Skip to content

Commit f240004

Browse files
authored
Merge pull request #773 from AdguardTeam/update-translations
Update translations
2 parents 542ddf5 + bb460a0 commit f240004

File tree

1 file changed

+40
-40
lines changed

1 file changed

+40
-40
lines changed

i18n/tr/docusaurus-plugin-content-docs/current/general/ad-filtering/create-own-filters.md

Lines changed: 40 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -419,7 +419,7 @@ This modifier lets you narrow the rule coverage down to a specific application (
419419

420420
For Mac, you can find out the bundle ID or the process name of the app by viewing the respective request details in the Filtering log.
421421

422-
**Syntax**
422+
**Söz dizimi**
423423

424424
The modifier is a list of one or more expressions, each of which is matched against an application in a particular way depending on its type. These expressions are separated by the `|` symbol.
425425

@@ -518,7 +518,7 @@ Rules with `$denyallow` modifier are not supported by AdGuard for iOS, Safari, a
518518

519519
`$domain` limits the rule scope to requests made **from** the specified domains and their subdomains (as indicated by the [Referer](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referer) HTTP header).
520520

521-
**Syntax**
521+
**Söz dizimi**
522522

523523
The modifier is a list of one or more expressions separated by the `|` symbol, each of which is matched against a domain in a particular way depending on its type (see below).
524524

@@ -599,7 +599,7 @@ In AdGuard for Windows, Mac and Android with [CoreLibs][] v1.12 or later the `$d
599599

600600
The `$header` modifier allows matching the HTTP response having a specific header with (optionally) a specific value.
601601

602-
**Syntax**
602+
**Söz dizimi**
603603

604604
```text
605605
$header "=" h_name [":" h_value]
@@ -1111,7 +1111,7 @@ You may use a shorter name (alias) instead of using the full modifier name: `$eh
11111111

11121112
Disables specific userscripts or all userscripts for a given domain.
11131113

1114-
**Syntax**
1114+
**Söz dizimi**
11151115

11161116
```text
11171117
$extension[="userscript_name1"[|"userscript_name2"[|"userscript_name3"[...]]]]
@@ -1182,7 +1182,7 @@ The `$jsinject` modifier is not supported by AdGuard for Chrome MV3 ([yet][jsinj
11821182

11831183
Disables the Tracking protection (formerly Stealth Mode) module for all corresponding pages and requests.
11841184

1185-
**Syntax**
1185+
**Söz dizimi**
11861186

11871187
```text
11881188
$stealth [= opt1 [| opt2 [| opt3 [...]]]]
@@ -1459,7 +1459,7 @@ The `$cookie` modifier completely changes rule behavior. Instead of blocking a r
14591459

14601460
In case if multiple `$cookie` rules match a single request, we will apply each of them one by one.
14611461

1462-
**Syntax**
1462+
**Söz dizimi**
14631463

14641464
```adblock
14651465
$cookie [= name[; maxAge = seconds [; sameSite = strategy ]]]
@@ -1536,7 +1536,7 @@ For the requests matching a `$csp` rule, we will strengthen response security po
15361536

15371537
In case if multiple `$csp` rules match a single request, we will apply each of them.
15381538

1539-
**Syntax**
1539+
**Söz dizimi**
15401540

15411541
`$csp` value syntax is similar to the Content Security Policy header syntax.
15421542

@@ -1574,7 +1574,7 @@ The word "segment" in this document means either a "Media Segment" or a "playlis
15741574

15751575
:::
15761576

1577-
**Syntax**
1577+
**Söz dizimi**
15781578

15791579
- `||example.org^$hls=urlpattern` removes segments whose URL matches the URL pattern `urlpattern`. The pattern works just like the one in basic URL rules, however, the characters `/`, `$` and `,` must be escaped with `\` inside `urlpattern`.
15801580
- `||example.org^$hls=/regexp/options` removes segments where the URL or one of the tags (for certain options, if present) is matched by the regular expression `regexp`. Available `options` are:
@@ -1718,7 +1718,7 @@ The `$inline-font` modifier is designed to block inline fonts embedded into the
17181718

17191719
In AdGuard for Windows, Mac, and Android with [CoreLibs][] v1.11 or later, `$jsonprune` also supports modifying JSONP (padded JSON) documents.
17201720

1721-
**Syntax**
1721+
**Söz dizimi**
17221722

17231723
- `||example.org^$jsonprune=expression` removes items that match the modified JSONPath expression `expression` from the response.
17241724

@@ -1945,7 +1945,7 @@ Rules with the `$jsonprune` modifier are supported by AdGuard for Windows, AdGua
19451945

19461946
`$xmlprune` rules modify the response to a matching request by removing XML items that match an [XPath 1.0](https://www.w3.org/TR/1999/REC-xpath-19991116/) expression. The expression must return a [node-set](https://www.w3.org/TR/1999/REC-xpath-19991116/#node-sets). `$xmlprune` rules do not modify responses which are not well-formed XML documents.
19471947

1948-
**Syntax**
1948+
**Söz dizimi**
19491949

19501950
- `||example.org^$xmlprune=expression` removes items that match the XPath expression `expression` from the response.
19511951

@@ -2223,7 +2223,7 @@ In order to use this type of rules, it is required to have a basic understanding
22232223

22242224
For the requests matching a `$permissions` rule, AdGuard strengthens response's permissions policy by adding an additional permission policy equal to the `$permissions` modifier contents. `$permissions` rules are applied independently from any other rule type. **Only document-level exceptions** can influence it (see the examples section), but no other basic rules.
22252225

2226-
**Syntax**
2226+
**Söz dizimi**
22272227

22282228
`$permissions` value syntax is identical to that of the `Permissions-Policy` header [syntax](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy) with the following exceptions:
22292229

@@ -2282,7 +2282,7 @@ Firefox ignores the `Permissions-Policy` header. For more information, see [this
22822282

22832283
AdGuard is able to redirect web requests to a local "resource".
22842284

2285-
**Syntax**
2285+
**Söz dizimi**
22862286

22872287
AdGuard uses the same filtering rule syntax as uBlock Origin. Also, it is compatible with ABP `$rewrite=abp-resource` modifier.
22882288

@@ -2373,7 +2373,7 @@ Rules with `$removeheader` modifier are intended to remove headers from HTTP req
23732373

23742374
Just like `$csp`, `$redirect`, `$removeparam`, and `$cookie`, this modifier exists independently, rules with it do not depend on the regular basic rules, i.e. regular exception or blocking rules will not affect it. By default, it only affects response headers. However, you can also change it to remove headers from HTTP requests as well.
23752375

2376-
**Syntax**
2376+
**Söz dizimi**
23772377

23782378
**Basic syntax**
23792379

@@ -2553,7 +2553,7 @@ Rules with `$removeheader` modifier are supported by AdGuard for Windows, AdGuar
25532553
25542554
Rules with `$removeparam` modifier are intended to strip query parameters from requests' URLs. Please note that such rules are only applied to `GET`, `HEAD`, `OPTIONS`, and sometimes `POST` requests.
25552555
2556-
**Syntax**
2556+
**Söz dizimi**
25572557
25582558
**Basic syntax**
25592559
@@ -2762,7 +2762,7 @@ You will need some knowledge of regular expressions to use `$replace` modifier.
27622762

27632763
In case if multiple `$replace` rules match a single request, we will apply each of them. **The order is defined alphabetically.**
27642764

2765-
**Syntax**
2765+
**Söz dizimi**
27662766

27672767
In general, `$replace` syntax is similar to replacement with regular expressions [in Perl](http://perldoc.perl.org/perlrequick.html#Search-and-replace).
27682768

@@ -2833,7 +2833,7 @@ The `$urltransform` value can be empty for exception rules.
28332833
28342834
If multiple `$urltransform` rules match a single request, we will apply each of them. **The order is defined alphabetically.**
28352835
2836-
**Syntax**
2836+
**Söz dizimi**
28372837
28382838
`$urltransform` syntax is similar to replacement with regular expressions [in Perl](http://perldoc.perl.org/perlrequick.html#Search-and-replace).
28392839
@@ -3221,7 +3221,7 @@ Element hiding rules are used to hide the elements of web pages. It is similar t
32213221
32223222
Element hiding rules may operate differently [depending on the platform](#cosmetic-rules-priority).
32233223
3224-
#### Syntax
3224+
#### Söz dizimi
32253225
32263226
```text
32273227
rule = [domains] "##" selector
@@ -3289,7 +3289,7 @@ We recommend to use this kind of exceptions only if it is not possible to change
32893289
32903290
Sometimes, simple hiding of an element is not enough to deal with advertising. For example, blocking an advertising element can just break the page layout. In this case AdGuard can use rules that are much more flexible than hiding rules. With these rules you can basically add any CSS styles to the page.
32913291
3292-
**Syntax**
3292+
**Söz dizimi**
32933293
32943294
```text
32953295
rule = [domains] "#$#" selector "{" style "}"
@@ -3390,7 +3390,7 @@ Rules with extended CSS selectors are not supported by AdGuard Content Blocker.
33903390
33913391
:::
33923392
3393-
**Syntax**
3393+
**Söz dizimi**
33943394
33953395
Regardless of the CSS pseudo-classes you are using in the rule, you can use special markers to force applying these rules by ExtendedCss. It is recommended to use these markers for all extended CSS cosmetic rules so that it was easier to find them.
33963396
@@ -3454,7 +3454,7 @@ Synonyms `:-abp-has()` is supported by ExtendedCss for better compatibility.
34543454
34553455
:::
34563456
3457-
**Syntax**
3457+
**Söz dizimi**
34583458
34593459
```text
34603460
[target]:has(selector)
@@ -3551,7 +3551,7 @@ The `:contains()` pseudo-class uses the `textContent` element property for match
35513551
35523552
Synonyms `:-abp-contains()` and `:has-text()` are supported for better compatibility.
35533553
3554-
**Syntax**
3554+
**Söz dizimi**
35553555
35563556
```text
35573557
[target]:contains(match)
@@ -3600,7 +3600,7 @@ Only the `div` with `id=match` is selected because the next element does not con
36003600
36013601
The `:matches-css()` pseudo-class allows to match the element by its current style properties. The work of the pseudo-class is based on using the [`Window.getComputedStyle()`](https://developer.mozilla.org/en-US/docs/Web/API/Window/getComputedStyle) method.
36023602
3603-
**Syntax**
3603+
**Söz dizimi**
36043604
36053605
```text
36063606
[target]:matches-css([pseudo-element, ] property: pattern)
@@ -3667,7 +3667,7 @@ Obsolete pseudo-classes `:matches-css-before()` and `:matches-css-after()` are n
36673667
36683668
The `:matches-attr()` pseudo-class allows selecting an element by its attributes, especially if they are randomized.
36693669
3670-
**Syntax**
3670+
**Söz dizimi**
36713671
36723672
```text
36733673
[target]:matches-attr("name"[="value"])
@@ -3723,7 +3723,7 @@ Regexp patterns **do not support** flags.
37233723
37243724
The `:matches-property()` pseudo-class allows selecting an element by matching its properties.
37253725
3726-
**Syntax**
3726+
**Söz dizimi**
37273727
37283728
```text
37293729
[target]:matches-property("name"[="value"])
@@ -3798,7 +3798,7 @@ Regexp patterns **do not support** flags.
37983798
37993799
The `:xpath()` pseudo-class allows selecting an element by evaluating an XPath expression.
38003800
3801-
**Syntax**
3801+
**Söz dizimi**
38023802
38033803
```text
38043804
[target]:xpath(expression)
@@ -3844,7 +3844,7 @@ subject:nth-ancestor(n)
38443844
- `subject` — required, standard or extended CSS selector
38453845
- `n` — required, number >= 1 and < 256, distance to the needed ancestor from the element selected by `subject`
38463846
3847-
**Syntax**
3847+
**Söz dizimi**
38483848
38493849
```text
38503850
subject:nth-ancestor(n)
@@ -3882,7 +3882,7 @@ For such DOM:
38823882
38833883
The `:upward()` pseudo-class allows to lookup the ancestor relative to the previously selected element.
38843884
3885-
**Syntax**
3885+
**Söz dizimi**
38863886
38873887
```text
38883888
subject:upward(ancestor)
@@ -3924,7 +3924,7 @@ Sometimes, it is necessary to remove a matching element instead of hiding it or
39243924
39253925
**Pseudo-class `:remove()` can be placed only at the end of a selector.**
39263926
3927-
**Syntax**
3927+
**Söz dizimi**
39283928
39293929
```text
39303930
! pseudo-class
@@ -3964,7 +3964,7 @@ Rules with the `remove` pseudo-property must use `#$?#` marker: `$` for CSS-styl
39643964
39653965
The `:is()` pseudo-class allows to match any element that can be selected by any of selectors passed to it. Invalid selectors are skipped and the pseudo-class deals with valid ones with no error thrown. Our implementation of the [native `:is()` pseudo-class](https://developer.mozilla.org/en-US/docs/Web/CSS/:is).
39663966
3967-
**Syntax**
3967+
**Söz dizimi**
39683968
39693969
```text
39703970
[target]:is(selectors)
@@ -4010,7 +4010,7 @@ Due to limitations `:is(*:not([class]) > .banner)'` does not work but `:is(*:not
40104010
40114011
The `:not()` pseudo-class allows to select elements which are *not matched* by selectors passed as argument. Invalid argument selectors are not allowed and error is to be thrown. Our implementation of the [`:not()` pseudo-class](https://developer.mozilla.org/en-US/docs/Web/CSS/:not).
40124012
4013-
**Syntax**
4013+
**Söz dizimi**
40144014
40154015
```text
40164016
[target]:not(selectors)
@@ -4074,7 +4074,7 @@ The syntax with an optional `value` in the attributes is supported by AdGuard fo
40744074
40754075
:::
40764076
4077-
### Syntax
4077+
### Söz dizimi
40784078
40794079
```text
40804080
selector = [tagName] [attributes] [pseudoClasses]
@@ -4236,7 +4236,7 @@ The `min-length` special attribute must not appear in a selector to the left of
42364236
42374237
#### `:contains()` {#html-filtering-rules--contains}
42384238
4239-
##### Syntax
4239+
##### Söz dizimi
42404240
42414241
```text
42424242
:contains(unquoted text)
@@ -4298,7 +4298,7 @@ AdGuard supports a special type of rules that allows you to inject any JavaScrip
42984298
42994299
We **strongly recommend** using [scriptlets](#scriptlets) instead of JavaScript rules whenever possible. JS rules are supposed to help with debugging, but as a long-time solution a scriptlet rule should be used.
43004300
4301-
**Syntax**
4301+
**Söz dizimi**
43024302
43034303
```text
43044304
rule = [domains] "#%#" script
@@ -4474,7 +4474,7 @@ More information about trusted scriptlets can be found [on GitHub](https://githu
44744474
44754475
Each rule can be modified using the modifiers described in the following paragraphs.
44764476
4477-
**Syntax**
4477+
**Söz dizimi**
44784478
44794479
```text
44804480
rule = "[$" modifiers "]" [rule text]
@@ -4555,7 +4555,7 @@ Such rules with `$domain` modifier are supported by AdGuard for Windows, AdGuard
45554555
45564556
`$path` modifier limits the rule application area to specific locations or pages on websites.
45574557
4558-
**Syntax**
4558+
**Söz dizimi**
45594559
45604560
```text
45614561
$path ["=" pattern]
@@ -4590,7 +4590,7 @@ Rules with `$path` modifier are not supported by AdGuard Content Blocker.
45904590
45914591
`$url` modifier limits the rule application area to URLs matching the specified mask.
45924592
4593-
**Syntax**
4593+
**Söz dizimi**
45944594
45954595
```text
45964596
url = pattern
@@ -4642,7 +4642,7 @@ Preprocessor directives can be used in the user rules or in the custom filters.
46424642
46434643
The `!#include` directive allows to include contents of a specified file into the filter. It supports only files from the same origin to make sure that the filter maintainer is in control of the specified file. The included file can also contain pre-directives (even other `!#include` directives). Ad blockers should consider the case of recursive `!#include` and implement a protection mechanism.
46444644
4645-
**Syntax**
4645+
**Söz dizimi**
46464646
46474647
```adblock
46484648
!#include file_path
@@ -4688,7 +4688,7 @@ Whitespaces matter. `!#if` is a valid directive, while `!# if` is not.
46884688
46894689
:::
46904690
4691-
**Syntax**
4691+
**Söz dizimi**
46924692
46934693
```adblock
46944694
!#if (conditions)
@@ -4791,7 +4791,7 @@ The main disadvantage of using multiple content blockers is that rules from diff
47914791
47924792
:::
47934793
4794-
**Syntax**
4794+
**Söz dizimi**
47954795
47964796
```adblock
47974797
!#safari_cb_affinity(content_blockers)
@@ -4833,7 +4833,7 @@ example.org#@#.adBanner
48334833
48344834
"Hint" is a special comment, instruction to the filters compiler used on the server side (see [FiltersRegistry][]).
48354835
4836-
**Syntax**
4836+
**Söz dizimi**
48374837
48384838
```adblock
48394839
!+ HINT_NAME1(PARAMS) HINT_NAME2(PARAMS)

0 commit comments

Comments
 (0)