
firewall 作者: Jirka Justra
[č]Allows website requests filtering and header alteration --- icon from: Martz90 http://martz90.deviantart.com/art/Hex-Icons-Pack-389706981
必須使用 Firefox 才能使用此擴充套件
擴充套件後設資料
畫面擷圖

關於此擴充套件
[manual]
Requested resources have origin url (site's address) and target url.
Default origin is set to .* (all sites).
Please note, that there cannot be used semicolon in text tokens, because it works like line breaker
and asterisk as first character of word (it translate variable name to its value).
When this is needed, please use base64 version of value and b64d (base 64 decode) function
in program (see example).
- request blocking -
Firewall works by testing currently loading site's url (origin) against url-reg-exp
given in command origin. If it matches, then ALL rules of given set will be tested
one by one. Every rule can decide if target is allowed or blocked. At the end,
final result of those iterations is used.
- header alteration -
Header alteration rules are evaluated immediately.
/commands:
origin url-reg-exp - create new rule set for given url (regular expression form)
disable - disable current rule set
block url-reg-exp - add blocking rule for target url (blacklist)
allow url-reg-exp - whitelist all that matches
requestHeader Header-Name [value] - alter request header value for current origin
responseHeader Header-Name [value] - alter response header value for current origin
(if value is omitted, header is discarded)
/example:
# discard all X-Frame-Options headers on all loaded sites
responseHeader X-Frame-Options
# block [anything].google(-analytics, etc.) on steam
origin steampowered
block \.google
# semicolon usage
origin mozilla\.org
block \.png; block \.svg; block \.css
# using previous origin (mozilla.org)
# allowing \.css again
# base64 for \.css is XC5jc3M= ... in dev console: btoa('\\.css')
b64d XC5jc3M=
allow *
Requested resources have origin url (site's address) and target url.
Default origin is set to .* (all sites).
Please note, that there cannot be used semicolon in text tokens, because it works like line breaker
and asterisk as first character of word (it translate variable name to its value).
When this is needed, please use base64 version of value and b64d (base 64 decode) function
in program (see example).
- request blocking -
Firewall works by testing currently loading site's url (origin) against url-reg-exp
given in command origin. If it matches, then ALL rules of given set will be tested
one by one. Every rule can decide if target is allowed or blocked. At the end,
final result of those iterations is used.
- header alteration -
Header alteration rules are evaluated immediately.
/commands:
origin url-reg-exp - create new rule set for given url (regular expression form)
disable - disable current rule set
block url-reg-exp - add blocking rule for target url (blacklist)
allow url-reg-exp - whitelist all that matches
requestHeader Header-Name [value] - alter request header value for current origin
responseHeader Header-Name [value] - alter response header value for current origin
(if value is omitted, header is discarded)
/example:
# discard all X-Frame-Options headers on all loaded sites
responseHeader X-Frame-Options
# block [anything].google(-analytics, etc.) on steam
origin steampowered
block \.google
# semicolon usage
origin mozilla\.org
block \.png; block \.svg; block \.css
# using previous origin (mozilla.org)
# allowing \.css again
# base64 for \.css is XC5jc3M= ... in dev console: btoa('\\.css')
b64d XC5jc3M=
allow *
為您的體驗打分數
支援這位開發者
這套擴充套件的開發者希望您透過小小的捐獻協助其後續開發。
權限了解更多
此附加元件需要:
- 存取您所有網站中的資料
更多資訊
- 附加元件網址
- 版本
- 1.1.1resigned1
- 大小
- 101.24 KB
- 最近更新
- 1 年前 (2024年4月25日)
- 相關分類
- 授權條款
- MIT License
- 版本紀錄
- 標籤
新增至收藏集
Jirka Justra 製作的更多擴充套件
- 目前沒有評分
- 目前沒有評分
- 目前沒有評分
- 目前沒有評分
- 目前沒有評分
- 目前沒有評分