![]() ![]() ![]() An exhaustive list of special pages can be accessed by navigating to: chrome://about/ Much like Firefox, Chromium has many internal Chrome URLs (special pages) that are used for additional configuration, troubleshooting, task management, etc. Meaningful filenames and a simple grep across the files in case of doubt can help to prevent such misconfigurations. In this case it is indispensable to ensure that the same policy occurs only once per all files! If a policy is defined multiple times across the JSON files than the state of the policy will be undefined and it would be unclear which rule would be used! If the policy was configured properly can be proofed on the special page: chrome://policy.įor a better structure, it is also possible to spread the policies over multiple JSON files. It does not disable the protocols on the system, so other applications must be configured separately. Please note that this only blocks the user from visiting specified locations. If configured for other users as a service, it is recommended to block all sites at first and then define the allowed sites, to avoid abuse of the service. More settings, can be found in the policy list. This prevents the user from surfing on the file system using the file protocol, incognito mode, blocks the listed URIs and URLs, and the location and notifications. Void TabStrip::UpdateHoverCard(Tab* tab, HoverCardUpdateType update_type) Unsupported closed-source DRM capability (required by Netflix VOD)ĭiff -git a/chrome/browser/ui/views/tabs/tab_ b/chrome/browser/ui/views/tabs/tab_ index 2c94eb0.1f7bde0 100644 - a/chrome/browser/ui/views/tabs/tab_ +++ b/chrome/browser/ui/views/tabs/tab_ -2149,6 +2149,7 void TabStrip::OnMouseEventInTab(views::View* source, } Use system libpng instead of the bundled one.Įnable Video Acceleration API for hardware decoding Use system icu instead of the bundled one Use system harfbuzz instead of the bundled one. Use system ffmpeg instead of the bundled one Use system libaom and dav1d instead of the bundled one. ![]() !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occurīuild the SUID sandbox, which is only needed on CONFIG_USER_NS=n kernels Use bundled libc++ instead of libstdc++ for building.īuild with Link Time Optimizations (via clang's ThinLTO)Įnable Official build instead of Developer build.īuild with Profile Guided Optimizations (2-stage compilation)ĭisable optimized assembly code that is not PIC friendlyĮnable codecs for patent-encumbered audio and video formats.Īdd sound server support via media-libs/libpulse (may be PulseAudio or PipeWire)Īdd support for the Qt 5 application and UI frameworkĪdd support for the Qt 6 application and UI frameworkĮnable support for remote desktop and screen cast using PipeWire Mostly intended for debugging and development, NOT RECOMMENDED for general use.Įnable support for Google Hangouts features such as screen sharingīuild Ozone only with headless backend, NOT RECOMMENDED for general use. Mostly intended for debugging and development, NOT RECOMMENDED for general use.Īdd support for CUPS (Common Unix Printing System)īuild with user-specified CFLAGS (unsupported)Įnable DCHECK feature with severity configurable at runtime. Split build into more shared libraries to speed up linking. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |