@adguard/agtree 1.1.7 → 1.1.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -0
- package/dist/agtree.cjs +167 -3
- package/dist/agtree.d.ts +2 -2
- package/dist/agtree.esm.js +167 -3
- package/dist/agtree.iife.min.js +12 -6
- package/dist/agtree.umd.min.js +12 -6
- package/dist/build.txt +1 -1
- package/package.json +113 -108
- package/CHANGELOG.md +0 -106
package/dist/agtree.esm.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
/*
|
|
2
|
-
* AGTree v1.1.
|
|
3
|
-
* (c)
|
|
2
|
+
* AGTree v1.1.8 (build date: Wed, 24 Apr 2024 15:20:41 GMT)
|
|
3
|
+
* (c) 2024 Adguard Software Ltd.
|
|
4
4
|
* Released under the MIT license
|
|
5
5
|
* https://github.com/AdguardTeam/tsurlfilter/tree/master/packages/agtree#readme
|
|
6
6
|
*/
|
|
@@ -6287,6 +6287,11 @@ var data$U = { adg_os_any:{ name:"all",
|
|
|
6287
6287
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#all",
|
|
6288
6288
|
negatable:false,
|
|
6289
6289
|
block_only:false } };
|
|
6290
|
+
data$U.adg_os_any;
|
|
6291
|
+
data$U.adg_ext_any;
|
|
6292
|
+
data$U.adg_cb_ios;
|
|
6293
|
+
data$U.adg_cb_safari;
|
|
6294
|
+
data$U.ubo_ext_any;
|
|
6290
6295
|
|
|
6291
6296
|
var data$T = { adg_os_any:{ name:"app",
|
|
6292
6297
|
description:"The `$app` modifier lets you narrow the rule coverage down to a specific application or a list of applications.\nThe modifier's behavior and syntax perfectly match the corresponding basic rules `$app` modifier.",
|
|
@@ -6294,6 +6299,7 @@ var data$T = { adg_os_any:{ name:"app",
|
|
|
6294
6299
|
assignable:true,
|
|
6295
6300
|
negatable:false,
|
|
6296
6301
|
value_format:"pipe_separated_apps" } };
|
|
6302
|
+
data$T.adg_os_any;
|
|
6297
6303
|
|
|
6298
6304
|
var data$S = { adg_os_any:{ name:"badfilter",
|
|
6299
6305
|
description:"The rules with the `$badfilter` modifier disable other basic rules to which they refer. It means that\nthe text of the disabled rule should match the text of the `$badfilter` rule (without the `$badfilter` modifier).",
|
|
@@ -6315,18 +6321,25 @@ var data$S = { adg_os_any:{ name:"badfilter",
|
|
|
6315
6321
|
description:"The rules with the `$badfilter` modifier disable other basic rules to which they refer. It means that\nthe text of the disabled rule should match the text of the `$badfilter` rule (without the `$badfilter` modifier).",
|
|
6316
6322
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#badfilter",
|
|
6317
6323
|
negatable:false } };
|
|
6324
|
+
data$S.adg_os_any;
|
|
6325
|
+
data$S.adg_ext_any;
|
|
6326
|
+
data$S.adg_cb_ios;
|
|
6327
|
+
data$S.adg_cb_safari;
|
|
6328
|
+
data$S.ubo_ext_any;
|
|
6318
6329
|
|
|
6319
6330
|
var data$R = { ubo_ext_any:{ name:"cname",
|
|
6320
6331
|
description:"When used in an exception filter,\nit will bypass blocking CNAME uncloaked requests for the current (specified) document.",
|
|
6321
6332
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#cname",
|
|
6322
6333
|
negatable:false,
|
|
6323
6334
|
exception_only:true } };
|
|
6335
|
+
data$R.ubo_ext_any;
|
|
6324
6336
|
|
|
6325
6337
|
var data$Q = { adg_os_any:{ name:"content",
|
|
6326
6338
|
description:"Disables HTML filtering and `$replace` rules on the pages that match the rule.",
|
|
6327
6339
|
docs:"https://adguard.app/kb/general/ad-filtering/create-own-filters/#content-modifier",
|
|
6328
6340
|
negatable:false,
|
|
6329
6341
|
exception_only:true } };
|
|
6342
|
+
data$Q.adg_os_any;
|
|
6330
6343
|
|
|
6331
6344
|
var data$P = { adg_os_any:{ name:"cookie",
|
|
6332
6345
|
description:"The `$cookie` modifier completely changes rule behavior.\nInstead of blocking a request, this modifier makes us suppress or modify the Cookie and Set-Cookie headers.",
|
|
@@ -6342,6 +6355,8 @@ var data$P = { adg_os_any:{ name:"cookie",
|
|
|
6342
6355
|
negatable:false,
|
|
6343
6356
|
value_optional:true,
|
|
6344
6357
|
value_format:"^([^;=\\s]*?)((?:;(maxAge=\\d+;?)?|(sameSite=(lax|none|strict);?)?){1,3})(?<!;)$" } };
|
|
6358
|
+
data$P.adg_os_any;
|
|
6359
|
+
data$P.adg_ext_any;
|
|
6345
6360
|
|
|
6346
6361
|
var data$O = { adg_os_any:{ name:"csp",
|
|
6347
6362
|
description:"This modifier completely changes the rule behavior.\nIf it is applied to a rule, it will not block the matching request.\nThe response headers are going to be modified instead.",
|
|
@@ -6389,6 +6404,10 @@ var data$O = { adg_os_any:{ name:"csp",
|
|
|
6389
6404
|
negatable:false,
|
|
6390
6405
|
value_optional:true,
|
|
6391
6406
|
value_format:"csp_value" } };
|
|
6407
|
+
data$O.adg_os_any;
|
|
6408
|
+
data$O.adg_ext_any;
|
|
6409
|
+
data$O.abp_ext_any;
|
|
6410
|
+
data$O.ubo_ext_any;
|
|
6392
6411
|
|
|
6393
6412
|
var data$N = { adg_os_any:{ name:"denyallow",
|
|
6394
6413
|
description:"The `$denyallow` modifier allows to avoid creating additional rules\nwhen it is needed to disable a certain rule for specific domains.\n`$denyallow` matches only target domains and not referrer domains.",
|
|
@@ -6425,6 +6444,11 @@ var data$N = { adg_os_any:{ name:"denyallow",
|
|
|
6425
6444
|
assignable:true,
|
|
6426
6445
|
negatable:false,
|
|
6427
6446
|
value_format:"pipe_separated_denyallow_domains" } };
|
|
6447
|
+
data$N.adg_os_any;
|
|
6448
|
+
data$N.adg_ext_any;
|
|
6449
|
+
data$N.adg_cb_ios;
|
|
6450
|
+
data$N.adg_cb_safari;
|
|
6451
|
+
data$N.ubo_ext_any;
|
|
6428
6452
|
|
|
6429
6453
|
var data$M = { adg_os_any:{ name:"document",
|
|
6430
6454
|
description:"The rule corresponds to the main frame document requests,\ni.e. HTML documents that are loaded in the browser tab.",
|
|
@@ -6451,6 +6475,12 @@ var data$M = { adg_os_any:{ name:"document",
|
|
|
6451
6475
|
description:"The rule corresponds to the main frame document requests,\ni.e. HTML documents that are loaded in the browser tab.",
|
|
6452
6476
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#document",
|
|
6453
6477
|
negatable:false } };
|
|
6478
|
+
data$M.adg_os_any;
|
|
6479
|
+
data$M.adg_ext_any;
|
|
6480
|
+
data$M.adg_cb_ios;
|
|
6481
|
+
data$M.adg_cb_safari;
|
|
6482
|
+
data$M.abp_ext_any;
|
|
6483
|
+
data$M.ubo_ext_any;
|
|
6454
6484
|
|
|
6455
6485
|
var data$L = { adg_any:{ name:"domain",
|
|
6456
6486
|
aliases:[ "from" ],
|
|
@@ -6472,6 +6502,9 @@ var data$L = { adg_any:{ name:"domain",
|
|
|
6472
6502
|
assignable:true,
|
|
6473
6503
|
negatable:false,
|
|
6474
6504
|
value_format:"pipe_separated_domains" } };
|
|
6505
|
+
data$L.adg_any;
|
|
6506
|
+
data$L.abp_any;
|
|
6507
|
+
data$L.ubo_any;
|
|
6475
6508
|
|
|
6476
6509
|
var data$K = { adg_any:{ name:"elemhide",
|
|
6477
6510
|
aliases:[ "ehide" ],
|
|
@@ -6491,6 +6524,9 @@ var data$K = { adg_any:{ name:"elemhide",
|
|
|
6491
6524
|
exception_only:true,
|
|
6492
6525
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#elemhide-1",
|
|
6493
6526
|
description:"Disables any cosmetic rules on the pages matching the rule." } };
|
|
6527
|
+
data$K.adg_any;
|
|
6528
|
+
data$K.abp_any;
|
|
6529
|
+
data$K.ubo_any;
|
|
6494
6530
|
|
|
6495
6531
|
var data$J = { adg_os_any:{ name:"empty",
|
|
6496
6532
|
description:"This modifier is deprecated in favor of the $redirect modifier.\nRules with `$empty` are still supported and being converted into `$redirect=nooptext` now\nbut the support shall be removed in the future.",
|
|
@@ -6508,6 +6544,9 @@ var data$J = { adg_os_any:{ name:"empty",
|
|
|
6508
6544
|
description:"This modifier is deprecated in favor of the $redirect modifier.\nRules with `$empty` are supported and being converted into `$redirect=nooptext`.",
|
|
6509
6545
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#empty",
|
|
6510
6546
|
negatable:false } };
|
|
6547
|
+
data$J.adg_os_any;
|
|
6548
|
+
data$J.adg_ext_any;
|
|
6549
|
+
data$J.ubo_ext_any;
|
|
6511
6550
|
|
|
6512
6551
|
var data$I = { adg_any:{ name:"first-party",
|
|
6513
6552
|
aliases:[ "1p",
|
|
@@ -6521,6 +6560,8 @@ var data$I = { adg_any:{ name:"first-party",
|
|
|
6521
6560
|
description:"A restriction of first-party requests. Equal to `~third-party`.",
|
|
6522
6561
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#1p",
|
|
6523
6562
|
negatable:false } };
|
|
6563
|
+
data$I.adg_any;
|
|
6564
|
+
data$I.ubo_any;
|
|
6524
6565
|
|
|
6525
6566
|
var data$H = { adg_os_any:{ name:"extension",
|
|
6526
6567
|
description:"Disables all userscripts on the pages matching this rule.",
|
|
@@ -6537,6 +6578,7 @@ var data$H = { adg_os_any:{ name:"extension",
|
|
|
6537
6578
|
"badfilter" ],
|
|
6538
6579
|
inverse_conflicts:true,
|
|
6539
6580
|
exception_only:true } };
|
|
6581
|
+
data$H.adg_os_any;
|
|
6540
6582
|
|
|
6541
6583
|
var data$G = { adg_any:{ name:"font",
|
|
6542
6584
|
docs:"https://adguard.app/kb/general/ad-filtering/create-own-filters/#font-modifier",
|
|
@@ -6547,6 +6589,9 @@ var data$G = { adg_any:{ name:"font",
|
|
|
6547
6589
|
ubo_any:{ name:"font",
|
|
6548
6590
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293#options",
|
|
6549
6591
|
description:"The rule corresponds to requests for fonts, e.g. `.woff` filename extension." } };
|
|
6592
|
+
data$G.adg_any;
|
|
6593
|
+
data$G.abp_any;
|
|
6594
|
+
data$G.ubo_any;
|
|
6550
6595
|
|
|
6551
6596
|
var data$F = { adg_os_any:{ name:"genericblock",
|
|
6552
6597
|
description:"Disables generic basic rules on pages that correspond to exception rule.",
|
|
@@ -6603,6 +6648,11 @@ var data$F = { adg_os_any:{ name:"genericblock",
|
|
|
6603
6648
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293-How-to-write-filters#type-options",
|
|
6604
6649
|
negatable:false,
|
|
6605
6650
|
exception_only:true } };
|
|
6651
|
+
data$F.adg_os_any;
|
|
6652
|
+
data$F.adg_ext_any;
|
|
6653
|
+
data$F.adg_cb_ios;
|
|
6654
|
+
data$F.adg_cb_safari;
|
|
6655
|
+
data$F.abp_ext_any;
|
|
6606
6656
|
|
|
6607
6657
|
var data$E = { adg_any:{ name:"generichide",
|
|
6608
6658
|
aliases:[ "ghide" ],
|
|
@@ -6635,6 +6685,9 @@ var data$E = { adg_any:{ name:"generichide",
|
|
|
6635
6685
|
inverse_conflicts:true,
|
|
6636
6686
|
negatable:false,
|
|
6637
6687
|
exception_only:true } };
|
|
6688
|
+
data$E.adg_any;
|
|
6689
|
+
data$E.ubo_any;
|
|
6690
|
+
data$E.abp_any;
|
|
6638
6691
|
|
|
6639
6692
|
var data$D = { adg_os_any:{ name:"header",
|
|
6640
6693
|
description:"The `$header` modifier allows matching the HTTP response\nhaving a specific header with (optionally) a specific value.",
|
|
@@ -6651,6 +6704,9 @@ var data$D = { adg_os_any:{ name:"header",
|
|
|
6651
6704
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#header",
|
|
6652
6705
|
assignable:true,
|
|
6653
6706
|
value_format:"(?xi)\n ^\n # header name\n [\\w-]+\n (\n :\n # header value: string or regexp\n (\\w+|\\/.+\\/)\n )?" } };
|
|
6707
|
+
data$D.adg_os_any;
|
|
6708
|
+
data$D.adg_ext_any;
|
|
6709
|
+
data$D.ubo_ext_any;
|
|
6654
6710
|
|
|
6655
6711
|
var data$C = { adg_os_any:{ name:"hls",
|
|
6656
6712
|
description:"The `$hls` rules modify the response of a matching request.\nThey are intended as a convenient way to remove segments from HLS playlists (RFC 8216).",
|
|
@@ -6667,6 +6723,7 @@ var data$C = { adg_os_any:{ name:"hls",
|
|
|
6667
6723
|
negatable:false,
|
|
6668
6724
|
value_optional:true,
|
|
6669
6725
|
value_format:"(?xi)\n (\n # string pattern\n \\w+\n # or regexp pattern\n |\n # TODO: improve regexp pattern to invalidate unescaped `/`, `$`, and `,`\n \\/.+\\/\n # options\n ([ti]*)?\n )" } };
|
|
6726
|
+
data$C.adg_os_any;
|
|
6670
6727
|
|
|
6671
6728
|
var data$B = { adg_any:{ name:"image",
|
|
6672
6729
|
description:"The rule corresponds to images requests.",
|
|
@@ -6677,6 +6734,9 @@ var data$B = { adg_any:{ name:"image",
|
|
|
6677
6734
|
ubo_any:{ name:"image",
|
|
6678
6735
|
description:"The rule corresponds to images requests.",
|
|
6679
6736
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293#options" } };
|
|
6737
|
+
data$B.adg_any;
|
|
6738
|
+
data$B.abp_any;
|
|
6739
|
+
data$B.ubo_any;
|
|
6680
6740
|
|
|
6681
6741
|
var data$A = { adg_any:{ name:"important",
|
|
6682
6742
|
description:"The `$important` modifier applied to a rule increases its priority\nover any other rule without `$important` modifier. Even over basic exception rules.",
|
|
@@ -6686,6 +6746,8 @@ var data$A = { adg_any:{ name:"important",
|
|
|
6686
6746
|
description:"The `$important` modifier applied to a rule increases its priority\nover any other rule without `$important` modifier. Even over basic exception rules.",
|
|
6687
6747
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#important",
|
|
6688
6748
|
negatable:false } };
|
|
6749
|
+
data$A.adg_any;
|
|
6750
|
+
data$A.ubo_any;
|
|
6689
6751
|
|
|
6690
6752
|
var data$z = { adg_os_any:{ name:"inline-font",
|
|
6691
6753
|
description:"The `$inline-font` modifier is a sort of a shortcut for $csp modifier with specific value.\nE.g. `||example.org^$inline-font` is converting into:\n```adblock\n||example.org^$csp=font-src 'self' 'unsafe-eval' http: https: data: blob: mediastream: filesystem:\n```",
|
|
@@ -6696,6 +6758,9 @@ var data$z = { adg_os_any:{ name:"inline-font",
|
|
|
6696
6758
|
ubo_ext_any:{ name:"inline-font",
|
|
6697
6759
|
description:"The `$inline-font` modifier is a sort of a shortcut for $csp modifier with specific value.\nE.g. `||example.org^$inline-font` is converting into:\n```adblock\n||example.org^$csp=font-src 'self' 'unsafe-eval' http: https: data: blob: mediastream: filesystem:\n```",
|
|
6698
6760
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#inline-font" } };
|
|
6761
|
+
data$z.adg_os_any;
|
|
6762
|
+
data$z.adg_ext_any;
|
|
6763
|
+
data$z.ubo_ext_any;
|
|
6699
6764
|
|
|
6700
6765
|
var data$y = { adg_os_any:{ name:"inline-script",
|
|
6701
6766
|
description:"The `$inline-script` modifier is a sort of a shortcut for $csp modifier with specific value.\nE.g. `||example.org^$inline-script` is converting into:\n```adblock\n||example.org^$csp=script-src 'self' 'unsafe-eval' http: https: data: blob: mediastream: filesystem:\n```",
|
|
@@ -6706,6 +6771,9 @@ var data$y = { adg_os_any:{ name:"inline-script",
|
|
|
6706
6771
|
ubo_ext_any:{ name:"inline-script",
|
|
6707
6772
|
description:"The `$inline-script` modifier is a sort of a shortcut for $csp modifier with specific value.\nE.g. `||example.org^$inline-script` is converting into:\n```adblock\n||example.org^$csp=script-src 'self' 'unsafe-eval' http: https: data: blob: mediastream: filesystem:\n```",
|
|
6708
6773
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#inline-script" } };
|
|
6774
|
+
data$y.adg_os_any;
|
|
6775
|
+
data$y.adg_ext_any;
|
|
6776
|
+
data$y.ubo_ext_any;
|
|
6709
6777
|
|
|
6710
6778
|
var data$x = { adg_os_any:{ name:"jsinject",
|
|
6711
6779
|
description:"Forbids adding of javascript code to the page.",
|
|
@@ -6765,6 +6833,10 @@ var data$x = { adg_os_any:{ name:"jsinject",
|
|
|
6765
6833
|
inverse_conflicts:true,
|
|
6766
6834
|
negatable:false,
|
|
6767
6835
|
exception_only:true } };
|
|
6836
|
+
data$x.adg_os_any;
|
|
6837
|
+
data$x.adg_ext_any;
|
|
6838
|
+
data$x.adg_cb_ios;
|
|
6839
|
+
data$x.adg_cb_safari;
|
|
6768
6840
|
|
|
6769
6841
|
var data$w = { adg_os_any:{ name:"jsonprune",
|
|
6770
6842
|
description:"The `$jsonprune` rules modify the response to a matching request\nby removing JSON items that match a modified JSONPath expression.\nThey do not modify responses which are not valid JSON documents.",
|
|
@@ -6773,6 +6845,7 @@ var data$w = { adg_os_any:{ name:"jsonprune",
|
|
|
6773
6845
|
negatable:false,
|
|
6774
6846
|
value_optional:true,
|
|
6775
6847
|
value_format:"(?xi)\n ^\n # the expression always starts with a dollar sign (for root)\n # which should be escaped\n \\\\\n \\$\n \\.?\n # TODO: improve the expression to invalidate unescaped `$` and `,`\n .+\n $" } };
|
|
6848
|
+
data$w.adg_os_any;
|
|
6776
6849
|
|
|
6777
6850
|
var data$v = { adg_any:{ name:"match-case",
|
|
6778
6851
|
description:"This modifier defines a rule which applies only to addresses that match the case.\nDefault rules are case-insensitive.",
|
|
@@ -6783,6 +6856,9 @@ var data$v = { adg_any:{ name:"match-case",
|
|
|
6783
6856
|
ubo_any:{ name:"match-case",
|
|
6784
6857
|
description:"This modifier defines a rule which applies only to addresses that match the case.\nDefault rules are case-insensitive.",
|
|
6785
6858
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#match-case" } };
|
|
6859
|
+
data$v.adg_any;
|
|
6860
|
+
data$v.abp_any;
|
|
6861
|
+
data$v.ubo_any;
|
|
6786
6862
|
|
|
6787
6863
|
var data$u = { adg_any:{ name:"media",
|
|
6788
6864
|
description:"A restriction of third-party and own requests.\nA third-party request is a request from a different domain.\nFor example, a request to `example.org` from `domain.com` is a third-party request.",
|
|
@@ -6793,6 +6869,9 @@ var data$u = { adg_any:{ name:"media",
|
|
|
6793
6869
|
ubo_any:{ name:"media",
|
|
6794
6870
|
description:"A restriction of third-party and own requests.\nA third-party request is a request from a different domain.\nFor example, a request to `example.org` from `domain.com` is a third-party request.",
|
|
6795
6871
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293#options" } };
|
|
6872
|
+
data$u.adg_any;
|
|
6873
|
+
data$u.abp_any;
|
|
6874
|
+
data$u.ubo_any;
|
|
6796
6875
|
|
|
6797
6876
|
var data$t = { adg_os_any:{ name:"method",
|
|
6798
6877
|
description:"This modifier limits the rule scope to requests that use the specified set of HTTP methods.\nNegated methods are allowed.",
|
|
@@ -6812,6 +6891,9 @@ var data$t = { adg_os_any:{ name:"method",
|
|
|
6812
6891
|
negatable:false,
|
|
6813
6892
|
assignable:true,
|
|
6814
6893
|
value_format:"pipe_separated_methods" } };
|
|
6894
|
+
data$t.adg_os_any;
|
|
6895
|
+
data$t.adg_ext_any;
|
|
6896
|
+
data$t.ubo_ext_any;
|
|
6815
6897
|
|
|
6816
6898
|
var data$s = { adg_os_any:{ name:"mp4",
|
|
6817
6899
|
description:"As a response to blocked request AdGuard returns a short video placeholder.\nRules with `$mp4` are still supported and being converted into `$redirect=noopmp4-1s` now\nbut the support shall be removed in the future.",
|
|
@@ -6829,6 +6911,9 @@ var data$s = { adg_os_any:{ name:"mp4",
|
|
|
6829
6911
|
description:"As a response to blocked request a short video placeholder is returned.\nRules with `$mp4` are supported and being converted into `$redirect=noopmp4-1s`.",
|
|
6830
6912
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#mp4",
|
|
6831
6913
|
negatable:false } };
|
|
6914
|
+
data$s.adg_os_any;
|
|
6915
|
+
data$s.adg_ext_any;
|
|
6916
|
+
data$s.ubo_ext_any;
|
|
6832
6917
|
|
|
6833
6918
|
var data$r = { adg_os_any:{ name:"network",
|
|
6834
6919
|
description:"This is basically a Firewall-kind of rules allowing to fully block\nor unblock access to a specified remote address.",
|
|
@@ -6837,6 +6922,7 @@ var data$r = { adg_os_any:{ name:"network",
|
|
|
6837
6922
|
"important" ],
|
|
6838
6923
|
inverse_conflicts:true,
|
|
6839
6924
|
negatable:false } };
|
|
6925
|
+
data$r.adg_os_any;
|
|
6840
6926
|
|
|
6841
6927
|
var data$q = { adg_os_any:{ name:"_",
|
|
6842
6928
|
docs:"https://adguard.app/kb/general/ad-filtering/create-own-filters/#noop-modifier",
|
|
@@ -6858,12 +6944,18 @@ var data$q = { adg_os_any:{ name:"_",
|
|
|
6858
6944
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#_-aka-noop",
|
|
6859
6945
|
description:"The noop modifier does nothing and can be used solely to increase rules' readability.\nIt consists of a sequence of underscore characters (_) of any length\nand can appear in a rule as many times as needed.",
|
|
6860
6946
|
negatable:false } };
|
|
6947
|
+
data$q.adg_os_any;
|
|
6948
|
+
data$q.adg_ext_any;
|
|
6949
|
+
data$q.adg_cb_ios;
|
|
6950
|
+
data$q.adg_cb_safari;
|
|
6951
|
+
data$q.ubo_ext_any;
|
|
6861
6952
|
|
|
6862
6953
|
var data$p = { adg_any:{ name:"object-subrequest",
|
|
6863
6954
|
description:"The `$object-subrequest` modifier is removed and is no longer supported.\nRules with it are considered as invalid.\nThe rule corresponds to requests by browser plugins (it is usually Flash).",
|
|
6864
6955
|
docs:"https://adguard.app/kb/general/ad-filtering/create-own-filters/#object-subrequest-modifier",
|
|
6865
6956
|
removed:true,
|
|
6866
6957
|
removal_message:"The `$object-subrequest` modifier is removed and is no longer supported.\nRules with it are considered as invalid." } };
|
|
6958
|
+
data$p.adg_any;
|
|
6867
6959
|
|
|
6868
6960
|
var data$o = { adg_any:{ name:"object",
|
|
6869
6961
|
description:"The rule corresponds to browser plugins resources, e.g. Java or Flash",
|
|
@@ -6874,6 +6966,9 @@ var data$o = { adg_any:{ name:"object",
|
|
|
6874
6966
|
ubo_any:{ name:"object",
|
|
6875
6967
|
description:"The rule corresponds to browser plugins resources, e.g. Java or Flash.",
|
|
6876
6968
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293-How-to-write-filters#type-options" } };
|
|
6969
|
+
data$o.adg_any;
|
|
6970
|
+
data$o.abp_any;
|
|
6971
|
+
data$o.ubo_any;
|
|
6877
6972
|
|
|
6878
6973
|
var data$n = { adg_any:{ name:"other",
|
|
6879
6974
|
description:"The rule applies to requests for which the type has not been determined\nor does not match the types listed above.",
|
|
@@ -6884,6 +6979,9 @@ var data$n = { adg_any:{ name:"other",
|
|
|
6884
6979
|
ubo_any:{ name:"other",
|
|
6885
6980
|
description:"The rule applies to requests for which the type has not been determined\nor does not match the types listed above.",
|
|
6886
6981
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293-How-to-write-filters#type-options" } };
|
|
6982
|
+
data$n.adg_any;
|
|
6983
|
+
data$n.abp_any;
|
|
6984
|
+
data$n.ubo_any;
|
|
6887
6985
|
|
|
6888
6986
|
var data$m = { adg_os_any:{ name:"permissions",
|
|
6889
6987
|
description:"For the requests matching a `$permissions` rule, ad blocker strengthens response's feature policy\nby adding additional feature policy equal to the `$permissions` modifier contents.\n`$permissions` rules are applied independently from any other rule type.",
|
|
@@ -6897,6 +6995,7 @@ var data$m = { adg_os_any:{ name:"permissions",
|
|
|
6897
6995
|
negatable:false,
|
|
6898
6996
|
value_optional:true,
|
|
6899
6997
|
value_format:"permissions_value" } };
|
|
6998
|
+
data$m.adg_os_any;
|
|
6900
6999
|
|
|
6901
7000
|
var data$l = { adg_any:{ name:"ping",
|
|
6902
7001
|
description:"The rule corresponds to requests caused by either navigator.sendBeacon() or the ping attribute on links.",
|
|
@@ -6907,12 +7006,16 @@ var data$l = { adg_any:{ name:"ping",
|
|
|
6907
7006
|
ubo_any:{ name:"ping",
|
|
6908
7007
|
description:"The rule corresponds to requests caused by either navigator.sendBeacon() or the ping attribute on links.",
|
|
6909
7008
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293-How-to-write-filters#type-options" } };
|
|
7009
|
+
data$l.adg_any;
|
|
7010
|
+
data$l.abp_any;
|
|
7011
|
+
data$l.ubo_any;
|
|
6910
7012
|
|
|
6911
7013
|
var data$k = { ubo_ext_any:{ name:"popunder",
|
|
6912
7014
|
description:"To block \"popunders\" windows/tabs where the original page redirects to an advertisement\nand the desired content loads in the newly created one.\nTo be used in the same manner as the popup filter option, except that it will block popunders.",
|
|
6913
7015
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#popunder",
|
|
6914
7016
|
negatable:false,
|
|
6915
7017
|
block_only:true } };
|
|
7018
|
+
data$k.ubo_ext_any;
|
|
6916
7019
|
|
|
6917
7020
|
var data$j = { adg_any:{ name:"popup",
|
|
6918
7021
|
description:"Pages opened in a new tab or window.\nNote: Filters will not block pop-ups by default, only if the `$popup` type option is specified.",
|
|
@@ -6926,6 +7029,9 @@ var data$j = { adg_any:{ name:"popup",
|
|
|
6926
7029
|
description:"Pages opened in a new tab or window.\nNote: Filters will not block pop-ups by default, only if the `$popup` type option is specified.",
|
|
6927
7030
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293-How-to-write-filters#type-options",
|
|
6928
7031
|
negatable:false } };
|
|
7032
|
+
data$j.adg_any;
|
|
7033
|
+
data$j.abp_any;
|
|
7034
|
+
data$j.ubo_any;
|
|
6929
7035
|
|
|
6930
7036
|
var data$i = { adg_os_any:{ name:"redirect-rule",
|
|
6931
7037
|
description:"This is basically an alias to `$redirect`\nsince it has the same \"redirection\" values and the logic is almost similar.\nThe difference is that `$redirect-rule` is applied only in the case\nwhen the target request is blocked by a different basic rule.",
|
|
@@ -7017,6 +7123,9 @@ var data$i = { adg_os_any:{ name:"redirect-rule",
|
|
|
7017
7123
|
assignable:true,
|
|
7018
7124
|
negatable:false,
|
|
7019
7125
|
value_format:"(?x)\n ^(\n 1x1\\.gif|\n 2x2\\.png|\n 3x2\\.png|\n 32x32\\.png|\n noop\\.css|\n noop\\.html|\n noopframe|\n noop\\.js|\n noop\\.txt|\n noop-0\\.1s\\.mp3|\n noop-0\\.5s\\.mp3|\n noop-1s\\.mp4|\n none|\n click2load\\.html|\n addthis_widget\\.js|\n amazon_ads\\.js|\n amazon_apstag\\.js|\n monkeybroker\\.js|\n doubleclick_instream_ad_status|\n google-analytics_ga\\.js|\n google-analytics_analytics\\.js|\n google-analytics_inpage_linkid\\.js|\n google-analytics_cx_api\\.js|\n google-ima\\.js|\n googletagservices_gpt\\.js|\n googletagmanager_gtm\\.js|\n googlesyndication_adsbygoogle\\.js|\n scorecardresearch_beacon\\.js|\n outbrain-widget\\.js|\n hd-main\\.js\n )\n (:[0-9]+)?$" } };
|
|
7126
|
+
data$i.adg_os_any;
|
|
7127
|
+
data$i.adg_ext_any;
|
|
7128
|
+
data$i.ubo_ext_any;
|
|
7020
7129
|
|
|
7021
7130
|
var data$h = { adg_os_any:{ name:"redirect",
|
|
7022
7131
|
description:"Used to redirect web requests to a local \"resource\".",
|
|
@@ -7045,6 +7154,10 @@ var data$h = { adg_os_any:{ name:"redirect",
|
|
|
7045
7154
|
assignable:true,
|
|
7046
7155
|
negatable:false,
|
|
7047
7156
|
value_format:"(?x)\n # ABP resources always starts with the `abp-resource:` prefix\n ^abp-resource:\n # Possible resource names\n (\n blank-text|\n blank-css|\n blank-js|\n blank-html|\n blank-mp3|\n 1x1-transparent-gif|\n 2x2-transparent-png|\n 3x2-transparent-png|\n 32x32-transparent-png\n )$" } };
|
|
7157
|
+
data$h.adg_os_any;
|
|
7158
|
+
data$h.adg_ext_any;
|
|
7159
|
+
data$h.ubo_ext_any;
|
|
7160
|
+
data$h.abp_ext_any;
|
|
7048
7161
|
|
|
7049
7162
|
var data$g = { adg_os_any:{ name:"referrerpolicy",
|
|
7050
7163
|
description:"This modifier allows overriding of a page's referrer policy.",
|
|
@@ -7056,6 +7169,7 @@ var data$g = { adg_os_any:{ name:"referrerpolicy",
|
|
|
7056
7169
|
negatable:false,
|
|
7057
7170
|
value_optional:true,
|
|
7058
7171
|
value_format:"referrerpolicy_value" } };
|
|
7172
|
+
data$g.adg_os_any;
|
|
7059
7173
|
|
|
7060
7174
|
var data$f = { adg_os_any:{ name:"removeheader",
|
|
7061
7175
|
description:"Rules with the `$removeheader` modifier are intended to remove headers from HTTP requests and responses.",
|
|
@@ -7111,6 +7225,8 @@ var data$f = { adg_os_any:{ name:"removeheader",
|
|
|
7111
7225
|
negatable:false,
|
|
7112
7226
|
value_optional:true,
|
|
7113
7227
|
value_format:"(?xi)\n ^\n # Value may start with \"request:\"\n (request:)?\n\n # Forbidden header names\n (?!\n (\n access-control-allow-origin|\n access-control-allow-credentials|\n access-control-allow-headers|\n access-control-allow-methods|\n access-control-expose-headers|\n access-control-max-age|\n access-control-request-headers|\n access-control-request-method|\n origin|\n timing-allow-origin|\n allow|\n cross-origin-embedder-policy|\n cross-origin-opener-policy|\n cross-origin-resource-policy|\n content-security-policy|\n content-security-policy-report-only|\n expect-ct|\n feature-policy|\n origin-isolation|\n strict-transport-security|\n upgrade-insecure-requests|\n x-content-type-options|\n x-download-options|\n x-frame-options|\n x-permitted-cross-domain-policies|\n x-powered-by|\n x-xss-protection|\n public-key-pins|\n public-key-pins-report-only|\n sec-websocket-key|\n sec-websocket-extensions|\n sec-websocket-accept|\n sec-websocket-protocol|\n sec-websocket-version|\n p3p|\n sec-fetch-mode|\n sec-fetch-dest|\n sec-fetch-site|\n sec-fetch-user|\n referrer-policy|\n content-type|\n content-length|\n accept|\n accept-encoding|\n host|\n connection|\n transfer-encoding|\n upgrade\n )\n $)\n\n # Any other header name is allowed, if it matches the following regex\n [A-z0-9-]+\n $" } };
|
|
7228
|
+
data$f.adg_os_any;
|
|
7229
|
+
data$f.adg_ext_any;
|
|
7114
7230
|
|
|
7115
7231
|
var data$e = { adg_os_any:{ name:"removeparam",
|
|
7116
7232
|
description:"Rules with the `$removeparam` modifier are intended to strip query parameters from requests' URLs.",
|
|
@@ -7132,6 +7248,9 @@ var data$e = { adg_os_any:{ name:"removeparam",
|
|
|
7132
7248
|
assignable:true,
|
|
7133
7249
|
negatable:false,
|
|
7134
7250
|
value_format:"(?xi)\n (\n # string pattern\n \\w+\n # or regexp pattern\n |\n \\/.+\\/\n # flags\n ([gimuy]+)?\n )" } };
|
|
7251
|
+
data$e.adg_os_any;
|
|
7252
|
+
data$e.adg_ext_any;
|
|
7253
|
+
data$e.ubo_ext_any;
|
|
7135
7254
|
|
|
7136
7255
|
var data$d = { adg_os_any:{ name:"replace",
|
|
7137
7256
|
description:"This modifier completely changes the rule behavior.\nIf it is applied, the rule will not block the request. The response is going to be modified instead.",
|
|
@@ -7170,6 +7289,8 @@ var data$d = { adg_os_any:{ name:"replace",
|
|
|
7170
7289
|
assignable:true,
|
|
7171
7290
|
negatable:false,
|
|
7172
7291
|
value_format:"(?xi)\n ^\n \\/\n # the regexp to match by\n (.+)\n # separator\n \\/\n # replacement\n (.+)?\n \\/\n # flags\n ([gimuy]*)?\n $" } };
|
|
7292
|
+
data$d.adg_os_any;
|
|
7293
|
+
data$d.adg_ext_firefox;
|
|
7173
7294
|
|
|
7174
7295
|
var data$c = { adg_any:{ name:"script",
|
|
7175
7296
|
description:"The rule corresponds to script requests, e.g. javascript, vbscript.",
|
|
@@ -7180,6 +7301,9 @@ var data$c = { adg_any:{ name:"script",
|
|
|
7180
7301
|
ubo_any:{ name:"script",
|
|
7181
7302
|
description:"The rule corresponds to script requests, e.g. javascript, vbscript.",
|
|
7182
7303
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293#options" } };
|
|
7304
|
+
data$c.adg_any;
|
|
7305
|
+
data$c.abp_any;
|
|
7306
|
+
data$c.ubo_any;
|
|
7183
7307
|
|
|
7184
7308
|
var data$b = { adg_any:{ name:"specifichide",
|
|
7185
7309
|
aliases:[ "shide" ],
|
|
@@ -7205,6 +7329,8 @@ var data$b = { adg_any:{ name:"specifichide",
|
|
|
7205
7329
|
inverse_conflicts:true,
|
|
7206
7330
|
negatable:false,
|
|
7207
7331
|
exception_only:true } };
|
|
7332
|
+
data$b.adg_any;
|
|
7333
|
+
data$b.ubo_any;
|
|
7208
7334
|
|
|
7209
7335
|
var data$a = { adg_os_any:{ name:"stealth",
|
|
7210
7336
|
description:"Disables the Stealth Mode module for all corresponding pages and requests.",
|
|
@@ -7246,14 +7372,21 @@ var data$a = { adg_os_any:{ name:"stealth",
|
|
|
7246
7372
|
exception_only:true,
|
|
7247
7373
|
value_optional:true,
|
|
7248
7374
|
value_format:"pipe_separated_stealth_options" } };
|
|
7375
|
+
data$a.adg_os_any;
|
|
7376
|
+
data$a.adg_ext_chrome;
|
|
7377
|
+
data$a.adg_ext_firefox;
|
|
7378
|
+
data$a.adg_ext_opera;
|
|
7379
|
+
data$a.adg_ext_edge;
|
|
7249
7380
|
|
|
7250
7381
|
var data$9 = { ubo_any:{ name:"strict1p",
|
|
7251
7382
|
description:"This new `strict1p` option can check for strict partyness.\nFor example, a network request qualifies as 1st-party if both the context and the request share the same hostname.",
|
|
7252
7383
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#strict1p" } };
|
|
7384
|
+
data$9.ubo_any;
|
|
7253
7385
|
|
|
7254
7386
|
var data$8 = { ubo_any:{ name:"strict3p",
|
|
7255
7387
|
description:"This new `strict3p` option can check for strict partyness.\nFor example, a network request qualifies as 3rd-party if the context and the request hostnames are different.",
|
|
7256
7388
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#strict3p" } };
|
|
7389
|
+
data$8.ubo_any;
|
|
7257
7390
|
|
|
7258
7391
|
var data$7 = { adg_any:{ name:"stylesheet",
|
|
7259
7392
|
description:"The rule corresponds to CSS files requests.",
|
|
@@ -7265,6 +7398,9 @@ var data$7 = { adg_any:{ name:"stylesheet",
|
|
|
7265
7398
|
aliases:[ "css" ],
|
|
7266
7399
|
description:"The rule corresponds to CSS files requests.",
|
|
7267
7400
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#css" } };
|
|
7401
|
+
data$7.adg_any;
|
|
7402
|
+
data$7.abp_any;
|
|
7403
|
+
data$7.ubo_any;
|
|
7268
7404
|
|
|
7269
7405
|
var data$6 = { adg_any:{ name:"subdocument",
|
|
7270
7406
|
description:"The rule corresponds to requests for built-in pages — HTML tags frame and iframe.",
|
|
@@ -7276,6 +7412,9 @@ var data$6 = { adg_any:{ name:"subdocument",
|
|
|
7276
7412
|
aliases:[ "frame" ],
|
|
7277
7413
|
description:"The rule corresponds to requests for built-in pages — HTML tags frame and iframe.",
|
|
7278
7414
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#frame" } };
|
|
7415
|
+
data$6.adg_any;
|
|
7416
|
+
data$6.abp_any;
|
|
7417
|
+
data$6.ubo_any;
|
|
7279
7418
|
|
|
7280
7419
|
var data$5 = { adg_any:{ name:"third-party",
|
|
7281
7420
|
aliases:[ "3p" ],
|
|
@@ -7288,6 +7427,9 @@ var data$5 = { adg_any:{ name:"third-party",
|
|
|
7288
7427
|
abp_any:{ name:"third-party",
|
|
7289
7428
|
description:"A restriction of third-party and own requests.\nA third-party request is a request from a different domain.\nFor example, a request to `example.org` from `domain.com` is a third-party request.",
|
|
7290
7429
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293#party-requests" } };
|
|
7430
|
+
data$5.adg_any;
|
|
7431
|
+
data$5.ubo_any;
|
|
7432
|
+
data$5.abp_any;
|
|
7291
7433
|
|
|
7292
7434
|
var data$4 = { ubo_ext_any:{ name:"to",
|
|
7293
7435
|
description:"The main motivation of this option is\nto give static network filtering engine an equivalent of DNR's `requestDomains` and `excludedRequestDomains`.",
|
|
@@ -7295,6 +7437,7 @@ var data$4 = { ubo_ext_any:{ name:"to",
|
|
|
7295
7437
|
assignable:true,
|
|
7296
7438
|
negatable:false,
|
|
7297
7439
|
value_format:"pipe_separated_domains" } };
|
|
7440
|
+
data$4.ubo_ext_any;
|
|
7298
7441
|
|
|
7299
7442
|
var data$3 = { adg_any:{ name:"urlblock",
|
|
7300
7443
|
description:"Disables blocking of all requests sent from the pages matching the rule.",
|
|
@@ -7310,6 +7453,7 @@ var data$3 = { adg_any:{ name:"urlblock",
|
|
|
7310
7453
|
inverse_conflicts:true,
|
|
7311
7454
|
negatable:false,
|
|
7312
7455
|
exception_only:true } };
|
|
7456
|
+
data$3.adg_any;
|
|
7313
7457
|
|
|
7314
7458
|
var data$2 = { adg_any:{ name:"webrtc",
|
|
7315
7459
|
description:"The rule applies only to WebRTC connections.",
|
|
@@ -7325,6 +7469,9 @@ var data$2 = { adg_any:{ name:"webrtc",
|
|
|
7325
7469
|
description:"The rule applies only to WebRTC connections.",
|
|
7326
7470
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293-How-to-write-filters#type-options",
|
|
7327
7471
|
version_added:"1.13.3" } };
|
|
7472
|
+
data$2.adg_any;
|
|
7473
|
+
data$2.ubo_any;
|
|
7474
|
+
data$2.abp_any;
|
|
7328
7475
|
|
|
7329
7476
|
var data$1 = { adg_os_any:{ name:"websocket",
|
|
7330
7477
|
description:"The rule applies only to WebSocket connections.",
|
|
@@ -7344,6 +7491,12 @@ var data$1 = { adg_os_any:{ name:"websocket",
|
|
|
7344
7491
|
ubo_ext_any:{ name:"websocket",
|
|
7345
7492
|
description:"The rule applies only to WebSocket connections.",
|
|
7346
7493
|
docs:"https://help.adblockplus.org/hc/en-us/articles/360062733293-How-to-write-filters#type-options" } };
|
|
7494
|
+
data$1.adg_os_any;
|
|
7495
|
+
data$1.adg_ext_any;
|
|
7496
|
+
data$1.adg_cb_ios;
|
|
7497
|
+
data$1.adg_cb_safari;
|
|
7498
|
+
data$1.abp_ext_any;
|
|
7499
|
+
data$1.ubo_ext_any;
|
|
7347
7500
|
|
|
7348
7501
|
var data = { adg_any:{ name:"xmlhttprequest",
|
|
7349
7502
|
aliases:[ "xhr" ],
|
|
@@ -7356,6 +7509,9 @@ var data = { adg_any:{ name:"xmlhttprequest",
|
|
|
7356
7509
|
aliases:[ "xmlhttprequest" ],
|
|
7357
7510
|
description:"The rule applies only to ajax requests (requests sent via javascript object XMLHttpRequest).",
|
|
7358
7511
|
docs:"https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#xhr" } };
|
|
7512
|
+
data.adg_any;
|
|
7513
|
+
data.abp_any;
|
|
7514
|
+
data.ubo_any;
|
|
7359
7515
|
|
|
7360
7516
|
/**
|
|
7361
7517
|
* @file Raw compatibility tables data reexport from yaml files.
|
|
@@ -7579,6 +7735,7 @@ const ALLOWED_CSP_DIRECTIVES = new Set([
|
|
|
7579
7735
|
'child-src',
|
|
7580
7736
|
'connect-src',
|
|
7581
7737
|
'default-src',
|
|
7738
|
+
'fenced-frame-src',
|
|
7582
7739
|
'font-src',
|
|
7583
7740
|
'form-action',
|
|
7584
7741
|
'frame-ancestors',
|
|
@@ -7590,11 +7747,18 @@ const ALLOWED_CSP_DIRECTIVES = new Set([
|
|
|
7590
7747
|
'object-src',
|
|
7591
7748
|
'plugin-types',
|
|
7592
7749
|
'prefetch-src',
|
|
7750
|
+
'referrer',
|
|
7593
7751
|
'report-to',
|
|
7594
7752
|
'report-uri',
|
|
7753
|
+
'require-trusted-types-for',
|
|
7595
7754
|
'sandbox',
|
|
7596
7755
|
'script-src',
|
|
7756
|
+
'script-src-attr',
|
|
7757
|
+
'script-src-elem',
|
|
7597
7758
|
'style-src',
|
|
7759
|
+
'style-src-attr',
|
|
7760
|
+
'style-src-elem',
|
|
7761
|
+
'trusted-types',
|
|
7598
7762
|
'upgrade-insecure-requests',
|
|
7599
7763
|
'worker-src',
|
|
7600
7764
|
]);
|
|
@@ -10566,7 +10730,7 @@ class LogicalExpressionUtils {
|
|
|
10566
10730
|
}
|
|
10567
10731
|
}
|
|
10568
10732
|
|
|
10569
|
-
const version$1 = "1.1.
|
|
10733
|
+
const version$1 = "1.1.8";
|
|
10570
10734
|
|
|
10571
10735
|
/**
|
|
10572
10736
|
* @file AGTree version
|