Skip to content

Commit b73663a

Browse files
authored
Merge pull request #225 from AdguardTeam/fixes-to-adguard-dns-api
various fixes to AG DNS API
2 parents 4af53d8 + c9cafda commit b73663a

File tree

6 files changed

+30
-28
lines changed

6 files changed

+30
-28
lines changed

docs/adguard-home/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,6 @@ sidebar_position: 1
55

66
## What is AdGuard Home?
77

8-
AdGuard Home is a network-wide software for blocking ads and tracking. Unlike AdGuard Public DNS and AdGuard Private DNS, AdGuard Home is designed to run on users’ own machines, which gives experienced users more control over their DNS traffic.
8+
AdGuard Home is a network-wide software for blocking ads and tracking. Unlike Public AdGuard DNS and Private AdGuard DNS, AdGuard Home is designed to run on users’ own machines, which gives experienced users more control over their DNS traffic.
99

1010
[This guide](getting-started.md) should help you get started.

docs/general/dns-providers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -583,7 +583,7 @@ Recommended for most users, very flexible filtering with blocking most ads netwo
583583

584584
#### Strict Filtering (RIC)
585585

586-
More strictly filtering policies with blocking — ads, marketing, tracking, malware, clickbait, coinhive and phishing domains.
586+
More strictly filtering policies with blocking — ads, marketing, tracking, malware, clickbait, coinhive, malicious, and phishing domains.
587587

588588
| Protocol | Address | |
589589
|----------------|----------------------------------------------------|----------------|
@@ -1016,7 +1016,7 @@ Non-logging | Filters ads, trackers, phishing, etc. | DNSSEC | QNAME Minimizatio
10161016

10171017
[Dandelion Sprout's Official DNS Server](https://github.com/DandelionSprout/adfilt/tree/master/Dandelion%20Sprout's%20Official%20DNS%20Server) is a personal DNS service hosted in Trondheim, Norway, using an AdGuard Home infrastructure.
10181018

1019-
Blocks more ads and malware than AdGuard DNS thanks to more advanced syntax, but goes easier on trackers, and blocks alt-right tabloids and most imageboards. Logging is used to improve its used filterlists (e.g. by unblocking sites that shouldn't have been blocked), and to determine the least bad times for server system updates.
1019+
Blocks more ads and malware than AdGuard DNS thanks to more advanced syntax, but goes easier on trackers, and blocks alt-right tabloids and most imageboards. Logging is used to improve its used filter lists (e.g. by unblocking sites that shouldn't have been blocked), and to determine the least bad times for server system updates.
10201020

10211021
| Protocol | Address | |
10221022
|----------------|------------------------------------------------------------------|------------------|

docs/miscellaneous/create-dns-stamp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors.
44

5-
Secure DNS usually uses `tls://`, `https://` or `quic://` URLs. This is sufficient for most users and is the recommended way.
5+
Secure DNS usually uses `tls://`, `https://`, or `quic://` URLs. This is sufficient for most users and is the recommended way.
66

77
However, if you need additional security, like pre-resolved server IPs and certificate pinning by hash, you may generate your own DNS stamp.
88

@@ -14,7 +14,7 @@ DNS stamps allow you to customize Secure DNS settings beyond the usual URLs. In
1414

1515
## Choosing the protocol
1616

17-
Types of Secure DNS include `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, and `DNS-over-TLS (DoT)` and some others. Choosing one of these protocols depends on the context in which you'll be using them.
17+
Types of Secure DNS include `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)`, and some others. Choosing one of these protocols depends on the context in which you'll be using them.
1818

1919
## Creating a DNS stamp
2020

docs/private-dns/api/changelog.md

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@ toc_max_heading_level: 3
1212

1313
This article contains the changelog for [AdGuard DNS API](private-dns/api/overview.md).
1414

15-
## v1.9 (11 July 2024)
15+
## v1.9
16+
17+
*Released on July 11, 2024*
1618

1719
- Added automatic device connection functionality:
1820
- New DNS server setting — `auto_connect_devices_enabled`, allowing approval for auto-connecting devices through a specific link type
@@ -26,7 +28,7 @@ This article contains the changelog for [AdGuard DNS API](private-dns/api/overvi
2628
- Added support for DNS-over-HTTPS with authentication:
2729
- New operation — reset DNS-over-HTTPS password for device
2830
- New device setting — `detect_doh_auth_only`. Disables all DNS connection methods except DNS-over-HTTPS with authentication
29-
- New field in Device DNSAddresses`dns_over_https_with_auth_url`. Indicates the URL to use when connecting using DNS-over-HTTPS with authentication
31+
- New field in DeviceDNSAddresses`dns_over_https_with_auth_url`. Indicates the URL to use when connecting using DNS-over-HTTPS with authentication
3032

3133
## v1.7
3234

@@ -42,15 +44,15 @@ This article contains the changelog for [AdGuard DNS API](private-dns/api/overvi
4244
- Unlink an IPv4 address from a device
4345
- Request info on dedicated addresses associated with a device
4446
- Added new limits to Account limits:
45-
- `dedicated_ipv4` provides information about the amount of already allocated dedicated IPv4 addresses, as well as the limit on them
47+
- `dedicated_ipv4` provides information about the amount of already allocated dedicated IPv4 addresses, as well as the limit on them
4648
- Removed deprecated field of DNSServerSettings:
4749
- `safebrowsing_enabled`
4850

4951
## v1.6
5052

5153
*Released on January 22, 2024*
5254

53-
- Added new section "Access settings" for DNS profiles (`access_settings`). By customizing these fields, you’ll be able to protect your AdGuard DNS server from unauthorized access:
55+
- Added new Access settings section for DNS profiles (`access_settings`). By customizing these fields, you’ll be able to protect your AdGuard DNS server from unauthorized access:
5456

5557
- `allowed_clients` — here you can specify which clients can use your DNS server. This field will have priority over the `blocked_clients` field
5658
- `blocked_clients` — here you can specify which clients are not allowed to use your DNS server
@@ -61,7 +63,7 @@ This article contains the changelog for [AdGuard DNS API](private-dns/api/overvi
6163
- `access_rules` provides the sum of currently used `blocked_clients` and `blocked_domain_rules` values, as well as the limit on access rules
6264
- `user_rules` shows the amount of created user rules, as well as the limit on them
6365

64-
- Added new setting: `ip_log_enabled` for the ability to log client IP addresses and domains.
66+
- Added a new `ip_log_enabled` setting to log client IP addresses and domains
6567

6668
- Added new error code `FIELD_REACHED_LIMIT` to indicate when limits have been reached:
6769

@@ -72,11 +74,11 @@ This article contains the changelog for [AdGuard DNS API](private-dns/api/overvi
7274

7375
*Released on June 16, 2023*
7476

75-
- Added new setting `block_nrd` and group all security-related settings to one place.
77+
- Added a new `block_nrd` setting and grouped all security-related settings in one place
7678

7779
### Model for safebrowsing settings changed
7880

79-
From
81+
From:
8082

8183
``` json
8284
{
@@ -94,7 +96,7 @@ To:
9496
}
9597
```
9698

97-
where `enabled` is now control all settings in group, `block_dangerous_domains` is previous model field "enabled" and `block_nrd` is settings for filtering newly registered domains.
99+
where `enabled` now controls all settings in the group, `block_dangerous_domains` is the previous `enabled` model field, and `block_nrd` is a setting that blocks newly registered domains.
98100

99101
### Model for saving server settings changed
100102

@@ -122,40 +124,40 @@ to:
122124
}
123125
```
124126

125-
here new field `safebrowsing_settings` is used instead of deprecated `safebrowsing_enabled`, whose value stored in `block_dangerous_domains`.
127+
here a new field `safebrowsing_settings` is used instead of the deprecated `safebrowsing_enabled`, whose value is stored in `block_dangerous_domains`.
126128

127129
## v1.4
128130

129131
*Released on March 29, 2023*
130132

131-
- Added configurable option for blocking response: default (0.0.0.0), REFUSED, NXDOMAIN or custom IP-address.
133+
- Added configurable option for blocking response: default (0.0.0.0), REFUSED, NXDOMAIN or custom IP address
132134

133135
## v1.3
134136

135137
*Released on December 13, 2022*
136138

137-
- Added method to get account limits.
139+
- Added method to get account limits
138140

139141
## v1.2
140142

141143
*Released on October 14, 2022*
142144

143-
- Added new protocol types DNS and DNSCRYPT. Deprecating the PLAIN_TCP, PLAIN_UDP, DNSCRYPT_TCP and DNSCRYPT_UDP that will be removed later.
145+
- Added new protocol types DNS and DNSCRYPT. Deprecating the PLAIN_TCP, PLAIN_UDP, DNSCRYPT_TCP and DNSCRYPT_UDP that will be removed later
144146

145147
## v1.1
146148

147149
*Released on July 07, 2022*
148150

149-
- Added methods to retrieve statistics by time, domains, companies and devices.
150-
- Added method for updating device settings.
151-
- Fixed required fields definition.
151+
- Added methods to retrieve statistics by time, domains, companies and devices
152+
- Added method for updating device settings
153+
- Fixed required fields definition
152154

153155
## v1.0
154156

155157
*Released on February 22, 2022*
156158

157-
- Added authentication.
158-
- CRUD operations with devices and DNS servers.
159-
- Query log.
160-
- Downloading DOT and DOT .mobileconfig.
161-
- Filter Lists and Web-Services.
159+
- Added authentication
160+
- CRUD operations with devices and DNS servers
161+
- Query log
162+
- Downloading DoH and DoT .mobileconfig
163+
- Filter lists and web services

docs/private-dns/api/reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Gets account limits
3535

3636
##### Summary
3737

38-
Lists allocated dedicated IPv4 addresses
38+
Lists dedicated IPv4 addresses
3939

4040
##### Responses
4141

@@ -47,7 +47,7 @@ Lists allocated dedicated IPv4 addresses
4747

4848
##### Summary
4949

50-
Allocates new dedicated IPv4
50+
Allocates new IPv4
5151

5252
##### Responses
5353

docs/public-dns/solving-problems/how-to-flush-dns-cache.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ You will see the line *Successfully flushed the DNS Resolver Cache*. Done!
102102

103103
### Linux
104104

105-
Linux does not have OS-level DNS caching unless a caching service such as systemd-resolved, DNSMasq, BIND or Nscd is installed and running. The process of clearing the DNS cache depends on the Linux distribution and the caching service used.
105+
Linux does not have OS-level DNS caching unless a caching service such as systemd-resolved, DNSMasq, BIND, or nscd is installed and running. The process of clearing the DNS cache depends on the Linux distribution and the caching service used.
106106

107107
For each distribution you need to start a terminal window. Press Ctrl+Alt+T on your keyboard and use the corresponding command to clear the DNS cache for the service your Linux system is running.
108108

0 commit comments

Comments
 (0)