMjDQk3TCwPpBy0wYklyWTfbkIzdIFU=
|
||||||
github.com/sagikazarmark/slog-shim v0.1.0 h1:diDBnUNK9N/354PgrxMywXnAwEr1QZcOr6gto+ugjYE=
|
github.com/spf13/cobra v1.9.1 h1:CXSaggrXdbHK9CF+8ywj8Amf7PBRmPCOJugH954Nnlo=
|
||||||
github.com/sagikazarmark/slog-shim v0.1.0/go.mod h1:SrcSrq8aKtyuqEI1uvTDTK1arOWRIczQRv+GVI1AkeQ=
|
github.com/spf13/cobra v1.9.1/go.mod h1:nDyEzZ8ogv936Cinf6g1RU9MRY64Ir93oCnqb9wxYW0=
|
||||||
github.com/sourcegraph/conc v0.3.0 h1:OQTbbt6P72L20UqAkXXuLOj79LfEanQ+YQFNpLA9ySo=
|
github.com/spf13/pflag v1.0.6 h1:jFzHGLGAlb3ruxLB8MhbI6A8+AQX/2eW4qeyNZXNp2o=
|
||||||
github.com/sourcegraph/conc v0.3.0/go.mod h1:Sdozi7LEKbFPqYX2/J+iBAM6HpqSLTASQIKqDmF7Mt0=
|
github.com/spf13/pflag v1.0.6/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
||||||
github.com/spf13/afero v1.10.0 h1:EaGW2JJh15aKOejeuJ+wpFSHnbd7GE6Wvp3TsNhb6LY=
|
|
||||||
github.com/spf13/afero v1.10.0/go.mod h1:UBogFpq8E9Hx+xc5CNTTEpTnuHVmXDwZcZcE1eb/UhQ=
|
|
||||||
github.com/spf13/cast v1.5.1 h1:R+kOtfhWQE6TVQzY+4D7wJLBgkdVasCEFxSUBYBYIlA=
|
|
||||||
github.com/spf13/cast v1.5.1/go.mod h1:b9PdjNptOpzXr7Rq1q9gJML/2cdGQAo69NKzQ10KN48=
|
|
||||||
github.com/spf13/cobra v1.8.0 h1:7aJaZx1B85qltLMc546zn58BxxfZdR/W22ej9CFoEf0=
|
|
||||||
github.com/spf13/cobra v1.8.0/go.mod h1:WXLWApfZ71AjXPya3WOlMsY9yMs7YeiHhFVlvLyhcho=
|
|
||||||
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
|
|
||||||
github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
|
||||||
github.com/spf13/viper v1.17.0 h1:I5txKw7MJasPL/BrfkbA0Jyo/oELqVmux4pR/UxOMfI=
|
|
||||||
github.com/spf13/viper v1.17.0/go.mod h1:BmMMMLQXSbcHK6KAOiFLz0l5JHrU89OdIRHvsk0+yVI=
|
|
||||||
github.com/spkg/bom v0.0.0-20160624110644-59b7046e48ad/go.mod h1:qLr4V1qq6nMqFKkMo8ZTx3f+BZEkzsRUY10Xsm2mwU0=
|
github.com/spkg/bom v0.0.0-20160624110644-59b7046e48ad/go.mod h1:qLr4V1qq6nMqFKkMo8ZTx3f+BZEkzsRUY10Xsm2mwU0=
|
||||||
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
|
github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
|
||||||
github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
|
github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
|
||||||
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
|
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
|
||||||
github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
|
|
||||||
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
|
|
||||||
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
|
||||||
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
||||||
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
||||||
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
|
||||||
github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=
|
github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
||||||
github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
|
|
||||||
github.com/subosito/gotenv v1.6.0 h1:9NlTDc1FTs4qu0DDq7AEtTPNw6SVm7uBMsUCUjABIf8=
|
|
||||||
github.com/subosito/gotenv v1.6.0/go.mod h1:Dk4QP5c2W3ibzajGcXpNraDfq2IrhjMIvMSWPKKo0FU=
|
|
||||||
github.com/twitchyliquid64/golang-asm v0.15.1 h1:SU5vSMR7hnwNxj24w34ZyCi/FmDZTkS4MhqMhdFk5YI=
|
github.com/twitchyliquid64/golang-asm v0.15.1 h1:SU5vSMR7hnwNxj24w34ZyCi/FmDZTkS4MhqMhdFk5YI=
|
||||||
github.com/twitchyliquid64/golang-asm v0.15.1/go.mod h1:a1lVb/DtPvCB8fslRZhAngC2+aY1QWCk3Cedj/Gdt08=
|
github.com/twitchyliquid64/golang-asm v0.15.1/go.mod h1:a1lVb/DtPvCB8fslRZhAngC2+aY1QWCk3Cedj/Gdt08=
|
||||||
github.com/ugorji/go/codec v1.2.11 h1:BMaWp1Bb6fHwEtbplGBGJ498wD+LKlNSl25MjdZY4dU=
|
github.com/ugorji/go/codec v1.2.12 h1:9LC83zGrHhuUA9l16C9AHXAqEV/2wBQ4nkvumAE65EE=
|
||||||
github.com/ugorji/go/codec v1.2.11/go.mod h1:UNopzCgEMSXjBc6AOMqYvWC1ktqTAfzJZUZgYf6w6lg=
|
github.com/ugorji/go/codec v1.2.12/go.mod h1:UNopzCgEMSXjBc6AOMqYvWC1ktqTAfzJZUZgYf6w6lg=
|
||||||
github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=
|
||||||
|
github.com/x448/float16 v0.8.4/go.mod h1:14CWIYCyZA/cWjXOioeEpHeN/83MdbZDRQHoFcYsOfg=
|
||||||
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||||
github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
|
||||||
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||||
github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
|
go.uber.org/automaxprocs v1.6.0 h1:O3y2/QNTOdbF+e/dpXNNW7Rx2hZ4sTIPyybbxyNqTUs=
|
||||||
github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY=
|
go.uber.org/automaxprocs v1.6.0/go.mod h1:ifeIMSnPZuznNm6jmdzmU3/bfk01Fe2fotchwEFJ8r8=
|
||||||
go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU=
|
go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto=
|
||||||
go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8=
|
go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE=
|
||||||
go.opencensus.io v0.22.2/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
|
go.uber.org/mock v0.5.2 h1:LbtPTcP8A5k9WPXj54PPPbjcI4Y6lhyOZXn+VS7wNko=
|
||||||
go.opencensus.io v0.22.3/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
|
go.uber.org/mock v0.5.2/go.mod h1:wLlUxC2vVTPTaE3UD51E0BGOAElKrILxhVSDYQLld5o=
|
||||||
go.opencensus.io v0.22.4/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
|
|
||||||
go.opencensus.io v0.22.5/go.mod h1:5pWMHQbX5EPX2/62yrJeAkowc+lfs/XD7Uxpq3pI6kk=
|
|
||||||
go.uber.org/goleak v1.2.0 h1:xqgm/S+aQvhWFTtR0XK3Jvg7z8kGV8P4X14IzwN3Eqk=
|
|
||||||
go.uber.org/multierr v1.11.0 h1:blXXJkSxSSfBVBlC76pxqeO+LN3aDfLQo+309xJstO0=
|
go.uber.org/multierr v1.11.0 h1:blXXJkSxSSfBVBlC76pxqeO+LN3aDfLQo+309xJstO0=
|
||||||
go.uber.org/multierr v1.11.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
|
go.uber.org/multierr v1.11.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
|
||||||
go.uber.org/zap v1.26.0 h1:sI7k6L95XOKS281NhVKOFCUNIvv9e0w4BF8N3u+tCRo=
|
go.uber.org/zap v1.27.0 h1:aJMhYGrd5QSmlpLMr2MftRKl7t8J8PTZPA732ud/XR8=
|
||||||
go.uber.org/zap v1.26.0/go.mod h1:dtElttAiwGvoJ/vj4IwHBS/gXsEu/pZ50mUIRWuG0so=
|
go.uber.org/zap v1.27.0/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
|
||||||
golang.org/x/arch v0.0.0-20210923205945-b76863e36670/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8=
|
golang.org/x/arch v0.16.0 h1:foMtLTdyOmIniqWCHjY6+JxuC54XP1fDwx4N0ASyW+U=
|
||||||
golang.org/x/arch v0.4.0 h1:A8WCeEWhLwPBKNbFi5Wv5UTCBx5zzubnXDlMOFAzFMc=
|
golang.org/x/arch v0.16.0/go.mod h1:JmwW7aLIoRUKgaTzhkiEFxvcEiQGyOg9BMonBJUS7EE=
|
||||||
golang.org/x/arch v0.4.0/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8=
|
|
||||||
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
|
||||||
golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
|
||||||
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
||||||
golang.org/x/crypto v0.0.0-20210421170649-83a5a9bb288b/go.mod h1:T9bdIzuCu7OtxOm1hfPfRQxPLYneinmdGuTeoZ9dtd4=
|
golang.org/x/crypto v0.37.0 h1:kJNSjF/Xp7kU0iB2Z+9viTPMW4EqqsrywMXLJOOsXSE=
|
||||||
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
|
golang.org/x/crypto v0.37.0/go.mod h1:vg+k43peMZ0pUMhYmVAWysMK35e6ioLh3wB8ZCAfbVc=
|
||||||
golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
|
|
||||||
golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc=
|
|
||||||
golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4=
|
|
||||||
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
|
|
||||||
golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
|
|
||||||
golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
|
|
||||||
golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek=
|
|
||||||
golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY=
|
|
||||||
golang.org/x/exp v0.0.0-20191129062945-2f5052295587/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
|
|
||||||
golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
|
|
||||||
golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
|
|
||||||
golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM=
|
|
||||||
golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU=
|
|
||||||
golang.org/x/exp v0.0.0-20230905200255-921286631fa9 h1:GoHiUyI/Tp2nVkLI2mCxVkOjsbSXD66ic0XW0js0R9g=
|
|
||||||
golang.org/x/exp v0.0.0-20230905200255-921286631fa9/go.mod h1:S2oDrQGGwySpoQPVqRShND87VCbxmc6bL1Yd2oYrm6k=
|
|
||||||
golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js=
|
|
||||||
golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
|
|
||||||
golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
|
|
||||||
golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
|
|
||||||
golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
|
|
||||||
golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
|
|
||||||
golang.org/x/lint v0.0.0-20190409202823-959b441ac422/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
|
|
||||||
golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
|
|
||||||
golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
|
|
||||||
golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs=
|
|
||||||
golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
|
|
||||||
golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
|
|
||||||
golang.org/x/lint v0.0.0-20201208152925-83fdc39ff7b5/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
|
|
||||||
golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE=
|
|
||||||
golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o=
|
|
||||||
golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc=
|
|
||||||
golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY=
|
|
||||||
golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
|
|
||||||
golang.org/x/mod v0.1.1-0.20191107180719-034126e5016b/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
|
|
||||||
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
||||||
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
||||||
golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.24.0 h1:ZfthKaKaT4NrhGVZHO1/WDTwGES4De8KtWO0SIbNJMU=
|
||||||
golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.24.0/go.mod h1:IXM97Txy2VM4PJ3gI61r1YEk/gAj6zAHN3AdZt6S9Ww=
|
||||||
golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
|
||||||
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
|
|
||||||
golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
|
|
||||||
golang.org/x/mod v0.14.0 h1:dGoOF9QVLYng8IHTm7BAyWqCqSheQ5pYWGhzW00YJr0=
|
|
||||||
golang.org/x/mod v0.14.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
|
|
||||||
golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
|
||||||
golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
|
||||||
golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
|
||||||
golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
|
||||||
golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
|
||||||
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
||||||
golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
|
||||||
golang.org/x/net v0.0.0-20190503192946-f4e77d36d62c/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
|
|
||||||
golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks=
|
|
||||||
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/net v0.0.0-20190628185345-da137c7871d7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20200222125558-5a598a2470a0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/net v0.0.0-20200301022130-244492dfa37a/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20200324143707-d3edc9973b7e/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
|
|
||||||
golang.org/x/net v0.0.0-20200501053045-e0ff5e5a1de5/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
|
|
||||||
golang.org/x/net v0.0.0-20200506145744-7e3656a0809f/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
|
|
||||||
golang.org/x/net v0.0.0-20200513185701-a91f0712d120/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
|
|
||||||
golang.org/x/net v0.0.0-20200520182314-0ba52f642ac2/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
|
|
||||||
golang.org/x/net v0.0.0-20200625001655-4c5254603344/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
|
|
||||||
golang.org/x/net v0.0.0-20200707034311-ab3426394381/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
|
|
||||||
golang.org/x/net v0.0.0-20200822124328-c89045814202/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
|
|
||||||
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
|
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
|
||||||
golang.org/x/net v0.0.0-20201031054903-ff519b6c9102/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
|
golang.org/x/net v0.39.0 h1:ZCu7HMWDxpXpaiKdhzIfaltL9Lp31x/3fCP11bc6/fY=
|
||||||
golang.org/x/net v0.0.0-20201209123823-ac852fbbde11/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
|
golang.org/x/net v0.39.0/go.mod h1:X7NRbYVEA+ewNkCNyJ513WmMdQ3BineSwVtN2zD/d+E=
|
||||||
golang.org/x/net v0.0.0-20201224014010-6772e930b67b/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
|
|
||||||
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
|
|
||||||
golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM=
|
|
||||||
golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
|
||||||
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
|
||||||
golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
|
|
||||||
golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
|
|
||||||
golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM=
|
|
||||||
golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20191202225959-858c2ad4c8b6/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20200902213428-5d25da1a8d43/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20201109201403-9fd604954f58/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20201208152858-08078c50e5b5/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20210218202405-ba52d332ba99/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
|
||||||
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
golang.org/x/sync v0.0.0-20200317015054-43a5402ce75a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|
||||||
golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
|
||||||
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200122134326-e047566fdf82/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200202164722-d101bd2416d5/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200302150141-5c8b2ff67527/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200331124033-c3d80250170d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200501052902-10377860bb8e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200511232937-7e40ca221e25/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200515095857-1151b9dac4a9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200523222454-059865788121/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200803210538-64077c9b5642/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200905004654-be1d3432aa8f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20201201145000-ef89a241ccb3/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20210104204734-6f8348627aad/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20210119212857-b64e53b001e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20210225134936-a50acf3fe073/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20210330210617-4fbd30eecc44/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20210423185535-09eb48e85fd7/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
|
||||||
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
|
||||||
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
|
||||||
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
|
||||||
golang.org/x/sys v0.0.0-20220908164124-27713097b956/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
|
||||||
golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
|
||||||
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.32.0 h1:s77OFDvIQeibCmezSnk/q6iAfkdiQaJi4VzroCFrN20=
|
||||||
golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.32.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
|
||||||
golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q=
|
|
||||||
golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
|
|
||||||
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
|
||||||
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
|
||||||
golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k=
|
|
||||||
golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo=
|
|
||||||
golang.org/x/term v0.13.0/go.mod h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U=
|
|
||||||
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
|
||||||
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
|
||||||
golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
|
|
||||||
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
golang.org/x/text v0.3.4/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.24.0 h1:dd5Bzh4yt5KYA8f9CJHCP4FB4D51c2c6JvN37xJJkJ0=
|
||||||
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.24.0/go.mod h1:L8rBsPeo2pSS+xqN0d5u2ikmjtmoJbDBT1b7nHvFCdU=
|
||||||
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
golang.org/x/time v0.9.0 h1:EsRrnYcQiGH+5FfbgvV4AP7qEZstoyrHB0DzarOQ4ZY=
|
||||||
golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
golang.org/x/time v0.9.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
|
||||||
golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
|
|
||||||
golang.org/x/text v0.13.0 h1:ablQoSUd0tRdKxZewP80B+BaqeKJuVhuRxj/dkrun3k=
|
|
||||||
golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
|
|
||||||
golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
|
||||||
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
|
||||||
golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
|
||||||
golang.org/x/time v0.3.0 h1:rg5rLMjNzMS1RkNLzCG38eapWhnYLFYXDXj2gOlr8j4=
|
|
||||||
golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
|
||||||
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
|
||||||
golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
|
|
||||||
golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
|
|
||||||
golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
|
|
||||||
golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
|
|
||||||
golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
|
|
||||||
golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
|
|
||||||
golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
|
|
||||||
golang.org/x/tools v0.0.0-20190606124116-d0a3d012864b/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
|
|
||||||
golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
|
|
||||||
golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
|
|
||||||
golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
|
||||||
golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
|
||||||
golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
|
||||||
golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
|
||||||
golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
|
||||||
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
||||||
golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
|
||||||
golang.org/x/tools v0.0.0-20191130070609-6e064ea0cf2d/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
|
||||||
golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200117161641-43d50277825c/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200122220014-bf1340f18c4a/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200130002326-2f3ba24bd6e7/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200204074204-1cc6d1ef6c74/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200207183749-b753a1ba74fa/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200224181240-023911ca70b2/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200227222343-706bc42d1f0d/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20200304193943-95d2e580d8eb/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
|
|
||||||
golang.org/x/tools v0.0.0-20200312045724-11d5b4c81c7d/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
|
|
||||||
golang.org/x/tools v0.0.0-20200331025713-a30bf2db82d4/go.mod h1:Sl4aGygMT6LrqrWclx+PTx3U+LnKx/seiNR+3G19Ar8=
|
|
||||||
golang.org/x/tools v0.0.0-20200501065659-ab2804fb9c9d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
|
||||||
golang.org/x/tools v0.0.0-20200512131952-2bc93b1c0c88/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
|
||||||
golang.org/x/tools v0.0.0-20200515010526-7d3b6ebf133d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
|
||||||
golang.org/x/tools v0.0.0-20200618134242-20370b0cb4b2/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
|
||||||
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
||||||
golang.org/x/tools v0.0.0-20200729194436-6467de6f59a7/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
|
||||||
golang.org/x/tools v0.0.0-20200804011535-6c149bb5ef0d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
|
||||||
golang.org/x/tools v0.0.0-20200825202427-b303f430e36d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
|
||||||
golang.org/x/tools v0.0.0-20200904185747-39188db58858/go.mod h1:Cj7w3i3Rnn0Xh82ur9kSqwfTHTeVxaDqrfMjpcNT6bE=
|
|
||||||
golang.org/x/tools v0.0.0-20201110124207-079ba7bd75cd/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
|
||||||
golang.org/x/tools v0.0.0-20201201161351-ac6f37ff4c2a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
|
||||||
golang.org/x/tools v0.0.0-20201208233053-a543418bbed2/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
|
||||||
golang.org/x/tools v0.0.0-20210105154028-b0ab187a4818/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
|
||||||
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
||||||
golang.org/x/tools v0.0.0-20210108195828-e2f9c7f1fc8e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
golang.org/x/tools v0.32.0 h1:Q7N1vhpkQv7ybVzLFtTjvQya2ewbwNDZzUgfXGqtMWU=
|
||||||
golang.org/x/tools v0.1.0/go.mod h1:xkSsbof2nBLbhDlRMhhhyNLN/zl3eTqcnHD5viDpcZ0=
|
golang.org/x/tools v0.32.0/go.mod h1:ZxrU41P/wAbZD8EDa6dDCa6XfpkhJ7HFMjHJXfBDu8s=
|
||||||
golang.org/x/tools v0.1.1/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
|
||||||
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
|
|
||||||
golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
|
|
||||||
golang.org/x/tools v0.14.0 h1:jvNa2pY0M4r62jkRQ6RwEZZyPcymeL9XZMLBbV7U2nc=
|
|
||||||
golang.org/x/tools v0.14.0/go.mod h1:uYBEerGOWcJyEORxN+Ek8+TT266gXkNlHdJBwexUsBg=
|
|
||||||
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE=
|
google.golang.org/protobuf v1.36.6 h1:z1NpPI8ku2WgiWnf+t9wTPsn6eP1L7ksHUlkfLvd9xY=
|
||||||
google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M=
|
google.golang.org/protobuf v1.36.6/go.mod h1:jduwjTPXsFjZGTmRluh+L6NjiWu7pchiJ2/5YcXBHnY=
|
||||||
google.golang.org/api v0.8.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
|
|
||||||
google.golang.org/api v0.9.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
|
|
||||||
google.golang.org/api v0.13.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
|
|
||||||
google.golang.org/api v0.14.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
|
|
||||||
google.golang.org/api v0.15.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
|
|
||||||
google.golang.org/api v0.17.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
|
|
||||||
google.golang.org/api v0.18.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
|
|
||||||
google.golang.org/api v0.19.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
|
|
||||||
google.golang.org/api v0.20.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
|
|
||||||
google.golang.org/api v0.22.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
|
|
||||||
google.golang.org/api v0.24.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE=
|
|
||||||
google.golang.org/api v0.28.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE=
|
|
||||||
google.golang.org/api v0.29.0/go.mod h1:Lcubydp8VUV7KeIHD9z2Bys/sm/vGKnG1UHuDBSrHWM=
|
|
||||||
google.golang.org/api v0.30.0/go.mod h1:QGmEvQ87FHZNiUVJkT14jQNYJ4ZJjdRF23ZXz5138Fc=
|
|
||||||
google.golang.org/api v0.35.0/go.mod h1:/XrVsuzM0rZmrsbjJutiuftIzeuTQcEeaYcSk/mQ1dg=
|
|
||||||
google.golang.org/api v0.36.0/go.mod h1:+z5ficQTmoYpPn8LCUNVpK5I7hwkpjbcgqA7I34qYtE=
|
|
||||||
google.golang.org/api v0.40.0/go.mod h1:fYKFpnQN0DsDSKRVRcQSDQNtqWPfM9i+zNPxepjRCQ8=
|
|
||||||
google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
|
|
||||||
google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
|
|
||||||
google.golang.org/appengine v1.5.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
|
|
||||||
google.golang.org/appengine v1.6.1/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0=
|
|
||||||
google.golang.org/appengine v1.6.5/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
|
|
||||||
google.golang.org/appengine v1.6.6/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
|
|
||||||
google.golang.org/appengine v1.6.7/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
|
|
||||||
google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
|
|
||||||
google.golang.org/genproto v0.0.0-20190307195333-5fe7a883aa19/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
|
|
||||||
google.golang.org/genproto v0.0.0-20190418145605-e7d98fc518a7/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
|
|
||||||
google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
|
|
||||||
google.golang.org/genproto v0.0.0-20190502173448-54afdca5d873/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
|
|
||||||
google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
|
|
||||||
google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
|
|
||||||
google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8=
|
|
||||||
google.golang.org/genproto v0.0.0-20191108220845-16a3f7862a1a/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
|
|
||||||
google.golang.org/genproto v0.0.0-20191115194625-c23dd37a84c9/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
|
|
||||||
google.golang.org/genproto v0.0.0-20191216164720-4f79533eabd1/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
|
|
||||||
google.golang.org/genproto v0.0.0-20191230161307-f3c370f40bfb/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
|
|
||||||
google.golang.org/genproto v0.0.0-20200115191322-ca5a22157cba/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
|
|
||||||
google.golang.org/genproto v0.0.0-20200122232147-0452cf42e150/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
|
|
||||||
google.golang.org/genproto v0.0.0-20200204135345-fa8e72b47b90/go.mod h1:GmwEX6Z4W5gMy59cAlVYjN9JhxgbQH6Gn+gFDQe2lzA=
|
|
||||||
google.golang.org/genproto v0.0.0-20200212174721-66ed5ce911ce/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
|
|
||||||
google.golang.org/genproto v0.0.0-20200224152610-e50cd9704f63/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
|
|
||||||
google.golang.org/genproto v0.0.0-20200228133532-8c2c7df3a383/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
|
|
||||||
google.golang.org/genproto v0.0.0-20200305110556-506484158171/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
|
|
||||||
google.golang.org/genproto v0.0.0-20200312145019-da6875a35672/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
|
|
||||||
google.golang.org/genproto v0.0.0-20200331122359-1ee6d9798940/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
|
|
||||||
google.golang.org/genproto v0.0.0-20200430143042-b979b6f78d84/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
|
|
||||||
google.golang.org/genproto v0.0.0-20200511104702-f5ebc3bea380/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
|
|
||||||
google.golang.org/genproto v0.0.0-20200515170657-fc4c6c6a6587/go.mod h1:YsZOwe1myG/8QRHRsmBRE1LrgQY60beZKjly0O1fX9U=
|
|
||||||
google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
|
|
||||||
google.golang.org/genproto v0.0.0-20200618031413-b414f8b61790/go.mod h1:jDfRM7FcilCzHH/e9qn6dsT145K34l5v+OpcnNgKAAA=
|
|
||||||
google.golang.org/genproto v0.0.0-20200729003335-053ba62fc06f/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20200804131852-c06518451d9c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20200825200019-8632dd797987/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20200904004341-0bd0a958aa1d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20201109203340-2640f1f9cdfb/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20201201144952-b05cb90ed32e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20201210142538-e3217bee35cc/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20201214200347-8c77b98c765d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20210108203827-ffc7fda8c3d7/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20210226172003-ab064af71705/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
|
|
||||||
google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
|
|
||||||
google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
|
|
||||||
google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
|
|
||||||
google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY=
|
|
||||||
google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
|
|
||||||
google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
|
|
||||||
google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
|
|
||||||
google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKal+60=
|
|
||||||
google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
|
|
||||||
google.golang.org/grpc v1.30.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
|
|
||||||
google.golang.org/grpc v1.31.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
|
|
||||||
google.golang.org/grpc v1.31.1/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
|
|
||||||
google.golang.org/grpc v1.33.2/go.mod h1:JMHMWHQWaTccqQQlmk3MJZS+GWXOdAesneDmEnv2fbc=
|
|
||||||
google.golang.org/grpc v1.34.0/go.mod h1:WotjhfgOW/POjDeRt8vscBtXq+2VjORFy659qA51WJ8=
|
|
||||||
google.golang.org/grpc v1.35.0/go.mod h1:qjiiYl8FncCW8feJPdyg3v6XW24KsRHe+dy9BAGRRjU=
|
|
||||||
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
|
|
||||||
google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
|
|
||||||
google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
|
|
||||||
google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
|
|
||||||
google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
|
|
||||||
google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
|
|
||||||
google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
|
|
||||||
google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
|
|
||||||
google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGjtUeSXeh4=
|
|
||||||
google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c=
|
|
||||||
google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
|
|
||||||
google.golang.org/protobuf v1.31.0 h1:g0LDEJHgrBl9N9r17Ru3sqWhkIx2NB67okBHPwC7hs8=
|
|
||||||
google.golang.org/protobuf v1.31.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
|
|
||||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
|
||||||
gopkg.in/check.v1 v1.0.0-20200902074654-038fdea0a05b h1:QRR6H1YWRnHb4Y/HeNFCTJLFVxaq6wH4YuVdsUOr75U=
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
|
||||||
gopkg.in/check.v1 v1.0.0-20200902074654-038fdea0a05b/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
|
||||||
gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI=
|
|
||||||
gopkg.in/inf.v0 v0.9.1 h1:73M5CoZyi3ZLMOyDlQh031Cx6N9NDJ2Vvfl76EDAgDc=
|
gopkg.in/inf.v0 v0.9.1 h1:73M5CoZyi3ZLMOyDlQh031Cx6N9NDJ2Vvfl76EDAgDc=
|
||||||
gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
|
gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
|
||||||
gopkg.in/ini.v1 v1.67.0 h1:Dgnx+6+nfE+IfzjUEISNeydPJh9AXNNsWbGP9KzCsOA=
|
|
||||||
gopkg.in/ini.v1 v1.67.0/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k=
|
|
||||||
gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
|
|
||||||
gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
|
|
||||||
gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=
|
|
||||||
gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
|
|
||||||
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
||||||
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
|
k8s.io/apimachinery v0.33.1 h1:mzqXWV8tW9Rw4VeW9rEkqvnxj59k1ezDUl20tFK/oM4=
|
||||||
honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
|
k8s.io/apimachinery v0.33.1/go.mod h1:BHW0YOu7n22fFv/JkYOEfkUYNRN0fj0BlvMFWA7b+SM=
|
||||||
honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
|
k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
|
||||||
honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
|
k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
|
||||||
honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
|
k8s.io/utils v0.0.0-20250502105355-0f33e8f1c979 h1:jgJW5IePPXLGB8e/1wvd0Ich9QE97RvvF3a8J3fP/Lg=
|
||||||
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
k8s.io/utils v0.0.0-20250502105355-0f33e8f1c979/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
|
||||||
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
|
||||||
k8s.io/apimachinery v0.28.4 h1:zOSJe1mc+GxuMnFzD4Z/U1wst50X28ZNsn5bhgIIao8=
|
|
||||||
k8s.io/apimachinery v0.28.4/go.mod h1:wI37ncBvfAoswfq626yPTe6Bz1c22L7uaJ8dho83mgg=
|
|
||||||
k8s.io/klog/v2 v2.100.1 h1:7WCHKK6K8fNhTqfBhISHQ97KrnJNFZMcQvKp7gP/tmg=
|
|
||||||
k8s.io/klog/v2 v2.100.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
|
|
||||||
k8s.io/utils v0.0.0-20230726121419-3b25d923346b h1:sgn3ZU783SCgtaSJjpcVVlRqd6GSnlTLKgpAAttJvpI=
|
|
||||||
k8s.io/utils v0.0.0-20230726121419-3b25d923346b/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
|
|
||||||
nullprogram.com/x/optparse v1.0.0/go.mod h1:KdyPE+Igbe0jQUrVfMqDMeJQIJZEuyV7pjYmp6pbG50=
|
nullprogram.com/x/optparse v1.0.0/go.mod h1:KdyPE+Igbe0jQUrVfMqDMeJQIJZEuyV7pjYmp6pbG50=
|
||||||
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
|
sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 h1:gBQPwqORJ8d8/YNZWEjoZs7npUVDpVXUUOFfW6CgAqE=
|
||||||
rsc.io/pdf v0.1.1/go.mod h1:n8OzWcQ6Sp37PL01nO98y4iUCRdTGarVfzxY20ICaU4=
|
sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8/go.mod h1:mdzfpAEoE6DHQEN0uh9ZbOCuHbLK5wOm7dK4ctXE9Tg=
|
||||||
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
|
sigs.k8s.io/randfill v0.0.0-20250304075658-069ef1bbf016/go.mod h1:XeLlZ/jmk4i1HRopwe7/aU3H5n1zNUcX6TM94b3QxOY=
|
||||||
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
|
sigs.k8s.io/randfill v1.0.0 h1:JfjMILfT8A6RbawdsK2JXGBR5AQVfd+9TbzrlneTyrU=
|
||||||
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
|
sigs.k8s.io/randfill v1.0.0/go.mod h1:XeLlZ/jmk4i1HRopwe7/aU3H5n1zNUcX6TM94b3QxOY=
|
||||||
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
|
sigs.k8s.io/structured-merge-diff/v4 v4.7.0 h1:qPeWmscJcXP0snki5IYF79Z8xrl8ETFxgMd7wez1XkI=
|
||||||
sigs.k8s.io/structured-merge-diff/v4 v4.3.0 h1:UZbZAZfX0wV2zr7YZorDz6GXROfDFj6LvqCRm4VUVKk=
|
sigs.k8s.io/structured-merge-diff/v4 v4.7.0/go.mod h1:dDy58f92j70zLsuZVuUX5Wp9vtxXpaZnkPGWeqDfCps=
|
||||||
sigs.k8s.io/structured-merge-diff/v4 v4.3.0/go.mod h1:N8hJocpFajUSSeSJ9bOZ77VzejKZaXsTtZo4/u7Io08=
|
sigs.k8s.io/yaml v1.4.0 h1:Mk1wCc2gy/F0THH0TAp1QYyJNzRm2KCLy3o5ASXVI5E=
|
||||||
sigs.k8s.io/yaml v1.3.0 h1:a2VclLzOGrwOHDiV8EfBGhvjHvP46CtW5j6POvhYGGo=
|
sigs.k8s.io/yaml v1.4.0/go.mod h1:Ejl7/uTz7PSA4eKMyQCUTnhZYNmLIl+5c2lQPGR2BPY=
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"log"
|
"log"
|
||||||
@@ -20,19 +21,33 @@ func main() {
|
|||||||
}
|
}
|
||||||
log.Printf("Patching schema version %s\n", version)
|
log.Printf("Patching schema version %s\n", version)
|
||||||
|
|
||||||
resp, err := http.Get(fmt.Sprintf("https://raw.githubusercontent.com/AdguardTeam/AdGuardHome/%s/openapi/openapi.yaml", version))
|
ctx := context.Background() // Or use context.WithTimeout
|
||||||
|
req, err := http.NewRequestWithContext(
|
||||||
|
ctx,
|
||||||
|
http.MethodGet,
|
||||||
|
fmt.Sprintf("https://raw.githubusercontent.com/AdguardTeam/AdGuardHome/%s/openapi/openapi.yaml", version),
|
||||||
|
http.NoBody,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
client := &http.Client{}
|
||||||
|
resp, err := client.Do(req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalln(err)
|
log.Fatalln(err)
|
||||||
}
|
}
|
||||||
defer func() { _ = resp.Body.Close() }()
|
defer func() { _ = resp.Body.Close() }()
|
||||||
data, err := io.ReadAll(resp.Body)
|
data, err := io.ReadAll(resp.Body)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalln(err)
|
log.Println(err)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
schema := make(map[string]interface{})
|
schema := make(map[string]any)
|
||||||
err = yaml.Unmarshal(data, &schema)
|
err = yaml.Unmarshal(data, &schema)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalln(err)
|
log.Println(err)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if requestBodies, ok, _ := unstructured.NestedMap(schema, "components", "requestBodies"); ok {
|
if requestBodies, ok, _ := unstructured.NestedMap(schema, "components", "requestBodies"); ok {
|
||||||
@@ -45,19 +60,51 @@ func main() {
|
|||||||
"paths", "/dns_info", "get", "responses", "200", "content", "application/json", "schema"); ok {
|
"paths", "/dns_info", "get", "responses", "200", "content", "application/json", "schema"); ok {
|
||||||
if allOf, ok, _ := unstructured.NestedSlice(dnsInfo, "allOf"); ok && len(allOf) == 2 {
|
if allOf, ok, _ := unstructured.NestedSlice(dnsInfo, "allOf"); ok && len(allOf) == 2 {
|
||||||
delete(dnsInfo, "allOf")
|
delete(dnsInfo, "allOf")
|
||||||
if err := unstructured.SetNestedMap(schema, allOf[0].(map[string]interface{}),
|
//nolint:forcetypeassert
|
||||||
|
if err := unstructured.SetNestedMap(schema, allOf[0].(map[string]any),
|
||||||
"paths", "/dns_info", "get", "responses", "200", "content", "application/json", "schema"); err != nil {
|
"paths", "/dns_info", "get", "responses", "200", "content", "application/json", "schema"); err != nil {
|
||||||
log.Fatalln(err)
|
log.Println(err)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
correctEntries(schema)
|
||||||
|
|
||||||
|
addFakeTags(schema)
|
||||||
|
|
||||||
b, err := yaml.Marshal(&schema)
|
b, err := yaml.Marshal(&schema)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalln(err)
|
log.Println(err)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
log.Printf("Writing schema file tmp/%s", fileName)
|
log.Printf("Writing schema file tmp/%s", fileName)
|
||||||
err = os.WriteFile("tmp/"+fileName, b, 0o600)
|
err = os.WriteFile("tmp/"+fileName, b, 0o600)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
log.Println(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func correctEntries(schema map[string]any) {
|
||||||
|
// https://github.com/AdguardTeam/AdGuardHome/pull/7678
|
||||||
|
if err := unstructured.SetNestedField(schema, "string", "components", "schemas", "QueryLogItem", "properties", "client_proto", "type"); err != nil {
|
||||||
|
log.Fatalln(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func addFakeTags(schema map[string]any) {
|
||||||
|
fake := map[string]any{"faker": `slice_len=24`}
|
||||||
|
if err := unstructured.SetNestedMap(schema, fake, "components", "schemas", "Stats", "properties", "blocked_filtering", "x-oapi-codegen-extra-tags"); err != nil {
|
||||||
|
log.Fatalln(err)
|
||||||
|
}
|
||||||
|
if err := unstructured.SetNestedMap(schema, fake, "components", "schemas", "Stats", "properties", "dns_queries", "x-oapi-codegen-extra-tags"); err != nil {
|
||||||
|
log.Fatalln(err)
|
||||||
|
}
|
||||||
|
if err := unstructured.SetNestedMap(schema, fake, "components", "schemas", "Stats", "properties", "replaced_parental", "x-oapi-codegen-extra-tags"); err != nil {
|
||||||
|
log.Fatalln(err)
|
||||||
|
}
|
||||||
|
if err := unstructured.SetNestedMap(schema, fake, "components", "schemas", "Stats", "properties", "replaced_safebrowsing", "x-oapi-codegen-extra-tags"); err != nil {
|
||||||
log.Fatalln(err)
|
log.Fatalln(err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -5,6 +5,7 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"github.com/go-resty/resty/v2"
|
"github.com/go-resty/resty/v2"
|
||||||
|
"go.uber.org/zap"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (cl *client) doGet(req *resty.Request, url string) error {
|
func (cl *client) doGet(req *resty.Request, url string) error {
|
||||||
@@ -16,15 +17,23 @@ func (cl *client) doGet(req *resty.Request, url string) error {
|
|||||||
rl.Debug("do get")
|
rl.Debug("do get")
|
||||||
resp, err := req.Get(url)
|
resp, err := req.Get(url)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if resp != nil && resp.StatusCode() == http.StatusFound {
|
l := rl
|
||||||
loc := resp.Header().Get("Location")
|
if resp != nil {
|
||||||
if loc == "/install.html" || loc == "/control/install.html" {
|
if resp.StatusCode() == http.StatusFound {
|
||||||
return ErrSetupNeeded
|
loc := resp.Header().Get("Location")
|
||||||
|
if loc == "/install.html" || loc == "/control/install.html" {
|
||||||
|
return ErrSetupNeeded
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
l = l.With("status", resp.StatusCode(), "body", string(resp.Body()), "error", err)
|
||||||
}
|
}
|
||||||
rl.With("status", resp.StatusCode(), "body", string(resp.Body()), "error", err).Debug("error in do get")
|
|
||||||
|
l.Debug("error in do get")
|
||||||
return detailedError(resp, err)
|
return detailedError(resp, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
checkAuthenticationIssue(resp, rl)
|
||||||
|
|
||||||
rl.With(
|
rl.With(
|
||||||
"status", resp.StatusCode(),
|
"status", resp.StatusCode(),
|
||||||
"body", string(resp.Body()),
|
"body", string(resp.Body()),
|
||||||
@@ -48,6 +57,9 @@ func (cl *client) doPost(req *resty.Request, url string) error {
|
|||||||
rl.With("status", resp.StatusCode(), "body", string(resp.Body()), "error", err).Debug("error in do post")
|
rl.With("status", resp.StatusCode(), "body", string(resp.Body()), "error", err).Debug("error in do post")
|
||||||
return detailedError(resp, err)
|
return detailedError(resp, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
checkAuthenticationIssue(resp, rl)
|
||||||
|
|
||||||
rl.With(
|
rl.With(
|
||||||
"status", resp.StatusCode(),
|
"status", resp.StatusCode(),
|
||||||
"body", string(resp.Body()),
|
"body", string(resp.Body()),
|
||||||
@@ -71,6 +83,9 @@ func (cl *client) doPut(req *resty.Request, url string) error {
|
|||||||
rl.With("status", resp.StatusCode(), "body", string(resp.Body()), "error", err).Debug("error in do put")
|
rl.With("status", resp.StatusCode(), "body", string(resp.Body()), "error", err).Debug("error in do put")
|
||||||
return detailedError(resp, err)
|
return detailedError(resp, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
checkAuthenticationIssue(resp, rl)
|
||||||
|
|
||||||
rl.With(
|
rl.With(
|
||||||
"status", resp.StatusCode(),
|
"status", resp.StatusCode(),
|
||||||
"body", string(resp.Body()),
|
"body", string(resp.Body()),
|
||||||
@@ -81,3 +96,10 @@ func (cl *client) doPut(req *resty.Request, url string) error {
|
|||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func checkAuthenticationIssue(resp *resty.Response, rl *zap.SugaredLogger) {
|
||||||
|
if resp != nil && (resp.StatusCode() == http.StatusUnauthorized || resp.StatusCode() == http.StatusForbidden) {
|
||||||
|
rl.With("status", resp.StatusCode()).Error("there seems to be an authentication issue - " +
|
||||||
|
"please check https://github.com/bakito/adguardhome-sync/wiki/FAQ")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|||||||
@@ -11,19 +11,20 @@ import (
|
|||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/go-resty/resty/v2"
|
||||||
|
"go.uber.org/zap"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/log"
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/types"
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/utils"
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
"github.com/go-resty/resty/v2"
|
|
||||||
"go.uber.org/zap"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const envRedirectPolicyNoOfRedirects = "REDIRECT_POLICY_NO_OF_REDIRECTS"
|
const envRedirectPolicyNoOfRedirects = "REDIRECT_POLICY_NO_OF_REDIRECTS"
|
||||||
|
|
||||||
var (
|
var (
|
||||||
l = log.GetLogger("client")
|
l = log.GetLogger("client")
|
||||||
// ErrSetupNeeded custom error
|
// ErrSetupNeeded custom error.
|
||||||
ErrSetupNeeded = errors.New("setup needed")
|
ErrSetupNeeded = errors.New("setup needed")
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -33,16 +34,16 @@ func detailedError(resp *resty.Response, err error) error {
|
|||||||
e += fmt.Sprintf("(%s)", string(resp.Body()))
|
e += fmt.Sprintf("(%s)", string(resp.Body()))
|
||||||
}
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
e += fmt.Sprintf(": %s", err.Error())
|
e += ": " + err.Error()
|
||||||
}
|
}
|
||||||
return errors.New(e)
|
return errors.New(e)
|
||||||
}
|
}
|
||||||
|
|
||||||
// New create a new client
|
// New create a new client.
|
||||||
func New(config types.AdGuardInstance) (Client, error) {
|
func New(config types.AdGuardInstance) (Client, error) {
|
||||||
var apiURL string
|
var apiURL string
|
||||||
if config.APIPath == "" {
|
if config.APIPath == "" {
|
||||||
apiURL = fmt.Sprintf("%s/control", config.URL)
|
apiURL = config.URL + "/control"
|
||||||
} else {
|
} else {
|
||||||
apiURL = fmt.Sprintf("%s/%s", config.URL, config.APIPath)
|
apiURL = fmt.Sprintf("%s/%s", config.URL, config.APIPath)
|
||||||
}
|
}
|
||||||
@@ -51,12 +52,10 @@ func New(config types.AdGuardInstance) (Client, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
u.Path = path.Clean(u.Path)
|
u.Path = path.Clean(u.Path)
|
||||||
cl := resty.New().SetBaseURL(u.String()).SetDisableWarn(true)
|
cl := resty.New().SetBaseURL(u.String()).SetDisableWarn(true).SetHeaders(config.RequestHeaders)
|
||||||
|
|
||||||
if config.InsecureSkipVerify {
|
// #nosec G402 has to be explicitly enabled
|
||||||
// #nosec G402 has to be explicitly enabled
|
cl.SetTLSClientConfig(&tls.Config{InsecureSkipVerify: config.InsecureSkipVerify})
|
||||||
cl.SetTLSClientConfig(&tls.Config{InsecureSkipVerify: true})
|
|
||||||
}
|
|
||||||
|
|
||||||
cookieParts := strings.Split(config.Cookie, "=")
|
cookieParts := strings.Split(config.Cookie, "=")
|
||||||
if len(cookieParts) == 2 {
|
if len(cookieParts) == 2 {
|
||||||
@@ -80,25 +79,29 @@ func New(config types.AdGuardInstance) (Client, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
return &client{
|
return &client{
|
||||||
host: u.Host,
|
host: config.Host,
|
||||||
client: cl,
|
client: cl,
|
||||||
log: l.With("host", u.Host),
|
log: l.With("host", config.Host),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Client AdguardHome API client interface
|
// Client AdguardHome API client interface.
|
||||||
|
//
|
||||||
|
//nolint:interfacebloat
|
||||||
type Client interface {
|
type Client interface {
|
||||||
Host() string
|
Host() string
|
||||||
Status() (*model.ServerStatus, error)
|
Status() (*model.ServerStatus, error)
|
||||||
|
Stats() (*model.Stats, error)
|
||||||
|
QueryLog(limit int) (*model.QueryLog, error)
|
||||||
ToggleProtection(enable bool) error
|
ToggleProtection(enable bool) error
|
||||||
RewriteList() (*model.RewriteEntries, error)
|
RewriteList() (*model.RewriteEntries, error)
|
||||||
AddRewriteEntries(e ...model.RewriteEntry) error
|
AddRewriteEntries(e ...model.RewriteEntry) error
|
||||||
DeleteRewriteEntries(e ...model.RewriteEntry) error
|
DeleteRewriteEntries(e ...model.RewriteEntry) error
|
||||||
Filtering() (*model.FilterStatus, error)
|
Filtering() (*model.FilterStatus, error)
|
||||||
ToggleFiltering(enabled bool, interval int) error
|
ToggleFiltering(enabled bool, interval int) error
|
||||||
AddFilters(whitelist bool, e ...model.Filter) error
|
AddFilter(whitelist bool, f model.Filter) error
|
||||||
DeleteFilters(whitelist bool, e ...model.Filter) error
|
DeleteFilter(whitelist bool, f model.Filter) error
|
||||||
UpdateFilters(whitelist bool, e ...model.Filter) error
|
UpdateFilter(whitelist bool, f model.Filter) error
|
||||||
RefreshFilters(whitelist bool) error
|
RefreshFilters(whitelist bool) error
|
||||||
SetCustomRules(rules *[]string) error
|
SetCustomRules(rules *[]string) error
|
||||||
SafeBrowsing() (bool, error)
|
SafeBrowsing() (bool, error)
|
||||||
@@ -109,27 +112,25 @@ type Client interface {
|
|||||||
SetSafeSearchConfig(settings *model.SafeSearchConfig) error
|
SetSafeSearchConfig(settings *model.SafeSearchConfig) error
|
||||||
ProfileInfo() (*model.ProfileInfo, error)
|
ProfileInfo() (*model.ProfileInfo, error)
|
||||||
SetProfileInfo(settings *model.ProfileInfo) error
|
SetProfileInfo(settings *model.ProfileInfo) error
|
||||||
BlockedServices() (*model.BlockedServicesArray, error)
|
|
||||||
BlockedServicesSchedule() (*model.BlockedServicesSchedule, error)
|
BlockedServicesSchedule() (*model.BlockedServicesSchedule, error)
|
||||||
SetBlockedServices(services *model.BlockedServicesArray) error
|
|
||||||
SetBlockedServicesSchedule(schedule *model.BlockedServicesSchedule) error
|
SetBlockedServicesSchedule(schedule *model.BlockedServicesSchedule) error
|
||||||
Clients() (*model.Clients, error)
|
Clients() (*model.Clients, error)
|
||||||
AddClients(client ...*model.Client) error
|
AddClient(client *model.Client) error
|
||||||
UpdateClients(client ...*model.Client) error
|
UpdateClient(client *model.Client) error
|
||||||
DeleteClients(client ...*model.Client) error
|
DeleteClient(client *model.Client) error
|
||||||
QueryLogConfig() (*model.QueryLogConfig, error)
|
QueryLogConfig() (*model.QueryLogConfigWithIgnored, error)
|
||||||
SetQueryLogConfig(*model.QueryLogConfig) error
|
SetQueryLogConfig(ql *model.QueryLogConfigWithIgnored) error
|
||||||
StatsConfig() (*model.StatsConfig, error)
|
StatsConfig() (*model.GetStatsConfigResponse, error)
|
||||||
SetStatsConfig(sc *model.StatsConfig) error
|
SetStatsConfig(sc *model.PutStatsConfigUpdateRequest) error
|
||||||
Setup() error
|
Setup() error
|
||||||
AccessList() (*model.AccessList, error)
|
AccessList() (*model.AccessList, error)
|
||||||
SetAccessList(*model.AccessList) error
|
SetAccessList(accessList *model.AccessList) error
|
||||||
DNSConfig() (*model.DNSConfig, error)
|
DNSConfig() (*model.DNSConfig, error)
|
||||||
SetDNSConfig(*model.DNSConfig) error
|
SetDNSConfig(config *model.DNSConfig) error
|
||||||
DhcpConfig() (*model.DhcpStatus, error)
|
DhcpConfig() (*model.DhcpStatus, error)
|
||||||
SetDhcpConfig(*model.DhcpStatus) error
|
SetDhcpConfig(status *model.DhcpStatus) error
|
||||||
AddDHCPStaticLeases(leases ...model.DhcpStaticLease) error
|
AddDHCPStaticLease(lease model.DhcpStaticLease) error
|
||||||
DeleteDHCPStaticLeases(leases ...model.DhcpStaticLease) error
|
DeleteDHCPStaticLease(lease model.DhcpStaticLease) error
|
||||||
}
|
}
|
||||||
|
|
||||||
type client struct {
|
type client struct {
|
||||||
@@ -160,6 +161,21 @@ func (cl *client) Status() (*model.ServerStatus, error) {
|
|||||||
return status, err
|
return status, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (cl *client) Stats() (*model.Stats, error) {
|
||||||
|
stats := &model.Stats{}
|
||||||
|
err := cl.doGet(cl.client.R().EnableTrace().SetResult(stats), "stats")
|
||||||
|
return stats, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cl *client) QueryLog(limit int) (*model.QueryLog, error) {
|
||||||
|
ql := &model.QueryLog{}
|
||||||
|
err := cl.doGet(
|
||||||
|
cl.client.R().EnableTrace().SetResult(ql),
|
||||||
|
fmt.Sprintf(`querylog?limit=%d&response_status="all"`, limit),
|
||||||
|
)
|
||||||
|
return ql, err
|
||||||
|
}
|
||||||
|
|
||||||
func (cl *client) RewriteList() (*model.RewriteEntries, error) {
|
func (cl *client) RewriteList() (*model.RewriteEntries, error) {
|
||||||
rewrites := &model.RewriteEntries{}
|
rewrites := &model.RewriteEntries{}
|
||||||
err := cl.doGet(cl.client.R().EnableTrace().SetResult(&rewrites), "/rewrite/list")
|
err := cl.doGet(cl.client.R().EnableTrace().SetResult(&rewrites), "/rewrite/list")
|
||||||
@@ -167,9 +183,8 @@ func (cl *client) RewriteList() (*model.RewriteEntries, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) AddRewriteEntries(entries ...model.RewriteEntry) error {
|
func (cl *client) AddRewriteEntries(entries ...model.RewriteEntry) error {
|
||||||
for i := range entries {
|
for _, e := range entries {
|
||||||
e := entries[i]
|
cl.log.With("domain", e.Domain, "answer", e.Answer).Info("Add DNS rewrite entry")
|
||||||
cl.log.With("domain", e.Domain, "answer", e.Answer).Info("Add rewrite entry")
|
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(&e), "/rewrite/add")
|
err := cl.doPost(cl.client.R().EnableTrace().SetBody(&e), "/rewrite/add")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@@ -179,9 +194,8 @@ func (cl *client) AddRewriteEntries(entries ...model.RewriteEntry) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) DeleteRewriteEntries(entries ...model.RewriteEntry) error {
|
func (cl *client) DeleteRewriteEntries(entries ...model.RewriteEntry) error {
|
||||||
for i := range entries {
|
for _, e := range entries {
|
||||||
e := entries[i]
|
cl.log.With("domain", e.Domain, "answer", e.Answer).Info("Delete DNS rewrite entry")
|
||||||
cl.log.With("domain", e.Domain, "answer", e.Answer).Info("Delete rewrite entry")
|
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(&e), "/rewrite/delete")
|
err := cl.doPost(cl.client.R().EnableTrace().SetBody(&e), "/rewrite/delete")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@@ -213,7 +227,7 @@ func (cl *client) toggleStatus(mode string) (bool, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) toggleBool(mode string, enable bool) error {
|
func (cl *client) toggleBool(mode string, enable bool) error {
|
||||||
cl.log.With("enable", enable).Info(fmt.Sprintf("Toggle %s", mode))
|
cl.log.With("enable", enable).Info("Toggle " + mode)
|
||||||
var target string
|
var target string
|
||||||
if enable {
|
if enable {
|
||||||
target = "enable"
|
target = "enable"
|
||||||
@@ -229,48 +243,33 @@ func (cl *client) Filtering() (*model.FilterStatus, error) {
|
|||||||
return f, err
|
return f, err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) AddFilters(whitelist bool, filters ...model.Filter) error {
|
func (cl *client) AddFilter(whitelist bool, f model.Filter) error {
|
||||||
for _, f := range filters {
|
cl.log.With("url", f.Url, "whitelist", whitelist, "enabled", f.Enabled).Info("Add filter")
|
||||||
cl.log.With("url", f.Url, "whitelist", whitelist, "enabled", f.Enabled).Info("Add filter")
|
ff := &model.AddUrlRequest{Name: utils.Ptr(f.Name), Url: utils.Ptr(f.Url), Whitelist: utils.Ptr(whitelist)}
|
||||||
ff := &model.AddUrlRequest{Name: utils.Ptr(f.Name), Url: utils.Ptr(f.Url), Whitelist: utils.Ptr(whitelist)}
|
return cl.doPost(cl.client.R().EnableTrace().SetBody(ff), "/filtering/add_url")
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(ff), "/filtering/add_url")
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) DeleteFilters(whitelist bool, filters ...model.Filter) error {
|
func (cl *client) DeleteFilter(whitelist bool, f model.Filter) error {
|
||||||
for _, f := range filters {
|
cl.log.With("url", f.Url, "whitelist", whitelist, "enabled", f.Enabled).Info("Delete filter")
|
||||||
cl.log.With("url", f.Url, "whitelist", whitelist, "enabled", f.Enabled).Info("Delete filter")
|
ff := &model.RemoveUrlRequest{Url: utils.Ptr(f.Url), Whitelist: utils.Ptr(whitelist)}
|
||||||
ff := &model.RemoveUrlRequest{Url: utils.Ptr(f.Url), Whitelist: utils.Ptr(whitelist)}
|
return cl.doPost(cl.client.R().EnableTrace().SetBody(ff), "/filtering/remove_url")
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(ff), "/filtering/remove_url")
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) UpdateFilters(whitelist bool, filters ...model.Filter) error {
|
func (cl *client) UpdateFilter(whitelist bool, f model.Filter) error {
|
||||||
for _, f := range filters {
|
cl.log.With("url", f.Url, "whitelist", whitelist, "enabled", f.Enabled).Info("Update filter")
|
||||||
cl.log.With("url", f.Url, "whitelist", whitelist, "enabled", f.Enabled).Info("Update filter")
|
fu := &model.FilterSetUrl{
|
||||||
fu := &model.FilterSetUrl{
|
Whitelist: utils.Ptr(whitelist), Url: utils.Ptr(f.Url),
|
||||||
Whitelist: utils.Ptr(whitelist), Url: utils.Ptr(f.Url),
|
Data: &model.FilterSetUrlData{Name: f.Name, Url: f.Url, Enabled: f.Enabled},
|
||||||
Data: &model.FilterSetUrlData{Name: f.Name, Url: f.Url, Enabled: f.Enabled},
|
|
||||||
}
|
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(fu), "/filtering/set_url")
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return nil
|
return cl.doPost(cl.client.R().EnableTrace().SetBody(fu), "/filtering/set_url")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) RefreshFilters(whitelist bool) error {
|
func (cl *client) RefreshFilters(whitelist bool) error {
|
||||||
cl.log.With("whitelist", whitelist).Info("Refresh filter")
|
cl.log.With("whitelist", whitelist).Info("Refresh filter")
|
||||||
return cl.doPost(cl.client.R().EnableTrace().SetBody(&model.FilterRefreshRequest{Whitelist: utils.Ptr(whitelist)}), "/filtering/refresh")
|
return cl.doPost(
|
||||||
|
cl.client.R().EnableTrace().SetBody(&model.FilterRefreshRequest{Whitelist: utils.Ptr(whitelist)}),
|
||||||
|
"/filtering/refresh",
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) ToggleProtection(enable bool) error {
|
func (cl *client) ToggleProtection(enable bool) error {
|
||||||
@@ -279,7 +278,11 @@ func (cl *client) ToggleProtection(enable bool) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) SetCustomRules(rules *[]string) error {
|
func (cl *client) SetCustomRules(rules *[]string) error {
|
||||||
cl.log.With("rules", len(*rules)).Info("Set user rules")
|
var l int
|
||||||
|
if rules != nil {
|
||||||
|
l = len(*rules)
|
||||||
|
}
|
||||||
|
cl.log.With("rules", l).Info("Set user rules")
|
||||||
return cl.doPost(cl.client.R().EnableTrace().SetBody(&model.SetRulesRequest{Rules: rules}), "/filtering/set_rules")
|
return cl.doPost(cl.client.R().EnableTrace().SetBody(&model.SetRulesRequest{Rules: rules}), "/filtering/set_rules")
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -291,17 +294,6 @@ func (cl *client) ToggleFiltering(enabled bool, interval int) error {
|
|||||||
}), "/filtering/config")
|
}), "/filtering/config")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) BlockedServices() (*model.BlockedServicesArray, error) {
|
|
||||||
svcs := &model.BlockedServicesArray{}
|
|
||||||
err := cl.doGet(cl.client.R().EnableTrace().SetResult(svcs), "/blocked_services/list")
|
|
||||||
return svcs, err
|
|
||||||
}
|
|
||||||
|
|
||||||
func (cl *client) SetBlockedServices(services *model.BlockedServicesArray) error {
|
|
||||||
cl.log.With("services", model.ArrayString(services)).Info("Set blocked services")
|
|
||||||
return cl.doPost(cl.client.R().EnableTrace().SetBody(services), "/blocked_services/set")
|
|
||||||
}
|
|
||||||
|
|
||||||
func (cl *client) BlockedServicesSchedule() (*model.BlockedServicesSchedule, error) {
|
func (cl *client) BlockedServicesSchedule() (*model.BlockedServicesSchedule, error) {
|
||||||
sched := &model.BlockedServicesSchedule{}
|
sched := &model.BlockedServicesSchedule{}
|
||||||
err := cl.doGet(cl.client.R().EnableTrace().SetResult(sched), "/blocked_services/get")
|
err := cl.doGet(cl.client.R().EnableTrace().SetResult(sched), "/blocked_services/get")
|
||||||
@@ -319,61 +311,45 @@ func (cl *client) Clients() (*model.Clients, error) {
|
|||||||
return clients, err
|
return clients, err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) AddClients(clients ...*model.Client) error {
|
func (cl *client) AddClient(client *model.Client) error {
|
||||||
for i := range clients {
|
cl.log.With("name", *client.Name).Info("Add client settings")
|
||||||
client := clients[i]
|
return cl.doPost(cl.client.R().EnableTrace().SetBody(client), "/clients/add")
|
||||||
cl.log.With("name", *client.Name).Info("Add client")
|
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(client), "/clients/add")
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) UpdateClients(clients ...*model.Client) error {
|
func (cl *client) UpdateClient(client *model.Client) error {
|
||||||
for _, client := range clients {
|
cl.log.With("name", *client.Name).Info("Update client settings")
|
||||||
cl.log.With("name", *client.Name).Info("Update client")
|
return cl.doPost(
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(&model.ClientUpdate{Name: client.Name, Data: client}), "/clients/update")
|
cl.client.R().EnableTrace().SetBody(&model.ClientUpdate{Name: client.Name, Data: client}),
|
||||||
if err != nil {
|
"/clients/update",
|
||||||
return err
|
)
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) DeleteClients(clients ...*model.Client) error {
|
func (cl *client) DeleteClient(client *model.Client) error {
|
||||||
for i := range clients {
|
cl.log.With("name", *client.Name).Info("Delete client settings")
|
||||||
client := clients[i]
|
return cl.doPost(cl.client.R().EnableTrace().SetBody(client), "/clients/delete")
|
||||||
cl.log.With("name", *client.Name).Info("Delete client")
|
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(client), "/clients/delete")
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) QueryLogConfig() (*model.QueryLogConfig, error) {
|
func (cl *client) QueryLogConfig() (*model.QueryLogConfigWithIgnored, error) {
|
||||||
qlc := &model.QueryLogConfig{}
|
qlc := &model.QueryLogConfigWithIgnored{}
|
||||||
err := cl.doGet(cl.client.R().EnableTrace().SetResult(qlc), "/querylog_info")
|
err := cl.doGet(cl.client.R().EnableTrace().SetResult(qlc), "/querylog/config")
|
||||||
return qlc, err
|
return qlc, err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) SetQueryLogConfig(qlc *model.QueryLogConfig) error {
|
func (cl *client) SetQueryLogConfig(qlc *model.QueryLogConfigWithIgnored) error {
|
||||||
cl.log.With("enabled", *qlc.Enabled, "interval", *qlc.Interval, "anonymizeClientIP", *qlc.AnonymizeClientIp).Info("Set query log config")
|
cl.log.With("enabled", *qlc.Enabled, "interval", *qlc.Interval, "anonymizeClientIP", *qlc.AnonymizeClientIp).
|
||||||
return cl.doPost(cl.client.R().EnableTrace().SetBody(qlc), "/querylog_config")
|
Info("Set query log config")
|
||||||
|
return cl.doPut(cl.client.R().EnableTrace().SetBody(qlc), "/querylog/config/update")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) StatsConfig() (*model.StatsConfig, error) {
|
func (cl *client) StatsConfig() (*model.GetStatsConfigResponse, error) {
|
||||||
stats := &model.StatsConfig{}
|
stats := &model.GetStatsConfigResponse{}
|
||||||
err := cl.doGet(cl.client.R().EnableTrace().SetResult(stats), "/stats_info")
|
err := cl.doGet(cl.client.R().EnableTrace().SetResult(stats), "/stats/config")
|
||||||
return stats, err
|
return stats, err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) SetStatsConfig(sc *model.StatsConfig) error {
|
func (cl *client) SetStatsConfig(sc *model.PutStatsConfigUpdateRequest) error {
|
||||||
cl.log.With("interval", *sc.Interval).Info("Set stats config")
|
cl.log.With("interval", sc.Interval).Info("Set stats config")
|
||||||
return cl.doPost(cl.client.R().EnableTrace().SetBody(sc), "/stats_config")
|
return cl.doPut(cl.client.R().EnableTrace().SetBody(sc), "/stats/config/update")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) Setup() error {
|
func (cl *client) Setup() error {
|
||||||
@@ -435,24 +411,20 @@ func (cl *client) SetDhcpConfig(config *model.DhcpStatus) error {
|
|||||||
return cl.doPost(cl.client.R().EnableTrace().SetBody(config), "/dhcp/set_config")
|
return cl.doPost(cl.client.R().EnableTrace().SetBody(config), "/dhcp/set_config")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) AddDHCPStaticLeases(leases ...model.DhcpStaticLease) error {
|
func (cl *client) AddDHCPStaticLease(l model.DhcpStaticLease) error {
|
||||||
for _, l := range leases {
|
cl.log.With("mac", l.Mac, "ip", l.Ip, "hostname", l.Hostname).Info("Add static dhcp lease")
|
||||||
cl.log.With("mac", l.Mac, "ip", l.Ip, "hostname", l.Hostname).Info("Add static dhcp lease")
|
err := cl.doPost(cl.client.R().EnableTrace().SetBody(l), "/dhcp/add_static_lease")
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(l), "/dhcp/add_static_lease")
|
if err != nil {
|
||||||
if err != nil {
|
return err
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cl *client) DeleteDHCPStaticLeases(leases ...model.DhcpStaticLease) error {
|
func (cl *client) DeleteDHCPStaticLease(l model.DhcpStaticLease) error {
|
||||||
for _, l := range leases {
|
cl.log.With("mac", l.Mac, "ip", l.Ip, "hostname", l.Hostname).Info("Delete static dhcp lease")
|
||||||
cl.log.With("mac", l.Mac, "ip", l.Ip, "hostname", l.Hostname).Info("Delete static dhcp lease")
|
err := cl.doPost(cl.client.R().EnableTrace().SetBody(l), "/dhcp/remove_static_lease")
|
||||||
err := cl.doPost(cl.client.R().EnableTrace().SetBody(l), "/dhcp/remove_static_lease")
|
if err != nil {
|
||||||
if err != nil {
|
return err
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,13 +8,14 @@ import (
|
|||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client"
|
"github.com/bakito/adguardhome-sync/pkg/client"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/types"
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/utils"
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
"github.com/google/uuid"
|
|
||||||
. "github.com/onsi/ginkgo/v2"
|
|
||||||
. "github.com/onsi/gomega"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@@ -35,7 +36,10 @@ var _ = Describe("Client", func() {
|
|||||||
|
|
||||||
Context("Host", func() {
|
Context("Host", func() {
|
||||||
It("should read the current host", func() {
|
It("should read the current host", func() {
|
||||||
cl, _ := client.New(types.AdGuardInstance{URL: "https://foo.bar:3000"})
|
inst := types.AdGuardInstance{URL: "https://foo.bar:3000"}
|
||||||
|
err := inst.Init()
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
cl, _ := client.New(inst)
|
||||||
host := cl.Host()
|
host := cl.Host()
|
||||||
Ω(host).Should(Equal("foo.bar:3000"))
|
Ω(host).Should(Equal("foo.bar:3000"))
|
||||||
})
|
})
|
||||||
@@ -69,7 +73,9 @@ var _ = Describe("Client", func() {
|
|||||||
`{"name":"","url":"foo","whitelist":true}`,
|
`{"name":"","url":"foo","whitelist":true}`,
|
||||||
`{"name":"","url":"bar","whitelist":true}`,
|
`{"name":"","url":"bar","whitelist":true}`,
|
||||||
)
|
)
|
||||||
err := cl.AddFilters(true, model.Filter{Url: "foo"}, model.Filter{Url: "bar"})
|
err := cl.AddFilter(true, model.Filter{Url: "foo"})
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
err = cl.AddFilter(true, model.Filter{Url: "bar"})
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should update Filters", func() {
|
It("should update Filters", func() {
|
||||||
@@ -77,7 +83,9 @@ var _ = Describe("Client", func() {
|
|||||||
`{"data":{"enabled":false,"name":"","url":"foo"},"url":"foo","whitelist":true}`,
|
`{"data":{"enabled":false,"name":"","url":"foo"},"url":"foo","whitelist":true}`,
|
||||||
`{"data":{"enabled":false,"name":"","url":"bar"},"url":"bar","whitelist":true}`,
|
`{"data":{"enabled":false,"name":"","url":"bar"},"url":"bar","whitelist":true}`,
|
||||||
)
|
)
|
||||||
err := cl.UpdateFilters(true, model.Filter{Url: "foo"}, model.Filter{Url: "bar"})
|
err := cl.UpdateFilter(true, model.Filter{Url: "foo"})
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
err = cl.UpdateFilter(true, model.Filter{Url: "bar"})
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should delete Filters", func() {
|
It("should delete Filters", func() {
|
||||||
@@ -85,7 +93,23 @@ var _ = Describe("Client", func() {
|
|||||||
`{"url":"foo","whitelist":true}`,
|
`{"url":"foo","whitelist":true}`,
|
||||||
`{"url":"bar","whitelist":true}`,
|
`{"url":"bar","whitelist":true}`,
|
||||||
)
|
)
|
||||||
err := cl.DeleteFilters(true, model.Filter{Url: "foo"}, model.Filter{Url: "bar"})
|
err := cl.DeleteFilter(true, model.Filter{Url: "foo"})
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
err = cl.DeleteFilter(true, model.Filter{Url: "bar"})
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should set empty filter rules", func() {
|
||||||
|
ts, cl = ClientPost("/filtering/set_rules",
|
||||||
|
`{"rules":[]}`,
|
||||||
|
)
|
||||||
|
err := cl.SetCustomRules(utils.Ptr([]string{}))
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should set nil filter rules", func() {
|
||||||
|
ts, cl = ClientPost("/filtering/set_rules",
|
||||||
|
`{}`,
|
||||||
|
)
|
||||||
|
err := cl.SetCustomRules(nil)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
@@ -114,7 +138,14 @@ var _ = Describe("Client", func() {
|
|||||||
|
|
||||||
Context("Setup", func() {
|
Context("Setup", func() {
|
||||||
It("should add setup the instance", func() {
|
It("should add setup the instance", func() {
|
||||||
ts, cl = ClientPost("/install/configure", fmt.Sprintf(`{"web":{"ip":"0.0.0.0","port":3000,"status":"","can_autofix":false},"dns":{"ip":"0.0.0.0","port":53,"status":"","can_autofix":false},"username":"%s","password":"%s"}`, username, password))
|
ts, cl = ClientPost(
|
||||||
|
"/install/configure",
|
||||||
|
fmt.Sprintf(
|
||||||
|
`{"web":{"ip":"0.0.0.0","port":3000,"status":"","can_autofix":false},"dns":{"ip":"0.0.0.0","port":53,"status":"","can_autofix":false},"username":%q,"password":%q}`,
|
||||||
|
username,
|
||||||
|
password,
|
||||||
|
),
|
||||||
|
)
|
||||||
err := cl.Setup()
|
err := cl.Setup()
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
@@ -216,20 +247,6 @@ var _ = Describe("Client", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("BlockedServices", func() {
|
|
||||||
It("should read BlockedServices", func() {
|
|
||||||
ts, cl = ClientGet("blockedservices-list.json", "/blocked_services/list")
|
|
||||||
s, err := cl.BlockedServices()
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
Ω(*s).Should(HaveLen(2))
|
|
||||||
})
|
|
||||||
It("should set BlockedServices", func() {
|
|
||||||
ts, cl = ClientPost("/blocked_services/set", `["bar","foo"]`)
|
|
||||||
err := cl.SetBlockedServices(&model.BlockedServicesArray{"foo", "bar"})
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
})
|
|
||||||
})
|
|
||||||
|
|
||||||
Context("BlockedServicesSchedule", func() {
|
Context("BlockedServicesSchedule", func() {
|
||||||
It("should read BlockedServicesSchedule", func() {
|
It("should read BlockedServicesSchedule", func() {
|
||||||
ts, cl = ClientGet("blockedservicesschedule-get.json", "/blocked_services/get")
|
ts, cl = ClientGet("blockedservicesschedule-get.json", "/blocked_services/get")
|
||||||
@@ -264,28 +281,28 @@ var _ = Describe("Client", func() {
|
|||||||
ts, cl = ClientPost("/clients/add",
|
ts, cl = ClientPost("/clients/add",
|
||||||
`{"ids":["id"],"name":"foo"}`,
|
`{"ids":["id"],"name":"foo"}`,
|
||||||
)
|
)
|
||||||
err := cl.AddClients(&model.Client{Name: utils.Ptr("foo"), Ids: utils.Ptr([]string{"id"})})
|
err := cl.AddClient(&model.Client{Name: utils.Ptr("foo"), Ids: utils.Ptr([]string{"id"})})
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should update Clients", func() {
|
It("should update Clients", func() {
|
||||||
ts, cl = ClientPost("/clients/update",
|
ts, cl = ClientPost("/clients/update",
|
||||||
`{"data":{"ids":["id"],"name":"foo"},"name":"foo"}`,
|
`{"data":{"ids":["id"],"name":"foo"},"name":"foo"}`,
|
||||||
)
|
)
|
||||||
err := cl.UpdateClients(&model.Client{Name: utils.Ptr("foo"), Ids: utils.Ptr([]string{"id"})})
|
err := cl.UpdateClient(&model.Client{Name: utils.Ptr("foo"), Ids: utils.Ptr([]string{"id"})})
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should delete Clients", func() {
|
It("should delete Clients", func() {
|
||||||
ts, cl = ClientPost("/clients/delete",
|
ts, cl = ClientPost("/clients/delete",
|
||||||
`{"ids":["id"],"name":"foo"}`,
|
`{"ids":["id"],"name":"foo"}`,
|
||||||
)
|
)
|
||||||
err := cl.DeleteClients(&model.Client{Name: utils.Ptr("foo"), Ids: utils.Ptr([]string{"id"})})
|
err := cl.DeleteClient(&model.Client{Name: utils.Ptr("foo"), Ids: utils.Ptr([]string{"id"})})
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("QueryLogConfig", func() {
|
Context("QueryLogConfig", func() {
|
||||||
It("should read QueryLogConfig", func() {
|
It("should read QueryLogConfig", func() {
|
||||||
ts, cl = ClientGet("querylog_info.json", "/querylog_info")
|
ts, cl = ClientGet("querylog_config.json", "/querylog/config")
|
||||||
qlc, err := cl.QueryLogConfig()
|
qlc, err := cl.QueryLogConfig()
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
Ω(qlc.Enabled).ShouldNot(BeNil())
|
Ω(qlc.Enabled).ShouldNot(BeNil())
|
||||||
@@ -294,26 +311,36 @@ var _ = Describe("Client", func() {
|
|||||||
Ω(*qlc.Interval).Should(Equal(model.QueryLogConfigInterval(90)))
|
Ω(*qlc.Interval).Should(Equal(model.QueryLogConfigInterval(90)))
|
||||||
})
|
})
|
||||||
It("should set QueryLogConfig", func() {
|
It("should set QueryLogConfig", func() {
|
||||||
ts, cl = ClientPost("/querylog_config", `{"anonymize_client_ip":true,"enabled":true,"interval":123}`)
|
ts, cl = ClientPut(
|
||||||
|
"/querylog/config/update",
|
||||||
|
`{"anonymize_client_ip":true,"enabled":true,"interval":123,"ignored":["foo.bar"]}`,
|
||||||
|
)
|
||||||
|
|
||||||
var interval model.QueryLogConfigInterval = 123
|
var interval model.QueryLogConfigInterval = 123
|
||||||
err := cl.SetQueryLogConfig(&model.QueryLogConfig{AnonymizeClientIp: utils.Ptr(true), Interval: &interval, Enabled: utils.Ptr(true)})
|
err := cl.SetQueryLogConfig(&model.QueryLogConfigWithIgnored{
|
||||||
|
QueryLogConfig: model.QueryLogConfig{
|
||||||
|
AnonymizeClientIp: utils.Ptr(true),
|
||||||
|
Interval: &interval,
|
||||||
|
Enabled: utils.Ptr(true),
|
||||||
|
},
|
||||||
|
Ignored: []string{"foo.bar"},
|
||||||
|
})
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
Context("StatsConfig", func() {
|
Context("StatsConfig", func() {
|
||||||
It("should read StatsConfig", func() {
|
It("should read StatsConfig", func() {
|
||||||
ts, cl = ClientGet("stats_info.json", "/stats_info")
|
ts, cl = ClientGet("stats_info.json", "/stats/config")
|
||||||
sc, err := cl.StatsConfig()
|
sc, err := cl.StatsConfig()
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
Ω(sc.Interval).ShouldNot(BeNil())
|
Ω(sc.Interval).ShouldNot(BeNil())
|
||||||
Ω(*sc.Interval).Should(Equal(model.StatsConfigInterval(1)))
|
Ω(sc.Interval).Should(Equal(float32(1)))
|
||||||
})
|
})
|
||||||
It("should set StatsConfig", func() {
|
It("should set StatsConfig", func() {
|
||||||
ts, cl = ClientPost("/stats_config", `{"interval":123}`)
|
ts, cl = ClientPost("/stats/config/update", `{"enabled":false,"ignored":null,"interval":123}`)
|
||||||
|
|
||||||
var interval model.StatsConfigInterval = 123
|
var interval float32 = 123
|
||||||
err := cl.SetStatsConfig(&model.StatsConfig{Interval: &interval})
|
err := cl.SetStatsConfig(&model.PutStatsConfigUpdateRequest{Interval: interval})
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
@@ -338,8 +365,8 @@ var _ = Describe("Client", func() {
|
|||||||
|
|
||||||
Context("doPost", func() {
|
Context("doPost", func() {
|
||||||
It("should return an error on status code != 200", func() {
|
It("should return an error on status code != 200", func() {
|
||||||
var interval model.StatsConfigInterval = 123
|
var interval float32 = 123
|
||||||
err := cl.SetStatsConfig(&model.StatsConfig{Interval: &interval})
|
err := cl.SetStatsConfig(&model.PutStatsConfigUpdateRequest{Interval: interval})
|
||||||
Ω(err).Should(HaveOccurred())
|
Ω(err).Should(HaveOccurred())
|
||||||
Ω(err.Error()).Should(Equal("401 Unauthorized"))
|
Ω(err.Error()).Should(Equal("401 Unauthorized"))
|
||||||
})
|
})
|
||||||
@@ -347,10 +374,10 @@ var _ = Describe("Client", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
func ClientGet(file string, path string) (*httptest.Server, client.Client) {
|
func ClientGet(file, path string) (*httptest.Server, client.Client) {
|
||||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
Ω(r.URL.Path).Should(Equal(types.DefaultAPIPath + path))
|
Ω(r.URL.Path).Should(Equal(types.DefaultAPIPath + path))
|
||||||
b, err := os.ReadFile(filepath.Join("../../testdata", file))
|
b, err := os.ReadFile(filepath.Join("..", "..", "testdata", file))
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
_, err = w.Write(b)
|
_, err = w.Write(b)
|
||||||
|
|||||||
@@ -11,19 +11,20 @@ import (
|
|||||||
"net/url"
|
"net/url"
|
||||||
"path"
|
"path"
|
||||||
|
|
||||||
|
"go.uber.org/zap"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/log"
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/types"
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
"go.uber.org/zap"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var l = log.GetLogger("client")
|
var l = log.GetLogger("client")
|
||||||
|
|
||||||
// New create a new api client
|
// New create a new api client.
|
||||||
func New(config types.AdGuardInstance) (Client, error) {
|
func New(config types.AdGuardInstance) (Client, error) {
|
||||||
var apiURL string
|
var apiURL string
|
||||||
if config.APIPath == "" {
|
if config.APIPath == "" {
|
||||||
apiURL = fmt.Sprintf("%s/control", config.URL)
|
apiURL = config.URL + "/control"
|
||||||
} else {
|
} else {
|
||||||
apiURL = fmt.Sprintf("%s/%s", config.URL, config.APIPath)
|
apiURL = fmt.Sprintf("%s/%s", config.URL, config.APIPath)
|
||||||
}
|
}
|
||||||
@@ -33,12 +34,11 @@ func New(config types.AdGuardInstance) (Client, error) {
|
|||||||
}
|
}
|
||||||
u.Path = path.Clean(u.Path)
|
u.Path = path.Clean(u.Path)
|
||||||
|
|
||||||
httpClient := &http.Client{}
|
httpClient := &http.Client{
|
||||||
if config.InsecureSkipVerify {
|
Transport: &http.Transport{
|
||||||
// #nosec G402 has to be explicitly enabled
|
// #nosec G402 has to be explicitly enabled
|
||||||
httpClient.Transport = &http.Transport{
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: config.InsecureSkipVerify},
|
||||||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
|
},
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
aghClient, err := model.NewClient(u.String(), func(client *model.AdguardHomeClient) error {
|
aghClient, err := model.NewClient(u.String(), func(client *model.AdguardHomeClient) error {
|
||||||
@@ -97,7 +97,7 @@ func (a apiClient) SetFilteringConfig(ctx context.Context, config model.FilterCo
|
|||||||
return write(ctx, config, a.client.FilteringConfig)
|
return write(ctx, config, a.client.FilteringConfig)
|
||||||
}
|
}
|
||||||
|
|
||||||
func write[B interface{}](
|
func write[B any](
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
body B,
|
body B,
|
||||||
req func(ctx context.Context, body B, reqEditors ...model.RequestEditorFn) (*http.Response, error),
|
req func(ctx context.Context, body B, reqEditors ...model.RequestEditorFn) (*http.Response, error),
|
||||||
@@ -113,7 +113,7 @@ func write[B interface{}](
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func read[I interface{}](
|
func read[I any](
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
req func(ctx context.Context, reqEditors ...model.RequestEditorFn) (*http.Response, error),
|
req func(ctx context.Context, reqEditors ...model.RequestEditorFn) (*http.Response, error),
|
||||||
parse func(rsp *http.Response) (*I, error),
|
parse func(rsp *http.Response) (*I, error),
|
||||||
|
|||||||
@@ -3,8 +3,9 @@ package client
|
|||||||
import (
|
import (
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
|
||||||
"github.com/go-resty/resty/v2"
|
"github.com/go-resty/resty/v2"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ model.HttpRequestDoer = &adapter{}
|
var _ model.HttpRequestDoer = &adapter{}
|
||||||
|
|||||||
@@ -5,20 +5,39 @@ import (
|
|||||||
"sort"
|
"sort"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/utils"
|
|
||||||
"github.com/jinzhu/copier"
|
"github.com/jinzhu/copier"
|
||||||
|
"go.uber.org/zap"
|
||||||
|
"k8s.io/utils/ptr"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Clone the config
|
// Clone the config.
|
||||||
func (c *DhcpStatus) Clone() *DhcpStatus {
|
func (c *DhcpStatus) Clone() *DhcpStatus {
|
||||||
clone := &DhcpStatus{}
|
clone := &DhcpStatus{}
|
||||||
_ = copier.Copy(clone, c)
|
_ = copier.Copy(clone, c)
|
||||||
return clone
|
return clone
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equals dhcp server config equal check
|
func (c *DhcpStatus) cleanV4V6() {
|
||||||
|
if c.V4 != nil && !c.V4.isValid() {
|
||||||
|
c.V4 = nil
|
||||||
|
}
|
||||||
|
if c.V6 != nil && !c.V6.isValid() {
|
||||||
|
c.V6 = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CleanAndEquals dhcp server config equal check where V4 and V6 are cleaned in advance.
|
||||||
|
func (c *DhcpStatus) CleanAndEquals(o *DhcpStatus) bool {
|
||||||
|
c.cleanV4V6()
|
||||||
|
o.cleanV4V6()
|
||||||
|
return c.Equals(o)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Equals dhcp server config equal check.
|
||||||
func (c *DhcpStatus) Equals(o *DhcpStatus) bool {
|
func (c *DhcpStatus) Equals(o *DhcpStatus) bool {
|
||||||
return utils.JsonEquals(c, o)
|
return utils.JSONEquals(c, o)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *DhcpStatus) HasConfig() bool {
|
func (c *DhcpStatus) HasConfig() bool {
|
||||||
@@ -26,17 +45,20 @@ func (c *DhcpStatus) HasConfig() bool {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (j DhcpConfigV4) isValid() bool {
|
func (j DhcpConfigV4) isValid() bool {
|
||||||
return j.GatewayIp != nil && j.SubnetMask != nil && j.RangeStart != nil && j.RangeEnd != nil
|
return j.GatewayIp != nil && *j.GatewayIp != "" &&
|
||||||
|
j.SubnetMask != nil && *j.SubnetMask != "" &&
|
||||||
|
j.RangeStart != nil && *j.RangeStart != "" &&
|
||||||
|
j.RangeEnd != nil && *j.RangeEnd != ""
|
||||||
}
|
}
|
||||||
|
|
||||||
func (j DhcpConfigV6) isValid() bool {
|
func (j DhcpConfigV6) isValid() bool {
|
||||||
return j.RangeStart != nil
|
return j.RangeStart != nil && *j.RangeStart != ""
|
||||||
}
|
}
|
||||||
|
|
||||||
type DhcpStaticLeases []DhcpStaticLease
|
type DhcpStaticLeases []DhcpStaticLease
|
||||||
|
|
||||||
// MergeDhcpStaticLeases the leases
|
// MergeDhcpStaticLeases the leases.
|
||||||
func MergeDhcpStaticLeases(l *[]DhcpStaticLease, other *[]DhcpStaticLease) (DhcpStaticLeases, DhcpStaticLeases) {
|
func MergeDhcpStaticLeases(l, other *[]DhcpStaticLease) (adds, removes DhcpStaticLeases) {
|
||||||
var thisLeases []DhcpStaticLease
|
var thisLeases []DhcpStaticLease
|
||||||
var otherLeases []DhcpStaticLease
|
var otherLeases []DhcpStaticLease
|
||||||
|
|
||||||
@@ -48,8 +70,6 @@ func MergeDhcpStaticLeases(l *[]DhcpStaticLease, other *[]DhcpStaticLease) (Dhcp
|
|||||||
}
|
}
|
||||||
current := make(map[string]DhcpStaticLease)
|
current := make(map[string]DhcpStaticLease)
|
||||||
|
|
||||||
var adds DhcpStaticLeases
|
|
||||||
var removes DhcpStaticLeases
|
|
||||||
for _, le := range thisLeases {
|
for _, le := range thisLeases {
|
||||||
current[le.Mac] = le
|
current[le.Mac] = le
|
||||||
}
|
}
|
||||||
@@ -69,21 +89,21 @@ func MergeDhcpStaticLeases(l *[]DhcpStaticLease, other *[]DhcpStaticLease) (Dhcp
|
|||||||
return adds, removes
|
return adds, removes
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equals dns config equal check
|
// Equals dns config equal check.
|
||||||
func (c *DNSConfig) Equals(o *DNSConfig) bool {
|
func (c *DNSConfig) Equals(o *DNSConfig) bool {
|
||||||
cc := c.Clone()
|
cc := c.Clone()
|
||||||
oo := o.Clone()
|
oo := o.Clone()
|
||||||
cc.Sort()
|
cc.Sort()
|
||||||
oo.Sort()
|
oo.Sort()
|
||||||
|
|
||||||
return utils.JsonEquals(cc, oo)
|
return utils.JSONEquals(cc, oo)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *DNSConfig) Clone() *DNSConfig {
|
func (c *DNSConfig) Clone() *DNSConfig {
|
||||||
return utils.Clone(c, &DNSConfig{})
|
return utils.Clone(c, &DNSConfig{})
|
||||||
}
|
}
|
||||||
|
|
||||||
// Sort sort dns config
|
// Sort dns config.
|
||||||
func (c *DNSConfig) Sort() {
|
func (c *DNSConfig) Sort() {
|
||||||
if c.UpstreamDns != nil {
|
if c.UpstreamDns != nil {
|
||||||
sort.Strings(*c.UpstreamDns)
|
sort.Strings(*c.UpstreamDns)
|
||||||
@@ -98,14 +118,14 @@ func (c *DNSConfig) Sort() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equals access list equal check
|
// Equals access list equal check.
|
||||||
func (al *AccessList) Equals(o *AccessList) bool {
|
func (al *AccessList) Equals(o *AccessList) bool {
|
||||||
return EqualsStringSlice(al.AllowedClients, o.AllowedClients, true) &&
|
return EqualsStringSlice(al.AllowedClients, o.AllowedClients, true) &&
|
||||||
EqualsStringSlice(al.DisallowedClients, o.DisallowedClients, true) &&
|
EqualsStringSlice(al.DisallowedClients, o.DisallowedClients, true) &&
|
||||||
EqualsStringSlice(al.BlockedHosts, o.BlockedHosts, true)
|
EqualsStringSlice(al.BlockedHosts, o.BlockedHosts, true)
|
||||||
}
|
}
|
||||||
|
|
||||||
func EqualsStringSlice(a *[]string, b *[]string, sortIt bool) bool {
|
func EqualsStringSlice(a, b *[]string, sortIt bool) bool {
|
||||||
if a == nil && b == nil {
|
if a == nil && b == nil {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
@@ -131,7 +151,7 @@ func EqualsStringSlice(a *[]string, b *[]string, sortIt bool) bool {
|
|||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
// Sort clients
|
// Sort clients.
|
||||||
func (cl *Client) Sort() {
|
func (cl *Client) Sort() {
|
||||||
if cl.Ids != nil {
|
if cl.Ids != nil {
|
||||||
sort.Strings(*cl.Ids)
|
sort.Strings(*cl.Ids)
|
||||||
@@ -147,15 +167,42 @@ func (cl *Client) Sort() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equals Clients equal check
|
// PrepareDiff so we skip it in diff.
|
||||||
|
func (cl *Client) PrepareDiff() *string {
|
||||||
|
var tz *string
|
||||||
|
bss := cl.BlockedServicesSchedule
|
||||||
|
if bss != nil && bss.Mon == nil && bss.Tue == nil && bss.Wed == nil &&
|
||||||
|
bss.Thu == nil && bss.Fri == nil && bss.Sat == nil && bss.Sun == nil {
|
||||||
|
tz = cl.BlockedServicesSchedule.TimeZone
|
||||||
|
cl.BlockedServicesSchedule.TimeZone = nil
|
||||||
|
}
|
||||||
|
return tz
|
||||||
|
}
|
||||||
|
|
||||||
|
// AfterDiff reset after diff.
|
||||||
|
func (cl *Client) AfterDiff(tz *string) {
|
||||||
|
if cl.BlockedServicesSchedule != nil {
|
||||||
|
cl.BlockedServicesSchedule.TimeZone = tz
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Equals Clients equal check.
|
||||||
func (cl *Client) Equals(o *Client) bool {
|
func (cl *Client) Equals(o *Client) bool {
|
||||||
cl.Sort()
|
cl.Sort()
|
||||||
o.Sort()
|
o.Sort()
|
||||||
|
|
||||||
return utils.JsonEquals(cl, o)
|
bssCl := cl.PrepareDiff()
|
||||||
|
bssO := o.PrepareDiff()
|
||||||
|
|
||||||
|
defer func() {
|
||||||
|
cl.AfterDiff(bssCl)
|
||||||
|
o.AfterDiff(bssO)
|
||||||
|
}()
|
||||||
|
|
||||||
|
return utils.JSONEquals(cl, o)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Add ac client
|
// Add ac client.
|
||||||
func (clients *Clients) Add(cl Client) {
|
func (clients *Clients) Add(cl Client) {
|
||||||
if clients.Clients == nil {
|
if clients.Clients == nil {
|
||||||
clients.Clients = &ClientsArray{cl}
|
clients.Clients = &ClientsArray{cl}
|
||||||
@@ -165,13 +212,12 @@ func (clients *Clients) Add(cl Client) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Merge merge Clients
|
// Merge merge Clients.
|
||||||
func (clients *Clients) Merge(other *Clients) ([]*Client, []*Client, []*Client) {
|
func (clients *Clients) Merge(other *Clients) (adds, removes, updates []*Client) {
|
||||||
current := make(map[string]*Client)
|
current := make(map[string]*Client)
|
||||||
if clients.Clients != nil {
|
if clients.Clients != nil {
|
||||||
cc := *clients.Clients
|
cc := *clients.Clients
|
||||||
for i := range cc {
|
for _, client := range cc {
|
||||||
client := cc[i]
|
|
||||||
current[*client.Name] = &client
|
current[*client.Name] = &client
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -179,16 +225,11 @@ func (clients *Clients) Merge(other *Clients) ([]*Client, []*Client, []*Client)
|
|||||||
expected := make(map[string]*Client)
|
expected := make(map[string]*Client)
|
||||||
if other.Clients != nil {
|
if other.Clients != nil {
|
||||||
oc := *other.Clients
|
oc := *other.Clients
|
||||||
for i := range oc {
|
for _, client := range oc {
|
||||||
client := oc[i]
|
|
||||||
expected[*client.Name] = &client
|
expected[*client.Name] = &client
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
var adds []*Client
|
|
||||||
var removes []*Client
|
|
||||||
var updates []*Client
|
|
||||||
|
|
||||||
for _, cl := range expected {
|
for _, cl := range expected {
|
||||||
if oc, ok := current[*cl.Name]; ok {
|
if oc, ok := current[*cl.Name]; ok {
|
||||||
if !cl.Equals(oc) {
|
if !cl.Equals(oc) {
|
||||||
@@ -207,7 +248,7 @@ func (clients *Clients) Merge(other *Clients) ([]*Client, []*Client, []*Client)
|
|||||||
return adds, updates, removes
|
return adds, updates, removes
|
||||||
}
|
}
|
||||||
|
|
||||||
// Key RewriteEntry key
|
// Key RewriteEntry key.
|
||||||
func (re *RewriteEntry) Key() string {
|
func (re *RewriteEntry) Key() string {
|
||||||
var d string
|
var d string
|
||||||
var a string
|
var a string
|
||||||
@@ -220,16 +261,13 @@ func (re *RewriteEntry) Key() string {
|
|||||||
return fmt.Sprintf("%s#%s", d, a)
|
return fmt.Sprintf("%s#%s", d, a)
|
||||||
}
|
}
|
||||||
|
|
||||||
// RewriteEntries list of RewriteEntry
|
// RewriteEntries list of RewriteEntry.
|
||||||
type RewriteEntries []RewriteEntry
|
type RewriteEntries []RewriteEntry
|
||||||
|
|
||||||
// Merge RewriteEntries
|
// Merge RewriteEntries.
|
||||||
func (rwe *RewriteEntries) Merge(other *RewriteEntries) (RewriteEntries, RewriteEntries, RewriteEntries) {
|
func (rwe *RewriteEntries) Merge(other *RewriteEntries) (adds, removes, duplicates RewriteEntries) {
|
||||||
current := make(map[string]RewriteEntry)
|
current := make(map[string]RewriteEntry)
|
||||||
|
|
||||||
var adds RewriteEntries
|
|
||||||
var removes RewriteEntries
|
|
||||||
var duplicates RewriteEntries
|
|
||||||
processed := make(map[string]bool)
|
processed := make(map[string]bool)
|
||||||
for _, rr := range *rwe {
|
for _, rr := range *rwe {
|
||||||
if _, ok := processed[rr.Key()]; !ok {
|
if _, ok := processed[rr.Key()]; !ok {
|
||||||
@@ -262,26 +300,21 @@ func (rwe *RewriteEntries) Merge(other *RewriteEntries) (RewriteEntries, Rewrite
|
|||||||
return adds, removes, duplicates
|
return adds, removes, duplicates
|
||||||
}
|
}
|
||||||
|
|
||||||
func MergeFilters(this *[]Filter, other *[]Filter) ([]Filter, []Filter, []Filter) {
|
func MergeFilters(this, other *[]Filter) (adds, updates, removes []Filter) {
|
||||||
if this == nil && other == nil {
|
if this == nil && other == nil {
|
||||||
return nil, nil, nil
|
return nil, nil, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
current := make(map[string]*Filter)
|
current := make(map[string]*Filter)
|
||||||
|
|
||||||
var adds []Filter
|
|
||||||
var updates []Filter
|
|
||||||
var removes []Filter
|
|
||||||
if this != nil {
|
if this != nil {
|
||||||
for i := range *this {
|
for _, fi := range *this {
|
||||||
fi := (*this)[i]
|
|
||||||
current[fi.Url] = &fi
|
current[fi.Url] = &fi
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if other != nil {
|
if other != nil {
|
||||||
for i := range *other {
|
for _, rr := range *other {
|
||||||
rr := (*other)[i]
|
|
||||||
if c, ok := current[rr.Url]; ok {
|
if c, ok := current[rr.Url]; ok {
|
||||||
if !c.Equals(&rr) {
|
if !c.Equals(&rr) {
|
||||||
updates = append(updates, rr)
|
updates = append(updates, rr)
|
||||||
@@ -300,24 +333,29 @@ func MergeFilters(this *[]Filter, other *[]Filter) ([]Filter, []Filter, []Filter
|
|||||||
return adds, updates, removes
|
return adds, updates, removes
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equals Filter equal check
|
// Equals Filter equal check.
|
||||||
func (f *Filter) Equals(o *Filter) bool {
|
func (f *Filter) Equals(o *Filter) bool {
|
||||||
return f.Enabled == o.Enabled && f.Url == o.Url && f.Name == o.Name
|
return f.Enabled == o.Enabled && f.Url == o.Url && f.Name == o.Name
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equals QueryLogConfig equal check
|
type QueryLogConfigWithIgnored struct {
|
||||||
func (qlc *QueryLogConfig) Equals(o *QueryLogConfig) bool {
|
QueryLogConfig
|
||||||
return ptrEquals(qlc.Enabled, o.Enabled) &&
|
|
||||||
ptrEquals(qlc.AnonymizeClientIp, o.AnonymizeClientIp) &&
|
// Ignored List of host names, which should not be written to log
|
||||||
qlc.Interval.Equals(o.Interval)
|
Ignored []string `json:"ignored,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equals QueryLogConfigInterval equal check
|
// Equals QueryLogConfig equal check.
|
||||||
|
func (qlc *QueryLogConfigWithIgnored) Equals(o *QueryLogConfigWithIgnored) bool {
|
||||||
|
return utils.JSONEquals(qlc, o)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Equals QueryLogConfigInterval equal check.
|
||||||
func (qlc *QueryLogConfigInterval) Equals(o *QueryLogConfigInterval) bool {
|
func (qlc *QueryLogConfigInterval) Equals(o *QueryLogConfigInterval) bool {
|
||||||
return ptrEquals(qlc, o)
|
return ptrEquals(qlc, o)
|
||||||
}
|
}
|
||||||
|
|
||||||
func ptrEquals[T comparable](a *T, b *T) bool {
|
func ptrEquals[T comparable](a, b *T) bool {
|
||||||
if a == nil && b == nil {
|
if a == nil && b == nil {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
@@ -333,7 +371,7 @@ func ptrEquals[T comparable](a *T, b *T) bool {
|
|||||||
return aa == bb
|
return aa == bb
|
||||||
}
|
}
|
||||||
|
|
||||||
// EnableConfig API struct
|
// EnableConfig API struct.
|
||||||
type EnableConfig struct {
|
type EnableConfig struct {
|
||||||
Enabled bool `json:"enabled"`
|
Enabled bool `json:"enabled"`
|
||||||
}
|
}
|
||||||
@@ -348,30 +386,29 @@ func (ssc *SafeSearchConfig) Equals(o *SafeSearchConfig) bool {
|
|||||||
ptrEquals(ssc.Youtube, o.Youtube)
|
ptrEquals(ssc.Youtube, o.Youtube)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pi *ProfileInfo) Equals(o *ProfileInfo) bool {
|
func (pi *ProfileInfo) Equals(o *ProfileInfo, withTheme bool) bool {
|
||||||
return pi.Language == o.Language &&
|
return pi.Language == o.Language && (!withTheme || pi.Theme == o.Theme)
|
||||||
pi.Theme == o.Theme
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pi *ProfileInfo) ShouldSyncFor(o *ProfileInfo) *ProfileInfo {
|
func (pi *ProfileInfo) ShouldSyncFor(o *ProfileInfo, withTheme bool) *ProfileInfo {
|
||||||
if pi.Equals(o) {
|
if pi.Equals(o, withTheme) {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
merged := &ProfileInfo{Name: pi.Name, Language: pi.Language, Theme: pi.Theme}
|
merged := &ProfileInfo{Name: pi.Name, Language: pi.Language, Theme: pi.Theme}
|
||||||
if o.Language != "" {
|
if o.Language != "" {
|
||||||
merged.Language = o.Language
|
merged.Language = o.Language
|
||||||
}
|
}
|
||||||
if o.Theme != "" {
|
if withTheme && o.Theme != "" {
|
||||||
merged.Theme = o.Theme
|
merged.Theme = o.Theme
|
||||||
}
|
}
|
||||||
if merged.Name == "" || merged.Language == "" || merged.Theme == "" || merged.Equals(pi) {
|
if merged.Name == "" || merged.Language == "" || merged.Equals(pi, false) {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
return merged
|
return merged
|
||||||
}
|
}
|
||||||
|
|
||||||
func (bss *BlockedServicesSchedule) Equals(o *BlockedServicesSchedule) bool {
|
func (bss *BlockedServicesSchedule) Equals(o *BlockedServicesSchedule) bool {
|
||||||
return utils.JsonEquals(bss, o)
|
return utils.JSONEquals(bss, o)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (bss *BlockedServicesSchedule) ServicesString() string {
|
func (bss *BlockedServicesSchedule) ServicesString() string {
|
||||||
@@ -386,3 +423,70 @@ func ArrayString(a *[]string) string {
|
|||||||
sort.Strings(sorted)
|
sort.Strings(sorted)
|
||||||
return fmt.Sprintf("[%s]", strings.Join(sorted, ","))
|
return fmt.Sprintf("[%s]", strings.Join(sorted, ","))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *DNSConfig) Sanitize(l *zap.SugaredLogger) {
|
||||||
|
// disable UsePrivatePtrResolvers if not configured
|
||||||
|
// https://github.com/AdguardTeam/AdGuardHome/issues/6820
|
||||||
|
if c.UsePrivatePtrResolvers != nil && *c.UsePrivatePtrResolvers &&
|
||||||
|
(c.LocalPtrUpstreams == nil || len(*c.LocalPtrUpstreams) == 0) {
|
||||||
|
l.Warn(
|
||||||
|
"disabling replica 'Use private reverse DNS resolvers' as no 'Private reverse DNS servers' are configured on origin",
|
||||||
|
)
|
||||||
|
c.UsePrivatePtrResolvers = utils.Ptr(false)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Equals GetStatsConfigResponse equal check.
|
||||||
|
func (sc *GetStatsConfigResponse) Equals(o *GetStatsConfigResponse) bool {
|
||||||
|
return utils.JSONEquals(sc, o)
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewStats() *Stats {
|
||||||
|
return &Stats{
|
||||||
|
NumBlockedFiltering: ptr.To(0),
|
||||||
|
NumReplacedParental: ptr.To(0),
|
||||||
|
NumReplacedSafesearch: ptr.To(0),
|
||||||
|
NumReplacedSafebrowsing: ptr.To(0),
|
||||||
|
NumDnsQueries: ptr.To(0),
|
||||||
|
|
||||||
|
BlockedFiltering: ptr.To(make([]int, 24)),
|
||||||
|
DnsQueries: ptr.To(make([]int, 24)),
|
||||||
|
ReplacedParental: ptr.To(make([]int, 24)),
|
||||||
|
ReplacedSafebrowsing: ptr.To(make([]int, 24)),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *Stats) Add(other *Stats) {
|
||||||
|
s.NumBlockedFiltering = addInt(s.NumBlockedFiltering, other.NumBlockedFiltering)
|
||||||
|
s.NumReplacedSafebrowsing = addInt(s.NumReplacedSafebrowsing, other.NumReplacedSafebrowsing)
|
||||||
|
s.NumDnsQueries = addInt(s.NumDnsQueries, other.NumDnsQueries)
|
||||||
|
s.NumReplacedSafesearch = addInt(s.NumReplacedSafesearch, other.NumReplacedSafesearch)
|
||||||
|
s.NumReplacedParental = addInt(s.NumReplacedParental, other.NumReplacedParental)
|
||||||
|
|
||||||
|
s.BlockedFiltering = sumUp(s.BlockedFiltering, other.BlockedFiltering)
|
||||||
|
s.DnsQueries = sumUp(s.DnsQueries, other.DnsQueries)
|
||||||
|
s.ReplacedParental = sumUp(s.ReplacedParental, other.ReplacedParental)
|
||||||
|
s.ReplacedSafebrowsing = sumUp(s.ReplacedSafebrowsing, other.ReplacedSafebrowsing)
|
||||||
|
}
|
||||||
|
|
||||||
|
func addInt(t, add *int) *int {
|
||||||
|
if add != nil {
|
||||||
|
return ptr.To(*t + *add)
|
||||||
|
}
|
||||||
|
return t
|
||||||
|
}
|
||||||
|
|
||||||
|
func sumUp(t, o *[]int) *[]int {
|
||||||
|
if o != nil {
|
||||||
|
tt := *t
|
||||||
|
oo := *o
|
||||||
|
var sum []int
|
||||||
|
for i := range tt {
|
||||||
|
if len(oo) >= i {
|
||||||
|
sum = append(sum, tt[i]+oo[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return &sum
|
||||||
|
}
|
||||||
|
return t
|
||||||
|
}
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
// Package model provides primitives to interact with the openapi HTTP API.
|
// Package model provides primitives to interact with the openapi HTTP API.
|
||||||
//
|
//
|
||||||
// Code generated by github.com/deepmap/oapi-codegen/v2 version v2.0.0 DO NOT EDIT.
|
// Code generated by github.com/oapi-codegen/oapi-codegen/v2 version v2.4.1 DO NOT EDIT.
|
||||||
package model
|
package model
|
||||||
|
|
||||||
import (
|
import (
|
||||||
@@ -37,6 +37,14 @@ const (
|
|||||||
Refused DNSConfigBlockingMode = "refused"
|
Refused DNSConfigBlockingMode = "refused"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// Defines values for DNSConfigUpstreamMode.
|
||||||
|
const (
|
||||||
|
MapConstDeprecatedTrueDescriptionUseloadBalanceInstead DNSConfigUpstreamMode = "map[const: deprecated:true description:Use `load_balance` instead.]"
|
||||||
|
MapConstFastestAddr DNSConfigUpstreamMode = "map[const:fastest_addr]"
|
||||||
|
MapConstLoadBalance DNSConfigUpstreamMode = "map[const:load_balance]"
|
||||||
|
MapConstParallel DNSConfigUpstreamMode = "map[const:parallel]"
|
||||||
|
)
|
||||||
|
|
||||||
// Defines values for DhcpSearchResultOtherServerFound.
|
// Defines values for DhcpSearchResultOtherServerFound.
|
||||||
const (
|
const (
|
||||||
DhcpSearchResultOtherServerFoundError DhcpSearchResultOtherServerFound = "error"
|
DhcpSearchResultOtherServerFoundError DhcpSearchResultOtherServerFound = "error"
|
||||||
@@ -83,6 +91,15 @@ const (
|
|||||||
QueryLogConfigIntervalN90 QueryLogConfigInterval = 90
|
QueryLogConfigIntervalN90 QueryLogConfigInterval = 90
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// Defines values for QueryLogItemClientProto.
|
||||||
|
const (
|
||||||
|
Dnscrypt QueryLogItemClientProto = "dnscrypt"
|
||||||
|
Doh QueryLogItemClientProto = "doh"
|
||||||
|
Doq QueryLogItemClientProto = "doq"
|
||||||
|
Dot QueryLogItemClientProto = "dot"
|
||||||
|
Empty QueryLogItemClientProto = ""
|
||||||
|
)
|
||||||
|
|
||||||
// Defines values for QueryLogItemReason.
|
// Defines values for QueryLogItemReason.
|
||||||
const (
|
const (
|
||||||
QueryLogItemReasonFilteredBlackList QueryLogItemReason = "FilteredBlackList"
|
QueryLogItemReasonFilteredBlackList QueryLogItemReason = "FilteredBlackList"
|
||||||
@@ -287,11 +304,28 @@ type Client struct {
|
|||||||
SafeSearch *SafeSearchConfig `json:"safe_search,omitempty"`
|
SafeSearch *SafeSearchConfig `json:"safe_search,omitempty"`
|
||||||
SafebrowsingEnabled *bool `json:"safebrowsing_enabled,omitempty"`
|
SafebrowsingEnabled *bool `json:"safebrowsing_enabled,omitempty"`
|
||||||
// Deprecated:
|
// Deprecated:
|
||||||
SafesearchEnabled *bool `json:"safesearch_enabled,omitempty"`
|
SafesearchEnabled *bool `json:"safesearch_enabled,omitempty"`
|
||||||
Tags *[]string `json:"tags,omitempty"`
|
Tags *[]string `json:"tags,omitempty"`
|
||||||
Upstreams *[]string `json:"upstreams,omitempty"`
|
Upstreams *[]string `json:"upstreams,omitempty"`
|
||||||
UseGlobalBlockedServices *bool `json:"use_global_blocked_services,omitempty"`
|
|
||||||
UseGlobalSettings *bool `json:"use_global_settings,omitempty"`
|
// UpstreamsCacheEnabled NOTE: If `upstreams_cache_enabled` is not set in HTTP API
|
||||||
|
// `GET /clients/add` request then default value (false) will be used.
|
||||||
|
//
|
||||||
|
// If `upstreams_cache_enabled` is not set in HTTP API
|
||||||
|
// `GET /clients/update` request then the existing value will not be
|
||||||
|
// changed.
|
||||||
|
//
|
||||||
|
// This behaviour can be changed in the future versions.
|
||||||
|
UpstreamsCacheEnabled *bool `json:"upstreams_cache_enabled,omitempty"`
|
||||||
|
|
||||||
|
// UpstreamsCacheSize NOTE: If `upstreams_cache_enabled` is not set in HTTP API
|
||||||
|
// `GET /clients/update` request then the existing value will not be
|
||||||
|
// changed.
|
||||||
|
//
|
||||||
|
// This behaviour can be changed in the future versions.
|
||||||
|
UpstreamsCacheSize *int `json:"upstreams_cache_size,omitempty"`
|
||||||
|
UseGlobalBlockedServices *bool `json:"use_global_blocked_services,omitempty"`
|
||||||
|
UseGlobalSettings *bool `json:"use_global_settings,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// ClientAuto Auto-Client information
|
// ClientAuto Auto-Client information
|
||||||
@@ -372,6 +406,17 @@ type ClientsFindEntry map[string]ClientFindSubEntry
|
|||||||
// ClientsFindResponse Client search results.
|
// ClientsFindResponse Client search results.
|
||||||
type ClientsFindResponse = []ClientsFindEntry
|
type ClientsFindResponse = []ClientsFindEntry
|
||||||
|
|
||||||
|
// ClientsSearchRequest Client search request
|
||||||
|
type ClientsSearchRequest struct {
|
||||||
|
Clients *[]ClientsSearchRequestItem `json:"clients,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClientsSearchRequestItem defines model for ClientsSearchRequestItem.
|
||||||
|
type ClientsSearchRequestItem struct {
|
||||||
|
// Id Client IP address, CIDR, MAC address, or ClientID
|
||||||
|
Id *string `json:"id,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
// DNSConfig DNS server configuration
|
// DNSConfig DNS server configuration
|
||||||
type DNSConfig struct {
|
type DNSConfig struct {
|
||||||
// BlockedResponseTtl TTL for blocked responses.
|
// BlockedResponseTtl TTL for blocked responses.
|
||||||
@@ -402,18 +447,35 @@ type DNSConfig struct {
|
|||||||
ProtectionDisabledUntil *string `json:"protection_disabled_until,omitempty"`
|
ProtectionDisabledUntil *string `json:"protection_disabled_until,omitempty"`
|
||||||
ProtectionEnabled *bool `json:"protection_enabled,omitempty"`
|
ProtectionEnabled *bool `json:"protection_enabled,omitempty"`
|
||||||
Ratelimit *int `json:"ratelimit,omitempty"`
|
Ratelimit *int `json:"ratelimit,omitempty"`
|
||||||
ResolveClients *bool `json:"resolve_clients,omitempty"`
|
|
||||||
|
// RatelimitSubnetSubnetLenIpv4 Length of the subnet mask for IPv4 addresses.
|
||||||
|
RatelimitSubnetSubnetLenIpv4 *int `json:"ratelimit_subnet_subnet_len_ipv4,omitempty"`
|
||||||
|
|
||||||
|
// RatelimitSubnetSubnetLenIpv6 Length of the subnet mask for IPv6 addresses.
|
||||||
|
RatelimitSubnetSubnetLenIpv6 *int `json:"ratelimit_subnet_subnet_len_ipv6,omitempty"`
|
||||||
|
|
||||||
|
// RatelimitWhitelist List of IP addresses excluded from rate limiting.
|
||||||
|
RatelimitWhitelist *[]string `json:"ratelimit_whitelist,omitempty"`
|
||||||
|
ResolveClients *bool `json:"resolve_clients,omitempty"`
|
||||||
|
|
||||||
// UpstreamDns Upstream servers, port is optional after colon. Empty value will reset it to default values.
|
// UpstreamDns Upstream servers, port is optional after colon. Empty value will reset it to default values.
|
||||||
UpstreamDns *[]string `json:"upstream_dns,omitempty"`
|
UpstreamDns *[]string `json:"upstream_dns,omitempty"`
|
||||||
UpstreamDnsFile *string `json:"upstream_dns_file,omitempty"`
|
UpstreamDnsFile *string `json:"upstream_dns_file,omitempty"`
|
||||||
UpstreamMode *interface{} `json:"upstream_mode,omitempty"`
|
|
||||||
UsePrivatePtrResolvers *bool `json:"use_private_ptr_resolvers,omitempty"`
|
// UpstreamMode Upstream modes enumeration.
|
||||||
|
UpstreamMode *DNSConfigUpstreamMode `json:"upstream_mode,omitempty"`
|
||||||
|
|
||||||
|
// UpstreamTimeout The number of seconds to wait for a response from the upstream server
|
||||||
|
UpstreamTimeout *int `json:"upstream_timeout,omitempty"`
|
||||||
|
UsePrivatePtrResolvers *bool `json:"use_private_ptr_resolvers,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// DNSConfigBlockingMode defines model for DNSConfig.BlockingMode.
|
// DNSConfigBlockingMode defines model for DNSConfig.BlockingMode.
|
||||||
type DNSConfigBlockingMode string
|
type DNSConfigBlockingMode string
|
||||||
|
|
||||||
|
// DNSConfigUpstreamMode Upstream modes enumeration.
|
||||||
|
type DNSConfigUpstreamMode string
|
||||||
|
|
||||||
// DayRange The single interval within a day. It begins at the `start` and ends before the `end`.
|
// DayRange The single interval within a day. It begins at the `start` and ends before the `end`.
|
||||||
type DayRange struct {
|
type DayRange struct {
|
||||||
// End The number of milliseconds elapsed from the start of a day. It is expected to be rounded to minutes. The maximum value is `86400000` (24 hours).
|
// End The number of milliseconds elapsed from the start of a day. It is expected to be rounded to minutes. The maximum value is `86400000` (24 hours).
|
||||||
@@ -686,11 +748,18 @@ type Login struct {
|
|||||||
// NetInterface Network interface info
|
// NetInterface Network interface info
|
||||||
type NetInterface struct {
|
type NetInterface struct {
|
||||||
// Flags Flags could be any combination of the following values, divided by the "|" character: "up", "broadcast", "loopback", "pointtopoint" and "multicast".
|
// Flags Flags could be any combination of the following values, divided by the "|" character: "up", "broadcast", "loopback", "pointtopoint" and "multicast".
|
||||||
Flags string `json:"flags"`
|
Flags string `json:"flags"`
|
||||||
HardwareAddress string `json:"hardware_address"`
|
|
||||||
IpAddresses *[]string `json:"ip_addresses,omitempty"`
|
// GatewayIp The IP address of the gateway.
|
||||||
Mtu int `json:"mtu"`
|
GatewayIp string `json:"gateway_ip"`
|
||||||
Name string `json:"name"`
|
HardwareAddress string `json:"hardware_address"`
|
||||||
|
|
||||||
|
// Ipv4Addresses The addresses of the interface of v4 family.
|
||||||
|
Ipv4Addresses []string `json:"ipv4_addresses"`
|
||||||
|
|
||||||
|
// Ipv6Addresses The addresses of the interface of v6 family.
|
||||||
|
Ipv6Addresses []string `json:"ipv6_addresses"`
|
||||||
|
Name string `json:"name"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// NetInterfaces Network interfaces dictionary, keys are interface names.
|
// NetInterfaces Network interfaces dictionary, keys are interface names.
|
||||||
@@ -752,8 +821,8 @@ type QueryLogItem struct {
|
|||||||
ClientId *string `json:"client_id,omitempty"`
|
ClientId *string `json:"client_id,omitempty"`
|
||||||
|
|
||||||
// ClientInfo Client information for a query log item.
|
// ClientInfo Client information for a query log item.
|
||||||
ClientInfo *QueryLogItemClient `json:"client_info,omitempty"`
|
ClientInfo *QueryLogItemClient `json:"client_info,omitempty"`
|
||||||
ClientProto *interface{} `json:"client_proto,omitempty"`
|
ClientProto *QueryLogItemClientProto `json:"client_proto,omitempty"`
|
||||||
|
|
||||||
// Ecs The IP network defined by an EDNS Client-Subnet option in the request message if any.
|
// Ecs The IP network defined by an EDNS Client-Subnet option in the request message if any.
|
||||||
Ecs *string `json:"ecs,omitempty"`
|
Ecs *string `json:"ecs,omitempty"`
|
||||||
@@ -794,6 +863,9 @@ type QueryLogItem struct {
|
|||||||
Upstream *string `json:"upstream,omitempty"`
|
Upstream *string `json:"upstream,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// QueryLogItemClientProto defines model for QueryLogItem.ClientProto.
|
||||||
|
type QueryLogItemClientProto string
|
||||||
|
|
||||||
// QueryLogItemReason Request filtering status.
|
// QueryLogItemReason Request filtering status.
|
||||||
type QueryLogItemReason string
|
type QueryLogItemReason string
|
||||||
|
|
||||||
@@ -865,6 +937,7 @@ type RewriteUpdate struct {
|
|||||||
type SafeSearchConfig struct {
|
type SafeSearchConfig struct {
|
||||||
Bing *bool `json:"bing,omitempty"`
|
Bing *bool `json:"bing,omitempty"`
|
||||||
Duckduckgo *bool `json:"duckduckgo,omitempty"`
|
Duckduckgo *bool `json:"duckduckgo,omitempty"`
|
||||||
|
Ecosia *bool `json:"ecosia,omitempty"`
|
||||||
Enabled *bool `json:"enabled,omitempty"`
|
Enabled *bool `json:"enabled,omitempty"`
|
||||||
Google *bool `json:"google,omitempty"`
|
Google *bool `json:"google,omitempty"`
|
||||||
Pixabay *bool `json:"pixabay,omitempty"`
|
Pixabay *bool `json:"pixabay,omitempty"`
|
||||||
@@ -928,8 +1001,8 @@ type SetRulesRequest struct {
|
|||||||
type Stats struct {
|
type Stats struct {
|
||||||
// AvgProcessingTime Average time in seconds on processing a DNS request
|
// AvgProcessingTime Average time in seconds on processing a DNS request
|
||||||
AvgProcessingTime *float32 `json:"avg_processing_time,omitempty"`
|
AvgProcessingTime *float32 `json:"avg_processing_time,omitempty"`
|
||||||
BlockedFiltering *[]int `json:"blocked_filtering,omitempty"`
|
BlockedFiltering *[]int `faker:"slice_len=24" json:"blocked_filtering,omitempty"`
|
||||||
DnsQueries *[]int `json:"dns_queries,omitempty"`
|
DnsQueries *[]int `faker:"slice_len=24" json:"dns_queries,omitempty"`
|
||||||
|
|
||||||
// NumBlockedFiltering Number of requests blocked by filtering rules
|
// NumBlockedFiltering Number of requests blocked by filtering rules
|
||||||
NumBlockedFiltering *int `json:"num_blocked_filtering,omitempty"`
|
NumBlockedFiltering *int `json:"num_blocked_filtering,omitempty"`
|
||||||
@@ -945,8 +1018,8 @@ type Stats struct {
|
|||||||
|
|
||||||
// NumReplacedSafesearch Number of requests blocked by safesearch module
|
// NumReplacedSafesearch Number of requests blocked by safesearch module
|
||||||
NumReplacedSafesearch *int `json:"num_replaced_safesearch,omitempty"`
|
NumReplacedSafesearch *int `json:"num_replaced_safesearch,omitempty"`
|
||||||
ReplacedParental *[]int `json:"replaced_parental,omitempty"`
|
ReplacedParental *[]int `faker:"slice_len=24" json:"replaced_parental,omitempty"`
|
||||||
ReplacedSafebrowsing *[]int `json:"replaced_safebrowsing,omitempty"`
|
ReplacedSafebrowsing *[]int `faker:"slice_len=24" json:"replaced_safebrowsing,omitempty"`
|
||||||
|
|
||||||
// TimeUnits Time units
|
// TimeUnits Time units
|
||||||
TimeUnits *StatsTimeUnits `json:"time_units,omitempty"`
|
TimeUnits *StatsTimeUnits `json:"time_units,omitempty"`
|
||||||
@@ -1020,6 +1093,9 @@ type TlsConfig struct {
|
|||||||
// PrivateKeySaved Set to true if the user has previously saved a private key as a string. This is used so that the server and the client don't have to send the private key between each other every time, which might lead to security issues.
|
// PrivateKeySaved Set to true if the user has previously saved a private key as a string. This is used so that the server and the client don't have to send the private key between each other every time, which might lead to security issues.
|
||||||
PrivateKeySaved *bool `json:"private_key_saved,omitempty"`
|
PrivateKeySaved *bool `json:"private_key_saved,omitempty"`
|
||||||
|
|
||||||
|
// ServePlainDns Set to true if plain DNS is allowed for incoming requests.
|
||||||
|
ServePlainDns *bool `json:"serve_plain_dns,omitempty"`
|
||||||
|
|
||||||
// ServerName server_name is the hostname of your HTTPS/TLS server
|
// ServerName server_name is the hostname of your HTTPS/TLS server
|
||||||
ServerName *string `json:"server_name,omitempty"`
|
ServerName *string `json:"server_name,omitempty"`
|
||||||
|
|
||||||
@@ -1123,7 +1199,13 @@ type ClientsFindParams struct {
|
|||||||
// FilteringCheckHostParams defines parameters for FilteringCheckHost.
|
// FilteringCheckHostParams defines parameters for FilteringCheckHost.
|
||||||
type FilteringCheckHostParams struct {
|
type FilteringCheckHostParams struct {
|
||||||
// Name Filter by host name
|
// Name Filter by host name
|
||||||
Name *string `form:"name,omitempty" json:"name,omitempty"`
|
Name string `form:"name" json:"name"`
|
||||||
|
|
||||||
|
// Client Optional ClientID or client IP address
|
||||||
|
Client *string `form:"client,omitempty" json:"client,omitempty"`
|
||||||
|
|
||||||
|
// Qtype Optional DNS type
|
||||||
|
Qtype *string `form:"qtype,omitempty" json:"qtype,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// QueryLogParams defines parameters for QueryLog.
|
// QueryLogParams defines parameters for QueryLog.
|
||||||
@@ -1162,6 +1244,9 @@ type ClientsAddJSONRequestBody = Client
|
|||||||
// ClientsDeleteJSONRequestBody defines body for ClientsDelete for application/json ContentType.
|
// ClientsDeleteJSONRequestBody defines body for ClientsDelete for application/json ContentType.
|
||||||
type ClientsDeleteJSONRequestBody = ClientDelete
|
type ClientsDeleteJSONRequestBody = ClientDelete
|
||||||
|
|
||||||
|
// ClientsSearchJSONRequestBody defines body for ClientsSearch for application/json ContentType.
|
||||||
|
type ClientsSearchJSONRequestBody = ClientsSearchRequest
|
||||||
|
|
||||||
// ClientsUpdateJSONRequestBody defines body for ClientsUpdate for application/json ContentType.
|
// ClientsUpdateJSONRequestBody defines body for ClientsUpdate for application/json ContentType.
|
||||||
type ClientsUpdateJSONRequestBody = ClientUpdate
|
type ClientsUpdateJSONRequestBody = ClientUpdate
|
||||||
|
|
||||||
@@ -1451,6 +1536,11 @@ type ClientInterface interface {
|
|||||||
// ClientsFind request
|
// ClientsFind request
|
||||||
ClientsFind(ctx context.Context, params *ClientsFindParams, reqEditors ...RequestEditorFn) (*http.Response, error)
|
ClientsFind(ctx context.Context, params *ClientsFindParams, reqEditors ...RequestEditorFn) (*http.Response, error)
|
||||||
|
|
||||||
|
// ClientsSearchWithBody request with any body
|
||||||
|
ClientsSearchWithBody(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*http.Response, error)
|
||||||
|
|
||||||
|
ClientsSearch(ctx context.Context, body ClientsSearchJSONRequestBody, reqEditors ...RequestEditorFn) (*http.Response, error)
|
||||||
|
|
||||||
// ClientsUpdateWithBody request with any body
|
// ClientsUpdateWithBody request with any body
|
||||||
ClientsUpdateWithBody(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*http.Response, error)
|
ClientsUpdateWithBody(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*http.Response, error)
|
||||||
|
|
||||||
@@ -1943,6 +2033,30 @@ func (c *AdguardHomeClient) ClientsFind(ctx context.Context, params *ClientsFind
|
|||||||
return c.Client.Do(req)
|
return c.Client.Do(req)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *AdguardHomeClient) ClientsSearchWithBody(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*http.Response, error) {
|
||||||
|
req, err := NewClientsSearchRequestWithBody(c.Server, contentType, body)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
req = req.WithContext(ctx)
|
||||||
|
if err := c.applyEditors(ctx, req, reqEditors); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return c.Client.Do(req)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *AdguardHomeClient) ClientsSearch(ctx context.Context, body ClientsSearchJSONRequestBody, reqEditors ...RequestEditorFn) (*http.Response, error) {
|
||||||
|
req, err := NewClientsSearchRequest(c.Server, body)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
req = req.WithContext(ctx)
|
||||||
|
if err := c.applyEditors(ctx, req, reqEditors); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return c.Client.Do(req)
|
||||||
|
}
|
||||||
|
|
||||||
func (c *AdguardHomeClient) ClientsUpdateWithBody(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*http.Response, error) {
|
func (c *AdguardHomeClient) ClientsUpdateWithBody(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*http.Response, error) {
|
||||||
req, err := NewClientsUpdateRequestWithBody(c.Server, contentType, body)
|
req, err := NewClientsUpdateRequestWithBody(c.Server, contentType, body)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -3631,6 +3745,46 @@ func NewClientsFindRequest(server string, params *ClientsFindParams) (*http.Requ
|
|||||||
return req, nil
|
return req, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewClientsSearchRequest calls the generic ClientsSearch builder with application/json body
|
||||||
|
func NewClientsSearchRequest(server string, body ClientsSearchJSONRequestBody) (*http.Request, error) {
|
||||||
|
var bodyReader io.Reader
|
||||||
|
buf, err := json.Marshal(body)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
bodyReader = bytes.NewReader(buf)
|
||||||
|
return NewClientsSearchRequestWithBody(server, "application/json", bodyReader)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewClientsSearchRequestWithBody generates requests for ClientsSearch with any type of body
|
||||||
|
func NewClientsSearchRequestWithBody(server string, contentType string, body io.Reader) (*http.Request, error) {
|
||||||
|
var err error
|
||||||
|
|
||||||
|
serverURL, err := url.Parse(server)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
operationPath := fmt.Sprintf("/clients/search")
|
||||||
|
if operationPath[0] == '/' {
|
||||||
|
operationPath = "." + operationPath
|
||||||
|
}
|
||||||
|
|
||||||
|
queryURL, err := serverURL.Parse(operationPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
req, err := http.NewRequest("POST", queryURL.String(), body)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
req.Header.Add("Content-Type", contentType)
|
||||||
|
|
||||||
|
return req, nil
|
||||||
|
}
|
||||||
|
|
||||||
// NewClientsUpdateRequest calls the generic ClientsUpdate builder with application/json body
|
// NewClientsUpdateRequest calls the generic ClientsUpdate builder with application/json body
|
||||||
func NewClientsUpdateRequest(server string, body ClientsUpdateJSONRequestBody) (*http.Request, error) {
|
func NewClientsUpdateRequest(server string, body ClientsUpdateJSONRequestBody) (*http.Request, error) {
|
||||||
var bodyReader io.Reader
|
var bodyReader io.Reader
|
||||||
@@ -4108,9 +4262,37 @@ func NewFilteringCheckHostRequest(server string, params *FilteringCheckHostParam
|
|||||||
if params != nil {
|
if params != nil {
|
||||||
queryValues := queryURL.Query()
|
queryValues := queryURL.Query()
|
||||||
|
|
||||||
if params.Name != nil {
|
if queryFrag, err := runtime.StyleParamWithLocation("form", true, "name", runtime.ParamLocationQuery, params.Name); err != nil {
|
||||||
|
return nil, err
|
||||||
|
} else if parsed, err := url.ParseQuery(queryFrag); err != nil {
|
||||||
|
return nil, err
|
||||||
|
} else {
|
||||||
|
for k, v := range parsed {
|
||||||
|
for _, v2 := range v {
|
||||||
|
queryValues.Add(k, v2)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if queryFrag, err := runtime.StyleParamWithLocation("form", true, "name", runtime.ParamLocationQuery, *params.Name); err != nil {
|
if params.Client != nil {
|
||||||
|
|
||||||
|
if queryFrag, err := runtime.StyleParamWithLocation("form", true, "client", runtime.ParamLocationQuery, *params.Client); err != nil {
|
||||||
|
return nil, err
|
||||||
|
} else if parsed, err := url.ParseQuery(queryFrag); err != nil {
|
||||||
|
return nil, err
|
||||||
|
} else {
|
||||||
|
for k, v := range parsed {
|
||||||
|
for _, v2 := range v {
|
||||||
|
queryValues.Add(k, v2)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
if params.Qtype != nil {
|
||||||
|
|
||||||
|
if queryFrag, err := runtime.StyleParamWithLocation("form", true, "qtype", runtime.ParamLocationQuery, *params.Qtype); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
} else if parsed, err := url.ParseQuery(queryFrag); err != nil {
|
} else if parsed, err := url.ParseQuery(queryFrag); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@@ -5941,6 +6123,11 @@ type ClientWithResponsesInterface interface {
|
|||||||
// ClientsFindWithResponse request
|
// ClientsFindWithResponse request
|
||||||
ClientsFindWithResponse(ctx context.Context, params *ClientsFindParams, reqEditors ...RequestEditorFn) (*ClientsFindResp, error)
|
ClientsFindWithResponse(ctx context.Context, params *ClientsFindParams, reqEditors ...RequestEditorFn) (*ClientsFindResp, error)
|
||||||
|
|
||||||
|
// ClientsSearchWithBodyWithResponse request with any body
|
||||||
|
ClientsSearchWithBodyWithResponse(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*ClientsSearchResp, error)
|
||||||
|
|
||||||
|
ClientsSearchWithResponse(ctx context.Context, body ClientsSearchJSONRequestBody, reqEditors ...RequestEditorFn) (*ClientsSearchResp, error)
|
||||||
|
|
||||||
// ClientsUpdateWithBodyWithResponse request with any body
|
// ClientsUpdateWithBodyWithResponse request with any body
|
||||||
ClientsUpdateWithBodyWithResponse(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*ClientsUpdateResp, error)
|
ClientsUpdateWithBodyWithResponse(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*ClientsUpdateResp, error)
|
||||||
|
|
||||||
@@ -6517,6 +6704,28 @@ func (r ClientsFindResp) StatusCode() int {
|
|||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type ClientsSearchResp struct {
|
||||||
|
Body []byte
|
||||||
|
HTTPResponse *http.Response
|
||||||
|
JSON200 *ClientsFindResponse
|
||||||
|
}
|
||||||
|
|
||||||
|
// Status returns HTTPResponse.Status
|
||||||
|
func (r ClientsSearchResp) Status() string {
|
||||||
|
if r.HTTPResponse != nil {
|
||||||
|
return r.HTTPResponse.Status
|
||||||
|
}
|
||||||
|
return http.StatusText(0)
|
||||||
|
}
|
||||||
|
|
||||||
|
// StatusCode returns HTTPResponse.StatusCode
|
||||||
|
func (r ClientsSearchResp) StatusCode() int {
|
||||||
|
if r.HTTPResponse != nil {
|
||||||
|
return r.HTTPResponse.StatusCode
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
type ClientsUpdateResp struct {
|
type ClientsUpdateResp struct {
|
||||||
Body []byte
|
Body []byte
|
||||||
HTTPResponse *http.Response
|
HTTPResponse *http.Response
|
||||||
@@ -8056,6 +8265,23 @@ func (c *ClientWithResponses) ClientsFindWithResponse(ctx context.Context, param
|
|||||||
return ParseClientsFindResp(rsp)
|
return ParseClientsFindResp(rsp)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ClientsSearchWithBodyWithResponse request with arbitrary body returning *ClientsSearchResp
|
||||||
|
func (c *ClientWithResponses) ClientsSearchWithBodyWithResponse(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*ClientsSearchResp, error) {
|
||||||
|
rsp, err := c.ClientsSearchWithBody(ctx, contentType, body, reqEditors...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return ParseClientsSearchResp(rsp)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *ClientWithResponses) ClientsSearchWithResponse(ctx context.Context, body ClientsSearchJSONRequestBody, reqEditors ...RequestEditorFn) (*ClientsSearchResp, error) {
|
||||||
|
rsp, err := c.ClientsSearch(ctx, body, reqEditors...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return ParseClientsSearchResp(rsp)
|
||||||
|
}
|
||||||
|
|
||||||
// ClientsUpdateWithBodyWithResponse request with arbitrary body returning *ClientsUpdateResp
|
// ClientsUpdateWithBodyWithResponse request with arbitrary body returning *ClientsUpdateResp
|
||||||
func (c *ClientWithResponses) ClientsUpdateWithBodyWithResponse(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*ClientsUpdateResp, error) {
|
func (c *ClientWithResponses) ClientsUpdateWithBodyWithResponse(ctx context.Context, contentType string, body io.Reader, reqEditors ...RequestEditorFn) (*ClientsUpdateResp, error) {
|
||||||
rsp, err := c.ClientsUpdateWithBody(ctx, contentType, body, reqEditors...)
|
rsp, err := c.ClientsUpdateWithBody(ctx, contentType, body, reqEditors...)
|
||||||
@@ -9201,6 +9427,32 @@ func ParseClientsFindResp(rsp *http.Response) (*ClientsFindResp, error) {
|
|||||||
return response, nil
|
return response, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ParseClientsSearchResp parses an HTTP response from a ClientsSearchWithResponse call
|
||||||
|
func ParseClientsSearchResp(rsp *http.Response) (*ClientsSearchResp, error) {
|
||||||
|
bodyBytes, err := io.ReadAll(rsp.Body)
|
||||||
|
defer func() { _ = rsp.Body.Close() }()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
response := &ClientsSearchResp{
|
||||||
|
Body: bodyBytes,
|
||||||
|
HTTPResponse: rsp,
|
||||||
|
}
|
||||||
|
|
||||||
|
switch {
|
||||||
|
case strings.Contains(rsp.Header.Get("Content-Type"), "json") && rsp.StatusCode == 200:
|
||||||
|
var dest ClientsFindResponse
|
||||||
|
if err := json.Unmarshal(bodyBytes, &dest); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
response.JSON200 = &dest
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
return response, nil
|
||||||
|
}
|
||||||
|
|
||||||
// ParseClientsUpdateResp parses an HTTP response from a ClientsUpdateWithResponse call
|
// ParseClientsUpdateResp parses an HTTP response from a ClientsUpdateWithResponse call
|
||||||
func ParseClientsUpdateResp(rsp *http.Response) (*ClientsUpdateResp, error) {
|
func ParseClientsUpdateResp(rsp *http.Response) (*ClientsUpdateResp, error) {
|
||||||
bodyBytes, err := io.ReadAll(rsp.Body)
|
bodyBytes, err := io.ReadAll(rsp.Body)
|
||||||
|
|||||||
104
pkg/client/model/model_private_test.go
Normal file
104
pkg/client/model/model_private_test.go
Normal file
@@ -0,0 +1,104 @@
|
|||||||
|
package model
|
||||||
|
|
||||||
|
import (
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
"github.com/onsi/gomega"
|
||||||
|
"go.uber.org/zap"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("Types", func() {
|
||||||
|
Context("DhcpConfigV4", func() {
|
||||||
|
DescribeTable("DhcpConfigV4 should not be valid",
|
||||||
|
func(v4 DhcpConfigV4) {
|
||||||
|
gomega.Ω(v4.isValid()).Should(gomega.BeFalse())
|
||||||
|
},
|
||||||
|
Entry(`When GatewayIp is nil`, DhcpConfigV4{
|
||||||
|
GatewayIp: nil,
|
||||||
|
SubnetMask: utils.Ptr("2.2.2.2"),
|
||||||
|
RangeStart: utils.Ptr("3.3.3.3"),
|
||||||
|
RangeEnd: utils.Ptr("4.4.4.4"),
|
||||||
|
}),
|
||||||
|
Entry(`When GatewayIp is ""`, DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr(""),
|
||||||
|
SubnetMask: utils.Ptr("2.2.2.2"),
|
||||||
|
RangeStart: utils.Ptr("3.3.3.3"),
|
||||||
|
RangeEnd: utils.Ptr("4.4.4.4"),
|
||||||
|
}),
|
||||||
|
Entry(`When SubnetMask is nil`, DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr("1.1.1.1"),
|
||||||
|
SubnetMask: nil,
|
||||||
|
RangeStart: utils.Ptr("3.3.3.3"),
|
||||||
|
RangeEnd: utils.Ptr("4.4.4.4"),
|
||||||
|
}),
|
||||||
|
Entry(`When SubnetMask is ""`, DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr("1.1.1.1"),
|
||||||
|
SubnetMask: utils.Ptr(""),
|
||||||
|
RangeStart: utils.Ptr("3.3.3.3"),
|
||||||
|
RangeEnd: utils.Ptr("4.4.4.4"),
|
||||||
|
}),
|
||||||
|
Entry(`When SubnetMask is nil`, DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr("1.1.1.1"),
|
||||||
|
SubnetMask: utils.Ptr("2.2.2.2"),
|
||||||
|
RangeStart: nil,
|
||||||
|
RangeEnd: utils.Ptr("4.4.4.4"),
|
||||||
|
}),
|
||||||
|
Entry(`When SubnetMask is ""`, DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr("1.1.1.1"),
|
||||||
|
SubnetMask: utils.Ptr("2.2.2.2"),
|
||||||
|
RangeStart: utils.Ptr(""),
|
||||||
|
RangeEnd: utils.Ptr("4.4.4.4"),
|
||||||
|
}),
|
||||||
|
Entry(`When RangeEnd is nil`, DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr("1.1.1.1"),
|
||||||
|
SubnetMask: utils.Ptr("2.2.2.2"),
|
||||||
|
RangeStart: utils.Ptr("3.3.3.3"),
|
||||||
|
RangeEnd: nil,
|
||||||
|
}),
|
||||||
|
Entry(`When RangeEnd is ""`, DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr("1.1.1.1"),
|
||||||
|
SubnetMask: utils.Ptr("2.2.2.2"),
|
||||||
|
RangeStart: utils.Ptr("3.3.3.3"),
|
||||||
|
RangeEnd: utils.Ptr(""),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
})
|
||||||
|
Context("DhcpConfigV6", func() {
|
||||||
|
DescribeTable("DhcpConfigV6 should not be valid",
|
||||||
|
func(v6 DhcpConfigV6) {
|
||||||
|
gomega.Ω(v6.isValid()).Should(gomega.BeFalse())
|
||||||
|
},
|
||||||
|
Entry(`When SubnetMask is nil`, DhcpConfigV6{RangeStart: nil}),
|
||||||
|
Entry(`When SubnetMask is ""`, DhcpConfigV6{RangeStart: utils.Ptr("")}),
|
||||||
|
)
|
||||||
|
})
|
||||||
|
Context("DNSConfig", func() {
|
||||||
|
var (
|
||||||
|
cfg *DNSConfig
|
||||||
|
l *zap.SugaredLogger
|
||||||
|
)
|
||||||
|
|
||||||
|
BeforeEach(func() {
|
||||||
|
cfg = &DNSConfig{
|
||||||
|
UsePrivatePtrResolvers: utils.Ptr(true),
|
||||||
|
}
|
||||||
|
l = log.GetLogger("test")
|
||||||
|
})
|
||||||
|
Context("Sanitize", func() {
|
||||||
|
It("should disable UsePrivatePtrResolvers resolvers is nil ", func() {
|
||||||
|
cfg.LocalPtrUpstreams = nil
|
||||||
|
cfg.Sanitize(l)
|
||||||
|
gomega.Ω(cfg.UsePrivatePtrResolvers).ShouldNot(gomega.BeNil())
|
||||||
|
gomega.Ω(*cfg.UsePrivatePtrResolvers).Should(gomega.Equal(false))
|
||||||
|
})
|
||||||
|
It("should disable UsePrivatePtrResolvers resolvers is empty ", func() {
|
||||||
|
cfg.LocalPtrUpstreams = utils.Ptr([]string{})
|
||||||
|
cfg.Sanitize(l)
|
||||||
|
gomega.Ω(cfg.UsePrivatePtrResolvers).ShouldNot(gomega.BeNil())
|
||||||
|
gomega.Ω(*cfg.UsePrivatePtrResolvers).Should(gomega.Equal(false))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
@@ -4,12 +4,13 @@ import (
|
|||||||
"encoding/json"
|
"encoding/json"
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/types"
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/utils"
|
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
. "github.com/onsi/ginkgo/v2"
|
. "github.com/onsi/ginkgo/v2"
|
||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = Describe("Types", func() {
|
var _ = Describe("Types", func() {
|
||||||
@@ -115,12 +116,12 @@ var _ = Describe("Types", func() {
|
|||||||
Context("QueryLogConfig", func() {
|
Context("QueryLogConfig", func() {
|
||||||
Context("Equal", func() {
|
Context("Equal", func() {
|
||||||
var (
|
var (
|
||||||
a *model.QueryLogConfig
|
a *model.QueryLogConfigWithIgnored
|
||||||
b *model.QueryLogConfig
|
b *model.QueryLogConfigWithIgnored
|
||||||
)
|
)
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
a = &model.QueryLogConfig{}
|
a = &model.QueryLogConfigWithIgnored{}
|
||||||
b = &model.QueryLogConfig{}
|
b = &model.QueryLogConfigWithIgnored{}
|
||||||
})
|
})
|
||||||
It("should be equal", func() {
|
It("should be equal", func() {
|
||||||
a.Enabled = utils.Ptr(true)
|
a.Enabled = utils.Ptr(true)
|
||||||
@@ -242,7 +243,10 @@ var _ = Describe("Types", func() {
|
|||||||
})
|
})
|
||||||
It("should return 3 one replicas if urls are different", func() {
|
It("should return 3 one replicas if urls are different", func() {
|
||||||
cfg.Replica = &types.AdGuardInstance{URL: url, APIPath: apiPath}
|
cfg.Replica = &types.AdGuardInstance{URL: url, APIPath: apiPath}
|
||||||
cfg.Replicas = []types.AdGuardInstance{{URL: url + "1", APIPath: apiPath}, {URL: url, APIPath: apiPath + "1"}}
|
cfg.Replicas = []types.AdGuardInstance{
|
||||||
|
{URL: url + "1", APIPath: apiPath},
|
||||||
|
{URL: url, APIPath: apiPath + "1"},
|
||||||
|
}
|
||||||
r := cfg.UniqueReplicas()
|
r := cfg.UniqueReplicas()
|
||||||
Ω(r).Should(HaveLen(3))
|
Ω(r).Should(HaveLen(3))
|
||||||
})
|
})
|
||||||
@@ -303,6 +307,29 @@ var _ = Describe("Types", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
Context("Client", func() {
|
||||||
|
Context("Equals", func() {
|
||||||
|
var (
|
||||||
|
cl1 *model.Client
|
||||||
|
cl2 *model.Client
|
||||||
|
)
|
||||||
|
BeforeEach(func() {
|
||||||
|
cl1 = &model.Client{
|
||||||
|
Name: utils.Ptr("foo"),
|
||||||
|
BlockedServicesSchedule: &model.Schedule{TimeZone: utils.Ptr("UTC")},
|
||||||
|
}
|
||||||
|
cl2 = &model.Client{
|
||||||
|
Name: utils.Ptr("foo"),
|
||||||
|
BlockedServicesSchedule: &model.Schedule{TimeZone: utils.Ptr("Local")},
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
It("should equal if only timezone differs on empty blocked service schedule", func() {
|
||||||
|
Ω(cl1.Equals(cl2)).Should(BeTrue())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
Context("BlockedServices", func() {
|
Context("BlockedServices", func() {
|
||||||
Context("Equals", func() {
|
Context("Equals", func() {
|
||||||
It("should be equal", func() {
|
It("should be equal", func() {
|
||||||
@@ -403,7 +430,29 @@ var _ = Describe("Types", func() {
|
|||||||
}
|
}
|
||||||
Ω(dc1.HasConfig()).Should(BeFalse())
|
Ω(dc1.HasConfig()).Should(BeFalse())
|
||||||
})
|
})
|
||||||
It("should not have a v4 config", func() {
|
It("should not have a v4 config with nil IP", func() {
|
||||||
|
dc1 := &model.DhcpStatus{
|
||||||
|
V4: &model.DhcpConfigV4{
|
||||||
|
GatewayIp: nil,
|
||||||
|
},
|
||||||
|
V6: &model.DhcpConfigV6{
|
||||||
|
RangeStart: utils.Ptr("1.2.3.5"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
Ω(dc1.HasConfig()).Should(BeTrue())
|
||||||
|
})
|
||||||
|
It("should not have a v4 config with empty IP", func() {
|
||||||
|
dc1 := &model.DhcpStatus{
|
||||||
|
V4: &model.DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr(""),
|
||||||
|
},
|
||||||
|
V6: &model.DhcpConfigV6{
|
||||||
|
RangeStart: utils.Ptr("1.2.3.5"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
Ω(dc1.HasConfig()).Should(BeTrue())
|
||||||
|
})
|
||||||
|
It("should not have a v6 config", func() {
|
||||||
dc1 := &model.DhcpStatus{
|
dc1 := &model.DhcpStatus{
|
||||||
V4: &model.DhcpConfigV4{
|
V4: &model.DhcpConfigV4{
|
||||||
GatewayIp: utils.Ptr("1.2.3.4"),
|
GatewayIp: utils.Ptr("1.2.3.4"),
|
||||||
@@ -416,15 +465,6 @@ var _ = Describe("Types", func() {
|
|||||||
}
|
}
|
||||||
Ω(dc1.HasConfig()).Should(BeTrue())
|
Ω(dc1.HasConfig()).Should(BeTrue())
|
||||||
})
|
})
|
||||||
It("should not have a v6 config", func() {
|
|
||||||
dc1 := &model.DhcpStatus{
|
|
||||||
V4: &model.DhcpConfigV4{},
|
|
||||||
V6: &model.DhcpConfigV6{
|
|
||||||
RangeStart: utils.Ptr("1.2.3.5"),
|
|
||||||
},
|
|
||||||
}
|
|
||||||
Ω(dc1.HasConfig()).Should(BeTrue())
|
|
||||||
})
|
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|||||||
178
pkg/config/config-schema.json
Normal file
178
pkg/config/config-schema.json
Normal file
@@ -0,0 +1,178 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"additionalProperties": false,
|
||||||
|
"definitions": {
|
||||||
|
"Instance": {
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"apiPath": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"autoSetup": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"cookie": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"dhcpServerEnabled": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"insecureSkipVerify": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"interfaceName": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"password": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"url": {
|
||||||
|
"format": "uri",
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"username": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"webURL": {
|
||||||
|
"format": "uri",
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"requestHeaders": {
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"description": "validates only for valid schema. No required fields, as the can be defined via env ars afterwards.",
|
||||||
|
"properties": {
|
||||||
|
"api": {
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"darkMode": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"metrics": {
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"enabled": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"queryLogLimit": {
|
||||||
|
"type": "integer"
|
||||||
|
},
|
||||||
|
"scrapeInterval": {
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"type": "object"
|
||||||
|
},
|
||||||
|
"password": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"port": {
|
||||||
|
"type": "number"
|
||||||
|
},
|
||||||
|
"tls": {
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"certDir": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"certName": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"keyName": {
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"type": "object"
|
||||||
|
},
|
||||||
|
"username": {
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"type": "object"
|
||||||
|
},
|
||||||
|
"continueOnError": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"cron": {
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"features": {
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"clientSettings": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"dhcp": {
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"serverConfig": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"staticLeases": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"type": "object"
|
||||||
|
},
|
||||||
|
"dns": {
|
||||||
|
"additionalProperties": false,
|
||||||
|
"properties": {
|
||||||
|
"accessLists": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"rewrites": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"serverConfig": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"type": "object"
|
||||||
|
},
|
||||||
|
"filters": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"generalSettings": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"queryLogConfig": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"services": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"statsConfig": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"theme": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"type": "object"
|
||||||
|
},
|
||||||
|
"origin": {
|
||||||
|
"$ref": "#/definitions/Instance"
|
||||||
|
},
|
||||||
|
"printConfigOnly": {
|
||||||
|
"type": "boolean"
|
||||||
|
},
|
||||||
|
"replica": {
|
||||||
|
"$ref": "#/definitions/Instance"
|
||||||
|
},
|
||||||
|
"replicas": {
|
||||||
|
"items": {
|
||||||
|
"$ref": "#/definitions/Instance"
|
||||||
|
},
|
||||||
|
"type": "array"
|
||||||
|
},
|
||||||
|
"runOnStart": {
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"title": "adguardhome-sync Configuration",
|
||||||
|
"type": "object"
|
||||||
|
}
|
||||||
131
pkg/config/config.go
Normal file
131
pkg/config/config.go
Normal file
@@ -0,0 +1,131 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"regexp"
|
||||||
|
|
||||||
|
"github.com/caarlos0/env/v11"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
envReplicasURLPattern = regexp.MustCompile(`^REPLICA(\d+)_URL=(.*)`)
|
||||||
|
logger = log.GetLogger("config")
|
||||||
|
)
|
||||||
|
|
||||||
|
type AppConfig struct {
|
||||||
|
cfg *types.Config
|
||||||
|
filePath string
|
||||||
|
content string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ac *AppConfig) PrintConfigOnly() bool {
|
||||||
|
return ac.cfg.PrintConfigOnly
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ac *AppConfig) Get() *types.Config {
|
||||||
|
return ac.cfg
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ac *AppConfig) Init() error {
|
||||||
|
return ac.cfg.Init()
|
||||||
|
}
|
||||||
|
|
||||||
|
func Get(configFile string, flags Flags) (*AppConfig, error) {
|
||||||
|
path, err := configFilePath(configFile)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := validateSchema(path); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg := initialConfig()
|
||||||
|
|
||||||
|
// read yaml config
|
||||||
|
var content string
|
||||||
|
if content, err = readFile(cfg, path); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// overwrite from command flags
|
||||||
|
if err := readFlags(cfg, flags); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// *bool field creates issues when already not nil
|
||||||
|
cfg.Origin.DHCPServerEnabled = nil // origin filed makes no sense to be set.
|
||||||
|
|
||||||
|
// keep previously set value
|
||||||
|
replicaDhcpServer := cfg.Replica.DHCPServerEnabled
|
||||||
|
cfg.Replica.DHCPServerEnabled = nil
|
||||||
|
|
||||||
|
// ignore origin and replicas form env parsing as they are handled separately
|
||||||
|
replicas := cfg.Replicas
|
||||||
|
cfg.Replicas = nil
|
||||||
|
replica := cfg.Replica
|
||||||
|
cfg.Replica = nil
|
||||||
|
origin := cfg.Origin
|
||||||
|
cfg.Origin = nil
|
||||||
|
|
||||||
|
// overwrite from env vars
|
||||||
|
if err := env.Parse(cfg); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if err := env.ParseWithOptions(origin, env.Options{Prefix: "ORIGIN_"}); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if err := env.ParseWithOptions(replica, env.Options{Prefix: "REPLICA_"}); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// restore origin and replica
|
||||||
|
cfg.Origin = origin
|
||||||
|
cfg.Replica = replica
|
||||||
|
cfg.Replicas = replicas
|
||||||
|
|
||||||
|
// if not set from env, use previous value
|
||||||
|
if cfg.Replica.DHCPServerEnabled == nil {
|
||||||
|
cfg.Replica.DHCPServerEnabled = replicaDhcpServer
|
||||||
|
}
|
||||||
|
|
||||||
|
if cfg.Replica != nil &&
|
||||||
|
cfg.Replica.URL == "" &&
|
||||||
|
cfg.Replica.Username == "" {
|
||||||
|
cfg.Replica = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(cfg.Replicas) > 0 && cfg.Replica != nil {
|
||||||
|
return nil, errors.New("mixed replica config in use. " +
|
||||||
|
"Do not use single replica and numbered (list) replica config combined")
|
||||||
|
}
|
||||||
|
|
||||||
|
handleDeprecatedEnvVars(cfg)
|
||||||
|
|
||||||
|
if cfg.Replica != nil {
|
||||||
|
cfg.Replicas = []types.AdGuardInstance{*cfg.Replica}
|
||||||
|
cfg.Replica = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.Replicas, err = enrichReplicasFromEnv(cfg.Replicas)
|
||||||
|
|
||||||
|
return &AppConfig{cfg: cfg, filePath: path, content: content}, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func initialConfig() *types.Config {
|
||||||
|
return &types.Config{
|
||||||
|
RunOnStart: true,
|
||||||
|
Origin: &types.AdGuardInstance{
|
||||||
|
APIPath: "/control",
|
||||||
|
},
|
||||||
|
Replica: &types.AdGuardInstance{
|
||||||
|
APIPath: "/control",
|
||||||
|
},
|
||||||
|
API: types.API{
|
||||||
|
Port: 8080,
|
||||||
|
},
|
||||||
|
Features: types.NewFeatures(true),
|
||||||
|
}
|
||||||
|
}
|
||||||
15
pkg/config/config_suite_test.go
Normal file
15
pkg/config/config_suite_test.go
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
package config_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
"github.com/onsi/gomega/format"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCmd(t *testing.T) {
|
||||||
|
format.TruncatedDiff = false
|
||||||
|
RegisterFailHandler(Fail)
|
||||||
|
RunSpecs(t, "Config Suite")
|
||||||
|
}
|
||||||
270
pkg/config/config_test.go
Normal file
270
pkg/config/config_test.go
Normal file
@@ -0,0 +1,270 @@
|
|||||||
|
package config_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
gm "go.uber.org/mock/gomock"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/config"
|
||||||
|
flagsmock "github.com/bakito/adguardhome-sync/pkg/mocks/flags"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("Config", func() {
|
||||||
|
Context("Get", func() {
|
||||||
|
var (
|
||||||
|
flags *flagsmock.MockFlags
|
||||||
|
mockCtrl *gm.Controller
|
||||||
|
changedEnvVars []string
|
||||||
|
setEnv = func(name, value string) {
|
||||||
|
_ = os.Setenv(name, value)
|
||||||
|
changedEnvVars = append(changedEnvVars, name)
|
||||||
|
}
|
||||||
|
)
|
||||||
|
BeforeEach(func() {
|
||||||
|
mockCtrl = gm.NewController(GinkgoT())
|
||||||
|
flags = flagsmock.NewMockFlags(mockCtrl)
|
||||||
|
changedEnvVars = nil
|
||||||
|
})
|
||||||
|
AfterEach(func() {
|
||||||
|
for _, envVar := range changedEnvVars {
|
||||||
|
_ = os.Unsetenv(envVar)
|
||||||
|
println(envVar)
|
||||||
|
}
|
||||||
|
defer mockCtrl.Finish()
|
||||||
|
})
|
||||||
|
Context("Get", func() {
|
||||||
|
Context("Mixed Config", func() {
|
||||||
|
It("should have the origin URL from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
_, err := config.Get("../../testdata/config_test_replicas_and_replica.yaml", flags)
|
||||||
|
Ω(err).Should(HaveOccurred())
|
||||||
|
Ω(err.Error()).Should(ContainSubstring("mixed replica config in use"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("Env Var Clash", func() {
|
||||||
|
It("should not use USERNAME env variable if it is defined (#570)", func() {
|
||||||
|
incorrect := "ThisIsNotTheCorrectUsername"
|
||||||
|
setEnv("USERNAME", incorrect)
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
c, err := config.Get("../../testdata/config_test_replica.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(c.Get().Origin.Username).ShouldNot(Equal(incorrect))
|
||||||
|
Ω(c.Get().Replicas[0].Username).ShouldNot(Equal(incorrect))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("Origin Url", func() {
|
||||||
|
It("should have the origin URL from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Origin.URL).Should(Equal("https://origin-file:443"))
|
||||||
|
})
|
||||||
|
It("should have the origin URL from the config flags", func() {
|
||||||
|
flags.EXPECT().Changed(config.FlagOriginURL).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetString(config.FlagOriginURL).Return("https://origin-flag:443", nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Origin.URL).Should(Equal("https://origin-flag:443"))
|
||||||
|
})
|
||||||
|
It("should have the origin URL from the config env var", func() {
|
||||||
|
setEnv("ORIGIN_URL", "https://origin-env:443")
|
||||||
|
flags.EXPECT().Changed(config.FlagOriginURL).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetString(config.FlagOriginURL).Return("https://origin-flag:443", nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Origin.URL).Should(Equal("https://origin-env:443"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("Replica insecure skip verify", func() {
|
||||||
|
It("should have the insecure skip verify from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replica.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].InsecureSkipVerify).Should(BeFalse())
|
||||||
|
})
|
||||||
|
It("should have the insecure skip verify from the config flags", func() {
|
||||||
|
flags.EXPECT().Changed(config.FlagReplicaISV).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetBool(config.FlagReplicaISV).Return(true, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replica.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].InsecureSkipVerify).Should(BeTrue())
|
||||||
|
})
|
||||||
|
It("should have the insecure skip verify from the config env var", func() {
|
||||||
|
setEnv("REPLICA_INSECURE_SKIP_VERIFY", "false")
|
||||||
|
flags.EXPECT().Changed(config.FlagReplicaISV).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetBool(config.FlagReplicaISV).Return(true, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replica.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].InsecureSkipVerify).Should(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
Context("Replica 1 insecure skip verify", func() {
|
||||||
|
It("should have the insecure skip verify from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].InsecureSkipVerify).Should(BeFalse())
|
||||||
|
})
|
||||||
|
It("should have the insecure skip verify from the config env var", func() {
|
||||||
|
setEnv("REPLICA1_INSECURE_SKIP_VERIFY", "true")
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].InsecureSkipVerify).Should(BeTrue())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("API Port", func() {
|
||||||
|
It("should have the api port from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().API.Port).Should(Equal(9090))
|
||||||
|
})
|
||||||
|
It("should have the api port from the config flags", func() {
|
||||||
|
flags.EXPECT().Changed(config.FlagAPIPort).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetInt(config.FlagAPIPort).Return(9990, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().API.Port).Should(Equal(9990))
|
||||||
|
})
|
||||||
|
It("should have the api port from the config env var", func() {
|
||||||
|
setEnv("API_PORT", "9999")
|
||||||
|
flags.EXPECT().Changed(config.FlagAPIPort).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetInt(config.FlagAPIPort).Return(9990, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().API.Port).Should(Equal(9999))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
Context("Replica DHCPServerEnabled", func() {
|
||||||
|
It("should have the dhcp server enabled from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replica.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].DHCPServerEnabled).ShouldNot(BeNil())
|
||||||
|
Ω(*cfg.Get().Replicas[0].DHCPServerEnabled).Should(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
Context("Replica 1 DHCPServerEnabled", func() {
|
||||||
|
It("should have the dhcp server enabled from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].DHCPServerEnabled).ShouldNot(BeNil())
|
||||||
|
Ω(*cfg.Get().Replicas[0].DHCPServerEnabled).Should(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("API Port", func() {
|
||||||
|
It("should have the api port from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().API.Port).Should(Equal(9090))
|
||||||
|
})
|
||||||
|
It("should have the api port from the config flags", func() {
|
||||||
|
flags.EXPECT().Changed(config.FlagAPIPort).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetInt(config.FlagAPIPort).Return(9990, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().API.Port).Should(Equal(9990))
|
||||||
|
})
|
||||||
|
It("should have the api port from the config env var", func() {
|
||||||
|
setEnv("API_PORT", "9999")
|
||||||
|
flags.EXPECT().Changed(config.FlagAPIPort).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetInt(config.FlagAPIPort).Return(9990, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().API.Port).Should(Equal(9999))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
Context("Feature DNS Server Config", func() {
|
||||||
|
It("should have the feature dns server config from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Features.DNS.ServerConfig).Should(BeFalse())
|
||||||
|
})
|
||||||
|
It("should have the feature dns server config from the config flags", func() {
|
||||||
|
flags.EXPECT().Changed(config.FlagFeatureDNSServerConfig).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetBool(config.FlagFeatureDNSServerConfig).Return(true, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Features.DNS.ServerConfig).Should(BeTrue())
|
||||||
|
})
|
||||||
|
It("should have the feature dns server config from the config env var", func() {
|
||||||
|
setEnv("FEATURES_DNS_SERVER_CONFIG", "false")
|
||||||
|
flags.EXPECT().Changed(config.FlagFeatureDNSServerConfig).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetBool(config.FlagFeatureDNSServerConfig).Return(true, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Features.DNS.ServerConfig).Should(BeFalse())
|
||||||
|
})
|
||||||
|
It("should have the feature dns server config from the config DEPRECATED env var", func() {
|
||||||
|
setEnv("FEATURES_DNS_SERVERCONFIG", "false")
|
||||||
|
flags.EXPECT().Changed(config.FlagFeatureDNSServerConfig).Return(true).AnyTimes()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
flags.EXPECT().GetBool(config.FlagFeatureDNSServerConfig).Return(true, nil).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Features.DNS.ServerConfig).Should(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
Context("Headers", func() {
|
||||||
|
It("have headers from the config file", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].RequestHeaders).Should(HaveLen(2))
|
||||||
|
Ω(cfg.Get().Replicas[0].RequestHeaders["FOO"]).Should(Equal("bar"))
|
||||||
|
Ω(cfg.Get().Replicas[0].RequestHeaders["Client-ID"]).Should(Equal("xxxx"))
|
||||||
|
})
|
||||||
|
It("have headers from the config file will be replaced when defined as ENV", func() {
|
||||||
|
setEnv("REPLICA1_REQUEST_HEADERS", "AAA:bbb")
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
cfg, err := config.Get("../../testdata/config_test_replicas.yaml", flags)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].RequestHeaders).Should(HaveLen(1))
|
||||||
|
Ω(cfg.Get().Replicas[0].RequestHeaders["AAA"]).Should(Equal("bbb"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
139
pkg/config/deprecated_env_test.go
Normal file
139
pkg/config/deprecated_env_test.go
Normal file
@@ -0,0 +1,139 @@
|
|||||||
|
package config_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/config"
|
||||||
|
)
|
||||||
|
|
||||||
|
var envVars = []string{
|
||||||
|
"FEATURES_GENERAL_SETTINGS",
|
||||||
|
"FEATURES_QUERY_LOG_CONFIG",
|
||||||
|
"FEATURES_STATS_CONFIG",
|
||||||
|
"FEATURES_CLIENT_SETTINGS",
|
||||||
|
"FEATURES_SERVICES",
|
||||||
|
"FEATURES_FILTERS",
|
||||||
|
"FEATURES_THEME",
|
||||||
|
"FEATURES_DHCP_SERVER_CONFIG",
|
||||||
|
"FEATURES_DHCP_STATIC_LEASES",
|
||||||
|
"FEATURES_DNS_SERVER_CONFIG",
|
||||||
|
"FEATURES_DNS_ACCESS_LISTS",
|
||||||
|
"FEATURES_DNS_REWRITES",
|
||||||
|
"REPLICA1_INTERFACE_NAME",
|
||||||
|
"REPLICA1_DHCP_SERVER_ENABLED",
|
||||||
|
}
|
||||||
|
|
||||||
|
var deprecatedEnvVars = []string{
|
||||||
|
"FEATURES_GENERALSETTINGS",
|
||||||
|
"FEATURES_QUERYLOGCONFIG",
|
||||||
|
"FEATURES_STATSCONFIG",
|
||||||
|
"FEATURES_CLIENTSETTINGS",
|
||||||
|
"FEATURES_SERVICES",
|
||||||
|
"FEATURES_FILTERS",
|
||||||
|
"FEATURES_DHCP_SERVERCONFIG",
|
||||||
|
"FEATURES_DHCP_STATICLEASES",
|
||||||
|
"FEATURES_DNS_SERVERCONFIG",
|
||||||
|
"FEATURES_DNS_ACCESSLISTS",
|
||||||
|
"FEATURES_DNS_REWRITES",
|
||||||
|
"REPLICA1_INTERFACENAME",
|
||||||
|
"REPLICA1_DHCPSERVERENABLED",
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ = Describe("Config", func() {
|
||||||
|
Context("deprecated", func() {
|
||||||
|
BeforeEach(func() {
|
||||||
|
for _, envVar := range deprecatedEnvVars {
|
||||||
|
Ω(os.Setenv(envVar, "false")).ShouldNot(HaveOccurred())
|
||||||
|
}
|
||||||
|
})
|
||||||
|
AfterEach(func() {
|
||||||
|
for _, envVar := range deprecatedEnvVars {
|
||||||
|
Ω(os.Unsetenv(envVar)).ShouldNot(HaveOccurred())
|
||||||
|
}
|
||||||
|
})
|
||||||
|
Context("Get", func() {
|
||||||
|
It("features should be false", func() {
|
||||||
|
cfg, err := config.Get("", nil)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
verifyFeatures(cfg, false)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("current", func() {
|
||||||
|
BeforeEach(func() {
|
||||||
|
for _, envVar := range envVars {
|
||||||
|
Ω(os.Unsetenv(envVar)).ShouldNot(HaveOccurred())
|
||||||
|
}
|
||||||
|
})
|
||||||
|
AfterEach(func() {
|
||||||
|
for _, envVar := range envVars {
|
||||||
|
Ω(os.Unsetenv(envVar)).ShouldNot(HaveOccurred())
|
||||||
|
}
|
||||||
|
})
|
||||||
|
Context("Get", func() {
|
||||||
|
It("features should be true by default", func() {
|
||||||
|
cfg, err := config.Get("", nil)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
verifyFeatures(cfg, true)
|
||||||
|
})
|
||||||
|
It("features should be true by default", func() {
|
||||||
|
cfg, err := config.Get("", nil)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
verifyFeatures(cfg, true)
|
||||||
|
})
|
||||||
|
It("features should be false", func() {
|
||||||
|
for _, envVar := range envVars {
|
||||||
|
Ω(os.Setenv(envVar, "false")).ShouldNot(HaveOccurred())
|
||||||
|
}
|
||||||
|
cfg, err := config.Get("", nil)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
verifyFeatures(cfg, false)
|
||||||
|
})
|
||||||
|
Context("interface name", func() {
|
||||||
|
It("should set interface name of replica 1", func() {
|
||||||
|
Ω(os.Setenv("REPLICA1_URL", "https://foo.bar")).ShouldNot(HaveOccurred())
|
||||||
|
Ω(os.Setenv(fmt.Sprintf("REPLICA%s_INTERFACE_NAME", "1"), "eth0")).ShouldNot(HaveOccurred())
|
||||||
|
cfg, err := config.Get("", nil)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].InterfaceName).Should(Equal("eth0"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("dhcp server", func() {
|
||||||
|
It("should enable the dhcp server of replica 1", func() {
|
||||||
|
Ω(os.Setenv("REPLICA1_URL", "https://foo.bar")).ShouldNot(HaveOccurred())
|
||||||
|
Ω(os.Setenv(fmt.Sprintf("REPLICA%s_DHCPSERVERENABLED", "1"), "true")).ShouldNot(HaveOccurred())
|
||||||
|
cfg, err := config.Get("", nil)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].DHCPServerEnabled).ShouldNot(BeNil())
|
||||||
|
Ω(*cfg.Get().Replicas[0].DHCPServerEnabled).Should(BeTrue())
|
||||||
|
})
|
||||||
|
It("should disable the dhcp server of replica 1", func() {
|
||||||
|
Ω(os.Setenv("REPLICA1_URL", "https://foo.bar")).ShouldNot(HaveOccurred())
|
||||||
|
Ω(os.Setenv(fmt.Sprintf("REPLICA%s_DHCPSERVERENABLED", "1"), "false")).ShouldNot(HaveOccurred())
|
||||||
|
cfg, err := config.Get("", nil)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Get().Replicas[0].DHCPServerEnabled).ShouldNot(BeNil())
|
||||||
|
Ω(*cfg.Get().Replicas[0].DHCPServerEnabled).Should(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
func verifyFeatures(cfg *config.AppConfig, value bool) {
|
||||||
|
Ω(cfg.Get().Features.GeneralSettings).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.QueryLogConfig).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.StatsConfig).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.ClientSettings).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.Services).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.Filters).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.DHCP.ServerConfig).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.DHCP.StaticLeases).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.DNS.ServerConfig).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.DNS.AccessLists).Should(Equal(value))
|
||||||
|
Ω(cfg.Get().Features.DNS.Rewrites).Should(Equal(value))
|
||||||
|
}
|
||||||
146
pkg/config/env.go
Normal file
146
pkg/config/env.go
Normal file
@@ -0,0 +1,146 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/caarlos0/env/v11"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
|
)
|
||||||
|
|
||||||
|
func handleDeprecatedEnvVars(cfg *types.Config) {
|
||||||
|
if val, ok := checkDeprecatedEnvVar("RUNONSTART", "RUN_ON_START"); ok {
|
||||||
|
cfg.RunOnStart, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("API_DARKMODE", "API_DARK_MODE"); ok {
|
||||||
|
cfg.API.DarkMode, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("FEATURES_GENERALSETTINGS", "FEATURES_GENERAL_SETTINGS"); ok {
|
||||||
|
cfg.Features.GeneralSettings, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("FEATURES_QUERYLOGCONFIG", "FEATURES_QUERY_LOG_CONFIG"); ok {
|
||||||
|
cfg.Features.QueryLogConfig, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("FEATURES_STATSCONFIG", "FEATURES_STATS_CONFIG"); ok {
|
||||||
|
cfg.Features.StatsConfig, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("FEATURES_CLIENTSETTINGS", "FEATURES_CLIENT_SETTINGS"); ok {
|
||||||
|
cfg.Features.ClientSettings, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("FEATURES_DHCP_SERVERCONFIG", "FEATURES_DHCP_SERVER_CONFIG"); ok {
|
||||||
|
cfg.Features.DHCP.ServerConfig, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("FEATURES_DHCP_STATICLEASES", "FEATURES_DHCP_STATIC_LEASES"); ok {
|
||||||
|
cfg.Features.DHCP.StaticLeases, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("FEATURES_DNS_ACCESSLISTS", "FEATURES_DNS_ACCESS_LISTS"); ok {
|
||||||
|
cfg.Features.DNS.AccessLists, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("FEATURES_DNS_SERVERCONFIG", "FEATURES_DNS_SERVER_CONFIG"); ok {
|
||||||
|
cfg.Features.DNS.ServerConfig, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
|
||||||
|
if cfg.Replica != nil {
|
||||||
|
if val, ok := checkDeprecatedEnvVar("REPLICA_WEBURL", "REPLICA_WEB_URL"); ok {
|
||||||
|
cfg.Replica.WebURL = val
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("REPLICA_AUTOSETUP", "REPLICA_AUTO_SETUP"); ok {
|
||||||
|
cfg.Replica.AutoSetup, _ = strconv.ParseBool(val)
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("REPLICA_INTERFACENAME", "REPLICA_INTERFACE_NAME"); ok {
|
||||||
|
cfg.Replica.InterfaceName = val
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedEnvVar("REPLICA_DHCPSERVERENABLED", "REPLICA_DHCP_SERVER_ENABLED"); ok {
|
||||||
|
if b, err := strconv.ParseBool(val); err != nil {
|
||||||
|
cfg.Replica.DHCPServerEnabled = utils.Ptr(b)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkDeprecatedEnvVar(oldName, newName string) (string, bool) {
|
||||||
|
old, oldOK := os.LookupEnv(oldName)
|
||||||
|
if oldOK {
|
||||||
|
logger.With("deprecated", oldName, "replacement", newName).
|
||||||
|
Warn("Deprecated env variable is used, please use the correct one")
|
||||||
|
}
|
||||||
|
newVal, newOK := os.LookupEnv(newName)
|
||||||
|
if newOK {
|
||||||
|
return newVal, true
|
||||||
|
}
|
||||||
|
return old, oldOK
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkDeprecatedReplicaEnvVar(oldPattern, newPattern string, replicaID int) (string, bool) {
|
||||||
|
return checkDeprecatedEnvVar(fmt.Sprintf(oldPattern, replicaID), fmt.Sprintf(newPattern, replicaID))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Manually collect replicas from env.
|
||||||
|
func enrichReplicasFromEnv(initialReplicas []types.AdGuardInstance) ([]types.AdGuardInstance, error) {
|
||||||
|
var replicas []types.AdGuardInstance
|
||||||
|
for _, v := range os.Environ() {
|
||||||
|
if envReplicasURLPattern.MatchString(v) {
|
||||||
|
sm := envReplicasURLPattern.FindStringSubmatch(v)
|
||||||
|
id, _ := strconv.Atoi(sm[1])
|
||||||
|
|
||||||
|
if id <= 0 {
|
||||||
|
return nil, fmt.Errorf("numbered replica env variables must have a number id >= 1, got %q", v)
|
||||||
|
}
|
||||||
|
|
||||||
|
if id > len(initialReplicas) {
|
||||||
|
replicas = append(replicas, types.AdGuardInstance{URL: sm[2]})
|
||||||
|
} else {
|
||||||
|
re := initialReplicas[id-1]
|
||||||
|
re.URL = sm[2]
|
||||||
|
replicas = append(replicas, re)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(replicas) == 0 {
|
||||||
|
replicas = initialReplicas
|
||||||
|
}
|
||||||
|
|
||||||
|
for i := range replicas {
|
||||||
|
reID := i + 1
|
||||||
|
|
||||||
|
// keep previously set value
|
||||||
|
replicaDhcpServer := replicas[i].DHCPServerEnabled
|
||||||
|
replicas[i].DHCPServerEnabled = nil
|
||||||
|
if err := env.ParseWithOptions(&replicas[i], env.Options{Prefix: fmt.Sprintf("REPLICA%d_", reID)}); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if replicas[i].DHCPServerEnabled == nil {
|
||||||
|
replicas[i].DHCPServerEnabled = replicaDhcpServer
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedReplicaEnvVar("REPLICA%d_APIPATH", "REPLICA%d_API_PATH", reID); ok {
|
||||||
|
replicas[i].APIPath = val
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedReplicaEnvVar("REPLICA%d_INSECURESKIPVERIFY", "REPLICA%d_INSECURE_SKIP_VERIFY", reID); ok {
|
||||||
|
replicas[i].InsecureSkipVerify = strings.EqualFold(val, "true")
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedReplicaEnvVar("REPLICA%d_AUTOSETUP", "REPLICA%d_AUTO_SETUP", reID); ok {
|
||||||
|
replicas[i].AutoSetup = strings.EqualFold(val, "true")
|
||||||
|
}
|
||||||
|
if val, ok := checkDeprecatedReplicaEnvVar("REPLICA%d_INTERFACENAME", "REPLICA%d_INTERFACE_NAME", reID); ok {
|
||||||
|
replicas[i].InterfaceName = val
|
||||||
|
}
|
||||||
|
|
||||||
|
if dhcpEnabled, ok := checkDeprecatedReplicaEnvVar("REPLICA%d_DHCPSERVERENABLED", "REPLICA%d_DHCP_SERVER_ENABLED", reID); ok {
|
||||||
|
if strings.EqualFold(dhcpEnabled, "true") {
|
||||||
|
replicas[i].DHCPServerEnabled = utils.Ptr(true)
|
||||||
|
} else if strings.EqualFold(dhcpEnabled, "false") {
|
||||||
|
replicas[i].DHCPServerEnabled = utils.Ptr(false)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if replicas[i].APIPath == "" {
|
||||||
|
replicas[i].APIPath = "/control"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return replicas, nil
|
||||||
|
}
|
||||||
25
pkg/config/env_test.go
Normal file
25
pkg/config/env_test.go
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("Config", func() {
|
||||||
|
Context("env", func() {
|
||||||
|
Context("enrichReplicasFromEnv", func() {
|
||||||
|
It("should have the origin URL from the config env var", func() {
|
||||||
|
_ = os.Setenv("REPLICA0_URL", "https://origin-env:443")
|
||||||
|
defer func() {
|
||||||
|
_ = os.Unsetenv("REPLICA0_URL")
|
||||||
|
}()
|
||||||
|
_, err := enrichReplicasFromEnv(nil)
|
||||||
|
|
||||||
|
Ω(err).Should(HaveOccurred())
|
||||||
|
Ω(err.Error()).Should(ContainSubstring("numbered replica env variables must have a number id >= 1"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
37
pkg/config/file.go
Normal file
37
pkg/config/file.go
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"gopkg.in/yaml.v3"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func readFile(cfg *types.Config, path string) (string, error) {
|
||||||
|
var content string
|
||||||
|
if _, err := os.Stat(path); err == nil {
|
||||||
|
b, err := os.ReadFile(path)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
content = string(b)
|
||||||
|
if err := yaml.Unmarshal(b, cfg); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return content, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func configFilePath(configFile string) (string, error) {
|
||||||
|
if configFile == "" {
|
||||||
|
// Find home directory.
|
||||||
|
home, err := os.UserHomeDir()
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return filepath.Join(home, ".adguardhome-sync.yaml"), nil
|
||||||
|
}
|
||||||
|
return configFile, nil
|
||||||
|
}
|
||||||
30
pkg/config/file_test.go
Normal file
30
pkg/config/file_test.go
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("Config", func() {
|
||||||
|
Context("configFilePath", func() {
|
||||||
|
It("should return the same value", func() {
|
||||||
|
path := uuid.NewString()
|
||||||
|
result, err := configFilePath(path)
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(result).Should(Equal(path))
|
||||||
|
})
|
||||||
|
It("should the file in HOME dir", func() {
|
||||||
|
home, err := os.UserHomeDir()
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
result, err := configFilePath("")
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(result).Should(Equal(filepath.Join(home, ".adguardhome-sync.yaml")))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
44
pkg/config/flag-names.go
Normal file
44
pkg/config/flag-names.go
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
const (
|
||||||
|
FlagCron = "cron"
|
||||||
|
FlagRunOnStart = "runOnStart"
|
||||||
|
FlagPrintConfigOnly = "printConfigOnly"
|
||||||
|
FlagContinueOnError = "continueOnError"
|
||||||
|
|
||||||
|
FlagAPIPort = "api-port"
|
||||||
|
FlagAPIUsername = "api-username"
|
||||||
|
FlagAPIPassword = "api-password"
|
||||||
|
FlagAPIDarkMode = "api-dark-mode"
|
||||||
|
|
||||||
|
FlagFeatureDhcpServerConfig = "feature-dhcp-server-config"
|
||||||
|
FlagFeatureDhcpStaticLeases = "feature-dhcp-static-leases"
|
||||||
|
FlagFeatureDNSServerConfig = "feature-dns-server-config"
|
||||||
|
FlagFeatureDNSAccessLists = "feature-dns-access-lists"
|
||||||
|
FlagFeatureDNSRewrites = "feature-dns-rewrites"
|
||||||
|
FlagFeatureGeneral = "feature-general-settings"
|
||||||
|
FlagFeatureQueryLog = "feature-query-log-config"
|
||||||
|
FlagFeatureStats = "feature-stats-config"
|
||||||
|
FlagFeatureClient = "feature-client-settings"
|
||||||
|
FlagFeatureServices = "feature-services"
|
||||||
|
FlagFeatureFilters = "feature-filters"
|
||||||
|
|
||||||
|
FlagOriginURL = "origin-url"
|
||||||
|
FlagOriginWebURL = "origin-web-url"
|
||||||
|
FlagOriginAPIPath = "origin-api-path"
|
||||||
|
FlagOriginUsername = "origin-username"
|
||||||
|
|
||||||
|
FlagOriginPassword = "origin-password"
|
||||||
|
FlagOriginCookie = "origin-cookie"
|
||||||
|
FlagOriginISV = "origin-insecure-skip-verify"
|
||||||
|
|
||||||
|
FlagReplicaURL = "replica-url"
|
||||||
|
FlagReplicaWebURL = "replica-web-url"
|
||||||
|
FlagReplicaAPIPath = "replica-api-path"
|
||||||
|
FlagReplicaUsername = "replica-username"
|
||||||
|
FlagReplicaPassword = "replica-password"
|
||||||
|
FlagReplicaCookie = "replica-cookie"
|
||||||
|
FlagReplicaISV = "replica-insecure-skip-verify"
|
||||||
|
FlagReplicaAutoSetup = "replica-auto-setup"
|
||||||
|
FlagReplicaInterfaceName = "replica-interface-name"
|
||||||
|
)
|
||||||
263
pkg/config/flags.go
Normal file
263
pkg/config/flags.go
Normal file
@@ -0,0 +1,263 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func readFlags(cfg *types.Config, flags Flags) error {
|
||||||
|
if flags == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
fr := &flagReader{
|
||||||
|
cfg: cfg,
|
||||||
|
flags: flags,
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := fr.readRootFlags(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := fr.readAPIFlags(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := fr.readFeatureFlags(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := fr.readOriginFlags(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return fr.readReplicaFlags()
|
||||||
|
}
|
||||||
|
|
||||||
|
type flagReader struct {
|
||||||
|
cfg *types.Config
|
||||||
|
flags Flags
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fr *flagReader) readReplicaFlags() error {
|
||||||
|
if err := fr.setStringFlag(FlagReplicaURL, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Replica.URL = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagReplicaWebURL, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Replica.WebURL = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagReplicaAPIPath, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Replica.APIPath = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagReplicaUsername, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Replica.Username = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagReplicaPassword, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Replica.Password = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagReplicaCookie, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Replica.Cookie = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagReplicaISV, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Replica.InsecureSkipVerify = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagReplicaAutoSetup, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Replica.AutoSetup = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return fr.setStringFlag(FlagReplicaInterfaceName, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Replica.InterfaceName = value
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fr *flagReader) readOriginFlags() error {
|
||||||
|
if err := fr.setStringFlag(FlagOriginURL, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Origin.URL = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagOriginWebURL, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Origin.WebURL = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagOriginAPIPath, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Origin.APIPath = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagOriginUsername, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Origin.Username = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagOriginPassword, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Origin.Password = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagOriginCookie, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Origin.Cookie = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return fr.setBoolFlag(FlagOriginISV, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Origin.InsecureSkipVerify = value
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fr *flagReader) readFeatureFlags() error {
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureDhcpServerConfig, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.DHCP.ServerConfig = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureDhcpStaticLeases, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.DHCP.StaticLeases = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureDNSServerConfig, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.DNS.ServerConfig = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureDNSAccessLists, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.DNS.AccessLists = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureDNSRewrites, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.DNS.Rewrites = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureGeneral, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.GeneralSettings = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureQueryLog, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.QueryLogConfig = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureStats, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.StatsConfig = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureClient, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.ClientSettings = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagFeatureServices, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.Services = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return fr.setBoolFlag(FlagFeatureFilters, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.Features.Filters = value
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fr *flagReader) readAPIFlags() error {
|
||||||
|
if err := fr.setIntFlag(FlagAPIPort, func(cgf *types.Config, value int) {
|
||||||
|
fr.cfg.API.Port = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagAPIUsername, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.API.Username = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setStringFlag(FlagAPIPassword, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.API.Password = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return fr.setBoolFlag(FlagAPIDarkMode, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.API.DarkMode = value
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fr *flagReader) readRootFlags() error {
|
||||||
|
if err := fr.setStringFlag(FlagCron, func(cgf *types.Config, value string) {
|
||||||
|
fr.cfg.Cron = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagRunOnStart, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.RunOnStart = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := fr.setBoolFlag(FlagPrintConfigOnly, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.PrintConfigOnly = value
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return fr.setBoolFlag(FlagContinueOnError, func(cgf *types.Config, value bool) {
|
||||||
|
fr.cfg.ContinueOnError = value
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
type Flags interface {
|
||||||
|
Changed(name string) bool
|
||||||
|
GetString(name string) (string, error)
|
||||||
|
GetInt(name string) (int, error)
|
||||||
|
GetBool(name string) (bool, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fr *flagReader) setStringFlag(name string, cb callback[string]) (err error) {
|
||||||
|
if fr.flags.Changed(name) {
|
||||||
|
var value string
|
||||||
|
if value, err = fr.flags.GetString(name); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
cb(fr.cfg, value)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fr *flagReader) setBoolFlag(name string, cb callback[bool]) (err error) {
|
||||||
|
if fr.flags.Changed(name) {
|
||||||
|
var value bool
|
||||||
|
if value, err = fr.flags.GetBool(name); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
cb(fr.cfg, value)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fr *flagReader) setIntFlag(name string, cb callback[int]) (err error) {
|
||||||
|
if fr.flags.Changed(name) {
|
||||||
|
var value int
|
||||||
|
if value, err = fr.flags.GetInt(name); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
cb(fr.cfg, value)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type callback[T any] func(cgf *types.Config, value T)
|
||||||
237
pkg/config/flags_test.go
Normal file
237
pkg/config/flags_test.go
Normal file
@@ -0,0 +1,237 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
gm "go.uber.org/mock/gomock"
|
||||||
|
|
||||||
|
flagsmock "github.com/bakito/adguardhome-sync/pkg/mocks/flags"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("Config", func() {
|
||||||
|
var (
|
||||||
|
cfg *types.Config
|
||||||
|
flags *flagsmock.MockFlags
|
||||||
|
mockCtrl *gm.Controller
|
||||||
|
)
|
||||||
|
BeforeEach(func() {
|
||||||
|
cfg = &types.Config{
|
||||||
|
Origin: &types.AdGuardInstance{},
|
||||||
|
Replica: &types.AdGuardInstance{},
|
||||||
|
Features: types.Features{
|
||||||
|
DNS: types.DNS{
|
||||||
|
AccessLists: true,
|
||||||
|
ServerConfig: true,
|
||||||
|
Rewrites: true,
|
||||||
|
},
|
||||||
|
DHCP: types.DHCP{
|
||||||
|
ServerConfig: true,
|
||||||
|
StaticLeases: true,
|
||||||
|
},
|
||||||
|
GeneralSettings: true,
|
||||||
|
QueryLogConfig: true,
|
||||||
|
StatsConfig: true,
|
||||||
|
ClientSettings: true,
|
||||||
|
Services: true,
|
||||||
|
Filters: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
mockCtrl = gm.NewController(GinkgoT())
|
||||||
|
flags = flagsmock.NewMockFlags(mockCtrl)
|
||||||
|
})
|
||||||
|
AfterEach(func() {
|
||||||
|
defer mockCtrl.Finish()
|
||||||
|
})
|
||||||
|
Context("readFlags", func() {
|
||||||
|
It("should not change the config with nil flags", func() {
|
||||||
|
clone := cfg.DeepCopy()
|
||||||
|
err := readFlags(cfg, nil)
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg).Should(Equal(clone))
|
||||||
|
})
|
||||||
|
It("should not change the config with no changed flags", func() {
|
||||||
|
clone := cfg.DeepCopy()
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
err := readFlags(cfg, flags)
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg).Should(Equal(clone))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("readFeatureFlags", func() {
|
||||||
|
It("should disable all flags", func() {
|
||||||
|
flags.EXPECT().Changed(gm.Any()).DoAndReturn(func(name string) bool {
|
||||||
|
return strings.HasPrefix(name, "feature")
|
||||||
|
}).AnyTimes()
|
||||||
|
flags.EXPECT().GetBool(gm.Any()).Return(false, nil).AnyTimes()
|
||||||
|
err := readFlags(cfg, flags)
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Features).Should(Equal(types.Features{
|
||||||
|
DNS: types.DNS{
|
||||||
|
AccessLists: false,
|
||||||
|
ServerConfig: false,
|
||||||
|
Rewrites: false,
|
||||||
|
},
|
||||||
|
DHCP: types.DHCP{
|
||||||
|
ServerConfig: false,
|
||||||
|
StaticLeases: false,
|
||||||
|
},
|
||||||
|
GeneralSettings: false,
|
||||||
|
QueryLogConfig: false,
|
||||||
|
StatsConfig: false,
|
||||||
|
ClientSettings: false,
|
||||||
|
Services: false,
|
||||||
|
Filters: false,
|
||||||
|
}))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("readAPIFlags", func() {
|
||||||
|
It("should change all values", func() {
|
||||||
|
cfg.API = types.API{
|
||||||
|
Port: 1111,
|
||||||
|
Username: "2222",
|
||||||
|
Password: "3333",
|
||||||
|
DarkMode: false,
|
||||||
|
}
|
||||||
|
flags.EXPECT().Changed(gm.Any()).DoAndReturn(func(name string) bool {
|
||||||
|
return strings.HasPrefix(name, "api")
|
||||||
|
}).AnyTimes()
|
||||||
|
flags.EXPECT().GetInt(FlagAPIPort).Return(9999, nil)
|
||||||
|
flags.EXPECT().GetString(FlagAPIUsername).Return("aaaa", nil)
|
||||||
|
flags.EXPECT().GetString(FlagAPIPassword).Return("bbbb", nil)
|
||||||
|
flags.EXPECT().GetBool(FlagAPIDarkMode).Return(true, nil)
|
||||||
|
err := readFlags(cfg, flags)
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.API).Should(Equal(types.API{
|
||||||
|
Port: 9999,
|
||||||
|
Username: "aaaa",
|
||||||
|
Password: "bbbb",
|
||||||
|
DarkMode: true,
|
||||||
|
}))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("readRootFlags", func() {
|
||||||
|
It("should change all values", func() {
|
||||||
|
cfg.Cron = "*/10 * * * *"
|
||||||
|
cfg.PrintConfigOnly = false
|
||||||
|
cfg.ContinueOnError = false
|
||||||
|
cfg.RunOnStart = false
|
||||||
|
|
||||||
|
flags.EXPECT().Changed(FlagCron).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagRunOnStart).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagPrintConfigOnly).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagContinueOnError).Return(true)
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
flags.EXPECT().GetString(FlagCron).Return("*/30 * * * *", nil)
|
||||||
|
flags.EXPECT().GetBool(FlagRunOnStart).Return(true, nil)
|
||||||
|
flags.EXPECT().GetBool(FlagPrintConfigOnly).Return(true, nil)
|
||||||
|
flags.EXPECT().GetBool(FlagContinueOnError).Return(true, nil)
|
||||||
|
err := readFlags(cfg, flags)
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Cron).Should(Equal("*/30 * * * *"))
|
||||||
|
Ω(cfg.RunOnStart).Should(BeTrue())
|
||||||
|
Ω(cfg.PrintConfigOnly).Should(BeTrue())
|
||||||
|
Ω(cfg.ContinueOnError).Should(BeTrue())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("readOriginFlags", func() {
|
||||||
|
It("should change all values", func() {
|
||||||
|
cfg.Origin = &types.AdGuardInstance{
|
||||||
|
URL: "1",
|
||||||
|
WebURL: "2",
|
||||||
|
APIPath: "3",
|
||||||
|
Username: "4",
|
||||||
|
Password: "5",
|
||||||
|
Cookie: "6",
|
||||||
|
InsecureSkipVerify: false,
|
||||||
|
}
|
||||||
|
|
||||||
|
flags.EXPECT().Changed(FlagOriginURL).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagOriginWebURL).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagOriginAPIPath).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagOriginUsername).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagOriginPassword).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagOriginCookie).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagOriginISV).Return(true)
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
flags.EXPECT().GetString(FlagOriginURL).Return("a", nil)
|
||||||
|
flags.EXPECT().GetString(FlagOriginWebURL).Return("b", nil)
|
||||||
|
flags.EXPECT().GetString(FlagOriginAPIPath).Return("c", nil)
|
||||||
|
flags.EXPECT().GetString(FlagOriginUsername).Return("d", nil)
|
||||||
|
flags.EXPECT().GetString(FlagOriginPassword).Return("e", nil)
|
||||||
|
flags.EXPECT().GetString(FlagOriginCookie).Return("f", nil)
|
||||||
|
flags.EXPECT().GetBool(FlagOriginISV).Return(true, nil)
|
||||||
|
err := readFlags(cfg, flags)
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Origin).Should(Equal(&types.AdGuardInstance{
|
||||||
|
URL: "a",
|
||||||
|
WebURL: "b",
|
||||||
|
APIPath: "c",
|
||||||
|
Username: "d",
|
||||||
|
Password: "e",
|
||||||
|
Cookie: "f",
|
||||||
|
InsecureSkipVerify: true,
|
||||||
|
}))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("readReplicaFlags", func() {
|
||||||
|
It("should change all values", func() {
|
||||||
|
cfg.Replica = &types.AdGuardInstance{
|
||||||
|
URL: "1",
|
||||||
|
WebURL: "2",
|
||||||
|
APIPath: "3",
|
||||||
|
Username: "4",
|
||||||
|
Password: "5",
|
||||||
|
Cookie: "6",
|
||||||
|
InsecureSkipVerify: false,
|
||||||
|
AutoSetup: false,
|
||||||
|
InterfaceName: "7",
|
||||||
|
}
|
||||||
|
|
||||||
|
flags.EXPECT().Changed(FlagReplicaURL).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagReplicaWebURL).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagReplicaAPIPath).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagReplicaUsername).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagReplicaPassword).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagReplicaCookie).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagReplicaISV).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagReplicaAutoSetup).Return(true)
|
||||||
|
flags.EXPECT().Changed(FlagReplicaInterfaceName).Return(true)
|
||||||
|
flags.EXPECT().Changed(gm.Any()).Return(false).AnyTimes()
|
||||||
|
|
||||||
|
flags.EXPECT().GetString(FlagReplicaURL).Return("a", nil)
|
||||||
|
flags.EXPECT().GetString(FlagReplicaWebURL).Return("b", nil)
|
||||||
|
flags.EXPECT().GetString(FlagReplicaAPIPath).Return("c", nil)
|
||||||
|
flags.EXPECT().GetString(FlagReplicaUsername).Return("d", nil)
|
||||||
|
flags.EXPECT().GetString(FlagReplicaPassword).Return("e", nil)
|
||||||
|
flags.EXPECT().GetString(FlagReplicaCookie).Return("f", nil)
|
||||||
|
flags.EXPECT().GetBool(FlagReplicaISV).Return(true, nil)
|
||||||
|
flags.EXPECT().GetBool(FlagReplicaAutoSetup).Return(true, nil)
|
||||||
|
flags.EXPECT().GetString(FlagReplicaInterfaceName).Return("g", nil)
|
||||||
|
err := readFlags(cfg, flags)
|
||||||
|
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Replica).Should(Equal(&types.AdGuardInstance{
|
||||||
|
URL: "a",
|
||||||
|
WebURL: "b",
|
||||||
|
APIPath: "c",
|
||||||
|
Username: "d",
|
||||||
|
Password: "e",
|
||||||
|
Cookie: "f",
|
||||||
|
InsecureSkipVerify: true,
|
||||||
|
AutoSetup: true,
|
||||||
|
InterfaceName: "g",
|
||||||
|
}))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
89
pkg/config/print-config.go
Normal file
89
pkg/config/print-config.go
Normal file
@@ -0,0 +1,89 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
_ "embed"
|
||||||
|
"os"
|
||||||
|
"runtime"
|
||||||
|
"sort"
|
||||||
|
"strings"
|
||||||
|
"text/template"
|
||||||
|
|
||||||
|
"gopkg.in/yaml.v3"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
"github.com/bakito/adguardhome-sync/version"
|
||||||
|
)
|
||||||
|
|
||||||
|
//go:embed print-config.md
|
||||||
|
var printConfigTemplate string
|
||||||
|
|
||||||
|
func (ac *AppConfig) Print() error {
|
||||||
|
originVersion := aghVersion(*ac.cfg.Origin)
|
||||||
|
var replicaVersions []string
|
||||||
|
for _, replica := range ac.cfg.Replicas {
|
||||||
|
replicaVersions = append(replicaVersions, aghVersion(replica))
|
||||||
|
}
|
||||||
|
|
||||||
|
out, err := ac.printInternal(os.Environ(), originVersion, replicaVersions)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.Infof(
|
||||||
|
"Printing adguardhome-sync aggregated config (THE APPLICATION WILL NOT START IN THIS MODE):\n%s",
|
||||||
|
out,
|
||||||
|
)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func aghVersion(i types.AdGuardInstance) string {
|
||||||
|
cl, err := client.New(i)
|
||||||
|
if err != nil {
|
||||||
|
return "N/A"
|
||||||
|
}
|
||||||
|
stats, err := cl.Status()
|
||||||
|
if err != nil {
|
||||||
|
return "N/A"
|
||||||
|
}
|
||||||
|
return stats.Version
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ac *AppConfig) printInternal(env []string, originVersion string, replicaVersions []string) (string, error) {
|
||||||
|
config, err := yaml.Marshal(ac.Get())
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
funcMap := template.FuncMap{
|
||||||
|
// The name "inc" is what the function will be called in the template text.
|
||||||
|
"inc": func(i int) int {
|
||||||
|
return i + 1
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
t, err := template.New("printConfigTemplate").Funcs(funcMap).Parse(printConfigTemplate)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
sort.Strings(env)
|
||||||
|
|
||||||
|
var buf bytes.Buffer
|
||||||
|
|
||||||
|
err = t.Execute(&buf, map[string]any{
|
||||||
|
"Version": version.Version,
|
||||||
|
"Build": version.Build,
|
||||||
|
"OperatingSystem": runtime.GOOS,
|
||||||
|
"Architecture": runtime.GOARCH,
|
||||||
|
"AggregatedConfig": string(config),
|
||||||
|
"ConfigFilePath": ac.filePath,
|
||||||
|
"ConfigFileContent": ac.content,
|
||||||
|
"EnvironmentVariables": strings.Join(env, "\n"),
|
||||||
|
"OriginVersion": originVersion,
|
||||||
|
"ReplicaVersions": replicaVersions,
|
||||||
|
})
|
||||||
|
return buf.String(), err
|
||||||
|
}
|
||||||
36
pkg/config/print-config.md
Normal file
36
pkg/config/print-config.md
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
<!-- PLEASE COPY THE FOLLOWING OUTPUT AS IS INTO THE GITHUB ISSUE (Don't forget to mask your usernames, passwords, IPs and other sensitive information when using this in an issue ) -->
|
||||||
|
|
||||||
|
### Runtime
|
||||||
|
|
||||||
|
AdguardHome-Sync Version: {{ .Version }}
|
||||||
|
Build: {{ .Build }}
|
||||||
|
OperatingSystem: {{ .OperatingSystem }}
|
||||||
|
Architecture: {{ .Architecture }}
|
||||||
|
OriginVersion: {{ .OriginVersion }}
|
||||||
|
ReplicaVersions:
|
||||||
|
{{- range $i,$rep := .ReplicaVersions }}
|
||||||
|
- Replica {{ inc $i }}: {{ $rep }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
### AdGuardHome sync aggregated config
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
{{ .AggregatedConfig }}
|
||||||
|
```
|
||||||
|
{{- if .ConfigFilePath }}
|
||||||
|
### AdGuardHome sync unmodified config file
|
||||||
|
|
||||||
|
Config file path: {{ .ConfigFilePath }}
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
{{ .ConfigFileContent }}
|
||||||
|
```
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
### Environment Variables
|
||||||
|
|
||||||
|
```ini
|
||||||
|
{{ .EnvironmentVariables }}
|
||||||
|
```
|
||||||
|
|
||||||
|
<!-- END OF GITHUB ISSUE CONTENT -->
|
||||||
60
pkg/config/print-config_test.go
Normal file
60
pkg/config/print-config_test.go
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"runtime"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/test/matchers"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
"github.com/bakito/adguardhome-sync/version"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("AppConfig", func() {
|
||||||
|
var (
|
||||||
|
ac *AppConfig
|
||||||
|
env []string
|
||||||
|
)
|
||||||
|
BeforeEach(func() {
|
||||||
|
ac = &AppConfig{
|
||||||
|
cfg: &types.Config{
|
||||||
|
Origin: &types.AdGuardInstance{
|
||||||
|
URL: "https://ha.xxxx.net:3000",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
content: `
|
||||||
|
origin:
|
||||||
|
url: https://ha.xxxx.net:3000
|
||||||
|
`,
|
||||||
|
}
|
||||||
|
env = []string{"FOO=foo", "BAR=bar"}
|
||||||
|
})
|
||||||
|
Context("printInternal", func() {
|
||||||
|
It("should printInternal config without file", func() {
|
||||||
|
out, err := ac.printInternal(env, "v0.0.1", []string{"v0.0.2"})
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(out).
|
||||||
|
Should(matchers.EqualIgnoringLineEndings(fmt.Sprintf(expected(1), version.Version, version.Build, runtime.GOOS, runtime.GOARCH)))
|
||||||
|
})
|
||||||
|
It("should printInternal config with file", func() {
|
||||||
|
ac.filePath = "config.yaml"
|
||||||
|
out, err := ac.printInternal(env, "v0.0.1", []string{"v0.0.2"})
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(out).
|
||||||
|
Should(matchers.EqualIgnoringLineEndings(fmt.Sprintf(expected(2), version.Version, version.Build, runtime.GOOS, runtime.GOARCH)))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
func expected(id int) string {
|
||||||
|
b, err := os.ReadFile(
|
||||||
|
filepath.Join("..", "..", "testdata", "config", fmt.Sprintf("print-config_test_expected%d.md", id)),
|
||||||
|
)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
return string(b)
|
||||||
|
}
|
||||||
59
pkg/config/validate.go
Normal file
59
pkg/config/validate.go
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/santhosh-tekuri/jsonschema/v6"
|
||||||
|
"gopkg.in/yaml.v3"
|
||||||
|
)
|
||||||
|
|
||||||
|
const schemaURL = "config-schema.json"
|
||||||
|
|
||||||
|
//go:embed config-schema.json
|
||||||
|
var schemaData string
|
||||||
|
|
||||||
|
func validateSchema(cfgFile string) error {
|
||||||
|
// ignore if file not exists
|
||||||
|
if _, err := os.Stat(cfgFile); err != nil {
|
||||||
|
// Config file does not exist or is not readable - ignore it
|
||||||
|
//nolint:nilerr
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Load YAML file
|
||||||
|
yamlContent, err := os.ReadFile(cfgFile)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("config file %q is invalid: %w", cfgFile, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return validateYAML(yamlContent)
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateYAML(yamlContent []byte) error {
|
||||||
|
if yamlContent == nil || strings.TrimSpace(string(yamlContent)) == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert YAML to JSON
|
||||||
|
var yamlData any
|
||||||
|
err := yaml.Unmarshal(yamlContent, &yamlData)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load JSON schema
|
||||||
|
sch, err := jsonschema.UnmarshalJSON(strings.NewReader(schemaData))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
c := jsonschema.NewCompiler()
|
||||||
|
if err := c.AddResource(schemaURL, sch); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
schema := c.MustCompile(schemaURL)
|
||||||
|
// validateSchema
|
||||||
|
return schema.Validate(yamlData)
|
||||||
|
}
|
||||||
45
pkg/config/validate_test.go
Normal file
45
pkg/config/validate_test.go
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/go-faker/faker/v4"
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
"gopkg.in/yaml.v3"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("Config", func() {
|
||||||
|
Context("validateSchema", func() {
|
||||||
|
DescribeTable("validateSchema config",
|
||||||
|
func(configFile string, expectFail bool) {
|
||||||
|
err := validateSchema(configFile)
|
||||||
|
if expectFail {
|
||||||
|
Ω(err).Should(HaveOccurred())
|
||||||
|
} else {
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
}
|
||||||
|
},
|
||||||
|
Entry(`Should be valid`, "../../testdata/config/config-valid.yaml", false),
|
||||||
|
Entry(`Should be valid if file doesn't exist`, "../../testdata/config/foo.bar", false),
|
||||||
|
Entry(`Should fail if file is not yaml`, "../../go.mod", true),
|
||||||
|
)
|
||||||
|
It("validate config with all fields randomly populated", func() {
|
||||||
|
cfg := &types.Config{}
|
||||||
|
|
||||||
|
err := faker.FakeData(cfg)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
|
||||||
|
data, err := yaml.Marshal(&cfg)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
|
||||||
|
err = validateYAML(data)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("validate config with empty file", func() {
|
||||||
|
var data []byte
|
||||||
|
err := validateYAML(data)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
@@ -10,6 +10,7 @@ import (
|
|||||||
const (
|
const (
|
||||||
logHistorySize = 50
|
logHistorySize = 50
|
||||||
envLogLevel = "LOG_LEVEL"
|
envLogLevel = "LOG_LEVEL"
|
||||||
|
envLogFormat = "LOG_FORMAT"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@@ -17,7 +18,7 @@ var (
|
|||||||
logs []string
|
logs []string
|
||||||
)
|
)
|
||||||
|
|
||||||
// GetLogger returns a named logger
|
// GetLogger returns a named logger.
|
||||||
func GetLogger(name string) *zap.SugaredLogger {
|
func GetLogger(name string) *zap.SugaredLogger {
|
||||||
return rootLogger.Named(name).Sugar()
|
return rootLogger.Named(name).Sugar()
|
||||||
}
|
}
|
||||||
@@ -31,14 +32,23 @@ func init() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
format := "console"
|
||||||
|
if fmt, ok := os.LookupEnv(envLogFormat); ok {
|
||||||
|
format = fmt
|
||||||
|
}
|
||||||
|
|
||||||
cfg := zap.Config{
|
cfg := zap.Config{
|
||||||
Level: zap.NewAtomicLevelAt(level),
|
Level: zap.NewAtomicLevelAt(level),
|
||||||
Development: false,
|
Development: false,
|
||||||
Encoding: "console",
|
Encoding: format,
|
||||||
EncoderConfig: zap.NewDevelopmentEncoderConfig(),
|
EncoderConfig: zap.NewProductionEncoderConfig(),
|
||||||
OutputPaths: []string{"stdout"},
|
OutputPaths: []string{"stdout"},
|
||||||
ErrorOutputPaths: []string{"stderr"},
|
ErrorOutputPaths: []string{"stderr"},
|
||||||
}
|
}
|
||||||
|
cfg.EncoderConfig.EncodeTime = zapcore.ISO8601TimeEncoder
|
||||||
|
cfg.EncoderConfig.EncodeDuration = zapcore.StringDurationEncoder
|
||||||
|
cfg.EncoderConfig.EncodeLevel = zapcore.CapitalLevelEncoder
|
||||||
|
|
||||||
opt := zap.WrapCore(func(c zapcore.Core) zapcore.Core {
|
opt := zap.WrapCore(func(c zapcore.Core) zapcore.Core {
|
||||||
return zapcore.NewTee(c, &logList{
|
return zapcore.NewTee(c, &logList{
|
||||||
enc: zapcore.NewConsoleEncoder(cfg.EncoderConfig),
|
enc: zapcore.NewConsoleEncoder(cfg.EncoderConfig),
|
||||||
@@ -91,11 +101,16 @@ func (l *logList) Sync() error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Logs get the current logs
|
// Logs get the current logs.
|
||||||
func Logs() []string {
|
func Logs() []string {
|
||||||
return logs
|
return logs
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Clear the current logs.
|
||||||
|
func Clear() {
|
||||||
|
logs = nil
|
||||||
|
}
|
||||||
|
|
||||||
func addFields(enc zapcore.ObjectEncoder, fields []zapcore.Field) {
|
func addFields(enc zapcore.ObjectEncoder, fields []zapcore.Field) {
|
||||||
for i := range fields {
|
for i := range fields {
|
||||||
fields[i].AddTo(enc)
|
fields[i].AddTo(enc)
|
||||||
|
|||||||
14
pkg/metrics/handler.go
Normal file
14
pkg/metrics/handler.go
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
package metrics
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/gin-gonic/gin"
|
||||||
|
"github.com/prometheus/client_golang/prometheus/promhttp"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Handler() gin.HandlerFunc {
|
||||||
|
h := promhttp.Handler()
|
||||||
|
|
||||||
|
return func(c *gin.Context) {
|
||||||
|
h.ServeHTTP(c.Writer, c.Request)
|
||||||
|
}
|
||||||
|
}
|
||||||
297
pkg/metrics/metrics.go
Normal file
297
pkg/metrics/metrics.go
Normal file
@@ -0,0 +1,297 @@
|
|||||||
|
package metrics
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/prometheus/client_golang/prometheus"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
|
)
|
||||||
|
|
||||||
|
const StatsTotal = "total"
|
||||||
|
|
||||||
|
var (
|
||||||
|
l = log.GetLogger("metrics")
|
||||||
|
|
||||||
|
// avgProcessingTime - Average processing time for a DNS query.
|
||||||
|
avgProcessingTime = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "avg_processing_time",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the average processing time for a DNS query in s",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// dnsQueries - Number of DNS queries.
|
||||||
|
dnsQueries = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "num_dns_queries",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "Number of DNS queries",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// blockedFiltering - Number of DNS queries blocked.
|
||||||
|
blockedFiltering = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "num_blocked_filtering",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the number of domains blocked",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// parentalFiltering - Number of DNS queries replaced by parental control.
|
||||||
|
parentalFiltering = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "num_replaced_parental",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the number of domains blocked (parental)",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// safeBrowsingFiltering - Number of DNS queries replaced by safe browsing.
|
||||||
|
safeBrowsingFiltering = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "num_replaced_safebrowsing",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the number of domains blocked (safe browsing)",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// safeSearchFiltering - Number of DNS queries replaced by safe search.
|
||||||
|
safeSearchFiltering = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "num_replaced_safesearch",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the number of domains blocked (safe search)",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// topQueries - The number of top queries.
|
||||||
|
topQueries = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "top_queried_domains",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the top queried domains",
|
||||||
|
},
|
||||||
|
[]string{"hostname", "domain"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// topBlocked - The number of top domains blocked.
|
||||||
|
topBlocked = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "top_blocked_domains",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the top bloacked domains",
|
||||||
|
},
|
||||||
|
[]string{"hostname", "domain"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// topClients - The number of top clients.
|
||||||
|
topClients = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "top_clients",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the top clients",
|
||||||
|
},
|
||||||
|
[]string{"hostname", "client"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// queryTypes - The type of DNS Queries (A, AAAA...)
|
||||||
|
queryTypes = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "query_types",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent the DNS query types",
|
||||||
|
},
|
||||||
|
[]string{"hostname", "type"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// running - If Adguard is running.
|
||||||
|
running = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "running",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent if Adguard is running",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
|
||||||
|
// protectionEnabled - If Adguard protection is enabled.
|
||||||
|
protectionEnabled = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "protection_enabled",
|
||||||
|
Namespace: "adguard",
|
||||||
|
Help: "This represent if Adguard Protection is enabled",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
// aghsSyncDuration - the sync curation in seconds.
|
||||||
|
aghsSyncDuration = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "sync_duration_seconds",
|
||||||
|
Namespace: "adguard_home_sync",
|
||||||
|
Help: "This represents the duration of the last sync in seconds",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
// aghsSyncSuccessful - the sync result.
|
||||||
|
aghsSyncSuccessful = prometheus.NewGaugeVec(
|
||||||
|
prometheus.GaugeOpts{
|
||||||
|
Name: "sync_successful",
|
||||||
|
Namespace: "adguard_home_sync",
|
||||||
|
Help: "This represents the whether the last sync was successful",
|
||||||
|
},
|
||||||
|
[]string{"hostname"},
|
||||||
|
)
|
||||||
|
stats = OverallStats{}
|
||||||
|
)
|
||||||
|
|
||||||
|
// Init initializes all Prometheus metrics made available by AdGuard exporter.
|
||||||
|
func Init() {
|
||||||
|
initMetric("avg_processing_time", avgProcessingTime)
|
||||||
|
initMetric("num_dns_queries", dnsQueries)
|
||||||
|
initMetric("num_blocked_filtering", blockedFiltering)
|
||||||
|
initMetric("num_replaced_parental", parentalFiltering)
|
||||||
|
initMetric("num_replaced_safebrowsing", safeBrowsingFiltering)
|
||||||
|
initMetric("num_replaced_safesearch", safeSearchFiltering)
|
||||||
|
initMetric("top_queried_domains", topQueries)
|
||||||
|
initMetric("top_blocked_domains", topBlocked)
|
||||||
|
initMetric("top_clients", topClients)
|
||||||
|
initMetric("query_types", queryTypes)
|
||||||
|
initMetric("running", running)
|
||||||
|
initMetric("protection_enabled", protectionEnabled)
|
||||||
|
initMetric("sync_duration_seconds", aghsSyncDuration)
|
||||||
|
initMetric("sync_successful", aghsSyncSuccessful)
|
||||||
|
}
|
||||||
|
|
||||||
|
func initMetric(name string, metric *prometheus.GaugeVec) {
|
||||||
|
prometheus.MustRegister(metric)
|
||||||
|
l.With("name", name).Info("New Prometheus metric registered")
|
||||||
|
}
|
||||||
|
|
||||||
|
func UpdateInstances(iml InstanceMetricsList) {
|
||||||
|
for _, im := range iml.Metrics {
|
||||||
|
updateMetrics(im)
|
||||||
|
stats[im.HostName] = im.Stats
|
||||||
|
}
|
||||||
|
|
||||||
|
l.Debug("updated")
|
||||||
|
}
|
||||||
|
|
||||||
|
func UpdateResult(host string, ok bool, duration float64) {
|
||||||
|
if ok {
|
||||||
|
aghsSyncSuccessful.WithLabelValues(host).Set(1)
|
||||||
|
} else {
|
||||||
|
aghsSyncSuccessful.WithLabelValues(host).Set(0)
|
||||||
|
}
|
||||||
|
aghsSyncDuration.WithLabelValues(host).Set(duration)
|
||||||
|
}
|
||||||
|
|
||||||
|
func updateMetrics(im InstanceMetrics) {
|
||||||
|
// Status
|
||||||
|
isRunning := 0
|
||||||
|
if im.Status.Running {
|
||||||
|
isRunning = 1
|
||||||
|
}
|
||||||
|
running.WithLabelValues(im.HostName).Set(float64(isRunning))
|
||||||
|
|
||||||
|
isProtected := 0
|
||||||
|
if im.Status.ProtectionEnabled {
|
||||||
|
isProtected = 1
|
||||||
|
}
|
||||||
|
protectionEnabled.WithLabelValues(im.HostName).Set(float64(isProtected))
|
||||||
|
|
||||||
|
// Stats
|
||||||
|
avgProcessingTime.WithLabelValues(im.HostName).Set(safeMetric(im.Stats.AvgProcessingTime))
|
||||||
|
dnsQueries.WithLabelValues(im.HostName).Set(safeMetric(im.Stats.NumDnsQueries))
|
||||||
|
blockedFiltering.WithLabelValues(im.HostName).Set(safeMetric(im.Stats.NumBlockedFiltering))
|
||||||
|
parentalFiltering.WithLabelValues(im.HostName).Set(safeMetric(im.Stats.NumReplacedParental))
|
||||||
|
safeBrowsingFiltering.WithLabelValues(im.HostName).Set(safeMetric(im.Stats.NumReplacedSafebrowsing))
|
||||||
|
safeSearchFiltering.WithLabelValues(im.HostName).Set(safeMetric(im.Stats.NumReplacedSafesearch))
|
||||||
|
|
||||||
|
if im.Stats.TopQueriedDomains != nil {
|
||||||
|
for _, tq := range *im.Stats.TopQueriedDomains {
|
||||||
|
for domain, value := range tq.AdditionalProperties {
|
||||||
|
topQueries.WithLabelValues(im.HostName, domain).Set(float64(value))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if im.Stats.TopBlockedDomains != nil {
|
||||||
|
for _, tb := range *im.Stats.TopBlockedDomains {
|
||||||
|
for domain, value := range tb.AdditionalProperties {
|
||||||
|
topBlocked.WithLabelValues(im.HostName, domain).Set(float64(value))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if im.Stats.TopClients != nil {
|
||||||
|
for _, tc := range *im.Stats.TopClients {
|
||||||
|
for source, value := range tc.AdditionalProperties {
|
||||||
|
topClients.WithLabelValues(im.HostName, source).Set(float64(value))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// LogQuery
|
||||||
|
m := make(map[string]int)
|
||||||
|
if im.QueryLog != nil && im.QueryLog.Data != nil {
|
||||||
|
logdata := *im.QueryLog.Data
|
||||||
|
for _, ld := range logdata {
|
||||||
|
if ld.Answer != nil {
|
||||||
|
dnsanswer := *ld.Answer
|
||||||
|
if len(dnsanswer) > 0 {
|
||||||
|
for _, dnsa := range dnsanswer {
|
||||||
|
dnsType := *dnsa.Type
|
||||||
|
m[dnsType]++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for key, value := range m {
|
||||||
|
queryTypes.WithLabelValues(im.HostName, key).Set(float64(value))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type InstanceMetricsList struct {
|
||||||
|
Metrics []InstanceMetrics `faker:"slice_len=5"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type InstanceMetrics struct {
|
||||||
|
HostName string
|
||||||
|
Status *model.ServerStatus
|
||||||
|
Stats *model.Stats
|
||||||
|
QueryLog *model.QueryLog
|
||||||
|
}
|
||||||
|
|
||||||
|
type OverallStats map[string]*model.Stats
|
||||||
|
|
||||||
|
func (os OverallStats) consolidate() OverallStats {
|
||||||
|
consolidated := OverallStats{StatsTotal: model.NewStats()}
|
||||||
|
for host, stats := range os {
|
||||||
|
consolidated[host] = stats
|
||||||
|
consolidated[StatsTotal].Add(stats)
|
||||||
|
}
|
||||||
|
return consolidated
|
||||||
|
}
|
||||||
|
|
||||||
|
func safeMetric[T int | float64 | float32](v *T) float64 {
|
||||||
|
if v == nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
return float64(*v)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getStats() OverallStats {
|
||||||
|
return stats.consolidate()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (os OverallStats) Total() *model.Stats {
|
||||||
|
return os[StatsTotal]
|
||||||
|
}
|
||||||
13
pkg/metrics/metrics_suite_test.go
Normal file
13
pkg/metrics/metrics_suite_test.go
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
package metrics_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestSync(t *testing.T) {
|
||||||
|
RegisterFailHandler(Fail)
|
||||||
|
RunSpecs(t, "Metrics Suite")
|
||||||
|
}
|
||||||
102
pkg/metrics/metrics_test.go
Normal file
102
pkg/metrics/metrics_test.go
Normal file
@@ -0,0 +1,102 @@
|
|||||||
|
package metrics
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/go-faker/faker/v4"
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
"k8s.io/utils/ptr"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("Metrics", func() {
|
||||||
|
BeforeEach(func() {
|
||||||
|
stats = make(OverallStats)
|
||||||
|
})
|
||||||
|
Context("UpdateInstances / getStats", func() {
|
||||||
|
It("generate correct stats", func() {
|
||||||
|
UpdateInstances(InstanceMetricsList{[]InstanceMetrics{
|
||||||
|
{HostName: "foo", Status: &model.ServerStatus{}, Stats: &model.Stats{
|
||||||
|
NumDnsQueries: ptr.To(100),
|
||||||
|
DnsQueries: ptr.To(
|
||||||
|
[]int{10, 20, 30, 40, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
|
||||||
|
),
|
||||||
|
}},
|
||||||
|
{HostName: "bar", Status: &model.ServerStatus{}, Stats: &model.Stats{
|
||||||
|
NumDnsQueries: ptr.To(200),
|
||||||
|
DnsQueries: ptr.To(
|
||||||
|
[]int{20, 40, 60, 80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
|
||||||
|
),
|
||||||
|
}},
|
||||||
|
{HostName: "aaa", Status: &model.ServerStatus{}, Stats: &model.Stats{
|
||||||
|
NumDnsQueries: ptr.To(300),
|
||||||
|
DnsQueries: ptr.To(
|
||||||
|
[]int{30, 60, 90, 120, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
|
||||||
|
),
|
||||||
|
}},
|
||||||
|
}})
|
||||||
|
Ω(stats).Should(HaveKey("foo"))
|
||||||
|
Ω(stats["foo"].NumDnsQueries).Should(Equal(ptr.To(100)))
|
||||||
|
Ω(stats).Should(HaveKey("bar"))
|
||||||
|
Ω(stats["bar"].NumDnsQueries).Should(Equal(ptr.To(200)))
|
||||||
|
Ω(stats).Should(HaveKey("aaa"))
|
||||||
|
Ω(stats["aaa"].NumDnsQueries).Should(Equal(ptr.To(300)))
|
||||||
|
|
||||||
|
os := getStats()
|
||||||
|
tot := os.Total()
|
||||||
|
Ω(*tot.NumDnsQueries).Should(Equal(600))
|
||||||
|
Ω(
|
||||||
|
*tot.DnsQueries,
|
||||||
|
).Should(Equal([]int{60, 120, 180, 240, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}))
|
||||||
|
|
||||||
|
foo := os["foo"]
|
||||||
|
bar := os["bar"]
|
||||||
|
aaa := os["aaa"]
|
||||||
|
|
||||||
|
Ω(*foo.NumDnsQueries).Should(Equal(100))
|
||||||
|
Ω(*bar.NumDnsQueries).Should(Equal(200))
|
||||||
|
Ω(*aaa.NumDnsQueries).Should(Equal(300))
|
||||||
|
Ω(
|
||||||
|
*foo.DnsQueries,
|
||||||
|
).Should(Equal([]int{10, 20, 30, 40, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}))
|
||||||
|
Ω(
|
||||||
|
*bar.DnsQueries,
|
||||||
|
).Should(Equal([]int{20, 40, 60, 80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}))
|
||||||
|
Ω(
|
||||||
|
*aaa.DnsQueries,
|
||||||
|
).Should(Equal([]int{30, 60, 90, 120, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("StatsGraph", func() {
|
||||||
|
var metrics InstanceMetricsList
|
||||||
|
BeforeEach(func() {
|
||||||
|
err := faker.FakeData(&metrics)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should provide correct results with faked values", func() {
|
||||||
|
UpdateInstances(metrics)
|
||||||
|
|
||||||
|
_, dns, blocked, malware, adult := StatsGraph()
|
||||||
|
|
||||||
|
verifyStats(dns)
|
||||||
|
verifyStats(blocked)
|
||||||
|
verifyStats(malware)
|
||||||
|
verifyStats(adult)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
func verifyStats(lines []Line) {
|
||||||
|
var total Line
|
||||||
|
sum := make([]int, len(lines[0].Data))
|
||||||
|
for _, l := range lines {
|
||||||
|
if l.Title == labelTotal {
|
||||||
|
total = l
|
||||||
|
} else {
|
||||||
|
for i, d := range l.Data {
|
||||||
|
sum[i] += d
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Ω(sum).Should(Equal(total.Data))
|
||||||
|
}
|
||||||
130
pkg/metrics/stats.go
Normal file
130
pkg/metrics/stats.go
Normal file
@@ -0,0 +1,130 @@
|
|||||||
|
package metrics
|
||||||
|
|
||||||
|
import (
|
||||||
|
"slices"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
|
)
|
||||||
|
|
||||||
|
const labelTotal = "Total"
|
||||||
|
|
||||||
|
var (
|
||||||
|
blue = []int{78, 141, 245}
|
||||||
|
blueAlternatives = [][]int{
|
||||||
|
{44, 95, 163},
|
||||||
|
{122, 166, 247},
|
||||||
|
{30, 61, 92},
|
||||||
|
{93, 158, 255},
|
||||||
|
{58, 123, 213},
|
||||||
|
}
|
||||||
|
|
||||||
|
red = []int{255, 94, 94}
|
||||||
|
redAlternatives = [][]int{
|
||||||
|
{204, 59, 59},
|
||||||
|
{255, 127, 127},
|
||||||
|
{140, 36, 36},
|
||||||
|
{255, 153, 153},
|
||||||
|
{255, 66, 66},
|
||||||
|
}
|
||||||
|
|
||||||
|
yellow = []int{232, 198, 78}
|
||||||
|
yellowAlternatives = [][]int{
|
||||||
|
{196, 163, 60},
|
||||||
|
{255, 220, 110},
|
||||||
|
{140, 114, 36},
|
||||||
|
{250, 233, 156},
|
||||||
|
{212, 180, 84},
|
||||||
|
}
|
||||||
|
|
||||||
|
green = []int{110, 224, 122}
|
||||||
|
greenAlternatives = [][]int{
|
||||||
|
{68, 160, 80},
|
||||||
|
{142, 255, 158},
|
||||||
|
{44, 140, 63},
|
||||||
|
{163, 255, 192},
|
||||||
|
{85, 198, 102},
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func StatsGraph() (t *model.Stats, dns, blocked, malware, adult []Line) {
|
||||||
|
s := getStats()
|
||||||
|
t = s.Total()
|
||||||
|
dns = graphLines(t, s, blue, blueAlternatives, func(s *model.Stats) []int {
|
||||||
|
return safeStats(s.DnsQueries)
|
||||||
|
})
|
||||||
|
blocked = graphLines(t, s, red, redAlternatives, func(s *model.Stats) []int {
|
||||||
|
return safeStats(s.BlockedFiltering)
|
||||||
|
})
|
||||||
|
malware = graphLines(t, s, green, greenAlternatives, func(s *model.Stats) []int {
|
||||||
|
return safeStats(s.ReplacedSafebrowsing)
|
||||||
|
})
|
||||||
|
adult = graphLines(t, s, yellow, yellowAlternatives, func(s *model.Stats) []int {
|
||||||
|
return safeStats(s.ReplacedParental)
|
||||||
|
})
|
||||||
|
|
||||||
|
return t, dns, blocked, malware, adult
|
||||||
|
}
|
||||||
|
|
||||||
|
func safeStats(stats *[]int) []int {
|
||||||
|
if stats == nil {
|
||||||
|
return make([]int, 0)
|
||||||
|
}
|
||||||
|
return *stats
|
||||||
|
}
|
||||||
|
|
||||||
|
func graphLines(
|
||||||
|
t *model.Stats,
|
||||||
|
s OverallStats,
|
||||||
|
baseColor []int,
|
||||||
|
altColors [][]int,
|
||||||
|
dataCB func(s *model.Stats) []int,
|
||||||
|
) []Line {
|
||||||
|
g := &graph{
|
||||||
|
total: Line{
|
||||||
|
Fill: true,
|
||||||
|
Title: labelTotal,
|
||||||
|
Data: dataCB(t),
|
||||||
|
R: baseColor[0],
|
||||||
|
G: baseColor[1],
|
||||||
|
B: baseColor[2],
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
var i int
|
||||||
|
for name, data := range s {
|
||||||
|
if name != StatsTotal {
|
||||||
|
g.replicas = append(g.replicas, Line{
|
||||||
|
Fill: false,
|
||||||
|
Title: name,
|
||||||
|
Data: dataCB(data),
|
||||||
|
R: altColors[i%len(altColors)][0],
|
||||||
|
G: altColors[i%len(altColors)][1],
|
||||||
|
B: altColors[i%len(altColors)][2],
|
||||||
|
})
|
||||||
|
i++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
lines := []Line{g.total}
|
||||||
|
|
||||||
|
slices.SortFunc(g.replicas, func(a, b Line) int {
|
||||||
|
return strings.Compare(a.Title, b.Title)
|
||||||
|
})
|
||||||
|
lines = append(lines, g.replicas...)
|
||||||
|
return lines
|
||||||
|
}
|
||||||
|
|
||||||
|
type graph struct {
|
||||||
|
total Line
|
||||||
|
replicas []Line
|
||||||
|
}
|
||||||
|
|
||||||
|
type Line struct {
|
||||||
|
Data []int `json:"data"`
|
||||||
|
R int `json:"r"`
|
||||||
|
G int `json:"g"`
|
||||||
|
B int `json:"b"`
|
||||||
|
Title string `json:"title"`
|
||||||
|
Fill bool `json:"fill"`
|
||||||
|
}
|
||||||
@@ -1,5 +1,10 @@
|
|||||||
// Code generated by MockGen. DO NOT EDIT.
|
// Code generated by MockGen. DO NOT EDIT.
|
||||||
// Source: github.com/bakito/adguardhome-sync/pkg/client (interfaces: Client)
|
// Source: github.com/bakito/adguardhome-sync/pkg/client (interfaces: Client)
|
||||||
|
//
|
||||||
|
// Generated by this command:
|
||||||
|
//
|
||||||
|
// mockgen -package client -destination pkg/mocks/client/mock.go github.com/bakito/adguardhome-sync/pkg/client Client
|
||||||
|
//
|
||||||
|
|
||||||
// Package client is a generated GoMock package.
|
// Package client is a generated GoMock package.
|
||||||
package client
|
package client
|
||||||
@@ -8,13 +13,14 @@ import (
|
|||||||
reflect "reflect"
|
reflect "reflect"
|
||||||
|
|
||||||
model "github.com/bakito/adguardhome-sync/pkg/client/model"
|
model "github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
gomock "github.com/golang/mock/gomock"
|
gomock "go.uber.org/mock/gomock"
|
||||||
)
|
)
|
||||||
|
|
||||||
// MockClient is a mock of Client interface.
|
// MockClient is a mock of Client interface.
|
||||||
type MockClient struct {
|
type MockClient struct {
|
||||||
ctrl *gomock.Controller
|
ctrl *gomock.Controller
|
||||||
recorder *MockClientMockRecorder
|
recorder *MockClientMockRecorder
|
||||||
|
isgomock struct{}
|
||||||
}
|
}
|
||||||
|
|
||||||
// MockClientMockRecorder is the mock recorder for MockClient.
|
// MockClientMockRecorder is the mock recorder for MockClient.
|
||||||
@@ -49,66 +55,53 @@ func (mr *MockClientMockRecorder) AccessList() *gomock.Call {
|
|||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AccessList", reflect.TypeOf((*MockClient)(nil).AccessList))
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AccessList", reflect.TypeOf((*MockClient)(nil).AccessList))
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddClients mocks base method.
|
// AddClient mocks base method.
|
||||||
func (m *MockClient) AddClients(arg0 ...*model.Client) error {
|
func (m *MockClient) AddClient(client *model.Client) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{}
|
ret := m.ctrl.Call(m, "AddClient", client)
|
||||||
for _, a := range arg0 {
|
|
||||||
varargs = append(varargs, a)
|
|
||||||
}
|
|
||||||
ret := m.ctrl.Call(m, "AddClients", varargs...)
|
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddClients indicates an expected call of AddClients.
|
// AddClient indicates an expected call of AddClient.
|
||||||
func (mr *MockClientMockRecorder) AddClients(arg0 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) AddClient(client any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddClients", reflect.TypeOf((*MockClient)(nil).AddClients), arg0...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddClient", reflect.TypeOf((*MockClient)(nil).AddClient), client)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddDHCPStaticLeases mocks base method.
|
// AddDHCPStaticLease mocks base method.
|
||||||
func (m *MockClient) AddDHCPStaticLeases(arg0 ...model.DhcpStaticLease) error {
|
func (m *MockClient) AddDHCPStaticLease(lease model.DhcpStaticLease) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{}
|
ret := m.ctrl.Call(m, "AddDHCPStaticLease", lease)
|
||||||
for _, a := range arg0 {
|
|
||||||
varargs = append(varargs, a)
|
|
||||||
}
|
|
||||||
ret := m.ctrl.Call(m, "AddDHCPStaticLeases", varargs...)
|
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddDHCPStaticLeases indicates an expected call of AddDHCPStaticLeases.
|
// AddDHCPStaticLease indicates an expected call of AddDHCPStaticLease.
|
||||||
func (mr *MockClientMockRecorder) AddDHCPStaticLeases(arg0 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) AddDHCPStaticLease(lease any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddDHCPStaticLeases", reflect.TypeOf((*MockClient)(nil).AddDHCPStaticLeases), arg0...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddDHCPStaticLease", reflect.TypeOf((*MockClient)(nil).AddDHCPStaticLease), lease)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddFilters mocks base method.
|
// AddFilter mocks base method.
|
||||||
func (m *MockClient) AddFilters(arg0 bool, arg1 ...model.Filter) error {
|
func (m *MockClient) AddFilter(whitelist bool, f model.Filter) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{arg0}
|
ret := m.ctrl.Call(m, "AddFilter", whitelist, f)
|
||||||
for _, a := range arg1 {
|
|
||||||
varargs = append(varargs, a)
|
|
||||||
}
|
|
||||||
ret := m.ctrl.Call(m, "AddFilters", varargs...)
|
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddFilters indicates an expected call of AddFilters.
|
// AddFilter indicates an expected call of AddFilter.
|
||||||
func (mr *MockClientMockRecorder) AddFilters(arg0 interface{}, arg1 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) AddFilter(whitelist, f any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
varargs := append([]interface{}{arg0}, arg1...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddFilter", reflect.TypeOf((*MockClient)(nil).AddFilter), whitelist, f)
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddFilters", reflect.TypeOf((*MockClient)(nil).AddFilters), varargs...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddRewriteEntries mocks base method.
|
// AddRewriteEntries mocks base method.
|
||||||
func (m *MockClient) AddRewriteEntries(arg0 ...model.RewriteEntry) error {
|
func (m *MockClient) AddRewriteEntries(e ...model.RewriteEntry) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{}
|
varargs := []any{}
|
||||||
for _, a := range arg0 {
|
for _, a := range e {
|
||||||
varargs = append(varargs, a)
|
varargs = append(varargs, a)
|
||||||
}
|
}
|
||||||
ret := m.ctrl.Call(m, "AddRewriteEntries", varargs...)
|
ret := m.ctrl.Call(m, "AddRewriteEntries", varargs...)
|
||||||
@@ -117,24 +110,9 @@ func (m *MockClient) AddRewriteEntries(arg0 ...model.RewriteEntry) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// AddRewriteEntries indicates an expected call of AddRewriteEntries.
|
// AddRewriteEntries indicates an expected call of AddRewriteEntries.
|
||||||
func (mr *MockClientMockRecorder) AddRewriteEntries(arg0 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) AddRewriteEntries(e ...any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddRewriteEntries", reflect.TypeOf((*MockClient)(nil).AddRewriteEntries), arg0...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddRewriteEntries", reflect.TypeOf((*MockClient)(nil).AddRewriteEntries), e...)
|
||||||
}
|
|
||||||
|
|
||||||
// BlockedServices mocks base method.
|
|
||||||
func (m *MockClient) BlockedServices() (*[]string, error) {
|
|
||||||
m.ctrl.T.Helper()
|
|
||||||
ret := m.ctrl.Call(m, "BlockedServices")
|
|
||||||
ret0, _ := ret[0].(*[]string)
|
|
||||||
ret1, _ := ret[1].(error)
|
|
||||||
return ret0, ret1
|
|
||||||
}
|
|
||||||
|
|
||||||
// BlockedServices indicates an expected call of BlockedServices.
|
|
||||||
func (mr *MockClientMockRecorder) BlockedServices() *gomock.Call {
|
|
||||||
mr.mock.ctrl.T.Helper()
|
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "BlockedServices", reflect.TypeOf((*MockClient)(nil).BlockedServices))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// BlockedServicesSchedule mocks base method.
|
// BlockedServicesSchedule mocks base method.
|
||||||
@@ -182,66 +160,53 @@ func (mr *MockClientMockRecorder) DNSConfig() *gomock.Call {
|
|||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DNSConfig", reflect.TypeOf((*MockClient)(nil).DNSConfig))
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DNSConfig", reflect.TypeOf((*MockClient)(nil).DNSConfig))
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeleteClients mocks base method.
|
// DeleteClient mocks base method.
|
||||||
func (m *MockClient) DeleteClients(arg0 ...*model.Client) error {
|
func (m *MockClient) DeleteClient(client *model.Client) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{}
|
ret := m.ctrl.Call(m, "DeleteClient", client)
|
||||||
for _, a := range arg0 {
|
|
||||||
varargs = append(varargs, a)
|
|
||||||
}
|
|
||||||
ret := m.ctrl.Call(m, "DeleteClients", varargs...)
|
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeleteClients indicates an expected call of DeleteClients.
|
// DeleteClient indicates an expected call of DeleteClient.
|
||||||
func (mr *MockClientMockRecorder) DeleteClients(arg0 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) DeleteClient(client any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteClients", reflect.TypeOf((*MockClient)(nil).DeleteClients), arg0...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteClient", reflect.TypeOf((*MockClient)(nil).DeleteClient), client)
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeleteDHCPStaticLeases mocks base method.
|
// DeleteDHCPStaticLease mocks base method.
|
||||||
func (m *MockClient) DeleteDHCPStaticLeases(arg0 ...model.DhcpStaticLease) error {
|
func (m *MockClient) DeleteDHCPStaticLease(lease model.DhcpStaticLease) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{}
|
ret := m.ctrl.Call(m, "DeleteDHCPStaticLease", lease)
|
||||||
for _, a := range arg0 {
|
|
||||||
varargs = append(varargs, a)
|
|
||||||
}
|
|
||||||
ret := m.ctrl.Call(m, "DeleteDHCPStaticLeases", varargs...)
|
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeleteDHCPStaticLeases indicates an expected call of DeleteDHCPStaticLeases.
|
// DeleteDHCPStaticLease indicates an expected call of DeleteDHCPStaticLease.
|
||||||
func (mr *MockClientMockRecorder) DeleteDHCPStaticLeases(arg0 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) DeleteDHCPStaticLease(lease any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteDHCPStaticLeases", reflect.TypeOf((*MockClient)(nil).DeleteDHCPStaticLeases), arg0...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteDHCPStaticLease", reflect.TypeOf((*MockClient)(nil).DeleteDHCPStaticLease), lease)
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeleteFilters mocks base method.
|
// DeleteFilter mocks base method.
|
||||||
func (m *MockClient) DeleteFilters(arg0 bool, arg1 ...model.Filter) error {
|
func (m *MockClient) DeleteFilter(whitelist bool, f model.Filter) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{arg0}
|
ret := m.ctrl.Call(m, "DeleteFilter", whitelist, f)
|
||||||
for _, a := range arg1 {
|
|
||||||
varargs = append(varargs, a)
|
|
||||||
}
|
|
||||||
ret := m.ctrl.Call(m, "DeleteFilters", varargs...)
|
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeleteFilters indicates an expected call of DeleteFilters.
|
// DeleteFilter indicates an expected call of DeleteFilter.
|
||||||
func (mr *MockClientMockRecorder) DeleteFilters(arg0 interface{}, arg1 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) DeleteFilter(whitelist, f any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
varargs := append([]interface{}{arg0}, arg1...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteFilter", reflect.TypeOf((*MockClient)(nil).DeleteFilter), whitelist, f)
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteFilters", reflect.TypeOf((*MockClient)(nil).DeleteFilters), varargs...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// DeleteRewriteEntries mocks base method.
|
// DeleteRewriteEntries mocks base method.
|
||||||
func (m *MockClient) DeleteRewriteEntries(arg0 ...model.RewriteEntry) error {
|
func (m *MockClient) DeleteRewriteEntries(e ...model.RewriteEntry) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{}
|
varargs := []any{}
|
||||||
for _, a := range arg0 {
|
for _, a := range e {
|
||||||
varargs = append(varargs, a)
|
varargs = append(varargs, a)
|
||||||
}
|
}
|
||||||
ret := m.ctrl.Call(m, "DeleteRewriteEntries", varargs...)
|
ret := m.ctrl.Call(m, "DeleteRewriteEntries", varargs...)
|
||||||
@@ -250,9 +215,9 @@ func (m *MockClient) DeleteRewriteEntries(arg0 ...model.RewriteEntry) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// DeleteRewriteEntries indicates an expected call of DeleteRewriteEntries.
|
// DeleteRewriteEntries indicates an expected call of DeleteRewriteEntries.
|
||||||
func (mr *MockClientMockRecorder) DeleteRewriteEntries(arg0 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) DeleteRewriteEntries(e ...any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteRewriteEntries", reflect.TypeOf((*MockClient)(nil).DeleteRewriteEntries), arg0...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteRewriteEntries", reflect.TypeOf((*MockClient)(nil).DeleteRewriteEntries), e...)
|
||||||
}
|
}
|
||||||
|
|
||||||
// DhcpConfig mocks base method.
|
// DhcpConfig mocks base method.
|
||||||
@@ -329,11 +294,26 @@ func (mr *MockClientMockRecorder) ProfileInfo() *gomock.Call {
|
|||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProfileInfo", reflect.TypeOf((*MockClient)(nil).ProfileInfo))
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProfileInfo", reflect.TypeOf((*MockClient)(nil).ProfileInfo))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// QueryLog mocks base method.
|
||||||
|
func (m *MockClient) QueryLog(limit int) (*model.QueryLog, error) {
|
||||||
|
m.ctrl.T.Helper()
|
||||||
|
ret := m.ctrl.Call(m, "QueryLog", limit)
|
||||||
|
ret0, _ := ret[0].(*model.QueryLog)
|
||||||
|
ret1, _ := ret[1].(error)
|
||||||
|
return ret0, ret1
|
||||||
|
}
|
||||||
|
|
||||||
|
// QueryLog indicates an expected call of QueryLog.
|
||||||
|
func (mr *MockClientMockRecorder) QueryLog(limit any) *gomock.Call {
|
||||||
|
mr.mock.ctrl.T.Helper()
|
||||||
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "QueryLog", reflect.TypeOf((*MockClient)(nil).QueryLog), limit)
|
||||||
|
}
|
||||||
|
|
||||||
// QueryLogConfig mocks base method.
|
// QueryLogConfig mocks base method.
|
||||||
func (m *MockClient) QueryLogConfig() (*model.QueryLogConfig, error) {
|
func (m *MockClient) QueryLogConfig() (*model.QueryLogConfigWithIgnored, error) {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "QueryLogConfig")
|
ret := m.ctrl.Call(m, "QueryLogConfig")
|
||||||
ret0, _ := ret[0].(*model.QueryLogConfig)
|
ret0, _ := ret[0].(*model.QueryLogConfigWithIgnored)
|
||||||
ret1, _ := ret[1].(error)
|
ret1, _ := ret[1].(error)
|
||||||
return ret0, ret1
|
return ret0, ret1
|
||||||
}
|
}
|
||||||
@@ -345,17 +325,17 @@ func (mr *MockClientMockRecorder) QueryLogConfig() *gomock.Call {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// RefreshFilters mocks base method.
|
// RefreshFilters mocks base method.
|
||||||
func (m *MockClient) RefreshFilters(arg0 bool) error {
|
func (m *MockClient) RefreshFilters(whitelist bool) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "RefreshFilters", arg0)
|
ret := m.ctrl.Call(m, "RefreshFilters", whitelist)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// RefreshFilters indicates an expected call of RefreshFilters.
|
// RefreshFilters indicates an expected call of RefreshFilters.
|
||||||
func (mr *MockClientMockRecorder) RefreshFilters(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) RefreshFilters(whitelist any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RefreshFilters", reflect.TypeOf((*MockClient)(nil).RefreshFilters), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RefreshFilters", reflect.TypeOf((*MockClient)(nil).RefreshFilters), whitelist)
|
||||||
}
|
}
|
||||||
|
|
||||||
// RewriteList mocks base method.
|
// RewriteList mocks base method.
|
||||||
@@ -404,143 +384,129 @@ func (mr *MockClientMockRecorder) SafeSearchConfig() *gomock.Call {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// SetAccessList mocks base method.
|
// SetAccessList mocks base method.
|
||||||
func (m *MockClient) SetAccessList(arg0 *model.AccessList) error {
|
func (m *MockClient) SetAccessList(accessList *model.AccessList) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetAccessList", arg0)
|
ret := m.ctrl.Call(m, "SetAccessList", accessList)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetAccessList indicates an expected call of SetAccessList.
|
// SetAccessList indicates an expected call of SetAccessList.
|
||||||
func (mr *MockClientMockRecorder) SetAccessList(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetAccessList(accessList any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetAccessList", reflect.TypeOf((*MockClient)(nil).SetAccessList), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetAccessList", reflect.TypeOf((*MockClient)(nil).SetAccessList), accessList)
|
||||||
}
|
|
||||||
|
|
||||||
// SetBlockedServices mocks base method.
|
|
||||||
func (m *MockClient) SetBlockedServices(arg0 *[]string) error {
|
|
||||||
m.ctrl.T.Helper()
|
|
||||||
ret := m.ctrl.Call(m, "SetBlockedServices", arg0)
|
|
||||||
ret0, _ := ret[0].(error)
|
|
||||||
return ret0
|
|
||||||
}
|
|
||||||
|
|
||||||
// SetBlockedServices indicates an expected call of SetBlockedServices.
|
|
||||||
func (mr *MockClientMockRecorder) SetBlockedServices(arg0 interface{}) *gomock.Call {
|
|
||||||
mr.mock.ctrl.T.Helper()
|
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetBlockedServices", reflect.TypeOf((*MockClient)(nil).SetBlockedServices), arg0)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetBlockedServicesSchedule mocks base method.
|
// SetBlockedServicesSchedule mocks base method.
|
||||||
func (m *MockClient) SetBlockedServicesSchedule(arg0 *model.BlockedServicesSchedule) error {
|
func (m *MockClient) SetBlockedServicesSchedule(schedule *model.BlockedServicesSchedule) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetBlockedServicesSchedule", arg0)
|
ret := m.ctrl.Call(m, "SetBlockedServicesSchedule", schedule)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetBlockedServicesSchedule indicates an expected call of SetBlockedServicesSchedule.
|
// SetBlockedServicesSchedule indicates an expected call of SetBlockedServicesSchedule.
|
||||||
func (mr *MockClientMockRecorder) SetBlockedServicesSchedule(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetBlockedServicesSchedule(schedule any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetBlockedServicesSchedule", reflect.TypeOf((*MockClient)(nil).SetBlockedServicesSchedule), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetBlockedServicesSchedule", reflect.TypeOf((*MockClient)(nil).SetBlockedServicesSchedule), schedule)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetCustomRules mocks base method.
|
// SetCustomRules mocks base method.
|
||||||
func (m *MockClient) SetCustomRules(arg0 *[]string) error {
|
func (m *MockClient) SetCustomRules(rules *[]string) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetCustomRules", arg0)
|
ret := m.ctrl.Call(m, "SetCustomRules", rules)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetCustomRules indicates an expected call of SetCustomRules.
|
// SetCustomRules indicates an expected call of SetCustomRules.
|
||||||
func (mr *MockClientMockRecorder) SetCustomRules(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetCustomRules(rules any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetCustomRules", reflect.TypeOf((*MockClient)(nil).SetCustomRules), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetCustomRules", reflect.TypeOf((*MockClient)(nil).SetCustomRules), rules)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetDNSConfig mocks base method.
|
// SetDNSConfig mocks base method.
|
||||||
func (m *MockClient) SetDNSConfig(arg0 *model.DNSConfig) error {
|
func (m *MockClient) SetDNSConfig(config *model.DNSConfig) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetDNSConfig", arg0)
|
ret := m.ctrl.Call(m, "SetDNSConfig", config)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetDNSConfig indicates an expected call of SetDNSConfig.
|
// SetDNSConfig indicates an expected call of SetDNSConfig.
|
||||||
func (mr *MockClientMockRecorder) SetDNSConfig(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetDNSConfig(config any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetDNSConfig", reflect.TypeOf((*MockClient)(nil).SetDNSConfig), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetDNSConfig", reflect.TypeOf((*MockClient)(nil).SetDNSConfig), config)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetDhcpConfig mocks base method.
|
// SetDhcpConfig mocks base method.
|
||||||
func (m *MockClient) SetDhcpConfig(arg0 *model.DhcpStatus) error {
|
func (m *MockClient) SetDhcpConfig(status *model.DhcpStatus) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetDhcpConfig", arg0)
|
ret := m.ctrl.Call(m, "SetDhcpConfig", status)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetDhcpConfig indicates an expected call of SetDhcpConfig.
|
// SetDhcpConfig indicates an expected call of SetDhcpConfig.
|
||||||
func (mr *MockClientMockRecorder) SetDhcpConfig(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetDhcpConfig(status any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetDhcpConfig", reflect.TypeOf((*MockClient)(nil).SetDhcpConfig), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetDhcpConfig", reflect.TypeOf((*MockClient)(nil).SetDhcpConfig), status)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetProfileInfo mocks base method.
|
// SetProfileInfo mocks base method.
|
||||||
func (m *MockClient) SetProfileInfo(arg0 *model.ProfileInfo) error {
|
func (m *MockClient) SetProfileInfo(settings *model.ProfileInfo) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetProfileInfo", arg0)
|
ret := m.ctrl.Call(m, "SetProfileInfo", settings)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetProfileInfo indicates an expected call of SetProfileInfo.
|
// SetProfileInfo indicates an expected call of SetProfileInfo.
|
||||||
func (mr *MockClientMockRecorder) SetProfileInfo(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetProfileInfo(settings any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetProfileInfo", reflect.TypeOf((*MockClient)(nil).SetProfileInfo), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetProfileInfo", reflect.TypeOf((*MockClient)(nil).SetProfileInfo), settings)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetQueryLogConfig mocks base method.
|
// SetQueryLogConfig mocks base method.
|
||||||
func (m *MockClient) SetQueryLogConfig(arg0 *model.QueryLogConfig) error {
|
func (m *MockClient) SetQueryLogConfig(ql *model.QueryLogConfigWithIgnored) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetQueryLogConfig", arg0)
|
ret := m.ctrl.Call(m, "SetQueryLogConfig", ql)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetQueryLogConfig indicates an expected call of SetQueryLogConfig.
|
// SetQueryLogConfig indicates an expected call of SetQueryLogConfig.
|
||||||
func (mr *MockClientMockRecorder) SetQueryLogConfig(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetQueryLogConfig(ql any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetQueryLogConfig", reflect.TypeOf((*MockClient)(nil).SetQueryLogConfig), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetQueryLogConfig", reflect.TypeOf((*MockClient)(nil).SetQueryLogConfig), ql)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetSafeSearchConfig mocks base method.
|
// SetSafeSearchConfig mocks base method.
|
||||||
func (m *MockClient) SetSafeSearchConfig(arg0 *model.SafeSearchConfig) error {
|
func (m *MockClient) SetSafeSearchConfig(settings *model.SafeSearchConfig) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetSafeSearchConfig", arg0)
|
ret := m.ctrl.Call(m, "SetSafeSearchConfig", settings)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetSafeSearchConfig indicates an expected call of SetSafeSearchConfig.
|
// SetSafeSearchConfig indicates an expected call of SetSafeSearchConfig.
|
||||||
func (mr *MockClientMockRecorder) SetSafeSearchConfig(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetSafeSearchConfig(settings any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetSafeSearchConfig", reflect.TypeOf((*MockClient)(nil).SetSafeSearchConfig), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetSafeSearchConfig", reflect.TypeOf((*MockClient)(nil).SetSafeSearchConfig), settings)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetStatsConfig mocks base method.
|
// SetStatsConfig mocks base method.
|
||||||
func (m *MockClient) SetStatsConfig(arg0 *model.StatsConfig) error {
|
func (m *MockClient) SetStatsConfig(sc *model.PutStatsConfigUpdateRequest) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "SetStatsConfig", arg0)
|
ret := m.ctrl.Call(m, "SetStatsConfig", sc)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetStatsConfig indicates an expected call of SetStatsConfig.
|
// SetStatsConfig indicates an expected call of SetStatsConfig.
|
||||||
func (mr *MockClientMockRecorder) SetStatsConfig(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) SetStatsConfig(sc any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetStatsConfig", reflect.TypeOf((*MockClient)(nil).SetStatsConfig), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetStatsConfig", reflect.TypeOf((*MockClient)(nil).SetStatsConfig), sc)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Setup mocks base method.
|
// Setup mocks base method.
|
||||||
@@ -557,11 +523,26 @@ func (mr *MockClientMockRecorder) Setup() *gomock.Call {
|
|||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Setup", reflect.TypeOf((*MockClient)(nil).Setup))
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Setup", reflect.TypeOf((*MockClient)(nil).Setup))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Stats mocks base method.
|
||||||
|
func (m *MockClient) Stats() (*model.Stats, error) {
|
||||||
|
m.ctrl.T.Helper()
|
||||||
|
ret := m.ctrl.Call(m, "Stats")
|
||||||
|
ret0, _ := ret[0].(*model.Stats)
|
||||||
|
ret1, _ := ret[1].(error)
|
||||||
|
return ret0, ret1
|
||||||
|
}
|
||||||
|
|
||||||
|
// Stats indicates an expected call of Stats.
|
||||||
|
func (mr *MockClientMockRecorder) Stats() *gomock.Call {
|
||||||
|
mr.mock.ctrl.T.Helper()
|
||||||
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Stats", reflect.TypeOf((*MockClient)(nil).Stats))
|
||||||
|
}
|
||||||
|
|
||||||
// StatsConfig mocks base method.
|
// StatsConfig mocks base method.
|
||||||
func (m *MockClient) StatsConfig() (*model.StatsConfig, error) {
|
func (m *MockClient) StatsConfig() (*model.GetStatsConfigResponse, error) {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "StatsConfig")
|
ret := m.ctrl.Call(m, "StatsConfig")
|
||||||
ret0, _ := ret[0].(*model.StatsConfig)
|
ret0, _ := ret[0].(*model.GetStatsConfigResponse)
|
||||||
ret1, _ := ret[1].(error)
|
ret1, _ := ret[1].(error)
|
||||||
return ret0, ret1
|
return ret0, ret1
|
||||||
}
|
}
|
||||||
@@ -588,94 +569,85 @@ func (mr *MockClientMockRecorder) Status() *gomock.Call {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// ToggleFiltering mocks base method.
|
// ToggleFiltering mocks base method.
|
||||||
func (m *MockClient) ToggleFiltering(arg0 bool, arg1 int) error {
|
func (m *MockClient) ToggleFiltering(enabled bool, interval int) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "ToggleFiltering", arg0, arg1)
|
ret := m.ctrl.Call(m, "ToggleFiltering", enabled, interval)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// ToggleFiltering indicates an expected call of ToggleFiltering.
|
// ToggleFiltering indicates an expected call of ToggleFiltering.
|
||||||
func (mr *MockClientMockRecorder) ToggleFiltering(arg0, arg1 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) ToggleFiltering(enabled, interval any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToggleFiltering", reflect.TypeOf((*MockClient)(nil).ToggleFiltering), arg0, arg1)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToggleFiltering", reflect.TypeOf((*MockClient)(nil).ToggleFiltering), enabled, interval)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ToggleParental mocks base method.
|
// ToggleParental mocks base method.
|
||||||
func (m *MockClient) ToggleParental(arg0 bool) error {
|
func (m *MockClient) ToggleParental(enable bool) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "ToggleParental", arg0)
|
ret := m.ctrl.Call(m, "ToggleParental", enable)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// ToggleParental indicates an expected call of ToggleParental.
|
// ToggleParental indicates an expected call of ToggleParental.
|
||||||
func (mr *MockClientMockRecorder) ToggleParental(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) ToggleParental(enable any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToggleParental", reflect.TypeOf((*MockClient)(nil).ToggleParental), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToggleParental", reflect.TypeOf((*MockClient)(nil).ToggleParental), enable)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ToggleProtection mocks base method.
|
// ToggleProtection mocks base method.
|
||||||
func (m *MockClient) ToggleProtection(arg0 bool) error {
|
func (m *MockClient) ToggleProtection(enable bool) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "ToggleProtection", arg0)
|
ret := m.ctrl.Call(m, "ToggleProtection", enable)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// ToggleProtection indicates an expected call of ToggleProtection.
|
// ToggleProtection indicates an expected call of ToggleProtection.
|
||||||
func (mr *MockClientMockRecorder) ToggleProtection(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) ToggleProtection(enable any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToggleProtection", reflect.TypeOf((*MockClient)(nil).ToggleProtection), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToggleProtection", reflect.TypeOf((*MockClient)(nil).ToggleProtection), enable)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ToggleSafeBrowsing mocks base method.
|
// ToggleSafeBrowsing mocks base method.
|
||||||
func (m *MockClient) ToggleSafeBrowsing(arg0 bool) error {
|
func (m *MockClient) ToggleSafeBrowsing(enable bool) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "ToggleSafeBrowsing", arg0)
|
ret := m.ctrl.Call(m, "ToggleSafeBrowsing", enable)
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// ToggleSafeBrowsing indicates an expected call of ToggleSafeBrowsing.
|
// ToggleSafeBrowsing indicates an expected call of ToggleSafeBrowsing.
|
||||||
func (mr *MockClientMockRecorder) ToggleSafeBrowsing(arg0 interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) ToggleSafeBrowsing(enable any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToggleSafeBrowsing", reflect.TypeOf((*MockClient)(nil).ToggleSafeBrowsing), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToggleSafeBrowsing", reflect.TypeOf((*MockClient)(nil).ToggleSafeBrowsing), enable)
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpdateClients mocks base method.
|
// UpdateClient mocks base method.
|
||||||
func (m *MockClient) UpdateClients(arg0 ...*model.Client) error {
|
func (m *MockClient) UpdateClient(client *model.Client) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{}
|
ret := m.ctrl.Call(m, "UpdateClient", client)
|
||||||
for _, a := range arg0 {
|
|
||||||
varargs = append(varargs, a)
|
|
||||||
}
|
|
||||||
ret := m.ctrl.Call(m, "UpdateClients", varargs...)
|
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpdateClients indicates an expected call of UpdateClients.
|
// UpdateClient indicates an expected call of UpdateClient.
|
||||||
func (mr *MockClientMockRecorder) UpdateClients(arg0 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) UpdateClient(client any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateClients", reflect.TypeOf((*MockClient)(nil).UpdateClients), arg0...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateClient", reflect.TypeOf((*MockClient)(nil).UpdateClient), client)
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpdateFilters mocks base method.
|
// UpdateFilter mocks base method.
|
||||||
func (m *MockClient) UpdateFilters(arg0 bool, arg1 ...model.Filter) error {
|
func (m *MockClient) UpdateFilter(whitelist bool, f model.Filter) error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
varargs := []interface{}{arg0}
|
ret := m.ctrl.Call(m, "UpdateFilter", whitelist, f)
|
||||||
for _, a := range arg1 {
|
|
||||||
varargs = append(varargs, a)
|
|
||||||
}
|
|
||||||
ret := m.ctrl.Call(m, "UpdateFilters", varargs...)
|
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpdateFilters indicates an expected call of UpdateFilters.
|
// UpdateFilter indicates an expected call of UpdateFilter.
|
||||||
func (mr *MockClientMockRecorder) UpdateFilters(arg0 interface{}, arg1 ...interface{}) *gomock.Call {
|
func (mr *MockClientMockRecorder) UpdateFilter(whitelist, f any) *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
varargs := append([]interface{}{arg0}, arg1...)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateFilter", reflect.TypeOf((*MockClient)(nil).UpdateFilter), whitelist, f)
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateFilters", reflect.TypeOf((*MockClient)(nil).UpdateFilters), varargs...)
|
|
||||||
}
|
}
|
||||||
|
|||||||
99
pkg/mocks/flags/mock.go
Normal file
99
pkg/mocks/flags/mock.go
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
// Code generated by MockGen. DO NOT EDIT.
|
||||||
|
// Source: github.com/bakito/adguardhome-sync/pkg/config (interfaces: Flags)
|
||||||
|
//
|
||||||
|
// Generated by this command:
|
||||||
|
//
|
||||||
|
// mockgen -package client -destination pkg/mocks/flags/mock.go github.com/bakito/adguardhome-sync/pkg/config Flags
|
||||||
|
//
|
||||||
|
|
||||||
|
// Package client is a generated GoMock package.
|
||||||
|
package client
|
||||||
|
|
||||||
|
import (
|
||||||
|
reflect "reflect"
|
||||||
|
|
||||||
|
gomock "go.uber.org/mock/gomock"
|
||||||
|
)
|
||||||
|
|
||||||
|
// MockFlags is a mock of Flags interface.
|
||||||
|
type MockFlags struct {
|
||||||
|
ctrl *gomock.Controller
|
||||||
|
recorder *MockFlagsMockRecorder
|
||||||
|
isgomock struct{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// MockFlagsMockRecorder is the mock recorder for MockFlags.
|
||||||
|
type MockFlagsMockRecorder struct {
|
||||||
|
mock *MockFlags
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewMockFlags creates a new mock instance.
|
||||||
|
func NewMockFlags(ctrl *gomock.Controller) *MockFlags {
|
||||||
|
mock := &MockFlags{ctrl: ctrl}
|
||||||
|
mock.recorder = &MockFlagsMockRecorder{mock}
|
||||||
|
return mock
|
||||||
|
}
|
||||||
|
|
||||||
|
// EXPECT returns an object that allows the caller to indicate expected use.
|
||||||
|
func (m *MockFlags) EXPECT() *MockFlagsMockRecorder {
|
||||||
|
return m.recorder
|
||||||
|
}
|
||||||
|
|
||||||
|
// Changed mocks base method.
|
||||||
|
func (m *MockFlags) Changed(name string) bool {
|
||||||
|
m.ctrl.T.Helper()
|
||||||
|
ret := m.ctrl.Call(m, "Changed", name)
|
||||||
|
ret0, _ := ret[0].(bool)
|
||||||
|
return ret0
|
||||||
|
}
|
||||||
|
|
||||||
|
// Changed indicates an expected call of Changed.
|
||||||
|
func (mr *MockFlagsMockRecorder) Changed(name any) *gomock.Call {
|
||||||
|
mr.mock.ctrl.T.Helper()
|
||||||
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Changed", reflect.TypeOf((*MockFlags)(nil).Changed), name)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetBool mocks base method.
|
||||||
|
func (m *MockFlags) GetBool(name string) (bool, error) {
|
||||||
|
m.ctrl.T.Helper()
|
||||||
|
ret := m.ctrl.Call(m, "GetBool", name)
|
||||||
|
ret0, _ := ret[0].(bool)
|
||||||
|
ret1, _ := ret[1].(error)
|
||||||
|
return ret0, ret1
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetBool indicates an expected call of GetBool.
|
||||||
|
func (mr *MockFlagsMockRecorder) GetBool(name any) *gomock.Call {
|
||||||
|
mr.mock.ctrl.T.Helper()
|
||||||
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetBool", reflect.TypeOf((*MockFlags)(nil).GetBool), name)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetInt mocks base method.
|
||||||
|
func (m *MockFlags) GetInt(name string) (int, error) {
|
||||||
|
m.ctrl.T.Helper()
|
||||||
|
ret := m.ctrl.Call(m, "GetInt", name)
|
||||||
|
ret0, _ := ret[0].(int)
|
||||||
|
ret1, _ := ret[1].(error)
|
||||||
|
return ret0, ret1
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetInt indicates an expected call of GetInt.
|
||||||
|
func (mr *MockFlagsMockRecorder) GetInt(name any) *gomock.Call {
|
||||||
|
mr.mock.ctrl.T.Helper()
|
||||||
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetInt", reflect.TypeOf((*MockFlags)(nil).GetInt), name)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetString mocks base method.
|
||||||
|
func (m *MockFlags) GetString(name string) (string, error) {
|
||||||
|
m.ctrl.T.Helper()
|
||||||
|
ret := m.ctrl.Call(m, "GetString", name)
|
||||||
|
ret0, _ := ret[0].(string)
|
||||||
|
ret1, _ := ret[1].(error)
|
||||||
|
return ret0, ret1
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetString indicates an expected call of GetString.
|
||||||
|
func (mr *MockFlagsMockRecorder) GetString(name any) *gomock.Call {
|
||||||
|
mr.mock.ctrl.T.Helper()
|
||||||
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetString", reflect.TypeOf((*MockFlags)(nil).GetString), name)
|
||||||
|
}
|
||||||
284
pkg/sync/action-general.go
Normal file
284
pkg/sync/action-general.go
Normal file
@@ -0,0 +1,284 @@
|
|||||||
|
package sync
|
||||||
|
|
||||||
|
import (
|
||||||
|
"go.uber.org/zap"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
actionProfileInfo = func(ac *actionContext) error {
|
||||||
|
if pro, err := ac.client.ProfileInfo(); err != nil {
|
||||||
|
return err
|
||||||
|
} else if merged := pro.ShouldSyncFor(ac.origin.profileInfo, ac.cfg.Features.Theme); merged != nil {
|
||||||
|
return ac.client.SetProfileInfo(merged)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionProtection = func(ac *actionContext) error {
|
||||||
|
if ac.origin.status.ProtectionEnabled != ac.replicaStatus.ProtectionEnabled {
|
||||||
|
return ac.client.ToggleProtection(ac.origin.status.ProtectionEnabled)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionParental = func(ac *actionContext) error {
|
||||||
|
if rp, err := ac.client.Parental(); err != nil {
|
||||||
|
return err
|
||||||
|
} else if ac.origin.parental != rp {
|
||||||
|
return ac.client.ToggleParental(ac.origin.parental)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionSafeSearchConfig = func(ac *actionContext) error {
|
||||||
|
if ssc, err := ac.client.SafeSearchConfig(); err != nil {
|
||||||
|
return err
|
||||||
|
} else if !ac.origin.safeSearch.Equals(ssc) {
|
||||||
|
return ac.client.SetSafeSearchConfig(ac.origin.safeSearch)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionSafeBrowsing = func(ac *actionContext) error {
|
||||||
|
if rs, err := ac.client.SafeBrowsing(); err != nil {
|
||||||
|
return err
|
||||||
|
} else if ac.origin.safeBrowsing != rs {
|
||||||
|
if err = ac.client.ToggleSafeBrowsing(ac.origin.safeBrowsing); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionQueryLogConfig = func(ac *actionContext) error {
|
||||||
|
qlc, err := ac.client.QueryLogConfig()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if !ac.origin.queryLogConfig.Equals(qlc) {
|
||||||
|
return ac.client.SetQueryLogConfig(ac.origin.queryLogConfig)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionStatsConfig = func(ac *actionContext) error {
|
||||||
|
sc, err := ac.client.StatsConfig()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if !sc.Equals(ac.origin.statsConfig) {
|
||||||
|
return ac.client.SetStatsConfig(ac.origin.statsConfig)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionDNSRewrites = func(ac *actionContext) error {
|
||||||
|
replicaRewrites, err := ac.client.RewriteList()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
a, r, d := replicaRewrites.Merge(ac.origin.rewrites)
|
||||||
|
|
||||||
|
if err = ac.client.DeleteRewriteEntries(r...); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err = ac.client.AddRewriteEntries(a...); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, dupl := range d {
|
||||||
|
ac.rl.With("domain", dupl.Domain, "answer", dupl.Answer).Warn("Skipping duplicated rewrite from source")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionFilters = func(ac *actionContext) error {
|
||||||
|
rf, err := ac.client.Filtering()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = syncFilterType(ac.rl, ac.origin.filters.Filters, rf.Filters, false, ac.client, ac.cfg.ContinueOnError); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err = syncFilterType(ac.rl, ac.origin.filters.WhitelistFilters, rf.WhitelistFilters, true, ac.client, ac.cfg.ContinueOnError); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if utils.PtrToString(ac.origin.filters.UserRules) != utils.PtrToString(rf.UserRules) {
|
||||||
|
return ac.client.SetCustomRules(ac.origin.filters.UserRules)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !utils.PtrEquals(ac.origin.filters.Enabled, rf.Enabled) ||
|
||||||
|
!utils.PtrEquals(ac.origin.filters.Interval, rf.Interval) {
|
||||||
|
return ac.client.ToggleFiltering(*ac.origin.filters.Enabled, *ac.origin.filters.Interval)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
actionBlockedServicesSchedule = func(ac *actionContext) error {
|
||||||
|
rbss, err := ac.client.BlockedServicesSchedule()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !ac.origin.blockedServicesSchedule.Equals(rbss) {
|
||||||
|
return ac.client.SetBlockedServicesSchedule(ac.origin.blockedServicesSchedule)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionClientSettings = func(ac *actionContext) error {
|
||||||
|
rc, err := ac.client.Clients()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
a, u, r := rc.Merge(ac.origin.clients)
|
||||||
|
|
||||||
|
for _, client := range r {
|
||||||
|
if err := ac.client.DeleteClient(client); err != nil {
|
||||||
|
ac.rl.With("client-name", client.Name, "error", err).Error("error deleting client setting")
|
||||||
|
if !ac.cfg.ContinueOnError {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, client := range a {
|
||||||
|
if err := ac.client.AddClient(client); err != nil {
|
||||||
|
ac.rl.With("client-name", client.Name, "error", err).Error("error adding client setting")
|
||||||
|
if !ac.cfg.ContinueOnError {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, client := range u {
|
||||||
|
if err := ac.client.UpdateClient(client); err != nil {
|
||||||
|
ac.rl.With("client-name", client.Name, "error", err).Error("error updating client setting")
|
||||||
|
if !ac.cfg.ContinueOnError {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
actionDNSAccessLists = func(ac *actionContext) error {
|
||||||
|
al, err := ac.client.AccessList()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if !al.Equals(ac.origin.accessList) {
|
||||||
|
return ac.client.SetAccessList(ac.origin.accessList)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionDNSServerConfig = func(ac *actionContext) error {
|
||||||
|
dc, err := ac.client.DNSConfig()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// dc.Sanitize(ac.rl)
|
||||||
|
|
||||||
|
if !dc.Equals(ac.origin.dnsConfig) {
|
||||||
|
if err = ac.client.SetDNSConfig(ac.origin.dnsConfig); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionDHCPServerConfig = func(ac *actionContext) error {
|
||||||
|
if ac.origin.dhcpServerConfig.HasConfig() {
|
||||||
|
sc, err := ac.client.DhcpConfig()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
origClone := ac.origin.dhcpServerConfig.Clone()
|
||||||
|
if ac.replica.InterfaceName != "" {
|
||||||
|
// overwrite interface name
|
||||||
|
origClone.InterfaceName = utils.Ptr(ac.replica.InterfaceName)
|
||||||
|
}
|
||||||
|
if ac.replica.DHCPServerEnabled != nil {
|
||||||
|
// overwrite dhcp enabled
|
||||||
|
origClone.Enabled = ac.replica.DHCPServerEnabled
|
||||||
|
}
|
||||||
|
|
||||||
|
if !sc.CleanAndEquals(origClone) {
|
||||||
|
return ac.client.SetDhcpConfig(origClone)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
actionDHCPStaticLeases = func(ac *actionContext) error {
|
||||||
|
sc, err := ac.client.DhcpConfig()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
a, r := model.MergeDhcpStaticLeases(sc.StaticLeases, ac.origin.dhcpServerConfig.StaticLeases)
|
||||||
|
|
||||||
|
for _, lease := range r {
|
||||||
|
if err := ac.client.DeleteDHCPStaticLease(lease); err != nil {
|
||||||
|
ac.rl.With("hostname", lease.Hostname, "error", err).Error("error deleting dhcp static lease")
|
||||||
|
if !ac.cfg.ContinueOnError {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, lease := range a {
|
||||||
|
if err := ac.client.AddDHCPStaticLease(lease); err != nil {
|
||||||
|
ac.rl.With("hostname", lease.Hostname, "error", err).Error("error adding dhcp static lease")
|
||||||
|
if !ac.cfg.ContinueOnError {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func syncFilterType(
|
||||||
|
rl *zap.SugaredLogger,
|
||||||
|
of *[]model.Filter,
|
||||||
|
rFilters *[]model.Filter,
|
||||||
|
whitelist bool,
|
||||||
|
replica client.Client,
|
||||||
|
continueOnError bool,
|
||||||
|
) error {
|
||||||
|
fa, fu, fd := model.MergeFilters(rFilters, of)
|
||||||
|
|
||||||
|
for _, f := range fd {
|
||||||
|
if err := replica.DeleteFilter(whitelist, f); err != nil {
|
||||||
|
rl.With("filter", f.Name, "url", f.Url, "whitelist", whitelist, "error", err).Error("error deleting filter")
|
||||||
|
if !continueOnError {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, f := range fa {
|
||||||
|
if err := replica.AddFilter(whitelist, f); err != nil {
|
||||||
|
rl.With("filter", f.Name, "url", f.Url, "whitelist", whitelist, "error", err).Error("error adding filter")
|
||||||
|
if !continueOnError {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, f := range fu {
|
||||||
|
if err := replica.UpdateFilter(whitelist, f); err != nil {
|
||||||
|
rl.With("filter", f.Name, "url", f.Url, "whitelist", whitelist, "error", err).Error("error updating filter")
|
||||||
|
if !continueOnError {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(fa) > 0 || len(fu) > 0 {
|
||||||
|
if err := replica.RefreshFilters(whitelist); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
103
pkg/sync/action.go
Normal file
103
pkg/sync/action.go
Normal file
@@ -0,0 +1,103 @@
|
|||||||
|
package sync
|
||||||
|
|
||||||
|
import (
|
||||||
|
"go.uber.org/zap"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func setupActions(cfg *types.Config) (actions []syncAction) {
|
||||||
|
if cfg.Features.GeneralSettings {
|
||||||
|
actions = append(actions,
|
||||||
|
action("profile info", actionProfileInfo),
|
||||||
|
action("protection", actionProtection),
|
||||||
|
action("parental", actionParental),
|
||||||
|
action("safe search config", actionSafeSearchConfig),
|
||||||
|
action("safe browsing", actionSafeBrowsing),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.DNS.ServerConfig {
|
||||||
|
actions = append(actions,
|
||||||
|
action("DNS server config", actionDNSServerConfig),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.QueryLogConfig {
|
||||||
|
actions = append(actions,
|
||||||
|
action("query log config", actionQueryLogConfig),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.StatsConfig {
|
||||||
|
actions = append(actions,
|
||||||
|
action("stats config", actionStatsConfig),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.DNS.Rewrites {
|
||||||
|
actions = append(actions,
|
||||||
|
action("DNS rewrites", actionDNSRewrites),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.Filters {
|
||||||
|
actions = append(actions,
|
||||||
|
action("actionFilters", actionFilters),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.Services {
|
||||||
|
actions = append(actions,
|
||||||
|
action("blocked services schedule", actionBlockedServicesSchedule),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.ClientSettings {
|
||||||
|
actions = append(actions,
|
||||||
|
action("client settings", actionClientSettings),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.DNS.AccessLists {
|
||||||
|
actions = append(actions,
|
||||||
|
action("DNS access lists", actionDNSAccessLists),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.DHCP.ServerConfig {
|
||||||
|
actions = append(actions,
|
||||||
|
action("DHCP server config", actionDHCPServerConfig),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
if cfg.Features.DHCP.StaticLeases {
|
||||||
|
actions = append(actions,
|
||||||
|
action("DHCP static leases", actionDHCPStaticLeases),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
return actions
|
||||||
|
}
|
||||||
|
|
||||||
|
type syncAction interface {
|
||||||
|
sync(ac *actionContext) error
|
||||||
|
name() string
|
||||||
|
}
|
||||||
|
|
||||||
|
type actionContext struct {
|
||||||
|
rl *zap.SugaredLogger
|
||||||
|
origin *origin
|
||||||
|
client client.Client
|
||||||
|
replicaStatus *model.ServerStatus
|
||||||
|
replica types.AdGuardInstance
|
||||||
|
cfg *types.Config
|
||||||
|
}
|
||||||
|
|
||||||
|
type defaultAction struct {
|
||||||
|
myName string
|
||||||
|
doSync func(ac *actionContext) error
|
||||||
|
}
|
||||||
|
|
||||||
|
func action(name string, f func(ac *actionContext) error) syncAction {
|
||||||
|
return &defaultAction{myName: name, doSync: f}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *defaultAction) sync(ac *actionContext) error {
|
||||||
|
return d.doSync(ac)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *defaultAction) name() string {
|
||||||
|
return d.myName
|
||||||
|
}
|
||||||
105
pkg/sync/http.go
105
pkg/sync/http.go
@@ -14,9 +14,11 @@ import (
|
|||||||
"syscall"
|
"syscall"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/log"
|
|
||||||
"github.com/bakito/adguardhome-sync/version"
|
|
||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/metrics"
|
||||||
|
"github.com/bakito/adguardhome-sync/version"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@@ -32,11 +34,38 @@ func (w *worker) handleSync(c *gin.Context) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (w *worker) handleRoot(c *gin.Context) {
|
func (w *worker) handleRoot(c *gin.Context) {
|
||||||
c.HTML(http.StatusOK, "index.html", map[string]interface{}{
|
total, dns, blocked, malware, adult := metrics.StatsGraph()
|
||||||
|
|
||||||
|
c.HTML(http.StatusOK, "index.html", map[string]any{
|
||||||
"DarkMode": w.cfg.API.DarkMode,
|
"DarkMode": w.cfg.API.DarkMode,
|
||||||
|
"Metrics": w.cfg.API.Metrics.Enabled,
|
||||||
"Version": version.Version,
|
"Version": version.Version,
|
||||||
"Build": version.Build,
|
"Build": version.Build,
|
||||||
"SyncStatus": w.status(),
|
"SyncStatus": w.status(),
|
||||||
|
"Stats": map[string]any{
|
||||||
|
"Labels": getLast24Hours(),
|
||||||
|
"DNS": dns,
|
||||||
|
"Blocked": blocked,
|
||||||
|
"BlockedPercentage": fmt.Sprintf(
|
||||||
|
"%.2f",
|
||||||
|
(float64(*total.NumBlockedFiltering)*100.0)/float64(*total.NumDnsQueries),
|
||||||
|
),
|
||||||
|
"Malware": malware,
|
||||||
|
"MalwarePercentage": fmt.Sprintf(
|
||||||
|
"%.2f",
|
||||||
|
(float64(*total.NumReplacedSafebrowsing)*100.0)/float64(*total.NumDnsQueries),
|
||||||
|
),
|
||||||
|
"Adult": adult,
|
||||||
|
"AdultPercentage": fmt.Sprintf(
|
||||||
|
"%.2f",
|
||||||
|
(float64(*total.NumReplacedParental)*100.0)/float64(*total.NumDnsQueries),
|
||||||
|
),
|
||||||
|
|
||||||
|
"TotalDNS": total.NumDnsQueries,
|
||||||
|
"TotalBlocked": total.NumBlockedFiltering,
|
||||||
|
"TotalMalware": total.NumReplacedSafebrowsing,
|
||||||
|
"TotalAdult": total.NumReplacedParental,
|
||||||
|
},
|
||||||
},
|
},
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
@@ -49,12 +78,22 @@ func (w *worker) handleLogs(c *gin.Context) {
|
|||||||
c.Data(http.StatusOK, "text/plain", []byte(strings.Join(log.Logs(), "")))
|
c.Data(http.StatusOK, "text/plain", []byte(strings.Join(log.Logs(), "")))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (w *worker) handleClearLogs(c *gin.Context) {
|
||||||
|
log.Clear()
|
||||||
|
c.Status(http.StatusOK)
|
||||||
|
}
|
||||||
|
|
||||||
func (w *worker) handleStatus(c *gin.Context) {
|
func (w *worker) handleStatus(c *gin.Context) {
|
||||||
c.JSON(http.StatusOK, w.status())
|
c.JSON(http.StatusOK, w.status())
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *worker) listenAndServe() {
|
func (w *worker) listenAndServe() {
|
||||||
l.With("port", w.cfg.API.Port).Info("Starting API server")
|
sl := l.With("port", w.cfg.API.Port)
|
||||||
|
if w.cfg.API.TLS.Enabled() {
|
||||||
|
c, k := w.cfg.API.TLS.Certs()
|
||||||
|
sl = sl.With("tls-cert", c).With("tls-key", k)
|
||||||
|
}
|
||||||
|
sl.Info("Starting API server")
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
|
|
||||||
@@ -74,12 +113,25 @@ func (w *worker) listenAndServe() {
|
|||||||
r.SetHTMLTemplate(template.Must(template.New("index.html").Parse(string(index))))
|
r.SetHTMLTemplate(template.Must(template.New("index.html").Parse(string(index))))
|
||||||
r.POST("/api/v1/sync", w.handleSync)
|
r.POST("/api/v1/sync", w.handleSync)
|
||||||
r.GET("/api/v1/logs", w.handleLogs)
|
r.GET("/api/v1/logs", w.handleLogs)
|
||||||
|
r.POST("/api/v1/clear-logs", w.handleClearLogs)
|
||||||
r.GET("/api/v1/status", w.handleStatus)
|
r.GET("/api/v1/status", w.handleStatus)
|
||||||
r.GET("/favicon.ico", w.handleFavicon)
|
r.GET("/favicon.ico", w.handleFavicon)
|
||||||
r.GET("/", w.handleRoot)
|
r.GET("/", w.handleRoot)
|
||||||
|
if w.cfg.API.Metrics.Enabled {
|
||||||
|
r.GET("/metrics", metrics.Handler())
|
||||||
|
|
||||||
|
go w.startScraping()
|
||||||
|
}
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
if err := httpServer.ListenAndServe(); !errors.Is(err, http.ErrServerClosed) {
|
var err error
|
||||||
|
if w.cfg.API.TLS.Enabled() {
|
||||||
|
err = httpServer.ListenAndServeTLS(w.cfg.API.TLS.Certs())
|
||||||
|
} else {
|
||||||
|
err = httpServer.ListenAndServe()
|
||||||
|
}
|
||||||
|
|
||||||
|
if !errors.Is(err, http.ErrServerClosed) {
|
||||||
l.With("error", err).Fatalf("HTTP server ListenAndServe")
|
l.With("error", err).Fatalf("HTTP server ListenAndServe")
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
@@ -101,7 +153,7 @@ func (w *worker) listenAndServe() {
|
|||||||
l.Fatal("os.Kill - terminating...")
|
l.Fatal("os.Kill - terminating...")
|
||||||
}()
|
}()
|
||||||
|
|
||||||
gracefullCtx, cancelShutdown := context.WithTimeout(context.Background(), 5*time.Second)
|
gracefulCtx, cancelShutdown := context.WithTimeout(context.Background(), 5*time.Second)
|
||||||
defer cancelShutdown()
|
defer cancelShutdown()
|
||||||
|
|
||||||
if w.cron != nil {
|
if w.cron != nil {
|
||||||
@@ -109,7 +161,7 @@ func (w *worker) listenAndServe() {
|
|||||||
w.cron.Stop()
|
w.cron.Stop()
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := httpServer.Shutdown(gracefullCtx); err != nil {
|
if err := httpServer.Shutdown(gracefulCtx); err != nil {
|
||||||
l.With("error", err).Error("Shutdown error")
|
l.With("error", err).Error("Shutdown error")
|
||||||
defer os.Exit(1)
|
defer os.Exit(1)
|
||||||
} else {
|
} else {
|
||||||
@@ -118,18 +170,41 @@ func (w *worker) listenAndServe() {
|
|||||||
|
|
||||||
// manually cancel context if not using httpServer.RegisterOnShutdown(cancel)
|
// manually cancel context if not using httpServer.RegisterOnShutdown(cancel)
|
||||||
cancel()
|
cancel()
|
||||||
|
|
||||||
defer os.Exit(0)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type syncStatus struct {
|
type syncStatus struct {
|
||||||
Origin replicaStatus `json:"origin"`
|
SyncRunning bool `json:"syncRunning"`
|
||||||
Replicas []replicaStatus `json:"replicas"`
|
Origin replicaStatus `json:"origin"`
|
||||||
|
Replicas []replicaStatus `json:"replicas"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type replicaStatus struct {
|
type replicaStatus struct {
|
||||||
Host string `json:"origin"`
|
Host string `json:"host"`
|
||||||
URL string `json:"url"`
|
URL string `json:"url"`
|
||||||
Status string `json:"status"`
|
Status string `json:"status"`
|
||||||
Error string `json:"error"`
|
Error string `json:"error,omitempty"`
|
||||||
|
ProtectionEnabled *bool `json:"protection_enabled"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func getLast24Hours() []string {
|
||||||
|
var result []string
|
||||||
|
currentTime := time.Now()
|
||||||
|
|
||||||
|
// Loop to get the last 24 hours
|
||||||
|
for i := range 24 {
|
||||||
|
// Calculate the time for the current hour in the loop
|
||||||
|
timeInstance := currentTime.Add(time.Duration(-i) * time.Hour)
|
||||||
|
timeInstance = timeInstance.Truncate(time.Hour)
|
||||||
|
|
||||||
|
// Format the time as "14 Dec 17:00"
|
||||||
|
formattedTime := timeInstance.Format("02 Jan 15:04")
|
||||||
|
result = append(result, formattedTime)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Reverse the slice to get the correct order (from oldest to latest)
|
||||||
|
for i, j := 0, len(result)-1; i < j; i, j = i+1, j-1 {
|
||||||
|
result[i], result[j] = result[j], result[i]
|
||||||
|
}
|
||||||
|
|
||||||
|
return result
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,15 +1,15 @@
|
|||||||
<html lang="en">
|
<html lang="en">
|
||||||
<head>
|
<head>
|
||||||
<title>AdGuardHome sync</title>
|
<title>AdGuardHome sync</title>
|
||||||
<script type="text/javascript" src="https://code.jquery.com/jquery-3.6.0.min.js">
|
<script type="text/javascript" src="https://code.jquery.com/jquery-3.7.1.min.js">
|
||||||
</script>
|
</script>
|
||||||
{{- if .DarkMode }}
|
{{- if .DarkMode }}
|
||||||
<link rel="stylesheet" href="https://bootswatch.com/5/darkly/bootstrap.min.css"
|
<link rel="stylesheet" href="https://bootswatch.com/5/darkly/bootstrap.min.css"
|
||||||
crossorigin="anonymous">
|
crossorigin="anonymous">
|
||||||
{{- else }}
|
{{- else }}
|
||||||
<link href="https://cdn.jsdelivr.net/npm/bootstrap@5.1.0/dist/css/bootstrap.min.css" rel="stylesheet"
|
<link href="https://cdn.jsdelivr.net/npm/bootstrap@5.3.3/dist/css/bootstrap.min.css" rel="stylesheet"
|
||||||
integrity="sha384-KyZXEAg3QhqLMpG8r+8fhAXLRk2vvoC2f3B09zVXn8CA5QIVfZOJ3BCsw2P0p/We"
|
integrity="sha384-QWTKZyjpPEjISv5WaRU9OFeRpok6YctnYmDr5pNlyT2bRjXh0JMhjY6hW+ALEwIH"
|
||||||
crossOrigin="anonymous">
|
crossorigin="anonymous">
|
||||||
{{- end }}
|
{{- end }}
|
||||||
<script type="text/javascript">
|
<script type="text/javascript">
|
||||||
$(document).ready(function () {
|
$(document).ready(function () {
|
||||||
@@ -30,6 +30,12 @@
|
|||||||
}
|
}
|
||||||
);
|
);
|
||||||
});
|
});
|
||||||
|
$("#clearLogs").click(function () {
|
||||||
|
$.post("api/v1/clear-logs", {}, function () {
|
||||||
|
$('#logs').html("");
|
||||||
|
}
|
||||||
|
);
|
||||||
|
});
|
||||||
$("#sync").click(function () {
|
$("#sync").click(function () {
|
||||||
$.post("api/v1/sync", {}, function (data) {
|
$.post("api/v1/sync", {}, function (data) {
|
||||||
});
|
});
|
||||||
@@ -39,6 +45,43 @@
|
|||||||
});
|
});
|
||||||
</script>
|
</script>
|
||||||
<link rel="shortcut icon" href="favicon.ico">
|
<link rel="shortcut icon" href="favicon.ico">
|
||||||
|
<style>
|
||||||
|
.stat-card {
|
||||||
|
border-radius: 8px;
|
||||||
|
box-shadow: 0 2px 8px rgba(0, 0, 0, 0.5);
|
||||||
|
padding: 15px;
|
||||||
|
text-align: left;
|
||||||
|
display: flex;
|
||||||
|
flex-direction: column;
|
||||||
|
justify-content: space-between;
|
||||||
|
height: 100%;
|
||||||
|
}
|
||||||
|
{{- if .Metrics }}
|
||||||
|
.stat-card h3 {
|
||||||
|
margin: 0;
|
||||||
|
font-size: 2rem;
|
||||||
|
}
|
||||||
|
.stat-card p {
|
||||||
|
margin: 5px 0;
|
||||||
|
font-size: 0.9rem;
|
||||||
|
}
|
||||||
|
.percentage {
|
||||||
|
font-size: 0.9rem;
|
||||||
|
text-align: right;
|
||||||
|
height: 20px;
|
||||||
|
}
|
||||||
|
canvas {
|
||||||
|
flex-grow: 1;
|
||||||
|
height: 100px !important;
|
||||||
|
}
|
||||||
|
{{- end }}
|
||||||
|
.button-row {
|
||||||
|
margin-top: 20px;
|
||||||
|
}
|
||||||
|
.btn-group {
|
||||||
|
margin: 5px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<div class="container-fluid px-4">
|
<div class="container-fluid px-4">
|
||||||
@@ -48,15 +91,60 @@
|
|||||||
<p class="h6">{{ .Version }} ({{ .Build }})</p>
|
<p class="h6">{{ .Version }} ({{ .Build }})</p>
|
||||||
</p>
|
</p>
|
||||||
</div>
|
</div>
|
||||||
<div class="row">
|
{{- if .Metrics }}
|
||||||
|
<div class="row g-4 d-flex">
|
||||||
|
<div class="col-12 col-md-3 d-flex">
|
||||||
|
<div class="stat-card flex-fill">
|
||||||
|
<div class="percentage"></div>
|
||||||
|
<h3 style="color: rgb(78, 141, 245);">{{.Stats.TotalDNS}}</h3>
|
||||||
|
<p>DNS Queries</p>
|
||||||
|
<canvas id="dnsQueriesChart"></canvas>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div class="col-12 col-md-3 d-flex">
|
||||||
|
<div class="stat-card flex-fill">
|
||||||
|
<div class="percentage" style="color: rgb(255, 94, 94);">{{.Stats.BlockedPercentage}}%</div>
|
||||||
|
<h3 style="color: rgb(255, 94, 94);">{{.Stats.TotalBlocked}}</h3>
|
||||||
|
<p>Blocked by Filters</p>
|
||||||
|
<canvas id="blockedFiltersChart"></canvas>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div class="col-12 col-md-3 d-flex">
|
||||||
|
<div class="stat-card flex-fill">
|
||||||
|
<div class="percentage" style="color: rgb(110, 224, 122);">{{.Stats.MalwarePercentage}}%</div>
|
||||||
|
<h3 style="color: rgb(110, 224, 122);">{{.Stats.TotalMalware}}</h3>
|
||||||
|
<p>Blocked malware/phishing</p>
|
||||||
|
<canvas id="malwareChart"></canvas>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div class="col-12 col-md-3 d-flex">
|
||||||
|
<div class="stat-card flex-fill">
|
||||||
|
<div class="percentage" style="color: rgb(232, 198, 78);">{{.Stats.AdultPercentage}}%</div>
|
||||||
|
<h3 style="color: rgb(232, 198, 78);">{{.Stats.TotalAdult}}</h3>
|
||||||
|
<p>Blocked adult websites</p>
|
||||||
|
<canvas id="adultWebsitesChart"></canvas>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
{{- end }}
|
||||||
|
<div class="row button-row">
|
||||||
<div class="col">
|
<div class="col">
|
||||||
<div class="btn-group" role="group">
|
<div class="btn-group" role="group">
|
||||||
<input class="btn btn-success" type="button" id="sync" value="Synchronize"/>
|
<button type="button" class="btn btn-success" id="sync">Synchronize</button>
|
||||||
<input class="btn btn-secondary" type="button" id="showLogs" value="Update Logs"/>
|
<button type="button" class="btn btn-secondary" id="showLogs">Update Logs</button>
|
||||||
|
<button type="button" class="btn btn-secondary dropdown-toggle dropdown-toggle-split" data-bs-toggle="dropdown" aria-haspopup="true" aria-expanded="false">
|
||||||
|
</button>
|
||||||
|
<div class="dropdown-menu">
|
||||||
|
<a class="dropdown-item" href="#" id="clearLogs">Clear Logs</a>
|
||||||
|
</div>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div class="col col-md-auto">
|
<div class="col col-md-auto">
|
||||||
<div class="float-right">
|
<div class="btn-group float-right" role="group">
|
||||||
<a href="{{ .SyncStatus.Origin.URL }}" target="_blank" class="btn btn-{{ .SyncStatus.Origin.Status }}"
|
<a href="{{ .SyncStatus.Origin.URL }}" target="_blank" class="btn btn-{{ .SyncStatus.Origin.Status }}"
|
||||||
type="button" id="origin"
|
type="button" id="origin"
|
||||||
{{ if .SyncStatus.Origin.Error }} title="{{ .SyncStatus.Origin.Error }}" {{ end }}>Origin {{ .SyncStatus.Origin.Host }}</a>
|
{{ if .SyncStatus.Origin.Error }} title="{{ .SyncStatus.Origin.Error }}" {{ end }}>Origin {{ .SyncStatus.Origin.Host }}</a>
|
||||||
@@ -69,10 +157,97 @@
|
|||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div class="row mt-3">
|
<div class="row mt-3">
|
||||||
<div class="col-12">
|
<div class="col-12 col-md-12">
|
||||||
<pre class="p-3 border"><code id="logs"></code></pre>
|
<div class="stat-card">
|
||||||
|
<pre class="p-3 border"><code id="logs"></code></pre>
|
||||||
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
<!-- openssl dgst -sha384 -binary popper.min.js | openssl base64 -A -->
|
||||||
|
<script src="https://cdn.jsdelivr.net/npm/@popperjs/core@2.9.2/dist/umd/popper.min.js"
|
||||||
|
integrity="sha384-IQsoLXl5PILFhosVNubq5LC7Qb9DXgDA9i+tQ8Zj3iwWAwPtgFTxbJ8NT4GN1R8p" crossorigin="anonymous">
|
||||||
|
</script>
|
||||||
|
<script src="https://cdn.jsdelivr.net/npm/bootstrap@5.3.3/dist/js/bootstrap.min.js"
|
||||||
|
integrity="sha384-0pUGZvbkm6XF6gxjEnlmuGrJXVbNuzT9qBBavbLwCsOGabYfZo0T0to5eqruptLy" crossorigin="anonymous">
|
||||||
|
</script>
|
||||||
|
{{- if .Metrics }}
|
||||||
|
<script src="https://cdn.jsdelivr.net/npm/chart.js@4.4.7/dist/chart.umd.min.js"ŝ
|
||||||
|
integrity="sha384-vsrfeLOOY6KuIYKDlmVH5UiBmgIdB1oEf7p01YgWHuqmOHfZr374+odEv96n9tNC" crossorigin="anonymous">
|
||||||
|
</script>
|
||||||
|
<script>
|
||||||
|
// Function to create minimal line charts
|
||||||
|
function createChart(canvasId, data) {
|
||||||
|
const ctx = document.getElementById(canvasId).getContext('2d');
|
||||||
|
|
||||||
|
const datasets = Array(data.length);
|
||||||
|
for (let i = 0; i < data.length; i++) {
|
||||||
|
datasets[i] = {
|
||||||
|
data: data[i].data,
|
||||||
|
title: data[i].title,
|
||||||
|
backgroundColor: `rgb(${data[i].r}, ${data[i].g}, ${data[i].b}, 0.2)`,
|
||||||
|
borderColor: `rgb(${data[i].r}, ${data[i].g}, ${data[i].b}, 1)`,
|
||||||
|
borderWidth: 3,
|
||||||
|
fill: data[i].fill,
|
||||||
|
pointRadius: 0,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
new Chart(ctx, {
|
||||||
|
type: 'line',
|
||||||
|
data: {
|
||||||
|
labels: {{.Stats.Labels}},
|
||||||
|
datasets: datasets
|
||||||
|
},
|
||||||
|
options: {
|
||||||
|
responsive: true,
|
||||||
|
maintainAspectRatio: false,
|
||||||
|
interaction: {
|
||||||
|
mode: 'index',
|
||||||
|
intersect: false,
|
||||||
|
},
|
||||||
|
plugins: {
|
||||||
|
legend: { display: false },
|
||||||
|
tooltip: {
|
||||||
|
enabled: true,
|
||||||
|
bodyFont: {
|
||||||
|
size: 20
|
||||||
|
},
|
||||||
|
titleFont: {
|
||||||
|
size: 20
|
||||||
|
},
|
||||||
|
displayColors: false,
|
||||||
|
callbacks: {
|
||||||
|
label: function(tooltipItem) {
|
||||||
|
if (tooltipItem.dataset.title) {
|
||||||
|
return tooltipItem.raw + " - " + tooltipItem.dataset.title;
|
||||||
|
}
|
||||||
|
return tooltipItem.raw;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
scales: {
|
||||||
|
x: { display: false,
|
||||||
|
title: {
|
||||||
|
display: true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
y: { display: false,
|
||||||
|
min: 0,
|
||||||
|
title: {
|
||||||
|
display: true
|
||||||
|
} }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
createChart('dnsQueriesChart', {{.Stats.DNS}});
|
||||||
|
createChart('blockedFiltersChart', {{.Stats.Blocked}});
|
||||||
|
createChart('malwareChart', {{.Stats.Malware}});
|
||||||
|
createChart('adultWebsitesChart', {{.Stats.Adult}});
|
||||||
|
</script>
|
||||||
|
{{- end }}
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|||||||
51
pkg/sync/scrape.go
Normal file
51
pkg/sync/scrape.go
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
package sync
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/metrics"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (w *worker) startScraping() {
|
||||||
|
metrics.Init()
|
||||||
|
if w.cfg.API.Metrics.ScrapeInterval == 0 {
|
||||||
|
w.cfg.API.Metrics.ScrapeInterval = 30 * time.Second
|
||||||
|
}
|
||||||
|
if w.cfg.API.Metrics.QueryLogLimit == 0 {
|
||||||
|
w.cfg.API.Metrics.QueryLogLimit = 10_000
|
||||||
|
}
|
||||||
|
l.With(
|
||||||
|
"scrape-interval", w.cfg.API.Metrics.ScrapeInterval,
|
||||||
|
"query-log-limit", w.cfg.API.Metrics.QueryLogLimit,
|
||||||
|
).Info("setup metrics")
|
||||||
|
w.scrape()
|
||||||
|
for range time.Tick(w.cfg.API.Metrics.ScrapeInterval) {
|
||||||
|
w.scrape()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *worker) scrape() {
|
||||||
|
var iml metrics.InstanceMetricsList
|
||||||
|
|
||||||
|
iml.Metrics = append(iml.Metrics, w.getMetrics(*w.cfg.Origin))
|
||||||
|
for _, replica := range w.cfg.Replicas {
|
||||||
|
iml.Metrics = append(iml.Metrics, w.getMetrics(replica))
|
||||||
|
}
|
||||||
|
metrics.UpdateInstances(iml)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *worker) getMetrics(inst types.AdGuardInstance) metrics.InstanceMetrics {
|
||||||
|
var im metrics.InstanceMetrics
|
||||||
|
client, err := w.createClient(inst)
|
||||||
|
if err != nil {
|
||||||
|
l.With("error", err, "url", w.cfg.Origin.URL).Error("Error creating origin client")
|
||||||
|
return im
|
||||||
|
}
|
||||||
|
|
||||||
|
im.HostName = inst.Host
|
||||||
|
im.Status, _ = client.Status()
|
||||||
|
im.Stats, _ = client.Stats()
|
||||||
|
im.QueryLog, _ = client.QueryLog(w.cfg.API.Metrics.QueryLogLimit)
|
||||||
|
return im
|
||||||
|
}
|
||||||
430
pkg/sync/sync.go
430
pkg/sync/sync.go
@@ -7,27 +7,29 @@ import (
|
|||||||
"sort"
|
"sort"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/robfig/cron/v3"
|
||||||
|
"go.uber.org/zap"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client"
|
"github.com/bakito/adguardhome-sync/pkg/client"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/log"
|
"github.com/bakito/adguardhome-sync/pkg/log"
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/metrics"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/types"
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/utils"
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/versions"
|
"github.com/bakito/adguardhome-sync/pkg/versions"
|
||||||
"github.com/bakito/adguardhome-sync/version"
|
"github.com/bakito/adguardhome-sync/version"
|
||||||
"github.com/robfig/cron/v3"
|
|
||||||
"go.uber.org/zap"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var l = log.GetLogger("sync")
|
var l = log.GetLogger("sync")
|
||||||
|
|
||||||
// Sync config from origin to replica
|
// Sync config from origin to replica.
|
||||||
func Sync(cfg *types.Config) error {
|
func Sync(cfg *types.Config) error {
|
||||||
if cfg.Origin.URL == "" {
|
if cfg.Origin.URL == "" {
|
||||||
return fmt.Errorf("origin URL is required")
|
return errors.New("origin URL is required")
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(cfg.UniqueReplicas()) == 0 {
|
if len(cfg.UniqueReplicas()) == 0 {
|
||||||
return fmt.Errorf("no replicas configured")
|
return errors.New("no replicas configured")
|
||||||
}
|
}
|
||||||
|
|
||||||
l.With(
|
l.With(
|
||||||
@@ -41,10 +43,8 @@ func Sync(cfg *types.Config) error {
|
|||||||
cfg.Origin.AutoSetup = false
|
cfg.Origin.AutoSetup = false
|
||||||
|
|
||||||
w := &worker{
|
w := &worker{
|
||||||
cfg: cfg,
|
cfg: cfg,
|
||||||
createClient: func(ai types.AdGuardInstance) (client.Client, error) {
|
createClient: client.New,
|
||||||
return client.New(ai)
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
if cfg.Cron != "" {
|
if cfg.Cron != "" {
|
||||||
w.cron = cron.New()
|
w.cron = cron.New()
|
||||||
@@ -66,16 +66,12 @@ func Sync(cfg *types.Config) error {
|
|||||||
if cfg.API.Port != 0 {
|
if cfg.API.Port != 0 {
|
||||||
w.cron.Start()
|
w.cron.Start()
|
||||||
} else {
|
} else {
|
||||||
|
runOnStartAsync(cfg, w)
|
||||||
w.cron.Run()
|
w.cron.Run()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if cfg.API.Port != 0 {
|
if cfg.API.Port != 0 {
|
||||||
if cfg.RunOnStart {
|
runOnStartAsync(cfg, w)
|
||||||
go func() {
|
|
||||||
l.Info("Running sync on startup")
|
|
||||||
w.sync()
|
|
||||||
}()
|
|
||||||
}
|
|
||||||
w.listenAndServe()
|
w.listenAndServe()
|
||||||
} else if cfg.RunOnStart {
|
} else if cfg.RunOnStart {
|
||||||
l.Info("Running sync on startup")
|
l.Info("Running sync on startup")
|
||||||
@@ -85,16 +81,26 @@ func Sync(cfg *types.Config) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func runOnStartAsync(cfg *types.Config, w *worker) {
|
||||||
|
if cfg.RunOnStart {
|
||||||
|
go func() {
|
||||||
|
l.Info("Running sync on startup")
|
||||||
|
w.sync()
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
type worker struct {
|
type worker struct {
|
||||||
cfg *types.Config
|
cfg *types.Config
|
||||||
running bool
|
running bool
|
||||||
cron *cron.Cron
|
cron *cron.Cron
|
||||||
createClient func(instance types.AdGuardInstance) (client.Client, error)
|
createClient func(instance types.AdGuardInstance) (client.Client, error)
|
||||||
|
actions []syncAction
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *worker) status() *syncStatus {
|
func (w *worker) status() *syncStatus {
|
||||||
syncStatus := &syncStatus{
|
syncStatus := &syncStatus{
|
||||||
Origin: w.getStatus(w.cfg.Origin),
|
Origin: w.getStatus(*w.cfg.Origin),
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, replica := range w.cfg.Replicas {
|
for _, replica := range w.cfg.Replicas {
|
||||||
@@ -109,25 +115,36 @@ func (w *worker) status() *syncStatus {
|
|||||||
return syncStatus.Replicas[i].Host < syncStatus.Replicas[j].Host
|
return syncStatus.Replicas[i].Host < syncStatus.Replicas[j].Host
|
||||||
})
|
})
|
||||||
|
|
||||||
|
syncStatus.SyncRunning = w.running
|
||||||
|
|
||||||
return syncStatus
|
return syncStatus
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *worker) getStatus(inst types.AdGuardInstance) replicaStatus {
|
func (w *worker) getStatus(inst types.AdGuardInstance) replicaStatus {
|
||||||
|
st := replicaStatus{Host: inst.WebHost, URL: inst.WebURL}
|
||||||
|
|
||||||
oc, err := w.createClient(inst)
|
oc, err := w.createClient(inst)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
l.With("error", err, "url", w.cfg.Origin.URL).Error("Error creating origin client")
|
l.With("error", err, "url", w.cfg.Origin.URL).Error("Error creating origin client")
|
||||||
return replicaStatus{Host: oc.Host(), URL: inst.URL, Error: err.Error(), Status: "danger"}
|
st.Status = "danger"
|
||||||
|
st.Error = err.Error()
|
||||||
|
return st
|
||||||
}
|
}
|
||||||
sl := l.With("from", oc.Host())
|
sl := l.With("from", inst.WebHost)
|
||||||
_, err = oc.Status()
|
status, err := oc.Status()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if errors.Is(err, client.ErrSetupNeeded) {
|
if errors.Is(err, client.ErrSetupNeeded) {
|
||||||
return replicaStatus{Host: oc.Host(), URL: inst.URL, Error: err.Error(), Status: "warning"}
|
st.Status = "warning"
|
||||||
|
st.Error = err.Error()
|
||||||
|
return st
|
||||||
}
|
}
|
||||||
sl.With("error", err).Error("Error getting origin status")
|
sl.With("error", err).Error("Error getting origin status")
|
||||||
return replicaStatus{Host: oc.Host(), URL: inst.URL, Error: err.Error(), Status: "danger"}
|
st.Status = "danger"
|
||||||
|
st.Error = err.Error()
|
||||||
|
return st
|
||||||
}
|
}
|
||||||
st := replicaStatus{Host: oc.Host(), URL: inst.URL, Status: "success"}
|
st.Status = "success"
|
||||||
|
st.ProtectionEnabled = utils.Ptr(status.ProtectionEnabled)
|
||||||
return st
|
return st
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -137,9 +154,11 @@ func (w *worker) sync() {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
w.running = true
|
w.running = true
|
||||||
defer func() { w.running = false }()
|
defer func() {
|
||||||
|
w.running = false
|
||||||
|
}()
|
||||||
|
|
||||||
oc, err := w.createClient(w.cfg.Origin)
|
oc, err := w.createClient(*w.cfg.Origin)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
l.With("error", err, "url", w.cfg.Origin.URL).Error("Error creating origin client")
|
l.With("error", err, "url", w.cfg.Origin.URL).Error("Error creating origin client")
|
||||||
return
|
return
|
||||||
@@ -155,7 +174,8 @@ func (w *worker) sync() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if versions.IsNewerThan(versions.MinAgh, o.status.Version) {
|
if versions.IsNewerThan(versions.MinAgh, o.status.Version) {
|
||||||
sl.With("error", err, "version", o.status.Version).Errorf("Origin AdGuard Home version must be >= %s", versions.MinAgh)
|
sl.With("error", err, "version", o.status.Version).
|
||||||
|
Errorf("Origin AdGuard Home version must be >= %s", versions.MinAgh)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -189,12 +209,6 @@ func (w *worker) sync() {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
o.blockedServices, err = oc.BlockedServices()
|
|
||||||
if err != nil {
|
|
||||||
sl.With("error", err).Error("Error getting origin blocked services")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
o.blockedServicesSchedule, err = oc.BlockedServicesSchedule()
|
o.blockedServicesSchedule, err = oc.BlockedServicesSchedule()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
sl.With("error", err).Error("Error getting origin blocked services schedule")
|
sl.With("error", err).Error("Error getting origin blocked services schedule")
|
||||||
@@ -203,7 +217,7 @@ func (w *worker) sync() {
|
|||||||
|
|
||||||
o.filters, err = oc.Filtering()
|
o.filters, err = oc.Filtering()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
sl.With("error", err).Error("Error getting origin filters")
|
sl.With("error", err).Error("Error getting origin actionFilters")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
o.clients, err = oc.Clients()
|
o.clients, err = oc.Clients()
|
||||||
@@ -242,6 +256,8 @@ func (w *worker) sync() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
w.actions = setupActions(w.cfg)
|
||||||
|
|
||||||
replicas := w.cfg.UniqueReplicas()
|
replicas := w.cfg.UniqueReplicas()
|
||||||
for _, replica := range replicas {
|
for _, replica := range replicas {
|
||||||
w.syncTo(sl, o, replica)
|
w.syncTo(sl, o, replica)
|
||||||
@@ -257,74 +273,65 @@ func (w *worker) syncTo(l *zap.SugaredLogger, o *origin, replica types.AdGuardIn
|
|||||||
|
|
||||||
rl := l.With("to", rc.Host())
|
rl := l.With("to", rc.Host())
|
||||||
rl.Info("Start sync")
|
rl.Info("Start sync")
|
||||||
|
start := time.Now()
|
||||||
|
withError := false
|
||||||
|
delta := time.Since(start).Seconds()
|
||||||
|
defer func() {
|
||||||
|
metrics.UpdateResult(rc.Host(), !withError, delta)
|
||||||
|
doneLog := rl.With("duration", fmt.Sprintf("%vs", delta))
|
||||||
|
if withError {
|
||||||
|
doneLog.Error("Sync done")
|
||||||
|
} else {
|
||||||
|
doneLog.Info("Sync done")
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
rs, err := w.statusWithSetup(rl, replica, rc)
|
replicaStatus, err := w.statusWithSetup(rl, replica, rc)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
rl.With("error", err).Error("Error getting replica status")
|
rl.With("error", err).Error("Error getting replica status")
|
||||||
|
withError = true
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
rl.With("version", rs.Version).Info("Connected to replica")
|
rl.With("version", replicaStatus.Version).Info("Connected to replica")
|
||||||
|
|
||||||
if versions.IsNewerThan(versions.MinAgh, rs.Version) {
|
if versions.IsNewerThan(versions.MinAgh, replicaStatus.Version) {
|
||||||
rl.With("error", err, "version", rs.Version).Errorf("Replica AdGuard Home version must be >= %s", versions.MinAgh)
|
rl.With("error", err, "version", replicaStatus.Version).
|
||||||
|
Errorf("Replica AdGuard Home version must be >= %s", versions.MinAgh)
|
||||||
|
withError = true
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if o.status.Version != rs.Version {
|
if o.status.Version != replicaStatus.Version {
|
||||||
rl.With("originVersion", o.status.Version, "replicaVersion", rs.Version).Warn("Versions do not match")
|
rl.With("originVersion", o.status.Version, "replicaVersion", replicaStatus.Version).
|
||||||
|
Warn("Versions do not match")
|
||||||
}
|
}
|
||||||
|
|
||||||
err = w.syncGeneralSettings(o, rs, rc)
|
ac := &actionContext{
|
||||||
if err != nil {
|
cfg: w.cfg,
|
||||||
rl.With("error", err).Error("Error syncing general settings")
|
rl: rl,
|
||||||
return
|
origin: o,
|
||||||
|
replicaStatus: replicaStatus,
|
||||||
|
client: rc,
|
||||||
|
replica: replica,
|
||||||
}
|
}
|
||||||
|
|
||||||
err = w.syncConfigs(o, rc)
|
for _, action := range w.actions {
|
||||||
if err != nil {
|
if err := action.sync(ac); err != nil {
|
||||||
rl.With("error", err).Error("Error syncing configs")
|
rl.With("error", err).Errorf("Error syncing %s", action.name())
|
||||||
return
|
withError = true
|
||||||
}
|
if !w.cfg.ContinueOnError {
|
||||||
|
return
|
||||||
err = w.syncRewrites(rl, o.rewrites, rc)
|
}
|
||||||
if err != nil {
|
|
||||||
rl.With("error", err).Error("Error syncing rewrites")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
err = w.syncFilters(o.filters, rc)
|
|
||||||
if err != nil {
|
|
||||||
rl.With("error", err).Error("Error syncing filters")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
err = w.syncServices(o.blockedServices, o.blockedServicesSchedule, rc)
|
|
||||||
if err != nil {
|
|
||||||
rl.With("error", err).Error("Error syncing blockedServices")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = w.syncClients(o.clients, rc); err != nil {
|
|
||||||
rl.With("error", err).Error("Error syncing clients")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = w.syncDNS(o.accessList, o.dnsConfig, rc); err != nil {
|
|
||||||
rl.With("error", err).Error("Error syncing dns")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if w.cfg.Features.DHCP.ServerConfig || w.cfg.Features.DHCP.StaticLeases {
|
|
||||||
if err = w.syncDHCPServer(o.dhcpServerConfig, rc, replica); err != nil {
|
|
||||||
rl.With("error", err).Error("Error syncing dhcp")
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
rl.Info("Sync done")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *worker) statusWithSetup(rl *zap.SugaredLogger, replica types.AdGuardInstance, rc client.Client) (*model.ServerStatus, error) {
|
func (w *worker) statusWithSetup(
|
||||||
|
rl *zap.SugaredLogger,
|
||||||
|
replica types.AdGuardInstance,
|
||||||
|
rc client.Client,
|
||||||
|
) (*model.ServerStatus, error) {
|
||||||
rs, err := rc.Status()
|
rs, err := rc.Status()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if replica.AutoSetup && errors.Is(err, client.ErrSetupNeeded) {
|
if replica.AutoSetup && errors.Is(err, client.ErrSetupNeeded) {
|
||||||
@@ -339,269 +346,14 @@ func (w *worker) statusWithSetup(rl *zap.SugaredLogger, replica types.AdGuardIns
|
|||||||
return rs, err
|
return rs, err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *worker) syncServices(os *model.BlockedServicesArray, obss *model.BlockedServicesSchedule, replica client.Client) error {
|
|
||||||
if w.cfg.Features.Services {
|
|
||||||
rs, err := replica.BlockedServices()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if !model.EqualsStringSlice(os, rs, true) {
|
|
||||||
if err := replica.SetBlockedServices(os); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
rbss, err := replica.BlockedServicesSchedule()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if !obss.Equals(rbss) {
|
|
||||||
if err := replica.SetBlockedServicesSchedule(obss); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (w *worker) syncFilters(of *model.FilterStatus, replica client.Client) error {
|
|
||||||
if w.cfg.Features.Filters {
|
|
||||||
rf, err := replica.Filtering()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = w.syncFilterType(of.Filters, rf.Filters, false, replica); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err = w.syncFilterType(of.WhitelistFilters, rf.WhitelistFilters, true, replica); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if utils.PtrToString(of.UserRules) != utils.PtrToString(rf.UserRules) {
|
|
||||||
return replica.SetCustomRules(of.UserRules)
|
|
||||||
}
|
|
||||||
|
|
||||||
if of.Enabled != rf.Enabled || of.Interval != rf.Interval {
|
|
||||||
if err = replica.ToggleFiltering(*of.Enabled, *of.Interval); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (w *worker) syncFilterType(of *[]model.Filter, rFilters *[]model.Filter, whitelist bool, replica client.Client) error {
|
|
||||||
fa, fu, fd := model.MergeFilters(rFilters, of)
|
|
||||||
|
|
||||||
if err := replica.DeleteFilters(whitelist, fd...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err := replica.AddFilters(whitelist, fa...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err := replica.UpdateFilters(whitelist, fu...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(fa) > 0 || len(fu) > 0 {
|
|
||||||
if err := replica.RefreshFilters(whitelist); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (w *worker) syncRewrites(rl *zap.SugaredLogger, or *model.RewriteEntries, replica client.Client) error {
|
|
||||||
if w.cfg.Features.DNS.Rewrites {
|
|
||||||
replicaRewrites, err := replica.RewriteList()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
a, r, d := replicaRewrites.Merge(or)
|
|
||||||
|
|
||||||
if err = replica.DeleteRewriteEntries(r...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err = replica.AddRewriteEntries(a...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, dupl := range d {
|
|
||||||
rl.With("domain", dupl.Domain, "answer", dupl.Answer).Warn("Skipping duplicated rewrite from source")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (w *worker) syncClients(oc *model.Clients, replica client.Client) error {
|
|
||||||
if w.cfg.Features.ClientSettings {
|
|
||||||
rc, err := replica.Clients()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
a, u, r := rc.Merge(oc)
|
|
||||||
|
|
||||||
if err = replica.DeleteClients(r...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err = replica.AddClients(a...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err = replica.UpdateClients(u...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (w *worker) syncGeneralSettings(o *origin, rs *model.ServerStatus, replica client.Client) error {
|
|
||||||
if w.cfg.Features.GeneralSettings {
|
|
||||||
|
|
||||||
if pro, err := replica.ProfileInfo(); err != nil {
|
|
||||||
return err
|
|
||||||
} else if merged := pro.ShouldSyncFor(o.profileInfo); merged != nil {
|
|
||||||
if err = replica.SetProfileInfo(merged); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if o.status.ProtectionEnabled != rs.ProtectionEnabled {
|
|
||||||
if err := replica.ToggleProtection(o.status.ProtectionEnabled); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if rp, err := replica.Parental(); err != nil {
|
|
||||||
return err
|
|
||||||
} else if o.parental != rp {
|
|
||||||
if err = replica.ToggleParental(o.parental); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if ssc, err := replica.SafeSearchConfig(); err != nil {
|
|
||||||
return err
|
|
||||||
} else if !o.safeSearch.Equals(ssc) {
|
|
||||||
if err = replica.SetSafeSearchConfig(o.safeSearch); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if rs, err := replica.SafeBrowsing(); err != nil {
|
|
||||||
return err
|
|
||||||
} else if o.safeBrowsing != rs {
|
|
||||||
if err = replica.ToggleSafeBrowsing(o.safeBrowsing); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (w *worker) syncConfigs(o *origin, rc client.Client) error {
|
|
||||||
if w.cfg.Features.QueryLogConfig {
|
|
||||||
qlc, err := rc.QueryLogConfig()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if !o.queryLogConfig.Equals(qlc) {
|
|
||||||
if err = rc.SetQueryLogConfig(o.queryLogConfig); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if w.cfg.Features.StatsConfig {
|
|
||||||
sc, err := rc.StatsConfig()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if o.statsConfig.Interval != sc.Interval {
|
|
||||||
if err = rc.SetStatsConfig(o.statsConfig); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (w *worker) syncDNS(oal *model.AccessList, odc *model.DNSConfig, rc client.Client) error {
|
|
||||||
if w.cfg.Features.DNS.AccessLists {
|
|
||||||
al, err := rc.AccessList()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if !al.Equals(oal) {
|
|
||||||
if err = rc.SetAccessList(oal); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if w.cfg.Features.DNS.ServerConfig {
|
|
||||||
dc, err := rc.DNSConfig()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if !dc.Equals(odc) {
|
|
||||||
if err = rc.SetDNSConfig(odc); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (w *worker) syncDHCPServer(osc *model.DhcpStatus, rc client.Client, replica types.AdGuardInstance) error {
|
|
||||||
if !w.cfg.Features.DHCP.ServerConfig && !w.cfg.Features.DHCP.StaticLeases {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
sc, err := rc.DhcpConfig()
|
|
||||||
if w.cfg.Features.DHCP.ServerConfig && osc.HasConfig() {
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
origClone := osc.Clone()
|
|
||||||
if replica.InterfaceName != "" {
|
|
||||||
// overwrite interface name
|
|
||||||
origClone.InterfaceName = utils.Ptr(replica.InterfaceName)
|
|
||||||
}
|
|
||||||
if replica.DHCPServerEnabled != nil {
|
|
||||||
// overwrite dhcp enabled
|
|
||||||
origClone.Enabled = replica.DHCPServerEnabled
|
|
||||||
}
|
|
||||||
|
|
||||||
if !sc.Equals(origClone) {
|
|
||||||
if err = rc.SetDhcpConfig(origClone); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if w.cfg.Features.DHCP.StaticLeases {
|
|
||||||
a, r := model.MergeDhcpStaticLeases(sc.StaticLeases, osc.StaticLeases)
|
|
||||||
|
|
||||||
if err = rc.DeleteDHCPStaticLeases(r...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err = rc.AddDHCPStaticLeases(a...); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
type origin struct {
|
type origin struct {
|
||||||
status *model.ServerStatus
|
status *model.ServerStatus
|
||||||
rewrites *model.RewriteEntries
|
rewrites *model.RewriteEntries
|
||||||
blockedServices *model.BlockedServicesArray
|
|
||||||
blockedServicesSchedule *model.BlockedServicesSchedule
|
blockedServicesSchedule *model.BlockedServicesSchedule
|
||||||
filters *model.FilterStatus
|
filters *model.FilterStatus
|
||||||
clients *model.Clients
|
clients *model.Clients
|
||||||
queryLogConfig *model.QueryLogConfig
|
queryLogConfig *model.QueryLogConfigWithIgnored
|
||||||
statsConfig *model.StatsConfig
|
statsConfig *model.GetStatsConfigResponse
|
||||||
accessList *model.AccessList
|
accessList *model.AccessList
|
||||||
dnsConfig *model.DNSConfig
|
dnsConfig *model.DNSConfig
|
||||||
dhcpServerConfig *model.DhcpStatus
|
dhcpServerConfig *model.DhcpStatus
|
||||||
|
|||||||
@@ -3,26 +3,26 @@ package sync
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
gm "go.uber.org/mock/gomock"
|
||||||
|
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client"
|
"github.com/bakito/adguardhome-sync/pkg/client"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
"github.com/bakito/adguardhome-sync/pkg/client/model"
|
||||||
clientmock "github.com/bakito/adguardhome-sync/pkg/mocks/client"
|
clientmock "github.com/bakito/adguardhome-sync/pkg/mocks/client"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/types"
|
"github.com/bakito/adguardhome-sync/pkg/types"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/utils"
|
"github.com/bakito/adguardhome-sync/pkg/utils"
|
||||||
"github.com/bakito/adguardhome-sync/pkg/versions"
|
"github.com/bakito/adguardhome-sync/pkg/versions"
|
||||||
gm "github.com/golang/mock/gomock"
|
|
||||||
"github.com/google/uuid"
|
|
||||||
. "github.com/onsi/ginkgo/v2"
|
|
||||||
. "github.com/onsi/gomega"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var boolTrue = true
|
|
||||||
|
|
||||||
var _ = Describe("Sync", func() {
|
var _ = Describe("Sync", func() {
|
||||||
var (
|
var (
|
||||||
mockCtrl *gm.Controller
|
mockCtrl *gm.Controller
|
||||||
cl *clientmock.MockClient
|
cl *clientmock.MockClient
|
||||||
w *worker
|
w *worker
|
||||||
te error
|
te error
|
||||||
|
ac *actionContext
|
||||||
)
|
)
|
||||||
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
@@ -49,17 +49,40 @@ var _ = Describe("Sync", func() {
|
|||||||
GeneralSettings: true,
|
GeneralSettings: true,
|
||||||
StatsConfig: true,
|
StatsConfig: true,
|
||||||
QueryLogConfig: true,
|
QueryLogConfig: true,
|
||||||
|
Theme: true,
|
||||||
|
},
|
||||||
|
Replicas: []types.AdGuardInstance{
|
||||||
|
{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
te = errors.New(uuid.NewString())
|
te = errors.New(uuid.NewString())
|
||||||
|
|
||||||
|
ac = &actionContext{
|
||||||
|
cfg: w.cfg,
|
||||||
|
rl: l,
|
||||||
|
origin: &origin{
|
||||||
|
profileInfo: &model.ProfileInfo{
|
||||||
|
Name: "origin",
|
||||||
|
Language: "en",
|
||||||
|
Theme: "auto",
|
||||||
|
},
|
||||||
|
status: &model.ServerStatus{},
|
||||||
|
safeSearch: &model.SafeSearchConfig{},
|
||||||
|
queryLogConfig: &model.QueryLogConfigWithIgnored{},
|
||||||
|
statsConfig: &model.PutStatsConfigUpdateRequest{},
|
||||||
|
},
|
||||||
|
replicaStatus: &model.ServerStatus{},
|
||||||
|
client: cl,
|
||||||
|
replica: w.cfg.Replicas[0],
|
||||||
|
}
|
||||||
})
|
})
|
||||||
AfterEach(func() {
|
AfterEach(func() {
|
||||||
defer mockCtrl.Finish()
|
defer mockCtrl.Finish()
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("worker", func() {
|
Context("worker", func() {
|
||||||
Context("syncRewrites", func() {
|
Context("actionDNSRewrites", func() {
|
||||||
var (
|
var (
|
||||||
domain string
|
domain string
|
||||||
answer string
|
answer string
|
||||||
@@ -70,289 +93,255 @@ var _ = Describe("Sync", func() {
|
|||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
domain = uuid.NewString()
|
domain = uuid.NewString()
|
||||||
answer = uuid.NewString()
|
answer = uuid.NewString()
|
||||||
reO = []model.RewriteEntry{{Domain: utils.Ptr(domain), Answer: utils.Ptr(answer)}}
|
reO = model.RewriteEntries{{Domain: utils.Ptr(domain), Answer: utils.Ptr(answer)}}
|
||||||
reR = []model.RewriteEntry{{Domain: utils.Ptr(domain), Answer: utils.Ptr(answer)}}
|
reR = model.RewriteEntries{{Domain: utils.Ptr(domain), Answer: utils.Ptr(answer)}}
|
||||||
})
|
})
|
||||||
It("should have no changes (empty slices)", func() {
|
It("should have no changes (empty slices)", func() {
|
||||||
|
ac.origin.rewrites = &reO
|
||||||
cl.EXPECT().RewriteList().Return(&reR, nil)
|
cl.EXPECT().RewriteList().Return(&reR, nil)
|
||||||
cl.EXPECT().AddRewriteEntries()
|
cl.EXPECT().AddRewriteEntries()
|
||||||
cl.EXPECT().DeleteRewriteEntries()
|
cl.EXPECT().DeleteRewriteEntries()
|
||||||
err := w.syncRewrites(l, &reO, cl)
|
err := actionDNSRewrites(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should add one rewrite entry", func() {
|
It("should add one rewrite entry", func() {
|
||||||
reR = []model.RewriteEntry{}
|
reR = []model.RewriteEntry{}
|
||||||
|
ac.origin.rewrites = &reO
|
||||||
cl.EXPECT().RewriteList().Return(&reR, nil)
|
cl.EXPECT().RewriteList().Return(&reR, nil)
|
||||||
cl.EXPECT().AddRewriteEntries(reO[0])
|
cl.EXPECT().AddRewriteEntries(reO[0])
|
||||||
cl.EXPECT().DeleteRewriteEntries()
|
cl.EXPECT().DeleteRewriteEntries()
|
||||||
err := w.syncRewrites(l, &reO, cl)
|
err := actionDNSRewrites(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should remove one rewrite entry", func() {
|
It("should remove one rewrite entry", func() {
|
||||||
reO = []model.RewriteEntry{}
|
reO = []model.RewriteEntry{}
|
||||||
|
ac.origin.rewrites = &reO
|
||||||
cl.EXPECT().RewriteList().Return(&reR, nil)
|
cl.EXPECT().RewriteList().Return(&reR, nil)
|
||||||
cl.EXPECT().AddRewriteEntries()
|
cl.EXPECT().AddRewriteEntries()
|
||||||
cl.EXPECT().DeleteRewriteEntries(reR[0])
|
cl.EXPECT().DeleteRewriteEntries(reR[0])
|
||||||
err := w.syncRewrites(l, &reO, cl)
|
err := actionDNSRewrites(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should remove one rewrite entry", func() {
|
It("should remove one rewrite entry", func() {
|
||||||
reO = []model.RewriteEntry{}
|
reO = []model.RewriteEntry{}
|
||||||
|
ac.origin.rewrites = &reO
|
||||||
cl.EXPECT().RewriteList().Return(&reR, nil)
|
cl.EXPECT().RewriteList().Return(&reR, nil)
|
||||||
cl.EXPECT().AddRewriteEntries()
|
cl.EXPECT().AddRewriteEntries()
|
||||||
cl.EXPECT().DeleteRewriteEntries(reR[0])
|
cl.EXPECT().DeleteRewriteEntries(reR[0])
|
||||||
err := w.syncRewrites(l, &reO, cl)
|
err := actionDNSRewrites(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should return error when error on RewriteList()", func() {
|
It("should return error when error on RewriteList()", func() {
|
||||||
|
ac.origin.rewrites = &reO
|
||||||
cl.EXPECT().RewriteList().Return(nil, te)
|
cl.EXPECT().RewriteList().Return(nil, te)
|
||||||
err := w.syncRewrites(l, &reO, cl)
|
err := actionDNSRewrites(ac)
|
||||||
Ω(err).Should(HaveOccurred())
|
Ω(err).Should(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should return error when error on AddRewriteEntries()", func() {
|
It("should return error when error on AddRewriteEntries()", func() {
|
||||||
|
ac.origin.rewrites = &reO
|
||||||
cl.EXPECT().RewriteList().Return(&reR, nil)
|
cl.EXPECT().RewriteList().Return(&reR, nil)
|
||||||
cl.EXPECT().DeleteRewriteEntries()
|
cl.EXPECT().DeleteRewriteEntries()
|
||||||
cl.EXPECT().AddRewriteEntries().Return(te)
|
cl.EXPECT().AddRewriteEntries().Return(te)
|
||||||
err := w.syncRewrites(l, &reO, cl)
|
err := actionDNSRewrites(ac)
|
||||||
Ω(err).Should(HaveOccurred())
|
Ω(err).Should(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should return error when error on DeleteRewriteEntries()", func() {
|
It("should return error when error on DeleteRewriteEntries()", func() {
|
||||||
|
ac.origin.rewrites = &reO
|
||||||
cl.EXPECT().RewriteList().Return(&reR, nil)
|
cl.EXPECT().RewriteList().Return(&reR, nil)
|
||||||
cl.EXPECT().DeleteRewriteEntries().Return(te)
|
cl.EXPECT().DeleteRewriteEntries().Return(te)
|
||||||
err := w.syncRewrites(l, &reO, cl)
|
err := actionDNSRewrites(ac)
|
||||||
Ω(err).Should(HaveOccurred())
|
Ω(err).Should(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
Context("syncClients", func() {
|
Context("actionClientSettings", func() {
|
||||||
var (
|
var (
|
||||||
clO *model.Clients
|
|
||||||
clR *model.Clients
|
clR *model.Clients
|
||||||
name string
|
name string
|
||||||
)
|
)
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
name = uuid.NewString()
|
name = uuid.NewString()
|
||||||
clO = &model.Clients{Clients: &model.ClientsArray{{Name: utils.Ptr(name)}}}
|
ac.origin.clients = &model.Clients{Clients: &model.ClientsArray{{Name: utils.Ptr(name)}}}
|
||||||
clR = &model.Clients{Clients: &model.ClientsArray{{Name: utils.Ptr(name)}}}
|
clR = &model.Clients{Clients: &model.ClientsArray{{Name: utils.Ptr(name)}}}
|
||||||
})
|
})
|
||||||
It("should have no changes (empty slices)", func() {
|
It("should have no changes (empty slices)", func() {
|
||||||
cl.EXPECT().Clients().Return(clR, nil)
|
cl.EXPECT().Clients().Return(clR, nil)
|
||||||
cl.EXPECT().AddClients()
|
err := actionClientSettings(ac)
|
||||||
cl.EXPECT().UpdateClients()
|
|
||||||
cl.EXPECT().DeleteClients()
|
|
||||||
err := w.syncClients(clO, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should add one client", func() {
|
It("should add one client", func() {
|
||||||
clR.Clients = &model.ClientsArray{}
|
clR.Clients = &model.ClientsArray{}
|
||||||
cl.EXPECT().Clients().Return(clR, nil)
|
cl.EXPECT().Clients().Return(clR, nil)
|
||||||
cl.EXPECT().AddClients(&(*clO.Clients)[0])
|
cl.EXPECT().AddClient(&(*ac.origin.clients.Clients)[0])
|
||||||
cl.EXPECT().UpdateClients()
|
err := actionClientSettings(ac)
|
||||||
cl.EXPECT().DeleteClients()
|
|
||||||
err := w.syncClients(clO, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should update one client", func() {
|
It("should update one client", func() {
|
||||||
(*clR.Clients)[0].FilteringEnabled = utils.Ptr(true)
|
(*clR.Clients)[0].FilteringEnabled = utils.Ptr(true)
|
||||||
cl.EXPECT().Clients().Return(clR, nil)
|
cl.EXPECT().Clients().Return(clR, nil)
|
||||||
cl.EXPECT().AddClients()
|
cl.EXPECT().UpdateClient(&(*ac.origin.clients.Clients)[0])
|
||||||
cl.EXPECT().UpdateClients(&(*clO.Clients)[0])
|
err := actionClientSettings(ac)
|
||||||
cl.EXPECT().DeleteClients()
|
|
||||||
err := w.syncClients(clO, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should delete one client", func() {
|
It("should delete one client", func() {
|
||||||
clO.Clients = &model.ClientsArray{}
|
ac.origin.clients.Clients = &model.ClientsArray{}
|
||||||
cl.EXPECT().Clients().Return(clR, nil)
|
cl.EXPECT().Clients().Return(clR, nil)
|
||||||
cl.EXPECT().AddClients()
|
cl.EXPECT().DeleteClient(&(*clR.Clients)[0])
|
||||||
cl.EXPECT().UpdateClients()
|
err := actionClientSettings(ac)
|
||||||
cl.EXPECT().DeleteClients(&(*clR.Clients)[0])
|
|
||||||
err := w.syncClients(clO, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should return error when error on Clients()", func() {
|
It("should return error when error on Clients()", func() {
|
||||||
cl.EXPECT().Clients().Return(nil, te)
|
cl.EXPECT().Clients().Return(nil, te)
|
||||||
err := w.syncClients(clO, cl)
|
err := actionClientSettings(ac)
|
||||||
Ω(err).Should(HaveOccurred())
|
|
||||||
})
|
|
||||||
It("should return error when error on AddClients()", func() {
|
|
||||||
cl.EXPECT().Clients().Return(clR, nil)
|
|
||||||
cl.EXPECT().DeleteClients()
|
|
||||||
cl.EXPECT().AddClients().Return(te)
|
|
||||||
err := w.syncClients(clO, cl)
|
|
||||||
Ω(err).Should(HaveOccurred())
|
|
||||||
})
|
|
||||||
It("should return error when error on UpdateClients()", func() {
|
|
||||||
cl.EXPECT().Clients().Return(clR, nil)
|
|
||||||
cl.EXPECT().DeleteClients()
|
|
||||||
cl.EXPECT().AddClients()
|
|
||||||
cl.EXPECT().UpdateClients().Return(te)
|
|
||||||
err := w.syncClients(clO, cl)
|
|
||||||
Ω(err).Should(HaveOccurred())
|
|
||||||
})
|
|
||||||
It("should return error when error on DeleteClients()", func() {
|
|
||||||
cl.EXPECT().Clients().Return(clR, nil)
|
|
||||||
cl.EXPECT().DeleteClients().Return(te)
|
|
||||||
err := w.syncClients(clO, cl)
|
|
||||||
Ω(err).Should(HaveOccurred())
|
Ω(err).Should(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
Context("syncGeneralSettings", func() {
|
Context("actionParental", func() {
|
||||||
var (
|
|
||||||
o *origin
|
|
||||||
rs *model.ServerStatus
|
|
||||||
)
|
|
||||||
BeforeEach(func() {
|
|
||||||
o = &origin{
|
|
||||||
profileInfo: &model.ProfileInfo{
|
|
||||||
Name: "origin",
|
|
||||||
Language: "en",
|
|
||||||
Theme: "auto",
|
|
||||||
},
|
|
||||||
status: &model.ServerStatus{},
|
|
||||||
safeSearch: &model.SafeSearchConfig{},
|
|
||||||
}
|
|
||||||
rs = &model.ServerStatus{}
|
|
||||||
})
|
|
||||||
It("should have no changes", func() {
|
It("should have no changes", func() {
|
||||||
cl.EXPECT().Parental()
|
cl.EXPECT().Parental()
|
||||||
cl.EXPECT().ProfileInfo().Return(o.profileInfo, nil)
|
err := actionParental(ac)
|
||||||
cl.EXPECT().SafeSearchConfig().Return(o.safeSearch, nil)
|
|
||||||
cl.EXPECT().SafeBrowsing()
|
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
})
|
|
||||||
It("should have protection enabled changes", func() {
|
|
||||||
o.status.ProtectionEnabled = true
|
|
||||||
cl.EXPECT().ToggleProtection(true)
|
|
||||||
cl.EXPECT().Parental()
|
|
||||||
cl.EXPECT().ProfileInfo().Return(o.profileInfo, nil)
|
|
||||||
cl.EXPECT().SafeSearchConfig().Return(o.safeSearch, nil)
|
|
||||||
cl.EXPECT().SafeBrowsing()
|
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have parental enabled changes", func() {
|
It("should have parental enabled changes", func() {
|
||||||
o.parental = true
|
ac.origin.parental = true
|
||||||
cl.EXPECT().Parental()
|
cl.EXPECT().Parental()
|
||||||
cl.EXPECT().ToggleParental(true)
|
cl.EXPECT().ToggleParental(true)
|
||||||
cl.EXPECT().ProfileInfo().Return(o.profileInfo, nil)
|
err := actionParental(ac)
|
||||||
cl.EXPECT().SafeSearchConfig().Return(o.safeSearch, nil)
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
cl.EXPECT().SafeBrowsing()
|
})
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
})
|
||||||
|
Context("actionProtection", func() {
|
||||||
|
It("should have no changes", func() {
|
||||||
|
err := actionProtection(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should have protection enabled changes", func() {
|
||||||
|
ac.origin.status.ProtectionEnabled = true
|
||||||
|
cl.EXPECT().ToggleProtection(true)
|
||||||
|
err := actionProtection(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("actionSafeSearchConfig", func() {
|
||||||
|
It("should have no changes", func() {
|
||||||
|
cl.EXPECT().SafeSearchConfig().Return(ac.origin.safeSearch, nil)
|
||||||
|
|
||||||
|
err := actionSafeSearchConfig(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have safeSearch enabled changes", func() {
|
It("should have safeSearch enabled changes", func() {
|
||||||
o.safeSearch = &model.SafeSearchConfig{Enabled: utils.Ptr(true)}
|
ac.origin.safeSearch = &model.SafeSearchConfig{Enabled: utils.Ptr(true)}
|
||||||
cl.EXPECT().Parental()
|
|
||||||
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
||||||
cl.EXPECT().ProfileInfo().Return(o.profileInfo, nil)
|
cl.EXPECT().SetSafeSearchConfig(ac.origin.safeSearch)
|
||||||
cl.EXPECT().SetSafeSearchConfig(o.safeSearch)
|
err := actionSafeSearchConfig(ac)
|
||||||
cl.EXPECT().SafeBrowsing()
|
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have Duckduckgo safeSearch enabled changed", func() {
|
It("should have Duckduckgo safeSearch enabled changed", func() {
|
||||||
o.safeSearch = &model.SafeSearchConfig{Duckduckgo: utils.Ptr(true)}
|
ac.origin.safeSearch = &model.SafeSearchConfig{Duckduckgo: utils.Ptr(true)}
|
||||||
cl.EXPECT().Parental()
|
|
||||||
cl.EXPECT().ProfileInfo().Return(o.profileInfo, nil)
|
|
||||||
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{Google: utils.Ptr(true)}, nil)
|
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{Google: utils.Ptr(true)}, nil)
|
||||||
cl.EXPECT().SafeBrowsing()
|
cl.EXPECT().SetSafeSearchConfig(ac.origin.safeSearch)
|
||||||
cl.EXPECT().SetSafeSearchConfig(o.safeSearch)
|
err := actionSafeSearchConfig(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
})
|
||||||
|
})
|
||||||
|
Context("actionProfileInfo", func() {
|
||||||
|
It("should have no changes", func() {
|
||||||
|
cl.EXPECT().ProfileInfo().Return(ac.origin.profileInfo, nil)
|
||||||
|
err := actionProfileInfo(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have profileInfo language changed", func() {
|
It("should have profileInfo language changed", func() {
|
||||||
o.profileInfo.Language = "de"
|
ac.origin.profileInfo.Language = "de"
|
||||||
cl.EXPECT().Parental()
|
|
||||||
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{Name: "replica", Language: "en"}, nil)
|
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{Name: "replica", Language: "en"}, nil)
|
||||||
cl.EXPECT().SafeSearchConfig().Return(o.safeSearch, nil)
|
|
||||||
cl.EXPECT().SafeBrowsing()
|
|
||||||
cl.EXPECT().SetProfileInfo(&model.ProfileInfo{
|
cl.EXPECT().SetProfileInfo(&model.ProfileInfo{
|
||||||
Language: "de",
|
Language: "de",
|
||||||
Name: "replica",
|
Name: "replica",
|
||||||
Theme: "auto",
|
Theme: "auto",
|
||||||
})
|
})
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
err := actionProfileInfo(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should not change theme if feature is disabled", func() {
|
||||||
|
ac.origin.profileInfo.Language = "de"
|
||||||
|
ac.cfg.Features.Theme = false
|
||||||
|
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{Name: "replica", Language: "en"}, nil)
|
||||||
|
cl.EXPECT().SetProfileInfo(&model.ProfileInfo{
|
||||||
|
Language: "de",
|
||||||
|
Name: "replica",
|
||||||
|
Theme: "",
|
||||||
|
})
|
||||||
|
err := actionProfileInfo(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should not sync profileInfo if language is not set", func() {
|
It("should not sync profileInfo if language is not set", func() {
|
||||||
o.profileInfo.Language = ""
|
ac.origin.profileInfo.Language = ""
|
||||||
cl.EXPECT().Parental()
|
cl.EXPECT().
|
||||||
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{Name: "replica", Language: "en", Theme: "auto"}, nil)
|
ProfileInfo().
|
||||||
cl.EXPECT().SafeSearchConfig().Return(o.safeSearch, nil)
|
Return(&model.ProfileInfo{Name: "replica", Language: "en", Theme: "auto"}, nil)
|
||||||
cl.EXPECT().SafeBrowsing()
|
cl.EXPECT().SetProfileInfo(ac.origin.profileInfo).Times(0)
|
||||||
cl.EXPECT().SetProfileInfo(o.profileInfo).Times(0)
|
err := actionProfileInfo(ac)
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
})
|
|
||||||
It("should not sync profileInfo if language is not set", func() {
|
|
||||||
o.profileInfo.Language = ""
|
|
||||||
cl.EXPECT().Parental()
|
|
||||||
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{Name: "replica", Language: "en", Theme: "auto"}, nil)
|
|
||||||
cl.EXPECT().SafeSearchConfig().Return(o.safeSearch, nil)
|
|
||||||
cl.EXPECT().SafeBrowsing()
|
|
||||||
cl.EXPECT().SetProfileInfo(o.profileInfo).Times(0)
|
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should not sync profileInfo if theme is not set", func() {
|
It("should not sync profileInfo if theme is not set", func() {
|
||||||
o.profileInfo.Theme = ""
|
ac.origin.profileInfo.Theme = ""
|
||||||
cl.EXPECT().Parental()
|
cl.EXPECT().
|
||||||
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{Name: "replica", Language: "en", Theme: "auto"}, nil)
|
ProfileInfo().
|
||||||
cl.EXPECT().SafeSearchConfig().Return(o.safeSearch, nil)
|
Return(&model.ProfileInfo{Name: "replica", Language: "en", Theme: "auto"}, nil)
|
||||||
cl.EXPECT().SafeBrowsing()
|
cl.EXPECT().SetProfileInfo(ac.origin.profileInfo).Times(0)
|
||||||
cl.EXPECT().SetProfileInfo(o.profileInfo).Times(0)
|
err := actionProfileInfo(ac)
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
})
|
|
||||||
It("should have safeBrowsing enabled changes", func() {
|
|
||||||
o.safeBrowsing = true
|
|
||||||
cl.EXPECT().Parental()
|
|
||||||
cl.EXPECT().ProfileInfo().Return(o.profileInfo, nil)
|
|
||||||
cl.EXPECT().SafeSearchConfig().Return(o.safeSearch, nil)
|
|
||||||
cl.EXPECT().SafeBrowsing()
|
|
||||||
cl.EXPECT().ToggleSafeBrowsing(true)
|
|
||||||
err := w.syncGeneralSettings(o, rs, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
Context("syncConfigs", func() {
|
Context("actionSafeBrowsing", func() {
|
||||||
var (
|
It("should have no changes", func() {
|
||||||
o *origin
|
cl.EXPECT().SafeBrowsing()
|
||||||
qlc *model.QueryLogConfig
|
err := actionSafeBrowsing(ac)
|
||||||
sc *model.StatsConfig
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
)
|
})
|
||||||
|
|
||||||
|
It("should have safeBrowsing enabled changes", func() {
|
||||||
|
ac.origin.safeBrowsing = true
|
||||||
|
cl.EXPECT().SafeBrowsing()
|
||||||
|
cl.EXPECT().ToggleSafeBrowsing(true)
|
||||||
|
err := actionSafeBrowsing(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("actionQueryLogConfig", func() {
|
||||||
|
var qlc *model.QueryLogConfigWithIgnored
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
o = &origin{
|
qlc = &model.QueryLogConfigWithIgnored{}
|
||||||
queryLogConfig: &model.QueryLogConfig{},
|
|
||||||
statsConfig: &model.StatsConfig{},
|
|
||||||
}
|
|
||||||
qlc = &model.QueryLogConfig{}
|
|
||||||
sc = &model.StatsConfig{}
|
|
||||||
})
|
})
|
||||||
It("should have no changes", func() {
|
It("should have no changes", func() {
|
||||||
cl.EXPECT().QueryLogConfig().Return(qlc, nil)
|
cl.EXPECT().QueryLogConfig().Return(qlc, nil)
|
||||||
cl.EXPECT().StatsConfig().Return(sc, nil)
|
err := actionQueryLogConfig(ac)
|
||||||
err := w.syncConfigs(o, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have QueryLogConfig changes", func() {
|
It("should have QueryLogConfig changes", func() {
|
||||||
var interval model.QueryLogConfigInterval = 123
|
var interval model.QueryLogConfigInterval = 123
|
||||||
o.queryLogConfig.Interval = &interval
|
ac.origin.queryLogConfig.Interval = &interval
|
||||||
cl.EXPECT().QueryLogConfig().Return(qlc, nil)
|
cl.EXPECT().QueryLogConfig().Return(qlc, nil)
|
||||||
cl.EXPECT().SetQueryLogConfig(&model.QueryLogConfig{AnonymizeClientIp: nil, Interval: &interval, Enabled: nil})
|
cl.EXPECT().
|
||||||
|
SetQueryLogConfig(&model.QueryLogConfigWithIgnored{QueryLogConfig: model.QueryLogConfig{AnonymizeClientIp: nil, Interval: &interval, Enabled: nil}})
|
||||||
|
err := actionQueryLogConfig(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("syncConfigs", func() {
|
||||||
|
var sc *model.PutStatsConfigUpdateRequest
|
||||||
|
BeforeEach(func() {
|
||||||
|
sc = &model.PutStatsConfigUpdateRequest{}
|
||||||
|
})
|
||||||
|
It("should have no changes", func() {
|
||||||
cl.EXPECT().StatsConfig().Return(sc, nil)
|
cl.EXPECT().StatsConfig().Return(sc, nil)
|
||||||
err := w.syncConfigs(o, cl)
|
err := actionStatsConfig(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have StatsConfig changes", func() {
|
It("should have StatsConfig changes", func() {
|
||||||
var interval model.StatsConfigInterval = 123
|
var interval float32 = 123
|
||||||
o.statsConfig.Interval = &interval
|
ac.origin.statsConfig.Interval = interval
|
||||||
cl.EXPECT().QueryLogConfig().Return(qlc, nil)
|
|
||||||
cl.EXPECT().StatsConfig().Return(sc, nil)
|
cl.EXPECT().StatsConfig().Return(sc, nil)
|
||||||
cl.EXPECT().SetStatsConfig(&model.StatsConfig{Interval: &interval})
|
cl.EXPECT().SetStatsConfig(&model.PutStatsConfigUpdateRequest{Interval: interval})
|
||||||
err := w.syncConfigs(o, cl)
|
err := actionStatsConfig(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
@@ -389,161 +378,197 @@ var _ = Describe("Sync", func() {
|
|||||||
Ω(st).Should(BeNil())
|
Ω(st).Should(BeNil())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
Context("syncServices", func() {
|
Context("actionBlockedServicesSchedule", func() {
|
||||||
var (
|
var rbss *model.BlockedServicesSchedule
|
||||||
obs *model.BlockedServicesArray
|
|
||||||
rbs *model.BlockedServicesArray
|
|
||||||
obss *model.BlockedServicesSchedule
|
|
||||||
)
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
obs = &model.BlockedServicesArray{"foo"}
|
ac.origin.blockedServicesSchedule = &model.BlockedServicesSchedule{}
|
||||||
rbs = &model.BlockedServicesArray{"foo"}
|
rbss = &model.BlockedServicesSchedule{}
|
||||||
obss = &model.BlockedServicesSchedule{}
|
|
||||||
})
|
})
|
||||||
It("should have no changes", func() {
|
It("should have no changes", func() {
|
||||||
cl.EXPECT().BlockedServices().Return(rbs, nil)
|
cl.EXPECT().BlockedServicesSchedule().Return(ac.origin.blockedServicesSchedule, nil)
|
||||||
cl.EXPECT().BlockedServicesSchedule().Return(obss, nil)
|
err := actionBlockedServicesSchedule(ac)
|
||||||
err := w.syncServices(obs, obss, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have blockedServices changes", func() {
|
It("should have blockedServices schedule changes", func() {
|
||||||
obs = &model.BlockedServicesArray{"bar"}
|
ac.origin.blockedServicesSchedule = &model.BlockedServicesSchedule{Ids: utils.Ptr([]string{"bar"})}
|
||||||
|
|
||||||
cl.EXPECT().BlockedServices().Return(rbs, nil)
|
cl.EXPECT().BlockedServicesSchedule().Return(rbss, nil)
|
||||||
cl.EXPECT().BlockedServicesSchedule().Return(obss, nil)
|
cl.EXPECT().SetBlockedServicesSchedule(ac.origin.blockedServicesSchedule)
|
||||||
cl.EXPECT().SetBlockedServices(obs)
|
err := actionBlockedServicesSchedule(ac)
|
||||||
err := w.syncServices(obs, obss, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
Context("syncFilters", func() {
|
Context("syncFilters", func() {
|
||||||
var (
|
var rf *model.FilterStatus
|
||||||
of *model.FilterStatus
|
|
||||||
rf *model.FilterStatus
|
|
||||||
)
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
of = &model.FilterStatus{}
|
ac.origin.filters = &model.FilterStatus{}
|
||||||
rf = &model.FilterStatus{}
|
rf = &model.FilterStatus{}
|
||||||
})
|
})
|
||||||
It("should have no changes", func() {
|
It("should have no changes", func() {
|
||||||
cl.EXPECT().Filtering().Return(rf, nil)
|
cl.EXPECT().Filtering().Return(rf, nil)
|
||||||
cl.EXPECT().AddFilters(false)
|
err := actionFilters(ac)
|
||||||
cl.EXPECT().UpdateFilters(false)
|
|
||||||
cl.EXPECT().DeleteFilters(false)
|
|
||||||
cl.EXPECT().AddFilters(true)
|
|
||||||
cl.EXPECT().UpdateFilters(true)
|
|
||||||
cl.EXPECT().DeleteFilters(true)
|
|
||||||
err := w.syncFilters(of, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have changes user roles", func() {
|
It("should have changes user roles", func() {
|
||||||
of.UserRules = utils.Ptr([]string{"foo"})
|
ac.origin.filters.UserRules = utils.Ptr([]string{"foo"})
|
||||||
cl.EXPECT().Filtering().Return(rf, nil)
|
cl.EXPECT().Filtering().Return(rf, nil)
|
||||||
cl.EXPECT().AddFilters(false)
|
cl.EXPECT().SetCustomRules(ac.origin.filters.UserRules)
|
||||||
cl.EXPECT().UpdateFilters(false)
|
err := actionFilters(ac)
|
||||||
cl.EXPECT().DeleteFilters(false)
|
|
||||||
cl.EXPECT().AddFilters(true)
|
|
||||||
cl.EXPECT().UpdateFilters(true)
|
|
||||||
cl.EXPECT().DeleteFilters(true)
|
|
||||||
cl.EXPECT().SetCustomRules(of.UserRules)
|
|
||||||
err := w.syncFilters(of, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have changed filtering config", func() {
|
It("should have changed filtering config", func() {
|
||||||
of.Enabled = utils.Ptr(true)
|
ac.origin.filters.Enabled = utils.Ptr(true)
|
||||||
of.Interval = utils.Ptr(123)
|
ac.origin.filters.Interval = utils.Ptr(123)
|
||||||
cl.EXPECT().Filtering().Return(rf, nil)
|
cl.EXPECT().Filtering().Return(rf, nil)
|
||||||
cl.EXPECT().AddFilters(false)
|
cl.EXPECT().ToggleFiltering(*ac.origin.filters.Enabled, *ac.origin.filters.Interval)
|
||||||
cl.EXPECT().UpdateFilters(false)
|
err := actionFilters(ac)
|
||||||
cl.EXPECT().DeleteFilters(false)
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
cl.EXPECT().AddFilters(true)
|
})
|
||||||
cl.EXPECT().UpdateFilters(true)
|
It("should add a filter", func() {
|
||||||
cl.EXPECT().DeleteFilters(true)
|
ac.origin.filters.Filters = utils.Ptr([]model.Filter{{Name: "foo", Url: "https://foo.bar"}})
|
||||||
cl.EXPECT().ToggleFiltering(*of.Enabled, *of.Interval)
|
cl.EXPECT().Filtering().Return(rf, nil)
|
||||||
err := w.syncFilters(of, cl)
|
cl.EXPECT().AddFilter(false, model.Filter{Name: "foo", Url: "https://foo.bar"})
|
||||||
|
cl.EXPECT().RefreshFilters(gm.Any())
|
||||||
|
err := actionFilters(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should delete a filter", func() {
|
||||||
|
rf.Filters = utils.Ptr([]model.Filter{{Name: "foo", Url: "https://foo.bar"}})
|
||||||
|
cl.EXPECT().Filtering().Return(rf, nil)
|
||||||
|
cl.EXPECT().DeleteFilter(false, model.Filter{Name: "foo", Url: "https://foo.bar"})
|
||||||
|
err := actionFilters(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should update a filter", func() {
|
||||||
|
ac.origin.filters.Filters = utils.Ptr(
|
||||||
|
[]model.Filter{{Name: "foo", Url: "https://foo.bar", Enabled: true}},
|
||||||
|
)
|
||||||
|
rf.Filters = utils.Ptr([]model.Filter{{Name: "foo", Url: "https://foo.bar"}})
|
||||||
|
cl.EXPECT().Filtering().Return(rf, nil)
|
||||||
|
cl.EXPECT().UpdateFilter(false, model.Filter{Name: "foo", Url: "https://foo.bar", Enabled: true})
|
||||||
|
cl.EXPECT().RefreshFilters(gm.Any())
|
||||||
|
err := actionFilters(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
|
||||||
|
It("should abort after failed added filter", func() {
|
||||||
|
ac.cfg.ContinueOnError = false
|
||||||
|
ac.origin.filters.Filters = utils.Ptr([]model.Filter{{Name: "foo", Url: "https://foo.bar"}})
|
||||||
|
cl.EXPECT().Filtering().Return(rf, nil)
|
||||||
|
cl.EXPECT().
|
||||||
|
AddFilter(false, model.Filter{Name: "foo", Url: "https://foo.bar"}).
|
||||||
|
Return(errors.New("test failure"))
|
||||||
|
err := actionFilters(ac)
|
||||||
|
Ω(err).Should(HaveOccurred())
|
||||||
|
})
|
||||||
|
|
||||||
|
It("should continue after failed added filter", func() {
|
||||||
|
ac.cfg.ContinueOnError = true
|
||||||
|
ac.origin.filters.Filters = utils.Ptr(
|
||||||
|
[]model.Filter{{Name: "foo", Url: "https://foo.bar"}, {Name: "bar", Url: "https://bar.foo"}},
|
||||||
|
)
|
||||||
|
cl.EXPECT().Filtering().Return(rf, nil)
|
||||||
|
cl.EXPECT().
|
||||||
|
AddFilter(false, model.Filter{Name: "foo", Url: "https://foo.bar"}).
|
||||||
|
Return(errors.New("test failure"))
|
||||||
|
cl.EXPECT().AddFilter(false, model.Filter{Name: "bar", Url: "https://bar.foo"})
|
||||||
|
cl.EXPECT().RefreshFilters(gm.Any())
|
||||||
|
err := actionFilters(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("syncDNS", func() {
|
Context("actionDNSAccessLists", func() {
|
||||||
var (
|
var ral *model.AccessList
|
||||||
oal *model.AccessList
|
|
||||||
ral *model.AccessList
|
|
||||||
odc *model.DNSConfig
|
|
||||||
rdc *model.DNSConfig
|
|
||||||
)
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
oal = &model.AccessList{}
|
ac.origin.accessList = &model.AccessList{}
|
||||||
ral = &model.AccessList{}
|
ral = &model.AccessList{}
|
||||||
odc = &model.DNSConfig{}
|
|
||||||
rdc = &model.DNSConfig{}
|
|
||||||
})
|
})
|
||||||
It("should have no changes", func() {
|
It("should have no changes", func() {
|
||||||
cl.EXPECT().AccessList().Return(ral, nil)
|
cl.EXPECT().AccessList().Return(ral, nil)
|
||||||
cl.EXPECT().DNSConfig().Return(rdc, nil)
|
err := actionDNSAccessLists(ac)
|
||||||
err := w.syncDNS(oal, odc, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have access list changes", func() {
|
It("should have access list changes", func() {
|
||||||
ral.BlockedHosts = utils.Ptr([]string{"foo"})
|
ral.BlockedHosts = utils.Ptr([]string{"foo"})
|
||||||
cl.EXPECT().AccessList().Return(ral, nil)
|
cl.EXPECT().AccessList().Return(ral, nil)
|
||||||
cl.EXPECT().DNSConfig().Return(rdc, nil)
|
cl.EXPECT().SetAccessList(ac.origin.accessList)
|
||||||
cl.EXPECT().SetAccessList(oal)
|
err := actionDNSAccessLists(ac)
|
||||||
err := w.syncDNS(oal, odc, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
|
||||||
})
|
|
||||||
It("should have dns config changes", func() {
|
|
||||||
rdc.BootstrapDns = utils.Ptr([]string{"foo"})
|
|
||||||
cl.EXPECT().AccessList().Return(ral, nil)
|
|
||||||
cl.EXPECT().DNSConfig().Return(rdc, nil)
|
|
||||||
cl.EXPECT().SetDNSConfig(odc)
|
|
||||||
err := w.syncDNS(oal, odc, cl)
|
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("syncDHCPServer", func() {
|
Context("actionDNSServerConfig", func() {
|
||||||
var (
|
var rdc *model.DNSConfig
|
||||||
osc *model.DhcpStatus
|
|
||||||
rsc *model.DhcpStatus
|
|
||||||
)
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
osc = &model.DhcpStatus{V4: &model.DhcpConfigV4{
|
ac.origin.dnsConfig = &model.DNSConfig{}
|
||||||
GatewayIp: utils.Ptr("1.2.3.4"),
|
rdc = &model.DNSConfig{}
|
||||||
RangeStart: utils.Ptr("1.2.3.5"),
|
})
|
||||||
RangeEnd: utils.Ptr("1.2.3.6"),
|
It("should have no changes", func() {
|
||||||
SubnetMask: utils.Ptr("255.255.255.0"),
|
cl.EXPECT().DNSConfig().Return(rdc, nil)
|
||||||
}}
|
err := actionDNSServerConfig(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should have dns config changes", func() {
|
||||||
|
rdc.BootstrapDns = utils.Ptr([]string{"foo"})
|
||||||
|
cl.EXPECT().DNSConfig().Return(rdc, nil)
|
||||||
|
cl.EXPECT().SetDNSConfig(ac.origin.dnsConfig)
|
||||||
|
err := actionDNSServerConfig(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
Context("actionDHCPServerConfig", func() {
|
||||||
|
var rsc *model.DhcpStatus
|
||||||
|
BeforeEach(func() {
|
||||||
|
ac.origin.dhcpServerConfig = &model.DhcpStatus{
|
||||||
|
V4: &model.DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr("1.2.3.4"),
|
||||||
|
RangeStart: utils.Ptr("1.2.3.5"),
|
||||||
|
RangeEnd: utils.Ptr("1.2.3.6"),
|
||||||
|
SubnetMask: utils.Ptr("255.255.255.0"),
|
||||||
|
},
|
||||||
|
}
|
||||||
rsc = &model.DhcpStatus{}
|
rsc = &model.DhcpStatus{}
|
||||||
w.cfg.Features.DHCP.StaticLeases = false
|
w.cfg.Features.DHCP.StaticLeases = false
|
||||||
})
|
})
|
||||||
It("should have no changes", func() {
|
It("should have no changes", func() {
|
||||||
rsc.V4 = osc.V4
|
rsc.V4 = ac.origin.dhcpServerConfig.V4
|
||||||
cl.EXPECT().DhcpConfig().Return(rsc, nil)
|
cl.EXPECT().DhcpConfig().Return(rsc, nil)
|
||||||
err := w.syncDHCPServer(osc, cl, types.AdGuardInstance{})
|
err := actionDHCPServerConfig(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should have changes", func() {
|
It("should have changes", func() {
|
||||||
rsc.Enabled = utils.Ptr(true)
|
rsc.Enabled = utils.Ptr(true)
|
||||||
cl.EXPECT().DhcpConfig().Return(rsc, nil)
|
cl.EXPECT().DhcpConfig().Return(rsc, nil)
|
||||||
cl.EXPECT().SetDhcpConfig(osc)
|
cl.EXPECT().SetDhcpConfig(ac.origin.dhcpServerConfig)
|
||||||
err := w.syncDHCPServer(osc, cl, types.AdGuardInstance{})
|
err := actionDHCPServerConfig(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should use replica interface name", func() {
|
It("should use replica interface name", func() {
|
||||||
|
ac.replica.InterfaceName = "foo"
|
||||||
cl.EXPECT().DhcpConfig().Return(rsc, nil)
|
cl.EXPECT().DhcpConfig().Return(rsc, nil)
|
||||||
oscClone := osc.Clone()
|
oscClone := ac.origin.dhcpServerConfig.Clone()
|
||||||
oscClone.InterfaceName = utils.Ptr("foo")
|
oscClone.InterfaceName = utils.Ptr("foo")
|
||||||
cl.EXPECT().SetDhcpConfig(oscClone)
|
cl.EXPECT().SetDhcpConfig(oscClone)
|
||||||
err := w.syncDHCPServer(osc, cl, types.AdGuardInstance{InterfaceName: "foo"})
|
err := actionDHCPServerConfig(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
It("should enable the target dhcp server", func() {
|
It("should enable the target dhcp server", func() {
|
||||||
|
ac.replica.DHCPServerEnabled = utils.Ptr(true)
|
||||||
cl.EXPECT().DhcpConfig().Return(rsc, nil)
|
cl.EXPECT().DhcpConfig().Return(rsc, nil)
|
||||||
oscClone := osc.Clone()
|
oscClone := ac.origin.dhcpServerConfig.Clone()
|
||||||
oscClone.Enabled = utils.Ptr(true)
|
oscClone.Enabled = utils.Ptr(true)
|
||||||
cl.EXPECT().SetDhcpConfig(oscClone)
|
cl.EXPECT().SetDhcpConfig(oscClone)
|
||||||
err := w.syncDHCPServer(osc, cl, types.AdGuardInstance{DHCPServerEnabled: &boolTrue})
|
err := actionDHCPServerConfig(ac)
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
})
|
||||||
|
It("should not sync empty IPv4", func() {
|
||||||
|
ac.replica.DHCPServerEnabled = utils.Ptr(false)
|
||||||
|
ac.origin.dhcpServerConfig.V4 = &model.DhcpConfigV4{
|
||||||
|
GatewayIp: utils.Ptr(""),
|
||||||
|
}
|
||||||
|
err := actionDHCPServerConfig(ac)
|
||||||
Ω(err).ShouldNot(HaveOccurred())
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
@@ -551,7 +576,7 @@ var _ = Describe("Sync", func() {
|
|||||||
Context("sync", func() {
|
Context("sync", func() {
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
w.cfg = &types.Config{
|
w.cfg = &types.Config{
|
||||||
Origin: types.AdGuardInstance{},
|
Origin: &types.AdGuardInstance{},
|
||||||
Replica: &types.AdGuardInstance{URL: "foo"},
|
Replica: &types.AdGuardInstance{URL: "foo"},
|
||||||
Features: types.Features{
|
Features: types.Features{
|
||||||
DHCP: types.DHCP{
|
DHCP: types.DHCP{
|
||||||
@@ -574,19 +599,18 @@ var _ = Describe("Sync", func() {
|
|||||||
})
|
})
|
||||||
It("should have no changes", func() {
|
It("should have no changes", func() {
|
||||||
// origin
|
// origin
|
||||||
cl.EXPECT().Host()
|
cl.EXPECT().Host().Times(2)
|
||||||
cl.EXPECT().Status().Return(&model.ServerStatus{Version: versions.MinAgh}, nil)
|
cl.EXPECT().Status().Return(&model.ServerStatus{Version: versions.MinAgh}, nil)
|
||||||
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{}, nil)
|
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{}, nil)
|
||||||
cl.EXPECT().Parental()
|
cl.EXPECT().Parental()
|
||||||
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
||||||
cl.EXPECT().SafeBrowsing()
|
cl.EXPECT().SafeBrowsing()
|
||||||
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
||||||
cl.EXPECT().BlockedServices()
|
|
||||||
cl.EXPECT().BlockedServicesSchedule()
|
cl.EXPECT().BlockedServicesSchedule()
|
||||||
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
||||||
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
||||||
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfig{}, nil)
|
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfigWithIgnored{}, nil)
|
||||||
cl.EXPECT().StatsConfig().Return(&model.StatsConfig{}, nil)
|
cl.EXPECT().StatsConfig().Return(&model.PutStatsConfigUpdateRequest{}, nil)
|
||||||
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
||||||
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
||||||
cl.EXPECT().DhcpConfig().Return(&model.DhcpStatus{}, nil)
|
cl.EXPECT().DhcpConfig().Return(&model.DhcpStatus{}, nil)
|
||||||
@@ -598,48 +622,35 @@ var _ = Describe("Sync", func() {
|
|||||||
cl.EXPECT().Parental()
|
cl.EXPECT().Parental()
|
||||||
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
||||||
cl.EXPECT().SafeBrowsing()
|
cl.EXPECT().SafeBrowsing()
|
||||||
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfig{}, nil)
|
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfigWithIgnored{}, nil)
|
||||||
cl.EXPECT().StatsConfig().Return(&model.StatsConfig{}, nil)
|
cl.EXPECT().StatsConfig().Return(&model.PutStatsConfigUpdateRequest{}, nil)
|
||||||
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
||||||
cl.EXPECT().AddRewriteEntries()
|
cl.EXPECT().AddRewriteEntries()
|
||||||
cl.EXPECT().DeleteRewriteEntries()
|
cl.EXPECT().DeleteRewriteEntries()
|
||||||
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
||||||
cl.EXPECT().AddFilters(false)
|
|
||||||
cl.EXPECT().UpdateFilters(false)
|
|
||||||
cl.EXPECT().DeleteFilters(false)
|
|
||||||
cl.EXPECT().AddFilters(true)
|
|
||||||
cl.EXPECT().UpdateFilters(true)
|
|
||||||
cl.EXPECT().DeleteFilters(true)
|
|
||||||
cl.EXPECT().BlockedServices()
|
|
||||||
cl.EXPECT().BlockedServicesSchedule()
|
cl.EXPECT().BlockedServicesSchedule()
|
||||||
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
||||||
cl.EXPECT().AddClients()
|
|
||||||
cl.EXPECT().UpdateClients()
|
|
||||||
cl.EXPECT().DeleteClients()
|
|
||||||
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
||||||
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
||||||
cl.EXPECT().DhcpConfig().Return(&model.DhcpStatus{}, nil)
|
cl.EXPECT().DhcpConfig().Return(&model.DhcpStatus{}, nil)
|
||||||
cl.EXPECT().AddDHCPStaticLeases().Return(nil)
|
|
||||||
cl.EXPECT().DeleteDHCPStaticLeases().Return(nil)
|
|
||||||
w.sync()
|
w.sync()
|
||||||
})
|
})
|
||||||
It("should not sync DHCP", func() {
|
It("should not sync DHCP", func() {
|
||||||
w.cfg.Features.DHCP.ServerConfig = false
|
w.cfg.Features.DHCP.ServerConfig = false
|
||||||
w.cfg.Features.DHCP.StaticLeases = false
|
w.cfg.Features.DHCP.StaticLeases = false
|
||||||
// origin
|
// origin
|
||||||
cl.EXPECT().Host()
|
cl.EXPECT().Host().Times(2)
|
||||||
cl.EXPECT().Status().Return(&model.ServerStatus{Version: versions.MinAgh}, nil)
|
cl.EXPECT().Status().Return(&model.ServerStatus{Version: versions.MinAgh}, nil)
|
||||||
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{}, nil)
|
cl.EXPECT().ProfileInfo().Return(&model.ProfileInfo{}, nil)
|
||||||
cl.EXPECT().Parental()
|
cl.EXPECT().Parental()
|
||||||
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
||||||
cl.EXPECT().SafeBrowsing()
|
cl.EXPECT().SafeBrowsing()
|
||||||
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
||||||
cl.EXPECT().BlockedServices()
|
|
||||||
cl.EXPECT().BlockedServicesSchedule()
|
cl.EXPECT().BlockedServicesSchedule()
|
||||||
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
||||||
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
||||||
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfig{}, nil)
|
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfigWithIgnored{}, nil)
|
||||||
cl.EXPECT().StatsConfig().Return(&model.StatsConfig{}, nil)
|
cl.EXPECT().StatsConfig().Return(&model.PutStatsConfigUpdateRequest{}, nil)
|
||||||
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
||||||
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
||||||
|
|
||||||
@@ -650,24 +661,14 @@ var _ = Describe("Sync", func() {
|
|||||||
cl.EXPECT().Parental()
|
cl.EXPECT().Parental()
|
||||||
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
||||||
cl.EXPECT().SafeBrowsing()
|
cl.EXPECT().SafeBrowsing()
|
||||||
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfig{}, nil)
|
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfigWithIgnored{}, nil)
|
||||||
cl.EXPECT().StatsConfig().Return(&model.StatsConfig{}, nil)
|
cl.EXPECT().StatsConfig().Return(&model.PutStatsConfigUpdateRequest{}, nil)
|
||||||
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
||||||
cl.EXPECT().AddRewriteEntries()
|
cl.EXPECT().AddRewriteEntries()
|
||||||
cl.EXPECT().DeleteRewriteEntries()
|
cl.EXPECT().DeleteRewriteEntries()
|
||||||
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
||||||
cl.EXPECT().AddFilters(false)
|
|
||||||
cl.EXPECT().UpdateFilters(false)
|
|
||||||
cl.EXPECT().DeleteFilters(false)
|
|
||||||
cl.EXPECT().AddFilters(true)
|
|
||||||
cl.EXPECT().UpdateFilters(true)
|
|
||||||
cl.EXPECT().DeleteFilters(true)
|
|
||||||
cl.EXPECT().BlockedServices()
|
|
||||||
cl.EXPECT().BlockedServicesSchedule()
|
cl.EXPECT().BlockedServicesSchedule()
|
||||||
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
||||||
cl.EXPECT().AddClients()
|
|
||||||
cl.EXPECT().UpdateClients()
|
|
||||||
cl.EXPECT().DeleteClients()
|
|
||||||
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
||||||
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
||||||
w.sync()
|
w.sync()
|
||||||
@@ -687,18 +688,17 @@ var _ = Describe("Sync", func() {
|
|||||||
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
cl.EXPECT().SafeSearchConfig().Return(&model.SafeSearchConfig{}, nil)
|
||||||
cl.EXPECT().SafeBrowsing()
|
cl.EXPECT().SafeBrowsing()
|
||||||
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
cl.EXPECT().RewriteList().Return(&model.RewriteEntries{}, nil)
|
||||||
cl.EXPECT().BlockedServices()
|
|
||||||
cl.EXPECT().BlockedServicesSchedule()
|
cl.EXPECT().BlockedServicesSchedule()
|
||||||
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
cl.EXPECT().Filtering().Return(&model.FilterStatus{}, nil)
|
||||||
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
cl.EXPECT().Clients().Return(&model.Clients{}, nil)
|
||||||
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfig{}, nil)
|
cl.EXPECT().QueryLogConfig().Return(&model.QueryLogConfigWithIgnored{}, nil)
|
||||||
cl.EXPECT().StatsConfig().Return(&model.StatsConfig{}, nil)
|
cl.EXPECT().StatsConfig().Return(&model.PutStatsConfigUpdateRequest{}, nil)
|
||||||
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
cl.EXPECT().AccessList().Return(&model.AccessList{}, nil)
|
||||||
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
cl.EXPECT().DNSConfig().Return(&model.DNSConfig{}, nil)
|
||||||
cl.EXPECT().DhcpConfig().Return(&model.DhcpStatus{}, nil)
|
cl.EXPECT().DhcpConfig().Return(&model.DhcpStatus{}, nil)
|
||||||
|
|
||||||
// replica
|
// replica
|
||||||
cl.EXPECT().Host()
|
cl.EXPECT().Host().Times(2)
|
||||||
cl.EXPECT().Status().Return(&model.ServerStatus{Version: "v0.106.9"}, nil)
|
cl.EXPECT().Status().Return(&model.ServerStatus{Version: "v0.106.9"}, nil)
|
||||||
w.sync()
|
w.sync()
|
||||||
})
|
})
|
||||||
|
|||||||
44
pkg/test/matchers/matchers.go
Normal file
44
pkg/test/matchers/matchers.go
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
package matchers
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/onsi/gomega/format"
|
||||||
|
"github.com/onsi/gomega/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
type equalIgnoringLineEndingsMatcher struct {
|
||||||
|
expected string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (matcher *equalIgnoringLineEndingsMatcher) Match(actual any) (success bool, err error) {
|
||||||
|
actualStr, ok := actual.(string)
|
||||||
|
if !ok {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
normalizedActual := strings.ReplaceAll(actualStr, "\r\n", "\n")
|
||||||
|
normalizedExpected := strings.ReplaceAll(matcher.expected, "\r\n", "\n")
|
||||||
|
|
||||||
|
return normalizedActual == normalizedExpected, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (matcher *equalIgnoringLineEndingsMatcher) FailureMessage(actual any) (message string) {
|
||||||
|
actualString, actualOK := actual.(string)
|
||||||
|
if actualOK {
|
||||||
|
return format.MessageWithDiff(actualString, "to equal", matcher.expected)
|
||||||
|
}
|
||||||
|
|
||||||
|
return format.Message(actual, "to equal", matcher.expected)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (matcher *equalIgnoringLineEndingsMatcher) NegatedFailureMessage(actual any) (message string) {
|
||||||
|
return format.Message(actual, "not to equal", matcher.expected)
|
||||||
|
}
|
||||||
|
|
||||||
|
// EqualIgnoringLineEndings returns a new matcher.
|
||||||
|
func EqualIgnoringLineEndings(expected string) types.GomegaMatcher {
|
||||||
|
return &equalIgnoringLineEndingsMatcher{
|
||||||
|
expected: expected,
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,58 +0,0 @@
|
|||||||
//go:build !ignore_autogenerated
|
|
||||||
// +build !ignore_autogenerated
|
|
||||||
|
|
||||||
// Code generated by deepcopy-gen. DO NOT EDIT.
|
|
||||||
|
|
||||||
package types
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *AdGuardInstance) DeepCopyInto(out *AdGuardInstance) {
|
|
||||||
*out = *in
|
|
||||||
if in.DHCPServerEnabled != nil {
|
|
||||||
in, out := &in.DHCPServerEnabled, &out.DHCPServerEnabled
|
|
||||||
*out = new(bool)
|
|
||||||
**out = **in
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AdGuardInstance.
|
|
||||||
func (in *AdGuardInstance) DeepCopy() *AdGuardInstance {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(AdGuardInstance)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
|
||||||
func (in *Config) DeepCopyInto(out *Config) {
|
|
||||||
*out = *in
|
|
||||||
in.Origin.DeepCopyInto(&out.Origin)
|
|
||||||
if in.Replica != nil {
|
|
||||||
in, out := &in.Replica, &out.Replica
|
|
||||||
*out = new(AdGuardInstance)
|
|
||||||
(*in).DeepCopyInto(*out)
|
|
||||||
}
|
|
||||||
if in.Replicas != nil {
|
|
||||||
in, out := &in.Replicas, &out.Replicas
|
|
||||||
*out = make([]AdGuardInstance, len(*in))
|
|
||||||
for i := range *in {
|
|
||||||
(*in)[i].DeepCopyInto(&(*out)[i])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
out.API = in.API
|
|
||||||
out.Features = in.Features
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Config.
|
|
||||||
func (in *Config) DeepCopy() *Config {
|
|
||||||
if in == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
out := new(Config)
|
|
||||||
in.DeepCopyInto(out)
|
|
||||||
return out
|
|
||||||
}
|
|
||||||
@@ -4,33 +4,63 @@ import (
|
|||||||
"go.uber.org/zap"
|
"go.uber.org/zap"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Features feature flags
|
func NewFeatures(enabled bool) Features {
|
||||||
|
return Features{
|
||||||
|
DNS: DNS{
|
||||||
|
AccessLists: enabled,
|
||||||
|
ServerConfig: enabled,
|
||||||
|
Rewrites: enabled,
|
||||||
|
},
|
||||||
|
DHCP: DHCP{
|
||||||
|
ServerConfig: enabled,
|
||||||
|
StaticLeases: enabled,
|
||||||
|
},
|
||||||
|
GeneralSettings: enabled,
|
||||||
|
QueryLogConfig: enabled,
|
||||||
|
StatsConfig: enabled,
|
||||||
|
ClientSettings: enabled,
|
||||||
|
Services: enabled,
|
||||||
|
Filters: enabled,
|
||||||
|
Theme: enabled,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Features feature flags.
|
||||||
type Features struct {
|
type Features struct {
|
||||||
DNS DNS `json:"dns" yaml:"dns"`
|
DNS DNS `json:"dns" yaml:"dns"`
|
||||||
DHCP DHCP `json:"dhcp" yaml:"dhcp"`
|
DHCP DHCP `json:"dhcp" yaml:"dhcp"`
|
||||||
GeneralSettings bool `json:"generalSettings" yaml:"generalSettings"`
|
GeneralSettings bool `json:"generalSettings" yaml:"generalSettings" documentation:"Sync general settings" env:"FEATURES_GENERAL_SETTINGS"`
|
||||||
QueryLogConfig bool `json:"queryLogConfig" yaml:"queryLogConfig"`
|
QueryLogConfig bool `json:"queryLogConfig" yaml:"queryLogConfig" documentation:"Sync query log config" env:"FEATURES_QUERY_LOG_CONFIG"`
|
||||||
StatsConfig bool `json:"statsConfig" yaml:"statsConfig"`
|
StatsConfig bool `json:"statsConfig" yaml:"statsConfig" documentation:"Sync stats config" env:"FEATURES_STATS_CONFIG"`
|
||||||
ClientSettings bool `json:"clientSettings" yaml:"clientSettings"`
|
ClientSettings bool `json:"clientSettings" yaml:"clientSettings" documentation:"Sync client settings" env:"FEATURES_CLIENT_SETTINGS"`
|
||||||
Services bool `json:"services" yaml:"services"`
|
Services bool `json:"services" yaml:"services" documentation:"Sync services" env:"FEATURES_SERVICES"`
|
||||||
Filters bool `json:"filters" yaml:"filters"`
|
Filters bool `json:"filters" yaml:"filters" documentation:"Sync filters" env:"FEATURES_FILTERS"`
|
||||||
|
Theme bool `json:"theme" yaml:"theme" documentation:"Sync the weg UI theme" env:"FEATURES_THEME"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// DHCP features
|
// DHCP features.
|
||||||
type DHCP struct {
|
type DHCP struct {
|
||||||
ServerConfig bool `json:"serverConfig" yaml:"serverConfig"`
|
ServerConfig bool `documentation:"Sync DHCP server config" env:"FEATURES_DHCP_SERVER_CONFIG" json:"serverConfig" yaml:"serverConfig"`
|
||||||
StaticLeases bool `json:"staticLeases" yaml:"staticLeases"`
|
StaticLeases bool `documentation:"Sync DHCP static leases" env:"FEATURES_DHCP_STATIC_LEASES" json:"staticLeases" yaml:"staticLeases"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// DNS features
|
// DNS features.
|
||||||
type DNS struct {
|
type DNS struct {
|
||||||
AccessLists bool `json:"accessLists" yaml:"accessLists"`
|
AccessLists bool `documentation:"Sync DNS access lists" env:"FEATURES_DNS_ACCESS_LISTS" json:"accessLists" yaml:"accessLists"`
|
||||||
ServerConfig bool `json:"serverConfig" yaml:"serverConfig"`
|
ServerConfig bool `documentation:"Sync DNS server config" env:"FEATURES_DNS_SERVER_CONFIG" json:"serverConfig" yaml:"serverConfig"`
|
||||||
Rewrites bool `json:"rewrites" yaml:"rewrites"`
|
Rewrites bool `documentation:"Sync DNS rewrites" env:"FEATURES_DNS_REWRITES" json:"rewrites" yaml:"rewrites"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// LogDisabled log all disabled features
|
// LogDisabled log all disabled features.
|
||||||
func (f *Features) LogDisabled(l *zap.SugaredLogger) {
|
func (f *Features) LogDisabled(l *zap.SugaredLogger) {
|
||||||
|
features := f.collectDisabled()
|
||||||
|
|
||||||
|
if len(features) > 0 {
|
||||||
|
l.With("features", features).Info("Disabled features")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *Features) collectDisabled() []string {
|
||||||
var features []string
|
var features []string
|
||||||
if !f.DHCP.ServerConfig {
|
if !f.DHCP.ServerConfig {
|
||||||
features = append(features, "DHCP.ServerConfig")
|
features = append(features, "DHCP.ServerConfig")
|
||||||
@@ -65,8 +95,5 @@ func (f *Features) LogDisabled(l *zap.SugaredLogger) {
|
|||||||
if !f.Filters {
|
if !f.Filters {
|
||||||
features = append(features, "Filters")
|
features = append(features, "Filters")
|
||||||
}
|
}
|
||||||
|
return features
|
||||||
if len(features) > 0 {
|
|
||||||
l.With("features", features).Info("Disabled features")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,43 +1,99 @@
|
|||||||
|
// Package types
|
||||||
|
// +kubebuilder:object:generate=true
|
||||||
package types
|
package types
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net/url"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
"go.uber.org/zap"
|
"go.uber.org/zap"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
// DefaultAPIPath default api path
|
// DefaultAPIPath default api path.
|
||||||
DefaultAPIPath = "/control"
|
DefaultAPIPath = "/control"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Config application configuration struct
|
// Config application configuration struct
|
||||||
// +k8s:deepcopy-gen=true
|
// +k8s:deepcopy-gen=true
|
||||||
type Config struct {
|
type Config struct {
|
||||||
Origin AdGuardInstance `json:"origin" yaml:"origin"`
|
// Origin adguardhome instance
|
||||||
Replica *AdGuardInstance `json:"replica,omitempty" yaml:"replica,omitempty"`
|
Origin *AdGuardInstance `json:"origin" yaml:"origin"`
|
||||||
Replicas []AdGuardInstance `json:"replicas,omitempty" yaml:"replicas,omitempty"`
|
// One single replica adguardhome instance
|
||||||
Cron string `json:"cron,omitempty" yaml:"cron,omitempty"`
|
Replica *AdGuardInstance `json:"replica,omitempty" yaml:"replica,omitempty"`
|
||||||
RunOnStart bool `json:"runOnStart,omitempty" yaml:"runOnStart,omitempty"`
|
// Multiple replica instances
|
||||||
API API `json:"api,omitempty" yaml:"api,omitempty"`
|
Replicas []AdGuardInstance `json:"replicas,omitempty" yaml:"replicas,omitempty" faker:"slice_len=2"`
|
||||||
Features Features `json:"features,omitempty" yaml:"features,omitempty"`
|
Cron string `json:"cron,omitempty" yaml:"cron,omitempty" documentation:"Cron expression for the sync interval" env:"CRON"`
|
||||||
|
RunOnStart bool `json:"runOnStart,omitempty" yaml:"runOnStart,omitempty" documentation:"Run the sung on startup" env:"RUN_ON_START"`
|
||||||
|
PrintConfigOnly bool `json:"printConfigOnly,omitempty" yaml:"printConfigOnly,omitempty" documentation:"Print current config only and stop the application" env:"PRINT_CONFIG_ONLY"`
|
||||||
|
ContinueOnError bool `json:"continueOnError,omitempty" yaml:"continueOnError,omitempty" documentation:"Continue sync on errors" env:"CONTINUE_ON_ERROR"`
|
||||||
|
API API `json:"api,omitempty" yaml:"api,omitempty"`
|
||||||
|
Features Features `json:"features,omitempty" yaml:"features,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// API configuration
|
// API configuration.
|
||||||
type API struct {
|
type API struct {
|
||||||
Port int `json:"port,omitempty" yaml:"port,omitempty"`
|
Port int `documentation:"API port" env:"API_PORT" json:"port,omitempty" yaml:"port,omitempty"`
|
||||||
Username string `json:"username,omitempty" yaml:"username,omitempty"`
|
Username string `documentation:"API username" env:"API_USERNAME" json:"username,omitempty" yaml:"username,omitempty"`
|
||||||
Password string `json:"password,omitempty" yaml:"password,omitempty"`
|
Password string `documentation:"API password" env:"API_PASSWORD" json:"password,omitempty" yaml:"password,omitempty"`
|
||||||
DarkMode bool `json:"darkMode,omitempty" yaml:"darkMode,omitempty"`
|
DarkMode bool `documentation:"API dark mode" env:"API_DARK_MODE" json:"darkMode,omitempty" yaml:"darkMode,omitempty"`
|
||||||
|
Metrics Metrics ` json:"metrics,omitempty" yaml:"metrics,omitempty"`
|
||||||
|
TLS TLS ` json:"tls,omitempty" yaml:"tls,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// UniqueReplicas get unique replication instances
|
// Metrics configuration.
|
||||||
|
type Metrics struct {
|
||||||
|
Enabled bool `documentation:"Enable metrics" env:"API_METRICS_ENABLED" json:"enabled,omitempty" yaml:"enabled,omitempty"`
|
||||||
|
ScrapeInterval time.Duration `documentation:"Interval for metrics scraping" env:"API_METRICS_SCRAPE_INTERVAL" json:"scrapeInterval,omitempty" yaml:"scrapeInterval,omitempty"`
|
||||||
|
QueryLogLimit int `documentation:"Metrics log query limit" env:"API_METRICS_QUERY_LOG_LIMIT" json:"queryLogLimit,omitempty" yaml:"queryLogLimit,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// TLS configuration.
|
||||||
|
type TLS struct {
|
||||||
|
CertDir string `documentation:"API TLS certificate directory" env:"API_TLS_CERT_DIR" json:"certDir,omitempty" yaml:"certDir,omitempty"`
|
||||||
|
CertName string `documentation:"API TLS certificate file name" env:"API_TLS_CERT_NAME" json:"certName,omitempty" yaml:"certName,omitempty"`
|
||||||
|
KeyName string `documentation:"API TLS key file name" env:"API_TLS_KEY_NAME" json:"keyName,omitempty" yaml:"keyName,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t TLS) Enabled() bool {
|
||||||
|
return strings.TrimSpace(t.CertDir) != ""
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t TLS) Certs() (cert, key string) {
|
||||||
|
cert = filepath.Join(t.CertDir, defaultIfEmpty(t.CertName, "tls.crt"))
|
||||||
|
key = filepath.Join(t.CertDir, defaultIfEmpty(t.KeyName, "tls.key"))
|
||||||
|
return cert, key
|
||||||
|
}
|
||||||
|
|
||||||
|
func defaultIfEmpty(val, fallback string) string {
|
||||||
|
if strings.TrimSpace(val) == "" {
|
||||||
|
return fallback
|
||||||
|
}
|
||||||
|
return val
|
||||||
|
}
|
||||||
|
|
||||||
|
// Mask maks username and password.
|
||||||
|
func (a *API) Mask() {
|
||||||
|
a.Username = mask(a.Username)
|
||||||
|
a.Password = mask(a.Password)
|
||||||
|
}
|
||||||
|
|
||||||
|
// UniqueReplicas get unique replication instances.
|
||||||
func (cfg *Config) UniqueReplicas() []AdGuardInstance {
|
func (cfg *Config) UniqueReplicas() []AdGuardInstance {
|
||||||
dedup := make(map[string]AdGuardInstance)
|
dedup := make(map[string]AdGuardInstance)
|
||||||
if cfg.Replica != nil && cfg.Replica.URL != "" {
|
if cfg.Replica != nil && cfg.Replica.URL != "" {
|
||||||
|
if cfg.Replica.APIPath == "" {
|
||||||
|
cfg.Replica.APIPath = DefaultAPIPath
|
||||||
|
}
|
||||||
dedup[cfg.Replica.Key()] = *cfg.Replica
|
dedup[cfg.Replica.Key()] = *cfg.Replica
|
||||||
}
|
}
|
||||||
for _, replica := range cfg.Replicas {
|
for _, replica := range cfg.Replicas {
|
||||||
|
if replica.APIPath == "" {
|
||||||
|
replica.APIPath = DefaultAPIPath
|
||||||
|
}
|
||||||
if replica.URL != "" {
|
if replica.URL != "" {
|
||||||
dedup[replica.Key()] = replica
|
dedup[replica.Key()] = replica
|
||||||
}
|
}
|
||||||
@@ -45,16 +101,18 @@ func (cfg *Config) UniqueReplicas() []AdGuardInstance {
|
|||||||
|
|
||||||
var r []AdGuardInstance
|
var r []AdGuardInstance
|
||||||
for _, replica := range dedup {
|
for _, replica := range dedup {
|
||||||
if replica.APIPath == "" {
|
|
||||||
replica.APIPath = DefaultAPIPath
|
|
||||||
}
|
|
||||||
r = append(r, replica)
|
r = append(r, replica)
|
||||||
}
|
}
|
||||||
return r
|
return r
|
||||||
}
|
}
|
||||||
|
|
||||||
// Log the current config
|
// Log the current config.
|
||||||
func (cfg *Config) Log(l *zap.SugaredLogger) {
|
func (cfg *Config) Log(l *zap.SugaredLogger) {
|
||||||
|
c := cfg.mask()
|
||||||
|
l.With("config", c).Debug("Using config")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cfg *Config) mask() *Config {
|
||||||
c := cfg.DeepCopy()
|
c := cfg.DeepCopy()
|
||||||
c.Origin.Mask()
|
c.Origin.Mask()
|
||||||
if c.Replica != nil {
|
if c.Replica != nil {
|
||||||
@@ -67,47 +125,87 @@ func (cfg *Config) Log(l *zap.SugaredLogger) {
|
|||||||
for i := range c.Replicas {
|
for i := range c.Replicas {
|
||||||
c.Replicas[i].Mask()
|
c.Replicas[i].Mask()
|
||||||
}
|
}
|
||||||
l.With("config", c).Debug("Using config")
|
c.API.Mask()
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cfg *Config) Init() error {
|
||||||
|
if err := cfg.Origin.Init(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
for i := range cfg.Replicas {
|
||||||
|
replica := &cfg.Replicas[i]
|
||||||
|
if err := replica.Init(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// AdGuardInstance AdguardHome config instance
|
// AdGuardInstance AdguardHome config instance
|
||||||
// +k8s:deepcopy-gen=true
|
// +k8s:deepcopy-gen=true
|
||||||
type AdGuardInstance struct {
|
type AdGuardInstance struct {
|
||||||
URL string `json:"url" yaml:"url"`
|
URL string `documentation:"URL of adguardhome instance" env:"URL" faker:"url" json:"url" yaml:"url"`
|
||||||
APIPath string `json:"apiPath,omitempty" yaml:"apiPath,omitempty"`
|
WebURL string `documentation:"Web URL of adguardhome instance" env:"WEB_URL" faker:"url" json:"webURL" yaml:"webURL"`
|
||||||
Username string `json:"username,omitempty" yaml:"username,omitempty"`
|
APIPath string `documentation:"API Path" env:"API_PATH" json:"apiPath,omitempty" yaml:"apiPath,omitempty"`
|
||||||
Password string `json:"password,omitempty" yaml:"password,omitempty"`
|
Username string `documentation:"Adguardhome username" env:"USERNAME" json:"username,omitempty" yaml:"username,omitempty"`
|
||||||
Cookie string `json:"cookie,omitempty" yaml:"cookie,omitempty"`
|
Password string `documentation:"Adguardhome password" env:"PASSWORD" json:"password,omitempty" yaml:"password,omitempty"`
|
||||||
InsecureSkipVerify bool `json:"insecureSkipVerify" yaml:"insecureSkipVerify"`
|
Cookie string `documentation:"Adguardhome cookie" env:"COOKIE" json:"cookie,omitempty" yaml:"cookie,omitempty"`
|
||||||
AutoSetup bool `json:"autoSetup" yaml:"autoSetup"`
|
RequestHeaders map[string]string `documentation:"Request Headers 'key1:value1,key2:value2'" env:"REQUEST_HEADERS" json:"requestHeaders,omitempty" yaml:"requestHeaders,omitempty"`
|
||||||
InterfaceName string `json:"interfaceName" yaml:"interfaceName"`
|
InsecureSkipVerify bool `documentation:"Skip TLS verification" env:"INSECURE_SKIP_VERIFY" json:"insecureSkipVerify" yaml:"insecureSkipVerify"`
|
||||||
DHCPServerEnabled *bool `json:"dhcpServerEnabled,omitempty" yaml:"dhcpServerEnabled,omitempty"`
|
AutoSetup bool `documentation:"Automatically setup the instance if it is not initialized" env:"AUTO_SETUP" json:"autoSetup" yaml:"autoSetup"`
|
||||||
|
InterfaceName string `documentation:"Network interface name" env:"INTERFACE_NAME" json:"interfaceName,omitempty" yaml:"interfaceName,omitempty"`
|
||||||
|
DHCPServerEnabled *bool `documentation:"Enable DHCP server" env:"DHCP_SERVER_ENABLED" json:"dhcpServerEnabled,omitempty" yaml:"dhcpServerEnabled,omitempty"`
|
||||||
|
|
||||||
|
Host string `json:"-" yaml:"-"`
|
||||||
|
WebHost string `json:"-" yaml:"-"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Key AdGuardInstance key
|
// Key AdGuardInstance key.
|
||||||
func (i *AdGuardInstance) Key() string {
|
func (i *AdGuardInstance) Key() string {
|
||||||
return fmt.Sprintf("%s#%s", i.URL, i.APIPath)
|
return fmt.Sprintf("%s#%s", i.URL, i.APIPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Mask maks username and password
|
// Mask maks username and password.
|
||||||
func (i *AdGuardInstance) Mask() {
|
func (i *AdGuardInstance) Mask() {
|
||||||
i.Username = mask(i.Username)
|
i.Username = mask(i.Username)
|
||||||
i.Password = mask(i.Password)
|
i.Password = mask(i.Password)
|
||||||
}
|
}
|
||||||
|
|
||||||
func mask(s string) string {
|
func (i *AdGuardInstance) Init() error {
|
||||||
if s == "" {
|
u, err := url.Parse(i.URL)
|
||||||
return "***"
|
if err != nil {
|
||||||
|
return err
|
||||||
}
|
}
|
||||||
return fmt.Sprintf("%v***%v", string(s[0]), string(s[len(s)-1]))
|
i.Host = u.Host
|
||||||
|
|
||||||
|
if i.WebURL == "" {
|
||||||
|
i.WebHost = i.Host
|
||||||
|
i.WebURL = i.URL
|
||||||
|
} else {
|
||||||
|
u, err := url.Parse(i.WebURL)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
i.WebHost = u.Host
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Protection API struct
|
func mask(s string) string {
|
||||||
|
if len(s) < 3 {
|
||||||
|
return strings.Repeat("*", len(s))
|
||||||
|
}
|
||||||
|
mask := strings.Repeat("*", len(s)-2)
|
||||||
|
return fmt.Sprintf("%v%s%v", string(s[0]), mask, string(s[len(s)-1]))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Protection API struct.
|
||||||
type Protection struct {
|
type Protection struct {
|
||||||
ProtectionEnabled bool `json:"protection_enabled"`
|
ProtectionEnabled bool `json:"protection_enabled"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// InstallConfig AdguardHome install config
|
// InstallConfig AdguardHome install config.
|
||||||
type InstallConfig struct {
|
type InstallConfig struct {
|
||||||
Web InstallPort `json:"web"`
|
Web InstallPort `json:"web"`
|
||||||
DNS InstallPort `json:"dns"`
|
DNS InstallPort `json:"dns"`
|
||||||
@@ -115,7 +213,7 @@ type InstallConfig struct {
|
|||||||
Password string `json:"password"`
|
Password string `json:"password"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// InstallPort AdguardHome install config port
|
// InstallPort AdguardHome install config port.
|
||||||
type InstallPort struct {
|
type InstallPort struct {
|
||||||
IP string `json:"ip"`
|
IP string `json:"ip"`
|
||||||
Port int `json:"port"`
|
Port int `json:"port"`
|
||||||
|
|||||||
15
pkg/types/types_fuzz_test.go
Normal file
15
pkg/types/types_fuzz_test.go
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
package types
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func FuzzMask(f *testing.F) {
|
||||||
|
testcases := []string{"", "a", "ab", "abc", "abcd"}
|
||||||
|
for _, tc := range testcases {
|
||||||
|
f.Add(tc)
|
||||||
|
}
|
||||||
|
f.Fuzz(func(t *testing.T, value string) {
|
||||||
|
_ = mask(value)
|
||||||
|
})
|
||||||
|
}
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
package cmd_test
|
package types_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"testing"
|
"testing"
|
||||||
@@ -7,7 +7,7 @@ import (
|
|||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestCmd(t *testing.T) {
|
func TestSync(t *testing.T) {
|
||||||
RegisterFailHandler(Fail)
|
RegisterFailHandler(Fail)
|
||||||
RunSpecs(t, "Cmd Suite")
|
RunSpecs(t, "Types Suite")
|
||||||
}
|
}
|
||||||
152
pkg/types/types_test.go
Normal file
152
pkg/types/types_test.go
Normal file
@@ -0,0 +1,152 @@
|
|||||||
|
package types
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
. "github.com/onsi/ginkgo/v2"
|
||||||
|
. "github.com/onsi/gomega"
|
||||||
|
)
|
||||||
|
|
||||||
|
var _ = Describe("Types", func() {
|
||||||
|
Context("AdGuardInstance", func() {
|
||||||
|
var inst AdGuardInstance
|
||||||
|
|
||||||
|
BeforeEach(func() {
|
||||||
|
inst = AdGuardInstance{}
|
||||||
|
})
|
||||||
|
Context("Instance Init", func() {
|
||||||
|
BeforeEach(func() {
|
||||||
|
inst.URL = "https://localhost:3000"
|
||||||
|
})
|
||||||
|
It("should correctly set Host and WebHost if only URL is set", func() {
|
||||||
|
err := inst.Init()
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(inst.Host).Should(Equal("localhost:3000"))
|
||||||
|
Ω(inst.WebHost).Should(Equal("localhost:3000"))
|
||||||
|
Ω(inst.URL).Should(Equal("https://localhost:3000"))
|
||||||
|
Ω(inst.WebURL).Should(Equal("https://localhost:3000"))
|
||||||
|
})
|
||||||
|
It("should correctly set Host and WebHost if URL and WebURL are set", func() {
|
||||||
|
inst.WebURL = "https://127.0.0.1:4000"
|
||||||
|
err := inst.Init()
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(inst.Host).Should(Equal("localhost:3000"))
|
||||||
|
Ω(inst.WebHost).Should(Equal("127.0.0.1:4000"))
|
||||||
|
Ω(inst.WebURL).Should(Equal(inst.WebURL))
|
||||||
|
Ω(inst.URL).Should(Equal("https://localhost:3000"))
|
||||||
|
Ω(inst.WebURL).Should(Equal("https://127.0.0.1:4000"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("Config", func() {
|
||||||
|
Context("init", func() {
|
||||||
|
cfg := Config{
|
||||||
|
Origin: &AdGuardInstance{},
|
||||||
|
Replicas: []AdGuardInstance{
|
||||||
|
{URL: "https://localhost:3000"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
err := cfg.Init()
|
||||||
|
Ω(err).ShouldNot(HaveOccurred())
|
||||||
|
Ω(cfg.Replicas[0].Host).Should(Equal("localhost:3000"))
|
||||||
|
Ω(cfg.Replicas[0].WebHost).Should(Equal("localhost:3000"))
|
||||||
|
Ω(cfg.Replicas[0].URL).Should(Equal("https://localhost:3000"))
|
||||||
|
Ω(cfg.Replicas[0].WebURL).Should(Equal("https://localhost:3000"))
|
||||||
|
})
|
||||||
|
Context("UniqueReplicas", func() {
|
||||||
|
It("should return unique replicas in the array", func() {
|
||||||
|
cfg := Config{
|
||||||
|
Origin: &AdGuardInstance{},
|
||||||
|
Replicas: []AdGuardInstance{
|
||||||
|
{URL: "a"},
|
||||||
|
{URL: "a", APIPath: DefaultAPIPath},
|
||||||
|
{URL: "a", APIPath: "foo"},
|
||||||
|
{URL: "b", APIPath: DefaultAPIPath},
|
||||||
|
},
|
||||||
|
Replica: &AdGuardInstance{URL: "b"},
|
||||||
|
}
|
||||||
|
replicas := cfg.UniqueReplicas()
|
||||||
|
Ω(replicas).Should(HaveLen(3))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("mask", func() {
|
||||||
|
It("should mask all names and passwords", func() {
|
||||||
|
cfg := Config{
|
||||||
|
Origin: &AdGuardInstance{},
|
||||||
|
Replicas: []AdGuardInstance{
|
||||||
|
{URL: "a", Username: "user", Password: "pass"},
|
||||||
|
},
|
||||||
|
Replica: &AdGuardInstance{URL: "a", Username: "user", Password: "pass"},
|
||||||
|
API: API{Username: "user", Password: "pass"},
|
||||||
|
}
|
||||||
|
masked := cfg.mask()
|
||||||
|
Ω(masked.Replicas[0].Username).Should(Equal("u**r"))
|
||||||
|
Ω(masked.Replicas[0].Password).Should(Equal("p**s"))
|
||||||
|
Ω(masked.Replica.Username).Should(Equal("u**r"))
|
||||||
|
Ω(masked.Replica.Password).Should(Equal("p**s"))
|
||||||
|
Ω(masked.API.Username).Should(Equal("u**r"))
|
||||||
|
Ω(masked.API.Password).Should(Equal("p**s"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
DescribeTable("mask should work correctly",
|
||||||
|
func(value, expected string) {
|
||||||
|
Ω(mask(value)).Should(Equal(expected))
|
||||||
|
},
|
||||||
|
Entry(`Empty password`, "", ""),
|
||||||
|
Entry(`1 char password`, "a", "*"),
|
||||||
|
Entry(`2 char password`, "ab", "**"),
|
||||||
|
Entry(`3 char password`, "abc", "a*c"),
|
||||||
|
)
|
||||||
|
})
|
||||||
|
Context("Feature", func() {
|
||||||
|
Context("LogDisabled", func() {
|
||||||
|
It("should log all features", func() {
|
||||||
|
f := NewFeatures(false)
|
||||||
|
Ω(f.collectDisabled()).Should(HaveLen(11))
|
||||||
|
})
|
||||||
|
It("should log no features", func() {
|
||||||
|
f := NewFeatures(true)
|
||||||
|
Ω(f.collectDisabled()).Should(BeEmpty())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("TLS", func() {
|
||||||
|
var t TLS
|
||||||
|
BeforeEach(func() {
|
||||||
|
t = TLS{
|
||||||
|
CertDir: "/path/to/certs",
|
||||||
|
}
|
||||||
|
})
|
||||||
|
Context("Enabled", func() {
|
||||||
|
It("should use enabled", func() {
|
||||||
|
Ω(t.Enabled()).Should(BeTrue())
|
||||||
|
})
|
||||||
|
It("should use disabled", func() {
|
||||||
|
t.CertDir = " "
|
||||||
|
Ω(t.Enabled()).Should(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
Context("Certs", func() {
|
||||||
|
It("should use default crt and key", func() {
|
||||||
|
crt, key := t.Certs()
|
||||||
|
crt = normalizePath(crt)
|
||||||
|
key = normalizePath(key)
|
||||||
|
Ω(crt).Should(Equal("/path/to/certs/tls.crt"))
|
||||||
|
Ω(key).Should(Equal("/path/to/certs/tls.key"))
|
||||||
|
})
|
||||||
|
It("should use custom crt and key", func() {
|
||||||
|
t.CertName = "foo.crt"
|
||||||
|
t.KeyName = "bar.key"
|
||||||
|
crt, key := t.Certs()
|
||||||
|
crt = normalizePath(crt)
|
||||||
|
key = normalizePath(key)
|
||||||
|
Ω(crt).Should(Equal("/path/to/certs/foo.crt"))
|
||||||
|
Ω(key).Should(Equal("/path/to/certs/bar.key"))
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
func normalizePath(path string) string {
|
||||||
|
return strings.ReplaceAll(path, "\\", "/")
|
||||||
|
}
|
||||||
209
pkg/types/zz_generated.deepcopy.go
Normal file
209
pkg/types/zz_generated.deepcopy.go
Normal file
@@ -0,0 +1,209 @@
|
|||||||
|
//go:build !ignore_autogenerated
|
||||||
|
|
||||||
|
// Code generated by controller-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package types
|
||||||
|
|
||||||
|
import ()
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *API) DeepCopyInto(out *API) {
|
||||||
|
*out = *in
|
||||||
|
out.Metrics = in.Metrics
|
||||||
|
out.TLS = in.TLS
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new API.
|
||||||
|
func (in *API) DeepCopy() *API {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(API)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *AdGuardInstance) DeepCopyInto(out *AdGuardInstance) {
|
||||||
|
*out = *in
|
||||||
|
if in.RequestHeaders != nil {
|
||||||
|
in, out := &in.RequestHeaders, &out.RequestHeaders
|
||||||
|
*out = make(map[string]string, len(*in))
|
||||||
|
for key, val := range *in {
|
||||||
|
(*out)[key] = val
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if in.DHCPServerEnabled != nil {
|
||||||
|
in, out := &in.DHCPServerEnabled, &out.DHCPServerEnabled
|
||||||
|
*out = new(bool)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AdGuardInstance.
|
||||||
|
func (in *AdGuardInstance) DeepCopy() *AdGuardInstance {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(AdGuardInstance)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *Config) DeepCopyInto(out *Config) {
|
||||||
|
*out = *in
|
||||||
|
if in.Origin != nil {
|
||||||
|
in, out := &in.Origin, &out.Origin
|
||||||
|
*out = new(AdGuardInstance)
|
||||||
|
(*in).DeepCopyInto(*out)
|
||||||
|
}
|
||||||
|
if in.Replica != nil {
|
||||||
|
in, out := &in.Replica, &out.Replica
|
||||||
|
*out = new(AdGuardInstance)
|
||||||
|
(*in).DeepCopyInto(*out)
|
||||||
|
}
|
||||||
|
if in.Replicas != nil {
|
||||||
|
in, out := &in.Replicas, &out.Replicas
|
||||||
|
*out = make([]AdGuardInstance, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
out.API = in.API
|
||||||
|
out.Features = in.Features
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Config.
|
||||||
|
func (in *Config) DeepCopy() *Config {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(Config)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *DHCP) DeepCopyInto(out *DHCP) {
|
||||||
|
*out = *in
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DHCP.
|
||||||
|
func (in *DHCP) DeepCopy() *DHCP {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(DHCP)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *DNS) DeepCopyInto(out *DNS) {
|
||||||
|
*out = *in
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DNS.
|
||||||
|
func (in *DNS) DeepCopy() *DNS {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(DNS)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *Features) DeepCopyInto(out *Features) {
|
||||||
|
*out = *in
|
||||||
|
out.DNS = in.DNS
|
||||||
|
out.DHCP = in.DHCP
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Features.
|
||||||
|
func (in *Features) DeepCopy() *Features {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(Features)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *InstallConfig) DeepCopyInto(out *InstallConfig) {
|
||||||
|
*out = *in
|
||||||
|
out.Web = in.Web
|
||||||
|
out.DNS = in.DNS
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new InstallConfig.
|
||||||
|
func (in *InstallConfig) DeepCopy() *InstallConfig {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(InstallConfig)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *InstallPort) DeepCopyInto(out *InstallPort) {
|
||||||
|
*out = *in
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new InstallPort.
|
||||||
|
func (in *InstallPort) DeepCopy() *InstallPort {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(InstallPort)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *Metrics) DeepCopyInto(out *Metrics) {
|
||||||
|
*out = *in
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Metrics.
|
||||||
|
func (in *Metrics) DeepCopy() *Metrics {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(Metrics)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *Protection) DeepCopyInto(out *Protection) {
|
||||||
|
*out = *in
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Protection.
|
||||||
|
func (in *Protection) DeepCopy() *Protection {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(Protection)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *TLS) DeepCopyInto(out *TLS) {
|
||||||
|
*out = *in
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TLS.
|
||||||
|
func (in *TLS) DeepCopy() *TLS {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(TLS)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
@@ -1,15 +1,18 @@
|
|||||||
package utils
|
package utils
|
||||||
|
|
||||||
import "encoding/json"
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
)
|
||||||
|
|
||||||
func Clone[I interface{}](in I, out I) I {
|
func Clone[I any](in, out I) I {
|
||||||
b, _ := json.Marshal(in)
|
b, _ := json.Marshal(in)
|
||||||
_ = json.Unmarshal(b, out)
|
_ = json.Unmarshal(b, out)
|
||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
|
|
||||||
func JsonEquals(a interface{}, b interface{}) bool {
|
func JSONEquals(a, b any) bool {
|
||||||
ja, _ := json.Marshal(a)
|
ja, _ := json.Marshal(a)
|
||||||
jb, _ := json.Marshal(b)
|
jb, _ := json.Marshal(b)
|
||||||
return string(ja) == string(jb)
|
return bytes.Equal(ja, jb)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,13 +2,23 @@ package utils
|
|||||||
|
|
||||||
import "fmt"
|
import "fmt"
|
||||||
|
|
||||||
func Ptr[I interface{}](i I) *I {
|
func Ptr[I any](i I) *I {
|
||||||
return &i
|
return &i
|
||||||
}
|
}
|
||||||
|
|
||||||
func PtrToString[I interface{}](i *I) string {
|
func PtrToString[I any](i *I) string {
|
||||||
if i == nil {
|
if i == nil {
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
return fmt.Sprintf("%v", i)
|
return fmt.Sprintf("%v", i)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func PtrEquals[I comparable](a, b *I) bool {
|
||||||
|
if a == nil && b == nil {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if a == nil || b == nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return *a == *b
|
||||||
|
}
|
||||||
|
|||||||
@@ -3,15 +3,15 @@ package versions
|
|||||||
import "golang.org/x/mod/semver"
|
import "golang.org/x/mod/semver"
|
||||||
|
|
||||||
const (
|
const (
|
||||||
// MinAgh minimal adguardhome version
|
// MinAgh minimal adguardhome version.
|
||||||
MinAgh = "v0.107.40"
|
MinAgh = "v0.107.40"
|
||||||
)
|
)
|
||||||
|
|
||||||
func IsNewerThan(v1 string, v2 string) bool {
|
func IsNewerThan(v1, v2 string) bool {
|
||||||
return semver.Compare(sanitize(v1), sanitize(v2)) == 1
|
return semver.Compare(sanitize(v1), sanitize(v2)) == 1
|
||||||
}
|
}
|
||||||
|
|
||||||
func IsSame(v1 string, v2 string) bool {
|
func IsSame(v1, v2 string) bool {
|
||||||
return semver.Compare(sanitize(v1), sanitize(v2)) == 0
|
return semver.Compare(sanitize(v1), sanitize(v2)) == 0
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1,9 +1,10 @@
|
|||||||
package versions_test
|
package versions_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/bakito/adguardhome-sync/pkg/versions"
|
|
||||||
. "github.com/onsi/ginkgo/v2"
|
. "github.com/onsi/ginkgo/v2"
|
||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
|
|
||||||
|
"github.com/bakito/adguardhome-sync/pkg/versions"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = Describe("Versions", func() {
|
var _ = Describe("Versions", func() {
|
||||||
|
|||||||
28
renovate.json
Normal file
28
renovate.json
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"$schema": "https://docs.renovatebot.com/renovate-schema.json",
|
||||||
|
"customManagers": [
|
||||||
|
{
|
||||||
|
"customType": "regex",
|
||||||
|
"datasourceTemplate": "go",
|
||||||
|
"description": "Update toolbox tools in .toolbox.mk",
|
||||||
|
"managerFilePatterns": [
|
||||||
|
".toolbox.mk"
|
||||||
|
],
|
||||||
|
"matchStrings": [
|
||||||
|
"# renovate: packageName=(?<packageName>.+?)\\s+.+?_VERSION \\?= (?<currentValue>.+?)\\s"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"customType": "regex",
|
||||||
|
"datasourceTemplate": "github-releases",
|
||||||
|
"description": "Update github _VERSION Makefile",
|
||||||
|
"managerFilePatterns": [
|
||||||
|
"Makefile"
|
||||||
|
],
|
||||||
|
"matchStrings": [
|
||||||
|
"# renovate: packageName=(?<packageName>.+?)\\s+.+?_VERSION \\?= (?<currentValue>.+?)\\s"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"dependencyDashboard": true
|
||||||
|
}
|
||||||
2
testdata/.gitignore
vendored
Normal file
2
testdata/.gitignore
vendored
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
docker-compose.yaml
|
||||||
|
!config_test_*.yaml
|
||||||
31
testdata/config/print-config_test_expected1.md
vendored
Normal file
31
testdata/config/print-config_test_expected1.md
vendored
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
<!-- PLEASE COPY THE FOLLOWING OUTPUT AS IS INTO THE GITHUB ISSUE (Don't forget to mask your usernames, passwords, IPs and other sensitive information when using this in an issue ) -->
|
||||||
|
|
||||||
|
### Runtime
|
||||||
|
|
||||||
|
AdguardHome-Sync Version: %s
|
||||||
|
Build: %s
|
||||||
|
OperatingSystem: %s
|
||||||
|
Architecture: %s
|
||||||
|
OriginVersion: v0.0.1
|
||||||
|
ReplicaVersions:
|
||||||
|
- Replica 1: v0.0.2
|
||||||
|
|
||||||
|
### AdGuardHome sync aggregated config
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
origin:
|
||||||
|
url: https://ha.xxxx.net:3000
|
||||||
|
webURL: ""
|
||||||
|
insecureSkipVerify: false
|
||||||
|
autoSetup: false
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
### Environment Variables
|
||||||
|
|
||||||
|
```ini
|
||||||
|
BAR=bar
|
||||||
|
FOO=foo
|
||||||
|
```
|
||||||
|
|
||||||
|
<!-- END OF GITHUB ISSUE CONTENT -->
|
||||||
41
testdata/config/print-config_test_expected2.md
vendored
Normal file
41
testdata/config/print-config_test_expected2.md
vendored
Normal file
@@ -0,0 +1,41 @@
|
|||||||
|
<!-- PLEASE COPY THE FOLLOWING OUTPUT AS IS INTO THE GITHUB ISSUE (Don't forget to mask your usernames, passwords, IPs and other sensitive information when using this in an issue ) -->
|
||||||
|
|
||||||
|
### Runtime
|
||||||
|
|
||||||
|
AdguardHome-Sync Version: %s
|
||||||
|
Build: %s
|
||||||
|
OperatingSystem: %s
|
||||||
|
Architecture: %s
|
||||||
|
OriginVersion: v0.0.1
|
||||||
|
ReplicaVersions:
|
||||||
|
- Replica 1: v0.0.2
|
||||||
|
|
||||||
|
### AdGuardHome sync aggregated config
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
origin:
|
||||||
|
url: https://ha.xxxx.net:3000
|
||||||
|
webURL: ""
|
||||||
|
insecureSkipVerify: false
|
||||||
|
autoSetup: false
|
||||||
|
|
||||||
|
```
|
||||||
|
### AdGuardHome sync unmodified config file
|
||||||
|
|
||||||
|
Config file path: config.yaml
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
|
||||||
|
origin:
|
||||||
|
url: https://ha.xxxx.net:3000
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
### Environment Variables
|
||||||
|
|
||||||
|
```ini
|
||||||
|
BAR=bar
|
||||||
|
FOO=foo
|
||||||
|
```
|
||||||
|
|
||||||
|
<!-- END OF GITHUB ISSUE CONTENT -->
|
||||||
38
testdata/config_test_replica.yaml
vendored
Normal file
38
testdata/config_test_replica.yaml
vendored
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
origin:
|
||||||
|
url: https://origin-file:443
|
||||||
|
webURL: https://origin-file:443
|
||||||
|
apiPath: /control
|
||||||
|
username: foo
|
||||||
|
password: '*********'
|
||||||
|
insecureSkipVerify: true
|
||||||
|
autoSetup: false
|
||||||
|
replica:
|
||||||
|
url: https://replica-file:443
|
||||||
|
webURL: https://replica-file:443
|
||||||
|
apiPath: /control
|
||||||
|
username: bar
|
||||||
|
password: '*********'
|
||||||
|
insecureSkipVerify: false
|
||||||
|
autoSetup: false
|
||||||
|
interfaceName: eth3
|
||||||
|
dhcpServerEnabled: false
|
||||||
|
cron: '*/15 * * * *'
|
||||||
|
runOnStart: true
|
||||||
|
printConfigOnly: true
|
||||||
|
api:
|
||||||
|
port: 9090
|
||||||
|
features:
|
||||||
|
dns:
|
||||||
|
accessLists: true
|
||||||
|
serverConfig: false
|
||||||
|
rewrites: true
|
||||||
|
dhcp:
|
||||||
|
serverConfig: true
|
||||||
|
staticLeases: true
|
||||||
|
generalSettings: true
|
||||||
|
queryLogConfig: true
|
||||||
|
statsConfig: true
|
||||||
|
clientSettings: true
|
||||||
|
services: true
|
||||||
|
filters: true
|
||||||
|
theme: true
|
||||||
41
testdata/config_test_replicas.yaml
vendored
Normal file
41
testdata/config_test_replicas.yaml
vendored
Normal file
@@ -0,0 +1,41 @@
|
|||||||
|
origin:
|
||||||
|
url: https://origin-file:443
|
||||||
|
webURL: https://origin-file:443
|
||||||
|
apiPath: /control
|
||||||
|
username: foo
|
||||||
|
password: '*********'
|
||||||
|
insecureSkipVerify: true
|
||||||
|
autoSetup: false
|
||||||
|
replicas:
|
||||||
|
- url: https://replica-file:443
|
||||||
|
webURL: https://replica-file:443
|
||||||
|
apiPath: /control
|
||||||
|
username: bar
|
||||||
|
password: '*********'
|
||||||
|
insecureSkipVerify: false
|
||||||
|
autoSetup: false
|
||||||
|
interfaceName: eth3
|
||||||
|
dhcpServerEnabled: false
|
||||||
|
requestHeaders:
|
||||||
|
FOO: bar
|
||||||
|
Client-ID: xxxx
|
||||||
|
cron: '*/15 * * * *'
|
||||||
|
runOnStart: true
|
||||||
|
printConfigOnly: true
|
||||||
|
api:
|
||||||
|
port: 9090
|
||||||
|
features:
|
||||||
|
dns:
|
||||||
|
accessLists: true
|
||||||
|
serverConfig: false
|
||||||
|
rewrites: true
|
||||||
|
dhcp:
|
||||||
|
serverConfig: true
|
||||||
|
staticLeases: true
|
||||||
|
generalSettings: true
|
||||||
|
queryLogConfig: true
|
||||||
|
statsConfig: true
|
||||||
|
clientSettings: true
|
||||||
|
services: true
|
||||||
|
filters: true
|
||||||
|
theme: true
|
||||||
48
testdata/config_test_replicas_and_replica.yaml
vendored
Normal file
48
testdata/config_test_replicas_and_replica.yaml
vendored
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
origin:
|
||||||
|
url: https://origin-file:443
|
||||||
|
webURL: https://origin-file:443
|
||||||
|
apiPath: /control
|
||||||
|
username: foo
|
||||||
|
password: '*********'
|
||||||
|
insecureSkipVerify: true
|
||||||
|
autoSetup: false
|
||||||
|
replica:
|
||||||
|
url: https://replica-file:443
|
||||||
|
webURL: https://replica-file:443
|
||||||
|
apiPath: /control
|
||||||
|
username: bar
|
||||||
|
password: '*********'
|
||||||
|
insecureSkipVerify: false
|
||||||
|
autoSetup: false
|
||||||
|
interfaceName: eth3
|
||||||
|
dhcpServerEnabled: false
|
||||||
|
replicas:
|
||||||
|
- url: https://replicas-file:443
|
||||||
|
webURL: https://replicas-file:443
|
||||||
|
apiPath: /control
|
||||||
|
username: bar
|
||||||
|
password: '*********'
|
||||||
|
insecureSkipVerify: false
|
||||||
|
autoSetup: false
|
||||||
|
interfaceName: eth3
|
||||||
|
dhcpServerEnabled: false
|
||||||
|
cron: '*/15 * * * *'
|
||||||
|
runOnStart: true
|
||||||
|
printConfigOnly: true
|
||||||
|
api:
|
||||||
|
port: 9090
|
||||||
|
features:
|
||||||
|
dns:
|
||||||
|
accessLists: true
|
||||||
|
serverConfig: false
|
||||||
|
rewrites: true
|
||||||
|
dhcp:
|
||||||
|
serverConfig: true
|
||||||
|
staticLeases: true
|
||||||
|
generalSettings: true
|
||||||
|
queryLogConfig: true
|
||||||
|
statsConfig: true
|
||||||
|
clientSettings: true
|
||||||
|
services: true
|
||||||
|
filters: true
|
||||||
|
theme: true
|
||||||
3
testdata/e2e/bin/install-chart.sh
vendored
3
testdata/e2e/bin/install-chart.sh
vendored
@@ -6,4 +6,5 @@ kubectl config set-context --current --namespace=agh-e2e
|
|||||||
if [[ $(helm list --no-headers -n agh-e2e | grep agh-e2e | wc -l) == "1" ]]; then
|
if [[ $(helm list --no-headers -n agh-e2e | grep agh-e2e | wc -l) == "1" ]]; then
|
||||||
helm delete agh-e2e -n agh-e2e --wait
|
helm delete agh-e2e -n agh-e2e --wait
|
||||||
fi
|
fi
|
||||||
helm install agh-e2e testdata/e2e -n agh-e2e --create-namespace
|
helm install agh-e2e testdata/e2e -n agh-e2e --create-namespace --set mode=${1}
|
||||||
|
|
||||||
|
|||||||
2
testdata/e2e/bin/show-origin-logs.sh
vendored
2
testdata/e2e/bin/show-origin-logs.sh
vendored
@@ -1,7 +1,7 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -e
|
set -e
|
||||||
|
|
||||||
echo "## Pod adguardhome-origin logs" >> $GITHUB_STEP_SUMMARY
|
echo "## Pod adguardhome-origin ${1} logs" >> $GITHUB_STEP_SUMMARY
|
||||||
echo '```' >> $GITHUB_STEP_SUMMARY
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
||||||
kubectl logs adguardhome-origin >> $GITHUB_STEP_SUMMARY
|
kubectl logs adguardhome-origin >> $GITHUB_STEP_SUMMARY
|
||||||
echo '```' >> $GITHUB_STEP_SUMMARY
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
||||||
|
|||||||
21
testdata/e2e/bin/show-replica-logs.sh
vendored
21
testdata/e2e/bin/show-replica-logs.sh
vendored
@@ -4,15 +4,18 @@ set -e
|
|||||||
for pod in $(kubectl get pods -l bakito.net/adguardhome-sync=replica -o name); do
|
for pod in $(kubectl get pods -l bakito.net/adguardhome-sync=replica -o name); do
|
||||||
echo "## Pod ${pod} logs" >> $GITHUB_STEP_SUMMARY
|
echo "## Pod ${pod} logs" >> $GITHUB_STEP_SUMMARY
|
||||||
echo '```' >> $GITHUB_STEP_SUMMARY
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
||||||
LOGS=$(kubectl logs ${pod})
|
K8S_LOGS=$(kubectl logs ${pod})
|
||||||
# ignore certain errors
|
# ignore certain errors
|
||||||
LOGS=$(echo -e "${LOGS}" | grep -v -e "error.* deleting filter .* no such file or directory" )
|
LOGS=$(echo -e "${K8S_LOGS}" |
|
||||||
# https://github.com/AdguardTeam/AdGuardHome/issues/4944
|
grep -v -e "error.* deleting filter .* no such file or directory" |
|
||||||
LOGS=$(echo -e "${LOGS}" | grep -v -e "error.* creating dhcpv4 srv")
|
grep -v -e '\[error\] storage: recovered from panic: runtime' # https://github.com/AdguardTeam/AdGuardHome/issues/7315
|
||||||
echo -e "${LOGS}" >> $GITHUB_STEP_SUMMARY
|
)
|
||||||
ERRORS=$(echo -e "${LOGS}"} | grep '\[error\]' | wc -l)
|
|
||||||
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "Found ${ERRORS} error(s) in ${pod} log" >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "----------------------------------------------" >> $GITHUB_STEP_SUMMARY
|
|
||||||
|
|
||||||
|
echo -e "${K8S_LOGS}" >> $GITHUB_STEP_SUMMARY
|
||||||
|
ERRORS=$(echo -e "${LOGS}"} | grep '\[error\]' | wc -l)
|
||||||
|
TOTAL_ERRORS=$(echo -e "${K8S_LOGS}"} | grep '\[error\]' | wc -l)
|
||||||
|
IGNORED_ERRORS=$(echo "${TOTAL_ERRORS} - ${ERRORS}" | bc)
|
||||||
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "Found ${ERRORS} error(s) (${IGNORED_ERRORS} ignored) in ${pod} log" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "----------------------------------------------" >> $GITHUB_STEP_SUMMARY
|
||||||
done
|
done
|
||||||
|
|||||||
11
testdata/e2e/bin/show-sync-metrics.sh
vendored
Executable file
11
testdata/e2e/bin/show-sync-metrics.sh
vendored
Executable file
@@ -0,0 +1,11 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
|
||||||
|
echo "wait another scrape interval (30s)"
|
||||||
|
|
||||||
|
sleep 30
|
||||||
|
|
||||||
|
echo "## Pod adguardhome-sync metrics" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
||||||
|
curl ${1}://localhost:9090/metrics -s -k >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
||||||
3
testdata/e2e/bin/wait-for-start.sh
vendored
Executable file
3
testdata/e2e/bin/wait-for-start.sh
vendored
Executable file
@@ -0,0 +1,3 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
kubectl wait --for=jsonpath='{.status.phase}'=Running pod/adguardhome-sync --timeout=1m
|
||||||
12
testdata/e2e/bin/wait-for-sync.sh
vendored
12
testdata/e2e/bin/wait-for-sync.sh
vendored
@@ -1,4 +1,12 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -e
|
|
||||||
|
|
||||||
kubectl wait --for=jsonpath='{.status.phase}'=Succeeded pod/adguardhome-sync --timeout=1m
|
kubectl port-forward pod/adguardhome-sync 9090:9090 &
|
||||||
|
|
||||||
|
for i in {1..6}; do
|
||||||
|
sleep 10
|
||||||
|
RUNNING=$(curl ${1}://localhost:9090/api/v1/status -s -k | jq -r .syncRunning)
|
||||||
|
echo "SyncRunning = ${RUNNING}"
|
||||||
|
if [[ "${RUNNING}" == "false" ]]; then
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|||||||
44
testdata/e2e/resources/AdGuardHome.yaml
vendored
44
testdata/e2e/resources/AdGuardHome.yaml
vendored
@@ -18,19 +18,18 @@ dns:
|
|||||||
port: 53
|
port: 53
|
||||||
anonymize_client_ip: false
|
anonymize_client_ip: false
|
||||||
ratelimit: 20
|
ratelimit: 20
|
||||||
ratelimit_whitelist: [ ]
|
ratelimit_whitelist: []
|
||||||
refuse_any: true
|
refuse_any: true
|
||||||
upstream_dns:
|
upstream_dns:
|
||||||
- https://dns10.quad9.net/dns-query
|
- 8.8.8.8
|
||||||
upstream_dns_file: ""
|
upstream_dns_file: ""
|
||||||
bootstrap_dns:
|
bootstrap_dns:
|
||||||
- 1.1.1.1:53
|
- 1.1.1.1:53
|
||||||
fallback_dns: [ ]
|
fallback_dns: []
|
||||||
all_servers: false
|
upstream_mode: load_balance
|
||||||
fastest_addr: false
|
|
||||||
fastest_timeout: 1s
|
fastest_timeout: 1s
|
||||||
allowed_clients: [ ]
|
allowed_clients: []
|
||||||
disallowed_clients: [ ]
|
disallowed_clients: []
|
||||||
blocked_hosts:
|
blocked_hosts:
|
||||||
- version.bind
|
- version.bind
|
||||||
- id.server
|
- id.server
|
||||||
@@ -42,7 +41,7 @@ dns:
|
|||||||
cache_ttl_min: 0
|
cache_ttl_min: 0
|
||||||
cache_ttl_max: 0
|
cache_ttl_max: 0
|
||||||
cache_optimistic: true
|
cache_optimistic: true
|
||||||
bogus_nxdomain: [ ]
|
bogus_nxdomain: []
|
||||||
aaaa_disabled: false
|
aaaa_disabled: false
|
||||||
enable_dnssec: false
|
enable_dnssec: false
|
||||||
edns_client_subnet:
|
edns_client_subnet:
|
||||||
@@ -51,17 +50,19 @@ dns:
|
|||||||
use_custom: false
|
use_custom: false
|
||||||
max_goroutines: 300
|
max_goroutines: 300
|
||||||
handle_ddr: true
|
handle_ddr: true
|
||||||
ipset: [ ]
|
ipset: []
|
||||||
ipset_file: ""
|
ipset_file: ""
|
||||||
bootstrap_prefer_ipv6: false
|
bootstrap_prefer_ipv6: false
|
||||||
upstream_timeout: 10s
|
upstream_timeout: 10s
|
||||||
private_networks: [ ]
|
private_networks: []
|
||||||
use_private_ptr_resolvers: true
|
use_private_ptr_resolvers: true
|
||||||
local_ptr_upstreams: [ ]
|
local_ptr_upstreams: []
|
||||||
use_dns64: false
|
use_dns64: false
|
||||||
dns64_prefixes: [ ]
|
dns64_prefixes: []
|
||||||
serve_http3: false
|
serve_http3: false
|
||||||
use_http3_upstreams: false
|
use_http3_upstreams: false
|
||||||
|
serve_plain_dns: true
|
||||||
|
hostsfile_enabled: true
|
||||||
tls:
|
tls:
|
||||||
enabled: false
|
enabled: false
|
||||||
server_name: ""
|
server_name: ""
|
||||||
@@ -78,13 +79,15 @@ tls:
|
|||||||
private_key_path: ""
|
private_key_path: ""
|
||||||
strict_sni_check: false
|
strict_sni_check: false
|
||||||
querylog:
|
querylog:
|
||||||
ignored: [ ]
|
dir_path: ""
|
||||||
|
ignored: []
|
||||||
interval: 6h
|
interval: 6h
|
||||||
size_memory: 1000
|
size_memory: 1000
|
||||||
enabled: true
|
enabled: true
|
||||||
file_enabled: true
|
file_enabled: true
|
||||||
statistics:
|
statistics:
|
||||||
ignored: [ ]
|
dir_path: ""
|
||||||
|
ignored: []
|
||||||
interval: 24h
|
interval: 24h
|
||||||
enabled: true
|
enabled: true
|
||||||
filters:
|
filters:
|
||||||
@@ -96,7 +99,7 @@ filters:
|
|||||||
url: https://adaway.org/hosts.txt
|
url: https://adaway.org/hosts.txt
|
||||||
name: AdAway Default Blocklist
|
name: AdAway Default Blocklist
|
||||||
id: 2
|
id: 2
|
||||||
whitelist_filters: [ ]
|
whitelist_filters: []
|
||||||
user_rules:
|
user_rules:
|
||||||
- '||metrics2.data.hicloud.com^$important'
|
- '||metrics2.data.hicloud.com^$important'
|
||||||
- '||www.curiouscorrespondence.com^$important'
|
- '||www.curiouscorrespondence.com^$important'
|
||||||
@@ -113,7 +116,7 @@ dhcp:
|
|||||||
range_end: 1.2.3.56
|
range_end: 1.2.3.56
|
||||||
lease_duration: 86400
|
lease_duration: 86400
|
||||||
icmp_timeout_msec: 1000
|
icmp_timeout_msec: 1000
|
||||||
options: [ ]
|
options: []
|
||||||
dhcpv6:
|
dhcpv6:
|
||||||
range_start: ""
|
range_start: ""
|
||||||
lease_duration: 86400
|
lease_duration: 86400
|
||||||
@@ -150,7 +153,7 @@ filtering:
|
|||||||
blocking_mode: default
|
blocking_mode: default
|
||||||
parental_block_host: family-block.dns.adguard.com
|
parental_block_host: family-block.dns.adguard.com
|
||||||
safebrowsing_block_host: standard-block.dns.adguard.com
|
safebrowsing_block_host: standard-block.dns.adguard.com
|
||||||
rewrites: [ ]
|
rewrites: []
|
||||||
safebrowsing_cache_size: 1048576
|
safebrowsing_cache_size: 1048576
|
||||||
safesearch_cache_size: 1048576
|
safesearch_cache_size: 1048576
|
||||||
parental_cache_size: 1048576
|
parental_cache_size: 1048576
|
||||||
@@ -170,8 +173,6 @@ clients:
|
|||||||
hosts: true
|
hosts: true
|
||||||
persistent:
|
persistent:
|
||||||
- name: Device 1
|
- name: Device 1
|
||||||
tags:
|
|
||||||
- device_1
|
|
||||||
ids:
|
ids:
|
||||||
- 2.2.2.2
|
- 2.2.2.2
|
||||||
blocked_services:
|
blocked_services:
|
||||||
@@ -183,7 +184,7 @@ clients:
|
|||||||
- qq
|
- qq
|
||||||
- vk
|
- vk
|
||||||
- ok
|
- ok
|
||||||
upstreams: [ ]
|
upstreams: []
|
||||||
use_global_settings: true
|
use_global_settings: true
|
||||||
filtering_enabled: false
|
filtering_enabled: false
|
||||||
parental_enabled: false
|
parental_enabled: false
|
||||||
@@ -192,6 +193,7 @@ clients:
|
|||||||
ignore_querylog: false
|
ignore_querylog: false
|
||||||
ignore_statistics: false
|
ignore_statistics: false
|
||||||
log:
|
log:
|
||||||
|
enabled: true
|
||||||
file: ""
|
file: ""
|
||||||
max_backups: 0
|
max_backups: 0
|
||||||
max_size: 100
|
max_size: 100
|
||||||
@@ -203,4 +205,4 @@ os:
|
|||||||
group: ""
|
group: ""
|
||||||
user: ""
|
user: ""
|
||||||
rlimit_nofile: 0
|
rlimit_nofile: 0
|
||||||
schema_version: 27
|
schema_version: 28
|
||||||
|
|||||||
93
testdata/e2e/templates/configmap-certs.yaml
vendored
Normal file
93
testdata/e2e/templates/configmap-certs.yaml
vendored
Normal file
@@ -0,0 +1,93 @@
|
|||||||
|
{{- if eq .Values.mode "env" }}
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
metadata:
|
||||||
|
name: certs
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
data:
|
||||||
|
my.crt: |
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIE7zCCAtcCFFthw5GxzLaZC/pTTlbwju6vYr9pMA0GCSqGSIb3DQEBCwUAMDMx
|
||||||
|
CzAJBgNVBAYTAkNIMRMwEQYDVQQIDApTb21lLVN0YXRlMQ8wDQYDVQQKDAZiYWtp
|
||||||
|
dG8wIBcNMjQwNDA0MDUxOTMyWhgPMjEyNDAzMTEwNTE5MzJaMDMxCzAJBgNVBAYT
|
||||||
|
AkNIMRMwEQYDVQQIDApTb21lLVN0YXRlMQ8wDQYDVQQKDAZiYWtpdG8wggIiMA0G
|
||||||
|
CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCenHJ0SunHqdtBdG8d5Uy8y5KESOPE
|
||||||
|
GCpcjNetSR53binlV3QjVckrA+6tHQBR3yXpSgHWU424fR3eTdHsbS9/8/pAnV0V
|
||||||
|
CAaUntbCr5CJ8ww2zRlGSz6IlxkwJkqx4crmYUcTm6XNcEm5kSoBmFR1s8TiQAQ8
|
||||||
|
CnJyt4m3S5jSKnexAMi2l2LP4F5P5MwLHdpl2sfRYydWOoJty9nSYuRxarv7G7e3
|
||||||
|
N102voL3W2F9Dk8QbKF1Kzxcfmh+4twNz/YfUxxB3tggrCGHfMu4EcvMrFCkKhNv
|
||||||
|
sFcG9aZ0gNj4x54vCOMK+LuVd8JZQMcGBdcxZUq+q4nyj4dxFDKSUjZ+nVjdbuab
|
||||||
|
dk72dVbv/r2j6aGFuZDwPeYrKOyGCUlzyPvtX3qDjrebvalkrua0ApJLTiUntQK4
|
||||||
|
E+8P658GUzwqhKi6COEmgJgZO1+xIhO68OzPS6qj8OvgOw97VJqWsnTkDeu5Xd3E
|
||||||
|
qW37lk62EQ75FCLaWAmyBcxTDlIWNfwvSlI57Iyw0ec9ziN4JP+6pX3QTcj69Kvc
|
||||||
|
ERExUNGWcyQVYiCFigBqL/UtGO73PA4kb8P6Zef0oTx7siw4ysImvQ/RHvbArXPE
|
||||||
|
iqxg/afjJz/w7fTTwk9DRW12hiWj7+ojZMcoYCj1PcOlmZvchwZRdN8Lp37wm11I
|
||||||
|
EYxdoBQVRWk0vwIDAQABMA0GCSqGSIb3DQEBCwUAA4ICAQB6H+z2IEtiBTOIFnYJ
|
||||||
|
++CvZWw0CLPSpuFTwpDRIVUbrfhpFoXMwb6ungaqrGNXv3H4HQXl2EwXwZomsy2K
|
||||||
|
/pjk/0rHFdleEtJ4beSv44ToGCL+RqeU38sGuxCDQBCxIqGcbkErkqEYJqaSEV9I
|
||||||
|
elKjBA5PEy+WO/P+J5UYU6aY+59C+ZHrZ8HzoPUGrZ6ESu9Wm/9iOpUn4DWFzOOu
|
||||||
|
E/14QQqpHzHRvpbfOb/dsnEYv7JoiOaXhOedKmx5k+bLhNCXOJiqyqphNp0Io3Fr
|
||||||
|
8i6IxfvOo/6nw9sQ02E6PjNyC5bRq7TUrqffTcCRq7EYhJoK43V7nzLpUBItBF7K
|
||||||
|
FszFnvBxvgPtUdbhs6O8U8pqoPw1vCnoJLnerGfN1fEclV7Sbf3d1hCYXtHzmpZM
|
||||||
|
qflEkJIPSgkr8dyi2JjSQR5AJUtB5/VAZwBATNKNYINfnEVzyle+64iVaKteRt9e
|
||||||
|
yeLoy/ktTZSlQbb7/qg4NtQx9SA5PlYVMLj20S5HwStGQhLIb5lrwzkHNUZmkDWr
|
||||||
|
LUX1ufOfhNpCH2Egn078pyEn88B5iRTga2auCk3siOs9H3wmbT2r57E7ddX3l9Sf
|
||||||
|
MzO/8HyfNoa2RUTnJHdyduAT7VytyJSSRmfeapw9ITngZHGmpPhisKhxb6IoZm0J
|
||||||
|
j10kyQuFfNcZKlNa3D7XFvqzWQ==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
|
||||||
|
my.key: |
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIIJQwIBADANBgkqhkiG9w0BAQEFAASCCS0wggkpAgEAAoICAQCenHJ0SunHqdtB
|
||||||
|
dG8d5Uy8y5KESOPEGCpcjNetSR53binlV3QjVckrA+6tHQBR3yXpSgHWU424fR3e
|
||||||
|
TdHsbS9/8/pAnV0VCAaUntbCr5CJ8ww2zRlGSz6IlxkwJkqx4crmYUcTm6XNcEm5
|
||||||
|
kSoBmFR1s8TiQAQ8CnJyt4m3S5jSKnexAMi2l2LP4F5P5MwLHdpl2sfRYydWOoJt
|
||||||
|
y9nSYuRxarv7G7e3N102voL3W2F9Dk8QbKF1Kzxcfmh+4twNz/YfUxxB3tggrCGH
|
||||||
|
fMu4EcvMrFCkKhNvsFcG9aZ0gNj4x54vCOMK+LuVd8JZQMcGBdcxZUq+q4nyj4dx
|
||||||
|
FDKSUjZ+nVjdbuabdk72dVbv/r2j6aGFuZDwPeYrKOyGCUlzyPvtX3qDjrebvalk
|
||||||
|
rua0ApJLTiUntQK4E+8P658GUzwqhKi6COEmgJgZO1+xIhO68OzPS6qj8OvgOw97
|
||||||
|
VJqWsnTkDeu5Xd3EqW37lk62EQ75FCLaWAmyBcxTDlIWNfwvSlI57Iyw0ec9ziN4
|
||||||
|
JP+6pX3QTcj69KvcERExUNGWcyQVYiCFigBqL/UtGO73PA4kb8P6Zef0oTx7siw4
|
||||||
|
ysImvQ/RHvbArXPEiqxg/afjJz/w7fTTwk9DRW12hiWj7+ojZMcoYCj1PcOlmZvc
|
||||||
|
hwZRdN8Lp37wm11IEYxdoBQVRWk0vwIDAQABAoICAEx3eTh2m1F+oq1iQGXF0+Kb
|
||||||
|
NEZhS6mQyu92mU46F52Vd05RhLS6WXNLAIjmF+7gqYrYep1FB+ifLUSs+N1GYGWM
|
||||||
|
DqSTGTqX9XA2SaxvbrwK+GL9K0e34+x/CA4uD8nFZQf/cwBRhDRQg8KaaQl+0o0y
|
||||||
|
P2OiYEg/8yA6OwMqx4DfJ3gmvB1HS8STU3SqBfMAD/gV60qXxnGsYJAlfJyQv7is
|
||||||
|
L/dmTAJhByfq3gH5xLzBJr3w2UA/OWkQKjmuDk/8aBh+/XsGP+U0hy+mKyLRNZM1
|
||||||
|
qeUTQe6RMcuxp2+4ZKI/vpPHcYorE2iCZaiY8bqGG1J9lnTpB2bw6mfKSH1BdHKB
|
||||||
|
BCpnvMebe56hfNzQgbE5N4XZUHE4fdFRSDe0cLyagN+5BAekaA10E5cW5/7bfs4P
|
||||||
|
VFtJgcj3wSRsnYQ4UZoA/9LE6IeQXuHauUFf9lGvy26oW8FkuTysZk6w5uxyJOew
|
||||||
|
qM0/r7DaGZ6umAsINgLMV/2+ksVDGdOpcHmd7S6Gi26vFKIPdIXWO6BtVej6Mkb9
|
||||||
|
vUKEEnJbx+gdiehAO63WAg9KR77bHwTXFPYGvza3mB1SXrZCGjjfBnI5yQP6VDwG
|
||||||
|
uRa0fY/thbsS8QdHc6lmMJNKJnCyes3sG99qcpOX0HBWRpGt9YzjHMK16uQbMPn1
|
||||||
|
0ApKa/1j/izsQtMkai81AoIBAQDLi/WbQY5jrKesRjSN7AOGND0Ge/NHF7hPIKW6
|
||||||
|
Ql+BKiu3AiADemiXfnpeBS8OtkqxFWNFT6Ob2uv5pF2aRzP1un8mTaSipQu5iEOz
|
||||||
|
tejyiWGMCzKaGPksB/d2spDxaDTs1KIyM+YVP2ynx8IGwet2mRcWZ4ixyQxgaj2o
|
||||||
|
vZeCesxJZSPlt+D0NoPlthwDx4B7D49tU288WEvhPspcAjW3udE4WV4dnmFTZFtD
|
||||||
|
ZmJ9GrW4rQsti6D2f+hnkWi17F+qGR0B7B4yyE66W8y3wzMfq0/tZzBpAH+azwjk
|
||||||
|
qkHIbePrWTpwLwbAK4L4cKENs+yivAldfUj4kgVUhVLCscCrAoIBAQDHfBKKF/DK
|
||||||
|
BsGvWSxo5QahJza2px1walQeE0AifkDYkLI+fyYnArOTUKKAC1/SxI21PWlPPJHz
|
||||||
|
bt2lhF+I3+DFJTDLsUrBUN923rTpt1WpQVvBNzUFVz6JDlYr6VUOVOX0KY+LVE20
|
||||||
|
iPmZLrutgO3JRMMFWOaT0ptV1dVx/Eyd4BiT+NfK06D4ZSHGZ6QAsuUmjc+M5VfM
|
||||||
|
nRbuDlpMgOcBQYQSAfrA+LT6jZorv0mOO6rigNWzIP8FlsJxf1A5o5zL9CYAOOk/
|
||||||
|
lRWI7K4LSP4TTcTW8DnXqVH7q569d2QA/RS2B1EUEdpNuT2aKIAsNNrhA3JCX6S9
|
||||||
|
UZm9KOBwYuQ9AoIBAQCbD8ZNPkXA/RjHDryemXud01HiDK8qK5HHBfH60PF8rqma
|
||||||
|
w02sGKZxMnL6CSzuIkUIXmi/tonHA6HdDjAYhcG5oxeWEHQpS16BOqOI1j3d9naP
|
||||||
|
f0BPUFMSDgehLytoHKClAt+FKzBOY4Dc2Dqhdz1vnfSOptTly2lYUdcjIzu2tOHH
|
||||||
|
z/rm14vRv23/oxn4bxUbqqDzAiqtZ/52W6VBLpXJnw8ZxEsEeVFffAZidC73a0+g
|
||||||
|
noLzcXlwD8T2kTmZzbabGIKWok/nE92V7rUoENZze8hp7MBeXXjYcHwv5twyWjTV
|
||||||
|
Z6YzLEASSZN+vB6VF8pftqvTwsvCQUs6Nk7z7wH9AoIBAA6EH9E+tr3syfFZmtqz
|
||||||
|
N81ITjnyZTkF88MQgY1BBLT9qorTs9II50pkBr8slLeAqBM1OdGTRceiHKzrugv6
|
||||||
|
xp9x+mAIMblpiilbQWz0c15SrDueKdSOqbVNfsXJP/BAC0++KnzoEJN/mDImbW/N
|
||||||
|
vv/zagGcm4LMQ5N2cQbPZj/iy8cQx5sx1TfeHBwU9KE8Y2Jv1VeaZM417DI8hyOk
|
||||||
|
CatUuiiZTkb2kizdWwet7stT2jaLS4Gyd/xPIS0jJ5JaLpHE3XMMsSR4U83X8z5M
|
||||||
|
/HgpI5bEemEQKDAZJ/7/jh5oTDaGx8afGfSn8yyhn9oXqonPN2RPE2zXYEmcjOCA
|
||||||
|
wb0CggEBAI9ztuEtsucOVKa52Itzvk8sZn2MF1kpUPHGF6/VW6a/s45wvvFFW3PE
|
||||||
|
BjqmgJX8s2ZLgOgWE/wEmEpHX+lxmebYJ3bmOsx5eGfA1eZBypWCBYBSfezf/1zD
|
||||||
|
3AD65+gwO4GhnSN4zsrlyVC6SsWEaeu+sxexHt15YJI9SkwCkvZTYoLqe9nMcAjY
|
||||||
|
h41p/i6bhl9ODZPd1+hL631EFWguyMVSVTDgIG141OIYKz5hVQZ08ddrwHB2gPf6
|
||||||
|
JSdU2DFOD6tNCfvTYAMvUfkoIt3g9RDJ5dTdR9J/3efm0ZIutcYcHiASIcubPU9x
|
||||||
|
r8Ww1tZIoBx/s50i7X1JFyuXp0TWQsI=
|
||||||
|
-----END PRIVATE KEY-----
|
||||||
|
|
||||||
|
{{- end }}
|
||||||
24
testdata/e2e/templates/configmap-sync-env.yaml
vendored
Normal file
24
testdata/e2e/templates/configmap-sync-env.yaml
vendored
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
{{- if eq .Values.mode "env" }}
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
metadata:
|
||||||
|
name: sync-conf
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
data:
|
||||||
|
API_PORT: '9090'
|
||||||
|
API_METRICS_ENABLED: 'true'
|
||||||
|
API_METRICS_SCRAPE_INTERVAL: '30s'
|
||||||
|
API_TLS_CERT_DIR: '/certs'
|
||||||
|
API_TLS_CERT_NAME: 'my.crt'
|
||||||
|
API_TLS_KEY_NAME: 'my.key'
|
||||||
|
LOG_FORMAT: 'json'
|
||||||
|
ORIGIN_URL: 'http://service-origin.{{ $.Release.Namespace }}.svc.cluster.local:3000'
|
||||||
|
ORIGIN_PASSWORD: 'password'
|
||||||
|
ORIGIN_USERNAME: 'username'
|
||||||
|
{{- range $i,$version := .Values.replica.versions }}
|
||||||
|
REPLICA{{ add 1 $i }}_AUTO_SETUP: 'true'
|
||||||
|
REPLICA{{ add 1 $i }}_URL: 'http://service-replica-{{ $version | toString | replace "." "-" }}.{{ $.Release.Namespace }}.svc.cluster.local:3000'
|
||||||
|
REPLICA{{ add 1 $i }}_PASSWORD: 'password'
|
||||||
|
REPLICA{{ add 1 $i }}_USERNAME: 'username'
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
25
testdata/e2e/templates/configmap-sync-file.yaml
vendored
Normal file
25
testdata/e2e/templates/configmap-sync-file.yaml
vendored
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
{{- if eq .Values.mode "file" }}
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
metadata:
|
||||||
|
name: sync-conf
|
||||||
|
namespace: {{ .Release.Namespace }}
|
||||||
|
data:
|
||||||
|
config.yaml: |
|
||||||
|
origin:
|
||||||
|
url: 'http://service-origin.{{ $.Release.Namespace }}.svc.cluster.local:3000'
|
||||||
|
username: username
|
||||||
|
password: password
|
||||||
|
api:
|
||||||
|
port: 9090
|
||||||
|
metrics:
|
||||||
|
enabled: true
|
||||||
|
scrapeInterval: 30s
|
||||||
|
replicas:
|
||||||
|
{{- range $i,$version := .Values.replica.versions }}
|
||||||
|
- url: 'http://service-replica-{{ $version | toString | replace "." "-" }}.{{ $.Release.Namespace }}.svc.cluster.local:3000'
|
||||||
|
username: username
|
||||||
|
password: password
|
||||||
|
autoSetup: true
|
||||||
|
{{- end }}
|
||||||
|
{{- end }}
|
||||||
17
testdata/e2e/templates/configmap-sync.yaml
vendored
17
testdata/e2e/templates/configmap-sync.yaml
vendored
@@ -1,17 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: ConfigMap
|
|
||||||
metadata:
|
|
||||||
name: sync-conf
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
data:
|
|
||||||
API_PORT: '0'
|
|
||||||
LOG_LEVEL: 'info'
|
|
||||||
ORIGIN_URL: 'http://service-origin.{{ $.Release.Namespace }}.svc.cluster.local:3000'
|
|
||||||
ORIGIN_PASSWORD: 'password'
|
|
||||||
ORIGIN_USERNAME: 'username'
|
|
||||||
{{ range $i,$version := .Values.replica.versions }}
|
|
||||||
REPLICA{{ $i }}_AUTOSETUP: 'true'
|
|
||||||
REPLICA{{ $i }}_URL: 'http://service-replica-{{ $version | toString | replace "." "-" }}.{{ $.Release.Namespace }}.svc.cluster.local:3000'
|
|
||||||
REPLICA{{ $i }}_PASSWORD: 'password'
|
|
||||||
REPLICA{{ $i }}_USERNAME: 'username'
|
|
||||||
{{- end }}
|
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user