You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: i18n/tr/docusaurus-plugin-content-docs/current/general/ad-filtering/create-own-filters.md
+40-40Lines changed: 40 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -419,7 +419,7 @@ This modifier lets you narrow the rule coverage down to a specific application (
419
419
420
420
For Mac, you can find out the bundle ID or the process name of the app by viewing the respective request details in the Filtering log.
421
421
422
-
**Syntax**
422
+
**Söz dizimi**
423
423
424
424
The modifier is a list of one or more expressions, each of which is matched against an application in a particular way depending on its type. These expressions are separated by the `|` symbol.
425
425
@@ -518,7 +518,7 @@ Rules with `$denyallow` modifier are not supported by AdGuard for iOS, Safari, a
518
518
519
519
`$domain` limits the rule scope to requests made **from** the specified domains and their subdomains (as indicated by the [Referer](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referer) HTTP header).
520
520
521
-
**Syntax**
521
+
**Söz dizimi**
522
522
523
523
The modifier is a list of one or more expressions separated by the `|` symbol, each of which is matched against a domain in a particular way depending on its type (see below).
524
524
@@ -599,7 +599,7 @@ In AdGuard for Windows, Mac and Android with [CoreLibs][] v1.12 or later the `$d
599
599
600
600
The `$header` modifier allows matching the HTTP response having a specific header with (optionally) a specific value.
601
601
602
-
**Syntax**
602
+
**Söz dizimi**
603
603
604
604
```text
605
605
$header "=" h_name [":" h_value]
@@ -1111,7 +1111,7 @@ You may use a shorter name (alias) instead of using the full modifier name: `$eh
1111
1111
1112
1112
Disables specific userscripts or all userscripts for a given domain.
@@ -1536,7 +1536,7 @@ For the requests matching a `$csp` rule, we will strengthen response security po
1536
1536
1537
1537
In case if multiple `$csp` rules match a single request, we will apply each of them.
1538
1538
1539
-
**Syntax**
1539
+
**Söz dizimi**
1540
1540
1541
1541
`$csp` value syntax is similar to the Content Security Policy header syntax.
1542
1542
@@ -1574,7 +1574,7 @@ The word "segment" in this document means either a "Media Segment" or a "playlis
1574
1574
1575
1575
:::
1576
1576
1577
-
**Syntax**
1577
+
**Söz dizimi**
1578
1578
1579
1579
-`||example.org^$hls=urlpattern` removes segments whose URL matches the URL pattern `urlpattern`. The pattern works just like the one in basic URL rules, however, the characters `/`, `$` and `,` must be escaped with `\` inside `urlpattern`.
1580
1580
-`||example.org^$hls=/regexp/options` removes segments where the URL or one of the tags (for certain options, if present) is matched by the regular expression `regexp`. Available `options` are:
@@ -1718,7 +1718,7 @@ The `$inline-font` modifier is designed to block inline fonts embedded into the
1718
1718
1719
1719
In AdGuard for Windows, Mac, and Android with [CoreLibs][] v1.11 or later, `$jsonprune` also supports modifying JSONP (padded JSON) documents.
1720
1720
1721
-
**Syntax**
1721
+
**Söz dizimi**
1722
1722
1723
1723
-`||example.org^$jsonprune=expression` removes items that match the modified JSONPath expression `expression` from the response.
1724
1724
@@ -1945,7 +1945,7 @@ Rules with the `$jsonprune` modifier are supported by AdGuard for Windows, AdGua
1945
1945
1946
1946
`$xmlprune` rules modify the response to a matching request by removing XML items that match an [XPath 1.0](https://www.w3.org/TR/1999/REC-xpath-19991116/) expression. The expression must return a [node-set](https://www.w3.org/TR/1999/REC-xpath-19991116/#node-sets). `$xmlprune` rules do not modify responses which are not well-formed XML documents.
1947
1947
1948
-
**Syntax**
1948
+
**Söz dizimi**
1949
1949
1950
1950
-`||example.org^$xmlprune=expression` removes items that match the XPath expression `expression` from the response.
1951
1951
@@ -2223,7 +2223,7 @@ In order to use this type of rules, it is required to have a basic understanding
2223
2223
2224
2224
For the requests matching a `$permissions` rule, AdGuard strengthens response's permissions policy by adding an additional permission policy equal to the `$permissions` modifier contents. `$permissions` rules are applied independently from any other rule type. **Only document-level exceptions** can influence it (see the examples section), but no other basic rules.
2225
2225
2226
-
**Syntax**
2226
+
**Söz dizimi**
2227
2227
2228
2228
`$permissions` value syntax is identical to that of the `Permissions-Policy` header [syntax](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy) with the following exceptions:
2229
2229
@@ -2282,7 +2282,7 @@ Firefox ignores the `Permissions-Policy` header. For more information, see [this
2282
2282
2283
2283
AdGuard is able to redirect web requests to a local "resource".
2284
2284
2285
-
**Syntax**
2285
+
**Söz dizimi**
2286
2286
2287
2287
AdGuard uses the same filtering rule syntax as uBlock Origin. Also, it is compatible with ABP `$rewrite=abp-resource` modifier.
2288
2288
@@ -2373,7 +2373,7 @@ Rules with `$removeheader` modifier are intended to remove headers from HTTP req
2373
2373
2374
2374
Just like `$csp`, `$redirect`, `$removeparam`, and `$cookie`, this modifier exists independently, rules with it do not depend on the regular basic rules, i.e. regular exception or blocking rules will not affect it. By default, it only affects response headers. However, you can also change it to remove headers from HTTP requests as well.
2375
2375
2376
-
**Syntax**
2376
+
**Söz dizimi**
2377
2377
2378
2378
**Basic syntax**
2379
2379
@@ -2553,7 +2553,7 @@ Rules with `$removeheader` modifier are supported by AdGuard for Windows, AdGuar
2553
2553
2554
2554
Rules with `$removeparam` modifier are intended to strip query parameters from requests' URLs. Please note that such rules are only applied to `GET`, `HEAD`, `OPTIONS`, and sometimes `POST` requests.
2555
2555
2556
-
**Syntax**
2556
+
**Söz dizimi**
2557
2557
2558
2558
**Basic syntax**
2559
2559
@@ -2762,7 +2762,7 @@ You will need some knowledge of regular expressions to use `$replace` modifier.
2762
2762
2763
2763
In caseif multiple `$replace` rules match a single request, we will apply each of them. **The order is defined alphabetically.**
2764
2764
2765
-
**Syntax**
2765
+
**Söz dizimi**
2766
2766
2767
2767
In general, `$replace` syntax is similar to replacement with regular expressions [in Perl](http://perldoc.perl.org/perlrequick.html#Search-and-replace).
2768
2768
@@ -2833,7 +2833,7 @@ The `$urltransform` value can be empty for exception rules.
2833
2833
2834
2834
If multiple `$urltransform` rules match a single request, we will apply each of them. **The order is defined alphabetically.**
2835
2835
2836
-
**Syntax**
2836
+
**Söz dizimi**
2837
2837
2838
2838
`$urltransform` syntax is similar to replacement with regular expressions [in Perl](http://perldoc.perl.org/perlrequick.html#Search-and-replace).
2839
2839
@@ -3221,7 +3221,7 @@ Element hiding rules are used to hide the elements of web pages. It is similar t
3221
3221
3222
3222
Element hiding rules may operate differently [depending on the platform](#cosmetic-rules-priority).
3223
3223
3224
-
#### Syntax
3224
+
#### Söz dizimi
3225
3225
3226
3226
```text
3227
3227
rule = [domains] "##" selector
@@ -3289,7 +3289,7 @@ We recommend to use this kind of exceptions only if it is not possible to change
3289
3289
3290
3290
Sometimes, simple hiding of an element is not enough to deal with advertising. For example, blocking an advertising element can just break the page layout. In this case AdGuard can use rules that are much more flexible than hiding rules. With these rules you can basically add any CSS styles to the page.
3291
3291
3292
-
**Syntax**
3292
+
**Söz dizimi**
3293
3293
3294
3294
```text
3295
3295
rule = [domains] "#$#" selector "{" style "}"
@@ -3390,7 +3390,7 @@ Rules with extended CSS selectors are not supported by AdGuard Content Blocker.
3390
3390
3391
3391
:::
3392
3392
3393
-
**Syntax**
3393
+
**Söz dizimi**
3394
3394
3395
3395
Regardless of the CSS pseudo-classes you are using in the rule, you can use special markers to force applying these rules by ExtendedCss. It is recommended to use these markers for all extended CSS cosmetic rules so that it was easier to find them.
3396
3396
@@ -3454,7 +3454,7 @@ Synonyms `:-abp-has()` is supported by ExtendedCss for better compatibility.
3454
3454
3455
3455
:::
3456
3456
3457
-
**Syntax**
3457
+
**Söz dizimi**
3458
3458
3459
3459
```text
3460
3460
[target]:has(selector)
@@ -3551,7 +3551,7 @@ The `:contains()` pseudo-class uses the `textContent` element property for match
3551
3551
3552
3552
Synonyms `:-abp-contains()` and `:has-text()` are supported for better compatibility.
3553
3553
3554
-
**Syntax**
3554
+
**Söz dizimi**
3555
3555
3556
3556
```text
3557
3557
[target]:contains(match)
@@ -3600,7 +3600,7 @@ Only the `div` with `id=match` is selected because the next element does not con
3600
3600
3601
3601
The `:matches-css()` pseudo-class allows to match the element by its current style properties. The work of the pseudo-class is based on using the [`Window.getComputedStyle()`](https://developer.mozilla.org/en-US/docs/Web/API/Window/getComputedStyle) method.
@@ -3667,7 +3667,7 @@ Obsolete pseudo-classes `:matches-css-before()` and `:matches-css-after()` are n
3667
3667
3668
3668
The `:matches-attr()` pseudo-class allows selecting an element by its attributes, especially if they are randomized.
3669
3669
3670
-
**Syntax**
3670
+
**Söz dizimi**
3671
3671
3672
3672
```text
3673
3673
[target]:matches-attr("name"[="value"])
@@ -3723,7 +3723,7 @@ Regexp patterns **do not support** flags.
3723
3723
3724
3724
The `:matches-property()` pseudo-class allows selecting an element by matching its properties.
3725
3725
3726
-
**Syntax**
3726
+
**Söz dizimi**
3727
3727
3728
3728
```text
3729
3729
[target]:matches-property("name"[="value"])
@@ -3798,7 +3798,7 @@ Regexp patterns **do not support** flags.
3798
3798
3799
3799
The `:xpath()` pseudo-class allows selecting an element by evaluating an XPath expression.
3800
3800
3801
-
**Syntax**
3801
+
**Söz dizimi**
3802
3802
3803
3803
```text
3804
3804
[target]:xpath(expression)
@@ -3844,7 +3844,7 @@ subject:nth-ancestor(n)
3844
3844
- `subject` — required, standard or extended CSS selector
3845
3845
- `n` — required, number >= 1 and < 256, distance to the needed ancestor from the element selected by `subject`
3846
3846
3847
-
**Syntax**
3847
+
**Söz dizimi**
3848
3848
3849
3849
```text
3850
3850
subject:nth-ancestor(n)
@@ -3882,7 +3882,7 @@ For such DOM:
3882
3882
3883
3883
The `:upward()` pseudo-class allows to lookup the ancestor relative to the previously selected element.
3884
3884
3885
-
**Syntax**
3885
+
**Söz dizimi**
3886
3886
3887
3887
```text
3888
3888
subject:upward(ancestor)
@@ -3924,7 +3924,7 @@ Sometimes, it is necessary to remove a matching element instead of hiding it or
3924
3924
3925
3925
**Pseudo-class `:remove()` can be placed only at the end of a selector.**
3926
3926
3927
-
**Syntax**
3927
+
**Söz dizimi**
3928
3928
3929
3929
```text
3930
3930
! pseudo-class
@@ -3964,7 +3964,7 @@ Rules with the `remove` pseudo-property must use `#$?#` marker: `$` for CSS-styl
3964
3964
3965
3965
The `:is()` pseudo-class allows to match any element that can be selected by any of selectors passed to it. Invalid selectors are skipped and the pseudo-class deals with valid ones with no error thrown. Our implementation of the [native `:is()` pseudo-class](https://developer.mozilla.org/en-US/docs/Web/CSS/:is).
3966
3966
3967
-
**Syntax**
3967
+
**Söz dizimi**
3968
3968
3969
3969
```text
3970
3970
[target]:is(selectors)
@@ -4010,7 +4010,7 @@ Due to limitations `:is(*:not([class]) > .banner)'` does not work but `:is(*:not
4010
4010
4011
4011
The `:not()` pseudo-class allows to select elements which are *not matched* by selectors passed as argument. Invalid argument selectors are not allowed and error is to be thrown. Our implementation of the [`:not()` pseudo-class](https://developer.mozilla.org/en-US/docs/Web/CSS/:not).
4012
4012
4013
-
**Syntax**
4013
+
**Söz dizimi**
4014
4014
4015
4015
```text
4016
4016
[target]:not(selectors)
@@ -4074,7 +4074,7 @@ The syntax with an optional `value` in the attributes is supported by AdGuard fo
4074
4074
4075
4075
:::
4076
4076
4077
-
### Syntax
4077
+
### Söz dizimi
4078
4078
4079
4079
```text
4080
4080
selector = [tagName] [attributes] [pseudoClasses]
@@ -4236,7 +4236,7 @@ The `min-length` special attribute must not appear in a selector to the left of
@@ -4298,7 +4298,7 @@ AdGuard supports a special type of rules that allows you to inject any JavaScrip
4298
4298
4299
4299
We **strongly recommend** using [scriptlets](#scriptlets) instead of JavaScript rules whenever possible. JS rules are supposed to help with debugging, but as a long-time solution a scriptlet rule should be used.
4300
4300
4301
-
**Syntax**
4301
+
**Söz dizimi**
4302
4302
4303
4303
```text
4304
4304
rule = [domains] "#%#" script
@@ -4474,7 +4474,7 @@ More information about trusted scriptlets can be found [on GitHub](https://githu
4474
4474
4475
4475
Each rule can be modified using the modifiers described in the following paragraphs.
4476
4476
4477
-
**Syntax**
4477
+
**Söz dizimi**
4478
4478
4479
4479
```text
4480
4480
rule = "[$" modifiers "]" [rule text]
@@ -4555,7 +4555,7 @@ Such rules with `$domain` modifier are supported by AdGuard for Windows, AdGuard
4555
4555
4556
4556
`$path` modifier limits the rule application area to specific locations or pages on websites.
4557
4557
4558
-
**Syntax**
4558
+
**Söz dizimi**
4559
4559
4560
4560
```text
4561
4561
$path ["=" pattern]
@@ -4590,7 +4590,7 @@ Rules with `$path` modifier are not supported by AdGuard Content Blocker.
4590
4590
4591
4591
`$url` modifier limits the rule application area to URLs matching the specified mask.
4592
4592
4593
-
**Syntax**
4593
+
**Söz dizimi**
4594
4594
4595
4595
```text
4596
4596
url = pattern
@@ -4642,7 +4642,7 @@ Preprocessor directives can be used in the user rules or in the custom filters.
4642
4642
4643
4643
The `!#include` directive allows to include contents of a specified file into the filter. It supports only files from the same origin to make sure that the filter maintainer is in control of the specified file. The included file can also contain pre-directives (even other `!#include` directives). Ad blockers should consider the case of recursive `!#include` and implement a protection mechanism.
4644
4644
4645
-
**Syntax**
4645
+
**Söz dizimi**
4646
4646
4647
4647
```adblock
4648
4648
!#include file_path
@@ -4688,7 +4688,7 @@ Whitespaces matter. `!#if` is a valid directive, while `!# if` is not.
4688
4688
4689
4689
:::
4690
4690
4691
-
**Syntax**
4691
+
**Söz dizimi**
4692
4692
4693
4693
```adblock
4694
4694
!#if (conditions)
@@ -4791,7 +4791,7 @@ The main disadvantage of using multiple content blockers is that rules from diff
4791
4791
4792
4792
:::
4793
4793
4794
-
**Syntax**
4794
+
**Söz dizimi**
4795
4795
4796
4796
```adblock
4797
4797
!#safari_cb_affinity(content_blockers)
@@ -4833,7 +4833,7 @@ example.org#@#.adBanner
4833
4833
4834
4834
"Hint" is a special comment, instruction to the filters compiler used on the server side (see [FiltersRegistry][]).
0 commit comments