You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,14 +57,14 @@ This command generates static content into the `build` directory and can be serv
57
57
58
58
Translations are not pushed to the repo and prepared on-the-fly (`i18n` folder is added to `.gitignore`).
59
59
60
-
Here's how you can debug translations locally.
60
+
Here’s how you can debug translations locally.
61
61
62
62
1. Download translations: `CROWDIN_PERSONAL_TOKEN="YOURTOKEN" pnpm run crowdin download`
63
63
2. Run Docusaurus with the language of your choice: `pnpm run start -- --locale de`
64
64
65
65
## How to generate DNS stamps
66
66
67
-
If you'd like to update the list of [known DNS Providers](https://github.com/AdguardTeam/KnowledgeBaseDNS/blob/master/docs/general/dns-providers.md), you'll need to know how to create and check DNS stamps. Read the brief tutorial below to learn how to do it.
67
+
If you’d like to update the list of [known DNS Providers](https://github.com/AdguardTeam/KnowledgeBaseDNS/blob/master/docs/general/dns-providers.md), you’ll need to know how to create and check DNS stamps. Read the brief tutorial below to learn how to do it.
Copy file name to clipboardExpand all lines: docs/adguard-home/faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -298,7 +298,7 @@ DOMAIN {
298
298
299
299
:::note
300
300
301
-
Do not use subdirectories with the Apache reverse HTTP proxy. It's a known issue ([#6604]) that Apache handles relative redirects differently than other web servers. This causes problems with the AdGuard Home web interface.
301
+
Do not use subdirectories with the Apache reverse HTTP proxy. It’s a known issue ([#6604]) that Apache handles relative redirects differently than other web servers. This causes problems with the AdGuard Home web interface.
Copy file name to clipboardExpand all lines: docs/dns-client/overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ Supported CPU architectures:
39
39
40
40
:::caution
41
41
42
-
On macOS, it's crucial that globally installed daemons are owned by `root` (see the [`launchd` documentation][launchd-requirements]), so the `AdGuardDNSClient` executable must be placed in the `/Applications/` directory or its subdirectory.
42
+
On macOS, it’s crucial that globally installed daemons are owned by `root` (see the [`launchd` documentation][launchd-requirements]), so the `AdGuardDNSClient` executable must be placed in the `/Applications/` directory or its subdirectory.
Copy file name to clipboardExpand all lines: docs/general/dns-filtering-syntax.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ If you are creating a blocklist, we recommend using the [Adblock-style syntax].
34
34
35
35
-**Extensibility.** In the past decade, the Adblock-style syntax has greatly evolved, and we see no reason not to extend it even further and offer additional features for network-level blockers.
36
36
37
-
If you're maintaining either a `/etc/hosts`-style blocklist or multiple filtering lists (regardless of type), we provide a tool for blocklist compilation. We named it [Hostlist compiler] and we use it ourselves to create [AdGuard DNS filter].
37
+
If you’re maintaining either a `/etc/hosts`-style blocklist or multiple filtering lists (regardless of type), we provide a tool for blocklist compilation. We named it [Hostlist compiler] and we use it ourselves to create [AdGuard DNS filter].
-`||`: matches the beginning of a hostname, including any subdomain. For instance, `||example.org` matches `example.org` and `test.example.org` but not `testexample.org`.
82
82
83
-
-`^`: the separator character. Unlike browser ad blocking, there's nothing to separate in a hostname, so the only purpose of this character is to mark the end of the hostname.
83
+
-`^`: the separator character. Unlike browser ad blocking, there’s nothing to separate in a hostname, so the only purpose of this character is to mark the end of the hostname.
84
84
85
85
-`|`: a pointer to the beginning or the end of the hostname. The value depends on the character placement in the mask. For example, the rule `ample.org|` corresponds to `example.org` but not to `example.org.com`. `|example` corresponds to `example.org` but not to `test.example`.
86
86
@@ -129,7 +129,7 @@ You can change the behavior of a rule by adding modifiers. Modifiers must be loc
129
129
130
130
`||example.org^` is the matching pattern. `$` is the delimiter, which signals that the rest of the rule are modifiers. `client=127.0.0.1` is the [`client`] modifier with its value, `127.0.0.1`. `,` is the delimiter between modifiers. And finally, `dnstype=A` is the [`dnstype`] modifier with its value, `A`.
131
131
132
-
**NOTE:** If a rule contains a modifier not listed in this document, the whole rule **must be ignored**. This way we avoid false-positives when people are trying to use unmodified browser ad blockers' filter lists like EasyList or EasyPrivacy.
132
+
**NOTE:** If a rule contains a modifier not listed in this document, the whole rule **must be ignored**. This way we avoid false-positives when people are trying to use unmodified browser ad blockers’ filter lists like EasyList or EasyPrivacy.
133
133
134
134
#### `client` {#client-modifier}
135
135
@@ -147,7 +147,7 @@ The syntax is:
147
147
$client=value1|value2|...
148
148
```
149
149
150
-
You can also exclude clients by adding a `~` character before the value. In this case, the rule is not be applied to this client's DNS requests.
150
+
You can also exclude clients by adding a `~` character before the value. In this case, the rule is not be applied to this client’s DNS requests.
151
151
152
152
```none
153
153
$client=~value1
@@ -190,7 +190,7 @@ This modifier allows avoiding creating unnecessary exception rules when our bloc
190
190
@@||net^
191
191
```
192
192
193
-
The problem with this approach is that this way you will also unblock tracking domains that are located on those TLDs (i.e. `google-analytics.com`). Here's how to solve this with `denyallow`:
193
+
The problem with this approach is that this way you will also unblock tracking domains that are located on those TLDs (i.e. `google-analytics.com`). Here’s how to solve this with `denyallow`:
194
194
195
195
```none
196
196
*$denyallow=com|net
@@ -202,7 +202,7 @@ The problem with this approach is that this way you will also unblock tracking d
202
202
203
203
-`@@*$denyallow=com|net`: unblock everything except for `*.com` and `*.net`.
204
204
205
-
-`||example.org^$denyallow=sub.example.org`. block `example.org` and `*.example.org` but don't block `sub.example.org`.
205
+
-`||example.org^$denyallow=sub.example.org`. block `example.org` and `*.example.org` but don’t block `sub.example.org`.
206
206
207
207
#### `dnstype` {#dnstype-modifier}
208
208
@@ -259,7 +259,7 @@ The `dnsrewrite` response modifier allows replacing the content of the response
259
259
260
260
**Rules with the `dnsrewrite` response modifier have higher priority than other rules in AdGuard Home and AdGuard DNS.**
261
261
262
-
Responses to all requests for a host matching a `dnsrewrite` rule will be replaced. The answer section of the replacement response will only contain RRs that match the request's query type and, possibly, CNAME RRs. Note that this means that responses to some requests may become empty (`NODATA`) if the host matches a `dnsrewrite` rule.
262
+
Responses to all requests for a host matching a `dnsrewrite` rule will be replaced. The answer section of the replacement response will only contain RRs that match the request’s query type and, possibly, CNAME RRs. Note that this means that responses to some requests may become empty (`NODATA`) if the host matches a `dnsrewrite` rule.
263
263
264
264
The shorthand syntax is:
265
265
@@ -307,7 +307,7 @@ Name: example.net
307
307
Address: 1.2.3.4
308
308
```
309
309
310
-
Next, the `CNAME` rewrite. After that, all other records' values are summed as one response, so this:
310
+
Next, the `CNAME` rewrite. After that, all other records’ values are summed as one response, so this:
311
311
312
312
```none
313
313
||example.com^$dnsrewrite=NOERROR;A;1.2.3.4
@@ -400,7 +400,7 @@ The rules with the `badfilter` modifier disable other basic rules to which they
**NOTE:** The `badfilter` modifier currently doesn't work with `/etc/hosts`-style rules. `127.0.0.1 example.org$badfilter` will **not** disable the original `127.0.0.1 example.org` rule.
403
+
**NOTE:** The `badfilter` modifier currently doesn’t work with `/etc/hosts`-style rules. `127.0.0.1 example.org$badfilter` will **not** disable the original `127.0.0.1 example.org` rule.
404
404
405
405
#### `ctag` {#ctag-modifier}
406
406
@@ -414,13 +414,13 @@ The syntax is:
414
414
$ctag=value1|value2|...
415
415
```
416
416
417
-
If one of client's tags matches the `ctag` values, this rule applies to the client. The syntax for exclusion is:
417
+
If one of client’s tags matches the `ctag` values, this rule applies to the client. The syntax for exclusion is:
418
418
419
419
```none
420
420
$ctag=~value1|~value2|...
421
421
```
422
422
423
-
If one of client's tags matches the exclusion `ctag` values, this rule doesn't apply to the client.
423
+
If one of client’s tags matches the exclusion `ctag` values, this rule doesn’t apply to the client.
424
424
425
425
**Examples:**
426
426
@@ -503,11 +503,11 @@ consider it to be an [Adblock-style syntax] rule.
503
503
504
504
If you are maintaining a blocklist and use different sources in it, [Hostlist compiler] may be useful to you. It is a simple tool that makes it easier to compile a hosts blocklist compatible with AdGuard Home, Private AdGuard DNS or any other AdGuard product with DNS filtering.
505
505
506
-
What it's capable of:
506
+
What it’s capable of:
507
507
508
508
1. Compile a single blocklist from multiple sources.
509
509
510
-
2. Exclude the rules you don't need.
510
+
2. Exclude the rules you don’t need.
511
511
512
512
3. Cleanup the resulting list: deduplicate, remove invalid rules, and compress the list.
0 commit comments